1. 2015. Integer overflow (leading to stack-based buffer overflow) in embedded lua_struct.c. https://github.com/redis/redis/issues/2855. Acc. 202 2- 10 - 06 . 2015. Integer overflow (leading to stack-based buffer overflow) in embedded lua_struct.c. https://github.com/redis/redis/issues/2855. Acc. 2022-10-06.
2. 2019. Memory Tagging Extension: Enhancing memory safety through architecture. https://community.arm.com/arm-community-blogs/b/architectures-and-processors-blog/posts/enhancing-memory-safety. Acc. 202 2- 02 - 27 . 2019. Memory Tagging Extension: Enhancing memory safety through architecture. https://community.arm.com/arm-community-blogs/b/architectures-and-processors-blog/posts/enhancing-memory-safety. Acc. 2022-02-27.
3. 2020. A Technical Look at Intel’s Control-flow Enforcement Technology . https://www.intel.com/content/www/us/en/developer/articles/technical/technical-look-control-flow-enforcement-technology.html. Acc. 202 2- 08 - 28 . 2020. A Technical Look at Intel’s Control-flow Enforcement Technology. https://www.intel.com/content/www/us/en/developer/articles/technical/technical-look-control-flow-enforcement-technology.html. Acc. 2022-08-28.
4. 2022. Binary Compatibility . https://gcc.gnu.org/onlinedocs/gcc-12.2.0/gcc/Compatibility.html. Acc. 202 2- 09 - 21 . 2022. Binary Compatibility. https://gcc.gnu.org/onlinedocs/gcc-12.2.0/gcc/Compatibility.html. Acc. 2022-09-21.
5. 2022. Close, but No Cigar: On the Effectiveness of Intel’s CET Against Code Reuse Attacks . https://grsecurity.net/effectiveness_of_intel_cet_against_code_reuse_attacks. Acc. 202 2- 08 - 24 . 2022. Close, but No Cigar: On the Effectiveness of Intel’s CET Against Code Reuse Attacks. https://grsecurity.net/effectiveness_of_intel_cet_against_code_reuse_attacks. Acc. 2022-08-24.