{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:47Z","timestamp":1772039507594,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","award":["309994"],"award-info":[{"award-number":["309994"]}],"id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3342559.3365336","type":"proceedings-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T21:18:24Z","timestamp":1573852704000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Protecting the stack with PACed canaries"],"prefix":"10.1145","author":[{"given":"Hans","family":"Liljestrand","sequence":"first","affiliation":[{"name":"Aalto University, Finland and Huawei Technologies Oy, Finland"}]},{"given":"Zaheer","family":"Gauhar","sequence":"additional","affiliation":[{"name":"Aalto University, Finland"}]},{"given":"Thomas","family":"Nyman","sequence":"additional","affiliation":[{"name":"Aalto University, Finland"}]},{"given":"Jan-Erik","family":"Ekberg","sequence":"additional","affiliation":[{"name":"Huawei Technologies Oy, Finland and Aalto University, Finland"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM Ltd. 2017. ARMv8 Architecture Reference Manual for ARMv8-A architecture profile (ARM DDI 0487C.a). https:\/\/static.docs.arm.com\/ddi0487\/ca\/DDI0487C_a_armv8_arm.pdf.  ARM Ltd. 2017. ARMv8 Architecture Reference Manual for ARMv8-A architecture profile (ARM DDI 0487C.a). https:\/\/static.docs.arm.com\/ddi0487\/ca\/DDI0487C_a_armv8_arm.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. USENIX Security'98","author":"Crispin","unstructured":"Crispin Cowan et al. 1998. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proc. USENIX Security'98 . 63--78. Crispin Cowan et al. 1998. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. USENIX Security'98. 63--78."},{"key":"e_1_3_2_1_3_1","volume-title":"Linux Expo","author":"Crispin","year":"1999","unstructured":"Crispin Cowan et al. 1999. Protecting systems from stack smashing attacks with StackGuard . Linux Expo ( 1999 ). Crispin Cowan et al. 1999. Protecting systems from stack smashing attacks with StackGuard. Linux Expo (1999)."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. ACM CISR '16","author":"William","unstructured":"William H Hawkins et al. 2016. Dynamic canary randomization for improved software security . In Proc. ACM CISR '16 . 9:1--9:7. William H Hawkins et al. 2016. Dynamic canary randomization for improved software security. In Proc. ACM CISR '16. 9:1--9:7."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. IEEE S&P '16","author":"Hong","unstructured":"Hong Hu et al. 2016. Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks . In Proc. IEEE S&P '16 . 969--986. Hong Hu et al. 2016. Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In Proc. IEEE S&P '16. 969--986."},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. ACM\/EDAC\/IEEE DAC'19","author":"Hans","unstructured":"Hans Liljestrand et al. 2019. Authenticated Call Stack . In Proc. ACM\/EDAC\/IEEE DAC'19 . Article 223. Hans Liljestrand et al. 2019. Authenticated Call Stack. In Proc. ACM\/EDAC\/IEEE DAC'19. Article 223."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. USENIX Security '19","author":"Hans","unstructured":"Hans Liljestrand et al. 2019. PAC it up: towards pointer integrity using ARM pointer authentication . In Proc. USENIX Security '19 . 177--194. Hans Liljestrand et al. 2019. PAC it up: towards pointer integrity using ARM pointer authentication. In Proc. USENIX Security '19. 177--194."},{"key":"e_1_3_2_1_9_1","volume-title":"Black Hat Asia '03","author":"Litchfield David","year":"2003","unstructured":"David Litchfield . 2003 . Defeating the stack based buffer overflow preventation mechanism of Microsoft Windows 2003 Server . In Black Hat Asia '03 . David Litchfield. 2003. Defeating the stack based buffer overflow preventation mechanism of Microsoft Windows 2003 Server. In Black Hat Asia '03."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2013.12"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. DIMVA 13'. 177--196","author":"Nick","unstructured":"Nick Nikiforakis et al. 2013. HeapSentry: kernel-assisted protection against heap overflows . In Proc. DIMVA 13'. 177--196 . Nick Nikiforakis et al. 2013. HeapSentry: kernel-assisted protection against heap overflows. In Proc. DIMVA 13'. 177--196."},{"key":"e_1_3_2_1_12_1","first-page":"19","volume":"7","author":"Aleph Elias Levy","year":"1996","unstructured":"Elias Levy ( Aleph One). 1996. Smashing the stack for fun and profit. Phrack 7 , 19 ( 1996 ). http:\/\/phrack.org\/issues\/49\/14.html Elias Levy (Aleph One). 1996. Smashing the stack for fun and profit. Phrack 7, 19 (1996). http:\/\/phrack.org\/issues\/49\/14.html","journal-title":"Phrack"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. ACM ACSAC '15","author":"Theofilos","unstructured":"Theofilos Petsios et al. 2015. Dynaguard: Armoring canary-based protections against brute-force attacks . In Proc. ACM ACSAC '15 . 351--360. Theofilos Petsios et al. 2015. Dynaguard: Armoring canary-based protections against brute-force attacks. In Proc. ACM ACSAC '15. 351--360."},{"key":"e_1_3_2_1_14_1","unstructured":"Qualcomm. 2017. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf.  Qualcomm. 2017. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. USENIX LISA '03","author":"William","unstructured":"William K Robertson et al. 2003. Run-time detection of heap-based overflows . In Proc. USENIX LISA '03 . 51--60. William K Robertson et al. 2003. Run-time detection of heap-based overflows. In Proc. USENIX LISA '03. 51--60."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_17_1","unstructured":"Solar Designer. 1997. lpr LIBC RETURN exploit. http:\/\/insecure.org\/sploits\/linux.libc.return.lpr.sploit.html  Solar Designer. 1997. lpr LIBC RETURN exploit. http:\/\/insecure.org\/sploits\/linux.libc.return.lpr.sploit.html"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. ACM EuroSec '09","author":"Raoul","unstructured":"Raoul Strackx et al. 2009. Breaking the memory secrecy assumption . In Proc. ACM EuroSec '09 . 1--8. Raoul Strackx et al. 2009. Breaking the memory secrecy assumption. In Proc. ACM EuroSec '09. 1--8."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. IEEE S&P '13","author":"L\u00e1szl\u00f3","unstructured":"L\u00e1szl\u00f3 Szekeres et al. 2013. SoK: Eternal war in memory . In Proc. IEEE S&P '13 . 48--62. L\u00e1szl\u00f3 Szekeres et al. 2013. SoK: Eternal war in memory. In Proc. IEEE S&P '13. 48--62."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. IEEE\/IFIP DSN '18","author":"Zhilong","unstructured":"Zhilong Wang et al. 2018. To detect stack buffer overflow with polymorphic canaries . In Proc. IEEE\/IFIP DSN '18 . IEEE, 243--254. Zhilong Wang et al. 2018. To detect stack buffer overflow with polymorphic canaries. In Proc. IEEE\/IFIP DSN '18. IEEE, 243--254."}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","location":"Huntsville Ontario Canada","acronym":"SOSP '19"},"container-title":["Proceedings of the 4th Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342559.3365336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:01Z","timestamp":1750202581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":19,"alternative-id":["10.1145\/3342559.3365336","10.1145\/3342559"],"URL":"https:\/\/doi.org\/10.1145\/3342559.3365336","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}