{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T14:18:10Z","timestamp":1763389090897,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134037","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2405-2419","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["JITGuard"],"prefix":"10.1145","author":[{"given":"Tommaso","family":"Frassetto","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"David","family":"Gens","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Christopher","family":"Liebchen","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_2_2_1","volume-title":"Smashing the Stack for Fun and Profit. Phrack Magazine","author":"One Aleph","year":"2000","unstructured":"Aleph One. 2000. Smashing the Stack for Fun and Profit. Phrack Magazine Vol. 49 (2000)."},{"volume-title":"Language-independent sandboxing of just-in-time compilation and self-modifying code 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)","author":"Ansel Jason","key":"e_1_3_2_2_3_1","unstructured":"Jason Ansel, Petr Marchenko, \u00dalfar Erlingsson, Elijah Taylor, Brad Chen, Derek L. Schuff, David Sehr, Cliff Biffle, and Bennet Yee 2011. Language-independent sandboxing of just-in-time compilation and self-modifying code 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)."},{"volume-title":"The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines 22nd Annual Network and Distributed System Security Symposium (NDSS)","author":"Athanasakis Michalis","key":"e_1_3_2_2_4_1","unstructured":"Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis 2015. The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines 22nd Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Thorsten Holz Benjamin Kollenda Philipp Koppe Stefan N\u00fcrnberger and Jannik Pewny 2014. You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code ACM SIGSAC Conference on Computer and Communications Security (CCS).","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_2_6_1","unstructured":"Dion Blazakis. 2010. Interpreter exploitation: Pointer inference and JIT spraying Blackhat DC (BH DC)."},{"key":"e_1_3_2_2_7_1","volume-title":"Leakage-Resilient Layout Randomization for Mobile Devices 23rd Annual Network and Distributed System Security Symposium (NDSS).","author":"Braden Kjell","year":"2016","unstructured":"Kjell Braden, Stephen Crane, Lucas Davi, Michael Franz, Per Larsen, Christopher Liebchen, and Ahmad-Reza Sadeghi 2016. Leakage-Resilient Layout Randomization for Mobile Devices 23rd Annual Network and Distributed System Security Symposium (NDSS)."},{"volume-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity 24th USENIX Security Symposium (USENIX Sec).","author":"Carlini Nicolas","key":"e_1_3_2_2_8_1","unstructured":"Nicolas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity 24th USENIX Security Symposium (USENIX Sec)."},{"volume-title":"ROP is Still Dangerous: Breaking Modern Defenses 23rd USENIX Security Symposium (USENIX Sec)","author":"Carlini Nicholas","key":"e_1_3_2_2_9_1","unstructured":"Nicholas Carlini and David Wagner 2014. ROP is Still Dangerous: Breaking Modern Defenses 23rd USENIX Security Symposium (USENIX Sec)."},{"volume-title":"Securing Software by Enforcing Data-flow Integrity 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Castro Miguel","key":"e_1_3_2_2_10_1","unstructured":"Miguel Castro, Manuel Costa, and Tim Harris 2006. Securing Software by Enforcing Data-flow Integrity 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"volume-title":"JITDefender: A Defense against JIT Spraying Attacks 26th International Information Security Conference (IFIP)","author":"Chen Ping","key":"e_1_3_2_2_11_1","unstructured":"Ping Chen, Yi Fang, Bing Mao, and Li Xie. 2011. JITDefender: A Defense against JIT Spraying Attacks 26th International Information Security Conference (IFIP)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0142"},{"key":"e_1_3_2_2_13_1","volume-title":"14th USENIX Security Symposium (USENIX Sec).","author":"Chen Shuo","year":"2005","unstructured":"Shuo Chen, Jun Xu, Emre Can Sezer, Prachi Gauriar, and Ravishankar K Iyer 2005. Non-Control-Data Attacks Are Realistic Threats.. 14th USENIX Security Symposium (USENIX Sec)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Mauro Conti Stephen Crane Lucas Davi Michael Franz Per Larsen Christopher Liebchen Marco Negro Mohaned Qunaibit and Ahmad-Reza Sadeghi 2015. Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks ACM SIGSAC Conference on Computer and Communications Security (CCS).","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_3_2_2_15_1","unstructured":"Jonathan Corbet. 2012. Yet another new approach to seccomp. https:\/\/lwn.net\/Articles\/475043\/. (2012)."},{"key":"e_1_3_2_2_16_1","volume-title":"Readactor: Practical Code Randomization Resilient to Memory Disclosure 36th IEEE Symposium on Security and Privacy (S&P).","author":"Crane Stephen","year":"2015","unstructured":"Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, and Michael Franz. 2015. Readactor: Practical Code Randomization Resilient to Memory Disclosure 36th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_17_1","volume-title":"Bjorn De Sutter, and Michael Franz","author":"Crane Stephen","year":"2015","unstructured":"Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, and Michael Franz. 2015. It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks ACM SIGSAC Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_2_18_1","volume-title":"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming 22nd Annual Network and Distributed System Security Symposium (NDSS).","author":"Davi Lucas","year":"2015","unstructured":"Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, and Fabian Monrose. 2015. Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming 22nd Annual Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_2_19_1","volume-title":"Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In 23rd USENIX Security Symposium (USENIX Sec).","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, and Fabian Monrose 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In 23rd USENIX Security Symposium (USENIX Sec)."},{"volume-title":"Missing the Point(er): On the Effectiveness of Code Pointer Integrity 36th IEEE Symposium on Security and Privacy (S&P)","author":"Evans Isaac","key":"e_1_3_2_2_20_1","unstructured":"Isaac Evans, Samuel Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard Shrobe, Stelios Sidiroglou-Douskos, Martin Rinard, and Hamed Okhravi. 2015. Missing the Point(er): On the Effectiveness of Code Pointer Integrity 36th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_2_22_1","volume-title":"The Process File System and Process Model in UNIX System V. USENIX Technical Conference (ATC).","author":"Faulkner Roger","year":"1991","unstructured":"Roger Faulkner and Ron Gomes 1991. The Process File System and Process Model in UNIX System V. USENIX Technical Conference (ATC)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_2_2_25_1","volume-title":"Out of Control: Overcoming Control-Flow Integrity. 35th IEEE Symposium on Security and Privacy (S&P).","author":"G\u00f6ktas Enes","year":"2014","unstructured":"Enes G\u00f6ktas, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis 2014. Out of Control: Overcoming Control-Flow Integrity. 35th IEEE Symposium on Security and Privacy (S&P)."},{"volume-title":"Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard 23rd USENIX Security Symposium (USENIX Sec)","author":"G\u00f6ktas Enes","key":"e_1_3_2_2_26_1","unstructured":"Enes G\u00f6ktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis 2014. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard 23rd USENIX Security Symposium (USENIX Sec)."},{"key":"e_1_3_2_2_27_1","volume-title":"Brewer","author":"Goldberg Ian","year":"1996","unstructured":"Ian Goldberg, David Wagner, Randi Thomas, and Eric A. Brewer 1996. A Secure Environment for Untrusted Helper Applications 6th USENIX Security Symposium (USENIX Sec)."},{"key":"e_1_3_2_2_28_1","unstructured":"Guang Gong. 2016. Pwn a Nexus Device With a Single Vulnerability. https:\/\/cansecwest.com\/slides\/2016\/CSW2016_Gong_Pwn_a_Nexus_device_with_a_single_vulnerability.pdf. (2016)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz 2013. Librando: transparent code randomization for just-in-time compilers ACM SIGSAC Conference on Computer and Communications Security (CCS).","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_3_2_2_30_1","volume-title":"Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks 37th IEEE Symposium on Security and Privacy (S&P).","author":"Hu Hong","year":"2016","unstructured":"Hong Hu, Shweta Shinde, Adrian Sendroiu, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks 37th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_31_1","unstructured":"Intel 2016. Control-flow Enforcement Technology Preview. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf. (2016)."},{"key":"e_1_3_2_2_32_1","unstructured":"Intel 2016. Intel Software Guard Extensions (Intel SGX). https:\/\/software.intel.com\/en-us\/sgx. (2016)."},{"key":"e_1_3_2_2_33_1","volume-title":"Code-Pointer Integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song 2014. Code-Pointer Integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_2_34_1","volume-title":"SoK: Automated Software Diversity. In 35th IEEE Symposium on Security and Privacy (S&P).","author":"Larsen Per","year":"2014","unstructured":"Per Larsen, Andrei Homescu, Stefan Brunthaler, and Michael Franz 2014. SoK: Automated Software Diversity. In 35th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_35_1","unstructured":"Linux Foundation. 2014. This-CPU Operations. http:\/\/lxr.free-electrons.com\/source\/Documentation\/this_cpu_ops.txt. (2014)."},{"key":"e_1_3_2_2_36_1","volume-title":"Revisiting Assumptions of JIT-ROP Defenses 25th USENIX Security Symposium (USENIX Sec).","author":"Maisuradze Giorgi","year":"2016","unstructured":"Giorgi Maisuradze, Michael Backes, and Christian Rossow. 2016. What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses 25th USENIX Security Symposium (USENIX Sec)."},{"key":"e_1_3_2_2_37_1","unstructured":"Microsoft. 2006. Data Execution Prevention (DEP). http:\/\/support.microsoft.com\/kb\/875352\/EN-US\/. (2006)."},{"key":"e_1_3_2_2_38_1","unstructured":"Microsoft. 2015. ChakraCore. https:\/\/github.com\/Microsoft\/ChakraCore. (2015)."},{"key":"e_1_3_2_2_39_1","unstructured":"Microsoft. 2015. Control Flow Guard. http:\/\/msdn.microsoft.com\/en-us\/library\/Dn919635.aspx. (2015)."},{"key":"e_1_3_2_2_40_1","unstructured":"Matt Miller. 2017. Mitigating arbitrary native code execution in Microsoft Edge. https:\/\/blogs.windows.com\/msedgedev\/2017\/02\/23\/mitigating-arbitrary-native-code-execution\/. (2017)."},{"key":"e_1_3_2_2_41_1","unstructured":"Mozilla 2015. W xor X JIT-code enabled in Firefox. https:\/\/jandemooij.nl\/blog\/2015\/12\/29\/wx-jit-code-enabled-in-firefox. (2015)."},{"key":"e_1_3_2_2_42_1","unstructured":"Mozilla 2016. JavaScript:New to SpiderMonkey. https:\/\/wiki.mozilla.org\/JavaScript:New_to_SpiderMonkey#Benchmark_your_changes. (2016)."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_2_45_1","volume-title":"The advanced return-into-lib(c) exploits: PaX case study. Phrack Magazine","author":"Nergal","year":"2001","unstructured":"Nergal 2001. The advanced return-into-lib(c) exploits: PaX case study. Phrack Magazine Vol. 11 (2001)."},{"key":"e_1_3_2_2_46_1","volume-title":"Modular Control-flow Integrity. In 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).","author":"Niu Ben","year":"2014","unstructured":"Ben Niu and Gang Tan. 2014. Modular Control-flow Integrity. In 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_2_48_1","unstructured":"PaX 2003. PaX Address Space Layout Randomization. (2003)."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Felix Schuster Thomas Tendyck Christopher Liebchen Lucas Davi Ahmad-Reza Sadeghi and Thorsten Holz 2015. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C","DOI":"10.1109\/SP.2015.51"},{"volume-title":"36th IEEE Symposium on Security and Privacy (S&P).","key":"e_1_3_2_2_50_1","unstructured":"Applications. In 36th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_51_1","unstructured":"Fermin J. Serna. 2012. The Info Leak Era on Software Exploitation. In Blackhat USA (BH US)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_2_53_1","volume-title":"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization 34th IEEE Symposium on Security and Privacy (S&P).","author":"Snow Kevin Z.","year":"2013","unstructured":"Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi 2013. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization 34th IEEE Symposium on Security and Privacy (S&P)."},{"volume-title":"37th IEEE Symposium on Security and Privacy (S&P).","author":"Snow K. Z.","key":"e_1_3_2_2_54_1","unstructured":"K. Z. Snow, R. Rogowski, J. Werner, H. Koo, F. Monrose, and M. Polychronakis. 2016. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks. In 37th IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23233"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_2_57_1","unstructured":"The WebKit team. 2013. SunSpider 1.0.2. https:\/\/www.webkit.org\/perf\/sunspider\/sunspider.html. (2013)."},{"key":"e_1_3_2_2_58_1","unstructured":"Theori 2016. Chakra JIT CFG Bypass. http:\/\/theori.io\/research\/chakra-jit-cfg-bypass. (2016)."},{"key":"e_1_3_2_2_59_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM 23rd USENIX Security Symposium (USENIX Sec).","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM 23rd USENIX Security Symposium (USENIX Sec)."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897891"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134037"}},"subtitle":["Hardening Just-in-time Compilers with SGX"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":60,"alternative-id":["10.1145\/3133956.3134037","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134037","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}