, Data execution prevention, vol.Accessed, pp.2018-2020, 2003.
, Linux kernel 2.6.8, pp.2018-2020, 2004.
, Windows isv software security defenses, pp.2018-2020, 2010.
, Control flow guard (windows) -msdn -microsoft, pp.2018-2022, 2015.
, Intel control-flow enforcement technology, 2017.
, Bladeenc: Vulnerability statistics, vol.Accessed, 2018.
, , pp.2018-2022, 2013.
Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security, pp.340-353, 2005. ,
Getting in control of your control flow with control-data isolation, Proceedings of the 13th ,
, Annual IEEE/ACM International Symposium on Code Generation and Optimization, pp.79-90, 2015.
Jump-oriented programming: a new class of code-reuse attack, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp.30-40, 2011. ,
When good instructions go bad: Generalizing return-oriented programming to risc, Proceedings of the 15th ACM conference on Computer and communications security, pp.27-38, 2008. ,
Control-flow bending: On the effectiveness of control-flow integrity, 24th USENIX Security Symposium (USENIX Security 15), pp.161-176, 2015. ,
A methodology for procedure cloning, Computer Languages, vol.19, issue.2, pp.105-117, 1993. ,
Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks, USENIX Security Symposium, vol.98, pp.63-78, 1998. ,
Pointguard tm: protecting pointers from buffer overflow vulnerabilities, Proceedings of the 12th conference on USENIX Security Symposium, vol.12, pp.91-104, 2003. ,
Practical return-oriented programming, SOURCE Boston, 2010. ,
Stack bounds protection with low fat pointers, 2017. ,
Control jujutsu: On the weaknesses of fine-grained control flow integrity, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.901-913, 2015. ,
Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard, Proceedings of the 23rd USENIX conference on Security Symposium, pp.417-432, 2014. ,
Out of control: Overcoming control-flow integrity, 2014 IEEE Symposium on Security and Privacy, pp.575-589, 2014. ,
Dynamic libraries, 2015. ,
Code-pointer integrity, 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), pp.147-163, 2014. ,
Looporiented programming: a new code reuse attack to bypass modern defenses, Trustcom/BigDataSE/ISPA, 2015 IEEE, vol.1, pp.190-197, 2015. ,
Defeating return-oriented rootkits with return-less kernels, Proceedings of the 5th European conference on Computer systems, pp.195-208, 2010. ,
Launching returnoriented programming attacks against randomized relocatable executables, Trust, Security and Privacy in Computing and Communications (TrustCom), pp.37-44, 2011. ,
Ccfi: cryptographically enforced control flow integrity, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.941-951, 2015. ,
Guidelines for the use of the c/c++ language in critical systems, MIRA Limited, 2012. ,
Opaque control-flow integrity, NDSS, vol.26, pp.27-30, 2015. ,
Softbound: Highly compatible and complete spatial memory safety for C, ACM Sigplan Notices, vol.44, issue.6, pp.245-258, 2009. ,
A binary rewriting defense against stack based buffer overflow attacks, USENIX Annual Technical Conference, pp.211-224, 2003. ,
Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications, Security and Privacy (SP), 2015 IEEE Symposium on, pp.745-762, 2015. ,
On the effectiveness of address-space randomization, Proceedings of the 11th ACM conference on Computer and communications security, pp.298-307, 2004. ,
Breaking the memory secrecy assumption, Proceedings of the Second European Workshop on System Security, pp.1-8, 2009. ,
Breaking active-set backward-edge CFI, Hardware Oriented Security and Trust (HOST, pp.85-89, 2017. ,
On the expressiveness of return-into-libc attacks, Recent Advances in Intrusion Detection, pp.121-141, 2011. ,
Mimicry attacks on host-based intrusion detection systems, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp.255-264, 2002. ,
Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code, Proceedings of the 2012 ACM conference on Computer and communications security, pp.157-168, 2012. ,
RIPE: Runtime intrusion prevention evaluator, Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC. ACM, 2011. ,
Practical control flow integrity and randomization for binary executables, Security and Privacy (SP), 2013 IEEE Symposium on, pp.559-573, 2013. ,
Control flow integrity for cots binaries, USENIX Security Symposium, pp.337-352, 2013. ,