{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:35:46Z","timestamp":1765438546589,"version":"3.41.0"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T00:00:00Z","timestamp":1542326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chinese Academy of Science","award":["QYZDB-SSW-JSC010"],"award-info":[{"award-number":["QYZDB-SSW-JSC010"]}]},{"name":"China National Science Fund for Excellent Young Scholars","award":["61522212"],"award-info":[{"award-number":["61522212"]}]},{"name":"Frontier Science Research Projects"},{"name":"National Key R8D Plan","award":["2017YFB1001602"],"award-info":[{"award-number":["2017YFB1001602"]}]},{"name":"CAS Pioneer Hundred Talents Program and National Natural Science Foundation of China","award":["61521092 and 61502459"],"award-info":[{"award-number":["61521092 and 61502459"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2018,12,31]]},"abstract":"<jats:p>Control-flow integrity (CFI) is a general method for preventing code-reuse attacks, which utilize benign code sequences to achieve arbitrary code execution. CFI ensures that the execution of a program follows the edges of its predefined static Control-Flow Graph: any deviation that constitutes a CFI violation terminates the application. Despite decades of research effort, there are still several implementation challenges in efficiently protecting the control flow of function returns (Return-Oriented Programming attacks). The set of valid return addresses of frequently called functions can be large and thus an attacker could bend the backward-edge CFI by modifying an indirect branch target to another within the valid return set. This article proposes RAGuard, an efficient and user-transparent hardware-based approach to prevent Return-Oreiented Programming attacks. RAGuard binds a message authentication code (MAC) to each return address to protect its integrity. To guarantee the security of the MAC and reduce runtime overhead: RAGuard (1) computes the MAC by encrypting the signature of a return address with AES-128, (2) develops a key management module based on a Physical Unclonable Function (PUF) and a True Random Number Generator (TRNG), and (3) uses a dedicated register to reduce MACs\u2019 load and store operations of leaf functions. We have evaluated our mechanism based on the open-source LEON3 processor and the results show that RAGuard incurs acceptable performance overhead and occupies reasonable area.<\/jats:p>","DOI":"10.1145\/3280852","type":"journal-article","created":{"date-parts":[[2018,11,16]],"date-time":"2018-11-16T13:08:54Z","timestamp":1542373734000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["RAGuard"],"prefix":"10.1145","volume":"15","author":[{"given":"Jun","family":"Zhang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Computer Architecture, ICT, CAS and Hubei University of Arts and Science, Xiangyang, China"}]},{"given":"Rui","family":"Hou","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Wei","family":"Song","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Sally A.","family":"Mckee","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering, Clemson University, Clemson, SC, USA"}]},{"given":"Zhen","family":"Jia","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Chen","family":"Zheng","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Mingyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Lixin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,11,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_2_1_2_1","unstructured":"ARM Limited. 2011. What Is a Leaf Function? Retrieved from http:\/\/infocenter.arm.com\/help\/index.jsp?topic&equals;\/com.arm.doc.faqs\/ka13785.html.  ARM Limited. 2011. What Is a Leaf Function? Retrieved from http:\/\/infocenter.arm.com\/help\/index.jsp?topic&equals;\/com.arm.doc.faqs\/ka13785.html."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"volume-title":"Physical Unclonable Functions in Theory and Practice","author":"B\u00f6hm Christoph","key":"e_1_2_1_4_1","unstructured":"Christoph B\u00f6hm and Maximilian Hofer . 2012. Physical Unclonable Functions in Theory and Practice . Springer Publishing Company, Inc. Christoph B\u00f6hm and Maximilian Hofer. 2012. Physical Unclonable Functions in Theory and Practice. Springer Publishing Company, Inc."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181316"},{"volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915)","author":"Carlini Nicolas","key":"e_1_2_1_6_1","unstructured":"Nicolas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R. Gross . 2015. Control-flow bending: On the effectiveness of control-flow integrity . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915) . 161--176. Nicolas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-flow bending: On the effectiveness of control-flow integrity. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915). 161--176."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (SEC\u201914)","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner . 2014 . ROP is still dangerous: Breaking modern defenses . In Proceedings of the 23rd USENIX Security Symposium (SEC\u201914) . 385--399. Nicholas Carlini and David Wagner. 2014. ROP is still dangerous: Breaking modern defenses. In Proceedings of the 23rd USENIX Security Symposium (SEC\u201914). 385--399."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_2_1_10_1","unstructured":"Intel Corporation. 2016. Control-flow Enforcement Technology Preview. Retrieved from https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf.  Intel Corporation. 2016. Control-flow Enforcement Technology Preview. Retrieved from https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 12th Conference on USENIX Security Symposium (SEC\u201903)","author":"Cowan Crispin","year":"2003","unstructured":"Crispin Cowan , Steve Beattie , John Johansen , and Perry Wagle . 2003 . Pointguard TM: Protecting pointers from buffer overflow vulnerabilities . In Proceedings of the 12th Conference on USENIX Security Symposium (SEC\u201903) . 7--7. Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. 2003. Pointguard TM: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th Conference on USENIX Security Symposium (SEC\u201903). 7--7."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 7th Conference on USENIX Security Symposium (SEC\u201998)","author":"Cowan Crispin","year":"1998","unstructured":"Crispin Cowan , Calton Pu , Dave Maier , Heather Hintony , Jonathan Walpole , Peat Bakke , Steve Beattie , Aaron Grier , Perry Wagle , and Qian Zhang . 1998 . StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proceedings of the 7th Conference on USENIX Security Symposium (SEC\u201998) . 5--5. Crispin Cowan, Calton Pu, Dave Maier, Heather Hintony, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. 1998. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th Conference on USENIX Security Symposium (SEC\u201998). 5--5."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_2_1_14_1","volume-title":"Understanding the Linux Kernel","author":"Daniel Bovet","unstructured":"Bovet Daniel and Cesati Marco . 2006. Understanding the Linux Kernel ( 3 rd ed.). O\u2019Reilly Media, Inc. , Sebastopol . Bovet Daniel and Cesati Marco. 2006. Understanding the Linux Kernel (3rd ed.). O\u2019Reilly Media, Inc., Sebastopol.","edition":"3"},{"key":"e_1_2_1_15_1","unstructured":"Subhasis Das. 2010. Fully Pipelined AES Core. Retrieved from http:\/\/opencores.org\/project aes_pipe.  Subhasis Das. 2010. Fully Pipelined AES Core. Retrieved from http:\/\/opencores.org\/project aes_pipe."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596656"},{"key":"e_1_2_1_19_1","volume-title":"A survey of hardware-based control flow integrity (CFI). CoRR abs\/1706.07257","author":"de Clercq Ruan","year":"2017","unstructured":"Ruan de Clercq and Ingrid Verbauwhede . 2017. A survey of hardware-based control flow integrity (CFI). CoRR abs\/1706.07257 ( 2017 ). Ruan de Clercq and Ingrid Verbauwhede. 2017. A survey of hardware-based control flow integrity (CFI). CoRR abs\/1706.07257 (2017)."},{"key":"e_1_2_1_20_1","unstructured":"Clang 6 documentation. 2017. Control Flow Integrity. Retrieved from http:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html.  Clang 6 documentation. 2017. Control Flow Integrity. Retrieved from http:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium (SEC\u201901)","author":"Frantzen Mike","year":"2001","unstructured":"Mike Frantzen and Mike Shuey . 2001 . StackGhost: Hardware facilitated stack protection . In Proceedings of the 10th Conference on USENIX Security Symposium (SEC\u201901) . 5--5. Mike Frantzen and Mike Shuey. 2001. StackGhost: Hardware facilitated stack protection. In Proceedings of the 10th Conference on USENIX Security Symposium (SEC\u201901). 5--5."},{"key":"e_1_2_1_23_1","unstructured":"Cobham Gaisler. 2017. LEON3 Processor. Retrieved from http:\/\/www.gaisler.com\/index.php\/products\/processors\/leon3.  Cobham Gaisler. 2017. LEON3 Processor. Retrieved from http:\/\/www.gaisler.com\/index.php\/products\/processors\/leon3."},{"key":"e_1_2_1_24_1","volume-title":"Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785","author":"Gao Yangsong","year":"2015","unstructured":"Yangsong Gao , Damith C. Ranasinghe , Said F. Al-Sarawi , Omid Kavehei , and Derek Abbott . 2015. Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785 ( 2015 ), 1--14. Yangsong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott. 2015. Memristive crypto primitive for building highly secure physical unclonable functions. Sci. Rep. 5, 12785 (2015), 1--14."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.24"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241104"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062291"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_28"},{"key":"e_1_2_1_29_1","unstructured":"Homer Hsing. 2015. Tiny Encryption Algorithm. Retrieved from http:\/\/opencores.org\/project tiny_encryption_algorithm Overview.  Homer Hsing. 2015. Tiny Encryption Algorithm. Retrieved from http:\/\/opencores.org\/project tiny_encryption_algorithm Overview."},{"key":"e_1_2_1_30_1","unstructured":"ICTK. 2017. VIA PUF. Retrieved from http:\/\/www.ictk.com\/servicenproduct\/puf.  ICTK. 2017. VIA PUF. Retrieved from http:\/\/www.ictk.com\/servicenproduct\/puf."},{"key":"e_1_2_1_31_1","unstructured":"Intel Corp. 2018. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual Volume 3A: System Programming Guide.  Intel Corp. 2018. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual Volume 3A: System Programming Guide."},{"volume-title":"Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems (CHES\u201911)","author":"Katzenbeisser Stefan","key":"e_1_2_1_32_1","unstructured":"Stefan Katzenbeisser , \u00dcnal Ko\u00e7abas , Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schr\u00f6der, and Christian Wachsmann. 2011. Recyclable PUFs: Logically reconfigurable PUFs . In Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems (CHES\u201911) . 374--389. Stefan Katzenbeisser, \u00dcnal Ko\u00e7abas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schr\u00f6der, and Christian Wachsmann. 2011. Recyclable PUFs: Logically reconfigurable PUFs. In Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems (CHES\u201911). 374--389."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2044928.2044964"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685061"},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the 1st International Conference on Security in Pervasive Computing. 237--252","author":"Lee Ruby B.","year":"2003","unstructured":"Ruby B. Lee , David K. Karig , John P. McGregor , and Zhijie Shi . 2003 . Enlisting hardware architecture to thwart malicious code injection . In Proceedings of the 1st International Conference on Security in Pervasive Computing. 237--252 . Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi. 2003. Enlisting hardware architecture to thwart malicious code injection. In Proceedings of the 1st International Conference on Security in Pervasive Computing. 237--252."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281700.1281702"},{"key":"e_1_2_1_37_1","unstructured":"David Litchfield. 2003. Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. Retrieved from https:\/\/pdfs.semanticscholar.org\/cf20\/2abd9d5e866659be3cfbb1cb094d60d5484c.pdf.  David Litchfield. 2003. Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. Retrieved from https:\/\/pdfs.semanticscholar.org\/cf20\/2abd9d5e866659be3cfbb1cb094d60d5484c.pdf."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813694"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"key":"e_1_2_1_40_1","unstructured":"Michael Muehlberghuber. 2014. A High-throughput VHDL and SystemVerilog Implementation of AES-128 Including Scripts for a Full Front-end Design Process. Retrieved from https:\/\/github.com\/mbgh\/aes128-hdl.  Michael Muehlberghuber. 2014. A High-throughput VHDL and SystemVerilog Implementation of AES-128 Including Scripts for a Full Front-end Design Process. Retrieved from https:\/\/github.com\/mbgh\/aes128-hdl."},{"key":"e_1_2_1_41_1","unstructured":"National Institute of Standards and Technology (NIST). 2006. FIPS 197 Advanced Encryption Standard (AES). Retrieved from http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf.  National Institute of Standards and Technology (NIST). 2006. FIPS 197 Advanced Encryption Standard (AES). Retrieved from http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241105"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.166"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2016.2548561"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2015.07.005"},{"key":"e_1_2_1_47_1","unstructured":"JunHyuk Song Radha Poovendran Jicheol Lee and Tetsu Iwata. 2006. The AES-CMAC Algorithm. Retrieved from https:\/\/tools.ietf.org\/html\/rfc4493.  JunHyuk Song Radha Poovendran Jicheol Lee and Tetsu Iwata. 2006. The AES-CMAC Algorithm. Retrieved from https:\/\/tools.ietf.org\/html\/rfc4493."},{"key":"e_1_2_1_48_1","unstructured":"SPARC International Inc. 1998. The SPARC Architecutre Manual Version 8.   SPARC International Inc. 1998. The SPARC Architecutre Manual Version 8."},{"key":"e_1_2_1_49_1","volume-title":"SPEC CPU2006 Benchmark.","author":"Standard Performance Evaluation Corporation (SPEC).","year":"2011","unstructured":"Standard Performance Evaluation Corporation (SPEC). 2011 . SPEC CPU2006 Benchmark. Retrieved from http:\/\/www.spec.org\/cpu2006\/. Standard Performance Evaluation Corporation (SPEC). 2011. SPEC CPU2006 Benchmark. Retrieved from http:\/\/www.spec.org\/cpu2006\/."},{"volume-title":"True Random Number Generators. Open Problems in Mathematics and Computational Science","author":"Stip\u010devi\u0107 Mario","key":"e_1_2_1_50_1","unstructured":"Mario Stip\u010devi\u0107 and \u00c7etin Kaya Ko\u00e7 . 2014. True Random Number Generators. Open Problems in Mathematics and Computational Science . Springer , 275--315. Mario Stip\u010devi\u0107 and \u00c7etin Kaya Ko\u00e7. 2014. True Random Number Generators. Open Problems in Mathematics and Computational Science. Springer, 275--315."},{"key":"e_1_2_1_51_1","unstructured":"Joachim Str\u00f6mbergson. 2017. Verilog implementation of the symmetric block cipher AES. Retrieved from https:\/\/github.com\/secworks\/aes.  Joachim Str\u00f6mbergson. 2017. Verilog implementation of the symmetric block cipher AES. Retrieved from https:\/\/github.com\/secworks\/aes."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898098"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (SEC\u201914)","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing forward-edge control-flow integrity in GCC 8 LLVM . In Proceedings of the 23rd USENIX Security Symposium (SEC\u201914) . 941--955. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing forward-edge control-flow integrity in GCC 8 LLVM. In Proceedings of the 23rd USENIX Security Symposium (SEC\u201914). 941--955."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.20"},{"key":"e_1_2_1_56_1","series-title":"Lecture Notes in Computer Science","volume-title":"Efficient implementation of true random number generator based on SRAM PUFs. Cryptography and Security: From Theory to Applications","author":"van der Leest Vincent","unstructured":"Vincent van der Leest , Erik van der Sluis , Geert-Jan Schrijen , Pim Tuyls , and Helena Handschuh . 2012. Efficient implementation of true random number generator based on SRAM PUFs. Cryptography and Security: From Theory to Applications . Lecture Notes in Computer Science , Vol. 6805 . Springer , 300--318. Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, and Helena Handschuh. 2012. Efficient implementation of true random number generator based on SRAM PUFs. Cryptography and Security: From Theory to Applications. Lecture Notes in Computer Science, Vol. 6805. Springer, 300--318."},{"key":"e_1_2_1_57_1","unstructured":"Xilinx inc.2017. Vivado Design Suite - HLx Editions. Retrieved from https:\/\/www.xilinx.com\/support\/download\/index.html\/content\/xilinx\/en\/downloadNav\/vivado-design-tools\/2016-2.html.  Xilinx inc.2017. Vivado Design Suite - HLx Editions. Retrieved from https:\/\/www.xilinx.com\/support\/download\/index.html\/content\/xilinx\/en\/downloadNav\/vivado-design-tools\/2016-2.html."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2902961.2903043"},{"key":"e_1_2_1_59_1","volume-title":"Proceedings of the 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA\u201918)","author":"Yasser Shalabi","year":"2018","unstructured":"Shalabi Yasser , Yan Mengjia , Honarmand Nima , Ruby B. Lee , and Torrellas Josep . 2018 . Record-replay architecture as a general security framework . In Proceedings of the 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA\u201918) . 180--193. Shalabi Yasser, Yan Mengjia, Honarmand Nima, Ruby B. Lee, and Torrellas Josep. 2018. Record-replay architecture as a general security framework. In Proceedings of the 2018 IEEE International Symposium on High Performance Computer Architecture (HPCA\u201918). 180--193."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3075570"},{"volume-title":"Proceedings of the 22nd USENIX Conference on Security (SEC\u201913)","author":"Zhang Mingwei","key":"e_1_2_1_62_1","unstructured":"Mingwei Zhang and R. Sekar . 2013. Control flow integrity for COTS binaries . In Proceedings of the 22nd USENIX Conference on Security (SEC\u201913) . 337--352. Mingwei Zhang and R. Sekar. 2013. Control flow integrity for COTS binaries. In Proceedings of the 22nd USENIX Conference on Security (SEC\u201913). 337--352."},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the ACM 7th Workshop on the Interaction amongst Virtualization, Operating Systems and Computer Architecture. 311--316","author":"Zheng Chen","year":"2013","unstructured":"Chen Zheng , Jianfeng Zhan , Zhen Jia , and Lixin Zhang . 2013 . Characterizing OS behavior of scale-out data center workloads . In Proceedings of the ACM 7th Workshop on the Interaction amongst Virtualization, Operating Systems and Computer Architecture. 311--316 . Chen Zheng, Jianfeng Zhan, Zhen Jia, and Lixin Zhang. 2013. Characterizing OS behavior of scale-out data center workloads. In Proceedings of the ACM 7th Workshop on the Interaction amongst Virtualization, Operating Systems and Computer Architecture. 311--316."},{"key":"e_1_2_1_64_1","unstructured":"Intel Developer Zone. 2016. Finstrument-functions Qinstrument-functions. Retrieved from https:\/\/software.intel.com\/en-us\/node\/693332.  Intel Developer Zone. 2016. Finstrument-functions Qinstrument-functions. Retrieved from https:\/\/software.intel.com\/en-us\/node\/693332."}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3280852","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3280852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:51Z","timestamp":1750208511000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3280852"}},"subtitle":["An Efficient and User-Transparent Hardware Mechanism against ROP Attacks"],"short-title":[],"issued":{"date-parts":[[2018,11,16]]},"references-count":63,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12,31]]}},"alternative-id":["10.1145\/3280852"],"URL":"https:\/\/doi.org\/10.1145\/3280852","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"type":"print","value":"1544-3566"},{"type":"electronic","value":"1544-3973"}],"subject":[],"published":{"date-parts":[[2018,11,16]]},"assertion":[{"value":"2017-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}