1. Control-flow integrity
2. S. Andersen and V. Abella. 2004. Data Execution Prevention: Changes to Functionality in Microsoft Windows XP Service Pack 2 Part 3: Memory Protection Technologies. http://technet.microsoft.com/en-us/library/bb457155.aspx Accessed: 2021 Oct 10 S. Andersen and V. Abella. 2004. Data Execution Prevention: Changes to Functionality in Microsoft Windows XP Service Pack 2 Part 3: Memory Protection Technologies. http://technet.microsoft.com/en-us/library/bb457155.aspx Accessed: 2021 Oct 10
3. Julian Bangert , Sergey Bratus , Rebecca Shapiro , Michael E. Locasto , Jason Reeves , Sean W. Smith , and Anna Shubina . 2013. ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection . Dartmouth University . https://digitalcommons.dartmouth.edu/cs_tr/345 Julian Bangert, Sergey Bratus, Rebecca Shapiro, Michael E. Locasto, Jason Reeves, Sean W. Smith, and Anna Shubina. 2013. ELFbac: Using the Loader Format for Intent-Level Semantics and Fine-Grained Protection. Dartmouth University. https://digitalcommons.dartmouth.edu/cs_tr/345
4. Survey of code-size reduction methods
5. Mitigating code-reuse attacks with control-flow locking