1. A. Francillon and C. Castellucia , " Code injection attacks on harvard-architecture devices," in CCS '08 , 2008 . A. Francillon and C. Castellucia, "Code injection attacks on harvard-architecture devices," in CCS '08, 2008.
2. L. Szekeres , M. Payer , T. Wei , and D. Song , " Sok: Eternal war in memory," in 2013 IEEE Symposium on Security and Privacy , pp. 48 -- 62 , IEEE , 2013 . L. Szekeres, M. Payer, T. Wei, and D. Song, "Sok: Eternal war in memory," in 2013 IEEE Symposium on Security and Privacy, pp. 48--62, IEEE, 2013.
3. C. Cowan , F. Wagle , C. Pu , S. Beattie , and J. Walpole , " Buffer overflows: Attacks and defenses for the vulnerability of the decade," in IEEE DISCEX , IEEE , 2000 . C. Cowan, F. Wagle, C. Pu, S. Beattie, and J. Walpole, "Buffer overflows: Attacks and defenses for the vulnerability of the decade," in IEEE DISCEX, IEEE, 2000.
4. OWASP "Owasp top ten." https://owasp.org/www-project-top-ten/ 2021. OWASP "Owasp top ten." https://owasp.org/www-project-top-ten/ 2021.
5. K. Eldefrawy , G. Tsudik , A. Francillon , and D. Perito , " SMART: Secure and minimal architecture for (establishing dynamic) root of trust," in NDSS , 2012 . K. Eldefrawy, G. Tsudik, A. Francillon, and D. Perito, "SMART: Secure and minimal architecture for (establishing dynamic) root of trust," in NDSS, 2012.