, PyKnow : Expert systems for Python, pp.2019-2020

M. Abadi, M. Budiu, Ú. Erlingsson, and J. Ligatti, Controlflow integrity, ACM Conference on Computer and Communications Security, 2005.

A. Ap, B. Kévin-le-bon, E. Hawkins, and . Rohou, Fittchooser : A dynamic feedback-based fittest optimization chooser, 16th International Conference on High Performance Computing & Simulation (HPCS 2018)-Special Session on Compiler Architecture, Design and Optimization, p.8, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01808658

N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross, Control-Flow Bending : On the Effectiveness of Control-Flow Integrity, USENIX Security Symposium, pp.161-176, 2015.

C. Cowan, C. Pu, D. Maier, J. Walpole, and P. Bakke, Stackguard : Automatic adaptive detection and prevention of buffer-overflow attacks, 1998.

K. M. Hazelwood, Dynamic Binary Modification : Tools, Techniques, and Applications. Synthesis Lectures on Computer Architecture, 2011.

J. Santosh-nagarakatte, . Zhao, M. K. Milo, S. Martin, and . Zdancewic, SoftBound : Highly compatible and complete spatial memory safety for C, ACM Sigplan Notices, vol.44, issue.6, pp.245-258, 2009.

J. Santosh-nagarakatte, . Zhao, M. K. Milo, S. Martin, and . Zdancewic, CETS : compiler enforced temporal safety for C, ACM Sigplan Notices, vol.45, pp.31-40, 2010.

C. George, S. Necula, W. Mcpeak, and . Weimer, CCured : Typesafe retrofitting of legacy code, In ACM SIGPLAN Notices, vol.37, pp.128-139, 2002.

N. Nethercote and J. Seward, Valgrind : a framework for heavyweight dynamic binary instrumentation, ACM Sigplan notices, vol.42, pp.89-100, 2007.

E. Riou, E. Rohou, and P. Clauss, PADRONE : a Platform for Online Profiling, Analysis, and Optimization, DCE 2014 -International workshop on Dynamic Compilation Everywhere, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00917950

K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov, Addresssanitizer : A fast address sanity checker, USENIX Annual Technical Conference, pp.309-318, 2012.

Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino et al., State of) The Art of War : Offensive Techniques in Binary Analysis, 2016.

L. Szekeres, M. Payer, T. Wei, and D. Song, Sok : Eternal war in memory, Security and Privacy (SP), 2013 IEEE Symposium on, pp.48-62, 2013.

. Stack-shield and . Vendicator, A stack smashing technique protection tool for Linux, 2000.