Smashing the stack for fun and profit, J. Phrack magazine, vol.7, issue.49, pp.14-16, 1996. ,
Pointguard TM: protecting pointers from buffer overflow vulnerabilities, Proceedings of the 12th conference on USENIX Security Symposium, pp.91-104, 2003. ,
H: Stack- Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, Usenix Security 98, pp.63-78, 1998. ,
Buffer overflows: attacks and defenses for the vulnerability of the decade, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.119-129, 2000. ,
DOI : 10.1109/DISCEX.2000.821514
GCC extension for protecting applications from stack-smashing attacks, 2014. ,
A stack smashing technique protection tool for Linux, 2014. ,
x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique, 2005. ,
Defeating Solaris/SPARC non-executable stack protection, Bugtraq, 1999. ,
A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition, 13. Designer, S. Linux kernel patch from the Openwall project, 2003. ,
The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007. ,
DOI : 10.1145/1315245.1315313
Dynamic integrity measurement and attestation, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.49-54, 2009. ,
DOI : 10.1145/1655108.1655117
DROP: Detecting returnoriented programming malicious code, Information Systems Security, pp.163-177, 2009. ,
" kernels, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.195-208, 2010. ,
DOI : 10.1145/1755913.1755934
Jump-oriented programming, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.30-40, 2011. ,
DOI : 10.1145/1966913.1966919
Return-oriented programming without returns, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.559-572, 2010. ,
DOI : 10.1145/1866307.1866370
Automatic construction of jump-oriented programming shellcode (on the x86), Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.20-29, 2011. ,
DOI : 10.1145/1966913.1966918
A processor architecture defense against buffer overflow attacks, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003., pp.243-250, 2003. ,
DOI : 10.1109/ITRE.2003.1270612
Enlisting Hardware Architecture to Thwart Malicious Code Injection, Security in Pervasive Computing, pp.237-252, 2004. ,
DOI : 10.1007/978-3-540-39881-3_21
ROPdefender, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.40-51, 2011. ,
DOI : 10.1145/1966913.1966920
Architecture support for defending against buffer overflow attacks, Workshop on Evaluating and Architecting Systems for Dependability, 2002. ,
ROPdefender, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.40-51, 2011. ,
DOI : 10.1145/1966913.1966920
Defending embedded systems against control flow attacks, Proceedings of the first ACM workshop on Secure execution of untrusted code, SecuCode '09, pp.19-26, 2009. ,
DOI : 10.1145/1655077.1655083
Efficient Detection of the Return-Oriented Programming Malicious Code, International Conference on Information Systems Security (ICISS), 2010. ,
DOI : 10.1007/978-3-642-17714-9_11
Branch regulation, International Symposium on Computer Architecture (ISCA), 2012. ,
DOI : 10.1145/2366231.2337171
ILR: Where'd My Gadgets Go?, 2012 IEEE Symposium on Security and Privacy, pp.571-585, 2012. ,
DOI : 10.1109/SP.2012.39
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization, 2012 IEEE Symposium on Security and Privacy, pp.601-615, 2012. ,
DOI : 10.1109/SP.2012.41
G-Free, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.49-58, 2010. ,
DOI : 10.1145/1920261.1920269
A dynamic detection method against ROP and JOP, 2012 International Conference on Systems and Informatics (ICSAI2012), 2012. ,
DOI : 10.1109/ICSAI.2012.6223219
Detecting Code Reuse Attacks with a Model of Conformant Program Execution, Engineering Secure Software and Systems. ESSoS'14, pp.1-18, 2014. ,
DOI : 10.1007/978-3-319-04897-0_1
Mitigating code-reuse attacks with control-flow locking, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.353-362, 2011. ,
DOI : 10.1145/2076732.2076783
SCRAP: Architecture for signature-based protection from Code Reuse Attacks, 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), pp.258-269, 2013. ,
DOI : 10.1109/HPCA.2013.6522324
Efficient, verifiable binary sandboxing for a CISC architecture, MIT Technical Report. MIT-CSAIL-TR-2005, p.30, 2005. ,
Native Client, 30th IEEE Symposium, pp.79-93, 2009. ,
DOI : 10.1145/1629175.1629203
The gem5 simulator, ACM SIGARCH Computer Architecture News, vol.39, issue.2, pp.1-7, 2011. ,
DOI : 10.1145/2024716.2024718