1. Biondo A , Conti M , “ The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel {SGX} ”. Proc. The 27th USENIX Security Symposium. 2018: 1213-1227 . Biondo A, Conti M, “The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel {SGX}”. Proc. The 27th USENIX Security Symposium. 2018: 1213-1227.
2. BBB-CFI
3. Crane S J , Volckaert S , Schuster F , “ It's a TRaP: Table randomization and protection against function-reuse attacks ”. Proc. The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 243-255 . DOI:https://doi.org/10.1145/2810103.2813682 10.1145/2810103.2813682 Crane S J, Volckaert S, Schuster F, “It's a TRaP: Table randomization and protection against function-reuse attacks”. Proc. The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 243-255. DOI:https://doi.org/10.1145/2810103.2813682
4. Signature-Based Protection from Code Reuse Attacks
5. DeLozier C , Lakshminarayanan K , Pokam G , “ Hurdle: Securing Jump Instructions Against Code Reuse Attacks ”. Proc. The 25th International Conference on Architectural Support for Programming Languages and Operating Systems. 2020: 653-666 . DOI:https://doi.org/10.1145/3373376.3378506 10.1145/3373376.3378506 DeLozier C, Lakshminarayanan K, Pokam G, “Hurdle: Securing Jump Instructions Against Code Reuse Attacks”. Proc. The 25th International Conference on Architectural Support for Programming Languages and Operating Systems. 2020: 653-666. DOI:https://doi.org/10.1145/3373376.3378506