[CC'04] Analyzing Memory Accesses in x86 Executables
[ICISS'08] BitBlaze: A New Approach to Computer Security via Binary Analysis
[Oakland'16] (State of) The Art of War: Offensive Techniques in Binary Analysis
[Sec'20] Datalog Disassembly
[Sec'20] DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware
[Oakland'21] When Function Signature Recovery Meets Compiler Optimization