{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:03:27Z","timestamp":1773655407490,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,3,3]],"date-time":"2014-03-03T00:00:00Z","timestamp":1393804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,3,3]]},"DOI":"10.1145\/2557547.2557572","type":"proceedings-article","created":{"date-parts":[[2014,2,25]],"date-time":"2014-02-25T13:21:11Z","timestamp":1393334471000},"page":"265-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["RopSteg"],"prefix":"10.1145","author":[{"given":"Kangjie","family":"Lu","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Siyang","family":"Xiong","sequence":"additional","affiliation":[{"name":"D'crypt Pte Ltd, Singapore, Singapore"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"Singapore Management University School of Information Systems, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2014,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"In USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Anagnostakis K. G.","year":"2009","unstructured":"K. G. Anagnostakis and E. P. Markatos . An empirical study of real-world polymorphic code injection attacks . In In USENIX Workshop on Large-Scale Exploits and Emergent Threats , 2009 . K. G. Anagnostakis and E. P. Markatos. An empirical study of real-world polymorphic code injection attacks. In In USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11496618_31"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 2009 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE09)","author":"Checkoway S.","year":"2009","unstructured":"S. Checkoway , A. J. Feldman , B. Kantor , J. A. Halderman , E. W. Felten , and H. Shacham . Can dres provide long-lasting security the case of return-oriented programming and the avc advantage . In Proceedings of the 2009 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE09) , Montreal, Canada , Aug. 10-11, 2009 . S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham. Can dres provide long-lasting security the case of return-oriented programming and the avc advantage. In Proceedings of the 2009 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE09), Montreal, Canada, Aug. 10-11, 2009."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292569"},{"key":"e_1_3_2_1_7_1","volume-title":"A taxonomy of obfuscating transformations","author":"Collberg C.","year":"1997","unstructured":"C. Collberg , C. Thomborson , and D. Low . A taxonomy of obfuscating transformations . 1997 . C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. 1997."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027797"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964016"},{"key":"e_1_3_2_1_10_1","volume-title":"Aug.","author":"Detristan T.","year":"2003","unstructured":"T. Detristan , T. Ulenspiegel , Y. Malcom , and M. S. V. Underduk . Polymorphic shellcode engine using spectrum Phrack magazine, 9(61) , Aug. 2003 . http:\/\/www.phrack.org\/issues.html?issue=61&id=9. T. Detristan, T. Ulenspiegel, Y. Malcom, and M. S. V. Underduk. Polymorphic shellcode engine using spectrum Phrack magazine, 9(61), Aug. 2003. http:\/\/www.phrack.org\/issues.html?issue=61&id=9."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_6"},{"key":"e_1_3_2_1_13_1","first-page":"599","article-title":"Practical deniable encryption. LNCS","volume":"4910","author":"Klonowski M. K. M.","year":"2008","unstructured":"M. K. M. Klonowski , P. Kubiak . Practical deniable encryption. LNCS , Springer , 4910 : 599 -- 609 , 2008 . M. K. M. Klonowski, P. Kubiak. Practical deniable encryption. LNCS, Springer, 4910:599--609, 2008.","journal-title":"Springer"},{"key":"e_1_3_2_1_14_1","volume-title":"iOS Hacker's Handbook","author":"Miller C.","year":"2012","unstructured":"C. Miller , D. Blazakis , D. DaiZovi , S. Esser , V. Iozzo , and R.-P. Weinmann . iOS Hacker's Handbook . Wiley , May 8, 2012 . C. Miller, D. Blazakis, D. DaiZovi, S. Esser, V. Iozzo, and R.-P. Weinmann. iOS Hacker's Handbook. Wiley, May 8, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 16th USENIX Security Symposium (Security 2007","author":"Popov I. V.","year":"2007","unstructured":"I. V. Popov , S. K. Debray , and G. R. Andrews . bi obfuscation using signals . In Proceedings of the 16th USENIX Security Symposium (Security 2007 ), Boston, MA, USA , Aug 6-10, 2007 . I. V. Popov, S. K. Debray, and G. R. Andrews. bi obfuscation using signals. In Proceedings of the 16th USENIX Security Symposium (Security 2007), Boston, MA, USA, Aug 6-10, 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/646762.706165"},{"key":"e_1_3_2_1_17_1","volume-title":"Return-oriented programming: Systems,languages, and applications","author":"Roemer R.","year":"2009","unstructured":"R. Roemer , E. Buchanan , H. Shacham , and S. Savagm . Return-oriented programming: Systems,languages, and applications , 2009 . R. Roemer, E. Buchanan, H. Shacham, and S. Savagm. Return-oriented programming: Systems,languages, and applications, 2009."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 20th USENIX conference on Security (Security'11)","author":"Schwartz E. J.","year":"2011","unstructured":"E. J. Schwartz , T. Avgerinos , and D. Brumley . Q: exploit hardening made easy . In Proceedings of the 20th USENIX conference on Security (Security'11) , San Francisco, CA, USA , August , 2011 . E. J. Schwartz, T. Avgerinos, and D. Brumley. Q: exploit hardening made easy. In Proceedings of the 20th USENIX conference on Security (Security'11), San Francisco, CA, USA, August, 2011."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 16th Network and Distributed System Security Symposium (NDSS 2008","author":"Sharif M.","year":"2008","unstructured":"M. Sharif , A. Lanzi , and W. Lee . Impeding malware analysis using conditional code obfuscation . In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS 2008 ), San Diego, CA, USA, Feb. 8--11 , 2008 . M. Sharif, A. Lanzi, and W. Lee. Impeding malware analysis using conditional code obfuscation. In Proceedings of the 16th Network and Distributed System Security Symposium (NDSS 2008), San Diego, CA, USA, Feb. 8--11, 2008."},{"key":"e_1_3_2_1_21_1","unstructured":"F. Skulason. 1260-the variable virus. 1990. Virus Bulletin.  F. Skulason. 1260-the variable virus. 1990. Virus Bulletin."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of The 7th USENIX conference on Hot topics in Security (HotSec 2012","author":"Song C.","year":"2012","unstructured":"C. Song , P. Royal , and W. Lee . Impeding automated malware analysis with environment-sensitive malware . In Proceedings of The 7th USENIX conference on Hot topics in Security (HotSec 2012 ), Bellevue, WA, USA , August 2012 . C. Song, P. Royal, and W. Lee. Impeding automated malware analysis with environment-sensitive malware. In Proceedings of The 7th USENIX conference on Hot topics in Security (HotSec 2012), Bellevue, WA, USA, August 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.03.005"},{"key":"e_1_3_2_1_24_1","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip F.","year":"1995","unstructured":"F. Tip . A survey of program slicing techniques . JOURNAL OF PROGRAMMING LANGUAGES , 3 : 121 -- 189 , 1995 . F. Tip. A survey of program slicing techniques. JOURNAL OF PROGRAMMING LANGUAGES, 3:121--189, 1995.","journal-title":"JOURNAL OF PROGRAMMING LANGUAGES"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866368"}],"event":{"name":"CODASPY'14: Fourth ACM Conference on Data and Application Security and Privacy","location":"San Antonio Texas USA","acronym":"CODASPY'14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 4th ACM conference on Data and application security and privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2557547.2557572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:09:50Z","timestamp":1750234190000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2557547.2557572"}},"subtitle":["program steganography with return oriented programming"],"short-title":[],"issued":{"date-parts":[[2014,3,3]]},"references-count":26,"alternative-id":["10.1145\/2557547.2557572","10.1145\/2557547"],"URL":"https:\/\/doi.org\/10.1145\/2557547.2557572","relation":{},"subject":[],"published":{"date-parts":[[2014,3,3]]},"assertion":[{"value":"2014-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}