{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:04:46Z","timestamp":1752671086407,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1624126"],"award-info":[{"award-number":["CNS-1624126"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3139337.3139339","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T13:41:56Z","timestamp":1509457316000},"page":"3-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["CFG Construction Soundness in Control-Flow Integrity"],"prefix":"10.1145","author":[{"given":"Gang","family":"Tan","sequence":"first","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","volume-title":"Sweeney","author":"Bacon David F.","year":"1996","unstructured":"David F. Bacon and Peter F . Sweeney 1996 . Fast Static Analysis of C David F. Bacon and Peter F. Sweeney 1996. Fast Static Analysis of C"},{"volume-title":"Function Calls ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 324--341","author":"Virtual","key":"e_1_3_2_1_3_1","unstructured":"Virtual Function Calls ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 324--341 . Virtual Function Calls ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 324--341."},{"volume-title":"Conditional Soundness, and Proving the Absence of Errors Proceedings of the 15th International Symposium on Static Analysis. 62--77.","author":"Conway Christopher L.","key":"e_1_3_2_1_4_1","unstructured":"Christopher L. Conway , Dennis Dams , Kedar S. Namjoshi , and Clark Barrett 2008. Pointer Analysis , Conditional Soundness, and Proving the Absence of Errors Proceedings of the 15th International Symposium on Static Analysis. 62--77. Christopher L. Conway, Dennis Dams, Kedar S. Namjoshi, and Clark Barrett 2008. Pointer Analysis, Conditional Soundness, and Proving the Absence of Errors Proceedings of the 15th International Symposium on Static Analysis. 62--77."},{"volume-title":"Hendren. Context-sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers ACM Conference on Programming Language Design and Implementation (PLDI). 242--256","author":"Emami Maryam","key":"e_1_3_2_1_5_1","unstructured":"Maryam Emami , Rakesh Ghiya , and Laurie J . Hendren. Context-sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers ACM Conference on Programming Language Design and Implementation (PLDI). 242--256 . Maryam Emami, Rakesh Ghiya, and Laurie J. Hendren. Context-sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers ACM Conference on Programming Language Design and Implementation (PLDI). 242--256."},{"key":"e_1_3_2_1_6_1","volume-title":"Fine-Grained Control-Flow Integrity for Kernel Software IEEE European Symposium on Security and Privacy (EuroS&P). 179--194","author":"Ge Xinyang","year":"2016","unstructured":"Xinyang Ge , Nirupama Talele , Mathias Payer , and Trent Jaeger 2016 . Fine-Grained Control-Flow Integrity for Kernel Software IEEE European Symposium on Security and Privacy (EuroS&P). 179--194 . Xinyang Ge, Nirupama Talele, Mathias Payer, and Trent Jaeger 2016. Fine-Grained Control-Flow Integrity for Kernel Software IEEE European Symposium on Security and Privacy (EuroS&P). 179--194."},{"key":"e_1_3_2_1_7_1","volume-title":"Call Graph Construction in Object-oriented Languages ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 108--124","author":"Grove David","year":"1997","unstructured":"David Grove , Greg DeFouw , Jeffrey Dean , and Craig Chambers . 1997 . Call Graph Construction in Object-oriented Languages ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 108--124 . David Grove, Greg DeFouw, Jeffrey Dean, and Craig Chambers. 1997. Call Graph Construction in Object-oriented Languages ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 108--124."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_9_1","article-title":"The Advanced Return-into-lib(c) Exploits: PaX Case Study","volume":"11","author":"Nergal","year":"2001","unstructured":"Nergal 2001 . The Advanced Return-into-lib(c) Exploits: PaX Case Study . Phrack Magazine , Volume 11 , Issue 0x58, File 4 of 14 (2001). Nergal 2001. The Advanced Return-into-lib(c) Exploits: PaX Case Study. Phrack Magazine, Volume 11, Issue 0x58, File 4 of 14 (2001).","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_10_1","volume-title":"Monitor Integrity Protection with Space Efficiency and Separate Compilation 20th ACM Conference on Computer and Communications Security (CCS).","author":"Niu Ben","year":"2013","unstructured":"Ben Niu and Gang Tan . 2013 . Monitor Integrity Protection with Space Efficiency and Separate Compilation 20th ACM Conference on Computer and Communications Security (CCS). Ben Niu and Gang Tan. 2013. Monitor Integrity Protection with Space Efficiency and Separate Compilation 20th ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_11_1","volume-title":"Modular Control Flow Integrity. In ACM Conference on Programming Language Design and Implementation (PLDI). 577--587","author":"Niu Ben","year":"2014","unstructured":"Ben Niu and Gang Tan . 2014 . Modular Control Flow Integrity. In ACM Conference on Programming Language Design and Implementation (PLDI). 577--587 . Ben Niu and Gang Tan. 2014. Modular Control Flow Integrity. In ACM Conference on Programming Language Design and Implementation (PLDI). 577--587."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523674"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_14_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM 23rd Usenix Security Symposium.","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM 23rd Usenix Security Symposium. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM 23rd Usenix Security Symposium."},{"key":"e_1_3_2_1_15_1","volume-title":"Scalable Propagation-based Call Graph Construction Algorithms ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 281--293","author":"Tip Frank","year":"2000","unstructured":"Frank Tip and Jens Palsberg 2000 . Scalable Propagation-based Call Graph Construction Algorithms ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 281--293 . Frank Tip and Jens Palsberg 2000. Scalable Propagation-based Call Graph Construction Algorithms ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). 281--293."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Victor van der Veen Enes G\u00f6ktas Moritz Contag Andre Pawoloski Xi Chen Sanjay Rawat Herbert Bos Thorsten Holz Elias Athanasopoulos and Cristiano Giuffrida 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level IEEE Symposium on Security and Privacy (S&P). 934--953.  Victor van der Veen Enes G\u00f6ktas Moritz Contag Andre Pawoloski Xi Chen Sanjay Rawat Herbert Bos Thorsten Holz Elias Athanasopoulos and Cristiano Giuffrida 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level IEEE Symposium on Security and Privacy (S&P). 934--953.","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Zhi Wang and Xuxian Jiang 2010. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity IEEE Symposium on Security and Privacy (S&P). 380--395.  Zhi Wang and Xuxian Jiang 2010. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity IEEE Symposium on Security and Privacy (S&P). 380--395.","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_18_1","volume-title":"Practical Control Flow Integrity and Randomization for Binary Executables IEEE Symposium on Security and Privacy (S&P). 559--573","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang , Tao Wei , Zhaofeng Chen , Lei Duan , Laszlo Szekeres , Stephen McCamant , Dawn Song , and Wei Zou . 2013 . Practical Control Flow Integrity and Randomization for Binary Executables IEEE Symposium on Security and Privacy (S&P). 559--573 . Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical Control Flow Integrity and Randomization for Binary Executables IEEE Symposium on Security and Privacy (S&P). 559--573."},{"key":"e_1_3_2_1_19_1","volume-title":"Control Flow Integrity for COTS Binaries. In 22nd Usenix Security Symposium. 337--352","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R. Sekar 2013 . Control Flow Integrity for COTS Binaries. In 22nd Usenix Security Symposium. 337--352 . endthebibliography Mingwei Zhang and R. Sekar 2013. Control Flow Integrity for COTS Binaries. In 22nd Usenix Security Symposium. 337--352. endthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139337.3139339","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139337.3139339","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3139337.3139339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:49Z","timestamp":1750212829000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3139337.3139339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":19,"alternative-id":["10.1145\/3139337.3139339","10.1145\/3139337"],"URL":"https:\/\/doi.org\/10.1145\/3139337.3139339","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}