Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005. ,
DOI : 10.1145/1102120.1102165
Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security, vol.13, issue.1, 2009. ,
DOI : 10.1145/1609956.1609960
Methods and Systems for Checking Run-Time Integrity of Secure Code Cross-Reference to Related Applications, p.943, 2014. ,
Architectural support for softwarebased protection, Proceedings of the First Workshop on Architectural and System Support for Improving Software Dependability, pp.42-51, 2006. ,
DOI : 10.1145/1181309.1181316
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.6208
On the Security of Route Discovery in MANETs, IEEE Transactions on Mobile Computing, vol.8, issue.9, pp.1180-1188, 2009. ,
DOI : 10.1109/TMC.2009.13
An attributebased access control model for real-time availability in highly dynamic systems, Proceedings of the IEEE Symposium on Computers and Communications, pp.143-148, 2013. ,
Universally composable security: a new paradigm for cryptographic protocols, Proceedings 2001 IEEE International Conference on Cluster Computing, pp.136-145, 2001. ,
DOI : 10.1109/SFCS.2001.959888
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.368.5322
Securing software by enforcing dataflow integrity, Proceedings of the Seventh Symposium on Operating Systems Design and Implementation, pp.147-160, 2006. ,
TaintTrace: Efficient Flow Tracing with Dynamic Binary Rewriting, 11th IEEE Symposium on Computers and Communications (ISCC'06), pp.749-754, 2006. ,
DOI : 10.1109/ISCC.2006.158
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.1479
Understanding data lifetime via whole system simulation, Proceedings of the Thirteenth USENIX Security Symposium, 2004. ,
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks, Proceedings of the Seventh USENIX Security Symposium, 1998. ,
Minos: Control Data Attack Prevention Orthogonal to Memory Model, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.221-232, 2004. ,
DOI : 10.1109/MICRO.2004.26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.5737
Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, Proceedings of the Twenty-Third USENIX Security Symposium, pp.401-416, 2014. ,
Dynamic integrity measurement and attestation, Proceedings of the 2009 ACM workshop on Scalable trusted computing, STC '09, pp.49-54, 2009. ,
DOI : 10.1145/1655108.1655117
ROPdefender, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.40-51, 2011. ,
DOI : 10.1145/1966913.1966920
Dynamic Instrumentation Tool Platform, 2009. ,
Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, pp.575-589, 2014. ,
DOI : 10.1109/SP.2014.43
An identity-based key-exchange protocol, in Advances in Cryptology ? EUROCRYPT '89, pp.29-37, 1990. ,
ILR: Where'd My Gadgets Go?, 2012 IEEE Symposium on Security and Privacy, pp.571-585, 2012. ,
DOI : 10.1109/SP.2012.39
Secure execution via program shepherding, Proceedings of the Eleventh USENIX Security Symposium, pp.191-206, 2002. ,
The Byzantine Generals Problem, ACM Transactions on Programming Languages and Systems, vol.4, issue.3, pp.382-401, 1982. ,
DOI : 10.1145/357172.357176
Minibox: A two-way sandbox for x86 native code, Proceedings of the Annual USENIX Technical Conference, pp.409-420, 2014. ,
Secure execution of untrusted code, Proceedings of the Forty-Fourth ACM Technical Symposium on Computer Science Education, pp.141-146, 2013. ,
Dynamic taint analysis for automatic detection , analysis and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium, 2005. ,
Return-Oriented Programming, ACM Transactions on Information and System Security, vol.15, issue.1, 2012. ,
DOI : 10.1145/2133375.2133377
The geometry of innocent flesh on the bone, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.552-561, 2007. ,
DOI : 10.1145/1315245.1315313
Secure program execution via dynamic information flow tracking, Proceedings of the Eleventh International Conference on Architectural Support for Programming Languages and Operating Systems, pp.85-96, 2004. ,
DOI : 10.1145/1024393.1024404
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.341
RIFLE: An Architectural Framework for User-Centric Information-Flow Security, 37th International Symposium on Microarchitecture (MICRO-37'04), pp.243-254, 2004. ,
DOI : 10.1109/MICRO.2004.31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.117.8121
Practical control flow integrity and randomization for binary executables, Proceedings of the IEEE Symposium on Security and Privacy, pp.559-573, 2013. ,