A Survey of Research on Runtime Rerandomization Under Memory Disclosure

DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software

A Hardware Accelerator for Tracing Garbage Collection

Leakage Is Prohibited: Memory Protection Extensions Protected Address Space Randomization

Covert channel attacks in pervasive computing

Mosquito: Covert ultrasonic transmissions between two air-gapped computers using speaker-to-speaker communication (pdf)

Intellectual Control

HW-CDI: Hard-Wired Control Data Integrity

Detection of cyberbullying with the aid of deep learning method.

The First Public Discussion of the Secret Colossus Project