One of the papers I had a brief look at is this one-

https://ieeexplore.ieee.org/abstract/document/7546545



On Fri, Feb 22, 2019 at 1:16 AM Kees Cook <keescook@chromium.org> wrote:
On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng <cartercheng@gmail.com> wrote:
> I was looking over some recent papers for Usenix Security and there are a couple on data oriented programming and I have been wondering if there are known mitigation techniques for this kind of data corruption attack or other attacks that don't involve control flow hijacking.

Can you share some URLs and/or examples? I'm sure other folks here
would be interested to read those too.

--
Kees Cook