S. Bardin, P. Baufreton, N. Cornuet, P. Herrmann, and S. Labbé, Binarylevel testing of embedded programs, 2013.

S. Bardin and P. Herrmann, OSMOSE: Automatic Structural Testing of Executables. Software Testing, Verification and Reliability, 2011.

D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, BAP: A Binary Analysis Platform, 2011.
DOI : 10.1007/978-3-642-14295-6_27

URL : http://users.ece.cmu.edu/~ejschwar/papers/cav11.pdf

C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler, EXE: automatically generating inputs of death, 2006.

C. Cadar and K. Sen, Symbolic execution for software testing, Communications of the ACM, vol.56, issue.2, p.56, 2013.
DOI : 10.1145/2408776.2408795

D. Caselden, A. Bazhanyuk, M. Payer, L. Szekeres, S. Mccamant et al., Transformation-aware Exploit Generation using a HI-CFG, 2013.
DOI : 10.21236/ADA587051

URL : http://nma.berkeley.edu/ark:/28722/bk001482d1d

V. Chipounov, V. Kuznetsov, and G. Candea, S2E: A platform for invivo multi-path analysis of software systems, 2011.

A. Djoudi and S. Bardin, BINSEC: Binary Code Analysis with Low-Level Regions, TACAS 2015, 2015.
DOI : 10.1007/978-3-662-46681-0_17

P. Godefroid, M. Levin, and D. Molnar, SAGE, Communications of the ACM, vol.55, issue.3, 2012.
DOI : 10.1145/2093548.2093564

C. Luk, R. S. Cohn, R. Muth, H. Patil, A. Klauser et al., Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation, PLDI 2005, 2005.

M. H. Nguyen, M. Ogawa, and T. Q. Thanh, Obfuscation code localization based on CFG generation of malware, p.2015, 2015.

E. J. Schwartz, T. Avgerinos, and D. Brumley, All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution, 2010.
DOI : 10.1109/sp.2010.26

URL : http://www.ece.cmu.edu/%7Eejschwar/papers/oakland10.pdf