S. Chen, J. Xu, N. Nakka, Z. Kalbarczyk, and R. K. Iyer, Defeating Memory Corruption Attacks via Pointer Taintedness Detection, Proceedings of the International Conference on Dependable Systems and Networks (DSN), pp.378-387, 2005.

C. Cowan, M. Barringer, S. Beattie, G. Kroah-hartman, M. Frantzen et al., FormatGuard: Automatic Protection from printf Format String Vulnerabilities, Proceedings of the Tenth Usenix Security Symposium, 2001.

R. Douence, T. Fritz, N. Loriant, J. Menaud, M. Ségura-devillechaise et al., An expressive aspect language for system applications with Arachne, Proceedings of the Fourth International Conference on Aspect-Oriented Software Development (AOSD), pp.27-38, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00442180

R. W. Jones and P. H. Kelly, Backward-compatible bounds checking for arrays and pointers in C programs, Proceedings of the 3rd International Workshop on Automated and Algorithmic Debugging (AADEBUG), pp.13-26, 1997.

N. Loriant, M. Ségura-devillechaise, and J. Menaud, Software Security Patches ? Audit, Deployment and Hot Update, Proceedings of the Fourth AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), pp.25-29, 2005.
URL : https://hal.archives-ouvertes.fr/inria-00441354

. Nergal, The advanced return-into-lib(c) exploits: PaX case study, Phrack, vol.11, issue.58, 2001.

P. Project, Address space layout randomization, 2003.

D. Pescovitz, Monster in a box, Wired, vol.8, issue.12, 2000.

M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu et al., Enchancing Server Availability and Security through Failure-Oblivious Computing, Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI), pp.303-316, 2004.

C. Shannon and D. Moore, The spread of the Witty worm, IEEE Security & Privacy, vol.2, issue.4, pp.46-50, 2004.
DOI : 10.1109/MSP.2004.59

S. Designer, Getting around non-executable stack (and fix) Bugtraq Mailing List, 1997.