´. U. Erlingsson, Y. Younan, and F. Piessens, Handbook of information and communication security, 2010.

S. Kendall, Bcc: Runtime checking for C programs, Proceedings, The Association, p.5, 1983.

J. Larus, T. Ball, M. Das, R. Deline, M. Fähndrich et al., Righting software, IEEE Software, vol.21, issue.3, pp.92-100, 2004.
DOI : 10.1109/MS.2004.1293079

G. Necula, J. Condit, M. Harren, S. Mcpeak, and W. Weimer, CCured: type-safe retrofitting of legacy software, ACM Transactions on Programming Languages and Systems, vol.27, issue.3, p.526, 2005.
DOI : 10.1145/1065887.1065892

C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole et al., Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks, SSYM'98: Proceedings of the 7th conference on USENIX Security Symposium, 1998.

H. Etoh and K. Yoda, Protecting from stack-smashing attacks, 2000.

P. Team, Documentation for the PaX project. Homepage of The PaX Team, 2003.

S. Bhatkar, D. C. Duvarney, and R. Sekar, Address obfuscation: An efficient approach to combat a broad range of memory error exploits, Proceedings of the 12th USENIX Security Symposium, pp.105-120, 2003.

R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund et al., Breaking the memory secrecy assumption, Proceedings of the Second European Workshop on System Security, EUROSEC '09, pp.1-8, 2009.
DOI : 10.1145/1519144.1519145

Y. Younan, P. Philippaerts, F. Piessens, W. Joosen, S. Lachmund et al., Filter-resistant code injection on ARM, Proceedings of the 16th ACM conference on Computer and communications security, pp.11-20, 2009.

Y. Younan, D. Pozza, F. Piessens, and W. Joosen, Extended Protection against Stack Smashing Attacks without Performance Loss, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.27

Y. Younan, W. Joosen, and F. Piessens, Code injection in c and c++ : A survey of vulnerabilities and countermeasures, 2004.

O. Ergin, D. Balkan, K. Ghose, and D. Ponomarev, Register Packing: Exploiting Narrow-Width Operands for Reducing Register File Pressure, 37th International Symposium on Microarchitecture (MICRO-37'04), 2004.
DOI : 10.1109/MICRO.2004.29

M. Guthaus, J. Ringenberg, D. Ernst, T. Austin, T. Mudge et al., MiBench: A free, commercially representative embedded benchmark suite, Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538), pp.184-193, 2001.
DOI : 10.1109/WWC.2001.990739

R. Strackx, Protecting mobile devices against stack-based buffer overflows, 2009.

Y. Younan, Efficient countermeasures for software vulnerabilities due to memory management errors, 2008.

U. Shankar, K. Talwar, J. Foster, and D. Wagner, Detecting format string vulnerabilities with type qaualifiers, Proceedings of the 10th conference on USENIX Security Symposium, p.16, 2001.

A. Francillon, D. Perito, and C. Castelluccia, Defending Embedded Systems Against Control Flow Attacks 23, Non-executable stack patch, 1998.
DOI : 10.1145/1655077.1655083

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3803