{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134641","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"116-127","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Supplementing Modern Software Defenses with Stack-Pointer Sanity"],"prefix":"10.1145","author":[{"given":"Anh","family":"Quach","sequence":"first","affiliation":[{"name":"Binghamton University"}]},{"given":"Matthew","family":"Cole","sequence":"additional","affiliation":[{"name":"Binghamton University"}]},{"given":"Aravind","family":"Prakash","sequence":"additional","affiliation":[{"name":"Binghamton University"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"unstructured":"2015. Exception Handling in LLVM. http:\/\/llvm.org\/docs\/ExceptionHandling.html. (2015).  2015. Exception Handling in LLVM. http:\/\/llvm.org\/docs\/ExceptionHandling.html. (2015).","key":"e_1_3_2_1_1_1"},{"unstructured":"2017. Metasploit penetration testing framework. http:\/\/http:\/\/www.metasploit.com\/. (2017).  2017. Metasploit penetration testing framework. http:\/\/http:\/\/www.metasploit.com\/. (2017).","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_4_1","first-page":"105","article-title":"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits","volume":"3","author":"Bhatkar Sandeep","year":"2003","unstructured":"Sandeep Bhatkar , Daniel C DuVarney , and Ron Sekar . 2003 . Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits . In USENIX Security , Vol. 3. 105 -- 120 . Sandeep Bhatkar, Daniel C DuVarney, and Ron Sekar. 2003. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. In USENIX Security, Vol. 3. 105--120.","journal-title":"USENIX Security"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/2810103.2813691"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/SP.2014.22"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_2_1_8_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R Gross . 2015 . Control-flow bending: On the effectiveness of control-flow integrity . In 24th USENIX Security Symposium (USENIX Security 15) . 161--176. Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R Gross. 2015. Control-flow bending: On the effectiveness of control-flow integrity. In 24th USENIX Security Symposium (USENIX Security 15). 161--176."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.14722\/ndss.2015.23248"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/SP.2015.52"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2810103.2813682"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/2714576.2714635"},{"unstructured":"Jared DeMott. 2014. Bypassing EMET 4.1. https:\/\/bromiumlabs.files.wordpress.com\/2014\/02\/bypassing-emet-4-1.pdf. (2014).  Jared DeMott. 2014. Bypassing EMET 4.1. https:\/\/bromiumlabs.files.wordpress.com\/2014\/02\/bypassing-emet-4-1.pdf. (2014).","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/MSP.2015.75"},{"unstructured":"Erica Eng and Dan Caselden. 2015. Operation Clandestine Wolf -- Adobe Flash Zero-Day in APT3 Phishing Campaign. https:\/\/www.fireeye.com\/blog\/threat-research\/2015\/06\/operation-clandestine-wolf-adobe-flash-zero-day.html. (2015).  Erica Eng and Dan Caselden. 2015. Operation Clandestine Wolf -- Adobe Flash Zero-Day in APT3 Phishing Campaign. https:\/\/www.fireeye.com\/blog\/threat-research\/2015\/06\/operation-clandestine-wolf-adobe-flash-zero-day.html. (2015).","key":"e_1_3_2_1_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/978-3-319-45719-2_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/2664243.2664249"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_19_1","volume-title":"Code-Pointer Integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov , L\u00e1szl\u00f3 Szekeres , Mathias Payer , George Candea , R Sekar , and Dawn Song . 2014 . Code-Pointer Integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, R Sekar, and Dawn Song. 2014. Code-Pointer Integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_20_1","volume-title":"Subversive-C: Abusing and Protecting Dynamic Message Dispatch. In 2016 USENIX Annual Technical Conference (USENIX ATC 16)","author":"Lettner Julian","year":"2016","unstructured":"Julian Lettner , Benjamin Kollenda , Andrei Homescu , Per Larsen , Felix Schuster , Lucas Davi , Ahmad-Reza Sadeghi , Thorsten Holz , and Michael Franz . 2016 . Subversive-C: Abusing and Protecting Dynamic Message Dispatch. In 2016 USENIX Annual Technical Conference (USENIX ATC 16) . USENIX Association, Denver, CO, 209--221. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/lettner Julian Lettner, Benjamin Kollenda, Andrei Homescu, Per Larsen, Felix Schuster, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, and Michael Franz. 2016. Subversive-C: Abusing and Protecting Dynamic Message Dispatch. In 2016 USENIX Annual Technical Conference (USENIX ATC 16). USENIX Association, Denver, CO, 209--221. https:\/\/www.usenix.org\/conference\/atc16\/technical-sessions\/presentation\/lettner"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1065010.1065034"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2810103.2813676"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.14722\/ndss.2015.23271"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/2594291.2594295"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/2660267.2660281"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2810103.2813644"},{"unstructured":"Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking holes in information hiding. In USENIX Security.  Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking holes in information hiding. In USENIX Security.","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1920261.1920269"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/SP.2012.41"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/2818000.2818031"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.14722\/ndss.2015.23297"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1145\/2818000.2818023"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/2818000.2818021"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2714576.2737090"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1145\/1315245.1315313"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.1109\/SP.2015.51"},{"volume-title":"Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Slowinska Asia","unstructured":"Asia Slowinska , Traian Stancescu , and Herbert Bos . 2012. Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation . In Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12) . USENIX , Boston, MA , 125--137. https:\/\/www.usenix.org\/conference\/atc12\/technical-sessions\/presentation\/slowinska Asia Slowinska, Traian Stancescu, and Herbert Bos. 2012. Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation. In Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12). USENIX, Boston, MA, 125--137. https:\/\/www.usenix.org\/conference\/atc12\/technical-sessions\/presentation\/slowinska","key":"e_1_3_2_1_37_1"},{"unstructured":"PaX Team. 2003. PaX address space layout randomization (ASLR). (2003).  PaX Team. 2003. PaX address space layout randomization (ASLR). (2003).","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of 23rd USENIX Security Symposium (USENIX Security'14)","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM . In Proceedings of 23rd USENIX Security Symposium (USENIX Security'14) . 941--955. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In Proceedings of 23rd USENIX Security Symposium (USENIX Security'14). 941--955."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/2810103.2813673"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/SP.2016.60"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_43_1","volume-title":"VTrust: Regaining Trust on Virtual Calls. In Symposium on Network and Distributed System Security (NDSS'16)","author":"Zhang Chao","year":"2016","unstructured":"Chao Zhang , Scott A Carr , Tongxin Li , Yu Ding , Chengyu Song , Mathias Payer , and Dawn Song . 2016 . VTrust: Regaining Trust on Virtual Calls. In Symposium on Network and Distributed System Security (NDSS'16) . Chao Zhang, Scott A Carr, Tongxin Li, Yu Ding, Chengyu Song, Mathias Payer, and Dawn Song. 2016. VTrust: Regaining Trust on Virtual Calls. In Symposium on Network and Distributed System Security (NDSS'16)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1109\/SP.2013.44"},{"volume-title":"Proceedings of the 22nd USENIX Security Symposium (Usenix Security'13)","author":"Zhang Mingwei","unstructured":"Mingwei Zhang and R. Sekar . 2013. Control Flow Integrity for COTS Binaries . In Proceedings of the 22nd USENIX Security Symposium (Usenix Security'13) . 337--352. Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the 22nd USENIX Security Symposium (Usenix Security'13). 337--352.","key":"e_1_3_2_1_45_1"}],"event":{"acronym":"ACSAC 2017","name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134641","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":45,"alternative-id":["10.1145\/3134600.3134641","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134641","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}