QEMU open source processor emulator, http://bellard.org/qemu.
The Xem hypervisor, the powerful open source industry standard for virtualization, http://www.xen.org.
Windows Server 2008, http://www.microsoft.com/windowsserver2008.
National institute of standards and technology, National vulnerability database statistics, http://nvd.nist.gov/statistics.cfm.
M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security, pages 340-353, Alexandria, Virginia, U.S.A., November 2005. ACM.
P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error exploits with wit. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, Oakland, California, U.S.A., May 2008. IEEE.
S. Alexander. Defeating compiler-level buffer overflow protection.; login: The USENIX Magazine, 30(3), June 2005.
E. G. Barrantes, D. H. Ackley, S. Forrest, T. S. Palmer, D. Stefanović, and D. D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003), pages 281-289, Washington, D.C., U.S.A., October 2003. ACM.
S. Bhatkar, D. C. Duvarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105-120, Washington, D.C., U.S.A., August 2003. USENIX Association.
S. Bhatkar and R. Sekar. Data space randomization. In Proceedings of the 5th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, volume 5137 of Lecture Notes in Computer Science, Paris, France, July 2008. Springer.
T. Chiueh and F. H. Hsu. RAD: A compile-time solution to buffer overflow attacks. In Proceedings of the 21st International Conference on Distributed Computing Systems, pages 409-420, Phoenix, Arizona, USA, April 2001. IEEE Computer Society, IEEE Press.
T. cker Chiueh and F. hau Hsu. Rad: A compile-time solution to buffer overflow attacks.
C. Cowan, S. Beattie, J. Johansen, and P. Wagle. Point-Guard: protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, pages 91-104, Washington, D.C., U.S.A., August 2003. USENIX Association.
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, pages 63-78, San Antonio, Texas, U.S.A., January 1998. USENIX Association.
D. Dhurjati and V. Adve. Backwards-compatible array bounds checking for c with very low overhead. In Proceeding of the 28th international conference on Software engineering, pages 162-171, Shanghai, China, 2006. ACM Press.
D. Dhurjati, S. Kowshik, V. Adve, and C. Lattner. Memory safety without runtime checks or garbage collection. In Proceedings of the 2003 ACM SIGPLAN Conference on Language, Compiler, and Tool Support for Embedded Systems, pages 69-80, San Diego, California, U.S.A., June 2003. ACM.
U. Erlingsson. Low-level software security: Attacks and defenses. Technical Report MSR-TR-2007-153, Microsoft Research, November 2007.
V. Glaume and P. A. Fayolle. A buffer overflow study: Attacks & defenses. Technical report, ENSEIRB, 2002.
R. Grimes. Preventing buffer overflows in C++. Dr Dobb 's Journal: Software Tools for the Professional Programmer, 29(1):49-52, January 2004.
M. Howard and D. LeBlanc. Writing secure code, 2002.
T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference, pages 275-288, Monterey, California, U.S.A., June 2002. USENIX Association.
L. John. Spec cpu2000: Measuring cpu performance in the new millennium.
R. W M. Jones and P. H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automatic Debugging, number 009-02 in Linköping Electronic Articles in Computer and Information Science, pages 13-26, Linköping, Sweden, 1997. Linköping University Electronic Press.
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS2003), pages 272-280, Washington, D.C., U.S.A., October 2003. ACM.
V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In Proceedings of the 11th USENIX Security Symposium, San Francisco, California, U.S.A., August 2002. USENIX Association.
S. Kowshik, D. Dhurjati, and V. Adve. Ensuring code safety without runtime checks for real-time control systems. In Proceedings of the International Conference on Compilers Architecture and Synthesis for Embedded Systems, pages 288-297, Grenoble, France, October 2002.
G. Necula, S. Mcpeak, and W Weimer. CCured: Type-safe retrofitting of legacy code. In Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 128-139, Portland, Oregon, U.S.A., January 2002. ACM.
G. Richarte. Four different tricks to bypass stackshield and stackguard protection. World Wide Web, (1), 2002.
J. S. Robin. Abstract analysis of the intel pentiums ability to support a secure virtual machine monitor.
O. Ruwase and M. S. Lam. A practical dynamic buffer overflow detector. In Proceedings of the 11th Annual Network and Distributed System Security Symposium, San Diego, California, U.S.A., February 2004. Internet Society.
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In Proceedings of the IEEE Symposium on Security and Privacy, pages 144-155, Oakland, California, U.S.A., May 2001. IEEE Computer Society, IEEE Press.
Vendicator. Stackshield, A stack smashing technique protection tool, http://www.angelfire.com/sk/stackshield.
J. Xu, Z. Kalbarczyk, S. Patel, and R. K. Iyer. Architecture support for defending against buffer overflow attacks. 2002.
W. Xu, D. C. Duvarney, and R. Sekar. An Efficient and Backwards-Compatible Transformation to Ensure Memory Safety of C Programs. In Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pages 117-126, Newport Beach, California, U.S.A., October-November 2004. ACM, ACM Press.
Y. Younan. Efficient Countermeasures for Software Vulnerabilities due to Memory Management Errors. PhD thesis, Katholieke Universiteit Leuven, May 2008.
Y. Younan, W. Joosen, and F. Piessens. Code injection in c and C++: A survey of vulnerabilities and counter-measures. Technical report, Departement Computer-wetenschappen, Katholieke Universiteit Leuven, 2004.
Y Younan, W. Joosen, and F. Piessens. Efficient protection against heap-based buffer overflows without resorting to magic. In Proceedings of the International Conference on Information and Communication Security (ICICS 2006), volume 4307. Springer-Verlag, December 2006.
Y. Younan, D. Pozza, F. Piessens, and W. Joosen. Extended protection against stack smashing attacks without performance loss. In Proceedings of the Twenty-Second Annual Computer Security Applications Conference (ACSAC '06), pages 429-438. IEEE Press, December 2006.