1. M. Abadi, M. Budiu, Ú . Erlingsson, and J. Ligatti. Control-flow integrity. In ACM Comp. & Comm.
Security (CCS), pages 340–353, 2005. Journal version: ACM TISSEC, 2009.
2. P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with WIT.
In IEEE Symp. Security and Privacy, pages 263–277, 2008.
3. Aleph One (Elias Levy). Smashing the stack for fun and profit. In Phrack Magazine. 8 Nov 1996, vol. 7
no. 49, file 14 of 16, http://www.phrack.org.
4. C. Anley, J. Heasman, F. Lindner, and G. Richarte. The Shellcoder’s Handbook: Discovering and
Exploiting Security Holes (2nd edition). Wiley, 2007.
5. anonymous. Once upon a free()... In Phrack Magazine. 11 Aug 2001, vol. 11 no. 57, file 9 of 18,
http://www.phrack.org (for summaries see: Dowd [25, p. 184–186], Aycock [7, p. 119–123]).