{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T19:44:01Z","timestamp":1769111041936,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196531","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"369-380","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity"],"prefix":"10.1145","author":[{"given":"Philipp","family":"Zieris","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Garching b. M\u00fcnchen, Germany"}]},{"given":"Julian","family":"Horsch","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Garching b. M\u00fcnchen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","unstructured":"ARM Ltd. . 2017. ARM Architecture Reference Manual ARMv8. https:\/\/developer.arm.com\/docs\/ddi0487\/latest. (2017). Version B.b.  ARM Ltd. . 2017. ARM Architecture Reference Manual ARMv8. https:\/\/developer.arm.com\/docs\/ddi0487\/latest. (2017). Version B.b."},{"key":"e_1_3_2_1_3_1","unstructured":"Arash Baratloo Navjot Singh and Timothy Tsai . 2000. Transparent Run-time Defense against Stack Smashing Attacks USENIX ATC.   Arash Baratloo Navjot Singh and Timothy Tsai . 2000. Transparent Run-time Defense against Stack Smashing Attacks USENIX ATC."},{"key":"e_1_3_2_1_4_1","unstructured":"Sandeep Bhatkar R. Sekar and Daniel C. DuVarney . 2005. Efficient Techniques for Comprehensive Protection from Memory Error Exploits USENIX Security.   Sandeep Bhatkar R. Sekar and Daniel C. DuVarney . 2005. Efficient Techniques for Comprehensive Protection from Memory Error Exploits USENIX Security."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181316"},{"key":"e_1_3_2_1_7_1","unstructured":"Nicolas Carlini Antonio Barresi Mathias Payer David Wagner and Thomas R. Gross . 2015. Control-flow Bending: On the Effectiveness of Control-flow Integrity USENIX Security.   Nicolas Carlini Antonio Barresi Mathias Payer David Wagner and Thomas R. Gross . 2015. Control-flow Bending: On the Effectiveness of Control-flow Integrity USENIX Security."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Yueqiang Cheng Zongwei Zhou Miao Yu Xuhua Ding and Robert H. Deng . 2014. ROPecker: A Generic and Practical Approach for Defending Against ROP Attacks NDSS.  Yueqiang Cheng Zongwei Zhou Miao Yu Xuhua Ding and Robert H. Deng . 2014. ROPecker: A Generic and Practical Approach for Defending Against ROP Attacks NDSS.","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_10_1","volume-title":"RAD: A Compile-time Solution to Buffer Overflow Attacks ICDCS.","author":"Fu-Hau Hsu Chiueh","year":"2001"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055626.1055636"},{"key":"e_1_3_2_1_13_1","unstructured":"Crispan Cowan Calton Pu Dave Maier Jonathan Walpole Peat Bakke Steve Beattie Aaron Grier Perry Wagle and Qian Zhang . 1998. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks USENIX Security.   Crispan Cowan Calton Pu Dave Maier Jonathan Walpole Peat Bakke Steve Beattie Aaron Grier Perry Wagle and Qian Zhang . 1998. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks USENIX Security."},{"key":"e_1_3_2_1_14_1","unstructured":"Christopher Dahn and Spiros Mancoridis . 2003. Using Program Transformation to Secure C Programs against Buffer Overflows WCRE. IEEE.   Christopher Dahn and Spiros Mancoridis . 2003. Using Program Transformation to Secure C Programs against Buffer Overflows WCRE. IEEE."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_16_1","unstructured":"Lucas Davi Alexandra Dmitrienko Manuel Egele Thomas Fischer Thorsten Holz Ralf Hund Stefan N\u00fcrnberger and Ahmad-Reza Sadeghi . 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones NDSS.  Lucas Davi Alexandra Dmitrienko Manuel Egele Thomas Fischer Thorsten Holz Ralf Hund Stefan N\u00fcrnberger and Ahmad-Reza Sadeghi . 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones NDSS."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_19_1","volume-title":"XFI: Software Guards for System Address Spaces USENIX OSDI.","author":"Erlingsson \u00dalfar","year":"2006"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_3_2_1_21_1","unstructured":"LLVM Foundation . {n. d.}. SafeStack. https:\/\/clang.llvm.org\/docs\/SafeStack.html. (. {n. d.}).  LLVM Foundation . {n. d.}. SafeStack. https:\/\/clang.llvm.org\/docs\/SafeStack.html. (. {n. d.})."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany and Thorsten Holz . 2016. Enabling Client-side Crash-resistance to Overcome Diversification and Information Hiding NDSS.  Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany and Thorsten Holz . 2016. Enabling Client-side Crash-resistance to Overcome Diversification and Information Hiding NDSS.","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037716"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Enes G\u00f6ktac s Elias Athanasopoulos Herbert Bos and Georgios Portokalidis . 2014 a. Out of Control: Overcoming Control-Flow Integrity S&P. IEEE.  Enes G\u00f6ktac s Elias Athanasopoulos Herbert Bos and Georgios Portokalidis . 2014 a. Out of Control: Overcoming Control-Flow Integrity S&P. IEEE.","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_25_1","unstructured":"Enes G\u00f6ktac s Elias Athanasopoulos Michalis Polychronakis Herbert Bos and Georgios Portokalidis . 2014 b. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard USENIX Security.  Enes G\u00f6ktac s Elias Athanasopoulos Michalis Polychronakis Herbert Bos and Georgios Portokalidis . 2014 b. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard USENIX Security."},{"key":"e_1_3_2_1_26_1","unstructured":"Enes G\u00f6ktac s Robert Gawlik Benjamin Kollenda Elias Athanasopoulos Georgios Portokalidis Cristiano Giuffrida and Herbert Bos . 2016. Undermining Information Hiding (And What to do About it) USENIX Security.  Enes G\u00f6ktac s Robert Gawlik Benjamin Kollenda Elias Athanasopoulos Georgios Portokalidis Cristiano Giuffrida and Herbert Bos . 2016. Undermining Information Hiding (And What to do About it) USENIX Security."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"e_1_3_2_1_28_1","unstructured":"Suhas Gupta Pranay Pratap Huzur Saran and S. Arun-Kumar . 2--6. Dynamic Code Instrumentation to Detect and Recover from Return Address Corruption WODA. ACM.  Suhas Gupta Pranay Pratap Huzur Saran and S. Arun-Kumar . 2--6. Dynamic Code Instrumentation to Detect and Recover from Return Address Corruption WODA. ACM."},{"key":"e_1_3_2_1_29_1","unstructured":"Intel Corp. . 2017 a. Control-flow Enforcement Technology Preview. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf. (2017).  Intel Corp. . 2017 a. Control-flow Enforcement Technology Preview. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf. (2017)."},{"key":"e_1_3_2_1_30_1","unstructured":"Intel Corp. . 2017 b. Intel 64 and IA-32 Architectures Software Developer's Manual. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm. (2017).  Intel Corp. . 2017 b. Intel 64 and IA-32 Architectures Software Developer's Manual. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm. (2017)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337159.2337171"},{"key":"e_1_3_2_1_32_1","unstructured":"Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R. Sekar and Dawn Song . 2014. Code-Pointer Integrity. In USENIX OSDI.   Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R. Sekar and Dawn Song . 2014. Code-Pointer Integrity. In USENIX OSDI."},{"key":"e_1_3_2_1_33_1","unstructured":"Ruby B. Lee David K. Karig John P. McGregor and Zhijie Shi . 2004. Enlisting Hardware Architecture to Thwart Malicious Code Injection Security in Pervasive Computing. Springer.  Ruby B. Lee David K. Karig John P. McGregor and Zhijie Shi . 2004. Enlisting Hardware Architecture to Thwart Malicious Code Injection Security in Pervasive Computing. Springer."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Yutao Liu Peitao Shi Xinran Wang Haibo Chen Binyu Zang and Haibing Guan . 2017. Transparent and Efficient CFI Enforcement with Intel Processor Trace HPCA. IEEE.  Yutao Liu Peitao Shi Xinran Wang Haibo Chen Binyu Zang and Haibing Guan . 2017. Transparent and Efficient CFI Enforcement with Intel Processor Trace HPCA. IEEE.","DOI":"10.1109\/HPCA.2017.18"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813694"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.14"},{"key":"e_1_3_2_1_37_1","unstructured":"Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida . 2016. Poking Holes in Information Hiding. In USENIX Security.  Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida . 2016. Poking Holes in Information Hiding. In USENIX Security."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.166"},{"key":"e_1_3_2_1_39_1","unstructured":"Vasilis Pappas Michalis Polychronakis and Angelos D. Keromytis . 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing USENIX Security.   Vasilis Pappas Michalis Polychronakis and Angelos D. Keromytis . 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing USENIX Security."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Seon-Ho Park Young-Ju Han Soon jwa Hong Hyoung-Chun Kim and Tai-Myoung Chung . 2007. The Dynamic Buffer Overflow Detection and Prevention Tool for Windows Executables Using Binary Rewriting. In ICACT. IEEE.  Seon-Ho Park Young-Ju Han Soon jwa Hong Hyoung-Chun Kim and Tai-Myoung Chung . 2007. The Dynamic Buffer Overflow Detection and Prevention Tool for Windows Executables Using Binary Rewriting. In ICACT. IEEE.","DOI":"10.1109\/ICACT.2007.358715"},{"key":"e_1_3_2_1_41_1","unstructured":"Manish Prasad and Tzi-cker Chiueh . 2003. A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks USENIX ATC.  Manish Prasad and Tzi-cker Chiueh . 2003. A Binary Rewriting Defense Against Stack-based Buffer Overflow Attacks USENIX ATC."},{"key":"e_1_3_2_1_42_1","unstructured":"Qualcomm Technologies Inc. . 2017. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8--3.pdf. (2017).  Qualcomm Technologies Inc. . 2017. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8--3.pdf. (2017)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660309"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_47_1","unstructured":"Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike . 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM USENIX Security.   Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike . 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM USENIX Security."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Yubin Xia Yutao Liu Haibo Chen and Binyu Zang . 2012. CFIMon: Detecting Violation of Control Flow Integrity Using Performance Counters DSN. IEEE.   Yubin Xia Yutao Liu Haibo Chen and Binyu Zang . 2012. CFIMon: Detecting Violation of Control Flow Integrity Using Performance Counters DSN. IEEE.","DOI":"10.1109\/DSN.2012.6263958"},{"key":"e_1_3_2_1_49_1","unstructured":"Jun Xu Zbigniew Kalbarczyk Sanjay Patel and Ravishankar K. Iyer . 2002. Architecture Support for Defending Against Buffer Overflow Attacks EASY.  Jun Xu Zbigniew Kalbarczyk Sanjay Patel and Ravishankar K. Iyer . 2002. Architecture Support for Defending Against Buffer Overflow Attacks EASY."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_1_52_1","unstructured":"Mingwei Zhang and R. Sekar . 2013. Control Flow Integrity for COTS Binaries. In USENIX Security.   Mingwei Zhang and R. Sekar . 2013. Control Flow Integrity for COTS Binaries. In USENIX Security."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06320-1_14"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196531","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196531"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":53,"alternative-id":["10.1145\/3196494.3196531","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196531","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}