R. Wahbe, S. Lucco, T. Anderson, and S. Guaham, Efficient software-based fault isolation, ACM Symposium on Operating Systems Principles, 1993.

S. Mccamant and G. Morrisett, Evaluating SFI for a CISC architecture, USENIX Security Symposium, 2006.

B. Yee, D. Sehr, G. Dardyk, J. Chen, R. Muth et al., Native Client, IEEE Symposium on Security and Privacy, 2009.
DOI : 10.1145/1629175.1629203

B. Ford and R. Cox, Vx32: Lightweight user-level sandboxing on the x86, USENIX Annual Technical Conference, 2008.

D. Sehr, R. Muth, C. Biffle, V. Khimenko, E. Pasko et al., Adapting software fault isolation to contemporary CPU architectures, Usenix Security Symposium, 2010.

U. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. Necula, XFI: Software guards for system address spaces, Symposium on Operating Systems Design and Implementation, 2006.

B. Zeng, G. Tan, and G. Morrisett, Combining control-flow integrity and static analysis for efficient and validated data sandboxing, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011.
DOI : 10.1145/2046707.2046713

B. Zeng, G. Tan, and U. Erlingsson, Strato: A retargetable framework for low-Level inlined-reference monitors, USENIX Security Symposium, 2013.

R. Wartell, V. Mohan, K. Hamlen, and Z. Lin, Securing untrusted code via compileragnostic binary rewriting, 28th Annual Computer Security Applications Conference, 2012.

M. Castro, M. Costa, J. Martin, M. Peinado, P. Akritidis et al., Fast byte-granularity software fault isolation, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, 2009.
DOI : 10.1145/1629575.1629581

P. Akritidis, M. Costa, M. Castro, and S. Hand, Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors, Usenix Security Symposium, 2009.

J. Ansel, P. Marchenko, U. Erlingsson, E. Taylor, B. Chen et al., Language-independent sandboxing of just-in-time compilation and self-modifying code, ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011.

B. Niu and G. Tan, Monitor integrity protection with space efficiency and separate compilation, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516649

M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005.
DOI : 10.1145/1102120.1102165

C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres et al., Practical control flow integrity & randomization for binary executables, IEEE Symposium on Security and Privacy, 2013.

M. Zhang and R. Sekar, Control flow integrity for cots binaries, USENIX Security Symposium, 2013.

L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz et al., MoCFI: A framework to mitigate control-flow attacks on smartphones, Annual Network and Distributed System Security Symposium, 2012.

J. Pewny and T. Holz, Control-flow restrictor, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, 2013.
DOI : 10.1145/2523649.2523674

J. Criswell, N. Dautenhahn, and V. Adve, KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.26

L. Davi, A. Sadeghi, D. Lehmann, and F. Monrose, Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, USENIX Security Symposium, 2014.

E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, 2014.
DOI : 10.1109/SP.2014.43

N. Carlini and D. Wagner, Rop is still dangerous: Breaking modern defenses, USENIX Security Symposium, 2014.

H. Shacham, The geometry of ennocent flesh on the bone: Return-into-libc without function calls (on the x86), ACM conference on Computer and Communications Security, 2007.

S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham et al., Return-oriented programming without returns, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866370

R. Wartell, V. Mohan, K. Hamlen, and Z. Lin, Binary stirring, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012.
DOI : 10.1145/2382196.2382216

J. Hiser, A. Nguyen-tuong, M. Co, M. Hall, and J. Davidson, ILR: Whered my gadgets go?, IEEE Symposium on Security and Privacy, 2012.

E. Berger, B. Zorn, and K. Mckinley, Composing high performance memory allocators, ACM SIGPLAN Conference on Programming Language Design and Implementation, 2001.

G. Novark and E. Berger, DieHarder, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010.
DOI : 10.1145/1866307.1866371