Efficient software-based fault isolation, ACM Symposium on Operating Systems Principles, 1993. ,
Evaluating SFI for a CISC architecture, USENIX Security Symposium, 2006. ,
Native Client, IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1145/1629175.1629203
Vx32: Lightweight user-level sandboxing on the x86, USENIX Annual Technical Conference, 2008. ,
Adapting software fault isolation to contemporary CPU architectures, Usenix Security Symposium, 2010. ,
XFI: Software guards for system address spaces, Symposium on Operating Systems Design and Implementation, 2006. ,
Combining control-flow integrity and static analysis for efficient and validated data sandboxing, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046713
Strato: A retargetable framework for low-Level inlined-reference monitors, USENIX Security Symposium, 2013. ,
Securing untrusted code via compileragnostic binary rewriting, 28th Annual Computer Security Applications Conference, 2012. ,
Fast byte-granularity software fault isolation, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, 2009. ,
DOI : 10.1145/1629575.1629581
Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors, Usenix Security Symposium, 2009. ,
Language-independent sandboxing of just-in-time compilation and self-modifying code, ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011. ,
Monitor integrity protection with space efficiency and separate compilation, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516649
Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005. ,
DOI : 10.1145/1102120.1102165
Practical control flow integrity & randomization for binary executables, IEEE Symposium on Security and Privacy, 2013. ,
Control flow integrity for cots binaries, USENIX Security Symposium, 2013. ,
MoCFI: A framework to mitigate control-flow attacks on smartphones, Annual Network and Distributed System Security Symposium, 2012. ,
Control-flow restrictor, Proceedings of the 29th Annual Computer Security Applications Conference on, ACSAC '13, 2013. ,
DOI : 10.1145/2523649.2523674
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.26
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, USENIX Security Symposium, 2014. ,
Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.43
Rop is still dangerous: Breaking modern defenses, USENIX Security Symposium, 2014. ,
The geometry of ennocent flesh on the bone: Return-into-libc without function calls (on the x86), ACM conference on Computer and Communications Security, 2007. ,
Return-oriented programming without returns, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010. ,
DOI : 10.1145/1866307.1866370
Binary stirring, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382216
ILR: Whered my gadgets go?, IEEE Symposium on Security and Privacy, 2012. ,
Composing high performance memory allocators, ACM SIGPLAN Conference on Programming Language Design and Implementation, 2001. ,
DieHarder, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010. ,
DOI : 10.1145/1866307.1866371