{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:57:03Z","timestamp":1764403023235,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384738","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"471-480","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Return-Oriented Programming on RISC-V"],"prefix":"10.1145","author":[{"given":"Georges-Axel","family":"Jaloyan","sequence":"first","affiliation":[{"name":"Ecole normale sup\u00e9rieure, CNRS, PSL University &amp; CEA, DAM, DIF, Paris, France"}]},{"given":"Konstantinos","family":"Markantonakis","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]},{"given":"Raja Naeem","family":"Akram","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, London, United Kingdom"}]},{"given":"David","family":"Robin","sequence":"additional","affiliation":[{"name":"Ecole normale sup\u00e9rieure, CNRS, PSL University, Paris, France"}]},{"given":"Keith","family":"Mayes","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, Paris, France"}]},{"given":"David","family":"Naccache","sequence":"additional","affiliation":[{"name":"Ecole normale sup\u00e9rieure, CNRS, PSL University, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_2_2_1","volume-title":"Smashing the stack for fun and profit. Phrack, 7(49)","author":"One Aleph","year":"1996","unstructured":"Aleph One . Smashing the stack for fun and profit. Phrack, 7(49) , 1996 . http:\/\/phrack.org\/issues\/49\/14.html. Aleph One. Smashing the stack for fun and profit. Phrack, 7(49), 1996. http:\/\/phrack.org\/issues\/49\/14.html."},{"key":"e_1_3_2_2_3_1","unstructured":"Sergi Alvarez. Radare2 2008. https:\/\/rada.re\/n\/radare2.html.  Sergi Alvarez. Radare2 2008. https:\/\/rada.re\/n\/radare2.html."},{"key":"e_1_3_2_2_4_1","first-page":"41","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Andriesse Dennis","year":"2014","unstructured":"Dennis Andriesse and Herbert Bos . Instruction-level steganography for covert trigger-based malware . In Detection of Intrusions and Malware, and Vulnerability Assessment , pages 41 -- 50 , Berlin, Heidelberg , 2014 . Springer-Verlag . https:\/\/www.cs.vu.nl\/herbertb\/papers\/stega_dimva14.pdf. Dennis Andriesse and Herbert Bos. Instruction-level steganography for covert trigger-based malware. In Detection of Intrusions and Malware, and Vulnerability Assessment, pages 41--50, Berlin, Heidelberg, 2014. Springer-Verlag. https:\/\/www.cs.vu.nl\/herbertb\/papers\/stega_dimva14.pdf."},{"key":"e_1_3_2_2_5_1","volume-title":"ARM1156T2-S technical reference manual","author":"Limited ARM","year":"2005","unstructured":"ARM Limited . ARM1156T2-S technical reference manual , 2005 . http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0338g\/DDI0338G_arm1156t2s_r0p4_trm.pdf. ARM Limited. ARM1156T2-S technical reference manual, 2005. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ddi0338g\/DDI0338G_arm1156t2s_r0p4_trm.pdf."},{"key":"e_1_3_2_2_6_1","volume-title":"ARM architecture reference manual. ARMv8, for ARMv8-A architecture profile","author":"Limited ARM","year":"2013","unstructured":"ARM Limited . ARM architecture reference manual. ARMv8, for ARMv8-A architecture profile , 2013 . https:\/\/static.docs.arm.com\/ddi0487\/da\/DDI0487D_a_armv8_arm.pdf. ARM Limited. ARM architecture reference manual. ARMv8, for ARMv8-A architecture profile, 2013. https:\/\/static.docs.arm.com\/ddi0487\/da\/DDI0487D_a_armv8_arm.pdf."},{"volume-title":"AVR instruction set manual","year":"2016","key":"e_1_3_2_2_7_1","unstructured":"Atmel. AVR instruction set manual , 2016 . http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/atmel-0856-avr-instruction-set-manual.pdf. Atmel. AVR instruction set manual, 2016. http:\/\/ww1.microchip.com\/downloads\/en\/devicedoc\/atmel-0856-avr-instruction-set-manual.pdf."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247401"},{"key":"e_1_3_2_2_9_1","volume-title":"Interpreter exploitation: Pointer inference and JIT spraying","author":"Blazakis Dion","year":"2010","unstructured":"Dion Blazakis . Interpreter exploitation: Pointer inference and JIT spraying , 2010 . http:\/\/www.semantiscope.com\/research\/BHDC2010\/BHDC-2010-Paper.pdf. Dion Blazakis. Interpreter exploitation: Pointer inference and JIT spraying, 2010. http:\/\/www.semantiscope.com\/research\/BHDC2010\/BHDC-2010-Paper.pdf."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297472"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_2_15_1","volume-title":"AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC","author":"Cama Amat","year":"2017","unstructured":"Amat Cama . xrop: Tool to generate ROP gadgets for ARM , AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC , 2017 . https:\/\/github.com\/acama\/xrop. Amat Cama. xrop: Tool to generate ROP gadgets for ARM, AARCH64, x86, MIPS, PPC, RISCV, SH4 and SPARC, 2017. https:\/\/github.com\/acama\/xrop."},{"key":"e_1_3_2_2_16_1","first-page":"161","volume-title":"Proceedings of the 24th USENIX Security Symposium","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R. Gross . Control-flow bending: On the effectiveness of control-flow integrity . In Proceedings of the 24th USENIX Security Symposium , pages 161 -- 176 , Washington, DC , 2015 . USENIX Association. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-carlini.pdf. Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. Control-flow bending: On the effectiveness of control-flow integrity. In Proceedings of the 24th USENIX Security Symposium, pages 161--176, Washington, DC, 2015. USENIX Association. https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity15\/sec15-paper-carlini.pdf."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10772-6_13"},{"key":"e_1_3_2_2_18_1","volume-title":"RISC-V ELF psABI specifcation","author":"Dabbelt Palmer","year":"2016","unstructured":"Palmer Dabbelt , Stefan O'Rear , Kito Cheng , Andrew Waterman , Michael Clark , Alex Bradbury , Davod Horner , Max Nordlund , and Karsten Merker . RISC-V ELF psABI specifcation , 2016 . https:\/\/github.com\/riscv\/riscv-elf-psabi-doc\/. Palmer Dabbelt, Stefan O'Rear, Kito Cheng, Andrew Waterman, Michael Clark, Alex Bradbury, Davod Horner, Max Nordlund, and Karsten Merker. RISC-V ELF psABI specifcation, 2016. https:\/\/github.com\/riscv\/riscv-elf-psabi-doc\/."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_2_20_1","volume-title":"iOS kernel exploitation","author":"Esser Stephan","year":"2011","unstructured":"Stephan Esser . iOS kernel exploitation , 2011 . https:\/\/media.blackhat.com\/bh-us-11\/Esser\/BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf. Stephan Esser. iOS kernel exploitation, 2011. https:\/\/media.blackhat.com\/bh-us-11\/Esser\/BH_US_11_Esser_Exploiting_The_iOS_Kernel_Slides.pdf."},{"key":"e_1_3_2_2_21_1","volume-title":"Clangjit: Enhancing c+ with just-in-time compilation","author":"Finkel Hal","year":"2019","unstructured":"Hal Finkel , David Poliakoff , and David F. Richards . Clangjit: Enhancing c+ with just-in-time compilation , 2019 . https:\/\/arxiv.org\/pdf\/1904.08555.pdf. Hal Finkel, David Poliakoff, and David F. Richards. Clangjit: Enhancing c+ with just-in-time compilation, 2019. https:\/\/arxiv.org\/pdf\/1904.08555.pdf."},{"key":"e_1_3_2_2_22_1","volume-title":"Thomas Coudray. PICON: Control Flow Integrity on LLVM IR. In Symposium sur la S\u00e9curit\u00e9 des Technologies de l'Information et des Communications","author":"Fontaine Arnaud","year":"2015","unstructured":"Arnaud Fontaine , Pierre Chifflier , and Thomas Coudray. PICON: Control Flow Integrity on LLVM IR. In Symposium sur la S\u00e9curit\u00e9 des Technologies de l'Information et des Communications , Rennes , 2015 . https:\/\/www.sstic.org\/2015\/presentation\/control_flow_integrity_on_llvm_ir\/. Arnaud Fontaine, Pierre Chifflier, and Thomas Coudray. PICON: Control Flow Integrity on LLVM IR. In Symposium sur la S\u00e9curit\u00e9 des Technologies de l'Information et des Communications, Rennes, 2015. https:\/\/www.sstic.org\/2015\/presentation\/control_flow_integrity_on_llvm_ir\/."},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of the 12th USENIX Workshop on Offensive Technologies","author":"Gawlik Robert","year":"2018","unstructured":"Robert Gawlik and Thorsten Holz . Sok : Make jit-spray great again . In Proceedings of the 12th USENIX Workshop on Offensive Technologies , Baltimore, MD , 2018 . USENIX Association. https:\/\/www.usenix.org\/system\/files\/conference\/woot18\/woot18-paper-gawlik.pdf. Robert Gawlik and Thorsten Holz. Sok: Make jit-spray great again. In Proceedings of the 12th USENIX Workshop on Offensive Technologies, Baltimore, MD, 2018. USENIX Association. https:\/\/www.usenix.org\/system\/files\/conference\/woot18\/woot18-paper-gawlik.pdf."},{"key":"e_1_3_2_2_24_1","volume-title":"I'm harvesting credit card numbers and passwords from your site. Here's how","author":"Gilbertson David","year":"2018","unstructured":"David Gilbertson . I'm harvesting credit card numbers and passwords from your site. Here's how ., 2018 . https:\/\/hackernoon.com\/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5. David Gilbertson. I'm harvesting credit card numbers and passwords from your site. Here's how., 2018. https:\/\/hackernoon.com\/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5."},{"key":"e_1_3_2_2_25_1","unstructured":"IBM. Power ISA version 3.0B 2017. https:\/\/openpowerfoundation.org\/?resource_lib=power-isa-version-3-0.  IBM. Power ISA version 3.0B 2017. https:\/\/openpowerfoundation.org\/?resource_lib=power-isa-version-3-0."},{"key":"e_1_3_2_2_26_1","volume-title":"Ida sploiter","author":"Kacherginsky Peter","year":"2017","unstructured":"Peter Kacherginsky . Ida sploiter , 2017 . https:\/\/github.com\/iphelix\/ida-sploiter\/. Peter Kacherginsky. Ida sploiter, 2017. https:\/\/github.com\/iphelix\/ida-sploiter\/."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755934"},{"key":"e_1_3_2_2_28_1","first-page":"999","volume-title":"Proceedings of the 29th European Conference on Object-Oriented Programming","author":"Medeiros Fl\u00e1vio","year":"2015","unstructured":"Fl\u00e1vio Medeiros , Christian Kastner , M\u00e1rcio Ribeiro , Sarah Nadi , and Rohiy Gheyi . The love\/hate relationship with the c preprocessor: An interview study . In Proceedings of the 29th European Conference on Object-Oriented Programming , pages 999 -- 1022 , Germany , 2015 . Dagstuhl Publishing. https:\/\/www.cs.cmu.edu\/ckaestne\/pdf\/ecoop15.pdf. Fl\u00e1vio Medeiros, Christian Kastner, M\u00e1rcio Ribeiro, Sarah Nadi, and Rohiy Gheyi. The love\/hate relationship with the c preprocessor: An interview study. In Proceedings of the 29th European Conference on Object-Oriented Programming, pages 999--1022, Germany, 2015. Dagstuhl Publishing. https:\/\/www.cs.cmu.edu\/ckaestne\/pdf\/ecoop15.pdf."},{"volume-title":"Microsoft security toolkit delivers new bluehat prize defensive technology","year":"2012","key":"e_1_3_2_2_29_1","unstructured":"Microsoft. Microsoft security toolkit delivers new bluehat prize defensive technology , 2012 . https:\/\/news.microsoft.com\/2012\/07\/25\/microsoft-security-toolkit-delivers-new-bluehat-prize-defensive-technology\/. Microsoft. Microsoft security toolkit delivers new bluehat prize defensive technology, 2012. https:\/\/news.microsoft.com\/2012\/07\/25\/microsoft-security-toolkit-delivers-new-bluehat-prize-defensive-technology\/."},{"key":"e_1_3_2_2_30_1","volume-title":"MIPS32 architecture for programmers. Volume II: The MIPS32 instruction set","author":"Technologies Inc MIPS","year":"2001","unstructured":"Inc MIPS Technologies . MIPS32 architecture for programmers. Volume II: The MIPS32 instruction set , 2001 . https:\/\/www.cs.cornell.edu\/courses\/cs3410\/2008fa\/MIPS_Vol2.pdf. Inc MIPS Technologies. MIPS32 architecture for programmers. Volume II: The MIPS32 instruction set, 2001. https:\/\/www.cs.cornell.edu\/courses\/cs3410\/2008fa\/MIPS_Vol2.pdf."},{"key":"e_1_3_2_2_31_1","volume-title":"Removing ROP gadgets from OpenBSD","author":"Mortimer Todd","year":"2018","unstructured":"Todd Mortimer . Removing ROP gadgets from OpenBSD , 2018 . https:\/\/www.openbsd.org\/papers\/eurobsdcon2018-rop.pdf. Todd Mortimer. Removing ROP gadgets from OpenBSD, 2018. https:\/\/www.openbsd.org\/papers\/eurobsdcon2018-rop.pdf."},{"volume-title":"Advanced return-into-lib(c) exploits (PaX case study). Phrack, 11(58)","year":"2001","key":"e_1_3_2_2_32_1","unstructured":"Nergal. Advanced return-into-lib(c) exploits (PaX case study). Phrack, 11(58) , 2001 . http:\/\/phrack.org\/issues\/58\/4.html. Nergal. Advanced return-into-lib(c) exploits (PaX case study). Phrack, 11(58), 2001. http:\/\/phrack.org\/issues\/58\/4.html."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_2_34_1","first-page":"49","volume-title":"Proceedings of the 2010 Annual Computer Security Applications Conference","author":"Onarligolu Kaan","year":"2010","unstructured":"Kaan Onarligolu , Leyla Bilge , Andrea Lanzi , Davide Balzarotti , and Engin Kirda . G-Free : defeating return-oriented programming through gadget-less binaries . In Proceedings of the 2010 Annual Computer Security Applications Conference , pages 49 -- 58 , New York, NY , 2010 . ACM. http:\/\/www.eurecom.fr\/fr\/publication\/3235\/download\/rs-publi-3235.pdf. Kaan Onarligolu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, and Engin Kirda. G-Free: defeating return-oriented programming through gadget-less binaries. In Proceedings of the 2010 Annual Computer Security Applications Conference, pages 49--58, New York, NY, 2010. ACM. http:\/\/www.eurecom.fr\/fr\/publication\/3235\/download\/rs-publi-3235.pdf."},{"key":"e_1_3_2_2_35_1","volume-title":"Defending against return-oriented programming","author":"Pappas Vasileios","year":"2015","unstructured":"Vasileios Pappas . Defending against return-oriented programming , 2015 . https:\/\/academiccommons.columbia.edu\/doi\/10.7916\/D8CZ35VH. Vasileios Pappas. Defending against return-oriented programming, 2015. https:\/\/academiccommons.columbia.edu\/doi\/10.7916\/D8CZ35VH."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_2_37_1","first-page":"443","volume-title":"Proceedings of the 8th Annual Symposium on Computer Architecture","author":"David","year":"1981","unstructured":"David A. Patterson and Carlo H. Sequin. RISC I: A reduced instruction set VLSI computer . In Proceedings of the 8th Annual Symposium on Computer Architecture , pages 443 -- 457 , Los Alamitos, CA , 1981 . IEEE Computer Society. http:\/\/www.cecs.pdx.edu\/ alaa\/ece587\/papers\/patterson_isca_1981.pdf. David A. Patterson and Carlo H. Sequin. RISC I: A reduced instruction set VLSI computer. In Proceedings of the 8th Annual Symposium on Computer Architecture, pages 443--457, Los Alamitos, CA, 1981. IEEE Computer Society. http:\/\/www.cecs.pdx.edu\/ alaa\/ece587\/papers\/patterson_isca_1981.pdf."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430555"},{"key":"e_1_3_2_2_39_1","first-page":"211","volume-title":"USENIX Annual Technical Conference","author":"Prasad Manish","year":"2003","unstructured":"Manish Prasad and Tzi cker Chiueh . A binary rewriting defense against stack based buffer overflow attacks . In USENIX Annual Technical Conference , pages 211 -- 224 , San Antonio, TX , 2003 . USENIX Association. https:\/\/www.usenix.org\/event\/usenix03\/tech\/full_papers\/prasad\/prasad.ps. Manish Prasad and Tzi cker Chiueh. A binary rewriting defense against stack based buffer overflow attacks. In USENIX Annual Technical Conference, pages 211--224, San Antonio, TX, 2003. USENIX Association. https:\/\/www.usenix.org\/event\/usenix03\/tech\/full_papers\/prasad\/prasad.ps."},{"key":"e_1_3_2_2_40_1","volume-title":"Rop gadgets hiding techniques in open source projects","author":"Prati Marco","year":"2012","unstructured":"Marco Prati . Rop gadgets hiding techniques in open source projects , 2012 . http:\/\/amslaurea.unibo.it\/4682\/. Marco Prati. Rop gadgets hiding techniques in open source projects, 2012. http:\/\/amslaurea.unibo.it\/4682\/."},{"key":"e_1_3_2_2_41_1","volume-title":"Western Digital at Chips? Frontier","author":"Ray Tiernan","year":"2018","unstructured":"Tiernan Ray . Nvidia , Western Digital at Chips? Frontier , 2018 . https:\/\/www.barrons.com\/articles\/nvidia-western-digital-at-chips-frontier-1516640945. Tiernan Ray. Nvidia, Western Digital at Chips? Frontier, 2018. https:\/\/www.barrons.com\/articles\/nvidia-western-digital-at-chips-frontier-1516640945."},{"key":"e_1_3_2_2_42_1","volume-title":"ROPgadget: Gadgets finder and auto-roper","author":"Salwan Jonathan","year":"2011","unstructured":"Jonathan Salwan . ROPgadget: Gadgets finder and auto-roper , 2011 . https:\/\/github.com\/JonathanSalwan\/ROPgadget\/. Jonathan Salwan. ROPgadget: Gadgets finder and auto-roper, 2011. https:\/\/github.com\/JonathanSalwan\/ROPgadget\/."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_2_44_1","unstructured":"Yan Shoshitaishvili Chris Salls and Nick Stephens. Angrop 2014. https:\/\/github.com\/salls\/angrop.  Yan Shoshitaishvili Chris Salls and Nick Stephens. Angrop 2014. https:\/\/github.com\/salls\/angrop."},{"key":"e_1_3_2_2_45_1","unstructured":"SPARC International Inc. The SPARC architecture manual version 8 1991. https:\/\/www.gaisler.com\/doc\/sparcv8.pdf.  SPARC International Inc. The SPARC architecture manual version 8 1991. https:\/\/www.gaisler.com\/doc\/sparcv8.pdf."},{"key":"e_1_3_2_2_46_1","first-page":"92","volume-title":"Proceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses","author":"Sam","year":"2018","unstructured":"Sam L. Thomas and Aur\u00e9lien Francillon. Backdoors: Definition, deniability and detection . In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses , pages 92 -- 113 , Berlin, Heidelberg , 2018 . Springer-Verlag. smallhttp:\/\/s3.eurecom.fr\/docs\/raid18_thomas.pdf. Sam L. Thomas and Aur\u00e9lien Francillon. Backdoors: Definition, deniability and detection. In Proceedings of the 21st International Symposium on Research in Attacks, Intrusions and Defenses, pages 92--113, Berlin, Heidelberg, 2018. Springer-Verlag. smallhttp:\/\/s3.eurecom.fr\/docs\/raid18_thomas.pdf."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/FDTC.2016.18"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/396\/5\/052071"},{"key":"e_1_3_2_2_49_1","volume-title":"User-level ISA, document version 2.2","author":"Waterman Andrew","year":"2017","unstructured":"Andrew Waterman and Krste Asanovi\u0107 . The RISC-V instruction set manual , volume I : User-level ISA, document version 2.2 , 2017 . https:\/\/content.riscv.org\/wp-content\/uploads\/2017\/05\/riscv-spec-v2.2.pdf. Andrew Waterman and Krste Asanovi\u0107. The RISC-V instruction set manual, volume I: User-level ISA, document version 2.2, 2017. https:\/\/content.riscv.org\/wp-content\/uploads\/2017\/05\/riscv-spec-v2.2.pdf."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_30"},{"key":"e_1_3_2_2_51_1","volume-title":"Practical return-oriented programming","author":"Zovi Dino Dai","year":"2010","unstructured":"Dino Dai Zovi . Practical return-oriented programming , 2010 . http:\/\/repository.root-me.org\/Exploitation%20-%20Syst%C3%A8me\/Microsoft\/EN%20-%20Practical%20Return%20Oriented%20Programming.pdf. EatDot . Dino Dai Zovi. Practical return-oriented programming, 2010. http:\/\/repository.root-me.org\/Exploitation%20-%20Syst%C3%A8me\/Microsoft\/EN%20-%20Practical%20Return%20Oriented%20Programming.pdf. EatDot."}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"ASIA CCS '20"},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":51,"alternative-id":["10.1145\/3320269.3384738","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384738","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}