{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:17:14Z","timestamp":1743074234201,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031262807"},{"type":"electronic","value":"9783031262814"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-26281-4_51","type":"book-chapter","created":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T06:47:02Z","timestamp":1676098022000},"page":"491-499","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["IPT-CFI: Control Flow Integrity Vulnerability Detection Based on Intel Processor Trace"],"prefix":"10.1007","author":[{"given":"Zhuorao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Baojiang","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Can","family":"Cui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,12]]},"reference":[{"key":"51_CR1","unstructured":"Zhang, J., Chen, C., Zheng, H.: Fuzzing sample optimization method for software vulnerability detection. Journal of Shandong University (Natural Science) (09), 1\u20138+35 (2019)"},{"key":"51_CR2","unstructured":"Erlingsson, M.A.M.B.U., Jigatti, J.: Control-flow integrity. In: CCS\u201905: Proceedings of the 12th ACM conference on Computer and Communications Security, pp. 340\u2013353 (2005)"},{"key":"51_CR3","unstructured":"Huang, Y., Fully Context-Sensitive Control-Flow Integrity. Huazhong University of Science and Technology (2017)"},{"key":"51_CR4","unstructured":"Wang, F., Zhang, T., Xu, W., Sun, M.: Overview of control-flow hijacking attack and defense techniques for process. Chin. J. Netw. Inf. Secur. 5(6), 10\u201320 (2019)"},{"key":"51_CR5","unstructured":"Gao, Y., Zhou, A., Liu, L.: Data-execution prevention technology in windows system. Chinese Journal of Information Security and Communication Confidentiality (07), 77\u201379+82 (2013)"},{"key":"51_CR6","unstructured":"Cowan, C., et al. :Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks. In: USENIX Security Symposium, vol. 98, pp. 63\u201378 (1998)"},{"key":"51_CR7","doi-asserted-by":"crossref","unstructured":"Tan, G., Jaeger, T.: CFG construction soundness in control-flow integrity. In: Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security (PLAS \u201917), pp. 3\u201313. Association for Computing Machinery, New York, NY, USA (2017)","DOI":"10.1145\/3139337.3139339"},{"key":"51_CR8","unstructured":"Joern. https:\/\/joern.io\/docs\/"},{"key":"51_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/978-3-642-22110-1_13","volume-title":"Computer Aided Verification","author":"S Bardin","year":"2011","unstructured":"Bardin, S., Herrmann, P., Leroux, J., Ly, O., Tabary, R., Vincent, A.: The BINCOA framework for binary code analysis. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 165\u2013170. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_13"},{"key":"51_CR10","unstructured":"IDAPro disassembler. http:\/\/www.datarescue.com\/idabase\/"},{"key":"51_CR11","unstructured":"Zhang, M., Sekar, R.: Control flow integrity for{COTS)binaries. In: Presented as Part of the 22nd Security Symposium, pp. 337\u201335 (2013)"},{"issue":"05","key":"51_CR12","first-page":"1333","volume":"29","author":"X Wang","year":"2018","unstructured":"Wang, X., Liu, Y., Chen, H.: Transparent protection of kernel module against ROP with intel processor trace. Chin. J. Soft. 29(05), 1333\u20131347 (2018)","journal-title":"Chin. J. Soft."},{"key":"51_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Y., Shi, P., Wang, X., Chen, H., Zang, B., Guan, H.: Transparent and efficient CFI enforcement with intel processor trace. In: 2017 IEEE International Symposium on High Performance Computer Architecture (HPCA), Austin, TX, pp. 529\u2013540 (2017)","DOI":"10.1109\/HPCA.2017.18"},{"key":"51_CR14","doi-asserted-by":"publisher","unstructured":"Wang, Y., et al.: Revery: from proof-of-concept to exploitable. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918), pp. 1914\u20131927. Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3243734.3243847","DOI":"10.1145\/3243734.3243847"},{"key":"51_CR15","doi-asserted-by":"crossref","unstructured":"Cheng, Y., et al.: ROPecker: a generic and practical approach for defending against ROP attack (2014)","DOI":"10.14722\/ndss.2014.23156"},{"key":"51_CR16","doi-asserted-by":"crossref","unstructured":"Van der Veen, V., et al.: Practical context-sensitive CFI. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015)","DOI":"10.1145\/2810103.2813673"},{"key":"51_CR17","unstructured":"Zhang, C., et al.: Practical control flow integrity and randomization for binary executables. In: 2013 IEEE Symposium on Security and Privacy. IEEE, pp. 559\u2013573 (2013)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-26281-4_51","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T06:56:55Z","timestamp":1676098615000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-26281-4_51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031262807","9783031262814"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-26281-4_51","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"12 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internetworking, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Semarang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indonesia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 February 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}