{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:12:19Z","timestamp":1771697539381,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/sarnof.2015.7324662","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T18:02:28Z","timestamp":1447351348000},"page":"161-166","source":"Crossref","is-referenced-by-count":5,"title":["Impact of software obfuscation on susceptibility to Return-Oriented Programming attacks"],"prefix":"10.1109","author":[{"given":"Harshvardhan P.","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Aravindhan","family":"Dhanasekaran","sequence":"additional","affiliation":[]},{"given":"Rudra","family":"Dutta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"GNU Coreutils","year":"0"},{"key":"ref11","article-title":"OpenSSL: Cryptography and SSL\/TLS Toolkit","year":"0","journal-title":"org\/"},{"key":"ref12","article-title":"The Tigress C Diversifier\/Obfuscator","year":"0"},{"key":"ref13","article-title":"Obfuscator LLVM","year":"0"},{"key":"ref14","article-title":"ROPgadget","year":"0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557572"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref17","first-page":"340","article-title":"Control-flow integrity","author":"abadi","year":"0","journal-title":"Proceedings of the 12th ACM conference on Computer and communications security ACM 2005"},{"key":"ref18","first-page":"447","article-title":"Transparent rop exploit mitigation using indirect branch tracing","author":"pappas","year":"2013","journal-title":"Usenix Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"ref4","author":"nagra","year":"2009","journal-title":"Surreptitious Software Obfuscation Watermarking and Tamperproofing for Software Protection"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/1315245.1315313","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM Conference on Computer and Communications Security Ser CCS '07"},{"key":"ref6","article-title":"The advanced return-into-lib (c) exploits: Pax case study","author":"wojtczuk","year":"2001","journal-title":"Phrack Magazine Volume 0&#x00D7;0b Issue 0&#x00D7;3a Phile# 0&#x00D7;04 of 0&#x00D7;0e"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"ref1","first-page":"105","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","volume":"3","author":"bhatkar","year":"2003","journal-title":"Usenix Security"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref20","article-title":"Rop is still dangerous: Breaking modern defenses","author":"carlini","year":"0","journal-title":"USENIX Security Symposium 2014"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-319-11379-1_5","article-title":"Evaluating the effectiveness of current anti-rop defenses","author":"schuster","year":"2014","journal-title":"Research in Attacks Intrusions and Defenses"}],"event":{"name":"2015 36th IEEE Sarnoff Symposium","location":"Newark, NJ, USA","start":{"date-parts":[[2015,9,20]]},"end":{"date-parts":[[2015,9,22]]}},"container-title":["2015 36th IEEE Sarnoff Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7312262\/7324628\/07324662.pdf?arnumber=7324662","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T09:51:00Z","timestamp":1567331460000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7324662\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/sarnof.2015.7324662","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}