4. P. Chen, H. Xiao, X. Shen, X. Yin, B. Mao, and L. Xie. Drop: Detecting return-oriented
programming malicious code. In Prakash and Gupta [10], pages 163–177.
5. T. Dullien, T. Kornau, and R.-P. Weinmann. A framework for automated architecture-
independent gadget search. In Proceedings of the 4th USENIX conference on Offensive
technologies, WOOT’10, pages 1–, Berkeley, CA, USA, 2010. USENIX Association.
6. A. Francillon, D. Perito, and C. Castelluccia. Defending embedded systems against control
flow attacks. In Proceedings of the first ACM workshop on Secure execution of untrusted
code, SecuCode ’09, pages 19–26, New York, NY, USA, 2009. ACM.
7. R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkits: bypassing kernel code in-
tegrity protection mechanisms. In Proceedings of the 18th conference on USENIX security
symposium, SSYM’09, pages 383–398, Berkeley, CA, USA, 2009. USENIX Association.
8. K. Lu, D. Zou, W. Wen, and D. Gao. derop: removing return-oriented programming from
malware. In Proceedings of the 27th Annual Computer Security Applications Conference,
ACSAC ’11, pages 363–372, New York, NY, USA, 2011. ACM.
9. K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda. G-free: defeating return-
oriented programming through gadget-less binaries. In Proceedings of the 26th Annual
Computer Security Applications Conference, ACSAC ’10, pages 49–58, New York, NY,
USA, 2010. ACM.
10. A. Prakash and I. Gupta, editors. Information Systems Security, 5th International Confer-
ence, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, volume 5905 of Lec-
ture Notes in Computer Science. Springer, 2009.
11. H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness
of address-space randomization. In Proceedings of the 11th ACM conference on Computer
and communications security, CCS ’04, pages 298–307, New York, NY, USA, 2004. ACM.
12. R. Strackx, Y. Younan, P. Philippaerts, F. Piessens, S. Lachmund, and T. Walter. Breaking the
memory secrecy assumption. In Proceedings of the Second European Workshop on System
Security, EUROSEC ’09, pages 1–8, New York, NY, USA, 2009. ACM.
13. H. Xu and S. J. Chapin. Address-space layout randomization using code islands. J. Comput.
Secur., 17(3):331–362, Aug. 2009.
92