{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:41:10Z","timestamp":1755034870972},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,13]],"date-time":"2021-12-13T00:00:00Z","timestamp":1639353600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,13]]},"DOI":"10.1109\/pst52912.2021.9647820","type":"proceedings-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T16:08:01Z","timestamp":1640102881000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["Practical Protection of Binary Applications via Transparent Immunization"],"prefix":"10.1109","author":[{"given":"Xinyuan","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","first-page":"340","article-title":"Control-Flow Integrity: Principles, Implementations, and Applications","author":"abadi","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"ref30","article-title":"Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation","author":"keung luk","year":"2005","journal-title":"Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2005)"},{"key":"ref37","article-title":"A Binary Rewriting Defense against Stack Based Overflow attacks","author":"prasad","year":"2003","journal-title":"Proceedings of the 2003 USENIX Annual Technical Conference (ATC 2003)"},{"key":"ref36","article-title":"PLTO: A Link-Time Optimizer for the Intel IA-32 Architecture","author":"schwarz","year":"2001","journal-title":"In Proceedings of the 3rd Workshop on Binary Rewriting (WBT 2001)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"ref34","article-title":"Efficient Fine-Grained Binary Instrumentation with Applications to Taint-Tracking","author":"saxena","year":"2008","journal-title":"Proceedings of the 2008 International Symposium on Code Generation and Optimization (CGO 2008)"},{"journal-title":"Top 6 Free Network Intrusion Detection Systems (NIDS) Software in 2020","year":"2020","author":"team","key":"ref10"},{"key":"ref40","article-title":"Control Flow Integrity for COTS Binaries","author":"zhang","year":"2013","journal-title":"Proceedings of the 22nd USENIX Security Symposium"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"journal-title":"The U S government spent billions on a system for detecting hacks The Russians outsmarted it","year":"2021","author":"timberg","key":"ref15"},{"key":"ref16","article-title":"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits","author":"bhatkar","year":"2003","journal-title":"Proceedings of the 12th USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"ref19","article-title":"Intrusion Prevention Using Control Data Randomization","author":"xu","year":"2003","journal-title":"Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003)"},{"key":"ref28","article-title":"Artificial Malware Immunization based on Dynamically Assigned Sense of Self","author":"wang","year":"2010","journal-title":"Proceedings of the 13th Information Security Conference (ISC 2010)"},{"journal-title":"Equifax's Data Breach Costs Hit $1 4 Billion","year":"2019","author":"schwartz","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199328"},{"journal-title":"2019 cost of a data breach report","year":"2019","author":"security","key":"ref3"},{"journal-title":"CVE-2017-5638 The Apache Struts vulnerability explained","year":"2017","author":"mort","key":"ref6"},{"key":"ref29","first-page":"459","article-title":"Sysfilter: Automated System Call Filtering for Commodity Software","author":"demarinis","year":"2020","journal-title":"Proceedings of the 23rd International Symposium on Research in Attacks Intrusions and Defenses (RAID 2020)"},{"journal-title":"CVE-2017-5638 Detail","year":"2017","author":"database","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"journal-title":"Internet Security Threat Report Volume 24","year":"2019","key":"ref7"},{"journal-title":"Cybersecurity Incidents","year":"2015","author":"center","key":"ref2"},{"journal-title":"The 15 Biggest Data Breaches of the 21st Century","year":"2020","author":"swinhoe","key":"ref1"},{"journal-title":"Top 10 Routinely Exploited Vulnerabilities","year":"2020","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238076"},{"key":"ref45","article-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity","author":"carlini","year":"2015","journal-title":"Proceedings of the 24th USENIX Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.36"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23271"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813682"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_20"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924295"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"}],"event":{"name":"2021 18th International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2021,12,13]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2021,12,15]]}},"container-title":["2021 18th International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9647713\/9647738\/09647820.pdf?arnumber=9647820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T12:59:51Z","timestamp":1652187591000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9647820\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,13]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/pst52912.2021.9647820","relation":{},"subject":[],"published":{"date-parts":[[2021,12,13]]}}}