1. [n. d.]. Intel® 64 and IA-32 Architectures Software Developer Manuals. https://software.intel.com/content/www/us/en/develop/articles/intel-sdm.html [n. d.]. Intel® 64 and IA-32 Architectures Software Developer Manuals. https://software.intel.com/content/www/us/en/develop/articles/intel-sdm.html
2. [n. d.]. Runtime traces of buffer overflow exploitation | IEEE DataPort. https://ieee-dataport.org/documents/runtime-traces-buffer-overflow-exploitation [n. d.]. Runtime traces of buffer overflow exploitation | IEEE DataPort. https://ieee-dataport.org/documents/runtime-traces-buffer-overflow-exploitation
3. [n. d.]. What are Vulnerabilities Exploits and Threats? | Rapid7. https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/ [n. d.]. What are Vulnerabilities Exploits and Threats? | Rapid7. https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/
4. Why We Need a Theory of Maliciousness: Hardware Performance Counters in Security
5. HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection