1. Tuck Nathan, Calder Brad, and Varghese George. 2004. Hardware and binary modification support for code pointer protection from buffer overflow. Proceedings of the Annual International Symposium on Microarchitecture, MICRO, Portland, OR, United states: Institute of Electrical and Electronics Engineers Computer Society, 209--220.
2. Younan Yves, Joosen Wouter, and Piessens Frank. 2004. Code injection in C and C++: A survey of vulnerabilities and countermeasures. Leuven: Departement Computerwetenschappen, Katholieke Universiteit Leuven.
3. Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici and Ingrid Verbauwhede. 2013. SPONGENT: The design space of lightweight cryptographic hashing. IEEE Transactions on Computers, 62(10), 2041--2053.
4. Bogdanov, A, Leander, G, and Paar, C, Poschmann, A, Robshaw, M, and Seurin, Y. 2008. Hash functions and RFID tags: mind the gap. Proc. 10th Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES'08), 283--299.
5. Xu Guo, and Patrick Schaumont. 2011. The technology dependence of lightweight hash implementation cost. Proc. ECRYPT Workshop Lightweight Cryptography.