Analyzing memory accesses in x86 executables, Compiler Construction, pp.2732-2733, 2004. ,
DOI : 10.21236/ada449077
Verified Software: Theories, Tools, Experiments, chapter WYSINWYX: What You See Is Not What You eXecute, pp.202-213, 2008. ,
DOI : 10.1007/978-3-540-69149-5_22
Refinement-Based CFG Reconstruction from Unstructured Programs, pp.54-69, 2011. ,
DOI : 10.1007/978-3-642-14295-6_27
Multi-architecture value analysis for machine code In 13th International Workshop on Worst-Case Execution Time Analysis, pp.42-52, 2013. ,
Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252, 1977. ,
DOI : 10.1145/512950.512973
URL : https://hal.archives-ouvertes.fr/hal-00930103
Analysing switch-case code with abstract execution In 15th International Workshop on Worst-Case Execution Time Analysis, pp.85-94, 2015. ,
Advanced Compiler Design & Implementation, 1997. ,
Faster WCET Flow Analysis by Program Slicing, Proceedings of the 2006 ACM SIGPLAN/SIGBED, pp.103-112, 2006. ,
DOI : 10.1145/1134650.1134666
Executable Analysis with Circular Linear Progressions, 2007. ,
DOI : 10.1109/memcod.2007.371251
Operating system concepts, 1998. ,
Extracting safe and precise control flow from binaries, Proceedings Seventh International Conference on Real-Time Computing Systems and Applications, 2000. ,
DOI : 10.1109/RTCSA.2000.896367
URL : http://rw4.cs.uni-sb.de/~theiling/publ/paper.seoul.ps.gz
Program Slicing, Proceedings of the 5th International Conference on Software Engineering, pp.439-449, 1981. ,
DOI : 10.1109/TSE.1984.5010248
A Control Flow Graph Reconstruction Method from Binaries Based on XML, 2009 International Forum on Computer Science-Technology and Applications, pp.226-229, 2009. ,
DOI : 10.1109/IFCSTA.2009.176