Publisher
Springer Nature Switzerland
Reference24 articles.
1. Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: the 12th ACM Conference on Computer and Communications Security (CCS’05), pp. 340–353. ACM (2005). https://doi.org/10.1145/1102120.1102165
2. Brizendine, B., Babcock, A.: Pre-built JOP chains with the JOP ROCKET: bypassing DEP without ROP. In: Black Hat Asia, May 2021
3. Burow, N., et al.: Control-flow integrity: precision, security, and performance. ACM Comput. Surv. 50(1) (2017). https://doi.org/10.1145/3054924
4. Carlini, N., Wagner, D.: ROP is still dangerous: breaking modern defenses. In: the 23rd USENIX Conference on Security Symposium (SEC’14), pp. 385–399. USENIX Association (2014)
5. Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: the 17th ACM Conference on Computer and Communications Security (CCS’10), pp. 559–572. ACM (2010). https://doi.org/10.1145/1866307.1866370