, Mike zaby's CHIP-8 implementation

M. Abadi, . Budiu, . Mihai, ´. Erlingsson, . Ulfar et al., Controlflow integrity principles, implementations, and applications, vol.13, pp.1-40

N. Burow, S. A. Carr, J. Nash, P. Larsen, M. Franz et al., Control-flow integrity: Precision, security, and performance, vol.50, pp.1-33

J. L. Danger, S. Guilley, and F. Praden, Hardware-enforced protection against software reverse-engineering based on an instruction set encoding, pp.1-11

L. Davi, M. Hanreich, D. Paul, A. R. Sadeghi, P. Koeberl et al., HAFIX: hardware-assisted flow integrity extension, pp.1-6

L. Davi, P. Koeberl, and A. R. Sadeghi, Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation, pp.1-6

A. Dehbaoui, J. M. Dutertre, B. Robisson, and A. Tria, Electromagnetic transient faults injection on a hardware and a software implementations of AES, pp.7-15
URL : https://hal.archives-ouvertes.fr/emse-00742639

M. Frantzen and M. Shuey, StackGhost: Hardware facilitated stack protection

T. Hiscock, O. Savry, and L. Goubin, Lightweight software encryption for embedded processors, pp.213-220

G. S. Kc, A. D. Keromytis, and V. Prevelakis, Countering code-injection attacks with instruction-set randomization p, p.10

N. Moro, A. Dehbaoui, K. Heydemann, B. Robisson, and E. Encrenaz, Electromagnetic fault injection: Towards a fault model on a 32-bit microcontroller, pp.77-88
URL : https://hal.archives-ouvertes.fr/emse-00871218

R. D. Ruan-de-clercq, B. Keulenaer, B. Coppens, P. Yang, and . Maene, Verbauwhede: SOFIA: Software and control flow integrity architecture

A. Tang, S. Sethumadhavan, and S. Stolfo, CLKSCREW: Exposing the perils of security-oblivious energy management, Proceedings of the Second Workshop on Real, Large Distributed Systems. USENIX, p.255334142

C. Tice, T. Roeder, P. Collingbourne, . Checkoway, . Stephen et al., Enforcing forward-edge control-flow integrity in GCC & LLVM p, p.15

V. Van-der-veen, Y. Fratantonio, M. Lindorfer, D. Gruss, C. Maurice et al., Drammer: Deterministic rowhammer attacks on mobile platforms, pp.1675-1689