R. P. Abbot, J. S. Chin, J. E. Donnelley, W. L. Konigsford, and D. A. Webb, Security Analysis and Enhancements of Computer Operating Systems, 1976.
DOI : 10.6028/NBS.IR.76-1041

T. Aslam, A Taxonomy of Security Faults in the UNIX Operating System, 1995.

M. Bishop and D. Bailey, A Critical Analysis of Vulnerability Taxonomies, 1996.

N. Borisov, R. Johnson, N. Sastry, and D. Wagner, Fixing Races for Fun and Profit: How to Abuse atime, Proceedings of the 14th conference on USENIX Security Symposium SSYM'05, pp.20-20, 2005.

S. Bratus, M. E. Locasto, M. L. Patterson, L. Sassaman, and A. Shubina, Exploit Programming: From Buffer Overflows to " Weird Machines " and Theory of Computation. USENIX ;login, 2011.

D. Brumley and D. Boneh, Remote timing attacks are practical, Computer Networks, vol.48, issue.5, 2003.
DOI : 10.1016/j.comnet.2005.01.010

S. Chen, R. Wang, X. Wang, and K. Zhang, Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow, 2010 IEEE Symposium on Security and Privacy, 2010.
DOI : 10.1109/SP.2010.20

S. Chen, J. Xu, and E. Sezer, Non-control-hijacking attacks are realistic threats, USENIX Security, 2005.

F. Cohen, Computer viruses, 7th DoD/NBS Computer Security Conference Proceedings, pp.240-263, 1984.
DOI : 10.1016/0167-4048(87)90122-2

J. Crandall and D. Oliveira, Holographic vulnerability studies, Proceedings of the 2012 workshop on New security paradigms, NSPW '12, p.2012
DOI : 10.1145/2413296.2413309

D. Dean and A. J. Hu, Fixing Races for Fun and Profit: How to Use access, Proceedings of the 13th conference on USENIX Security Symposium, pp.14-14, 2004.

R. B. Ii and D. Hollingsworth, Protection Analysis Project Final Report. ISI/RR-78-13, 1978.

S. Jana and V. Shmatikov, Memento: Learning Secrets from Process Footprints, 2012 IEEE Symposium on Security and Privacy, 2012.
DOI : 10.1109/SP.2012.19

S. J. Kyung-suk and . Chapin, Buffer Overflow and Format String Overflow Vulnerabilities. Software -Practice and Experience, pp.423-460, 2002.

C. E. Landwehr, A. R. Bull, J. P. Mcdermott, and W. S. Choi, A taxonomy of computer program security flaws, ACM Computing Surveys, vol.26, issue.3, 1994.
DOI : 10.1145/185403.185412

U. Lindqvist and E. Jonsson, How to systematically classify computer security intrusions, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997.
DOI : 10.1109/SECPRI.1997.601330

W. S. Mcphee, Operating system integrity in OS/VS2, IBM Systems Journal, vol.13, issue.3, pp.230-252, 1974.
DOI : 10.1147/sj.133.0230

W. Pieters and L. Consoli, Vulnerabilities and responsibilities: dealing with monsters in computer security Journal of information, communication and ethics in society, pp.243-257, 2009.

M. Samuel and U. Erlingsson, Let's Parse to Prevent pwnage (invited position paper), Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats, LEET'12, pp.3-3

H. Shacham, The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007.
DOI : 10.1145/1315245.1315313

L. Spadavecchia, A network-based asynchronous architecture for cryptographic devices, 2005.

Z. Su and G. Wassermann, The Essence of Command Injection Attacks in Web Applications, Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL '06, pp.372-382, 2006.

R. Wang, S. Chen, X. Wang, and S. Qadeer, How to Shop for Free Online -- Security Analysis of Cashier-as-a-Service Based Web Stores, 2011 IEEE Symposium on Security and Privacy, pp.465-480, 2011.
DOI : 10.1109/SP.2011.26

G. Wassermann and Z. Su, Static detection of cross-site scripting vulnerabilities, Proceedings of the 13th international conference on Software engineering , ICSE '08, 2008.
DOI : 10.1145/1368088.1368112

I. W. Witten and E. Frank, Data mining, ACM SIGMOD Record, vol.31, issue.1, 2005.
DOI : 10.1145/507338.507355

K. Zhang and X. Wang, Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems, 2009.

L. Zhuang, F. Zhou, and J. D. Tygar, Keyboard acoustic emanations revisited, ACM Conference on Computer and Communications Security (CCS), 2005.