Abadi, M. N.; Budiu, M.; Erlingsson, Ú.; Ligatti, J. (November 2005). 〈Control-Flow Integrity: Principles, Implementations, and Applications〉. 《Proceedings of the 12th ACM conference on Computer and communications security - CCS '05》. 340–353쪽. doi:10.1145/1102120.1102165. ISBN1-59593-226-7.
Abadi, M. N.; Budiu, M.; Erlingsson, Ú.; Ligatti, J. (October 2009). “Control-flow integrity principles, implementations, and applications”. 《ACM Transactions on Information and System Security》 13: 1. doi:10.1145/1609956.1609960.
Shacham, H. (October 2007). 〈The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)〉. 《Proceedings of the 14th ACM conference on Computer and communications security - CCS '07》. 552–561쪽. doi:10.1145/1315245.1315313. ISBN978-1-59593-703-2.
Hiser, J.; Nguyen-Tuong, A.; Co, M.; Hall, M.; Davidson, J. W. (May 2012). 〈ILR: Where'd My Gadgets Go?〉. 《2012 IEEE Symposium on Security and Privacy》. 571–585쪽. doi:10.1109/SP.2012.39. ISBN978-1-4673-1244-8.