1. G.S. Kc, A.D. Keromytis, V. Prevelakis, Countering code-injection attacks with instruction-set randomization, in: Proceedings Of The 10th ACM Conference On Computer And Communications Security, 2003, 272–280.
2. A.N. Sovarel, D. Evans, N. Paul, Where’s the FEEB? The Effectiveness of Instruction Set Randomization, in: USENIX Security Symposium, vol. 10, 2005.
3. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization;Snow,2013
4. Data space randomization;Bhatkar,2008
5. Survey of cyber moving target techniques;Okhravi,2013