1. Control-flow integrity principles, implementations, and applications
2. Frederico Araujo Kevin W Hamlen Sebastian Biedermann and Stefan Katzenbeisser. 2014. From patches to honey-patches: Lightweight attacker misdirection deception and disinformation. In ACM CCS’14. 942–953.
3. Callum Baillie, Maxwell Standen, Jonathon Schwartz, Michael Docking, David Bowman, and Junae Kim. 2020. Cyborg: An autonomous cyber operations research gym. arXiv preprint arXiv:2002.10667 (2020).
4. Nathan Binkert, Bradford Beckmann, Gabriel Black, Steven K. Reinhardt, Ali Saidi, Arkaprava Basu, Joel Hestness, Derek R. Hower, Tushar Krishna, Somayeh Sardashti, Rathijit Sen, Korey Sewell, Muhammad Shoaib, Nilay Vaish, Mark D. Hill, and David A. Wood. 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39, 2 (2011), 1–7.
5. SPEC CPU2017