Operating system protection through program evolution, Computers & Security, vol.12, issue.6, pp.565-584, 1993. ,
DOI : 10.1016/0167-4048(93)90054-9
Building diverse computer systems, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133), pp.67-72, 1997. ,
DOI : 10.1109/HOTOS.1997.595185
Enhanced operating system security through efficient and fine-grained address space randomization, Proceedings of the 21st USENIX Security Symposium, pp.475-490, 2012. ,
Data Execution Prevention: Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, 2004. ,
Interpreter Exploitation: Pointer Inference and JIT Spraying ,
Compiler-Generated Software Diversity, Moving Target Defense of Advances in Information Security, pp.77-98, 2011. ,
DOI : 10.1007/978-1-4614-0977-9_4
Profileguided automated software diversity, Proceedings of the 2013 International Symposium on Code Generation and Optimization, CGO '13, 2013. ,
DOI : 10.1109/cgo.2013.6494997
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.1292
Librando, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, p.13 ,
DOI : 10.1145/2508859.2516675
ILR: Where'd my gadgets go? Smashing the gadgets: Hindering return-oriented programming using in-place code randomization, Proceedings of the 33rd IEEE Symposium on Security and Privacy Proceedings of the 33rd IEEE Symposium on Security and Privacy, pp.571-58512, 2012. ,
Binary stirring, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.157-168, 2012. ,
DOI : 10.1145/2382196.2382216
Exploiting and Protecting Dynamic Code Generation, Proceedings 2015 Network and Distributed System Security Symposium, 2015. ,
DOI : 10.14722/ndss.2015.23233
JITDefender: A Defense against JIT Spraying Attacks, Proceedings of the 26th IFIP TC 11 International Information Security Conference, pp.142-153, 2011. ,
DOI : 10.1007/978-3-642-21424-0_12
Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005. ,
DOI : 10.1145/1102120.1102165
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines in Network and Data Security Symposium, p.15 ,
On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.298-307, 2004. ,
DOI : 10.1145/1030083.1030124
INSeRT: Protect dynamic code generation against spraying, Proceedings of the 2011 International Conference on Information Science and Technology, pp.323-328, 2011. ,
An infrastructure for adaptive dynamic optimization, International Symposium on Code Generation and Optimization, 2003. CGO 2003., p.3, 2003. ,
DOI : 10.1109/CGO.2003.1191551
Valgrind: A program supervision framework, Electronic Notes in Theoretical Computer Science, 2003. ,
Retargetable and reconfigurable software dynamic translation, International Symposium on Code Generation and Optimization, 2003. CGO 2003., p.3, 2003. ,
DOI : 10.1109/CGO.2003.1191531
Pin: building customized program analysis tools with dynamic instrumentation, Proceedings of the ACM PLDI '05, pp.190-200, 2005. ,
Adaptive Just-In-Time Code Diversification [30] https://developers.google.com/v8/?hl=en [31] URL https://developer.mozilla.org/en-US/docs/Mozilla/Projects/SpiderMonkey [32] URL https Aleph One. Smashing the Stack for Fun and Profit, Proceedings of MTD, ACM CCS'15 F. Gadaleta , Y. Younan , W. Joosen. BuBBle: A Javascript Engine Level Countermeasure against Heap-spraying Attacks. Proc. 2nd Int'l Symp. Eng. Secure Software and Systems, 2007. ,