{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:57:49Z","timestamp":1773154669440,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,7]],"date-time":"2015-12-07T00:00:00Z","timestamp":1449446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","award":["2011-049"],"award-info":[{"award-number":["2011-049"]}],"id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["259108"],"award-info":[{"award-number":["259108"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818025","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T17:06:08Z","timestamp":1449853568000},"page":"341-350","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["ShrinkWrap"],"prefix":"10.1145","author":[{"given":"Istvan","family":"Haller","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Enes","family":"G\u00f6kta\u015f","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"FORTH-ICS"}]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Itanium C++ ABI. mentorembedded.github.io\/cxx-abi\/abi.html.  Itanium C++ ABI. mentorembedded.github.io\/cxx-abi\/abi.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of Usenix Security'10","author":"Akritidis Periklis","unstructured":"Periklis Akritidis . Cling : A memory allocator to mitigate dangling pointers . In Proc. of Usenix Security'10 . Periklis Akritidis. Cling: A memory allocator to mitigate dangling pointers. In Proc. of Usenix Security'10."},{"key":"e_1_3_2_1_4_1","volume-title":"Data Execution Prevention","author":"Andersen S.","year":"2004","unstructured":"S. Andersen and V. Abella . Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies , Data Execution Prevention , 2004 . http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx. S. Andersen and V. Abella. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, Data Execution Prevention, 2004. http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of Usenix Security'14","author":"Carlini Nicholas","unstructured":"Nicholas Carlini and David Wagner . ROP is Still Dangerous: Breaking Modern Defenses . In Proc. of Usenix Security'14 . Nicholas Carlini and David Wagner. ROP is Still Dangerous: Breaking Modern Defenses. In Proc. of Usenix Security'14."},{"key":"e_1_3_2_1_7_1","volume-title":"Dawn Song. VTint: Protecting Virtual Function Tables' Integrity. In Proc. of the 22nd NDSS","author":"Zhang Chao","year":"2015","unstructured":"Chao Zhang , Chengyu Songz , Kevin Zhijie Chen , Zhaofeng Cheny , and Dawn Song. VTint: Protecting Virtual Function Tables' Integrity. In Proc. of the 22nd NDSS , 2015 . Chao Zhang, Chengyu Songz, Kevin Zhijie Chen, Zhaofeng Cheny, and Dawn Song. VTint: Protecting Virtual Function Tables' Integrity. In Proc. of the 22nd NDSS, 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of Usenix Security'98","author":"Cowan Crispin","unstructured":"Crispin Cowan , Calton Pu , Dave Maier , Heather Hinton , Jonathan Walpole , Peat Bakke , Steve Beattie , Aaron Grier , Perry Wagle , Qian Zhang , : Automatic adaptive detection and prevention of buffer-overflow attacks . In Proc. of Usenix Security'98 . Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, et al. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. of Usenix Security'98."},{"key":"e_1_3_2_1_10_1","volume-title":"Fabian Monrose. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In Proc. of Usenix Security'14","author":"Davi Lucas","unstructured":"Lucas Davi , Ahmad-Reza Sadeghi , Daniel Lehmann , and Fabian Monrose. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In Proc. of Usenix Security'14 , August. Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, and Fabian Monrose. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In Proc. of Usenix Security'14, August."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of Usenix Security'14","author":"G\u00f6kta\u015f Enes","unstructured":"Enes G\u00f6kta\u015f , Elias Athanasopoulos , Michalis Polychronakis , Herbert Bos , and Georgios Portokalidis . Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard . In Proc. of Usenix Security'14 . Enes G\u00f6kta\u015f, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. In Proc. of Usenix Security'14."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23287"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of Usenix Security'13","author":"Pappas Vasilis","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos D. Keromytis . Transparent ROP Exploit Mitigation Using Indirect Branch Tracing . In Proc. of Usenix Security'13 . Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In Proc. of Usenix Security'13."},{"key":"e_1_3_2_1_16_1","volume-title":"Address Space Layout Randomization (ASLR)","author":"Team X","year":"2003","unstructured":"Pa X Team . Address Space Layout Randomization (ASLR) , 2003 . pax.grsecurity.net\/docs\/aslr.txt. PaX Team. Address Space Layout Randomization (ASLR), 2003. pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_20_1","volume-title":"Geoff Pike. Enforcing Forward-edge Control-flow Integrity in GCC and LLVM. In Proc. of Usenix Security'14","author":"Tice Caroline","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike. Enforcing Forward-edge Control-flow Integrity in GCC and LLVM. In Proc. of Usenix Security'14 . Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. Enforcing Forward-edge Control-flow Integrity in GCC and LLVM. In Proc. of Usenix Security'14."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23190"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of Usenix Security'13","author":"Zhang Mingwei","unstructured":"Mingwei Zhang and R Sekar . Control flow integrity for COTS binaries . In Proc. of Usenix Security'13 . Mingwei Zhang and R Sekar. Control flow integrity for COTS binaries. In Proc. of Usenix Security'13."}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","location":"Los Angeles CA USA","acronym":"ACSAC 2015","sponsor":["ACSA Applied Computing Security Assoc"]},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818025","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:43:26Z","timestamp":1750225406000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818025"}},"subtitle":["VTable Protection without Loose Ends"],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":23,"alternative-id":["10.1145\/2818000.2818025","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818025","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}