1C.Miller, J.Caballero, N.M.Johnson, M.G.Kang, S.McCamanl, P.Poosankam and D.Song. Crash AflIllYSJ:i with HI/Blaze. BlackHat, 2010.
2S.HeeJan and D.Kroening. Automatic Cenerotion of Control Flow Hi'lJcl(/ilg Explo.its for Software Vu/nera.hJlilies. MSc Computer Science Dissertation, University of Oxford, 2009.
3D.Brumley, P.Poosankam, D.song and J.Zheng. A utometrc Patch-Based Exploi/ Genera/ion is Possible: Techniques and Implications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2008.
4T.Avgerinos, S.K.Cha, RL.T.Tao and D.Brumley.AEC: Automstic Explo.it Geoereuon, In Proceedings of the Network and Distributed System Security Symposium (NDSS), 20 II.
5S.K.Cha, T.Avgerinos, A.Rebert and D.BrumJey. Ullleashing ,If A YHJ:,'A{ 011 Hinary Code. In Proceedings of the IEEE: Symposium on Security and Privacy (S&P). 2012.
6M.H.Wang, P.R.Su, Q.Li, L.Y.Ying, Y.Yang and D.G.Peng. Automatic Polymorphic Exploit Generation for Software Vulnerabilities. In Proceedings of International Conference on Security and Privacy in Communication Networks (SecureComm),2013.
7Ecl.Schwarte. T.Avgerinos and D.Brumley. Q: ExplOIt hardening made easy. In Proceedings of the USENIX Security Symposium, 2011.
8H.Hu, Z.L.Chua, S.Adrian, P.Saxena and Z.K.Liang. Aut omet ic Gencrsrion of Data-Oriented Exploits. l n Proceedings of the USENIX Security Symposium, 2015.