{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:27:32Z","timestamp":1775068052602,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134618","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"437-448","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":37,"title":["ECFI"],"prefix":"10.1145","author":[{"given":"Ali","family":"Abbasi","sequence":"first","affiliation":[{"name":"University of Twente, The Netherlands"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum, Germany"}]},{"given":"Emmanuele","family":"Zambon","sequence":"additional","affiliation":[{"name":"SecurityMatters B.V., The Netherlands"}]},{"given":"Sandro","family":"Etalle","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","volume-title":"Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. Black Hat Europe","author":"Abbasi Ali","year":"2016","unstructured":"Ali Abbasi and Majid Hashemi . 2016. Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. Black Hat Europe ( 2016 ). Ali Abbasi and Majid Hashemi. 2016. Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit via Pin Control Attack. Black Hat Europe (2016)."},{"key":"e_1_3_2_1_3_1","volume-title":"On Emulation-Based Network Intrusion Detection Systems. In Symposium on Recent Advances in Intrusion Detection (RAID).","author":"Abbasi Ali","year":"2014","unstructured":"Ali Abbasi , Jos Wetzels , Wouter Bokslag , Emmanuele Zambon , and Sandro Etalle . 2014 . On Emulation-Based Network Intrusion Detection Systems. In Symposium on Recent Advances in Intrusion Detection (RAID). Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, and Sandro Etalle. 2014. On Emulation-Based Network Intrusion Detection Systems. In Symposium on Recent Advances in Intrusion Detection (RAID)."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Network and System Security. Springer, 694--709","author":"Abbasi Ali","year":"2017","unstructured":"Ali Abbasi , Jos Wetzels , Wouter Bokslag , Emmanuele Zambon , and Sandro Etalle . 2017 . &mu;Shield: configurable code reuse attack mitigation for embedded systems . In International Conference on Network and System Security. Springer, 694--709 . Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, and Sandro Etalle. 2017. &mu;Shield: configurable code reuse attack mitigation for embedded systems. In International Conference on Network and System Security. Springer, 694--709."},{"key":"e_1_3_2_1_5_1","volume-title":"Annual Computer Security Applications Conference (ACSAC).","author":"Adelstein F.","unstructured":"F. Adelstein , M. Stillerman , and D. Kozen . 2002. Malicious code detection for open firmware . In Annual Computer Security Applications Conference (ACSAC). F. Adelstein, M. Stillerman, and D. Kozen. 2002. Malicious code detection for open firmware. In Annual Computer Security Applications Conference (ACSAC)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2013.04.004"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_2_1_8_1","unstructured":"Defense Use Case. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. (2016).  Defense Use Case. 2016. Analysis of the Cyber Attack on the Ukrainian Power Grid. (2016)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_5"},{"key":"e_1_3_2_1_11_1","volume-title":"Real-Time Programming","author":"Colnari\u010d Matja\u017e","year":"2004","unstructured":"Matja\u017e Colnari\u010d , Wolfgang A Halang , and Marek Wkegrzyn . 2005. Real-Time Programming 2004 . Gulf Professional Publishing . Matja\u017e Colnari\u010d, Wolfgang A Halang, and Marek Wkegrzyn. 2005. Real-Time Programming 2004. Gulf Professional Publishing."},{"key":"e_1_3_2_1_12_1","volume-title":"Symposium on Network and Distributed System Security (NDSS).","author":"Davi Lucas","year":"2012","unstructured":"Lucas Davi , Alexandra Dmitrienko , Manuel Egele , Thomas Fischer , Thorsten Holz , Ralf Hund , Stefan N\u00fcrnberger , and Ahmad-Reza Sadeghi . 2012 . MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones . In Symposium on Network and Distributed System Security (NDSS). Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan N\u00fcrnberger, and Ahmad-Reza Sadeghi. 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_13_1","volume-title":"Linux Plumbers Conference.","author":"de Melo Arnaldo Carvalho","year":"2009","unstructured":"Arnaldo Carvalho de Melo . 2009 . Performance counters on Linux . In Linux Plumbers Conference. Arnaldo Carvalho de Melo. 2009. Performance counters on Linux. In Linux Plumbers Conference."},{"key":"e_1_3_2_1_14_1","unstructured":"DigitalBond. 2012. 3S CoDeSys Project Basecamp. (2012). http:\/\/www.digitalbond.com\/tools\/basecamp\/3s-codesys\/  DigitalBond. 2012. 3S CoDeSys Project Basecamp. (2012). http:\/\/www.digitalbond.com\/tools\/basecamp\/3s-codesys\/"},{"key":"e_1_3_2_1_15_1","volume-title":"Digital Avionics Systems Conference.","author":"Doerr B. S.","unstructured":"B. S. Doerr , T. Venturella , R. Jha , C. D. Gill , and D. C. Schmidt . 1999. Adaptive scheduling for real-time, embedded information systems . In Digital Avionics Systems Conference. B. S. Doerr, T. Venturella, R. Jha, C. D. Gill, and D. C. Schmidt. 1999. Adaptive scheduling for real-time, embedded information systems. In Digital Avionics Systems Conference."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_20"},{"key":"e_1_3_2_1_17_1","volume-title":"stuxnet dossier. White paper","author":"Falliere Nicolas","year":"2011","unstructured":"Nicolas Falliere , Liam O Murchu , and Eric Chien . 2011. W32. stuxnet dossier. White paper , Symantec Corp., Security Response 5 ( 2011 ). Nicolas Falliere, Liam O Murchu, and Eric Chien. 2011. W32. stuxnet dossier. White paper, Symantec Corp., Security Response 5 (2011)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655077.1655083"},{"key":"e_1_3_2_1_19_1","volume-title":"Die Lage der IT-Sicherheit in Deutschland","author":"der Informationstechnik Bundesamt","year":"2014","unstructured":"Bundesamt fur Sicherheit in der Informationstechnik . 2014. Die Lage der IT-Sicherheit in Deutschland 2014 . http:\/\/bit.ly\/13cGiGL. (2014). Bundesamt fur Sicherheit in der Informationstechnik. 2014. Die Lage der IT-Sicherheit in Deutschland 2014. http:\/\/bit.ly\/13cGiGL. (2014)."},{"key":"e_1_3_2_1_20_1","volume-title":"2016 IEEE European Symposium on. 179--194","author":"Ge Xinyang","year":"2016","unstructured":"Xinyang Ge , Nirupama Talele , Mathias Payer , and Trent Jaeger . 2016 . Fine-grained control-flow integrity for kernel software. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. 179--194 . Xinyang Ge, Nirupama Talele, Mathias Payer, and Trent Jaeger. 2016. Fine-grained control-flow integrity for kernel software. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. 179--194."},{"key":"e_1_3_2_1_21_1","volume-title":"IEEE International Symposium on Technologies for Homeland Security.","author":"Huang Z. S.","unstructured":"Z. S. Huang and I. G. Harris . 2012. Return-oriented vulnerabilities in ARM executables . In IEEE International Symposium on Technologies for Homeland Security. Z. S. Huang and I. G. Harris. 2012. Return-oriented vulnerabilities in ARM executables. In IEEE International Symposium on Technologies for Homeland Security."},{"key":"e_1_3_2_1_22_1","unstructured":"ICS-CERT. 2016. Rockwell Automation MicroLogix 1100 PLC Overflow Vulnerability. (2016). https:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-16-026-02  ICS-CERT. 2016. Rockwell Automation MicroLogix 1100 PLC Overflow Vulnerability. (2016). https:\/\/ics-cert.us-cert.gov\/advisories\/ICSA-16-026-02"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516704"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_25_1","volume-title":"German steel mill cyber attack. Industrial Control Systems 30","author":"Lee Robert M","year":"2014","unstructured":"Robert M Lee , Michael J Assante , and Tim Conway . 2014. German steel mill cyber attack. Industrial Control Systems 30 ( 2014 ). Robert M Lee, Michael J Assante, and Tim Conway. 2014. German steel mill cyber attack. Industrial Control Systems 30 (2014)."},{"key":"e_1_3_2_1_26_1","volume-title":"Handbook of scheduling: algorithms, models, and performance analysis","author":"Leung Joseph YT","unstructured":"Joseph YT Leung . 2004. Handbook of scheduling: algorithms, models, and performance analysis . CRC Press . Joseph YT Leung. 2004. Handbook of scheduling: algorithms, models, and performance analysis. CRC Press."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/58612.59374"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70216"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382244"},{"key":"e_1_3_2_1_30_1","unstructured":"Stephen E McLaughlin. 2011. On Dynamic Malware Payloads Aimed at Programmable Logic Controllers. In HotSec.   Stephen E McLaughlin. 2011. On Dynamic Malware Payloads Aimed at Programmable Logic Controllers. In HotSec."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353536.1346321"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594295"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_35_1","unstructured":"OpenPLC. 2014. The OpenPLC Project. (2014). http:\/\/www.openplcproject.com  OpenPLC. 2014. The OpenPLC Project. (2014). http:\/\/www.openplcproject.com"},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Security Symposium.","author":"Pappas Vasilis","year":"2013","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos D Keromytis . 2013 . Transparent ROP exploit mitigation using indirect branch tracing . In USENIX Security Symposium. Vasilis Pappas, Michalis Polychronakis, and Angelos D Keromytis. 2013. Transparent ROP exploit mitigation using indirect branch tracing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_37_1","volume-title":"SCADA Security Scientific Symposium (S4).","author":"Peck Daniel","year":"2009","unstructured":"Daniel Peck and Dale Peterson . 2009 . Leveraging ethernet card vulnerabilities in field devices . In SCADA Security Scientific Symposium (S4). Daniel Peck and Dale Peterson. 2009. Leveraging ethernet card vulnerabilities in field devices. In SCADA Security Scientific Symposium (S4)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523674"},{"key":"e_1_3_2_1_39_1","volume-title":"TrackOS: A Security-Aware Real-Time Operating System. In International Conference on Runtime Verification. Springer, 302--317","author":"Pike Lee","year":"2016","unstructured":"Lee Pike , Pat Hickey , Trevor Elliott , Eric Mertens , and Aaron Tomb . 2016 . TrackOS: A Security-Aware Real-Time Operating System. In International Conference on Runtime Verification. Springer, 302--317 . Lee Pike, Pat Hickey, Trevor Elliott, Eric Mertens, and Aaron Tomb. 2016. TrackOS: A Security-Aware Real-Time Operating System. In International Conference on Runtime Verification. Springer, 302--317."},{"key":"e_1_3_2_1_40_1","unstructured":"R Pozo and BR Miller. 2016. SciMark 2. http:\/\/math.nist.gov\/scimark2\/. (2016).  R Pozo and BR Miller. 2016. SciMark 2. http:\/\/math.nist.gov\/scimark2\/. (2016)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00571421"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011195304563"},{"key":"e_1_3_2_1_43_1","volume-title":"Research in Attacks","author":"Schuster Felix","unstructured":"Felix Schuster , Thomas Tendyck , Jannik Pewny , Andreas Maa\u00df , Martin Steegmanns , Moritz Contag , and Thorsten Holz . 2014. Evaluating the effectiveness of current anti-ROP defenses . In Research in Attacks , Intrusions and Defenses, Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (Eds.). Springer , 88--108. Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maa\u00df, Martin Steegmanns, Moritz Contag, and Thorsten Holz. 2014. Evaluating the effectiveness of current anti-ROP defenses. In Research in Attacks, Intrusions and Defenses, Angelos Stavrou, Herbert Bos, and Georgios Portokalidis (Eds.). Springer, 88--108."},{"key":"e_1_3_2_1_45_1","volume-title":"USENIX Security Symposium.","author":"Sehr David","year":"2010","unstructured":"David Sehr , Robert Muth , Cliff Biffle , Victor Khimenko , Egor Pasko , Karl Schimpf , Bennet Yee , and Brad Chen . 2010 . Adapting Software Fault Isolation to Contemporary CPU Architectures . In USENIX Security Symposium. David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. 2010. Adapting Software Fault Isolation to Contemporary CPU Architectures. In USENIX Security Symposium."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_47_1","volume-title":"MATIEC-IEC 61131-3 compiler","author":"de Sousa Mario","year":"2014","unstructured":"Mario de Sousa . 2012. MATIEC-IEC 61131-3 compiler , 2014 . (2012). Mario de Sousa. 2012. MATIEC-IEC 61131-3 compiler, 2014. (2012)."},{"key":"e_1_3_2_1_48_1","volume-title":"NIST special publication 800-82, revision 2: Guide to industrial control systems (ICS) security","author":"Stouffer K","year":"2014","unstructured":"K Stouffer , S Lightman , V Pillitteri , M Abrams , and A Hahn . 2014. NIST special publication 800-82, revision 2: Guide to industrial control systems (ICS) security . National Institute of Standards and Technology ( 2014 ). K Stouffer, S Lightman, V Pillitteri, M Abrams, and A Hahn. 2014. NIST special publication 800-82, revision 2: Guide to industrial control systems (ICS) security. National Institute of Standards and Technology (2014)."},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX Security Symposium.","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing forward-edge control-flow integrity in GCC & LLVM . In USENIX Security Symposium. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing forward-edge control-flow integrity in GCC & LLVM. In USENIX Security Symposium."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_51_1","unstructured":"David E Whitehead Kevin Owens Dennis Gammel and Jess Smith. 2014. Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. https:\/\/selinc.com\/api\/download\/117044\/. (2014).  David E Whitehead Kevin Owens Dennis Gammel and Jess Smith. 2014. Ukraine Cyber-Induced Power Outage: Analysis and Practical Mitigation Strategies. https:\/\/selinc.com\/api\/download\/117044\/. (2014)."},{"key":"e_1_3_2_1_52_1","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN).","author":"Xia Yubin","unstructured":"Yubin Xia , Yutao Liu , H. Chen , and B. Zang . 2012. CFIMon: Detecting violation of control flow integrity using performance counters . In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). Yubin Xia, Yutao Liu, H. Chen, and B. Zang. 2012. CFIMon: Detecting violation of control flow integrity using performance counters. In IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818016"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134618"}},"subtitle":["Asynchronous Control Flow Integrity for Programmable Logic Controllers"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":53,"alternative-id":["10.1145\/3134600.3134618","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134618","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}