Control-flow integrity principles, implementations, and applications, vol.13, 2009. ,
DOI : 10.1145/1609956.1609960
On protection by layout randomization, vol.15, 2012. ,
DOI : 10.1109/csf.2010.30
URL : http://www.cs.ucsc.edu/%7Eabadi/Papers/paper-csf-long.pdf
Computer security technology planning study, 1972. ,
DOI : 10.21236/ad0772806
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=AD0772806&Location=U2&doc=GetTRDoc.pdf
A verified informationflow architecture, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-00918847
Architectural support for software-based protection, 2006. ,
DOI : 10.1145/1181309.1181316
URL : http://research.microsoft.com/users/mbudiu/asid06.pdf
The Bedrock structured programming system: Combining generative metaprogramming and Hoare logic in an extensible program verifier, ICFP, 2013. ,
DOI : 10.1145/2544174.2500592
URL : http://dl.acm.org/ft_gateway.cfm?id=2500592&type=pdf
Effective memory protection using dynamic tainting. ASE, 2007. ,
DOI : 10.1145/1321631.1321673
URL : http://www-static.cc.gatech.edu/~orso/papers/clause.doudalis.orso.prvulovic.pdf
KCoFI: Complete control-flow integrity for commodity operating system kernels, IEEE S&P, 2014. ,
DOI : 10.1109/sp.2014.26
URL : http://sva.cs.illinois.edu/pubs/KCoFI-Oakland-2014.pdf
Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation, 2014. ,
DOI : 10.1109/dac.2014.6881460
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, 2014. ,
Architectural support for softwaredefined metadata processing, 2015. ,
DOI : 10.1145/2775054.2694383
URL : https://hal.archives-ouvertes.fr/hal-01102378
Hardware support for safety interlocks and introspection, 2012. ,
DOI : 10.1109/sasow.2012.11
URL : http://www.crash-safe.org/sites/default/files/interlocks_ahns2012.pdf
IRM enforcement of Java stack inspection, IEEE S&P, 2000. ,
DOI : 10.1109/secpri.2000.848461
URL : http://www.cs.cornell.edu/fbs/publications/sasiOakland.ps
Out of control: Overcoming control-flow integrity, IEEE S&P, 2014. ,
Computability classes for enforcement mechanisms, TOPLAS, vol.28, issue.1, pp.175-205, 2006. ,
DOI : 10.1145/1111596.1111601
URL : http://www.cs.cornell.edu/fbs/publications/EnfClasses.pdf
All your IFCException are belong to us, IEEE S&P, 2013. ,
High-level separation logic for low-level code, 2013. ,
DOI : 10.1145/2480359.2429105
Portable software fault isolation, 2014. ,
DOI : 10.1109/csf.2014.10
URL : http://doi.org/10.1109/csf.2014.10
Lowfat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security, 2013. ,
Formal verification of a C-like memory model and its uses for verifying program transformations, JAR, vol.41, issue.1, pp.1-31, 2008. ,
DOI : 10.1007/s10817-008-9099-0
URL : https://hal.archives-ouvertes.fr/inria-00289542
Edit automata: enforcement mechanisms for run-time security policies, IJISS, vol.4, issue.1-2, pp.2-16, 2005. ,
DOI : 10.1007/s10207-004-0046-8
URL : http://www.cs.princeton.edu/~jligatti/papers/TR-681-03.pdf
, Cryptographically enforced control flow integrity
Protection in programming languages, CACM, vol.16, issue.1, pp.15-21, 1973. ,
RockSalt: better, faster, stronger SFI for the x86, 2012. ,
Hardware-Enforced Comprehensive Memory Safety, IEEE Micro, vol.33, issue.3, pp.38-47, 2013. ,
SoftBound: highly compatible and complete spatial memory safety for C. PLDI, 2009. ,
CETS: compiler enforced temporal safety for C. ISMM, 2010. ,
Modular control-flow integrity. PLDI, 2014. ,
Enforceable security policies, TISSEC, vol.3, issue.1, pp.30-50, 2000. ,
Secure program execution via dynamic information flow tracking, 2004. ,
A bisimulation for dynamic sealing, TCS, vol.375, issue.13, pp.169-192, 2007. ,
Efficient softwarebased fault isolation, SOSP, 1993. ,
Native Client: a sandbox for portable, vol.53, pp.91-99, 2010. ,
Practical Control Flow Integrity & Randomization for Binary Executables, IEEE S&P, 2013. ,
ARMor: fully verified software fault isolation, 2011. ,