{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:17Z","timestamp":1763468237912},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319156170"},{"type":"electronic","value":"9783319156187"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15618-7_6","type":"book-chapter","created":{"date-parts":[[2015,2,27]],"date-time":"2015-02-27T01:10:31Z","timestamp":1424999431000},"page":"68-85","source":"Crossref","is-referenced-by-count":16,"title":["Learning How to Prevent Return-Oriented Programming Efficiently"],"prefix":"10.1007","author":[{"given":"David","family":"Pfaff","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Hack","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Hammer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Emerging threat: Microsoft word zero day (cve-2014-1761) remote code execution vulnerability, \n                    \n                      http:\/\/www.symantec.com\/connect\/blogs\/emerging-threat-microsoft-word-zero-day-cve-2014-1761-remote-code-execution-vulnerability"},{"key":"6_CR2","unstructured":"Security updates for adobe flash player, \n                    \n                      http:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb14-07.html"},{"key":"6_CR3","unstructured":"Vrt: Anatomy of an exploit: Cve 2014-1776, \n                    \n                      http:\/\/vrt-blog.snort.org\/2014\/05\/anatomy-of-exploit-cve-2014-1776.html"},{"key":"6_CR4","unstructured":"Microsoft: Software vulnerability exploitation trends (2013)"},{"key":"6_CR5","unstructured":"van de Ven, A.: New security enhancements in red hat enterprise linux v.3, update 3. Technical report, Red Hat, Raleigh, North Carolina, USA (2004)"},{"key":"6_CR6","unstructured":"The PaX Team, \n                    \n                      https:\/\/pax.grsecurity.net\/"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Snow, K.Z., Monrose, F., Davi, L., Dmitrienko, A., Liebchen, C., Sadeghi, A.R.: Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In: 34th Symposium on Security and Privacy (SP), 574\u2013588. IEEE (2013)","DOI":"10.1109\/SP.2013.45"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In: 14th Conference on Computer and Communications Security, pp. 552\u2013561. ACM (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"6_CR9","unstructured":"Carlini, N., Wagner, D.: Rop is still dangerous: Breaking modern defenses. In: 23rd USENIX Security Symposium, San Diego, CA, pp. 385\u2013399 (2014)"},{"key":"6_CR10","unstructured":"Davi, L., Sadeghi, A.R., Lehmann, D., Monrose, F.: Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In: 23rd USENIX Security Symposium, San Diego, CA, pp. 401\u2013416 (2014)"},{"key":"6_CR11","unstructured":"G\u00f6kta\u015f, E., Athanasopoulos, E., Polychronakis, M., Bos, H., Portokalidis, G.: Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard. In: 23rd USENIX Security Symposium, San Diego, CA, pp. 417\u2013432 (2014)"},{"key":"6_CR12","unstructured":"Spec standard performance evaluation corporation, \n                    \n                      http:\/\/www.spec.org"},{"key":"6_CR13","unstructured":"Schwartz, E.J., Avgerinos, T., Brumley, D.: Q: Exploit hardening made easy. In: 20th USENIX Security Symposium, San Francisco, CA (2011)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Bittau, A., Belay, A., Mashtizadeh, A., Mazieres, D., Boneh, D.: Hacking blind. In: 35th Symposium on Security and Privacy (S&P), vol.\u00a014. IEEE (2014)","DOI":"10.1109\/SP.2014.22"},{"key":"6_CR15","unstructured":"Aleph One: Smashing the stack for fun and profit. Phrack Magazine 7 (1996)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In: Workshop on Scalable Trusted Computing, pp. 49\u201354. ACM (2009)","DOI":"10.1145\/1655108.1655117"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.W., Liang, Z.: Jump-oriented programming: a new class of code-reuse attack. In: 6th Symposium on Information, Computer and Communications Security, pp. 30\u201340. ACM (2011)","DOI":"10.1145\/1966913.1966919"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: 12th Conference on Computer and Communications Security, pp. 340\u2013353. ACM (2005)","DOI":"10.1145\/1102120.1102165"},{"key":"6_CR19","first-page":"48","volume-title":"34th Symposium on Security and Privacy (S&P)","author":"L. Szekeres","year":"2013","unstructured":"Szekeres, L., Payer, M., Wei, T., Song, D.: Sok: Eternal war in memory. In: 34th Symposium on Security and Privacy (S&P), pp. 48\u201362. IEEE Computer Society, Washington, DC (2013)"},{"key":"6_CR20","first-page":"1157","volume":"3","author":"I. Guyon","year":"2003","unstructured":"Guyon, I., Elisseeff, A.: An introduction to variable and feature selection. The Journal of Machine Learning Research\u00a03, 1157\u20131182 (2003)","journal-title":"The Journal of Machine Learning Research"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Somol, P., Novovicova, J., Grim, J., Pudil, P.: Dynamic oscillating search algorithm for feature selection. In: 19th International Conference on Pattern Recognition, pp. 1\u20134 (2008)","DOI":"10.1109\/ICPR.2008.4761773"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Chang, C.C., Lin, C.J.: LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology 2, 27:1\u201327:27 (2011)","DOI":"10.1145\/1961189.1961199"},{"key":"6_CR23","unstructured":"Feature selection toolbox, \n                    \n                      http:\/\/fst.utia.cz\/"},{"key":"6_CR24","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1064978.1065034","volume":"40","author":"C.K. Luk","year":"2005","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. ACM Sigplan Notices\u00a040, 190\u2013200 (2005)","journal-title":"ACM Sigplan Notices"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: Ropdefender: A detection tool to defend against return-oriented programming attacks. In: 6th Symposium on Information, Computer and Communications Security, pp. 40\u201351. ACM (2011)","DOI":"10.1145\/1966913.1966920"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-04897-0_1","volume-title":"Engineering Secure Software and Systems","author":"E.R. Jacobson","year":"2014","unstructured":"Jacobson, E.R., Bernat, A.R., Williams, W.R., Miller, B.P.: Detecting code reuse attacks with a model of conformant program execution. In: J\u00fcrjens, J., Piessens, F., Bielova, N. (eds.) ESSoS 2014. LNCS, vol.\u00a08364, pp. 1\u201318. Springer, Heidelberg (2014)"},{"key":"6_CR27","unstructured":"Fratric, I.: Runtime prevention of return-oriented programming attacks (2012), \n                    \n                      http:\/\/ropguard.googlecode.com\/"},{"key":"6_CR28","unstructured":"Pappas, V., Polychronakis, M., Keromytis, A.D.: Transparent rop exploit mitigation using indirect branch tracing. In: 22nd USENIX Security Symposium (2013)"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Zhou, Z., Yu, M., Ding, X., Deng, R.H.: Ropecker: A generic and practical approach for defending against rop attacks. In: The 21st Annual Network and Distributed System Security Symposium (2014)","DOI":"10.14722\/ndss.2014.23156"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Yuan, L., Xing, W., Chen, H., Zang, B.: Security breaches as pmu deviation: detecting and identifying security attacks using performance counters. In: Second Asia-Pacific Workshop on Systems, p. 6. ACM (2011)","DOI":"10.1145\/2103799.2103807"},{"key":"6_CR31","unstructured":"Wicherski, G.: Taming rop on sandy bridge. Syscan (2013)"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Malone, C., Zahran, M., Karri, R.: Are hardware performance counters a cost effective way for integrity checking of programs. In: Sixth Workshop on Scalable Trusted Computing, pp. 71\u201376. ACM (2011)","DOI":"10.1145\/2046582.2046596"},{"key":"6_CR33","doi-asserted-by":"crossref","unstructured":"Demme, J., Maycock, M., Schmitz, J., Tang, A., Waksman, A., Sethumadhavan, S., Stolfo, S.: On the feasibility of online malware detection with performance counters. In: 40th Annual International Symposium on Computer Architecture, pp. 559\u2013570. ACM (2013)","DOI":"10.1145\/2485922.2485970"},{"key":"6_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-11379-1_6","volume-title":"Research in Attacks, Intrusions and Defenses","author":"A. Tang","year":"2014","unstructured":"Tang, A., Sethumadhavan, S., Stolfo, S.J.: Unsupervised anomaly-based malware detection using hardware features. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol.\u00a08688, pp. 109\u2013129. Springer, Heidelberg (2014)"},{"key":"6_CR35","unstructured":"Backes, M., N\u00fcrnberger, S.: Oxymoron: Making fine-grained memory randomization practical by allowing code sharing. In: 23rd USENIX Security Symposium, San Diego, CA, pp. 433\u2013447 (2014)"},{"key":"6_CR36","unstructured":"Rosenberg, D.: Breaking libtiff, \n                    \n                      http:\/\/vulnfactory.org\/blog\/2010\/06\/29\/breaking-libtiff\/"},{"key":"6_CR37","unstructured":"Homescu, A., Stewart, M., Larsen, P., Brunthaler, S., Franz, M.: Microgadgets: Size does matter in turing-complete return-oriented programming. In: WOOT, pp. 64\u201376 (2012)"}],"container-title":["Lecture Notes in Computer Science","Engineering Secure Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15618-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:17:49Z","timestamp":1559128669000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-15618-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319156170","9783319156187"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15618-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}