{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:44:31Z","timestamp":1773737071462,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,22]],"date-time":"2011-03-22T00:00:00Z","timestamp":1300752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,22]]},"DOI":"10.1145\/1966913.1966919","type":"proceedings-article","created":{"date-parts":[[2011,4,7]],"date-time":"2011-04-07T09:36:11Z","timestamp":1302168971000},"page":"30-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":365,"title":["Jump-oriented programming"],"prefix":"10.1145","author":[{"given":"Tyler","family":"Bletsch","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Xuxian","family":"Jiang","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Vince W.","family":"Freeh","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Zhenkai","family":"Liang","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2011,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NASM. http:\/\/www.nasm.us\/.  NASM. http:\/\/www.nasm.us\/."},{"key":"e_1_3_2_1_2_1","unstructured":"PaX ASLR Documentation. http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  PaX ASLR Documentation. http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_3_1","unstructured":"W^X. http:\/\/en.wikipedia.org\/wiki\/W^X.  W^X. http:\/\/en.wikipedia.org\/wiki\/W^X."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_7_1","volume-title":"12th USENIX Security","author":"Bhatkar S.","year":"2003","unstructured":"S. Bhatkar , D. C. DuVarney , and R. Sekar . Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits . 12th USENIX Security , 2003 . S. Bhatkar, D. C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. 12th USENIX Security, 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"14th USENIX Security","author":"Bhatkar S.","year":"2005","unstructured":"S. Bhatkar , R. Sekar , and D. C. DuVarney . Efficient Techniques for Comprehensive Protection from Memory Error Exploits . 14th USENIX Security , 2005 . S. Bhatkar, R. Sekar, and D. C. DuVarney. Efficient Techniques for Comprehensive Protection from Memory Error Exploits. 14th USENIX Security, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_11_1","volume-title":"17th ISOC NDSS","author":"Caballero J.","year":"2010","unstructured":"J. Caballero , N. M. Johnson , S. McCamant , and D. Song . Binary Code Extraction and Interface Identification for Security Applications . In 17th ISOC NDSS , 2010 . J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary Code Extraction and Interface Identification for Security Applications. In 17th ISOC NDSS, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"7th USENIX OSDI","author":"Castro M.","year":"2006","unstructured":"M. Castro , M. Costa , and T. Harris . Securing Software by Enforcing Data-Flow Integrity . In 7th USENIX OSDI , 2006 . M. Castro, M. Costa, and T. Harris. Securing Software by Enforcing Data-Flow Integrity. In 7th USENIX OSDI, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX","author":"Checkoway S.","year":"2009","unstructured":"S. Checkoway , A. J. Feldman , B. Kantor , J. A. Halderman , E. W. Felten , and H. Shacham . Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In EVT\/WOTE 2009 , USENIX , 2009 . S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In EVT\/WOTE 2009, USENIX, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10772-6_13"},{"key":"e_1_3_2_1_17_1","volume-title":"21st IEEE ICDCS","author":"Chiueh T.","year":"2001","unstructured":"T. Chiueh and F. Hsu . RAD: A Compile-Time Solution to Buffer Overflow Attacks . In 21st IEEE ICDCS , April 2001 . T. Chiueh and F. Hsu. RAD: A Compile-Time Solution to Buffer Overflow Attacks. In 21st IEEE ICDCS, April 2001."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655108.1655117"},{"key":"e_1_3_2_1_20_1","volume-title":"Phrack Magazine","volume":"11","author":"Durden T.","year":"2002","unstructured":"T. Durden . Bypassing PaX ASLR Protection . Phrack Magazine , Volume 11 , Issue 0x59, File 9 of 18 , 2002 . T. Durden. Bypassing PaX ASLR Protection. Phrack Magazine, Volume 11, Issue 0x59, File 9 of 18, 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"e_1_3_2_1_22_1","volume-title":"StackGhost: Hardware Facilitated Stack Protection. In 10th USENIX Security Symposium","author":"Frantzen M.","year":"2001","unstructured":"M. Frantzen and M. Shuey . StackGhost: Hardware Facilitated Stack Protection. In 10th USENIX Security Symposium , 2001 . M. Frantzen and M. Shuey. StackGhost: Hardware Facilitated Stack Protection. In 10th USENIX Security Symposium, 2001."},{"key":"e_1_3_2_1_23_1","volume-title":"19th USENIX Security Symposium","author":"Hund R.","year":"2009","unstructured":"R. Hund , T. Holz , and F. C. Freiling . Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms . In 19th USENIX Security Symposium , Aug. 2009 . R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In 19th USENIX Security Symposium, Aug. 2009."},{"key":"e_1_3_2_1_24_1","volume-title":"Intel 64 and IA-32 Architectures Software Developer's Manual","author":"Intel Corporation","year":"2010","unstructured":"Intel Corporation . Intel 64 and IA-32 Architectures Software Developer's Manual , volume 2 . Mar. 2010 . Intel Corporation. Intel 64 and IA-32 Architectures Software Developer's Manual, volume 2. Mar. 2010."},{"key":"e_1_3_2_1_25_1","volume-title":"Technical Report WG14 N1124","author":"ISO.","year":"1999","unstructured":"ISO. The ansi c standard (c99). Technical Report WG14 N1124 , ISO\/IEC , 1999 . ISO. The ansi c standard (c99). Technical Report WG14 N1124, ISO\/IEC, 1999."},{"key":"e_1_3_2_1_26_1","unstructured":"R. Johnson. Open source posix threads for win32 faq. http:\/\/sourceware.org\/pthreads-win32\/faq.html.  R. Johnson. Open source posix threads for win32 faq. http:\/\/sourceware.org\/pthreads-win32\/faq.html."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_28_1","volume-title":"Secure Execution Via Program Shepherding. In 11th USENIX Security Symposium","author":"Kiriansky V.","year":"2002","unstructured":"V. Kiriansky , D. Bruening , and S. Amarasinghe . Secure Execution Via Program Shepherding. In 11th USENIX Security Symposium , August 2002 . V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure Execution Via Program Shepherding. In 11th USENIX Security Symposium, August 2002."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.10"},{"key":"e_1_3_2_1_30_1","volume-title":"Ruhr-Universit\u00e4t Bochum","author":"Kornau T.","year":"2010","unstructured":"T. Kornau . Return oriented programming for the ARM architecture. Master's thesis , Ruhr-Universit\u00e4t Bochum , January 2010 . T. Kornau. Return oriented programming for the ARM architecture. Master's thesis, Ruhr-Universit\u00e4t Bochum, January 2010."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755934"},{"key":"e_1_3_2_1_32_1","volume-title":"CONference 2.0","author":"Lidner F. F.","year":"2009","unstructured":"F. F. Lidner . Developments in Cisco IOS Forensics . In CONference 2.0 , Nov. 2009 . F. F. Lidner. Developments in Cisco IOS Forensics. In CONference 2.0, Nov. 2009."},{"issue":"0","key":"e_1_3_2_1_33_1","first-page":"x58","volume":"11","author":"Exploits The Advanced","year":"2001","unstructured":"Nergal. The Advanced Return-into-lib(c) Exploits : PaX Case Study. Phrack Magazine , Volume 11 , Issue 0 x58 , 2001 . Nergal. The Advanced Return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 11, Issue 0x58, 2001.","journal-title":"PaX Case Study. Phrack Magazine"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"e_1_3_2_1_35_1","unstructured":"PaX Team. What the future holds for PaX. http:\/\/pax.grsecurity.net\/docs\/pax-future.txt 2003.  PaX Team. What the future holds for PaX. http:\/\/pax.grsecurity.net\/docs\/pax-future.txt 2003."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"}],"event":{"name":"ASIA CCS '11: 6th ACM Symposium on Information, Compuer and Communications Security","location":"Hong Kong China","acronym":"ASIA CCS '11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1966913.1966919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:25Z","timestamp":1750243945000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1966913.1966919"}},"subtitle":["a new class of code-reuse attack"],"short-title":[],"issued":{"date-parts":[[2011,3,22]]},"references-count":35,"alternative-id":["10.1145\/1966913.1966919","10.1145\/1966913"],"URL":"https:\/\/doi.org\/10.1145\/1966913.1966919","relation":{},"subject":[],"published":{"date-parts":[[2011,3,22]]},"assertion":[{"value":"2011-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}