1. Control-flow integrity
2. Control-flow integrity principles, implementations, and applications
3. Erik Buchanan Ryan Roemer and Stefan Savage. 2008. Return-Oriented Programming: Exploits Without Code Injection. (2008). https://www.blackhat.com/presentations/bh-usa-08/Shacham/BH_US_08_Shacham_Return_Oriented_Programming.pdf Erik Buchanan Ryan Roemer and Stefan Savage. 2008. Return-Oriented Programming: Exploits Without Code Injection. (2008). https://www.blackhat.com/presentations/bh-usa-08/Shacham/BH_US_08_Shacham_Return_Oriented_Programming.pdf
4. When good instructions go bad
5. Control-Flow Integrity