{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:43Z","timestamp":1750306723834,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,10,12]],"date-time":"2014-10-12T00:00:00Z","timestamp":1413072000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,10,12]]},"DOI":"10.1145\/2656075.2656092","type":"proceedings-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:57:59Z","timestamp":1412686679000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity"],"prefix":"10.1145","author":[{"given":"Chen","family":"Liu","sequence":"first","affiliation":[{"name":"University of Delaware, Newark, DE"}]},{"given":"Chengmo","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE"}]},{"given":"Yuanqi","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Delaware, Newark, DE"}]}],"member":"320","published-online":{"date-parts":[[2014,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.36"},{"key":"e_1_3_2_1_2_1","unstructured":"c0ntex \"Bypassing non-executable-stack during exploitation using return-to-libc \" http:\/\/css.csail.mit.edu\/6.858\/2012\/readings\/return-to-libc.pdf.  c0ntex \"Bypassing non-executable-stack during exploitation using return-to-libc \" http:\/\/css.csail.mit.edu\/6.858\/2012\/readings\/return-to-libc.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_4_1","unstructured":"M. Howard and M. Thomlinson \"Windows vista ISV security \" in Microsoft Corporation.  M. Howard and M. Thomlinson \"Windows vista ISV security \" in Microsoft Corporation ."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_6_1","unstructured":"C. Cowan M. Barringer S. Beattie G. Kroah-Hartman M. Frantzen and J. Lokier \"Formatguard: Automatic protection from printf format string vulnerabilities \" in 10th USENIX Security Symp. pp. 191--200 2001.   C. Cowan M. Barringer S. Beattie G. Kroah-Hartman M. Frantzen and J. Lokier \"Formatguard: Automatic protection from printf format string vulnerabilities \" in 10th USENIX Security Symp . pp. 191--200 2001."},{"key":"e_1_3_2_1_7_1","unstructured":"S. Bhatkar R. Sekar and D. C. DuVarney \"Efficient techniques for comprehensive protection from memory error exploits \" in 15th USENIX Security Symp. pp. 17--17 2005.   S. Bhatkar R. Sekar and D. C. DuVarney \"Efficient techniques for comprehensive protection from memory error exploits \" in 15th USENIX Security Symp . pp. 17--17 2005."},{"key":"e_1_3_2_1_8_1","unstructured":"S. Forrest A. Somayaji and D. Ackley \"Building diverse computer systems \" in 6th Workshop on Hot Topics in Operating Systems (HotOS-VI) pp. 67--73 1997.   S. Forrest A. Somayaji and D. Ackley \"Building diverse computer systems \" in 6th Workshop on Hot Topics in Operating Systems (HotOS-VI) pp. 67--73 1997."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_10_1","unstructured":"J. Salwan \"ROPgadget: Gadgets finder and auto-roper \" http:\/\/shell-storm.org\/project\/ROPgadget\/.  J. Salwan \"ROPgadget: Gadgets finder and auto-roper \" http:\/\/shell-storm.org\/project\/ROPgadget\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_14_1","unstructured":"T. Durden \"Bypassing PaX ASLR protection \" http:\/\/www.phrack.org\/issues.html?issue=59&id=9.  T. Durden \"Bypassing PaX ASLR protection \" http:\/\/www.phrack.org\/issues.html?issue=59&id=9."},{"key":"e_1_3_2_1_15_1","unstructured":"A. Sotirov and M. Dowd \"Bypassing browser memory protections in Windows Vista \" in Black Hat USA 2008.  A. Sotirov and M. Dowd \"Bypassing browser memory protections in Windows Vista \" in Black Hat USA 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_17_1","unstructured":"C. Cowan C. Pu D. Maier H. Hintony J. Walpole P. Bakke S. Beattie A. Grier P. Wagle and Q. Zhang \"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks \" in 7th USENIX Security Symp. vol. 7 pp. 63--78 Jan. 1998.   C. Cowan C. Pu D. Maier H. Hintony J. Walpole P. Bakke S. Beattie A. Grier P. Wagle and Q. Zhang \"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks \" in 7th USENIX Security Symp . vol. 7 pp. 63--78 Jan. 1998."},{"key":"e_1_3_2_1_18_1","unstructured":"Bulba and Kil3r \"Bypassing stackguard and stackshield \" http:\/\/phrack.org\/issues\/56\/5.html.  Bulba and Kil3r \"Bypassing stackguard and stackshield \" http:\/\/phrack.org\/issues\/56\/5.html."},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"Conf. Dependable Syst. & Netw. (DSN)","author":"Xia Y.","year":"2012"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39881-3_21"},{"key":"e_1_3_2_1_21_1","unstructured":"J. Xu Z. Kalbarczyk and S. Patel \"Architecture Support for Defending Against Buffer Overflow Attacks \" in 2nd Workshop on Evaluating and Architecting Syst. dependability (EASY) 2002.  J. Xu Z. Kalbarczyk and S. Patel \"Architecture Support for Defending Against Buffer Overflow Attacks \" in 2nd Workshop on Evaluating and Architecting Syst. dependability (EASY) 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/977091.977139"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055626.1055637"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540731"},{"key":"e_1_3_2_1_26_1","unstructured":"C. Price \"MIPS IV Instruction Set \" in MIPS Technologies 1995.  C. Price \"MIPS IV Instruction Set \" in MIPS Technologies 1995."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289816.1289853"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629395.1629422"},{"key":"e_1_3_2_1_29_1","unstructured":"Mibench \"Mibench Version 1.0 \" http:\/\/www.eecs.umich.edu\/mibench\/.  Mibench \"Mibench Version 1.0 \" http:\/\/www.eecs.umich.edu\/mibench\/."},{"key":"e_1_3_2_1_30_1","unstructured":"\"MediaBench Consortium \" http:\/\/euler.slu.edu\/fritts\/mediabench\/.  \"MediaBench Consortium \" http:\/\/euler.slu.edu\/fritts\/mediabench\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.982917"}],"event":{"name":"ESWEEK'14: TENTH EMBEDDED SYSTEM WEEK","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGDA ACM Special Interest Group on Design Automation","IEEE CAS","IEEE Council on Electronic Design Automation (CEDA)","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"New Delhi India","acronym":"ESWEEK'14"},"container-title":["Proceedings of the 2014 International Conference on Hardware\/Software Codesign and System Synthesis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656075.2656092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2656075.2656092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:35Z","timestamp":1750231175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656075.2656092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,12]]},"references-count":31,"alternative-id":["10.1145\/2656075.2656092","10.1145\/2656075"],"URL":"https:\/\/doi.org\/10.1145\/2656075.2656092","relation":{},"subject":[],"published":{"date-parts":[[2014,10,12]]},"assertion":[{"value":"2014-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}