• Li Y, Bao Y and Chung Y. Randomize the Running Function When It Is Disclosed. IEEE Transactions on Computers. 10.1109/TC.2024.3371776. 73:6. (1516-1530).

    https://ieeexplore.ieee.org/document/10458890/

  • Biernacki L, Gallagher M, Bertacco V and Austin T. (2020). Thwarting Control Plane Attacks with Displaced and Dilated Address Spaces 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 10.1109/HOST45689.2020.9300273. 978-1-7281-7405-1. (57-68).

    https://ieeexplore.ieee.org/document/9300273/

  • Jones J, Hiser J, Davidson J and Forrest S. Defeating denial-of-service attacks in a self-managing N-variant system. Proceedings of the 14th International Symposium on Software Engineering for Adaptive and Self-Managing Systems. (126-138).

    https://doi.org/10.1109/SEAMS.2019.00024

  • Shen Z and Chen W. A Survey of Research on Runtime Rerandomization Under Memory Disclosure. IEEE Access. 10.1109/ACCESS.2019.2931707. 7. (105432-105440).

    https://ieeexplore.ieee.org/document/8779619/

  • Wang F, Kwon Y, Ma S, Zhang X and Xu D. Lprov. Proceedings of the 34th Annual Computer Security Applications Conference. (605-617).

    https://doi.org/10.1145/3274694.3274751

  • Fraunholz D, Krohmer D, Duque Anton S and Schotten H. Catch Me If You Can. Proceedings of the 5th ACM Workshop on Moving Target Defense. (31-39).

    https://doi.org/10.1145/3268966.3268970