-
https://www.cs.dartmouth.edu/~sergey/hc/rss-hacker-research.pdf
-
https://fahrplan.events.ccc.de/congress/2010/Fahrplan/attachments/1807_ccc-hacker-research.pdf
-
https://www.youtube.com/watch?v=4sUmANLFD8s
-
Exploitation and State Machines: Programming the ‘Weird Machine’ Revisited
-
https://census-labs.com/media/heap-owasp-appsec-2012.pdf
-
https://langsec.org/papers/Bratus.pdf
-
Weird machines, exploitability, and provable unexploitability
-
Language-Theoretic Security