D. Evans, J. Guattag, J. Horning, and Y. T. Lclint,“A tool for using specifications to check code,” Proc.2nd ACM SIGSOFT Int. Symp. on Foundations of Software Engineering (SIGSOFT 1994/FSE2), pp. 87-96, ACM, 1994.
D. Wagner, J. Foster, E. Brewer, and A. Aiken,“A first step towards automated detection of buffer over-run vulnerabilities,” Proc.7th Annual Network and Distributed System Security Symp.(NDSS 2000). ISOC, 2000.
D. Larochelle and D. Evans,“Statically detecting likely buffer overflow vulnerabilities,” Proc.10th Conf. on USENIX Security Symp.(USENIX Security ’01), pp. 177-190, USENIX Association, 2001.