{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:36:18Z","timestamp":1729672578139,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/sees.2012.6225491","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T17:25:33Z","timestamp":1341854733000},"page":"51-57","source":"Crossref","is-referenced-by-count":8,"title":["A dynamic detective method against ROP attack on ARM platform"],"prefix":"10.1109","author":[{"given":"Zhi Jun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Tao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jia","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"ARM Procedure Call Standard for the ARM Architecture","year":"2009","key":"19"},{"journal-title":"Documentation for the PaX project","year":"2003","key":"35"},{"journal-title":"Valgrind (2000-2005)","year":"0","key":"17"},{"journal-title":"A Study of Android Application Security","year":"0","author":"enck","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"33","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1966913.1966920","article-title":"ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks","author":"daviy","year":"2011","journal-title":"ASIACCS '11 Proceedings of the 6th ACM Symposium on Information Computer and Communications Security 2011[C]"},{"journal-title":"PIN","year":"0","key":"15"},{"key":"34","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/978-3-642-10772-6_13","article-title":"DROP: Detecting Return-Oriented Programming Malicious Code","volume":"5905","author":"chen","year":"2009","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"journal-title":"Exploiting format string vulnerabilities","year":"2001","key":"13"},{"journal-title":"Dynamic Binary Analysis and Instrumentation or Building Tools is Easy","year":"2004","author":"nethercote","key":"14"},{"key":"37","article-title":"Detection of Malicious Applications on Android OS","author":"di cerbo","year":"2011","journal-title":"IWCF 2010"},{"journal-title":"Escape from Return-Oriented Programming Return-oriented Programming Without Returns (On the X86)","year":"2010","author":"checkoway","key":"11"},{"journal-title":"Privilege Escalation Attacks on Android","year":"0","author":"davi","key":"12"},{"year":"0","key":"21"},{"year":"0","key":"20"},{"journal-title":"readelf","year":"0","key":"22"},{"journal-title":"objdump","year":"0","key":"23"},{"journal-title":"Arm Exploitation Ropmap","year":"0","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1542452.1542472"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"27","first-page":"191","article-title":"Secure Execution Via Program Shepherding","author":"kiriansky","year":"2002","journal-title":"The Proceedings of the 11th USENIX Security Symposium (Security '02) 2002[C] San Francisco California"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821514"},{"key":"29","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1145\/1030083.1030124","article-title":"On the Effectiveness of Address Space Randomization","author":"shacham","year":"2004","journal-title":"CCS '04 Proceedings of the 11th ACM Conference on Computer and Communications Security 2004[C]"},{"key":"3","first-page":"383","article-title":"Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms","author":"hund","year":"2009","journal-title":"SSYM'09 Proceedings of the 18th Conference on USENIX Security Symposium 2009[C]"},{"key":"2","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/1315245.1315313","article-title":"The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)","author":"shacham","year":"2007","journal-title":"CCS'07 Proceedings of the 14th ACM Conference on Computer and Communications Security 2007[C]"},{"key":"10","article-title":"Return-Oriented Programming without Returns on ARM","author":"davi","year":"2010","journal-title":"Technical Report HGI-TR-2010-002 2010[C]"},{"journal-title":"Return-to-libc Attack Lab[J]","year":"2007","author":"du","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998434"},{"key":"7","article-title":"Automatic Construction of Jump-Oriented Programming Shellcode (on the x86)","author":"chen","year":"0","journal-title":"ASIACCS '11 March 22-24 2011 Hong Kong China"},{"key":"6","article-title":"Jump-Oriented Programming: A New Class of Code-Reuse Attack","author":"bletsch","year":"0","journal-title":"ASIACCS '11 March 22-24 2011 Hong Kong China"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755934"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"journal-title":"Return Oriented Programming for the ARM Architecture","year":"2009","author":"kornau","key":"9"},{"key":"8","article-title":"Developments in Cisco IOS forensics","author":"lidner","year":"0","journal-title":"Router Exploitation"}],"event":{"name":"2012 2nd International Workshop on Software Engineering for Embedded Systems (SEES)","start":{"date-parts":[[2012,6,9]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2012,6,9]]}},"container-title":["2012 Second International Workshop on Software Engineering for Embedded Systems (SEES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6220313\/6225480\/06225491.pdf?arnumber=6225491","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T17:08:01Z","timestamp":1497978481000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6225491\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/sees.2012.6225491","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}