1. Acharya, A., Raje, M.: Mapbox: Using parameterized behavior classes to confine applications. In: Proceedings of the 9th USENIX Security Symposium, pp. 1–17 (2000)
2. Aleph One: Smashing the stack for fun and profit. Phrack 7 (1996)
3. Alexandrov, A., Kmiec, P., Schauser, K.: Consh: A confined execution environment for Internet computations (1998)
4. Arce, I.: The Shellcode generation. IEEE Secur. Priv. 2, 72–76 (2004)
5. Bailey, M., Cooke, E., Jahanian, F., Nazario, J., Watson, D.: The Internet motion sensor: a distributed blackhole monitoring system. In: Proceedings of the ISOC Symposium on Network and Distributed Systems Security (SNDSS), pp. 167–179 (2005)