Handbook of information and communication security, 2010. ,
Bcc: Runtime checking for C programs, Proceedings, The Association, p.5, 1983. ,
Righting software, IEEE Software, vol.21, issue.3, pp.92-100, 2004. ,
DOI : 10.1109/MS.2004.1293079
CCured: type-safe retrofitting of legacy software, ACM Transactions on Programming Languages and Systems, vol.27, issue.3, p.526, 2005. ,
DOI : 10.1145/1065887.1065892
Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks, SSYM'98: Proceedings of the 7th conference on USENIX Security Symposium, 1998. ,
Protecting from stack-smashing attacks, 2000. ,
Documentation for the PaX project. Homepage of The PaX Team, 2003. ,
Address obfuscation: An efficient approach to combat a broad range of memory error exploits, Proceedings of the 12th USENIX Security Symposium, pp.105-120, 2003. ,
Breaking the memory secrecy assumption, Proceedings of the Second European Workshop on System Security, EUROSEC '09, pp.1-8, 2009. ,
DOI : 10.1145/1519144.1519145
Filter-resistant code injection on ARM, Proceedings of the 16th ACM conference on Computer and communications security, pp.11-20, 2009. ,
Extended Protection against Stack Smashing Attacks without Performance Loss, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 2006. ,
DOI : 10.1109/ACSAC.2006.27
Code injection in c and c++ : A survey of vulnerabilities and countermeasures, 2004. ,
Register Packing: Exploiting Narrow-Width Operands for Reducing Register File Pressure, 37th International Symposium on Microarchitecture (MICRO-37'04), 2004. ,
DOI : 10.1109/MICRO.2004.29
MiBench: A free, commercially representative embedded benchmark suite, Proceedings of the Fourth Annual IEEE International Workshop on Workload Characterization. WWC-4 (Cat. No.01EX538), pp.184-193, 2001. ,
DOI : 10.1109/WWC.2001.990739
Protecting mobile devices against stack-based buffer overflows, 2009. ,
Efficient countermeasures for software vulnerabilities due to memory management errors, 2008. ,
Detecting format string vulnerabilities with type qaualifiers, Proceedings of the 10th conference on USENIX Security Symposium, p.16, 2001. ,
Defending Embedded Systems Against Control Flow Attacks 23, Non-executable stack patch, 1998. ,
DOI : 10.1145/1655077.1655083
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3803