4King J.Symbolic execution and program testing[J].Communications of the ACM.1976,19(7):385-394.
5Dutertre B,Mourn L M.A fast linear-arithmetic solver for DPLL (T)[C] //Proc of CAV'06.Heidelburg:Springer,2006:81-94.
6Cadar C,Engler D,Engler D.Klee:Unassisted and automatic generation of highcoverage tests for complex systems progrms[C]//Proc of USENIX OSDI'08.Berkeley,CA:USENIX,2008.
7Molnar D,Li X C,Wagner D A.Dynamic test generation to find integer bugs in x86 binary linux programs[C] //Proc of USENIX Security Symp.Berkeley,CA:USENIX,2009.
8Mosor A,Kruegel C,Kirda E.Exploring multiple execution paths for malware analysis[C] //Proc of the IEEE S&P.Washington:IEEE,2007:231-245.
9Newsome J,Brumley D,et al.Replayer:Automatic protocol replay by binary analysis[C] //Proc of the 13th ACM CCS.New York:ACM,2006:311-321.
10Caballero J,Johnson N,et al.Binary Code Extraction and Interface Identification for Security Applications[C] //Proc of the 17th Annual Network and Distributed System Security Symp.San Die ge,CA:ISOC,2010.