T. Avgerinos, S. K. Cha, A. Rebert, E. J. Schwartz, M. Woo et al., Automatic exploit generation, Communications of the ACM, vol.57, issue.2, p.2014
DOI : 10.1145/2560217.2560219

T. Avgerinos, A. Rebert, S. K. Cha, and D. Brumley, Enhancing symbolic execution with VeriTesting, pp.2014-2014
DOI : 10.1145/2568225.2568293

S. Bardin, P. Baufreton, N. Cornuet, P. Herrmann, and S. Labbé, Binary-Level Testing of Embedded Programs, 2013 13th International Conference on Quality Software, p.2013, 2013.
DOI : 10.1109/QSIC.2013.49

S. Bardin and P. Herrmann, Structural Testing of Executables, 2008 International Conference on Software Testing, Verification, and Validation, 2008.
DOI : 10.1109/ICST.2008.8

S. Bardin and P. Herrmann, Osmose: Automatic structural testing of executables. Software Testing, Verification Reliability, p.2011

S. Bardin, P. Herrmann, J. Leroux, O. Ly, R. Tabary et al., The BINCOA Framework for Binary Code Analysis, 2011.
DOI : 10.1007/978-3-642-14295-6_27

URL : https://hal.archives-ouvertes.fr/hal-01006499

S. Bardin, P. Herrmann, and F. Védrine, Refinement-Based CFG Reconstruction from Unstructured Programs, p.2011, 2011.
DOI : 10.1007/978-3-642-14295-6_27

N. Bjørner, Engineering theories with Z3, 2012.

E. Bounimova, P. Godefroid, and D. A. Molnar, Billions and billions of constraints: Whitebox fuzz testing in production, 2013 35th International Conference on Software Engineering (ICSE), 2013.
DOI : 10.1109/ICSE.2013.6606558

. Bitscope, Automatically dissecting malicious binaries, 2007.

R. Brummayer and A. Biere, Boolector: An Efficient SMT Solver for Bit-Vectors and Arrays, 2009.
DOI : 10.1007/978-3-540-78800-3_24

C. Cadar, D. Dunbar, and D. Engler, Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI 2008. USENIX Association, 2008.

C. Cadar, V. Ganesh, P. M. Pawlowski, D. L. Dill, and D. R. Engler, Exe: Automatically generating inputs of death, 2006.

C. Cadar, P. Godefroid, S. Khurshid, C. S. , K. Sen et al., Symbolic execution for software testing in practice, Proceeding of the 33rd international conference on Software engineering, ICSE '11, 2011.
DOI : 10.1145/1985793.1985995

C. Cadar and K. Sen, Symbolic execution for software testing, Communications of the ACM, vol.56, issue.2, p.2013
DOI : 10.1145/2408776.2408795

S. K. Cha, T. Avgerinos, A. Rebert, and D. Brumley, Unleashing Mayhem on Binary Code, 2012 IEEE Symposium on Security and Privacy, pp.2012-2012
DOI : 10.1109/SP.2012.31

URL : http://doi.org/10.1109/sp.2012.31

V. Chipounov, V. Kuznetsov, and G. Candea, S2E: A platform for in-vivo multi-path analysis of software systems, 2011.

V. Chipounov, V. Kuznetsov, and G. Candea, The S2E Platform, ACM Transactions on Computer Systems, vol.30, issue.1
DOI : 10.1145/2110356.2110358

R. David, S. Bardin, T. T. Dinh, J. Feist, L. Mounier et al., BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis. In: SANER 2016 BINSEC: Binary code analysis with low-level regions, TACAS 2015, pp.2016-2015
URL : https://hal.archives-ouvertes.fr/hal-01721502

P. Godefroid, N. Klarlund, and K. Sen, Dart: Directed automated random testing, SIGPLAN Not, vol.40, issue.6, 2005.

P. Godefroid, M. Y. Levin, and D. A. Molnar, SAGE, Communications of the ACM, vol.55, issue.3, p.2012
DOI : 10.1145/2093548.2093564

S. Heelan and A. Gianni, Augmenting vulnerability analysis of binary code, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, p.2012
DOI : 10.1145/2420950.2420981

J. C. King, Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, 1976.
DOI : 10.1145/360248.360252

E. J. Schwartz, T. Avgerinos, and D. Brumley, All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask), 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.26

K. Sen, D. Marinov, and G. Agha, Cute: A concolic unit testing engine for C. SIGSOFT Softw, Eng. Notes, issue.5, p.30, 2005.

D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager et al., BitBlaze: A New Approach to Computer Security via Binary Analysis, 2008.
DOI : 10.1145/1315245.1315261

N. Williams, B. Marre, and P. Mouy, On-the-fly generation of K-path tests for C functions, Proceedings. 19th International Conference on Automated Software Engineering, 2004., 2004.
DOI : 10.1109/ASE.2004.1342749