University of Minnesota
Security and Privacy in Computing
index.php

Readings on: binary hardening

Optional background reading: Martín Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. “Control-flow integrity”. In ACM Conference on Computer and Communications Security (CCS), pages 340–353, Alexandria, VA, USA, November 2005.
[ACM]

Main reading for February 10th: Mingwei Zhang and R. Sekar. “Control flow integrity for COTS binaries”. In USENIX Security Symposium, Washington, DC, USA, August 2013.
[USENIX]

Optional background reading: Hovav Shacham. “The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)”. In ACM Conference on Computer and Communications Security (CCS), pages 552–561, Alexandria, VA, USA, October 2007.
[ACM]

Main reading for February 12th: Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. “Transparent ROP exploit mitigation using indirect branch tracing”. In USENIX Security Symposium, Washington, DC, USA, August 2013.
[USENIX]