{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:13Z","timestamp":1773511213193,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1408826, CCF-1217710, CCF-1149211"],"award-info":[{"award-number":["CNS-1408826, CCF-1217710, CCF-1149211"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813644","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"914-926","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":118,"title":["Per-Input Control-Flow Integrity"],"prefix":"10.1145","author":[{"given":"Ben","family":"Niu","sequence":"first","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993540"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"D. Interpreter Exploitation. In Proceedings of the 4th USENIX Conference on Offensive Technologies","author":"Blazakis","year":"2010"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_3_2_1_7_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Carlini N.","year":"2015"},{"key":"e_1_3_2_1_8_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Carlini N.","year":"2014"},{"key":"e_1_3_2_1_9_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Davi L.","year":"2012"},{"key":"e_1_3_2_1_10_1","volume-title":"Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Davi L.","year":"2014"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Deng L. Zeng Q. and \n      Liu Y\n  . \n  ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries\n  . In ICT Systems Security and Privacy Protection H. Federrath and D. Gollmann Eds. vol. \n  455\n   of \n  IFIP Advances in Information and Communication Technology\n  . \n  Springer International Publishing 2015 pp. \n  386\n  --\n  400\n  .  Deng L. Zeng Q. and Liu Y. ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries. In ICT Systems Security and Privacy Protection H. Federrath and D. Gollmann Eds. vol. 455 of IFIP Advances in Information and Communication Technology. Springer International Publishing 2015 pp. 386--400.","DOI":"10.1007\/978-3-319-18467-8_26"},{"key":"e_1_3_2_1_12_1","first-page":"75","volume-title":"XFI: Software Guards for System Address Spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Erlingsson","year":"2006"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_3_2_1_15_1","first-page":"147","volume-title":"Code-Pointer Integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Kuznetsov V.","year":"2014"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium -","volume":"15","author":"McCamant S.","year":"2006"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23271"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516649"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_21_1","volume-title":"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In 22nd Usenix Security Symposium","author":"Pappas V.","year":"2013"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523674"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575307"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_26_1","first-page":"1","volume-title":"19th Usenix Security Symposium","author":"Sehr D.","year":"2010"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_28_1","volume-title":"Exploiting and Protecting Dynamic Code Generation. In 22nd Annual Network and Distributed System Security Symposium, NDSS 2015","author":"Song C.","year":"2014"},{"key":"e_1_3_2_1_29_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Tice C.","year":"2014"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046713"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 22Nd USENIX Conference on Security (2013), SEC'13.","author":"Zhang M."}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":35,"alternative-id":["10.1145\/2810103.2813644","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813644","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}