M. Abadi, M. Budiu, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005.
DOI : 10.1145/1102120.1102165

P. Bania, JIT spraying and mitigations, 2010.

E. Bhatkar, D. C. Duvarney, and R. Sekar, Address obfuscation: an efficient approach to combat a broad range of memory error exploits, Proceedings of the 12th USENIX Security Symposium, pp.105-120, 2003.

D. Blazakis, Interpreter exploitation, Proceedings of tth USENIX Workshop on Offensive Technologies (WOOT'10, pp.1-9, 2010.

C. Kolbitsch, T. Holz, C. Kruegel, and E. Kirda, Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries, 2010 IEEE Symposium on Security and Privacy, pp.29-44, 2010.
DOI : 10.1109/SP.2010.10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Caballero, N. M. Johnson, S. Mccamant, and D. Song, Binary code extraction and interface identification for security applications, Proceedings of the 17th Annual Network and Distributed System Security Symposium, 2010.
DOI : 10.21236/ADA538737

M. Castro, M. Costa, and T. Harris, Securing software by enforcing data-flow integrity, Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, pp.11-11, 2006.

M. Egele, P. Wurzinger, C. Kruegel, and E. Kirda, Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks, Proceedings of Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), pp.88-106, 2009.
DOI : 10.1145/1315245.1315261

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

U. Erlingsson, S. Valley, M. Abadi, M. Vrable, M. Budiu et al., XFI: Software guards for system address spaces, Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, pp.6-6, 2006.

G. Francesco, Y. Yves, and J. Wouter, Bubble: A javascript engine level countermeasure against heap-spraying attacks, Proceedings of the 2010 ESSoS, 2010.

W. De-groef, N. Nikiforakis, Y. Younan, and F. Piessens, Jitsec: Just-in-time security for code injection attacks, Benelux Workshop on Information and System Security, pp.1-15, 2010.

M. Payer, I control your code attack vectors through the eyes of software-based fault isolation, pp.27-30, 2010.

P. Ratanaworabhan, B. Livshits, and B. Zorn, Nozzle: A defense against heap-spraying code injection attacks, Proceedings of 18th USENIX Security Symposium, 2009.

H. Shacham, The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007.
DOI : 10.1145/1315245.1315313

A. Sintsov and A. Sintsov, Oracle document capture (easymail objects emsmtp.dll 6.0.1) activex control bof - JIT-spray exploit. http://dsecrg.com/files/exploits/QuikSoft-reverse.zip 24. Sintsov, A.: SAP GUI 7.10 webviewer3d Activex -JIT-spray exploit, JIT spraying attack on safariLogon7-System.zip 25. Sintsov, A.: JIT-spray attacks & advanced shellcode, 2010.

A. Sintsov, Writing JIT-spray shellcode for fun and profit, In: Technical Report of Digital Security, 2010.

W. Tao, W. Tielei, D. Lei, and L. Jing, Secure dynamic code generation against spraying, CCS '10 poster, pp.738-740, 2010.

T. Wang, Integer overflow on QEMU