{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:34:46Z","timestamp":1775054086169,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T00:00:00Z","timestamp":1457481600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,9]]},"DOI":"10.1145\/2857705.2857722","type":"proceedings-article","created":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T20:57:50Z","timestamp":1457125070000},"page":"38-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["HCFI"],"prefix":"10.1145","author":[{"given":"Nick","family":"Christoulakis","sequence":"first","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"George","family":"Christou","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[{"name":"VU University, Amsterdam, Netherlands"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"FORTH, Heraklion, Greece"}]}],"member":"320","published-online":{"date-parts":[[2016,3,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The SPARC Architecture Manual Version 8. www.sparc.com\/standards\/V8.pdf.   The SPARC Architecture Manual Version 8. www.sparc.com\/standards\/V8.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/github.com\/iadgov\/Control-Flow-Integrity\/tree\/master\/paper","author":"Hardware Control Flow Integrity IT","year":"2015","unstructured":"Hardware Control Flow Integrity for an IT Ecosystem . https:\/\/github.com\/iadgov\/Control-Flow-Integrity\/tree\/master\/paper , 2015 . Hardware Control Flow Integrity for an IT Ecosystem. https:\/\/github.com\/iadgov\/Control-Flow-Integrity\/tree\/master\/paper, 2015."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_4_1","volume-title":"Data Execution Prevention","author":"Andersen S.","year":"2004","unstructured":"Andersen , S. , and Abella , V . Changes to functionality in microsoft windows xp service pack 2, part 3: Memory protection technologies , Data Execution Prevention . Microsoft TechNet Library , September 2004 . http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx. Andersen, S., and Abella, V. Changes to functionality in microsoft windows xp service pack 2, part 3: Memory protection technologies, Data Execution Prevention. Microsoft TechNet Library, September 2004. http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx."},{"key":"e_1_3_2_1_5_1","unstructured":"Aravind Prakash Xunchao Hu and Heng Yin. vfguard: Strict protection for virtual function calls in cots c  Aravind Prakash Xunchao Hu and Heng Yin. vfguard: Strict protection for virtual function calls in cots c"},{"key":"e_1_3_2_1_6_1","volume-title":"Symposium on Network and Distributed System Security (NDSS)","year":"2015","unstructured":"binaries. In Symposium on Network and Distributed System Security (NDSS) ( 2015 ). binaries. In Symposium on Network and Distributed System Security (NDSS) (2015)."},{"key":"e_1_3_2_1_7_1","volume-title":"NDSS","author":"Athanasakis M.","year":"2015","unstructured":"Athanasakis , M. , Athanasopoulos , E. , Polychronakis , M. , Portokalidis , G. , and Ioannidis , S . The devil is in the constants: Bypassing defenses in browser jit engines . In NDSS ( 2015 ), The Internet Society . Athanasakis, M., Athanasopoulos, E., Polychronakis, M., Portokalidis, G., and Ioannidis, S. The devil is in the constants: Bypassing defenses in browser jit engines. In NDSS (2015), The Internet Society."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181316"},{"key":"e_1_3_2_1_10_1","volume-title":"Pilani. He is a Fellow of the Institution of Engineers (India)","author":"Burkardt J.","year":"1995","unstructured":"Burkardt , J. , Puglielli , P. , and Center , P. S . Matmul: An interactive matrix multiplication benchmark. degrees from BITS , Pilani. He is a Fellow of the Institution of Engineers (India) , Fellow of National Academy of Engineering (FNAE), Fellow of National Academy of Sciences (FNASc) , Life Member ISTE(LMISTE). Professor Kothari has published\/presented 640 ( 1995 ). Burkardt, J., Puglielli, P., and Center, P. S. Matmul: An interactive matrix multiplication benchmark. degrees from BITS, Pilani. He is a Fellow of the Institution of Engineers (India), Fellow of National Academy of Engineering (FNAE), Fellow of National Academy of Sciences (FNASc), Life Member ISTE(LMISTE). Professor Kothari has published\/presented 640 (1995)."},{"key":"e_1_3_2_1_11_1","first-page":"161","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Carlini N.","year":"2015","unstructured":"Carlini , N. , Barresi , A. , Payer , M. , Wagner , D. , and Gross , T. R . Control-flow bending: On the effectiveness of control-flow integrity . In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015 ), USENIX Association , pp. 161 -- 176 . Carlini, N., Barresi, A., Payer, M., Wagner, D., and Gross, T. R. Control-flow bending: On the effectiveness of control-flow integrity. In 24th USENIX Security Symposium (USENIX Security 15) (Washington, D.C., Aug. 2015), USENIX Association, pp. 161--176."},{"key":"e_1_3_2_1_12_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Carlini N.","year":"2014","unstructured":"Carlini , N. , and Wagner , D . Rop is still dangerous: Breaking modern defenses . In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA , Aug. 2014 ), USENIX Association, pp. 385--399. Carlini, N., and Wagner, D. Rop is still dangerous: Breaking modern defenses. In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 385--399."},{"key":"e_1_3_2_1_13_1","volume-title":"Symposium on Network and Distributed System Security (NDSS)","author":"Chao Zhang","year":"2015","unstructured":"Chao Zhang , Chengyu Songz, Kevin Zhijie Chen , Zhaofeng Cheny, and Dawn Song . Vtint : Protecting virtual function tables' integrity . In Symposium on Network and Distributed System Security (NDSS) ( 2015 ). Chao Zhang, Chengyu Songz, Kevin Zhijie Chen, Zhaofeng Cheny, and Dawn Song. Vtint: Protecting virtual function tables' integrity. In Symposium on Network and Distributed System Security (NDSS) (2015)."},{"key":"e_1_3_2_1_14_1","volume-title":"21st Annual Network and Distributed System Security Symposium, NDSS 2014","author":"Cheng Y.","year":"2013","unstructured":"Cheng , Y. , Zhou , Z. , Yu , M. , Ding , X. , and Deng , R. H . Ropecker: A generic and practical approach for defending against ROP attacks . In 21st Annual Network and Distributed System Security Symposium, NDSS 2014 , San Diego, California, USA, February 23--26 , 2013 (2014). Cheng, Y., Zhou, Z., Yu, M., Ding, X., and Deng, R. H. Ropecker: A generic and practical approach for defending against ROP attacks. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23--26, 2013 (2014)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_3_2_1_17_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Davi L.","year":"2014","unstructured":"Davi , L. , Sadeghi , A.-R. , Lehmann , D. , and Monrose , F . Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection . In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA , Aug. 2014 ), USENIX Association, pp. 401--416. Davi, L., Sadeghi, A.-R., Lehmann, D., and Monrose, F. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 401--416."},{"key":"e_1_3_2_1_18_1","unstructured":"EEMBC. Coremark Benchmark. https:\/\/www.eembc.org\/coremark\/.  EEMBC. Coremark Benchmark. https:\/\/www.eembc.org\/coremark\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Gaisler Research. Leon3 synthesizable processor. http:\/\/www.gaisler.com.  Gaisler Research. Leon3 synthesizable processor. http:\/\/www.gaisler.com."},{"key":"e_1_3_2_1_20_1","unstructured":"Gawlik R. and Holz T. Towards automated integrity protection of c  Gawlik R. and Holz T. Towards automated integrity protection of c"},{"key":"e_1_3_2_1_21_1","first-page":"396","volume-title":"Proceedings of the 30th Annual Computer Security Applications Conference (New York, NY, USA, 2014), ACSAC '14, ACM","unstructured":"virtual function tables in binary programs . In Proceedings of the 30th Annual Computer Security Applications Conference (New York, NY, USA, 2014), ACSAC '14, ACM , pp. 396 -- 405 . virtual function tables in binary programs. In Proceedings of the 30th Annual Computer Security Applications Conference (New York, NY, USA, 2014), ACSAC '14, ACM, pp. 396--405."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_23_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"G\u00f6kta\u0107","year":"2014","unstructured":"G\u00f6kta\u0107 s, E., Athanasopoulos , E. , Polychronakis , M. , Bos , H. , and Portokalidis , G . Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard . In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA , Aug. 2014 ), USENIX Association, pp. 417--432. G\u00f6kta\u0107 s, E., Athanasopoulos, E., Polychronakis, M., Bos, H., and Portokalidis, G. Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard. In 23rd USENIX Security Symposium (USENIX Security 14) (San Diego, CA, Aug. 2014), USENIX Association, pp. 417--432."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818025"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_26_1","unstructured":"Jang D. Tatlock Z. and Lerner S. Safedispatch: Securing c  Jang D. Tatlock Z. and Lerner S. Safedispatch: Securing c"},{"key":"e_1_3_2_1_27_1","volume-title":"Symposium on Network and Distributed System Security (NDSS)","year":"2014","unstructured":"virtual calls from memory corruption attacks . In Symposium on Network and Distributed System Security (NDSS) ( 2014 ). virtual calls from memory corruption attacks. In Symposium on Network and Distributed System Security (NDSS) (2014)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337159.2337171"},{"key":"e_1_3_2_1_29_1","volume-title":"Smashing the stack for fun and profit. Phrack magazine 7, 49","author":"One A.","year":"1996","unstructured":"One , A. Smashing the stack for fun and profit. Phrack magazine 7, 49 ( 1996 ), 365. One, A. Smashing the stack for fun and profit. Phrack magazine 7, 49 (1996), 365."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.166"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_32_1","first-page":"447","volume-title":"USENIX","author":"Pappas V.","unstructured":"Pappas , V. , Polychronakis , M. , and Keromytis , A. D . Transparent rop exploit mitigation using indirect branch tracing. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13) (Washington, D.C., 2013) , USENIX , pp. 447 -- 462 . Pappas, V., Polychronakis, M., and Keromytis, A. D. Transparent rop exploit mitigation using indirect branch tracing. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13) (Washington, D.C., 2013), USENIX, pp. 447--462."},{"key":"e_1_3_2_1_33_1","volume-title":"Address Space Layout Randomization (ASLR)","author":"Pa X","year":"2003","unstructured":"Pa X Team . Address Space Layout Randomization (ASLR) , 2003 . http:\/\/pax.grsecurity.net\/docs\/aslr.txt. PaX Team. Address Space Layout Randomization (ASLR), 2003. http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_35_1","unstructured":"Schuster F. Tendyck T. Liebchen C. Davi L. Sadeghi A.-R. and Holz T. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in c  Schuster F. Tendyck T. Liebchen C. Davi L. Sadeghi A.-R. and Holz T. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in c"},{"key":"e_1_3_2_1_36_1","volume-title":"36th IEEE Symposium on Security and Privacy (Oakland) (May","year":"2015","unstructured":"applications. In 36th IEEE Symposium on Security and Privacy (Oakland) (May 2015 ). applications. In 36th IEEE Symposium on Security and Privacy (Oakland) (May 2015)."},{"key":"e_1_3_2_1_37_1","first-page":"88","volume-title":"RAID 2014, Gothenburg, Sweden, September 17--19, 2014. Proceedings","author":"Schuster F.","year":"2014","unstructured":"Schuster , F. , Tendyck , T. , Pewny , J. , Maa\u00df , A. , Steegmanns , M. , Contag , M. , and Holz , T . Evaluating the effectiveness of current anti-rop defenses. In Research in Attacks, Intrusions and Defenses - 17th International Symposium , RAID 2014, Gothenburg, Sweden, September 17--19, 2014. Proceedings ( 2014 ), pp. 88 -- 108 . Schuster, F., Tendyck, T., Pewny, J., Maa\u00df, A., Steegmanns, M., Contag, M., and Holz, T. Evaluating the effectiveness of current anti-rop defenses. In Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17--19, 2014. Proceedings (2014), pp. 88--108."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_39_1","volume-title":"SPEC CINT2000 Benchmarks. http:\/\/www.spec.org\/cpu2000\/CINT2000","author":"Standard Performance Evaluation Corporation (SPEC).","unstructured":"Standard Performance Evaluation Corporation (SPEC). SPEC CINT2000 Benchmarks. http:\/\/www.spec.org\/cpu2000\/CINT2000 . Standard Performance Evaluation Corporation (SPEC). SPEC CINT2000 Benchmarks. http:\/\/www.spec.org\/cpu2000\/CINT2000."},{"key":"e_1_3_2_1_40_1","first-page":"941","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014), SEC'14, USENIX Association","author":"Tice C.","unstructured":"Tice , C. , Roeder , T. , Collingbourne , P. , Checkoway , S. , Erlingsson , U. , Lozano , L. , and Pike , G . Enforcing forward-edge control-flow integrity in gcc and llvm . In Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014), SEC'14, USENIX Association , pp. 941 -- 955 . Tice, C., Roeder, T., Collingbourne, P., Checkoway, S., Erlingsson, U., Lozano, L., and Pike, G. Enforcing forward-edge control-flow integrity in gcc and llvm. In Proceedings of the 23rd USENIX Conference on Security Symposium (Berkeley, CA, USA, 2014), SEC'14, USENIX Association, pp. 941--955."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/358274.358283"},{"key":"e_1_3_2_1_43_1","unstructured":"Xilinx. ISE Simulator (ISim). http:\/\/www.xilinx.com\/tools\/isim.htm.  Xilinx. ISE Simulator (ISim). http:\/\/www.xilinx.com\/tools\/isim.htm."},{"key":"e_1_3_2_1_44_1","unstructured":"Xilinx. Xilinx Virtex 6 ml605 rev-e Evaluation Board. http:\/\/www.xilinx.com\/support\/documentation\/boards_and_kits\/ug534.pdf 2012.  Xilinx. Xilinx Virtex 6 ml605 rev-e Evaluation Board. http:\/\/www.xilinx.com\/support\/documentation\/boards_and_kits\/ug534.pdf 2012."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_46_1","first-page":"337","volume-title":"Usenix Security","author":"Zhang M.","year":"2013","unstructured":"Zhang , M. , and Sekar , R . Control flow integrity for COTS binaries . In Usenix Security ( 2013 ), pp. 337 -- 352 . Zhang, M., and Sekar, R. Control flow integrity for COTS binaries. In Usenix Security (2013), pp. 337--352."}],"event":{"name":"CODASPY'16: Sixth ACM Conference on Data and Application Security and Privacy","location":"New Orleans Louisiana USA","acronym":"CODASPY'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857705.2857722","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2857705.2857722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:42Z","timestamp":1750227162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857705.2857722"}},"subtitle":["Hardware-enforced Control-Flow Integrity"],"short-title":[],"issued":{"date-parts":[[2016,3,9]]},"references-count":46,"alternative-id":["10.1145\/2857705.2857722","10.1145\/2857705"],"URL":"https:\/\/doi.org\/10.1145\/2857705.2857722","relation":{},"subject":[],"published":{"date-parts":[[2016,3,9]]},"assertion":[{"value":"2016-03-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}