Abstract is missing.
- How memory safety violations enable exploitation of programsMathias Payer. 1-23 [doi]
- Protecting dynamic codeGang Tan, Ben Niu. 25-60 [doi]
- Diversity and information leaksStephen Crane, Andrei Homescu, Per Larsen, Hamed Okhravi, Michael Franz. 61-79 [doi]
- Code-pointer integrityVolodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, Dawn Song. 81-116 [doi]
- Evaluating control-flow restricting defensesEnes Göktas, Elias Athanasopoulos, Herbert Bos, Georgios Portokalidis. 117-137 [doi]
- Attacking dynamic codeFelix Schuster, Thorsten Holz. 139-180 [doi]
- Hardware control flow integrityYier Jin, Dean Sullivan, Orlando Arias, Ahmad-Reza Sadeghi, Lucas Davi. 181-210 [doi]
- Multi-variant execution environmentsBart Coppens, Bjorn De Sutter, Stijn Volckaert. 211-258 [doi]