1. CRET Computer emergency response team http://www.cret.org/
2. SecurityFocus http://www.securityfocus.com/
3. Baecher P Koetter M Getting around non-executable stack (and fix) http://libemu.carnivore.it/
4. Krügel C Lippmann R Clark A Emulation-based detection of non-self-contained polymorphic shellcode 10th International Symposium on Recent Advances in Intrusion Detection 2007
5. Bania P Evading network-level emulation http://packetstormsecurity.org/papers/bypass/