{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T03:00:14Z","timestamp":1767927614658,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540297970","type":"print"},{"value":"9783540322504","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11576280_9","type":"book-chapter","created":{"date-parts":[[2005,10,24]],"date-time":"2005-10-24T14:01:26Z","timestamp":1130162486000},"page":"111-124","source":"Crossref","is-referenced-by-count":34,"title":["A Theory of Secure Control Flow"],"prefix":"10.1007","author":[{"given":"Mart\u00edn","family":"Abadi","sequence":"first","affiliation":[]},{"given":"Mihai","family":"Budiu","sequence":"additional","affiliation":[]},{"given":"\u00dalfar","family":"Erlingsson","sequence":"additional","affiliation":[]},{"given":"Jay","family":"Ligatti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/BFb0055109","volume-title":"Automata, Languages and Programming","author":"M. Abadi","year":"1998","unstructured":"Abadi, M.: Protection in programming-language translations. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol.\u00a01443, pp. 868\u2013883. Springer, Heidelberg (1998)"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, \u00da., Ligatti, J.: Control-flow integrity: Principles, implementations, and applications. In: Proceedings of the ACM Conference on Computer and Communications Security, 2005. A preliminary version appears as Microsoft Research Technical Report MSR-TR-05-18 (February 2005)","DOI":"10.1145\/1102120.1102165"},{"key":"9_CR3","unstructured":"Abadi, M., Budiu, M., Erlingsson, \u00da., Ligatti, J.: Further formal material on CFI and SMAC (2005), available at http:\/\/research.microsoft.com\/research\/sv\/gleipnir (Manuscript)"},{"key":"9_CR4","unstructured":"Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q., Hinton, H.: StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proceedings of the Usenix Security Symposium, pp. 63\u201378 (1998)"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Schneider, F.B.: SASI enforcement of security policies: A retrospective. In: Proceedings of the New Security Paradigms Workshop, pp. 87\u201395 (1999)","DOI":"10.1109\/DISCEX.2000.821527"},{"key":"9_CR6","unstructured":"Hamid, N., Shao, Z., Trifonov, V., Monnier, S., Ni, Z.: A Syntactic Approach to Foundational Proof-Carrying Code. Technical Report YALEU\/DCS\/TR-1224, Dept. of Computer Science, Yale University (2002)"},{"issue":"1-2","key":"9_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J. Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security\u00a04(1-2), 2\u201316 (2005)","journal-title":"International Journal of Information Security"},{"key":"9_CR8","unstructured":"Microsoft Corporation. Changes to functionality in Microsoft Windows XP SP2: Memory protection technologies (2004), http:\/\/www.microsoft.com\/technet\/prodtechnol\/winxppro\/maintain\/sp2mempr.mspx"},{"issue":"3","key":"9_CR9","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1145\/319301.319345","volume":"21","author":"G. Morrisett","year":"1999","unstructured":"Morrisett, G., Walker, D., Crary, K., Glew, N.: From System F to typed assembly language. ACM Transactions on Programming Languages and Systems\u00a021(3), 527\u2013568 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Necula, G.: Proof-carrying code. In: Proceedings of the 24th ACM Symposium on Principles of Programming Languages, pp. 106\u2013119 (January 1997)","DOI":"10.1145\/263699.263712"},{"key":"9_CR11","unstructured":"PaX Project. The PaX project (2004), http:\/\/pax.grsecurity.net\/"},{"issue":"4","key":"9_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MSP.2004.36","volume":"2","author":"J. Pincus","year":"2004","unstructured":"Pincus, J., Baker, B.: Beyond stack smashing: Recent advances in exploiting buffer overruns. IEEE Security and Privacy\u00a02(4), 20\u201327 (2004)","journal-title":"IEEE Security and Privacy"},{"key":"9_CR13","unstructured":"Ruwase, O., Lam, M.S.: A practical dynamic buffer overflow detector. In: Proceedings of Network and Distributed System Security Symposium, pp. 159\u2013169 (2004)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E.-J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 298\u2013307 (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"9_CR15","unstructured":"Srivastava, A., Edwards, A., Vo, H.: Vulcan: Binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, Microsoft Research (2001)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Srivastava, A., Eustace, A.: ATOM: A system for building customized program analysis tools. Technical Report WRL Research Report 94\/2, Digital Equipment Corporation (1994)","DOI":"10.1145\/178243.178260"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Lee, J.W., Zhang, D., Devadas, S.: Secure program execution via dynamic information flow tracking. In: Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 85\u201396 (2004)","DOI":"10.1145\/1024393.1024404"},{"issue":"5","key":"9_CR18","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1145\/173668.168635","volume":"27","author":"R. Wahbe","year":"1993","unstructured":"Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. ACM SIGOPS Operating Systems Review\u00a027(5), 203\u2013216 (1993)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"9_CR19","unstructured":"Wilander, J., Kamkar, M.: A comparison of publicly available tools for dynamic buffer overflow prevention. In: Proceedings of the Network and Distributed System Security Symposium, pp. 149\u2013162 (2003)"},{"key":"9_CR20","unstructured":"Xu, J., Kalbarczyk, Z., Iyer, R.K.: Transparent runtime randomization for security. In: Proceedings of the Symposium on Reliable and Distributed Systems, pp. 260\u2013269 (2003)"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11576280_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:59:37Z","timestamp":1605643177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11576280_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540297970","9783540322504"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11576280_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}