{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:05:43Z","timestamp":1730221543726,"version":"3.28.0"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/ewdts.2019.8884464","type":"proceedings-article","created":{"date-parts":[[2019,11,5]],"date-time":"2019-11-05T11:34:05Z","timestamp":1572953645000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["CFI: Control Flow Integrity or Control Flow Interruption?"],"prefix":"10.1109","author":[{"given":"Nicolo","family":"Maunero","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Prinetto","sequence":"additional","affiliation":[]},{"given":"Gianluca","family":"Roascio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-017-0299-1"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.16"},{"key":"ref33","first-page":"14","article-title":"Smashing the stack for tun and profit","volume":"7","author":"one","year":"1996","journal-title":"Phrack Magazine"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICTACC.2017.26"},{"journal-title":"Return Oriented Programming for the ARM Architecture","year":"2010","author":"kornau","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP-W.2014.7046672"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2487222.2487223"},{"key":"ref34","first-page":"447","article-title":"Transparent rop exploit mitigation using indirect branch tracing","author":"pappas","year":"0","journal-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)"},{"key":"ref28","first-page":"417","article-title":"Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard","author":"g\u00f6ktas","year":"0","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433189"},{"journal-title":"Tiobe Index","year":"2019","key":"ref2"},{"year":"2001","key":"ref1"},{"key":"ref20","first-page":"5","volume":"98","author":"cowan","year":"1998","journal-title":"Stackguard Automatic Adaptive Detection and Prevention of Buffer-overflow Attacks"},{"key":"ref22","first-page":"27","article-title":"Mocfi: A framework to mitigate control-flow attacks on smartphones","volume":"26","author":"davi","year":"2012","journal-title":"NDSS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2548561"},{"key":"ref24","first-page":"401","article-title":"Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection","author":"davi","year":"0","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1655077.1655083"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"ref50","first-page":"337","article-title":"Control flow integrity for cots binaries","author":"zhang","year":"0","journal-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/LES.2018.2819983"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IVSW.2017.8031545"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"ref13","first-page":"385","article-title":"Rop is still dangerous: Breaking modern defenses","author":"carlini","year":"0","journal-title":"23rd USENIX Security Symposium (USENIX Security 14)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref15","article-title":"Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage","author":"checkoway","year":"2009","journal-title":"EVT\/WOTE 2009"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10772-6_13"},{"key":"ref17","first-page":"20","article-title":"Automatic construction of jump-oriented programming shellcode (on the x86)","author":"chen","year":"0","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"journal-title":"Ropecker A generic and practical approach for defending against rop attack","year":"2014","author":"cheng","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"journal-title":"Dangling pointer Smashing the pointer for fun and profit Watchfire","year":"2007","author":"afek","key":"ref4"},{"key":"ref3","first-page":"340","article-title":"Control-flow integrity","author":"abadi","year":"0","journal-title":"Proceedings of the 12th ACM conference on Computer and communications security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/800028.808479"},{"key":"ref5","article-title":"Defeating compiler-level buffer overflow protection","author":"alexander","year":"2005","journal-title":"LOGIN The USENIX Magazine"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"ref7","first-page":"291","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","volume":"12","author":"bhatkar","year":"0","journal-title":"USENIX Security Symposium"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866164"},{"key":"ref9","first-page":"30","article-title":"Jump-oriented programming: a new class of code-reuse attack","author":"bletsch","year":"0","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"ref46","first-page":"121","article-title":"On the expressiveness of return-into-libc attacks","author":"tran","year":"0","journal-title":"International Workshop on Recent Advances in Intrusion Detection"},{"journal-title":"PaX Team PaX non-executable page design & implementation","year":"2003","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263958"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918971"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898098"},{"key":"ref41","first-page":"552","article-title":"The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"ACM Conference on Computer and Communications Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"journal-title":"A detailed description of the Data Execution Prevention (DEP)","year":"0","key":"ref43"}],"event":{"name":"2019 IEEE East-West Design & Test Symposium (EWDTS)","start":{"date-parts":[[2019,9,13]]},"location":"Batumi, Georgia","end":{"date-parts":[[2019,9,16]]}},"container-title":["2019 IEEE East-West Design &amp; Test Symposium (EWDTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8871308\/8884369\/08884464.pdf?arnumber=8884464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:45:36Z","timestamp":1658155536000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8884464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/ewdts.2019.8884464","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}