{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:26:51Z","timestamp":1725406011777},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275891","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T17:27:30Z","timestamp":1443461250000},"page":"1872-1876","source":"Crossref","is-referenced-by-count":0,"title":["Evaluating the theoretical feasibility of an SROP attack against Oxymoron"],"prefix":"10.1109","author":[{"given":"Zubin","family":"Mithra","sequence":"first","affiliation":[]},{"family":"Vipin P.","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Isomeron Code Randomization Resilient to (lust-In-Time) Return-Oriented Programming","year":"2015","author":"davi","key":"ref10"},{"journal-title":"Pakt Exploiting CVE-2011&#x2013;2371 (FF reduceRight) without non-ASLR modules","year":"2012","key":"ref11"},{"journal-title":"Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing","year":"2014","author":"backes","key":"ref12"},{"journal-title":"Smashing the Gadgets Hindering Return-Oriented Programming Using In-Place Code Randomization","year":"2012","author":"vasilis","key":"ref13"},{"journal-title":"Binary Stirring Self-randomizing Instruction Addresses of Legacy x86 Binary Code","year":"2012","author":"richard","key":"ref14"},{"journal-title":"ILR Whered My Gadgets Go?","year":"2012","author":"hiser","key":"ref15"},{"journal-title":"Playing around with SROP","year":"2014","author":"mithra","key":"ref16"},{"journal-title":"Github srop-poc","year":"2014","author":"mithra","key":"ref17"},{"journal-title":"Return-to-libc attack","year":"1997","author":"designer","key":"ref4"},{"journal-title":"Surgically returning to randomized libt (c)","year":"2009","author":"roglia","key":"ref3"},{"journal-title":"Smashing The Stack for Fun and Profit by Aleph One","year":"1996","key":"ref6"},{"journal-title":"The Geometry of Innocent Flesh on the Bone Return-into-libc without Function Calls (on the x86)","year":"2007","author":"shacham","key":"ref5"},{"journal-title":"ELF auxiliary vectors","year":"2003","author":"brouwer","key":"ref8"},{"journal-title":"Return to VDSO using Auxiliary Vectors","year":"2014","author":"robert","key":"ref7"},{"journal-title":"lust-in-Time Code Reuse","year":"2013","author":"snow","key":"ref2"},{"journal-title":"Framing SignalsA Return to Portable Shell-code","year":"2014","author":"bosman","key":"ref1"},{"journal-title":"grugq scut Phrack 58&#x2013;0&#x00D7;5 Armouring the ELF Binary encryption on the UNIX platform","year":"2001","key":"ref9"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2015,8,10]]},"location":"Kochi, India","end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275891.pdf?arnumber=7275891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T17:41:35Z","timestamp":1490377295000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275891","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}