Jeremy Brown & David Seidman - Microsoft Vulnerability Research: How to be a finder as a vendor [Rooted CON 2014]
Non-Control-Data Attacks and Securing software by enforcing data- flow integrity Zhiqiang Lin Mar 28, 2007 CS590 paper presentation.
Vigilante: End-to-End Containment of Internet Worms
The Emergence of Software Security Standards
Securing software by enforcing data-flow integrity