S. A. Hofmeyr, S. Forrest, and A. Somayaji, Intrusion detection using sequences of system calls, Journal of Computer Security, vol.6, issue.3, 1998.
DOI : 10.3233/JCS-980109

C. Kruegel, E. Kirda, D. Mutz, and W. Robertson, Automating mimicry attacks using static binary analysis, 14th conference on USENIX Security Symposium, 2005.

C. Kruegel, D. Mutz, F. Valeur, and G. Vigna, On the Detection of Anomalous System Call Arguments, 8th European Symposium on Research in Computer Security, 2003.
DOI : 10.1007/978-3-540-39650-5_19

S. Bhatkar, A. Chaturvedi, and R. Sekar, Dataflow anomaly detection, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006.
DOI : 10.1109/SP.2006.12

D. Mutz, W. Robertson, G. Vigna, and R. Kemmerer, Exploiting Execution Context for the Detection of Anomalous System Calls, Proceeding of the 10th International Symposium on Recent Advances in Intrusion Detection, 2007.
DOI : 10.1007/978-3-540-74320-0_1

H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong, Anomaly detection using call stack information, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), p.65, 2003.
DOI : 10.1109/SECPRI.2003.1199328

M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005.
DOI : 10.1145/1102120.1102165

V. Kiriansky, D. Bruening, and S. Amarasinghe, Secure execution via program shepherding, Proceedings of the Usenix Security Symposium, 2002.

S. Chen, J. Xu, E. Sezer, P. Gauriar, and R. Iyer, Non-control-data attacks are realistic threats, Usenix Security Symposium, 2005.

P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro, Preventing Memory Error Exploits with WIT, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008.
DOI : 10.1109/SP.2008.30

M. Castro, M. Costa, and T. Harris, Securing software by enforcing data-flow integrity, 7th USENIX Symposium on Operating Systems Design and Implementation, 2006.

J. C. Demay, E. Totel, and F. Tronel, SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data, 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009), 2009.
DOI : 10.1109/CRISIS.2009.5411977

URL : https://hal.archives-ouvertes.fr/hal-00424574

M. Weiser, Program Slicing, IEEE Transactions on Software Engineering, vol.10, issue.4, 1982.
DOI : 10.1109/TSE.1984.5010248

D. J. Kuck, R. H. Kuhn, D. A. Padua, B. Leasure, and M. Wolfe, Dependence graphs and its use in optimization, 8th ACM Symposium on Principles of Programming Languages, 1981.

P. Cousot and R. Cousot, Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, 1977.
DOI : 10.1145/512950.512973

URL : https://hal.archives-ouvertes.fr/inria-00528590

P. Granger, Static analysis of arithmetical congruences, International Journal of Computer Mathematics, vol.30, issue.3-4, pp.165-190, 1989.
DOI : 10.1145/29873.29875

P. Cousot and N. Halbwachs, Automatic discovery of linear restraints among variables of a program, Proceedings of the 5th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '78, 1978.
DOI : 10.1145/512760.512770

M. Karr, Affine relationships among variables of a program, Acta Informatica, vol.6, issue.2, pp.133-151, 1976.
DOI : 10.1007/BF00268497

P. Granger, Static analysis of linear congruence equalities among variables of a program, TAPSOFT'91, pp.169-192, 1991.
DOI : 10.1007/3-540-53982-4_10

O. Goloubeva, M. Rebaudengo, M. S. Reorda, and M. Violante, Soft-error detection using control flow assertions, Proceedings. 16th IEEE Symposium on Computer Arithmetic, 2003.
DOI : 10.1109/DFTVS.2003.1250158

R. Vemu and J. A. Abraham, CEDA: Control-flow Error Detection through Assertions, 12th IEEE International On-Line Testing Symposium (IOLTS'06), 2006.
DOI : 10.1109/IOLTS.2006.14

N. Neves, J. Antunes, M. Correia, P. Verissimo, and R. Neves, Using Attack Injection to Discover New Vulnerabilities, International Conference on Dependable Systems and Networks (DSN'06), 2006.
DOI : 10.1109/DSN.2006.72