{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T06:06:00Z","timestamp":1747375560428},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319063195"},{"type":"electronic","value":"9783319063201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06320-1_14","type":"book-chapter","created":{"date-parts":[[2014,4,27]],"date-time":"2014-04-27T20:59:27Z","timestamp":1398632367000},"page":"172-186","source":"Crossref","is-referenced-by-count":16,"title":["HDROP: Detecting ROP Attacks Using Performance Monitoring Counters"],"prefix":"10.1007","author":[{"given":"HongWei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xin","family":"Wu","sequence":"additional","affiliation":[]},{"given":"WenChang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"JinHui","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Riley, R., Jiang, X., Xu, D.: Guest-Transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. In: Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (2008)"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Seshadri, A., Luk, M., Qu, N., et al.: SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles (October 2007)","DOI":"10.1145\/1294261.1294294"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Z., Jiang, X., Grace, M., Bahram, S.: Defeating return-oriented rootkits with return-less kernels. In: Proceedings of the 5th ACM SIGOPS EuroSys Conference (2010)","DOI":"10.1145\/1755913.1755934"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Onarlioglu, K., Bilge, L., Lanzi, A., et al.: G-free: Defeating return-oriented programming through gadget-less binaries. In: Proceedings of the 26th ACSAC (2010)","DOI":"10.1145\/1920261.1920269"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., et al.: Return-oriented programming without returns. In: Proceedings of the 17th CCS (2010)","DOI":"10.1145\/1866307.1866370"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.W., et al.: Jump-oriented programming: A new class of code-reuse attack. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (2011)","DOI":"10.1145\/1966913.1966919"},{"key":"14_CR8","unstructured":"Hund, R., Holz, T., Freiling, F.: Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In: Proceedings of USENIX Security 2009. USENIX (August 2009)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Chen, P., Xing, X., Mao, B., et al.: Automatic construction of jump-oriented programming shellcode (on the x86). In: Proceedings of 6th ASIACCS (2011)","DOI":"10.1145\/1966913.1966918"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., et al.: When good instructions go bad: Generalizing return-oriented programming to RISC. In: Proceedings of the 15th ACM Conference on Computer and Communications Security (2008)","DOI":"10.1145\/1455770.1455776"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Feldman, A.J., Kantor, B., et al.: Can DREs provide long-lasting security? the case of return-oriented programming and the AVC Advantage. In: Proceedings of EVT\/WOTE (2009)","DOI":"10.1145\/1866307.1866370"},{"key":"14_CR12","unstructured":"Kornau, T.: Return oriented programming for the arm architecture. Technical report (2010)"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.-R., Winandy, M.: ROPdefender: A detection tool to defend against return-oriented programming attacks. Technical Report HGI-TR-2010-001 (2010)","DOI":"10.1145\/1966913.1966920"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: Dynamic integrity measurement and attestation: Towards defense against return-oriented programming attacks. In: Proceedings of 4th STC (2009)","DOI":"10.1145\/1655108.1655117"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-10772-6_13","volume-title":"Information Systems Security","author":"P. Chen","year":"2009","unstructured":"Chen, P., Xiao, H., Shen, X., Yin, X., Mao, B., Xie, L.: DROP: Detecting return-oriented programming malicious code. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol.\u00a05905, pp. 163\u2013177. Springer, Heidelberg (2009)"},{"key":"14_CR16","unstructured":"Intel. Intel 64 and ia-32 architectures software developers manual, volume 3b: System programming guide, part 2"},{"key":"14_CR17","unstructured":"UnixBench (2012), http:\/\/ftp.tux.org\/pub\/benchmarks\/system\/unixbench"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X.: Mitigating Code-Reuse Attacks with Control-Flow Locking. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC (2011)","DOI":"10.1145\/2076732.2076783"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Luk, C.-K., Cohn, R., Muth, R., et al.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Sarkar, V., Hall, M.W. (eds.) Proceedings of PLDI (2005)","DOI":"10.1145\/1065010.1065034"},{"issue":"6","key":"14_CR20","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1273442.1250746","volume":"42","author":"N. Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: A framework for heavyweight dynamic binary instrumentation. SIGPLAN Not.\u00a042(6), 89\u2013100 (2007)","journal-title":"SIGPLAN Not."},{"key":"14_CR21","unstructured":"Pappas, V.: kBouncer: Efficient and transparent ROP mitigation. Technical report, Columbia University (2012)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06320-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T18:54:12Z","timestamp":1565376852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06320-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319063195","9783319063201"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06320-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}