{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:19:42Z","timestamp":1761664782634,"version":"3.37.3"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Elkartek CERBERO Project of Basque Government","award":["KK-2024\/00022"],"award-info":[{"award-number":["KK-2024\/00022"]}]},{"name":"Pre-Doctoral Grant by the Basque Government"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3454551","type":"journal-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:19:43Z","timestamp":1725473983000},"page":"124171-124182","source":"Crossref","is-referenced-by-count":1,"title":["Optimized Data-Flow Integrity for Modern Compilers"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7994-6555","authenticated-orcid":false,"given":"Irene","family":"D\u00edez-Franco","sequence":"first","affiliation":[{"name":"University of Deusto, Bilbao, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3950-9880","authenticated-orcid":false,"given":"Xabier","family":"Ugarte-Pedrero","sequence":"additional","affiliation":[{"name":"Cisco Systems, Inc., San Jose, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3594-9534","authenticated-orcid":false,"given":"Pablo","family":"Garc\u00eda-Bringas","sequence":"additional","affiliation":[{"name":"Faculty of Engineering, University of Deusto, Bilbao, Spain"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"volume-title":"Compilers: Principles, Techniques, and Tools","year":"2006","author":"Aho","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"article-title":"Program analysis and specialization for the C programming language","year":"1994","author":"Andersen","key":"ref4"},{"article-title":"Data execution prevention. Changes to functionality in Microsoft windows XP service. Pack 2. Part 3: Memory protection technologies","year":"2004","author":"Andersen","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_16"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"article-title":"Control-flow bending: On the effectiveness of control-flow integrity","volume-title":"Proc. USENIX Secur. Symp.","author":"Carlini","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052983"},{"article-title":"Securing software by enforcing data-flow integrity","volume-title":"Proc. USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Castro","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"article-title":"Non-control-data attacks are realistic threats","volume-title":"Proc. USENIX Secur. Symp.","author":"Chen","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23421"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"article-title":"IMIX: In-process memory isolation extension","volume-title":"Proc. USENIX Secur. Symp.","author":"Frassetto","key":"ref19"},{"volume-title":"Using the GNU Compiler Collection, Options That Control Optimization","key":"ref20"},{"volume-title":"Using the GNU Compiler Collection, Options to Request or Suppress Warnings","key":"ref21"},{"article-title":"Automatic generation of data-oriented exploits","volume-title":"Proc. USENIX Secur. Symp.","author":"Hu","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243739"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978414"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1145\/3129743.3129748","article-title":"Code-pointer integrity","volume-title":"Proc. USENIX Symp. Operating Syst. Design Implement. (OSDI)","author":"Kuznetsov"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00006"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00020"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03811-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24262"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00041"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.39"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.9"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"volume-title":"Address Space Layout Randomization (ASLR)","year":"2003","key":"ref40"},{"article-title":"Enforcing forward-edge control-flow integrity in GCC & LLVM","volume-title":"Proc. USENIX Secur. Symp.","author":"Tice","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"volume-title":"Comparison of the Usage Statistics of Nginx vs. Apache for Websites","year":"2024","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23099"},{"key":"ref47","article-title":"Beyond control: Exploring novel file system objects for data-only attacks on Linux systems","author":"Zhou","year":"2024","journal-title":"arXiv:2401.17618"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10664032.pdf?arnumber=10664032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T18:00:10Z","timestamp":1726164010000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10664032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3454551","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}