A. One, Smashing the stack for fun and profit, Phrack Magazine, vol.49, issue.14, 1996.

K. Chang and K. Shin, Distributed authentication of program integrity verification in wireless sensor networks, ACM TISSEC, vol.11, issue.3, 2008.

N. Cooprider, W. Archer, E. Eide, D. Gay, and J. Regehr, Efficient memory safety for TinyOS, Proceedings of the 5th international conference on Embedded networked sensor systems , SenSys '07, 2007.
DOI : 10.1145/1322263.1322283

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. Cowan, C. Pu, D. Maier, H. Hintony, J. Walpole et al., Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks, USENIX Security Symposium, 1998.

T. Deraadt, Advances in OpenBSD, CanSecWest, 2003.

T. Goodspeed, Exploiting wireless sensor networks over 802.15.4, ToorCon 9, 2007.

T. Goodspeed, Exploiting wireless sensor networks over 802.15.4, Texas Instruments Developper Conference, 2008.

Q. Gu and R. Noorani, Towards self-propagate mal-packets in sensor networks, Proceedings of the first ACM conference on Wireless network security , WiSec '08, 2008.
DOI : 10.1145/1352533.1352563

J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul et al., Least we remember: Cold boot attacks on encryption keys, USENIX Security Symposium, 2008.

J. W. Hui and D. Culler, The dynamic behavior of a data dissemination protocol for network programming at scale, Proceedings of the 2nd international conference on Embedded networked sensor systems , SenSys '04, 2004.
DOI : 10.1145/1031495.1031506

C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning, Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006.
DOI : 10.1109/ACSAC.2006.9

D. H. Kim, R. Gandhi, and P. Narasimhan, Exploring symmetric cryptography for secure network reprogramming. ICDCSW, 2007.

I. Krontiris and T. Dimitriou, Authenticated In-Network Programming for Wireless Sensor Networks, ADHOC-NOW, 2006.
DOI : 10.1007/11814764_32

P. Lanigan, R. Gandhi, and P. Narasimhan, Sluice: Secure Dissemination of Code Updates in Sensor Networks, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06), 2006.
DOI : 10.1109/ICDCS.2006.77

G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, Transmission of ipv6 packets over ieee 802.15.4 networks (rfc 4944), 2007.

J. Riley and X. , An architectural approach to preventing code injection attacks. dsn, 2007.
DOI : 10.1109/tdsc.2010.1

A. Seshadri, A. Perrig, L. Van-doorn, and P. K. Khosla, SWATT: software-based attestation for embedded devices, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004.
DOI : 10.1109/SECPRI.2004.1301329

H. Shacham, The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007.
DOI : 10.1145/1315245.1315313

H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu et al., On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, 2004.
DOI : 10.1145/1030083.1030124

B. L. Titzer, D. K. Lee, and J. Palsberg, Avrora: scalable sensor network simulation with precise timing, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005., 2005.
DOI : 10.1109/IPSN.2005.1440978