{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:08:44Z","timestamp":1750392524221,"version":"3.41.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319596075"},{"type":"electronic","value":"9783319596082"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59608-2_32","type":"book-chapter","created":{"date-parts":[[2017,6,13]],"date-time":"2017-06-13T15:29:56Z","timestamp":1497367796000},"page":"575-593","source":"Crossref","is-referenced-by-count":0,"title":["Impact of Environment on Branch Transfer of\u00a0Software"],"prefix":"10.1007","author":[{"given":"Jianming","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S., Somayaji, A.: The evolution of system-call monitoring. In: Proceeding of the 24th Annual Computer Security Applications Conference, California, USA, pp. 418\u2013430 (2008)","DOI":"10.1109\/ACSAC.2008.54"},{"key":"32_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-540-45215-7_17","volume-title":"Computer Network Security","author":"K Wee","year":"2003","unstructured":"Wee, K., Moon, B.: Automatic generation of finite state automata for detecting intrusions using system call sequences. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 206\u2013216. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45215-7_17"},{"key":"32_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-39650-5_19","volume-title":"Computer Security \u2013 ESORICS 2003","author":"C Kruegel","year":"2003","unstructured":"Kruegel, C., Mutz, D., Valeur, F., Vigna, G.: On the detection of anomalous system call arguments. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 326\u2013343. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-39650-5_19"},{"issue":"4","key":"32_CR4","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TDSC.2008.69","volume":"7","author":"F Maggi","year":"2010","unstructured":"Maggi, F., Matteucci, M., Zanero, S.: Detecting intrusions through system call sequence and argument analysis. IEEE Trans. Dependable Secure Comput. 7(4), 381\u2013395 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proceeding of the 14th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 552\u2013561. ACM (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.W., Liang, Z.: Jump-oriented programming: a new class of code-reuse attack. In: Proceeding of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, pp. 30\u201340. ACM (2011)","DOI":"10.1145\/1966913.1966919"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: Proceeding of the 12th ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 340\u2013353. ACM (2005)","DOI":"10.1145\/1102120.1102165"},{"issue":"1","key":"32_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1609956.1609960","volume":"13","author":"M Abadi","year":"2009","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity principles, implementations, and applications. J. ACM Trans. Inf. Syst. Secur. 13(1), 1\u201341 (2009)","journal-title":"J. ACM Trans. Inf. Syst. Secur."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Xia, Y., Liu, Y., Chen, H., Zang, B.: CFIMon: detecting violation of control flow integrity using performance counters. In: IEEE\/IFIP International Conference on Dependable Systems and Networks, Boston, USA, pp. 1\u201312. IEEE\/IFTP (2012)","DOI":"10.1109\/DSN.2012.6263958"},{"key":"32_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-319-26362-5_4","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"P Yuan","year":"2015","unstructured":"Yuan, P., Zeng, Q., Ding, X.: Hardware-assisted fine-grained code-reuse attack detection. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 66\u201385. Springer, Cham (2015). doi: 10.1007\/978-3-319-26362-5_4"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Cheng, Y., Zhou, Z., Yu, M., Ding, X., Deng, R.H.: ROPecker: a generic and practical approach for defending against ROP attacks. In: Proceeding of Symposium on Network and Distributed System Security, San Diego, USA. ISOC (2014)","DOI":"10.14722\/ndss.2014.23156"},{"key":"32_CR12","unstructured":"Intel Manual. Intel 64 and IA-32 architecture software developers manual, vol. 3"},{"issue":"12","key":"32_CR13","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/1859204.1859226","volume":"53","author":"S Zhong","year":"2010","unstructured":"Zhong, S.: Certified software. Commun. ACM 53(12), 56\u201366 (2010)","journal-title":"Commun. ACM"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Murali A, Rao M. A survey on intrusion detection approaches. In: Proceeding of the First International Conference on Information and Communication Technologies, Karachi, Pakistan, pp. 233\u2013240. IEEE (2005)","DOI":"10.1109\/ICICT.2005.1598592"},{"issue":"1","key":"32_CR15","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.cose.2008.08.003","volume":"28","author":"P Garcia-Teodoro","year":"2009","unstructured":"Garcia-Teodoro, P., Diaz-Verdejo, J., Maci-Fernndez, G., Vazque, Z.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1), 18\u201328 (2009). Elsevier","journal-title":"Comput. Secur."},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Mytkowicz, T., Diwan, A., Hauswirth, M., Sweenry, P.F.: Producing wrong data without doing anything obviously wrong! ACM Sigplan Not. 44(3), 265\u2013276 (2009)","DOI":"10.1145\/1508284.1508275"},{"issue":"1","key":"32_CR17","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/S0031-3203(02)00026-2","volume":"36","author":"DY Yeung","year":"2003","unstructured":"Yeung, D.Y., Ding, Y.: Host-based intrusion detection using dynamic and static behavioral models. Pattern Recogn. 36(1), 229\u2013243 (2003). Elsevier","journal-title":"Pattern Recogn."},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Li, P., Park, H., Gao, D., Fu, J.: Bridging the gap between data-flow and control-flow analysis for anomaly detection. In: Proceeding of the 24th Annual Computer Security Application Conference, California, USA. IEEE (2008)","DOI":"10.1109\/ACSAC.2008.17"},{"key":"32_CR19","doi-asserted-by":"crossref","unstructured":"Giffin, J.T., Dagon, D., Jha, S., Lee, W., Miller, B.P.: Environment-sensitive intrusion detection. In: Proceeding of Recent Advances in Intrusion Detection, Hamburg, Germany, pp. 185\u2013206. Springer (2006)","DOI":"10.1007\/11663812_10"},{"key":"32_CR20","unstructured":"Zhang, C., Wei, T., Chen, Z,, Duan, L.: Practical control flow integrity and randomization for binary executables. In: Proceeding of IEEE Symposium on Security and Privacy, San Francisco, USA, pp. 559\u2013573. IEEE (2013)"},{"key":"32_CR21","unstructured":"Zhang, M., Sekar, R.: Control flow integrity for COTS binaries. In: Proceeding of the 22nd USENIX Security Symposium, pp. 337\u2013352. IEEE, Washington, D.C. (2013)"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Wang, M., Yin, H., Bhaskar, A.V., Continent, B.C., et al.: Finer-grained control flow integrity for stripped binaries. In: Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, USA, pp. 331\u2013340. IEEE (2015)","DOI":"10.1145\/2818000.2818017"},{"key":"32_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1007\/978-3-319-45871-7_22","volume-title":"Information Security","author":"Y Lin","year":"2016","unstructured":"Lin, Y., Tang, X., Gao, D., Fu, J.: Control flow integrity enforcement with dynamic code optimization. In: Bishop, M., Nascimento, A.C.A. (eds.) ISC 2016. LNCS, vol. 9866, pp. 366\u2013385. Springer, Cham (2016). doi: 10.1007\/978-3-319-45871-7_22"},{"key":"32_CR24","unstructured":"Pappas, V.: kBouncer: efficient and transparent ROP mitigation. Technical report, Columbia University (2012)"},{"issue":"11","key":"32_CR25","doi-asserted-by":"crossref","first-page":"2073","DOI":"10.3724\/SP.J.1016.2011.02073","volume":"34","author":"T Zhao","year":"2011","unstructured":"Zhao, T., Tang, Y., Xu, W., Fu, G., Qi, S., Jia, X., et al.: Exactly reproducible program execution and its application in computer architecture simulation. Chin. J. Comput. 34(11), 2073\u20132083 (2011)","journal-title":"Chin. J. Comput."},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B.: On the effectiveness of address-space randomization. In: Proceeding of the 11th ACM Conference on Computer and Communications Security 2004, pp. 298\u2013307 (2004)","DOI":"10.1145\/1030083.1030124"},{"issue":"6","key":"32_CR27","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/1064978.1065034","volume":"40","author":"CK Luk","year":"2005","unstructured":"Luk, C.K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., et al.: Pin: building customized program analysis tools with dynamic instrumentation. ACM Sigplan Not. 40(6), 190\u2013200 (2005)","journal-title":"ACM Sigplan Not."},{"key":"32_CR28","doi-asserted-by":"crossref","unstructured":"Fu, J., Lin, Y., Zhang, X., Li, P.: Computation integrity measurement based on branch transfer. In: Proceeding of the 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, pp. 590\u2013597. IEEE (2014)","DOI":"10.1109\/TrustCom.2014.75"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59608-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T14:53:53Z","timestamp":1750344833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59608-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319596075","9783319596082"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59608-2_32","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017]]}}}