One of the papers I had a brief look at is this one- https://ieeexplore.ieee.org/abstract/document/7546545 On Fri, Feb 22, 2019 at 1:16 AM Kees Cook wrote: > On Thu, Feb 21, 2019 at 8:20 AM Carter Cheng > wrote: > > I was looking over some recent papers for Usenix Security and there are > a couple on data oriented programming and I have been wondering if there > are known mitigation techniques for this kind of data corruption attack or > other attacks that don't involve control flow hijacking. > > Can you share some URLs and/or examples? I'm sure other folks here > would be interested to read those too. > > -- > Kees Cook >