Bibliography (8):

  1. https://www.cs.dartmouth.edu/~sergey/hc/rss-hacker-research.pdf

  2. https://fahrplan.events.ccc.de/congress/2010/Fahrplan/attachments/1807_ccc-hacker-research.pdf

  3. https://www.youtube.com/watch?v=4sUmANLFD8s

  4. Exploitation and State Machines: Programming the ‘Weird Machine’ Revisited

  5. https://census-labs.com/media/heap-owasp-appsec-2012.pdf

  6. https://langsec.org/papers/Bratus.pdf

  7. Weird machines, exploitability, and provable unexploitability

  8. Language-Theoretic Security