Write an examine the effectiveness of a modern exploit mitigation control at a technical level, specifically addressing current academic and industry literature pertaining to the strengths and weaknesses of the control.
1. Rope: Bypassing Behavioral Detection of Malware with Distributed ROP-driven Execution
2. SoK: Shining Light on Shadow Stacks
3. PESC: A Per System-Call Stack Canary Design for Linux Kernel
4. Color My World: Deterministic Tagging for Memory Safety