R. Bodík, R. Gupta, and V. Sarkar, ABCD, ACM SIGPLAN Notices, vol.35, issue.5, pp.321-333, 2000.
DOI : 10.1145/358438.349342

C. Cadar, D. Dunbar, and D. R. Engler, Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI, pp.209-224, 2008.

. Cisco, CVE-2016-1287: Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability, 2016.

A. C. De-melo, The new linux 'perf' tools, Slides from Linux Kongress, 2010.

N. Dor, M. Rodeh, and M. Sagiv, CSSV, ACM SIGPLAN Notices, vol.38, issue.5, pp.155-167, 2003.
DOI : 10.1145/780822.781149

D. Evans and D. Larochelle, Improving security using extensible lightweight static analysis, IEEE Software, vol.19, issue.1, pp.42-51, 2002.
DOI : 10.1109/52.976940

URL : http://www.cs.virginia.edu/evans/pubs/ieeesoftware.pdf

Y. Fan, L. Yongbo, C. Yurong, X. Hongfa, G. Venkataramani et al., Stat- Sym: Vulnerable Path Discovery through Statistics-guided Symbolic Execution CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow, Proceedings of 2017 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2017. 10. Google, 2015.

R. Mcnally, K. Yiu, D. Grove, and D. Gerhardy, Fuzzing: the state of the art, 2012.

S. Nagarakatte, J. Zhao, M. M. Martin, and S. Zdancewic, SoftBound: Highly Compatible and Complete Spatial Memory Safety for C, Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.245-258, 2009.

G. C. Necula, S. Mcpeak, and W. Weimer, CCured, ACM SIGPLAN Notices, vol.37, issue.1, pp.128-139, 2002.
DOI : 10.1145/565816.503286

Y. Sui, D. Ye, Y. Su, and J. Xue, Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions, IEEE Transactions on Reliability, vol.65, issue.4, p.2016
DOI : 10.1109/TR.2016.2570538

G. Venkataramani, J. Chen, and M. Doroslovacki, Detecting Hardware Covert Timing Channels, IEEE Micro, vol.36, issue.5, pp.17-27, 2016.
DOI : 10.1109/MM.2016.83

M. Woo, S. K. Cha, S. Gottlieb, and D. Brumley, Scheduling black-box mutational fuzzing, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.511-522, 2013.
DOI : 10.1145/2508859.2516736

T. Würthinger, C. Wimmer, and H. Mössenböck, Array bounds check elimination for the Java HotSpot client compiler, 5th International Symposium on Principles and practice of programming in Java, pp.125-133, 2007.

F. Yamaguchi, Joern: A Robust Code Analysis Platform for C/C++, 2016.

F. Yamaguchi, M. Lottmann, and K. Rieck, Generalized vulnerability extrapolation using abstract syntax trees, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.359-368, 2012.
DOI : 10.1145/2420950.2421003

URL : http://user.informatik.uni-goettingen.de/%7Ekrieck/docs/2012-acsac.pdf

F. Yamaguchi, C. Wressnegger, H. Gascon, and K. Rieck, Chucky, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.499-510, 2013.
DOI : 10.1145/2508859.2516665

F. Yao, J. Chen, and G. Venkataramani, JOP-alarm: Detecting jump-oriented programming-based anomalies in applications, 2013 IEEE 31st International Conference on Computer Design (ICCD), pp.467-470, 2013.
DOI : 10.1109/ICCD.2013.6657084