, Mike zaby's CHIP-8 implementation
, Controlflow integrity principles, implementations, and applications, vol.13, pp.1-40
Control-flow integrity: Precision, security, and performance, vol.50, pp.1-33 ,
Hardware-enforced protection against software reverse-engineering based on an instruction set encoding, pp.1-11 ,
HAFIX: hardware-assisted flow integrity extension, pp.1-6 ,
Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation, pp.1-6 ,
Electromagnetic transient faults injection on a hardware and a software implementations of AES, pp.7-15 ,
URL : https://hal.archives-ouvertes.fr/emse-00742639
StackGhost: Hardware facilitated stack protection ,
Lightweight software encryption for embedded processors, pp.213-220 ,
Countering code-injection attacks with instruction-set randomization p, p.10 ,
Electromagnetic fault injection: Towards a fault model on a 32-bit microcontroller, pp.77-88 ,
URL : https://hal.archives-ouvertes.fr/emse-00871218
, Verbauwhede: SOFIA: Software and control flow integrity architecture
CLKSCREW: Exposing the perils of security-oblivious energy management, Proceedings of the Second Workshop on Real, Large Distributed Systems. USENIX, p.255334142 ,
, Enforcing forward-edge control-flow integrity in GCC & LLVM p, p.15
Drammer: Deterministic rowhammer attacks on mobile platforms, pp.1675-1689 ,