Code-pointer integrity
暂无分享,去创建一个
George Candea | Dawn Xiaodong Song | R. Sekar | Mathias Payer | Volodymyr Kuznetsov | Laszlo Szekeres | D. Song | G. Candea | Mathias Payer | R. Sekar | László Szekeres | Volodymyr Kuznetsov | George Candea
[1] John M. Rushby,et al. Design and verification of secure systems , 1981, SOSP.
[2] L. Peter Deutsch,et al. Efficient implementation of the smalltalk-80 system , 1984, POPL.
[3] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[4] Craig Chambers,et al. Optimizing Dynamically-Typed Object-Oriented Languages With Polymorphic Inline Caches , 1991, ECOOP.
[5] Craig Chambers,et al. Debugging optimized code with dynamic deoptimization , 1992, PLDI '92.
[6] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[7] Frederick B. Cohen,et al. Operating system protection through program evolution , 1993, Comput. Secur..
[8] David Grove,et al. Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis , 1995, ECOOP.
[9] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[10] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[11] Nir Shavit,et al. Software transactional memory , 1995, PODC '95.
[12] Klaus Erik Schauser,et al. Consh: Confined Execution Environment for Internet Computations , 1998 .
[13] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[14] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[15] Anurag Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications , 2000, USENIX Security Symposium.
[16] Calton Pu,et al. SubDomain: Parsimonious Server Security , 2000, LISA.
[17] Michael Shuey,et al. StackGhost: Hardware Facilitated Stack Protection , 2001, USENIX Security Symposium.
[18] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[19] Derek Bruening,et al. Secure Execution via Program Shepherding , 2002, USENIX Security Symposium.
[20] Ravishankar K. Iyer,et al. A preemptive deterministic scheduling algorithm for multithreaded replicas , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[21] Crispin Cowan,et al. Linux security modules: general security support for the linux kernel , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[22] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[23] John Johansen,et al. PointGuard™: Protecting Pointers from Buffer Overflow Vulnerabilities , 2003, USENIX Security Symposium.
[24] Koen De Bosschere,et al. Instrumenting JVM`s at the machine code level , 2003 .
[25] Tal Garfinkel,et al. Ostia: A Delegating Architecture for Secure System Call Interposition , 2004, NDSS.
[26] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[27] P. Lawson,et al. Federal Communications Commission , 2004, Bell Labs Technical Journal.
[28] Vikram S. Adve,et al. Automatic pool allocation: improving performance by controlling data structure layout in the heap , 2005, PLDI '05.
[29] George C. Necula,et al. CCured: type-safe retrofitting of legacy software , 2005, TOPL.
[30] Martín Abadi,et al. A Theory of Secure Control Flow , 2005, ICFEM.
[31] Jun Xu,et al. Non-Control-Data Attacks Are Realistic Threats , 2005, USENIX Security Symposium.
[32] Daniel C. DuVarney,et al. Efficient Techniques for Comprehensive Protection from Memory Error Exploits , 2005, USENIX Security Symposium.
[33] Hans P. Reiser,et al. Consistent Replication of Multithreaded Distributed Objects , 2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06).
[34] Miguel Castro,et al. Securing software by enforcing data-flow integrity , 2006, OSDI '06.
[35] Martín Abadi,et al. Architectural support for software-based protection , 2006, ASID '06.
[36] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[37] Stephen McCamant,et al. Evaluating SFI for a CISC Architecture , 2006, USENIX Security Symposium.
[38] Ravishankar K. Iyer,et al. Active replication of multithreaded applications , 2006, IEEE Transactions on Parallel and Distributed Systems.
[39] Jack W. Davidson,et al. Evaluating fragment construction policies for SDT systems , 2006, VEE '06.
[40] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[41] Peng Ning,et al. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[42] Dinakar Dhurjati,et al. SAFECode: enforcing alias analysis for weakly typed languages , 2005, PLDI '06.
[43] Mick Bauer,et al. Paranoid penguin: an introduction to Novell AppArmor , 2006 .
[44] Vikram S. Adve,et al. Making context-sensitive points-to analysis with heap cloning practical for the real world , 2007, PLDI '07.
[45] Hovav Shacham,et al. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86) , 2007, CCS '07.
[46] Bryan Ford,et al. Vx32: Lightweight User-level Sandboxing on the x86 , 2008, USENIX Annual Technical Conference.
[47] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[48] Milo M. K. Martin,et al. Hardbound: architectural support for spatial safety of the C programming language , 2008, ASPLOS.
[49] Lorenzo Cavallaro,et al. Comprehensive Memory Error Protection via Diversity and Taint-Tracking , 2008 .
[50] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[51] Hovav Shacham,et al. When good instructions go bad: generalizing return-oriented programming to RISC , 2008, CCS.
[52] S. Bhatkar,et al. Data Space Randomization , 2008, DIMVA.
[53] Christof Fetzer,et al. Switchblade: enforcing dynamic personalized system call models , 2008, Eurosys '08.
[54] Yoann Guillot,et al. Automatic binary deobfuscation , 2009, Journal in Computer Virology.
[55] Mason Chang,et al. Trace-based just-in-time type specialization for dynamic languages , 2009, PLDI '09.
[56] Bennet S. Yee,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[57] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[58] Michael Franz,et al. Multi-variant execution: run-time defense against malicious code injection attacks , 2009 .
[59] Frank Piessens,et al. Breaking the memory secrecy assumption , 2009, EUROSEC '09.
[60] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[61] Marek Olszewski,et al. Kendo: efficient deterministic multithreading in software , 2009, ASPLOS.
[62] Miguel Castro,et al. Fast byte-granularity software fault isolation , 2009, SOSP '09.
[63] Miguel Castro,et al. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors , 2009, USENIX Security Symposium.
[64] Michael Franz,et al. Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space , 2009, EuroSys '09.
[65] Nikolaj Bjørner,et al. Generalized, efficient array decision procedures , 2009, 2009 Formal Methods in Computer-Aided Design.
[66] Satish Narayanasamy,et al. Respec: efficient online multiprocessor replayvia speculation and external determinism , 2010, ASPLOS XV.
[67] Ion Stoica,et al. Focus Replay Debugging Effort on the Control Plane , 2010, HotDep.
[68] Escape From Return-Oriented Programming : Return-oriented Programming without Returns ( on the x 86 ) , 2010 .
[69] Brandon Lucia,et al. DMP: Deterministic Shared-Memory Multiprocessing , 2010, IEEE Micro.
[70] Robert N. M. Watson,et al. Capsicum: Practical Capabilities for UNIX , 2010, USENIX Security Symposium.
[71] Nir Shavit,et al. Transactional Mutex Locks , 2010, Euro-Par.
[72] Hovav Shacham,et al. Return-oriented programming without returns , 2010, CCS '10.
[73] Milo M. K. Martin,et al. CETS: compiler enforced temporal safety for C , 2010, ISMM '10.
[74] Periklis Akritidis,et al. Cling: A Memory Allocator to Mitigate Dangling Pointers , 2010, USENIX Security Symposium.
[75] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[76] Leyla Bilge,et al. G-Free: defeating return-oriented programming through gadget-less binaries , 2010, ACSAC '10.
[77] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[78] Dan Grossman,et al. CoreDet: a compiler and runtime system for deterministic multithreaded execution , 2010, ASPLOS XV.
[79] Zhi Wang,et al. Comprehensive and Efficient Protection of Kernel Control Data , 2011, IEEE Transactions on Information Forensics and Security.
[80] Emery D. Berger,et al. Dthreads: efficient deterministic multithreading , 2011, SOSP.
[81] Yi Fang,et al. JITDefender: A Defense against JIT Spraying Attacks , 2011, SEC.
[82] Mark D. Hill,et al. Karma: scalable deterministic record-replay , 2011, ICS '11.
[83] Zhenkai Liang,et al. Jump-oriented programming: a new class of code-reuse attack , 2011, ASIACCS '11.
[84] Xuxian Jiang,et al. On the Expressiveness of Return-into-libc Attacks , 2011, RAID.
[85] Damian Dechev. The ABA problem in multicore data structures with collaborating operations , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[86] J. Gregory Morrisett,et al. Combining control-flow integrity and static analysis for efficient and validated data sandboxing , 2011, CCS '11.
[87] Úlfar Erlingsson,et al. Language-independent sandboxing of just-in-time compilation and self-modifying code , 2011, PLDI '11.
[88] Sergey Bratus,et al. Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation , 2011, login Usenix Mag..
[89] Wouter Joosen,et al. RIPE: runtime intrusion prevention evaluator , 2011, ACSAC '11.
[90] Egor Derevenetc,et al. SmartDec: Approaching C++ Decompilation , 2011, 2011 18th Working Conference on Reverse Engineering.
[91] Thomas R. Gross,et al. Fine-grained user-space security through virtualization , 2011, VEE '11.
[92] Lei Duan,et al. INSeRT: Protect Dynamic Code Generation against spraying , 2011, International Conference on Information Science and Technology.
[93] Lucas Davi,et al. ROPdefender: a detection tool to defend against return-oriented programming attacks , 2011, ASIACCS '11.
[94] David Brumley,et al. Q: Exploit Hardening Made Easy , 2011, USENIX Security Symposium.
[95] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[96] Niranjan Hasabnis,et al. Light-weight bounds checking , 2012, CGO '12.
[97] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[98] David Brumley,et al. Tachyon: Tandem Execution for Efficient Live Patch Testing , 2012, USENIX Security Symposium.
[99] Ahmad-Reza Sadeghi,et al. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones , 2012, NDSS.
[100] Rui Wu,et al. RIM: A Method to Defend from JIT Spraying Attack , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[101] Xu Zhou,et al. Exploiting parallelism in deterministic shared memory multiprocessing , 2012, J. Parallel Distributed Comput..
[102] Koen De Bosschere,et al. GHUMVEE: Efficient, Effective, and Flexible Replication , 2012, FPS.
[103] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[104] Mathias J. Payer. Safe loading and efficient runtime confinement , 2012 .
[105] Jonathon T. Giffin,et al. Static detection of C++ vtable escape vulnerabilities in binary code , 2012, NDSS.
[106] Christoforos E. Kozyrakis,et al. Usenix Association 10th Usenix Symposium on Operating Systems Design and Implementation (osdi '12) 335 Dune: Safe User-level Access to Privileged Cpu Features , 2022 .
[107] Milo M. K. Martin,et al. Watchdog: Hardware for safe and secure manual memory management and full memory safety , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[108] Jack W. Davidson,et al. ILR: Where'd My Gadgets Go? , 2012, 2012 IEEE Symposium on Security and Privacy.
[109] Yutao Liu,et al. CFIMon: Detecting violation of control flow integrity using performance counters , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[110] Mehmet Kayaalp,et al. Branch regulation: Low-overhead protection from code reuse attacks , 2012, 2012 39th Annual International Symposium on Computer Architecture (ISCA).
[111] Jean-Philippe Aumasson,et al. SipHash: A Fast Short-Input PRF , 2012, INDOCRYPT.
[112] Kevin W. Hamlen,et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code , 2012, CCS.
[113] Jakob Eriksson,et al. Conversion: multi-version concurrency control for main memory segments , 2013, EuroSys '13.
[114] Fan Yao,et al. JOP-alarm: Detecting jump-oriented programming-based anomalies in applications , 2013, 2013 IEEE 31st International Conference on Computer Design (ICCD).
[115] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[116] Carsten Willems,et al. Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.
[117] Per Larsen,et al. Librando: transparent code randomization for just-in-time compilers , 2013, CCS.
[118] Ahmad-Reza Sadeghi,et al. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization , 2013, 2013 IEEE Symposium on Security and Privacy.
[119] Dawn Xiaodong Song,et al. SoK: Eternal War in Memory , 2013, 2013 IEEE Symposium on Security and Privacy.
[120] Mehmet Kayaalp,et al. SCRAP: Architecture for signature-based protection from Code Reuse Attacks , 2013, 2013 IEEE 19th International Symposium on High Performance Computer Architecture (HPCA).
[121] Ben Niu,et al. Monitor integrity protection with space efficiency and separate compilation , 2013, CCS.
[122] Per Larsen,et al. Booby trapping software , 2013, NSPW '13.
[123] Thorsten Holz,et al. Control-flow restrictor: compiler-based CFI for iOS , 2013, ACSAC.
[124] Chao Zhang,et al. Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.
[125] Rui Wu,et al. JITSafe: a framework against Just-in-time spraying attacks , 2013, IET Inf. Secur..
[126] Cristian Cadar,et al. Safe software updates via multi-version execution , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[127] Per Larsen,et al. Profile-guided automated software diversity , 2013, Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO).
[128] Junfeng Yang,et al. Parrot: a practical runtime for deterministic, stable, and reliable threads , 2013, SOSP.
[129] Úlfar Erlingsson,et al. Strato: A Retargetable Framework for Low-Level Inlined-Reference Monitors , 2013, USENIX Security Symposium.
[130] Angelos D. Keromytis,et al. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing , 2013, USENIX Security Symposium.
[131] Michael Backes,et al. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing , 2014, USENIX Security Symposium.
[132] Ben Niu,et al. Modular control-flow integrity , 2014, PLDI.
[133] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[134] Dan Boneh,et al. Cryptographically Enforced Control Flow Integrity , 2014, ArXiv.
[135] Ben Niu,et al. RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity , 2014, CCS.
[136] Per Larsen,et al. SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.
[137] R. Sekar,et al. Eternal War in Memory , 2014, IEEE Security & Privacy.
[138] Thorsten Holz,et al. Towards automated integrity protection of C++ virtual function tables in binary programs , 2014, ACSAC.
[139] Ahmad-Reza Sadeghi,et al. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).
[140] Tarek S. Abdelrahman,et al. What is the cost of weak determinism? , 2014, 2014 23rd International Conference on Parallel Architecture and Compilation (PACT).
[141] Vikram S. Adve,et al. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels , 2014, 2014 IEEE Symposium on Security and Privacy.
[142] Ahmad-Reza Sadeghi,et al. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection , 2014, USENIX Security Symposium.
[143] David A. Wagner,et al. ROP is Still Dangerous: Breaking Modern Defenses , 2014, USENIX Security Symposium.
[144] Robert H. Deng,et al. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks , 2014, NDSS.
[145] Michael Backes,et al. You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code , 2014, CCS.
[146] Moritz Contag,et al. Evaluating the Effectiveness of Current Anti-ROP Defenses , 2014, RAID.
[147] Xin Wu,et al. HDROP: Detecting ROP Attacks Using Performance Monitoring Counters , 2014, ISPEC.
[148] Herbert Bos,et al. Out of Control: Overcoming Control-Flow Integrity , 2014, 2014 IEEE Symposium on Security and Privacy.
[149] Herbert Bos,et al. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard , 2014, USENIX Security Symposium.
[150] Jeff Seibert,et al. Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code , 2014, CCS.
[151] Sorin Lerner,et al. SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks , 2014, NDSS.
[152] Kai Lu,et al. Efficient deterministic multithreading without global barriers , 2014, PPoPP '14.
[153] Liang Deng,et al. ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries , 2015, SEC.
[154] David A. Wagner,et al. The Performance Cost of Shadow Stacks and Stack Canaries , 2015, AsiaCCS.
[155] Cristian Cadar,et al. VARAN the Unbelievable: An Efficient N-version Execution Framework , 2015, ASPLOS.
[156] Dan Boneh,et al. CCFI: Cryptographically Enforced Control Flow Integrity , 2015, CCS.
[157] Stelios Sidiroglou,et al. Missing the Point(er): On the Effectiveness of Code Pointer Integrity , 2015, 2015 IEEE Symposium on Security and Privacy.
[158] Milo M. K. Martin,et al. Everything You Want to Know About Pointer-Based Checking , 2015, SNAPL.
[159] Zhenkai Liang,et al. Automatic Generation of Data-Oriented Exploits , 2015, USENIX Security Symposium.
[160] Heng Yin,et al. vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries , 2015, NDSS.
[161] Per Larsen,et al. Readactor: Practical Code Randomization Resilient to Memory Disclosure , 2015, 2015 IEEE Symposium on Security and Privacy.
[162] David A. Wagner,et al. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity , 2015, USENIX Security Symposium.
[163] Ahmad-Reza Sadeghi,et al. HAFIX: Hardware-Assisted Flow Integrity eXtension , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[164] Herbert Bos,et al. ShrinkWrap: VTable Protection without Loose Ends , 2015, ACSAC 2015.
[165] Stijn Volckaert,et al. Advanced techniques for multi-variant execution , 2015 .
[166] Peng Ning,et al. HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities , 2015, CODASPY.
[167] Ahmad-Reza Sadeghi,et al. Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming , 2015, NDSS.
[168] Ben Niu,et al. Per-Input Control-Flow Integrity , 2015, CCS.
[169] Ahmad-Reza Sadeghi,et al. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications , 2015, 2015 IEEE Symposium on Security and Privacy.
[170] Wenke Lee,et al. ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks , 2015, CCS.
[171] Thomas R. Gross,et al. Fine-Grained Control-Flow Integrity Through Binary Hardening , 2015, DIMVA.
[172] Per Larsen,et al. Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks , 2015, CCS.
[173] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[174] Per Larsen,et al. It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks , 2015, CCS.
[175] Dawn Xiaodong Song,et al. The Correctness-Security Gap in Compiler Optimization , 2015, 2015 IEEE Security and Privacy Workshops.
[176] Salvatore J. Stolfo,et al. Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads , 2015, CCS.
[177] Wenke Lee,et al. Type Casting Verification: Stopping an Emerging Attack Vector , 2015, USENIX Security Symposium.
[178] Xi Chen,et al. StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries , 2015, NDSS.
[179] Chao Zhang,et al. Exploiting and Protecting Dynamic Code Generation , 2015, NDSS.
[180] George Candea,et al. Poster : Getting The Point ( er ) : On the Feasibility of Attacks on Code-Pointer Integrity , 2015 .
[181] Ahmad-Reza Sadeghi,et al. Subversive-C: Abusing and Protecting Dynamic Message Dispatch , 2016, USENIX Annual Technical Conference.
[182] Thorsten Holz,et al. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding , 2016, NDSS.
[183] Herbert Bos,et al. Undermining Information Hiding (and What to Do about It) , 2016, USENIX Security Symposium.
[184] Herbert Bos,et al. Poking Holes in Information Hiding , 2016, USENIX Security Symposium.
[185] Scott A. Carr,et al. Control-Flow Integrity: Precision, Security, and Performance , 2016, 1602.04056.
[186] Per Larsen,et al. Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[187] Michalis Polychronakis,et al. No-Execute-After-Read: Preventing Code Disclosure in Commodity Software , 2016, AsiaCCS.
[188] Per Larsen,et al. Code Randomization: Haven’t We Solved This Problem Yet? , 2016, 2016 IEEE Cybersecurity Development (SecDev).
[189] Michalis Polychronakis,et al. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[190] Natarajan Shankar,et al. Double Helix and RAVEN: A System for Cyber Fault Tolerance and Recovery , 2016, CISRC.
[191] Bart Coppens,et al. Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution , 2016, IEEE Transactions on Dependable and Secure Computing.
[192] Per Larsen,et al. Secure and Efficient Application Monitoring and Replication , 2016, USENIX Annual Technical Conference.
[193] Koen Koning,et al. Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[194] Felix Schuster. Securing application software in modern adversarial settings , 2016 .
[195] Michael Backes,et al. What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses , 2016, USENIX Security Symposium.
[196] Ben Niu. Practical Control-Flow Integrity , 2016 .
[197] A. Jaleel. Memory Characterization of Workloads Using Instrumentation-Driven Simulation A Pin-based Memory Characterization of the SPEC CPU 2000 and SPEC CPU 2006 Benchmark Suites , 2022 .