@ARTICLE{surgically,
title={Surgically returning to randomized lib(c)},
author={Giampaolo Fresi Roglia and Lorenzo Martignoni and Roberto Paleari and Danilo Bruschi},
journal={Computer Security Applications Conference},
year={2009},
}

@ARTICLE{schwartz,
title={Q: Exploit Hardening Made Easy},
author={Edward Schwartz and Thanassis Avgerinos and David Brumley},
journal={Proceedings of 20$^{\text{th}}$ USENIX Security Symposium},
year={2012},
}

@ARTICLE{schacham,
title={The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)},
author={Hovav Schacham},
journal={Proceedings of the ACM Conference on Computer and Communications Security 2007},
year={2007},
}

@ARTICLE{checkoway,
title={Return-Oriented Programming without Returns},
author={Stephen Checkoway and Lucas Davi and Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Hovav Schacham and Marcel Winandy},
journal={Proceedings of the ACM Conference on Computer and Communications Security 2010},
year={2010}
}

@ARTICLE{BAPmanual,
title={BAP: A binary analysis platform},
author={I. Jager and T. Avgerinos and E. Schwartz and D. Brumley},
journal={In Proceedings of the Conference on Computer Aided Veriﬁcation},
year={2011}
}

@ARTICLE{smackandlaugh,
title={ASLR smack \& laugh reference},
author={Tilo M\"{u}ller},
journal={Seminar on Advanced Exploitation Techniques},
year={2008}
}

@ARTICLE{smashingthestack,
title={Smashing the stack for fun and profit},
author={Aleph One},
journal={Phrack magazine},
volume={7},
number={49},
year={1996},
pages={14-16}
}
