Wei J and Chen P. DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming. Journal of Computer Security. 10.3233/JCS-230053. 32:3. (221-246).
Li Y, Bao Y and Chung Y. Randomize the Running Function When It Is Disclosed. IEEE Transactions on Computers. 10.1109/TC.2024.3371776. 73:6. (1516-1530).
Chen K, Yang Q, Wang J, Ma D, Wang L and Xu Z.
(2024). What You See Is The Tip Of The Iceberg: A Novel Technique For Data Leakage Prevention 2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 10.1109/CSCWD61410.2024.10580487. 979-8-3503-4918-4. (2870-2875).
Gaidis A, Moreira J, Sun K, Milburn A, Atlidakis V and Kemerlis V. FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses. (527-546).
Tang Z, Ma D, Sun X, Chen K, Wang L and Jiang J.
(2023). Every Time Can Be Different: A Data Dynamic Protection Method Based on Moving Target Defense 2023 IEEE Symposium on Computers and Communications (ISCC). 10.1109/ISCC58397.2023.10218253. 979-8-3503-0048-2. (568-574).
Ghosh P, Gholap Y and Singh V.
(2023). On-Chip SRAM Disclosure Attack Prevention Technique for SoC 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design (IOLTS). 10.1109/IOLTS59296.2023.10224860. 979-8-3503-4135-5. (1-7).
Shen Z, Dharsee K and Criswell J. Randezvous: Making Randomization Effective on MCUs. Proceedings of the 38th Annual Computer Security Applications Conference. (28-41).
Blackburn C, Wang X and Ravindran B. Rave: A Modular and Extensible Framework for Program State Re-Randomization. Proceedings of the 9th ACM Workshop on Moving Target Defense. (3-10).
Liu Z, Zhang Z, Xi R, Zhu P and Ma B.
(2022). SoK: A Survey on Redundant Execution Technology 2021 International Conference on Advanced Computing and Endogenous Security. 10.1109/IEEECONF52377.2022.10013333. 978-1-6654-2449-3. (1-14).
Cheng L, Ahmed S, Liljestrand H, Nyman T, Cai H, Jaeger T, Asokan N and Yao D.
(2021). Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Transactions on Privacy and Security. 24:4. (1-36). Online publication date: 30-Nov-2021.
Lau T.
(2021). Software Reuse Exploits in Node.js Web Apps 2021 5th International Conference on System Reliability and Safety (ICSRS). 10.1109/ICSRS53853.2021.9660640. 978-1-6654-0049-7. (190-197).
Palit T, Firose Moon J, Monrose F and Polychronakis M.
(2021). DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection 2021 IEEE Symposium on Security and Privacy (SP). 10.1109/SP40001.2021.00082. 978-1-7281-8934-5. (1919-1937).