Main navigation | Main content
Optional background reading:
Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay
Ligatti. “Control-flow integrity”. In ACM Conference on
Computer and Communications Security (CCS), pages 340–353,
Alexandria, VA, USA, November 2005.
[ACM]
Main reading for February 10th:
Mingwei Zhang and R. Sekar. “Control flow integrity for COTS
binaries”. In USENIX Security Symposium, Washington, DC,
USA, August 2013.
[USENIX]
Optional background reading:
Hovav Shacham. “The geometry of innocent flesh on the bone:
return-into-libc without function calls (on the x86)”. In ACM
Conference on Computer and Communications Security (CCS), pages
552–561, Alexandria, VA, USA, October 2007.
[ACM]
Main reading for February 12th:
Vasilis Pappas, Michalis Polychronakis, and Angelos
D. Keromytis. “Transparent ROP exploit mitigation using indirect
branch tracing”. In USENIX Security Symposium,
Washington, DC, USA, August 2013.
[USENIX]