A. One, Smashing the stack for fun and profit, J. Phrack magazine, vol.7, issue.49, pp.14-16, 1996.

C. Cowan, S. Beattie, J. Johansen, and P. Wagle, Pointguard TM: protecting pointers from buffer overflow vulnerabilities, Proceedings of the 12th conference on USENIX Security Symposium, pp.91-104, 2003.

C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke et al., H: Stack- Guard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks, Usenix Security 98, pp.63-78, 1998.

C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, Buffer overflows: attacks and defenses for the vulnerability of the decade, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.119-129, 2000.
DOI : 10.1109/DISCEX.2000.821514

H. Etoh, Y. , and K. , GCC extension for protecting applications from stack-smashing attacks, 2014.

S. Shield, A stack smashing technique protection tool for Linux, 2014.

S. Krahmer, x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique, 2005.

J. Mcdonald, Defeating Solaris/SPARC non-executable stack protection, Bugtraq, 1999.

. Microsoft and . Kb, A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition, 13. Designer, S. Linux kernel patch from the Openwall project, 2003.

H. Shacham, The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007.
DOI : 10.1145/1315245.1315313

L. Davi, A. R. Sadeghi, and M. Winandy, Dynamic integrity measurement and attestation, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.49-54, 2009.
DOI : 10.1145/1655108.1655117

P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao et al., DROP: Detecting returnoriented programming malicious code, Information Systems Security, pp.163-177, 2009.

J. Li, Z. Wang, X. Jiang, M. Grace, and S. Bahram, " kernels, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.195-208, 2010.
DOI : 10.1145/1755913.1755934

T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang, Jump-oriented programming, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.30-40, 2011.
DOI : 10.1145/1966913.1966919

S. Checkoway, L. Davi, A. Dmitrienko, A. R. Sadeghi, H. Shacham et al., Return-oriented programming without returns, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.559-572, 2010.
DOI : 10.1145/1866307.1866370

P. Chen, X. Xing, B. Mao, L. Xie, X. Shen et al., Automatic construction of jump-oriented programming shellcode (on the x86), Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.20-29, 2011.
DOI : 10.1145/1966913.1966918

J. P. Mcgregor, D. K. Karig, Z. Shi, L. , and R. B. , A processor architecture defense against buffer overflow attacks, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003., pp.243-250, 2003.
DOI : 10.1109/ITRE.2003.1270612

R. B. Lee, D. K. Karig, J. P. Mcgregor, and Z. Shi, Enlisting Hardware Architecture to Thwart Malicious Code Injection, Security in Pervasive Computing, pp.237-252, 2004.
DOI : 10.1007/978-3-540-39881-3_21

L. Davi, A. R. Sadeghi, and M. Winandy, ROPdefender, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.40-51, 2011.
DOI : 10.1145/1966913.1966920

J. Xu, Z. Kalbarczyk, S. Patel, and R. K. Iyer, Architecture support for defending against buffer overflow attacks, Workshop on Evaluating and Architecting Systems for Dependability, 2002.

L. Davi, A. R. Sadeghi, and M. Winandy, ROPdefender, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.40-51, 2011.
DOI : 10.1145/1966913.1966920

A. Francillon, D. Perito, C. , and C. , Defending embedded systems against control flow attacks, Proceedings of the first ACM workshop on Secure execution of untrusted code, SecuCode '09, pp.19-26, 2009.
DOI : 10.1145/1655077.1655083

P. Chen, X. Xing, H. Han, B. Mao, and L. Xie, Efficient Detection of the Return-Oriented Programming Malicious Code, International Conference on Information Systems Security (ICISS), 2010.
DOI : 10.1007/978-3-642-17714-9_11

M. Kayaalp, M. Ozsoy, N. Abu-ghazaleh, and D. Ponomarev, Branch regulation, International Symposium on Computer Architecture (ISCA), 2012.
DOI : 10.1145/2366231.2337171

J. Hiser, A. Nguyen-tuong, M. Co, M. Hall, D. et al., ILR: Where'd My Gadgets Go?, 2012 IEEE Symposium on Security and Privacy, pp.571-585, 2012.
DOI : 10.1109/SP.2012.39

V. Pappas, M. Polychronakis, and A. D. Keromytis, Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization, 2012 IEEE Symposium on Security and Privacy, pp.601-615, 2012.
DOI : 10.1109/SP.2012.41

K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, G-Free, Proceedings of the 26th Annual Computer Security Applications Conference on, ACSAC '10, pp.49-58, 2010.
DOI : 10.1145/1920261.1920269

Z. Huang, T. Zheng, Y. Shi, and A. Li, A dynamic detection method against ROP and JOP, 2012 International Conference on Systems and Informatics (ICSAI2012), 2012.
DOI : 10.1109/ICSAI.2012.6223219

E. R. Jacobson, A. R. Bernat, W. R. Williams, and B. P. Miller, Detecting Code Reuse Attacks with a Model of Conformant Program Execution, Engineering Secure Software and Systems. ESSoS'14, pp.1-18, 2014.
DOI : 10.1007/978-3-319-04897-0_1

T. Bletsch, X. Jiang, and V. Freeh, Mitigating code-reuse attacks with control-flow locking, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.353-362, 2011.
DOI : 10.1145/2076732.2076783

M. Kayaalp, T. Schmitt, J. Nomani, D. Ponomarev, and N. Abu-ghazaleh, SCRAP: Architecture for signature-based protection from Code Reuse Attacks, 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), pp.258-269, 2013.
DOI : 10.1109/HPCA.2013.6522324

S. Mccamant and G. Morrisett, Efficient, verifiable binary sandboxing for a CISC architecture, MIT Technical Report. MIT-CSAIL-TR-2005, p.30, 2005.

B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth et al., Native Client, 30th IEEE Symposium, pp.79-93, 2009.
DOI : 10.1145/1629175.1629203

N. Binkert, B. Beckmann, G. Black, S. K. Reinhardt, A. Saidi et al., The gem5 simulator, ACM SIGARCH Computer Architecture News, vol.39, issue.2, pp.1-7, 2011.
DOI : 10.1145/2024716.2024718