|    [1] Larochelle D, Evans D. Statically detecting likely buffer overflow vulnerabilities //Proceedings of 10th conference on USENIX Security Symposium. 2001. 
 [2] Godefroid P, Klarlund N, Sen K. DART: Directed automated random testing //ACM Sigplan Notices. 2005, 40: 213-223. 
 [3] Sen K, Agha G. CUTE and jCUTE: Concolic unit testing and explicit path model-checking tools //Proceedings of Conference on Computer Aided Verification. 2006, 4144: 419- 423. 
 [4] Cadar C, Ganesh V, Pawlowski P, et al. EXE: Automatically generating inputs of death [J]. ACM Transactions on Information and System Security, 2008,12: 1-38. 
 [5] Horwitz S, Reps T. The use of program dependence graphs in software engineering //Proceedings of International Conference on Software Engineering. 1992: 392- 411. 
 [6] Van Engelen R. The CR# algebra and its application in loop analysis and optimization . Technical Report TR- 041223. Department of Computer Science, Florida State University, 2004. 
 [7] Van Engelen R, Birch J, Shou Y, et al. A unified framework for nonlinear dependence testing and symbolic analysis //Proceedings of the ACM International Conference on Supercomputing (ICS). 2004: 106-115. 
 [8] Cytron R, Ferrante J, Rosen B, et al. An efficient method of computing static single assignment form //Proceedings of 16th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages. 1989. 
 [9] Microsoft Research. Microsoft Phoenix Academic Program . . http://research.microsoft.com/phoenix/ 
 [10] Microsoft Research. Z3: New High-performance Theorem Prover . . http://research.microsoft.com/projects/z3/ 
 [11] Sourceforge. Cppcheck: A tool for static C/C+ + code analysis . . http://cppcheck.wiki.sourceforge.net/
  |