H. J. Abdelnur, R. State, and O. Festor, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

S. Becker, R. State, and T. Engel, Using game theory to configure P2P SIP, Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '09, pp.1-9, 2009.
DOI : 10.1145/1595637.1595645

A. Blass and Y. Gurevich, Lev Nachmanson, and Margus Veanes. Play to test, FATES, pp.32-46, 2005.

C. Cadar, P. Twohey, V. Ganesh, and D. Engler, EXE: Automatically Generating Inputs of Death Using Symbolic Execution, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006.

J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum, Understanding data lifetime via whole system simulation, SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pp.22-22, 2004.

A. Luca-de, Game models for open systems, Verification: Theory and Practice, pp.269-289, 2003.

P. Godefroid, A. Kie´zunkie´zun, and M. Y. Levin, Grammar-based Whitebox Fuzzing, PLDI'2008: ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008.

A. Greenwald, Matrix games and nash equilibrium, 2007.

J. Newsome, D. Brumley, and D. X. Song, Vulnerability-specific execution filtering for exploit prevention on commodity software, NDSS, 2006.

J. Newsome and D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005. [12] pedram.amini. PaiMei -reverse engineering framework

J. Seitz, Gray Hat Python: Python Programming for Hackers and Reverse Engineers, 2009.

M. Vuagnoux, Autodafé: an Act of Software Torture, Proceedings of the 22th Chaos Communication Congress, pp.47-58, 2005.