Q: Exploit Hardening Made Easy, Proceedings of the 20th USENIX Conference on Security (SEC), pp.25-40, 2011. ,
Jumporiented Programming: A New Class of Code-reuse Attack, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp.30-40, 2011. ,
Control-flow integrity principles, implementations, and applications, ACM Transactions on Information and System Security, vol.13, issue.1, pp.1-440, 2009. ,
DOI : 10.1145/1609956.1609960
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing, Proceedings of the 22Nd USENIX Conference on Security (SEC), pp.447-462, 2013. ,
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23156
Nael: SCRAP: Architecture for Signature-based Protection from Code Reuse Attacks, Proceedings of the 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA), pp.258-269, 2013. ,
DOI : 10.1109/hpca.2013.6522324
URL : http://www.cs.binghamton.edu/%7Enael/pubs/hpca13.pdf
Size Does Matter: Why Using Gadget-chain Length to Prevent Code-reuse Attacks is Hard, Proceedings of the 23rd USENIX Conference on Security Symposium (SEC), pp.417-432, 2014. ,
Branch regulation, Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA, pp.94-105, 2012. ,
DOI : 10.1145/2366231.2337171
Practical Control Flow Integrity and Randomization for Binary Executables, Proceedings of the 34th IEEE Symposium on Security and Privacy (SP, pp.559-573, 2013. ,
Control Flow Integrity for COTS Binaries, Proceedings of the 22Nd USENIX Conference on Security (SEC), pp.337-352, 2013. ,
DOI : 10.1145/2818000.2818016
Out of Control: Overcoming Control-Flow Integrity, 2014 IEEE Symposium on Security and Privacy, pp.575-589, 2014. ,
DOI : 10.1109/SP.2014.43
ROP is Still Dangerous: Breaking Modern Defenses, Proceedings of the 23rd USENIX Conference on Security Symposium (SEC), pp.385-399, 2014. ,
Stitching the Gadgets: On the Ineffectiveness of Coarse-grained Control-flow Integrity Protection, Proceedings of the 23rd USENIX Conference on Security Symposium (SEC), pp.401-416, 2014. ,
Hardware-Assisted Fine-Grained Control-Flow Integrity, Proceedings of the The 51st Annual Design Automation Conference on Design Automation Conference, DAC '14, pp.1-6, 2014. ,
DOI : 10.1145/2593069.2596656
Stelios: Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity, Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pp.901-913, 2015. ,
Losing Control, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.952-963, 2015. ,
DOI : 10.1145/2382196.2382216
Thomas: Control-Flow Bending: On the Effectiveness of Control-Flow Integrity, Proceedings of the 24th USENIX Conference on Security (SEC), 2015. ,
Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI, pp.190-200, 2005. ,