- Xiaojun Xu, et al. "Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection."
*ACM CCS*2017. - Sebastian Banescu, et al. "Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning.."
*USENIX Security Symposium*2017. - Shuai Wang, et al. "Semantics-Aware Machine Learning for Function Recognition in Binary Code."
*ICSME*2017. - Daniele Canavese, et al. "Estimating Software Obfuscation Potency with Artificial Neural Networks."
*Security and Trust Management*2017.

- "An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries."
*USENIX Security Symposium*2016. - "Compiler-Agnostic Function Detection in Binaries."
*IEEE European Symposium on Security and Privacy*2017. - "Enhancing Control Flow Graph Based Binary Function Identification."
*ROOTS: Reversing and Offensive-oriented Trends Symposium*2017.

- "Similarity of Binaries through re-Optimization."
*PLDI*2017. - "Statistical Similarity of Binaries."
*PLDI*2016. - "Program obfuscation-a quantitative."
*ACM*2007. - "Analysis of complexity metrics of a software code for obfuscating transformations of an executable code."
*TIAA IOP*2016. - "The New Technique of Decompilation and Its Application in Information Security."
*UKSim-AMSS*2012. - "Improving_Fuzzing_Using_Software_Complex."
*ICISC*2015. - "The Technique of Dynamic Binary Analysis and Its Application in the Information Security Sphere."
*EuroCon IEEE*2013. - "Program obfuscation-a quantitative."
*ACM*2007.

- Pearson’s correlation coefficient
- Comparison of Values of Pearson’s and Spearman’s Correlation Coefficients on the Same Sets of Data
- A Concordance Correlation Coefficient to Evaluate Reproducibility

- Z3 API.
- rise4fun Online Z3.
- Tutorial on SMT Solvers, Combinatorial Problem Solving.
- Detection of Incorrect Pointer Dereferences for C/C++ Programs using Static Code Analysis and Logical Inference.
- SMT solvers for Testing, Program Analysis and Verification at Microsoft.
- An efficient SMT solver for string constraints.
- On Composing and Proving the Correctness of Reactive Behavior.

- Cozzi, Emanuele, et al. Understanding Linux Malware.
*IEEE Symposium on Security & Privacy.*2018.