{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:49:21Z","timestamp":1742914161211,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252426"},{"type":"electronic","value":"9783642252433"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25243-3_29","type":"book-chapter","created":{"date-parts":[[2011,11,2]],"date-time":"2011-11-02T10:18:58Z","timestamp":1320229138000},"page":"360-373","source":"Crossref","is-referenced-by-count":4,"title":["HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming"],"prefix":"10.1007","author":[{"given":"Jun","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xiaoqi","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Shengzhi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/1866307.1866313","volume-title":"Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010","author":"A.M. Azab","year":"2010","unstructured":"Azab, A.M., Ning, P., Wang, Z., Jiang, X., Zhang, X., Skalsky, N.C.: HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 38\u201349. ACM, New York (2010)"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/945445.945462","volume-title":"Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP 2003","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP 2003, pp. 164\u2013177. ACM, New York (2003)"},{"key":"29_CR3","first-page":"30","volume-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011","author":"T. Bletsch","year":"2011","unstructured":"Bletsch, T., Jiang, X., Freeh, V.W., Liang, Z.: Jump-oriented programming: a new class of code-reuse attack. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 30\u201340. ACM, New York (2011)"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/1455770.1455776","volume-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008","author":"E. Buchanan","year":"2008","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to RISC. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 27\u201338. ACM, New York (2008)"},{"key":"29_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-10772-6_13","volume-title":"Information Systems Security","author":"P. Chen","year":"2009","unstructured":"Chen, P., Xiao, H., Shen, X., Yin, X., Mao, B., Xie, L.: DROP: Detecting Return-Oriented Programming Malicious Code. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol.\u00a05905, pp. 163\u2013177. Springer, Heidelberg (2009)"},{"key":"29_CR6","first-page":"40","volume-title":"Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011","author":"L. Davi","year":"2011","unstructured":"Davi, L., Sadeghi, A.-R., Winandy, M.: ROPdefender: a detection tool to defend against return-oriented programming attacks. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2011, pp. 40\u201351. ACM, New York (2011)"},{"key":"29_CR7","first-page":"383","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009","author":"R. Hund","year":"2009","unstructured":"Hund, R., Holz, T., Freiling, F.C.: Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In: Proceedings of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 383\u2013398. USENIX Association, Berkeley (2009)"},{"key":"29_CR8","first-page":"191","volume-title":"Proceedings of the 11th USENIX Security Symposium","author":"V. Kiriansky","year":"2002","unstructured":"Kiriansky, V., Bruening, D., Amarasinghe, S.P.: Secure execution via program shepherding. In: Proceedings of the 11th USENIX Security Symposium, pp. 191\u2013206. USENIX Association, Berkeley (2002)"},{"key":"29_CR9","unstructured":"Kornau, T.: Return oriented programming for the ARM architecture. Master\u2019s thesis, Ruhr-Universitat Bochum (2010)"},{"key":"29_CR10","first-page":"195","volume-title":"Proceedings of the 5th European Conference on Computer Systems, EuroSys 2010","author":"J. Li","year":"2010","unstructured":"Li, J., Wang, Z., Jiang, X., Grace, M., Bahram, S.: Defeating return-oriented rootkits with \u201creturn-less\u201d kernels. In: Proceedings of the 5th European Conference on Computer Systems, EuroSys 2010, pp. 195\u2013208. ACM, New York (2010)"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1065010.1065034","volume-title":"Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005","author":"C.-K. Luk","year":"2005","unstructured":"Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005, pp. 190\u2013200. ACM, New York (2005)"},{"key":"29_CR12","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/1346256.1346278","volume-title":"Proceedings of the Fourth ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, VEE 2008","author":"D.G. Murray","year":"2008","unstructured":"Murray, D.G., Milos, G., Hand, S.: Improving Xen security through disaggregation. In: Proceedings of the Fourth ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments, VEE 2008, pp. 151\u2013160. ACM, New York (2008)"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1145\/1250734.1250746","volume-title":"Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007","author":"N. Nethercote","year":"2007","unstructured":"Nethercote, N., Seward, J.: Valgrind: a framework for heavyweight dynamic binary instrumentation. In: Proceedings of the 2007 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2007, pp. 89\u2013100. ACM, New York (2007)"},{"key":"29_CR14","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/1920261.1920269","volume-title":"Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010","author":"K. Onarlioglu","year":"2010","unstructured":"Onarlioglu, K., Bilge, L., Lanzi, A., Balzarotti, D., Kirda, E.: G-Free: defeating return-oriented programming through gadget-less binaries. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC 2010, pp. 49\u201358. ACM, New York (2010)"},{"key":"29_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-87403-4_1","volume-title":"Recent Advances in Intrusion Detection","author":"R. Riley","year":"2008","unstructured":"Riley, R., Jiang, X., Xu, D.: Guest-transparent Prevention of Kernel Rootkits with VMM-based Memory Shadowing. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.\u00a05230, pp. 1\u201320. Springer, Heidelberg (2008)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Roemer, R., Buchanan, E., Shacham, H., Savage, S.: Return-oriented programming: systems, languages, and applications. ACM Trans. Inf. Syst. Secur. (to appear, 2011)","DOI":"10.1145\/2133375.2133377"},{"key":"29_CR17","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/1294261.1294294","volume-title":"Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007","author":"A. Seshadri","year":"2007","unstructured":"Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. In: Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles, SOSP 2007, pp. 335\u2013350. ACM, New York (2007)"},{"key":"29_CR18","first-page":"552","volume-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007","author":"H. Shacham","year":"2007","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 2007, pp. 552\u2013561. ACM, New York (2007)"},{"key":"29_CR19","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/SP.2010.30","volume-title":"Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010","author":"Z. Wang","year":"2010","unstructured":"Wang, Z., Jiang, X.: HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP 2010, pp. 380\u2013395. IEEE Computer Society, Washington, DC, USA (2010)"},{"key":"29_CR20","unstructured":"Wikipedia. Return-to-libc attack (2010), http:\/\/en.wikipedia.org\/wiki\/Return-to-libc_attack"},{"key":"29_CR21","unstructured":"Wikipedia. W^X (2010), http:\/\/en.wikipedia.org\/wiki\/W%5EX"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25243-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T16:17:09Z","timestamp":1639412229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25243-3_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252426","9783642252433"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25243-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}