{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:08:10Z","timestamp":1750223290339,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256382","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T13:36:02Z","timestamp":1695735362000},"page":"453-458","source":"Crossref","is-referenced-by-count":1,"title":["A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques"],"prefix":"10.1109","author":[{"given":"Xingnan","family":"Zhang","sequence":"first","affiliation":[{"name":"Xiamen University,Computing &#x0026; Data Science,Sepang,Malaysia"}]},{"given":"Jingjia","family":"Huang","sequence":"additional","affiliation":[{"name":"Xiamen University,Computing &#x0026; Data Science,Sepang,Malaysia"}]},{"given":"Yue","family":"Feng","sequence":"additional","affiliation":[{"name":"Xiamen University,Computing &#x0026; Data Science,Sepang,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","first-page":"237","article-title":"Hardware-Assisted ROP Attack Detection on Cloud Platforms","volume":"58","author":"wang","year":"2018","journal-title":"Journal of Tsinghua University (Science and Technology)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1002\/sec.693"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref10","first-page":"385","article-title":"ROP is Still Dangerous: Breaking Modern Defenses","author":"carlini","year":"0","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref2","article-title":"Computer Operating Systems","author":"tang","year":"2021","journal-title":"People's Posts and Telecommunications Press"},{"key":"ref1","article-title":"The Never Ending War in the Stack and the Reincarnation of ROP Attacks","author":"nader","year":"2020","journal-title":"ArXiv Preprint"},{"key":"ref8","first-page":"76","article-title":"Control Flow Hijacking: A Study on Buffer Overflow Attacks and Countermeasures","author":"sharma","year":"0","journal-title":"Proceedings of the International Conference on Computer Security"},{"key":"ref7","first-page":"321","article-title":"Understanding Buffer Overflows: Attacks, Implications, and Preventive Measures","volume":"28","author":"johnson","year":"2017","journal-title":"Journal of Cybersecurity and Networks"},{"key":"ref9","first-page":"619","article-title":"Revisiting the Evolution of ROP Attacks and Defenses: A Decade of Lessons Learned","volume":"16","author":"dullien","year":"2017","journal-title":"International Journal of Information Security"},{"key":"ref4","first-page":"111","article-title":"In-depth Analysis of Excessive Recursion and Its Effects on Stack Overflow","volume":"36","author":"dhannanjay","year":"2019","journal-title":"Adv Comput Syst"},{"key":"ref3","first-page":"345","article-title":"Understanding Stack Overflow: A Comprehensive Analysis of the Stack","volume":"25","author":"mackey","year":"2017","journal-title":"Journal of Computer Security"},{"key":"ref6","first-page":"255","article-title":"Security Implications of Stack Overflow: An Analysis of Shell code Injection and Its Countermeasures","volume":"29","author":"naveed","year":"2018","journal-title":"Journal of Information Security"},{"key":"ref5","first-page":"134","article-title":"Unraveling the Heap: A Study on Memory Management and Leaks","author":"jhaveri","year":"0","journal-title":"Proceedings of the International Conference on Computer Systems"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","start":{"date-parts":[[2023,8,25]]},"location":"Penang, Malaysia","end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256382.pdf?arnumber=10256382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T13:51:46Z","timestamp":1697464306000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256382","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}