1. Badaslr: exceptional cases of ASLR aiding exploitation;Jang;Comput. Secur.,2022
2. Stopping memory disclosures via diversification and replicated execution;Lu;IEEE Trans. Dependable Secure Comput,2021
3. Protecting COTS binaries from disclosure-guided code reuse attacks;Zhang,2017
4. Data-oriented programming: on the expressiveness of non-control data attacks;Hu,2016
5. You can run but you can't read: preventing disclosure exploits in executable code;Backes,2014