1. B. Alpern, C. R. Attanasio, J. J. Barton, M. G. Burke, P. Cheng, J. . Choi, A. Cocchi, S. J. Fink, D. Grove, M. Hind, S. F. Hummel, D. Lieber, V. Litvinov, M. F. Mergen, T. Ngo, J. R. Russell, V. Sarkar, M. J. Serrano, J. C. Shepherd, S. E. Smith, V. C. Sreedhar, H. Srinivasan, and J. Whaley. 2000. The JalapeÃśo virtual machine. IBM Systems Journal 39, 1 (2000), 211–238.
2. Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, and Michael Tunstall. 2011. Can Code Polymorphism Limit Information Leakage?. In Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, Claudio A. Ardagna and Jianying Zhou (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1–21.
3. Bertrand Anckaert, Matias Madou, and Koen De Bosschere. 2007. A Model for Self-Modifying Code. In Information Hiding, Jan L. Camenisch, Christian S. Collberg, Neil F. Johnson, and Phil Sallee (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 232–248.
4. Bertrand Anckaert, Matias Madou, and Koen De Bosschere. 2007. A Model for Self-modifying Code. In Proceedings of the 8th International Conference on Information Hiding (IH’06). Springer-Verlag, Berlin, Heidelberg, 232–248. http://dl.acm.org/citation.cfm?id=1759048.1759066
5. ARM. 2019. Arm Architecture Reference Manual Armv8. https: //static.docs.arm.com/ddi0487/ea/DDI0487E_a_armv8_arm.pdf? _ga=2.153168888.1503102752.1563189579-1528906649.1556140495