Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005. ,
DOI : 10.1145/1102120.1102165
A brief history of just-in-time, ACM Computing Surveys, vol.35, issue.2, pp.97-113, 2003. ,
DOI : 10.1145/857076.857077
Jump-oriented programming, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.30-40, 2011. ,
DOI : 10.1145/1966913.1966919
Control-flow bending: On the effectiveness of control-flow integrity, 24th USENIX Security Symposium (USENIX Security 15), pp.161-176 ,
Rop is still dangerous: Breaking modern defenses, 23rd USENIX Security Symposium (USENIX Security 14), pp.385-399 ,
Return-oriented programming without returns. CCS '10, pp.559-572, 2010. ,
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23156
Losing Control, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.952-963, 2015. ,
DOI : 10.1145/2810103.2813671
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, Proc. of the 23rd USENIX Conf. on Security, pp.401-416, 2014. ,
Anatomy of an exploit -inside the cve-2013-3893 internet explorer zero-day -part 2, 2013. ,
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard, Proc. of the 23rd USENIX Conf. on Security Symposium, SEC'14, pp.417-432, 2014. ,
Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, pp.575-589, 2014. ,
DOI : 10.1109/SP.2014.43
Microgadgets: Size does matter in turing-complete return-oriented programming, Presented as part of the 6th USENIX Workshop on Offensive Technologies ,
One font vulnerability to rule them all #2: Adobe reader rce exploitation, 2015. ,
Emerging stack pivoting exploits bypass common security, 2013. ,
Data execution prevention ,
Smashing the stack for fun and profit, 1996. ,
Transparent rop exploit mitigation using indirect branch tracing, Proc. of the 22Nd USENIX Conf. on Security, SEC'13, pp.447-462 ,
Fine-Grained Control-Flow Integrity Through Binary Hardening, DIMVA'15: 12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment, 2015. ,
DOI : 10.1007/978-3-319-20550-2_8
Unpatched flash player flaw, more pocs found in hacking team leak, 2015. ,
Intel memory protection extensions (intel mpx) enabling guide, 2015. ,
Return-Oriented Programming, ACM Transactions on Information and System Security, vol.15, issue.1, pp.1-2, 2012. ,
DOI : 10.1145/2133375.2133377
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications, 2015 IEEE Symposium on Security and Privacy, p.2015 ,
DOI : 10.1109/SP.2015.51
Evaluating the Effectiveness of Current Anti-ROP Defenses, Research in Attacks, Intrusions and Defenses -17th International Symposium, RAID 2014. Proceedings, pp.88-108, 2014. ,
DOI : 10.1007/978-3-319-11379-1_5
Q: Exploit hardening made easy, Proceedings of the 20th USENIX Conference on Security, pp.25-25, 2011. ,
The info leak era of software exploitation, 2012. ,
The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007. ,
DOI : 10.1145/1315245.1315313
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization, 2013 IEEE Symposium on Security and Privacy, p.13, 2013. ,
DOI : 10.1109/SP.2013.45
Heap feng shui in javascript, 2007. ,
Enforcing forward-edge control-flow integrity in gcc & llvm, 23rd USENIX Security Symposium (USENIX Security 14), pp.941-955, 2014. ,
Practical Context-Sensitive CFI, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.927-940, 2015. ,
DOI : 10.1145/2810103.2813673
Control flow integrity for cots binaries, Proc. of the 22Nd USENIX Conf. on Security, SEC'13, pp.337-352 ,