M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005.
DOI : 10.1145/1102120.1102165

M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security, vol.13, issue.1, 2009.
DOI : 10.1145/1609956.1609960

J. Bridges, T. Sartorius, and S. Millendorf, Methods and Systems for Checking Run-Time Integrity of Secure Code Cross-Reference to Related Applications, p.943, 2014.

M. Budiu, U. Erlingsson, and M. Abadi, Architectural support for softwarebased protection, Proceedings of the First Workshop on Architectural and System Support for Improving Software Dependability, pp.42-51, 2006.
DOI : 10.1145/1181309.1181316

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.6208

M. Burmester and B. De-medeiros, On the Security of Route Discovery in MANETs, IEEE Transactions on Mobile Computing, vol.8, issue.9, pp.1180-1188, 2009.
DOI : 10.1109/TMC.2009.13

M. Burmester, E. Magkos, V. Chrissikopoulos, and T. , An attributebased access control model for real-time availability in highly dynamic systems, Proceedings of the IEEE Symposium on Computers and Communications, pp.143-148, 2013.

R. Canetti, Universally composable security: a new paradigm for cryptographic protocols, Proceedings 2001 IEEE International Conference on Cluster Computing, pp.136-145, 2001.
DOI : 10.1109/SFCS.2001.959888

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.368.5322

M. Castro, M. Costa, and T. Harris, Securing software by enforcing dataflow integrity, Proceedings of the Seventh Symposium on Operating Systems Design and Implementation, pp.147-160, 2006.

W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige, TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting, 11th IEEE Symposium on Computers and Communications (ISCC'06), pp.749-754, 2006.
DOI : 10.1109/ISCC.2006.158

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.1479

J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum, Understanding data lifetime via whole system simulation, Proceedings of the Thirteenth USENIX Security Symposium, 2004.

C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole et al., StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks, Proceedings of the Seventh USENIX Security Symposium, 1998.

J. Crandall and F. Chong, Minos: Control Data Attack Prevention Orthogonal to Memory Model, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.221-232, 2004.
DOI : 10.1109/MICRO.2004.26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.5737

L. Davi, A. Sadeghi, D. Lehmann, and F. Monrose, Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, Proceedings of the Twenty-Third USENIX Security Symposium, pp.401-416, 2014.

L. Davi, A. Sadeghi, and M. Winandy, Dynamic integrity measurement and attestation, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.49-54, 2009.
DOI : 10.1145/1655108.1655117

L. Davi, A. Sadeghi, and M. Winandy, ROPdefender, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.40-51, 2011.
DOI : 10.1145/1966913.1966920

. Dynamorio, Dynamic Instrumentation Tool Platform, 2009.

E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, pp.575-589, 2014.
DOI : 10.1109/SP.2014.43

C. Gunther, An identity-based key-exchange protocol, in Advances in Cryptology ? EUROCRYPT '89, pp.29-37, 1990.

J. Hiser, A. Nguyen-tuong, M. Co, M. Hall, and J. Davidson, ILR: Where'd My Gadgets Go?, 2012 IEEE Symposium on Security and Privacy, pp.571-585, 2012.
DOI : 10.1109/SP.2012.39

V. Kiriansky, D. Bruening, and S. Amarasinghe, Secure execution via program shepherding, Proceedings of the Eleventh USENIX Security Symposium, pp.191-206, 2002.

L. Lamport, R. Shostak, and M. Pease, The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982.
DOI : 10.1145/357172.357176

Y. Li, J. Mccune, J. Newsome, A. Perrig, B. Baker et al., Minibox: A two-way sandbox for x86 native code, Proceedings of the Annual USENIX Technical Conference, pp.409-420, 2014.

D. Malan, Secure execution of untrusted code, Proceedings of the Forty-Fourth ACM Technical Symposium on Computer Science Education, pp.141-146, 2013.

J. Newsome and D. Song, Dynamic taint analysis for automatic detection , analysis and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium, 2005.

R. Roemer, E. Buchanan, H. Shacham, and S. Savage, Return-Oriented Programming, ACM Transactions on Information and System Security, vol.15, issue.1, 2012.
DOI : 10.1145/2133375.2133377

H. Shacham, The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007.
DOI : 10.1145/1315245.1315313

G. Suh, J. Lee, D. Zhang, and S. Devadas, Secure program execution via dynamic information flow tracking, Proceedings of the Eleventh International Conference on Architectural Support for Programming Languages and Operating Systems, pp.85-96, 2004.
DOI : 10.1145/1024393.1024404

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.341

N. Vachharajani, M. Bridges, J. Chang, R. Rangan, G. Ottoni et al., RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.243-254, 2004.
DOI : 10.1109/MICRO.2004.31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.8121

C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres et al., Practical control flow integrity and randomization for binary executables, Proceedings of the IEEE Symposium on Security and Privacy, pp.559-573, 2013.