1. Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C.J., Levchenko, K., Mavrommatis, P., McCoy, D., Nappa, A., Pitsillidis, A.: Manufacturing compromise: the emergence of exploit-as-a-service. In: CCS 2012, Raleigh, North Carolina, USA (2012)
2. Fossi, M., Egan, G., Johnson, E., Mack, T., Adams, T., Blackbird, J., Graveland, B., McKinney, D.: Symantec report on attack kits and malicious websites. Technical report (2011)
3. Cannell, J.: Tools of the Trade: Exploit Kits, February 2013.
http://blog.malwarebytes.org/intelligence/2013/02/tools-of-the-trade-exploit-kits/
4. contagio: An Overview of Exploit Packs (Update 19.1), April 2013.
http://contagiodump.blogspot.com
5. Jones, J.: The State of Web Exploit Kits. Black Hat USA, Las Vegas, Nevada, USA (2012)