{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T06:13:14Z","timestamp":1769926394401,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["ONR-N00014-17-1-2498"],"award-info":[{"award-number":["ONR-N00014-17-1-2498"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134640","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"315-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Orpheus"],"prefix":"10.1145","author":[{"given":"Long","family":"Cheng","sequence":"first","affiliation":[{"name":"Department of Computer Science, Virginia Tech, USA"}]},{"given":"Ke","family":"Tian","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, USA"}]},{"given":"Danfeng (Daphne)","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Virginia Tech, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arduino. www.arduino.cc\/. {Accessed 09-12-2017}.  Arduino. www.arduino.cc\/. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_2_1","unstructured":"Cyber-Physical Systems. www.cpse-labs.eu\/cps.php. {Accessed 09-12-2017}.  Cyber-Physical Systems. www.cpse-labs.eu\/cps.php. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_3_1","unstructured":"German Steel Mill Meltdown. securityintelligence.com\/german-steel-mill-meltdown-rising-stakes-in-the-internet-of-things\/. {Accessed 09-12-2017}.  German Steel Mill Meltdown. securityintelligence.com\/german-steel-mill-meltdown-rising-stakes-in-the-internet-of-things\/. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_4_1","unstructured":"GPIO access library for RPI. wiringpi.com\/. {Accessed 09-12-2017}.  GPIO access library for RPI. wiringpi.com\/. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_5_1","unstructured":"LLVM. http:\/\/llvm.org\/. {Accessed 09-12-2017}.  LLVM. http:\/\/llvm.org\/. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_6_1","unstructured":"Opto 22 connects real-world industrial devices to millions of Raspberry Pi. www.prweb.com\/releases\/2016\/11\/prweb13853953.htm. {Accessed 09-12-2017}.  Opto 22 connects real-world industrial devices to millions of Raspberry Pi. www.prweb.com\/releases\/2016\/11\/prweb13853953.htm. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_7_1","unstructured":"The REX Control System for Raspberry Pi. www.rexcontrols.com\/. {Accessed 09-12-2017}.  The REX Control System for Raspberry Pi. www.rexcontrols.com\/. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_8_1","unstructured":"ZingBox: Enabling the Internet of Trusted Things. www.zingbox.com\/. {Accessed 09-12-2017}.  ZingBox: Enabling the Internet of Trusted Things. www.zingbox.com\/. {Accessed 09-12-2017}."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CPSNA.2013.6614242"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2016.104"},{"key":"e_1_3_2_1_13_1","volume-title":"Concurrency and Computation: Practice and Experience","author":"Adrien Verge","year":"2017","unstructured":"Verge Adrien , Ezzati-Jivan Naser , and Dagenais Michel R. Hardware-assisted software event tracing . Concurrency and Computation: Practice and Experience , 2017 . Verge Adrien, Ezzati-Jivan Naser, and Dagenais Michel R. Hardware-assisted software event tracing. Concurrency and Computation: Practice and Experience, 2017."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2017.69"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.MOBIQUITOUS2009.7056"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966959"},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX Security","author":"Carlini Nicolas","year":"2015","unstructured":"Nicolas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R. Gross . Control-flow bending: On the effectiveness of control-flow integrity . In USENIX Security , 2015 . Nicolas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. Control-flow bending: On the effectiveness of control-flow integrity. In USENIX Security, 2015."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Security","author":"Chen Shuo","year":"2005","unstructured":"Shuo Chen , Jun Xu , Emre C. Sezer , Prachi Gauriar , and Ravishankar K. Iyer . Non-control-data attacks are realistic threats . In USENIX Security , 2005 . Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer. Non-control-data attacks are realistic threats. In USENIX Security, 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2735960.2735977"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127348"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2502524.2502540"},{"key":"e_1_3_2_1_23_1","volume-title":"Formalizing sensitivity in static analysis for intrusion detection","author":"Feng H.H.","year":"2004","unstructured":"H.H. Feng , J.T. Giffin , Yong Huang , S. Jha , Wenke Lee , and B.P. Miller . Formalizing sensitivity in static analysis for intrusion detection . In IEEE S &P, 2004 . H.H. Feng, J.T. Giffin, Yong Huang, S. Jha, Wenke Lee, and B.P. Miller. Formalizing sensitivity in static analysis for intrusion detection. In IEEE S&P, 2004."},{"key":"e_1_3_2_1_24_1","volume-title":"CCS","author":"Francillon Aur\u00e9lien","year":"2008","unstructured":"Aur\u00e9lien Francillon and Claude Castelluccia . Code injection attacks on Harvard-architecture devices . In CCS , 2008 . Aur\u00e9lien Francillon and Claude Castelluccia. Code injection attacks on Harvard-architecture devices. In CCS, 2008."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655077.1655083"},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX Security","author":"Gao Debin","year":"2004","unstructured":"Debin Gao , Michael K. Reiter , and Dawn Song . On gray-box program tracking for anomaly detection . In USENIX Security , 2004 . Debin Gao, Michael K. Reiter, and Dawn Song. On gray-box program tracking for anomaly detection. In USENIX Security, 2004."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23313"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2015.71"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664277"},{"key":"e_1_3_2_1_31_1","volume-title":"Prateek Saxena, and Zhenkai Liang. Data-oriented programming: On the expressiveness of non-control data attacks","author":"Hu Hong","year":"2016","unstructured":"Hong Hu , Shweta Shinde , Sendroiu Adrian , Zheng Leong Chua , Prateek Saxena, and Zhenkai Liang. Data-oriented programming: On the expressiveness of non-control data attacks . In IEEE S &P, 2016 . Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. Data-oriented programming: On the expressiveness of non-control data attacks. In IEEE S&P, 2016."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2013.6471059"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653666"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818362.2818365"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23043"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2312327"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2265083"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542049"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Security","author":"Ning Zhenyu","year":"2017","unstructured":"Zhenyu Ning and Fengwei Zhang . Ninja : Towards transparent tracing and debugging on arm . In USENIX Security , 2017 . Zhenyu Ning and Fengwei Zhang. Ninja: Towards transparent tracing and debugging on arm. In USENIX Security, 2017."},{"key":"e_1_3_2_1_42_1","volume-title":"Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement. CoRR, abs\/1705.10295","author":"Nyman Thomas","year":"2017","unstructured":"Thomas Nyman , Ghada Dessouky , Shaza Zeitouni , Aaro Lehikoinen , Andrew Paverd , N. Asokan , and Ahmad-Reza Sadeghi . Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement. CoRR, abs\/1705.10295 , 2017 . Thomas Nyman, Ghada Dessouky, Shaza Zeitouni, Aaro Lehikoinen, Andrew Paverd, N. Asokan, and Ahmad-Reza Sadeghi. Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement. CoRR, abs\/1705.10295, 2017."},{"key":"e_1_3_2_1_43_1","volume-title":"NOMS","author":"Rodday N. M.","year":"2016","unstructured":"N. M. Rodday , R. d. O. Schmidt , and A. Pras . Exploring security vulnerabilities of unmanned aerial vehicles . In NOMS , 2016 . N. M. Rodday, R. d. O. Schmidt, and A. Pras. Exploring security vulnerabilities of unmanned aerial vehicles. In NOMS, 2016."},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX Security","author":"Rouf Ishtiaq","year":"2010","unstructured":"Ishtiaq Rouf , Rob Miller , Hossen Mustafa , Travis Taylor , Sangho Oh , Wenyuan Xu , Marco Gruteser , Wade Trappe , and Ivan Seskar . Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study . In USENIX Security , 2010 . Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh, Wenyuan Xu, Marco Gruteser, Wade Trappe, and Ivan Seskar. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In USENIX Security, 2010."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.114"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884433"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813654"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105761"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_13"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968478.2968492"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2984464.2984466"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557420"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978388"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCOSS.2014.61"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884434"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_23"},{"key":"e_1_3_2_1_59_1","volume-title":"Detecting intrusions using system calls: alternative data models","author":"Warrender C.","year":"1999","unstructured":"C. Warrender , S. Forrest , and B. Pearlmutter . Detecting intrusions using system calls: alternative data models . In IEEE S &P, 1999 . C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: alternative data models. In IEEE S&P, 1999."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.37"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531076"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054977.3054999"},{"key":"e_1_3_2_1_63_1","volume-title":"ICSE '03","author":"Zhang Xiangyu","year":"2003","unstructured":"Xiangyu Zhang , Rajiv Gupta , and Youtao Zhang . Precise dynamic slicing algorithms . In ICSE '03 , 2003 . Xiangyu Zhang, Rajiv Gupta, and Youtao Zhang. Precise dynamic slicing algorithms. In ICSE '03, 2003."},{"key":"e_1_3_2_1_64_1","first-page":"115","volume-title":"USENIX NSDI","author":"Zhuang Yanyan","year":"2014","unstructured":"Yanyan Zhuang , Eleni Gessiou , Steven Portzer , Fraida Fund , Monzur Muhammad , Ivan Beschastnikh , and Justin Cappos . Netcheck : Network diagnoses from blackbox traces . In USENIX NSDI , pages 115 -- 128 , 2014 . Yanyan Zhuang, Eleni Gessiou, Steven Portzer, Fraida Fund, Monzur Muhammad, Ivan Beschastnikh, and Justin Cappos. Netcheck: Network diagnoses from blackbox traces. In USENIX NSDI, pages 115--128, 2014."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1795194.1795210"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA","acronym":"ACSAC 2017"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134640","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134640"}},"subtitle":["Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":65,"alternative-id":["10.1145\/3134600.3134640","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134640","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}