1B.P. Miller, L. Fredrikson, B. So, An empirical study of the reliability of UNIX utilities, Comm. of the ACM 33 (1990) 32.
2P. Godefroid, M. Levin, D. Molnar, Automated whitebox fuzz testing, In NDSS, 2008.
3P. Godefroid, P. Halleux, A.V. Nori, S.K. Rajamani, W. Schulte, N. Tillmann, Automating software testing using program analysis, IEEE Software (2008) 30-37.
4D. Aitel, The Advantages of Block-Based Protocol Analysis for Security Testing, Immunity Inc., 2002.
5T. Boutell, et al., PNG (Portable Network Graphics) Specification, Version 1.0, IETF Request for Comments 2083.
6C. Luk. R. Cohn. R. Muth. et al.. Pin: Building customized program analysis tools with d) namic insY:rumentation, in: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI2005). 2007. DP. 190-200.
7P.J. Schroeder. B. Korel, Black-box test reduction using l/O analysis, in: Proceedings of the International Symposium on Software and Analysis (ISSTA '00), Portland, Oregon, August 2000.
8C.C. Michael, G. McGraw. M.A. Schatz. Generating software test data by evolution. IEEE Transactions on Software Engineering 27 (2001) 1085-2001.
9P.M. Minn, Search-based software test data generation: a survey, Softw. Test. Verif. Reliab. 14 (2004) 105-156.
10C.D. Grosso. G. Antoniol. M.D. Penta, P. Galinier, E.Merlo. lmproxing nctxork applications security: A new heuristic to gencrale stress lcsting data. In GECCO'05, 2005.