1. Lecture Notes in Computer Science;M. Abadi,1998
2. Abadi, M., Budiu, M., Erlingsson, Ú., Ligatti, J.: Control-Flow Integrity: Principles, Implementations, and Applications. ACM Transactions on Information and System Security 13(1), 1–40 (2009)
3. Abadi, M., Plotkin, G.D.: On protection by layout randomization. ACM Transactions on Information and System Security (to appear, 2012); The talk at FM 2012 will also cover an unpublished variant, joint work with Jérémy Planul
4. Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: Proceedings of the 7th Usenix Security Symposium, pp. 63–78 (1998)
5. Druschel, P., Peterson, L.L.: High-Performance Cross-Domain Data Transfer. Technical Report TR 92-11, Department of Computer Science, The University of Arizona (March 1992)