{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:16:05Z","timestamp":1777338965945,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813673","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"927-940","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":145,"title":["Practical Context-Sensitive CFI"],"prefix":"10.1145","author":[{"given":"Victor","family":"van der Veen","sequence":"first","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]},{"given":"Dennis","family":"Andriesse","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]},{"given":"Enes","family":"G\u00f6kta\u015f","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]},{"given":"Ben","family":"Gras","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]},{"given":"Lionel","family":"Sambuc","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]},{"given":"Asia","family":"Slowinska","sequence":"additional","affiliation":[{"name":"VU University \/ Lastline, Inc, Amsterdam \/ Santa Barbara, CA, Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache benchmark. http:\/\/httpd.apache.org\/docs\/2.0\/programs\/ab.html.  Apache benchmark. http:\/\/httpd.apache.org\/docs\/2.0\/programs\/ab.html."},{"key":"e_1_3_2_1_2_1","unstructured":"LLVM DSA - Reproduce the Result in PLDI 07 Paper. http:\/\/lists.cs.uiuc.edu\/pipermail\/llvmdev\/2015-May\/085390.html.  LLVM DSA - Reproduce the Result in PLDI 07 Paper. http:\/\/lists.cs.uiuc.edu\/pipermail\/llvmdev\/2015-May\/085390.html."},{"key":"e_1_3_2_1_3_1","unstructured":"OpenSSH portable regression tests. http:\/\/www.dtucker.net\/openssh\/regress.  OpenSSH portable regression tests. http:\/\/www.dtucker.net\/openssh\/regress."},{"key":"e_1_3_2_1_4_1","unstructured":"pyftpdlib. https:\/\/code.google.com\/p\/pyftpdlib.  pyftpdlib. https:\/\/code.google.com\/p\/pyftpdlib."},{"key":"e_1_3_2_1_5_1","unstructured":"SendEmail. http:\/\/caspian.dotconf.net\/menu\/Software\/SendEmail.  SendEmail. http:\/\/caspian.dotconf.net\/menu\/Software\/SendEmail."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11576280_9"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024569.2024572"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX SEC","author":"Bhatkar S.","year":"2005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX SEC","author":"Carlini N.","year":"2015"},{"key":"e_1_3_2_1_16_1","volume-title":"USENIX SEC","author":"Carlini N.","year":"2014"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23248"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_20_1","volume-title":"ICDCS","author":"Chiueh T.-C.","year":"2001"},{"key":"e_1_3_2_1_21_1","volume-title":"ASSAV","author":"Corliss M. L.","year":"2004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.26"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX SEC","author":"Davi L.","year":"2014"},{"key":"e_1_3_2_1_25_1","volume-title":"OSDI","author":"Erlingsson U.","year":"2006"},{"key":"e_1_3_2_1_26_1","volume-title":"Runtime prevention of return-oriented programming attacks","author":"Fratric I.","year":"2012"},{"key":"e_1_3_2_1_27_1","volume-title":"Out of control: Overcoming control-flow integrity","author":"G\u00f6kta\u015f E.","year":"2014"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX SEC","author":"G\u00f6kta\u015f E.","year":"2014"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX SEC","author":"Kiriansky V.","year":"2002"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2010.19"},{"key":"e_1_3_2_1_31_1","volume-title":"OSDI","author":"Kuznetsov V.","year":"2014"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250766"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516649"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX SEC","author":"Pappas V.","year":"2013"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX ATC","author":"Prasad M.","year":"2003"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.32"},{"key":"e_1_3_2_1_40_1","volume-title":"Counterfeit object-oriented programming","author":"Schuster F.","year":"2015"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_5"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_43_1","volume-title":"Transparent runtime shadow stack: Protection against malicious return address modifications","author":"Sinnadurai S.","year":"2004"},{"key":"e_1_3_2_1_44_1","volume-title":"NDSS","author":"Slowinska A.","year":"2011"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985935"},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX SEC","author":"Tice C.","year":"2014"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884434"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_50_1","volume-title":"IEEE DSN","author":"Xia Y.","year":"2012"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.27"},{"key":"e_1_3_2_1_52_1","volume-title":"USENIX SEC","author":"Zeng B.","year":"2013"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_1_55_1","volume-title":"USENIX SEC","author":"Zhang M.","year":"2013"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":55,"alternative-id":["10.1145\/2810103.2813673","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813673","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}