{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:28:43Z","timestamp":1765546123608},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/hst.2016.7495554","type":"proceedings-article","created":{"date-parts":[[2016,6,25]],"date-time":"2016-06-25T07:39:11Z","timestamp":1466840351000},"page":"43-48","source":"Crossref","is-referenced-by-count":9,"title":["Controlling your control flow graph"],"prefix":"10.1109","author":[{"given":"Arun","family":"Kanuparthi","sequence":"first","affiliation":[]},{"given":"Jeyavijayan","family":"Rajendran","sequence":"additional","affiliation":[]},{"given":"Ramesh","family":"Karri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2010.5647705"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2166960"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MDAT.2013.2249554"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2738052"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"ref15","article-title":"kbouncer: Efficient and transparent rop mitigation","author":"pappas","year":"2012","journal-title":"Citeseer Tech Rep"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ITRE.2003.1270612"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"article-title":"Gadgets finder and auto-roper","year":"2011","author":"salwan","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10772-6_13"},{"key":"ref5","article-title":"Control Flow Integrity for COTS Binaries","author":"zhang","year":"2013","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2012.6378624"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337171"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2004.1347961"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref21","article-title":"Q: Exploit hardening made easy","author":"schwartz","year":"2011","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref24","first-page":"111","article-title":"Maximum Matchings in Sparse Random Graphs: Karp-Sipser re-visited","author":"aronson","year":"1997","journal-title":"Technical Report Department of Mathematical Sciences CMU"},{"key":"ref23","article-title":"Stitching the Gadgets. On the ineffectiveness of Coarse-grained Control-Flow Integrity Protection","author":"davi","year":"2014","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2009.4919638"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jda.2008.10.003"}],"event":{"name":"2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2016,5,3]]},"location":"McLean, VA, USA","end":{"date-parts":[[2016,5,5]]}},"container-title":["2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7489989\/7495545\/07495554.pdf?arnumber=7495554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T09:03:11Z","timestamp":1475139791000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7495554\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/hst.2016.7495554","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}