F. Cohen, Operating system protection through program evolution, Computers & Security, vol.12, issue.6, pp.565-584, 1993.
DOI : 10.1016/0167-4048(93)90054-9

S. Forrest, A. Somayaji, and D. Ackley, Building diverse computer systems, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133), pp.67-72, 1997.
DOI : 10.1109/HOTOS.1997.595185

C. Giuffrida, A. Kuijsten, and A. S. Tanenbaum, Enhanced operating system security through efficient and fine-grained address space randomization, Proceedings of the 21st USENIX Security Symposium, pp.475-490, 2012.

S. Andersen and V. Abella, Data Execution Prevention: Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, 2004.

D. Blazakis, Interpreter Exploitation: Pointer Inference and JIT Spraying

T. Jackson, B. Salamat, A. Homescu, K. Manivannan, G. Wagner et al., Compiler-Generated Software Diversity, Moving Target Defense of Advances in Information Security, pp.77-98, 2011.
DOI : 10.1007/978-1-4614-0977-9_4

A. Homescu, S. Neisius, P. Larsen, S. Brunthaler, and M. Franz, Profileguided automated software diversity, Proceedings of the 2013 International Symposium on Code Generation and Optimization, CGO '13, 2013.
DOI : 10.1109/cgo.2013.6494997

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

A. Homescu, S. Brunthaler, P. Larsen, and M. Franz, Librando, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, p.13
DOI : 10.1145/2508859.2516675

J. Hiser, A. Nguyen-tuong, M. Co, M. Hall, and J. W. Davidson, ILR: Where'd my gadgets go? Smashing the gadgets: Hindering return-oriented programming using in-place code randomization, Proceedings of the 33rd IEEE Symposium on Security and Privacy Proceedings of the 33rd IEEE Symposium on Security and Privacy, pp.571-58512, 2012.

R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin, Binary stirring, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.157-168, 2012.
DOI : 10.1145/2382196.2382216

C. Song, C. Zhang, T. Wang, W. Lee, and D. Melski, Exploiting and Protecting Dynamic Code Generation, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23233

P. Chen, Y. Fang, B. Mao, and L. Xie, JITDefender: A Defense against JIT Spraying Attacks, Proceedings of the 26th IFIP TC 11 International Information Security Conference, pp.142-153, 2011.
DOI : 10.1007/978-3-642-21424-0_12

M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005.
DOI : 10.1145/1102120.1102165

M. Athanasakis, E. Athanasopoulos, M. Polychronakis, G. Portokalidis, and S. Ioannidis, The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines in Network and Data Security Symposium, p.15

H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu et al., On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.298-307, 2004.
DOI : 10.1145/1030083.1030124

T. Wei, T. Wang, L. Duan, and J. Luo, INSeRT: Protect dynamic code generation against spraying, Proceedings of the 2011 International Conference on Information Science and Technology, pp.323-328, 2011.

D. Bruening, T. Garnett, and S. Amarasinghe, An infrastructure for adaptive dynamic optimization, International Symposium on Code Generation and Optimization, 2003. CGO 2003., p.3, 2003.
DOI : 10.1109/CGO.2003.1191551

N. Nethercote and J. Seward, Valgrind: A program supervision framework, Electronic Notes in Theoretical Computer Science, 2003.

K. Scott, N. Kumar, S. Velusamy, B. R. Childers, J. W. Davidson et al., Retargetable and reconfigurable software dynamic translation, International Symposium on Code Generation and Optimization, 2003. CGO 2003., p.3, 2003.
DOI : 10.1109/CGO.2003.1191531

C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser et al., Pin: building customized program analysis tools with dynamic instrumentation, Proceedings of the ACM PLDI '05, pp.190-200, 2005.

A. Jangda, M. Mishra, B. , and D. Sutter, Adaptive Just-In-Time Code Diversification [30] https://developers.google.com/v8/?hl=en [31] URL https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey [32] URL https Aleph One. Smashing the Stack for Fun and Profit, Proceedings of MTD, ACM CCS'15 F. Gadaleta , Y. Younan , W. Joosen. BuBBle: A Javascript Engine Level Countermeasure against Heap-spraying Attacks. Proc. 2nd Int'l Symp. Eng. Secure Software and Systems, 2007.