{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,19]],"date-time":"2025-10-19T15:40:08Z","timestamp":1760888408874,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T00:00:00Z","timestamp":1258070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,13]]},"DOI":"10.1145\/1655108.1655117","type":"proceedings-article","created":{"date-parts":[[2009,11,17]],"date-time":"2009-11-17T13:30:15Z","timestamp":1258464615000},"page":"49-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":103,"title":["Dynamic integrity measurement and attestation"],"prefix":"10.1145","author":[{"given":"Lucas","family":"Davi","sequence":"first","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]},{"given":"Marcel","family":"Winandy","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2009,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","unstructured":"Phrack Magazine 1996 49 14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884371"},{"key":"e_1_3_2_1_4_1","volume-title":"Conference on the Future of Trust in Computing (FTC 2008)","author":"Bratus S.","year":"2008","unstructured":"S. Bratus , M. E. Locasto , A. Ramaswamy , and S. W. Smith . New directions for hardware-assisted trusted computing policies . In Conference on the Future of Trust in Computing (FTC 2008) , June 2008 . http: \/\/www.cs.dartmouth.edu\/~sws\/pubs\/berlin.pdf. S. Bratus, M. E. Locasto, A. Ramaswamy, and S. W. Smith. New directions for hardware-assisted trusted computing policies. In Conference on the Future of Trust in Computing (FTC 2008), June 2008. http: \/\/www.cs.dartmouth.edu\/~sws\/pubs\/berlin.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_6_1","first-page":"15","volume-title":"Proceedings of USENIX 2004 Annual Technical Conference","author":"Cantrill B. M.","year":"2004","unstructured":"B. M. Cantrill , M. W. Shapiro , and A. H. Leventhal . Dynamic instrumentation of production systems . In Proceedings of USENIX 2004 Annual Technical Conference , pages 15 -- 28 , Berkeley, CA, USA , 2004 . USENIX Association. B. M. Cantrill, M. W. Shapiro, and A. H. Leventhal. Dynamic instrumentation of production systems. In Proceedings of USENIX 2004 Annual Technical Conference, pages 15--28, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455778"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.158"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Virtual Machine Research and Technology Symposium","author":"Haldar V.","year":"2004","unstructured":"V. Haldar , D. Chandra , and M. Franz . Semantic remote attestation: A virtual machine directed approach to trusted computing . In USENIX Virtual Machine Research and Technology Symposium , 2004 . V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation: A virtual machine directed approach to trusted computing. In USENIX Virtual Machine Research and Technology Symposium, 2004."},{"key":"e_1_3_2_1_13_1","unstructured":"Internet Crime Complaint Center. 2008 Internet Crime Report. http:\/\/www.ic3.gov\/media\/ annualreport\/2008_IC3Report.pdf 2008.  Internet Crime Complaint Center. 2008 Internet Crime Report. http:\/\/www.ic3.gov\/media\/ annualreport\/2008_IC3Report.pdf 2008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133063"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/872016.872166"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270348"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314368"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314362"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_22_1","volume-title":"July","author":"Microsoft Corporation","year":"2007","unstructured":"Microsoft Corporation . Bitlocker drive encryption , July 2007 . http:\/\/www.microsoft.com\/technet\/windowsvista\/security\/bitlockr.mspx. Microsoft Corporation. Bitlocker drive encryption, July 2007. http:\/\/www.microsoft.com\/technet\/windowsvista\/security\/bitlockr.mspx."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Network and Distributed Security Symposium","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In Proceedings of the Network and Distributed Security Symposium , 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed Security Symposium, 2005."},{"key":"e_1_3_2_1_24_1","unstructured":"PaX Team. http:\/\/pax.grsecurity.net\/.  PaX Team. http:\/\/pax.grsecurity.net\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315260"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065907.1066038"},{"key":"e_1_3_2_1_29_1","first-page":"223","volume-title":"Proceedings of the 13th USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , X. Zhang , T. Jaeger , and L. van Doorn . Design and implementation of a TCG-based integrity measurement architecture . In Proceedings of the 13th USENIX Security Symposium , pages 223 -- 238 , 2004 . R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of the 13th USENIX Security Symposium, pages 223--238, 2004."},{"key":"e_1_3_2_1_30_1","unstructured":"SANS Institute. SANS Top-20 2007 Security Risks. http:\/\/www.sans.org\/top20\/2007\/top20.pdf Nov. 2007.  SANS Institute. SANS Top-20 2007 Security Risks. http:\/\/www.sans.org\/top20\/2007\/top20.pdf Nov. 2007."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_32_1","unstructured":"Solar Designer. \"return-to-libc\" attack. Bugtraq 1997.  Solar Designer. \"return-to-libc\" attack. Bugtraq 1997."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_34_1","unstructured":"Tiller Beauchamp and David Weston. Dtrace: The reverse engineer's unexpected swiss army knife. http:\/\/www.poppopret.org\/ DTrace-Beauchamp-Weston.pdf 2008.  Tiller Beauchamp and David Weston. Dtrace: The reverse engineer's unexpected swiss army knife. http:\/\/www.poppopret.org\/ DTrace-Beauchamp-Weston.pdf 2008."},{"key":"e_1_3_2_1_35_1","volume-title":"TPM main specification. Specification Version 1.2 rev","author":"Trusted Computing Group","year":"2007","unstructured":"Trusted Computing Group . TPM main specification. Specification Version 1.2 rev . 103, July 2007 . https: \/\/www.trustedcomputinggroup.org\/specs\/TPM\/. Trusted Computing Group. TPM main specification. Specification Version 1.2 rev. 103, July 2007. https: \/\/www.trustedcomputinggroup.org\/specs\/TPM\/."},{"key":"e_1_3_2_1_36_1","first-page":"121","volume-title":"Proceedings of the 15th USENIX Security Symposium","author":"Xu W.","year":"2006","unstructured":"W. Xu , S. Bhatkar , and R. Sekar . Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks . In Proceedings of the 15th USENIX Security Symposium , pages 121 -- 136 , 2006 . W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In Proceedings of the 15th USENIX Security Symposium, pages 121--136, 2006."}],"event":{"name":"CCS '09: 16th ACM Conference on Computer and Communications Security 2009","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS '09"},"container-title":["Proceedings of the 2009 ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655108.1655117","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655108.1655117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:32Z","timestamp":1750250732000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655108.1655117"}},"subtitle":["towards defense against return-oriented programming attacks"],"short-title":[],"issued":{"date-parts":[[2009,11,13]]},"references-count":34,"alternative-id":["10.1145\/1655108.1655117","10.1145\/1655108"],"URL":"https:\/\/doi.org\/10.1145\/1655108.1655117","relation":{},"subject":[],"published":{"date-parts":[[2009,11,13]]},"assertion":[{"value":"2009-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}