1. Control-flow integrity principles, implementations, and applications
2. National Security Agency. 2017. Ghidra Reverse Engineering Tool. (2017). https://www.nsa.gov/resources/everyone/ghidra/ National Security Agency. 2017. Ghidra Reverse Engineering Tool. (2017). https://www.nsa.gov/resources/everyone/ghidra/
3. The Mayhem Cyber Reasoning System
4. Tiffany Bao and David Brumley. 2014. ByteWeight: Recognizing Functions in Binary Code. (2014). http://security.ece.cmu.edu/byteweight/ Tiffany Bao and David Brumley. 2014. ByteWeight: Recognizing Functions in Binary Code. (2014). http://security.ece.cmu.edu/byteweight/