{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:47:34Z","timestamp":1730198854880,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/asap.2018.8445132","type":"proceedings-article","created":{"date-parts":[[2018,8,28]],"date-time":"2018-08-28T00:35:47Z","timestamp":1535416547000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks"],"prefix":"10.1109","author":[{"given":"Zelin","family":"Rong","sequence":"first","affiliation":[]},{"given":"Peidai","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Jingyuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shenglin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yongjun","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Linux c functioru)","year":"0","author":"hot","key":"ref38"},{"journal-title":"Vulcan Binary Transformation in a Distributed Environment","year":"2001","author":"edwards","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"journal-title":"ROPgadget-Gadgets Finder and Auto-Roper","year":"2011","author":"salwan","key":"ref31"},{"journal-title":"System-call","year":"0","author":"foundation","key":"ref30"},{"journal-title":"Shellcodes database for study cases","year":"0","author":"salwan","key":"ref37"},{"journal-title":"Ctf? wtf?","year":"0","author":"team","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"ref34","first-page":"15","article-title":"Dynamic instrumentation of production systems","author":"cantrill","year":"2004","journal-title":"USENIX Annual Technical Conference General Track"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755934"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-642-10772-6_13","article-title":"Drop: Detecting return-oriented programming malicious code","author":"chen","year":"2009","journal-title":"International Conference on Information Systems Security"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1966913.1966920","article-title":"Ropdefender: A detection tool to defend against return-oriented programming attacks","author":"davi","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security ACM"},{"key":"ref16","first-page":"447","article-title":"Transparent rop exploit mitigation using indirect branch tracing","author":"pappas","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17714-9_11"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"journal-title":"Runtime prevention of return-oriented programming attacks 2012","year":"0","author":"fratric","key":"ref19"},{"journal-title":"Register usage","year":"2015","key":"ref28"},{"journal-title":"Advances in Format String Exploitation","year":"2002","author":"gera","key":"ref4"},{"journal-title":"Function calling and preserved registers","year":"0","author":"lawlor","key":"ref27"},{"journal-title":"Basic integer overflows","year":"2002","key":"ref3"},{"journal-title":"PaX address space layout randomization (ASLR)","year":"2003","author":"team","key":"ref6"},{"journal-title":"Caller\/callee saved registers","year":"2015","key":"ref29"},{"journal-title":"A Detailed Description of the Data Execution Prevention (DEP) Feature in Windows XP Service Pack 2 Windows XP Tablet PC Edition 2005 and Windows Server 2003","year":"2017","key":"ref5"},{"key":"ref8","first-page":"385","article-title":"Rop is still dangerous: Breaking modern defenses","author":"carlini","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref7","first-page":"552","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"journal-title":"Once upon a free ()","year":"2001","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"journal-title":"Smashing the stack for fun and profit (1996)","year":"2007","author":"one","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38631-2_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/1064978.1065034","article-title":"Pin: building customized program analysis tools with dynamic instrumentation","volume":"40","author":"luk","year":"2005","journal-title":"ACM SIGPLAN Notices"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1275571.1275600"},{"key":"ref26","article-title":"System v application binary interface","volume":"99","author":"matz","year":"2013","journal-title":"AMD64 Architecture Processor Supplement Draft v0"},{"journal-title":"x64 architecture","year":"2017","key":"ref25"}],"event":{"name":"2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","start":{"date-parts":[[2018,7,10]]},"location":"Milan","end":{"date-parts":[[2018,7,12]]}},"container-title":["2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8424123\/8445082\/08445132.pdf?arnumber=8445132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T10:02:49Z","timestamp":1643191369000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8445132\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/asap.2018.8445132","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}