1. Martín Abadi , Mihai Budiu , Úlfar Erlingsson , and Jay Ligatti . 2005 . Control-Flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security ( Alexandria, VA, USA) (CCS ’05). Association for Computing Machinery, New York, NY, USA, 340–353. https://doi.org/10.1145/1102120.1102165 10.1145/1102120.1102165 Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. 2005. Control-Flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security (Alexandria, VA, USA) (CCS ’05). Association for Computing Machinery, New York, NY, USA, 340–353. https://doi.org/10.1145/1102120.1102165
2. NoVT: Eliminating C++ Virtual Calls to Mitigate Vtable Hijacking
3. Nikolaj Bjørner , Arie Gurfinkel , Ken McMillan , and Andrey Rybalchenko . 2015. Horn clause solvers for program verification . In Fields of Logic and Computation II. Springer , 24–51. Nikolaj Bjørner, Arie Gurfinkel, Ken McMillan, and Andrey Rybalchenko. 2015. Horn clause solvers for program verification. In Fields of Logic and Computation II. Springer, 24–51.
4. Protecting C++ Dynamic Dispatch Through VTable Interleaving
5. Nathan Burow , Scott A. Carr , Joseph Nash , Per Larsen , Michael Franz , Stefan Brunthaler , and Mathias Payer . 2017. Control-Flow Integrity: Precision, Security, and Performance. ACM Comput. Surv. 50, 1 , Article 16 (apr 2017 ), 33 pages. https://doi.org/10.1145/3054924 10.1145/3054924 Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, and Mathias Payer. 2017. Control-Flow Integrity: Precision, Security, and Performance. ACM Comput. Surv. 50, 1, Article 16 (apr 2017), 33 pages. https://doi.org/10.1145/3054924