M. Abadi, M. Budiu, ´. U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005.
DOI : 10.1145/1102120.1102165

J. Aycock, A brief history of just-in-time, ACM Computing Surveys, vol.35, issue.2, pp.97-113, 2003.
DOI : 10.1145/857076.857077

T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang, Jump-oriented programming, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.30-40, 2011.
DOI : 10.1145/1966913.1966919

N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross, Control-flow bending: On the effectiveness of control-flow integrity, 24th USENIX Security Symposium (USENIX Security 15), pp.161-176

N. Carlini and D. Wagner, Rop is still dangerous: Breaking modern defenses, 23rd USENIX Security Symposium (USENIX Security 14), pp.385-399

S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham et al., Return-oriented programming without returns. CCS '10, pp.559-572, 2010.

Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng, ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23156

M. Conti, S. Crane, L. Davi, M. Franz, P. Larsen et al., Losing Control, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.952-963, 2015.
DOI : 10.1145/2810103.2813671

L. Davi, A. Sadeghi, D. Lehmann, and F. Monrose, Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, Proc. of the 23rd USENIX Conf. on Security, pp.401-416, 2014.

P. Ducklin, Anatomy of an exploit -inside the cve-2013-3893 internet explorer zero-day -part 2, 2013.

E. Gökta¸gökta¸s, E. Athanasopoulos, M. Polychronakis, H. Bos, and G. Portokalidis, Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard, Proc. of the 23rd USENIX Conf. on Security Symposium, SEC'14, pp.417-432, 2014.

E. Göktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, pp.575-589, 2014.
DOI : 10.1109/SP.2014.43

A. Homescu, M. Stewart, P. Larsen, S. Brunthaler, and M. Franz, Microgadgets: Size does matter in turing-complete return-oriented programming, Presented as part of the 6th USENIX Workshop on Offensive Technologies

M. Jurczyk, One font vulnerability to rule them all #2: Adobe reader rce exploitation, 2015.

X. Li and P. Szor, Emerging stack pivoting exploits bypass common security, 2013.

. Microsoft, Data execution prevention

A. One, Smashing the stack for fun and profit, 1996.

V. Pappas, M. Polychronakis, and A. D. Keromytis, Transparent rop exploit mitigation using indirect branch tracing, Proc. of the 22Nd USENIX Conf. on Security, SEC'13, pp.447-462

M. Payer, A. Barresi, and T. R. Gross, Fine-Grained Control-Flow Integrity Through Binary Hardening, DIMVA'15: 12th Conference on Detection of Intrusions and Malware and Vulnerability Assessment, 2015.
DOI : 10.1007/978-3-319-20550-2_8

P. Pi, Unpatched flash player flaw, more pocs found in hacking team leak, 2015.

R. Ramakesavan, D. Zimmerman, and P. Singaravelu, Intel memory protection extensions (intel mpx) enabling guide, 2015.

R. Roemer, E. Buchanan, H. Shacham, and S. Savage, Return-Oriented Programming, ACM Transactions on Information and System Security, vol.15, issue.1, pp.1-2, 2012.
DOI : 10.1145/2133375.2133377

F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A. Sadeghi et al., Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications, 2015 IEEE Symposium on Security and Privacy, p.2015
DOI : 10.1109/SP.2015.51

F. Schuster, T. Tendyck, J. Pewny, A. Maaß, M. Steegmanns et al., Evaluating the Effectiveness of Current Anti-ROP Defenses, Research in Attacks, Intrusions and Defenses -17th International Symposium, RAID 2014. Proceedings, pp.88-108, 2014.
DOI : 10.1007/978-3-319-11379-1_5

E. J. Schwartz, T. Avgerinos, and D. Brumley, Q: Exploit hardening made easy, Proceedings of the 20th USENIX Conference on Security, pp.25-25, 2011.

F. J. Serna, The info leak era of software exploitation, 2012.

H. Shacham, The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007.
DOI : 10.1145/1315245.1315313

K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen et al., Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization, 2013 IEEE Symposium on Security and Privacy, p.13, 2013.
DOI : 10.1109/SP.2013.45

A. Sotirov, Heap feng shui in javascript, 2007.

C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, ´. U. Erlingsson et al., Enforcing forward-edge control-flow integrity in gcc & llvm, 23rd USENIX Security Symposium (USENIX Security 14), pp.941-955, 2014.

V. Van-der-veen, D. Andriesse, E. Gökta¸gökta¸s, B. Gras, L. Sambuc et al., Practical Context-Sensitive CFI, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.927-940, 2015.
DOI : 10.1145/2810103.2813673

M. Zhang and R. Sekar, Control flow integrity for cots binaries, Proc. of the 22Nd USENIX Conf. on Security, SEC'13, pp.337-352