{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:40:26Z","timestamp":1775054426536,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/malware.2014.6999408","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:44:39Z","timestamp":1421703879000},"page":"18-25","source":"Crossref","is-referenced-by-count":6,"title":["Automatic construction of printable return-oriented programming payload"],"prefix":"10.1109","author":[{"given":"Wenbiao","family":"Ding","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Mao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966918"},{"key":"17","doi-asserted-by":"crossref","first-page":"1016","DOI":"10.1145\/2382196.2382310","article-title":"Marlin: Making it Harder to Fish for Gadgets","author":"gupta","year":"2012","journal-title":"New York USA Proceedings of the 2012 ACM Conference on Computer and Communications Security"},{"key":"23","author":"designer","year":"1997","journal-title":"Return-to-libc"},{"key":"18","article-title":"Exploit Hardening Made Easy","author":"schwartz","year":"2011","journal-title":"San Francisco USA Proceedings of USENIX Security Symposium"},{"key":"15","article-title":"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing","author":"pappas","year":"2013","journal-title":"Washington USA Proceedings of 22nd USENIX Conference on Security"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"13","first-page":"346","article-title":"StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"San Antonio USA Proceedings of the 7th USENIX Security Symposium"},{"key":"14","first-page":"163","author":"chen","year":"2009","journal-title":"Detecting Return-Oriented Programming Malicious Code"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"12","first-page":"40","article-title":"ROPdefender: A detection tool to defend against return-oriented programming attacks","author":"davi","year":"2011","journal-title":"Hong Kong China Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"3","year":"2001","journal-title":"Advances in format string exploiting"},{"key":"20","year":"0"},{"key":"2","first-page":"14","article-title":"Smashing the stack for fun and profit","volume":"7","author":"one","year":"1996","journal-title":"Phrack Magazine"},{"key":"1","first-page":"552","article-title":"The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)","author":"shacham","year":"2007","journal-title":"VA USA ACM Conference on Computer and Communications Security"},{"key":"10","first-page":"64","author":"homescu","year":"2012","journal-title":"Microgadgets Size Does Matter in Turing-complete Return-Oriented Programming"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653725"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_6"},{"key":"5","year":"0","journal-title":"PaX Non-executable Pages Design & Implementation"},{"key":"4","author":"horovitz","year":"2002","journal-title":"Big loop integer protection"},{"key":"9","first-page":"30","article-title":"Jump-oriented programming: A new class of code-reuse attack","author":"bletsch","year":"2011","journal-title":"Hong Kong China Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"8","year":"0"}],"event":{"name":"2014 9th International Conference on Malicious and Unwanted Software: \"The Americas\" (MALWARE)","location":"Fajardo, PR, USA","start":{"date-parts":[[2014,10,28]]},"end":{"date-parts":[[2014,10,30]]}},"container-title":["2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6987537\/6999400\/06999408.pdf?arnumber=6999408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T23:54:53Z","timestamp":1498175693000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6999408\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/malware.2014.6999408","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}