E. J. Schwartz, . Avgerinos, . Thanassis, and . Brumley, Q: Exploit Hardening Made Easy, Proceedings of the 20th USENIX Conference on Security (SEC), pp.25-40, 2011.

T. Bletsch, . Jiang, . Xuxian, V. W. Freeh, and Z. Liang, Jumporiented Programming: A New Class of Code-reuse Attack, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp.30-40, 2011.

M. Abadi, . Budiu, . Mihai, ´. Erlingsson, . Ulfar et al., Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-440, 2009.
DOI : 10.1145/1609956.1609960

V. Pappas, . Polychronakis, . Michalis, and A. D. Keromytis, Transparent ROP Exploit Mitigation Using Indirect Branch Tracing, Proceedings of the 22Nd USENIX Conference on Security (SEC), pp.447-462, 2013.

Y. Cheng, . Zhou, . Zongwei, Y. Miao, . Ding et al., ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks, Proceedings 2014 Network and Distributed System Security Symposium, 2014.
DOI : 10.14722/ndss.2014.23156

M. Kayaalp, T. Schmitt, . Nomani, . Junaid, D. Ponomarev et al., Nael: SCRAP: Architecture for Signature-based Protection from Code Reuse Attacks, Proceedings of the 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), pp.258-269, 2013.
DOI : 10.1109/hpca.2013.6522324

URL : http://www.cs.binghamton.edu/%7Enael/pubs/hpca13.pdf

E. Göktasgöktas¸, E. Athanasopoulos, . Polychronakis, . Michalis, H. Bos et al., Size Does Matter: Why Using Gadget-chain Length to Prevent Code-reuse Attacks is Hard, Proceedings of the 23rd USENIX Conference on Security Symposium (SEC), pp.417-432, 2014.

M. Kayaalp, M. Ozsoy, N. Abu-ghazaleh, and D. Ponomarev, Branch regulation, Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA, pp.94-105, 2012.
DOI : 10.1145/2366231.2337171

C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres et al., Practical Control Flow Integrity and Randomization for Binary Executables, Proceedings of the 34th IEEE Symposium on Security and Privacy (SP, pp.559-573, 2013.

M. Zhang and R. Sekar, Control Flow Integrity for COTS Binaries, Proceedings of the 22Nd USENIX Conference on Security (SEC), pp.337-352, 2013.
DOI : 10.1145/2818000.2818016

E. Göktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, pp.575-589, 2014.
DOI : 10.1109/SP.2014.43

N. Carlini and D. Wagner, ROP is Still Dangerous: Breaking Modern Defenses, Proceedings of the 23rd USENIX Conference on Security Symposium (SEC), pp.385-399, 2014.

L. Davi, A. Sadeghi, D. Lehmann, and F. Monrose, Stitching the Gadgets: On the Ineffectiveness of Coarse-grained Control-flow Integrity Protection, Proceedings of the 23rd USENIX Conference on Security Symposium (SEC), pp.401-416, 2014.

L. Davi, P. Koeberl, and A. Sadeghi, Hardware-Assisted Fine-Grained Control-Flow Integrity, Proceedings of the The 51st Annual Design Automation Conference on Design Automation Conference, DAC '14, pp.1-6, 2014.
DOI : 10.1145/2593069.2596656

I. Evans, F. Long, . Otgonbaatar, . Ulziibayar, H. Shrobe et al., Stelios: Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity, Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pp.901-913, 2015.

M. Conti, . Crane, . Stephen, L. Davi, F. et al., Losing Control, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.952-963, 2015.
DOI : 10.1145/2382196.2382216

N. Carlini, A. Barresi, M. Payer, D. Wagner, and R. Gross, Thomas: Control-Flow Bending: On the Effectiveness of Control-Flow Integrity, Proceedings of the 24th USENIX Conference on Security (SEC), 2015.

C. Luk, R. Cohn, R. Muth, . Patil, . Harish et al., Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI, pp.190-200, 2005.