{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:59Z","timestamp":1772164019550,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-13-2-0045"],"award-info":[{"award-number":["W911NF-13-2-0045"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1408880"],"award-info":[{"award-number":["CNS-1408880"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,4]]},"DOI":"10.1145\/3037697.3037716","type":"proceedings-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T08:47:40Z","timestamp":1491382060000},"page":"585-598","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["GRIFFIN"],"prefix":"10.1145","author":[{"given":"Xinyang","family":"Ge","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Weidong","family":"Cui","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ApacheBench: a complete benchmarking and regression testing suite. https:\/\/httpd.apache.org\/docs\/2.2\/programs\/ab.html.  ApacheBench: a complete benchmarking and regression testing suite. https:\/\/httpd.apache.org\/docs\/2.2\/programs\/ab.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Intel control-flow enforcement technology (CET) preview. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf.  Intel control-flow enforcement technology (CET) preview. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"pyftpdlib. https:\/\/github.com\/giampaolo\/pyftpdlib.  pyftpdlib. https:\/\/github.com\/giampaolo\/pyftpdlib."},{"key":"e_1_3_2_1_4_1","unstructured":"sendemail. http:\/\/caspian.dotconf.net\/menu\/Software\/SendEmail.  sendemail. http:\/\/caspian.dotconf.net\/menu\/Software\/SendEmail."},{"key":"e_1_3_2_1_5_1","volume-title":"System Programming Guide","author":"C","year":"2016","unstructured":"Intel 64 and IA-32 architectures software developer's manual. Volume 3 (3A, 3B, 3 C & 3D) : System Programming Guide , 2016 . Intel 64 and IA-32 architectures software developer's manual. Volume 3 (3A, 3B, 3C & 3D): System Programming Guide, 2016."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_7_1","volume-title":"Data Execution Prevention. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies","author":"Andersen S.","year":"2004","unstructured":"S. Andersen and V. Abella . Data Execution Prevention. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies , 2004 . S. Andersen and V. Abella. Data Execution Prevention. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, 2004."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security). USENIX Association","author":"Carlini N.","year":"2014","unstructured":"N. Carlini and D. Wagner . ROP is still dangerous: Breaking modern defenses . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security). USENIX Association , 2014 . N. Carlini and D. Wagner. ROP is still dangerous: Breaking modern defenses. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security). USENIX Association, 2014."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security). USENIX Association","author":"Carlini N.","year":"2015","unstructured":"N. Carlini , A. Barresi , M. Payer , D. Wagner , and T. R. Gross . Control-flow bending: On the effectiveness of control-flow integrity . In Proceedings of the 24th USENIX Security Symposium (USENIX Security). USENIX Association , 2015 . N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross. Control-flow bending: On the effectiveness of control-flow integrity. In Proceedings of the 24th USENIX Security Symposium (USENIX Security). USENIX Association, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.26"},{"key":"e_1_3_2_1_15_1","unstructured":"G. Dabah. diStorm - Powerful Disassembler Library for x86\/AMD64. https:\/\/github.com\/gdabah\/distorm.  G. Dabah. diStorm - Powerful Disassembler Library for x86\/AMD64. https:\/\/github.com\/gdabah\/distorm."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 19th Network and Distributed System Security Symposium (NDSS). ISOC","author":"Davi L.","year":"2012","unstructured":"berger, and Sadeghi]mocfi L. Davi , A. Dmitrienko , M. Egele , T. Fischer , T. Holz , R. Hund , S. N\u00fcrnberger , and A.-R. Sadeghi . MoCFI : A framework to mitigate control-flow attacks on smartphones . In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS). ISOC , 2012 . berger, and Sadeghi]mocfiL. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. N\u00fcrnberger, and A.-R. Sadeghi. MoCFI: A framework to mitigate control-flow attacks on smartphones. In Proceedings of the 19th Network and Distributed System Security Symposium (NDSS). ISOC, 2012."},{"key":"e_1_3_2_1_19_1","first-page":"401","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security)","author":"Davi L.","year":"2014","unstructured":"L. Davi , A.-R. Sadeghi , D. Lehmann , and F. Monrose . Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security) , pages 401 -- 416 . USENIX Association , 2014 . L. Davi, A.-R. Sadeghi, D. Lehmann, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), pages 401--416. USENIX Association, 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.24"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_24_1","first-page":"417","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security)","author":"G\u00f6kta\u0107 E.","year":"2014","unstructured":"a\\c s E. G\u00f6kta\u0107 , E. Athanasopoulos , M. Polychronakis , H. Bos , and G. Portokalidis . Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security) , pages 417 -- 432 . USENIX Association , 2014 . a\\c s et al.(2014)G\u00f6kta\u0107, Athanasopoulos, Polychronakis, Bos, and Portokalidis]sizedoesmatterE. G\u00f6kta\u0107, E. Athanasopoulos, M. Polychronakis, H. Bos, and G. Portokalidis. Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), pages 417--432. USENIX Association, 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/143095.143114"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991089"},{"key":"e_1_3_2_1_28_1","first-page":"383","volume-title":"Proceedings of the 18th USENIX Security Symposium (USENIX Security)","author":"Hund R.","year":"2009","unstructured":"R. Hund , T. Holz , and F. C. Freiling . Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms . In Proceedings of the 18th USENIX Security Symposium (USENIX Security) , pages 383 -- 398 . USENIX Association , 2009 . R. Hund, T. Holz, and F. C. Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Proceedings of the 18th USENIX Security Symposium (USENIX Security), pages 383--398. USENIX Association, 2009."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815412"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). USENIX Association","author":"Kuznetsov V.","year":"2014","unstructured":"V. Kuznetsov , L. Szekeres , M. Payer , G. Candea , R. Sekar , and D. Song . Code-pointer integrity . In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). USENIX Association , 2014 . V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. Code-pointer integrity. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). USENIX Association, 2014."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755934"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.18"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). ACM","author":"Niu B.","unstructured":"]mcfi B. Niu and G. Tan . Modular control-flow integrity . In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). ACM , 2014\\natexlaba. ]mcfiB. Niu and G. Tan. Modular control-flow integrity. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). ACM, 2014\\natexlaba."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_1_36_1","first-page":"447","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security)","author":"Pappas V.","year":"2013","unstructured":"V. Pappas , M. Polychronakis , and A. D. Keromytis . Transparent ROP exploit mitigation using indirect branch tracing . In Proceedings of the 22nd USENIX Security Symposium (USENIX Security) , pages 447 -- 462 . USENIX Association , 2013 . V. Pappas, M. Polychronakis, and A. D. Keromytis. Transparent ROP exploit mitigation using indirect branch tracing. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security), pages 447--462. USENIX Association, 2013."},{"key":"e_1_3_2_1_37_1","volume-title":"Documentation for the PaX project - overall description. https:\/\/pax.grsecurity.net\/docs\/pax.txt","author":"Team X","year":"2008","unstructured":"008)]paxPa X Team . Documentation for the PaX project - overall description. https:\/\/pax.grsecurity.net\/docs\/pax.txt , 2008 . 008)]paxPaX Team. Documentation for the PaX project - overall description. https:\/\/pax.grsecurity.net\/docs\/pax.txt, 2008."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815695.1815724"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"e_1_3_2_1_40_1","author":"Roemer R.","year":"2012","unstructured":"R. Roemer , E. Buchanan , H. Shacham , and S. Savage . Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information and System Security (TISSEC) , 2012 . R. Roemer, E. Buchanan, H. Shacham, and S. Savage. Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information and System Security (TISSEC), 2012.","journal-title":"Return-oriented programming: Systems, languages, and applications. ACM Transactions on Information and System Security (TISSEC)"},{"key":"e_1_3_2_1_41_1","unstructured":"F. Schuster T. Tendyck C. Liebchen L. Davi A.-R. Sadeghi and T. Holz. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C  F. Schuster T. Tendyck C. Liebchen L. Davi A.-R. Sadeghi and T. Holz. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C"},{"key":"e_1_3_2_1_42_1","first-page":"745","volume-title":"Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P)","year":"2015","unstructured":"applications. In Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P) , pages 745 -- 762 . IEEE, 2015 . applications. In Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P), pages 745--762. IEEE, 2015."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (USENIX Security)","author":"Tice C.","year":"2014","unstructured":"C. Tice , T. Roeder , P. Collingbourne , S. Checkoway , \u00da. Erlingsson, L. Lozano , and G. Pike . Enforcing forward-edge control-flow integrity in gcc & llvm . In Proceedings of the 23rd USENIX Security Symposium (USENIX Security) , 2014 . C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, \u00da. Erlingsson, L. Lozano, and G. Pike. Enforcing forward-edge control-flow integrity in gcc & llvm. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), 2014."},{"key":"e_1_3_2_1_44_1","first-page":"927","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS)","author":"V.","year":"2015","unstructured":"a\u015f, Gras, Sambuc, Slowinska, Bos, and Giuffrida]patharmor V. van der Veen, D. Andriesse, E. G\u00f6kta\u015f, B. Gras, L. Sambuc, A. Slowinska, H. Bos, and C. Giuffrida. Practical context-sensitive CFI . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS) , pages 927 -- 940 . ACM, 2015 . a\u015f, Gras, Sambuc, Slowinska, Bos, and Giuffrida]patharmorV. van der Veen, D. Andriesse, E. G\u00f6kta\u015f, B. Gras, L. Sambuc, A. Slowinska, H. Bos, and C. Giuffrida. Practical context-sensitive CFI. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), pages 927--940. ACM, 2015."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P). IEEE","author":"V.","year":"2016","unstructured":"as, Contag, Pawlowski, Chen, Rawat, Bos, Holz, Athanasopoulos, and Giuffrida]typearmor V. van der Veen, E. G\u00f6ktas, M. Contag, A. Pawlowski, X. Chen, S. Rawat, H. Bos, T. Holz, E. Athanasopoulos, and C. Giuffrida. A tough call: Mitigating advanced code-reuse attacks at the binary level . In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P). IEEE , 2016 . as, Contag, Pawlowski, Chen, Rawat, Bos, Holz, Athanasopoulos, and Giuffrida]typearmorV. van der Veen, E. G\u00f6ktas, M. Contag, A. Pawlowski, X. Chen, S. Rawat, H. Bos, T. Holz, E. Athanasopoulos, and C. Giuffrida. A tough call: Mitigating advanced code-reuse attacks at the binary level. In Proceedings of the 37th IEEE Symposium on Security and Privacy (S&P). IEEE, 2016."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076739"},{"key":"e_1_3_2_1_48_1","first-page":"1","volume-title":"Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","author":"Xia Y.","year":"2012","unstructured":"Y. Xia , Y. Liu , H. Chen , and B. Zang . CFIMon: Detecting violation of control flow integrity using performance counters . In Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN) , pages 1 -- 12 . IEEE, 2012 . Y. Xia, Y. Liu, H. Chen, and B. Zang. CFIMon: Detecting violation of control flow integrity using performance counters. In Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pages 1--12. IEEE, 2012."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_4"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046713"},{"key":"e_1_3_2_1_51_1","first-page":"559","volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P)","author":"Zhang C.","year":"2013","unstructured":"C. Zhang , T. Wei , Z. Chen , L. Duan , L. Szekeres , S. McCamant , D. Song , and W. Zou . Practical control flow integrity and randomization for binary executables . In Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P) , pages 559 -- 573 . IEEE, 2013 . C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou. Practical control flow integrity and randomization for binary executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy (S&P), pages 559--573. IEEE, 2013."},{"key":"e_1_3_2_1_52_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security). USENIX Association","author":"Zhang M.","year":"2013","unstructured":"M. Zhang and R. Sekar . Control flow integrity for COTS binaries . In Proceedings of the 22nd USENIX Security Symposium (USENIX Security). USENIX Association , 2013 . M. Zhang and R. Sekar. Control flow integrity for COTS binaries. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security). USENIX Association, 2013."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"}],"event":{"name":"ASPLOS '17: Architectural Support for Programming Languages and Operating Systems","location":"Xi'an China","acronym":"ASPLOS '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037716","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037716","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:50:27Z","timestamp":1750204227000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037716"}},"subtitle":["Guarding Control Flows Using Intel Processor Trace"],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":53,"alternative-id":["10.1145\/3037697.3037716","10.1145\/3037697"],"URL":"https:\/\/doi.org\/10.1145\/3037697.3037716","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3093337.3037716","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/3093336.3037716","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,4,4]]},"assertion":[{"value":"2017-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}