{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T17:57:43Z","timestamp":1769104663252,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642386305","type":"print"},{"value":"9783642386312","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38631-2_22","type":"book-chapter","created":{"date-parts":[[2013,5,27]],"date-time":"2013-05-27T04:37:49Z","timestamp":1369629469000},"page":"293-306","source":"Crossref","is-referenced-by-count":23,"title":["Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks"],"prefix":"10.1007","author":[{"given":"Aditi","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Sam","family":"Kerr","sequence":"additional","affiliation":[]},{"given":"Michael S.","family":"Kirkpatrick","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Bhatkar, E., Duvarney, D.C., Sekar, R.: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: Proc. of the 12th USENIX Security Symposium, pp. 105\u2013120 (2003)"},{"key":"22_CR2","unstructured":"Bhatkar, S., Sekar, R., DuVarney, D.C.: Efficient techniques for comprehensive protection from memory error exploits. In: Proc. of the 14th Conference on USENIX Security Symposium, SSYM 2005, vol.\u00a014, p. 17 (2005)"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Bletsch, T., Jiang, X., Freeh, V.: Jump-oriented programming: A new class of code-reuse attack. Tech. Rep. TR-2010-8, North Carolina State University (2010)","DOI":"10.1145\/1966913.1966919"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Buchanan, E., Roemer, R., Shacham, H., Savage, S.: When good instructions go bad: generalizing return-oriented programming to risc. In: Proc. of the 15th ACM Conference on Computer and Communications Security, pp. 27\u201338 (2008)","DOI":"10.1145\/1455770.1455776"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Checkoway, S., Davi, L., Dmitrienko, A., Sadeghi, A.R., Shacham, H., Winandy, M.: Return-oriented programming without returns. In: Proc. of the 17th ACM Conference on Computer and Communications Security, pp. 559\u2013572 (2010)","DOI":"10.1145\/1866307.1866370"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-642-10772-6_13","volume-title":"Information Systems Security","author":"P. Chen","year":"2009","unstructured":"Chen, P., Xiao, H., Shen, X., Yin, X., Mao, B., Xie, L.: DROP: Detecting return-oriented programming malicious code. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol.\u00a05905, pp. 163\u2013177. Springer, Heidelberg (2009)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/978-3-642-17714-9_11","volume-title":"Information Systems Security","author":"P. Chen","year":"2010","unstructured":"Chen, P., Xing, X., Han, H., Mao, B., Xie, L.: Efficient detection of the return-oriented programming malicious code. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol.\u00a06503, pp. 140\u2013155. Springer, Heidelberg (2010)"},{"key":"22_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-17650-0_24","volume-title":"Information and Communications Security","author":"P. Chen","year":"2010","unstructured":"Chen, P., Xing, X., Mao, B., Xie, L.: Return-oriented rootkit without returns (on the x86). In: Soriano, M., Qing, S., L\u00f3pez, J. (eds.) ICICS 2010. LNCS, vol.\u00a06476, pp. 340\u2013354. Springer, Heidelberg (2010)"},{"key":"22_CR9","unstructured":"Cowan, C., Beattie, S., Johansen, J., Wagle, P.: Pointguard: Protecting pointers from buffer overflow vulnerabilities. In: Proc. of the 12th Usenix Security Symposium (2003)"},{"key":"22_CR10","unstructured":"Cowan, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q.: Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In: Proc. of the 7th USENIX Security Symposium, pp. 63\u201378 (1998)"},{"key":"22_CR11","unstructured":"Davi, L., Dmitrienko, A., N\u00fcrnberger, S., Sadeghi, A.R.: Xifer: A software diversity tool against code-reuse attacks. In: 4th ACM International Workshop on Wireless of the Students, by the Students, for the Students, S3 2012 (August 2012)"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-18178-8_30","volume-title":"Information Security","author":"L. Davi","year":"2011","unstructured":"Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M.: Privilege escalation attacks on android. In: Burmester, M., Tsudik, G., Magliveras, S., Ili\u0107, I. (eds.) ISC 2010. LNCS, vol.\u00a06531, pp. 346\u2013360. Springer, Heidelberg (2011)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In: Proc. of the 2009 ACM Workshop on Scalable Trusted Computing, pp. 49\u201354 (2009)","DOI":"10.1145\/1655108.1655117"},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Davi, L., Sadeghi, A.R., Winandy, M.: ROPdefender: a detection tool to defend against return-oriented programming attacks. In: Proc. of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 40\u201351 (2011)","DOI":"10.1145\/1966913.1966920"},{"key":"22_CR15","unstructured":"Dullien, T., Kornau, T., Weinmann, R.P.: A framework for automated architecture-independent gadget search. In: Proc. of the 4th USENIX Conference on Offensive Technologies, WOOT 2010 (2010)"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Francillon, A., Castelluccia, C.: Code injection attacks on harvard-architecture devices. In: Proc. of the 15th ACM Conference on Computer and Communications Security, pp. 15\u201326 (2008)","DOI":"10.1145\/1455770.1455775"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Franz, M.: E unibus pluram: massive-scale software diversity as a defense mechanism. In: Proc. of the 2010 Workshop on New Security Paradigms, NSPW 2010, pp. 7\u201316 (2010)","DOI":"10.1145\/1900546.1900550"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Hiser, J., Nguyen-Tuong, A., Co, M., Hall, M., Davidson, J.W.: Ilr: Where\u2019d my gadgets go? In: Proc. of the 2012 IEEE Symposium on Security and Privacy, pp. 571\u2013585 (2012)","DOI":"10.1109\/SP.2012.39"},{"key":"22_CR19","unstructured":"Hund, R., Holz, T., Freiling, F.C.: Return-oriented rootkits: bypassing kernel code integrity protection mechanisms. In: Proc. of the 18th Conference on USENIX Security Symposium, SSYM 2009, pp. 383\u2013398 (2009)"},{"key":"22_CR20","unstructured":"Salwan, J.: ROPgadget tool, \n                      \n                        http:\/\/shell-storm.org\/project\/ROPgadget\/"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Kil, C., Jun, J., Bookholt, C., Xu, J., Ning, P.: Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In: Proc. of the 22nd Annual Computer Security Applications Conference, pp. 339\u2013348 (2006)","DOI":"10.1109\/ACSAC.2006.9"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Z., Jiang, X., Grace, M., Bahram, S.: Defeating return-oriented rootkits with \u201dreturn-less\u201d kernels. In: Proc. of the 5th European Conference on Computer Systems, pp. 195\u2013208 (2010)","DOI":"10.1145\/1755913.1755934"},{"key":"22_CR23","unstructured":"MSDN Microsoft: \/ORDER (Put Functions in Order), \n                      \n                        http:\/\/msdn.microsoft.com\/en-us\/library\/00kh39zz.aspx"},{"key":"22_CR24","unstructured":"MSDN Microsoft: Profile-guided optimizations, \n                      \n                        http:\/\/msdn.microsoft.com\/en-us\/library\/e7k32f4k.aspx"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Onarlioglu, K., Bilge, L., Lanzi, A., Balzarotti, D., Kirda, E.: G-free: defeating return-oriented programming through gadget-less binaries. In: Proc. of the 26th Annual Computer Security Applications Conference, pp. 49\u201358 (2010)","DOI":"10.1145\/1920261.1920269"},{"key":"22_CR26","doi-asserted-by":"crossref","unstructured":"Pappas, V., Polychronakis, M., Keromytis, A.D.: Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In: IEEE Symposium on Security and Privacy, pp. 601\u2013615 (2012)","DOI":"10.1109\/SP.2012.41"},{"key":"22_CR27","unstructured":"Paradyn Project: UNSTRIP (2011), \n                      \n                        http:\/\/paradyn.org\/html\/tools\/unstrip.html"},{"key":"22_CR28","unstructured":"PaX Team: PaX, \n                      \n                        http:\/\/pax.grsecurity.net\/"},{"key":"22_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1813654.1813655","volume":"28","author":"T. Roeder","year":"2010","unstructured":"Roeder, T., Schneider, F.B.: Proactive obfuscation. ACM Trans. Comput. Syst.\u00a028, 1\u20134 (2010)","journal-title":"ACM Trans. Comput. Syst."},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Roglia, G., Martignoni, L., Paleari, R., Bruschi, D.: Surgically returning to randomized lib(c). In: Annual Computer Security Applications Conference, ACSAC 2009, pp. 60\u201369 (December 2009)","DOI":"10.1109\/ACSAC.2009.16"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Shacham, H.: The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In: Proc. of the 14th ACM Conference on Computer and Communications Security, pp. 552\u2013561. ACM (2007)","DOI":"10.1145\/1315245.1315313"},{"key":"22_CR32","doi-asserted-by":"crossref","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the effectiveness of address-space randomization. In: Proc. of the 11th ACM Conference on Computer and Communications Security, pp. 298\u2013307 (2004)","DOI":"10.1145\/1030083.1030124"},{"key":"22_CR33","unstructured":"Sovarel, A.N., Evans, D., Paul, N.: Where\u2019s the feeb? The effectiveness of instruction set randomization. In: Proc. of the 14th Conference on USENIX Security Symposium, vol.\u00a014, p. 10 (2005)"},{"key":"22_CR34","unstructured":"Durden, T.: Bypassing PaX ASLR protection. Phrack Magazine\u00a059(9) (June 2002)"},{"key":"22_CR35","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1145\/2382196.2382216","volume-title":"Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012","author":"R. Wartell","year":"2012","unstructured":"Wartell, R., Mohan, V., Hamlen, K.W., Lin, Z.: Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 157\u2013168. ACM, New York (2012)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38631-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:13:53Z","timestamp":1557731633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38631-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642386305","9783642386312"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38631-2_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}