Detecting Code Reuse Attacks with a Model of Conformant Program Execution. Jacobson, E. R., Bernat, A. R., Williams, W. R., & Miller, B. P. In Proceedings of Engineering Secure Software and Systems (ESSoS), pages 1-18, 2014.
Detecting Code Reuse Attacks with a Model of Conformant Program Execution [link]Paper  bibtex   
@inproceedings{ dblp1557631,
  title = {Detecting Code Reuse Attacks with a Model of Conformant Program Execution},
  author = {Emily R. Jacobson and Andrew R. Bernat and William R. Williams and Barton P. Miller},
  author_short = {Jacobson, E. R. and Bernat, A. R. and Williams, W. R. and Miller, B. P.},
  bibtype = {inproceedings},
  type = {inproceedings},
  year = {2014},
  key = {dblp1557631},
  id = {dblp1557631},
  biburl = {http://www.dblp.org/rec/bibtex/conf/essos/JacobsonBWM14},
  url = {http://dx.doi.org/10.1007/978-3-319-04897-0_1},
  conference = {ESSoS},
  pages = {1-18},
  text = {ESSoS 2014:1-18},
  booktitle = {Proceedings of Engineering Secure Software and Systems (ESSoS)}
}

Downloads: 0