4Hind M. Pointer analysis: Haven't we solved this problem yet ?//Proceedings of the 2001 ACMSIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engi- neering(PASTE'01). Snowbird, USA, 2001:54-61.
5Cova M, Fe|metsger V, Banks G, Vigna G. Static detection of vulnerabilities in x86 exeeutables//Proceedings of the An- nual Computer Security Applications Conference (ACSAC). Miami, USA, 20061 269-278.
6Costa M, Crowcroft J, Castro M, Rowstron A, Zhou L, Zhang L, Barharn P. Vigilante: End-to-end containment of Internet worms//Proceedings of the 20th ACM Symposium on Operating Systems Principles, New York, USA, 2005: 133-147.
7Sezer E C, Ning P, Kil C, Xu J. MemSherlock: An automa- ted debugger for unknown memory corruption vulnerabili- ties//Proeeedings of the 14th ACM Conference on Computer and Communications Security. Alexandria, USA, 2007: 562-572.
8Wagner D, Foster J S, Brewer E A, Aiken A. A first step towards automated detection of buffer overrun vulnerabili- ties//Proceedings of the Network and Distributed System Se- curity Symposium. San Diego, USA, 2000:3-17.
9Xie Y, Chou A, Engler D. ARCHER: Using symbolic, path-sensitive analysis to detect memory access errors. ACM SIGSOFT Software Engineering Notes, 2003, 28 (5) : 327- 336.
10Evans D, Larochelle D. Improving security using extensible lightweight static analysis. IEEE Soi'tware, 2002, 19 (1) : 42-51.