Further reading
You can refer to the following links for more information on the topics covered in this chapter:
- Mindshare: Automated bug hunting by modeling vulnerable code: https://www.thezdi.com/blog/2019/7/16/mindshare-automated-bug-hunting-by-modeling-vulnerable-code
- River Loop Security: Working with Ghidra's PCode to identify vulnerable function calls: https://www.riverloopsecurity.com/blog/2019/05/pcode/
- Three Heads Are Better Than One: Mastering NSA's Ghidra Reverse Engineering Tool: https://github.com/0xAlexei/INFILTRATE2019/blob/master/INFILTRATE%20Ghidra%20Slides.pdf