Related references
Note: Only part of the references are listed.HARM: Hardware-Assisted Continuous Re-randomization for Microcontrollers
Jiameng Shi et al.
2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022) (2022)
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency
Feng Xuewei et al.
2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020) (2020)
Compiler-assisted Code Randomization
Hyungjoon Koo et al.
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming
Lucas Davi et al.
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)
Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization
Kevin Z. Snow et al.
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2013)
ILR: Where'd My Gadgets Go?
Jason Hiser et al.
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)
Extraction of forensically sensitive information from windows physical memory
S. M. Hejazi et al.
DIGITAL INVESTIGATION (2009)