P. Streak, The Morris Worm: A Fifteen-Year Perspective, 2003.

. , Smashing the Stack for Fun and Profit, Phrack, vol.7, issue.49

C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke et al., StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, 1998.

, Using the GNU Compiler Collection, 2018.

, The Clang Team, Clang's Documentation, 2018.

C. Microsoft-developer-network and . Program, , 2018.

C. Cowan, F. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade, DARPA Information Survivability Conference and Exposition (DISCEX), 2000.

V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar et al., Symposium on Operating System Design and Implementation, 2014.

M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Conference on Computer and Communications Security (CCS), 2005.

S. Chen, J. Xu, and E. C. Sezer, Non-Control-Data Attacks Are Realistic Threats, USENIX Security Symposium, 2005.

L. Szekeres, M. Payer, T. Wei, and R. Sekar, Eternal War in Memory, IEEE Security & Privacy, vol.12, issue.3, pp.45-53, 2014.

C. Cowan, S. Beattie, R. F. Day, C. Pu, P. Wagle et al., Protecting Systems From Stack Smashing Attacks With StackGuard, in: In Linux Expo, 1999.

P. Wagle and C. Cowan, Stackguard: Simple Stack Smash Protection for Gcc, GCC Developers Summit, 2003.

H. Marco-gisbert and I. Ripoll, Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers, Network Computing and Applications, 2013.

C. Cowan, S. Beattie, J. Johansen, and P. Wagle, Pointguard: Protecting Pointers From Buffer Overflow Vulnerabilities, USENIX Security Symposium, 2003.

U. Drepper, , 2018.

R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund et al., Breaking the Memory Secrecy Assumption, 2009.

Y. Ding, Z. Peng, Y. Zhou, and C. Zhang, IEEE International Conference on Communications (ICC), 2014.

W. H. Hawkins, J. D. Hiser, and J. W. Davidson, Dynamic Canary Randomization for Improved Software Security, Annual Cyber and Information Security Research Conference, 2016.

H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu et al., On the effectiveness of address-space randomization, 2004.

A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh, Hacking blind, IEEE Symposium on Security and Privacy, 2014.

O. Gadget, , 2018.

M. Frantzen and M. Shuey, StackGhost: Hardware Facilitated Stack Protection, 2001.