{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:24:57Z","timestamp":1759134297519,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US NSF","award":["CNS-1834215, CNS-1801534"],"award-info":[{"award-number":["CNS-1834215, CNS-1801534"]}]},{"name":"ONR","award":["N00014-17-1-2995, N00014-17-1-2539"],"award-info":[{"award-number":["N00014-17-1-2995, N00014-17-1-2539"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359806","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"584-597","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Analyzing control flow integrity with LLVM-CFI"],"prefix":"10.1145","author":[{"given":"Paul","family":"Muntean","sequence":"first","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Matthias","family":"Neumayer","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"The Ohio State University"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Penn State University"}]},{"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[{"name":"Technical University of Munich"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume":"200","author":"Abadi M.","unstructured":"M. Abadi , M. Budiu , \u00da. Erlingsson, and J. Ligatti. 200 5. Control Flow Integrity. In Proceedings of the Conference on Computer and Communications Security (CCS). M. Abadi, M. Budiu, \u00da. Erlingsson, and J. Ligatti. 2005. Control Flow Integrity. In Proceedings of the Conference on Computer and Communications Security (CCS).","journal-title":"J. Ligatti."},{"key":"e_1_3_2_1_2_1","volume":"200","author":"Abadi M.","unstructured":"M. Abadi , M. Budiu , \u00da. Erlingsson, and J. Ligatti. 200 9. Control Flow Integrity Principles, Implementations, and Applications. In Transactions on Information and System Security (TISSEC). M. Abadi, M. Budiu, \u00da. Erlingsson, and J. Ligatti. 2009. Control Flow Integrity Principles, Implementations, and Applications. In Transactions on Information and System Security (TISSEC).","journal-title":"J. Ligatti."},{"volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security).","author":"Backes M.","key":"e_1_3_2_1_3_1","unstructured":"M. Backes and S. Nuerenberger . 2014. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing . In Proceedings of the USENIX Security Symposium (USENIX Security). M. Backes and S. Nuerenberger. 2014. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. In Proceedings of the USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_4_1","unstructured":"BlueLotus. 2015. BlueLotus Team bctf challenge: Bypass vtable read-only checks. https:\/\/github.com\/ctfs\/write-ups-2015\/tree\/master\/bctf-2015\/exploit\/zhongguancun.  BlueLotus. 2015. BlueLotus Team bctf challenge: Bypass vtable read-only checks. https:\/\/github.com\/ctfs\/write-ups-2015\/tree\/master\/bctf-2015\/exploit\/zhongguancun."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Bounov D.","key":"e_1_3_2_1_5_1","unstructured":"D. Bounov , R. G. Kici , and S. Lerner . 2016. Protecting C++ Dynamic Dispatch Through VTable Interleaving . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). D. Bounov, R. G. Kici, and S. Lerner. 2016. Protecting C++ Dynamic Dispatch Through VTable Interleaving. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"N. Burow S. A. Carr J. Nash P. Larsen M. Franz S. Brunthaler and M. Payer. 2017. Control-Flow Integrity: Precision Security and Performance. In CSUR.  N. Burow S. A. Carr J. Nash P. Larsen M. Franz S. Brunthaler and M. Payer. 2017. Control-Flow Integrity: Precision Security and Performance. In CSUR.","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security).","author":"Carlini N.","year":"2015","unstructured":"N. Carlini , A. Barresi , M. Payer , D. Wagner , and T.-R. Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity . In Proceedings of the USENIX Security Symposium (USENIX Security). N. Carlini, A. Barresi, M. Payer, D. Wagner, and T.-R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proceedings of the USENIX Security Symposium (USENIX Security)."},{"volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security).","author":"Carlini N.","key":"e_1_3_2_1_8_1","unstructured":"N. Carlini and D. Wagner . 2014. ROP is Still Dangerous: Breaking Modern Defenses . In Proceedings of the USENIX Security Symposium (USENIX Security). N. Carlini and D. Wagner. 2014. ROP is Still Dangerous: Breaking Modern Defenses. In Proceedings of the USENIX Security Symposium (USENIX Security)."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Cheng Y.","key":"e_1_3_2_1_9_1","unstructured":"Y. Cheng , Z. Zhou , M. Yu , X. Ding , and R. H. Deng . 2014. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng. 2014. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS).","author":"Crane S.","key":"e_1_3_2_1_11_1","unstructured":"S. Crane , S. Volckaert , F. Schuster , C. Liebchen , P. Larsen , L. Davi , A.-R. Sadeghi , T. Holz , B. De Sutter , and M. Franz . 2015. It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks . In Proceedings of the Conference on Computer and Communications Security (CCS). S. Crane, S. Volckaert, F. Schuster, C. Liebchen, P. Larsen, L. Davi, A.-R. Sadeghi, T. Holz, B. De Sutter, and M. Franz. 2015. It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks. In Proceedings of the Conference on Computer and Communications Security (CCS)."},{"volume-title":"Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Davi L.","key":"e_1_3_2_1_12_1","unstructured":"L. Davi , A.-R. Sadeghi , and M. Winandy . 2011. ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks . In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). L. Davi, A.-R. Sadeghi, and M. Winandy. 2011. ROPdefender: A Detection Tool to Defend Against Return-Oriented Programming Attacks. In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS)."},{"volume-title":"Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Elsabagh M.","key":"e_1_3_2_1_13_1","unstructured":"M. Elsabagh , D. Fleck , and A. Stavrou . 2017. Strict Virtual Call Integrity Checking for C ++ Binaries . In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). M. Elsabagh, D. Fleck, and A. Stavrou. 2017. Strict Virtual Call Integrity Checking for C ++ Binaries. In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS)."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS).","author":"Evans I.","key":"e_1_3_2_1_14_1","unstructured":"I. Evans , F. Long , U. Otgonbaatar , H. Shrobe , M. Rinard , H. Okhravi , and S. Sidiroglou-Douskosr . 2015. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity . In Proceedings of the Conference on Computer and Communications Security (CCS). I. Evans, F. Long, U. Otgonbaatar, H. Shrobe, M. Rinard, H. Okhravi, and S. Sidiroglou-Douskosr. 2015. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. In Proceedings of the Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_15_1","unstructured":"Apache Foundation. 2019. Apache Traffic Server. http:\/\/trafficserver.apache.org\/.  Apache Foundation. 2019. Apache Traffic Server. http:\/\/trafficserver.apache.org\/."},{"volume-title":"Proceedings of the European Symposium on Security and Privacy (Euro S&P).","author":"Ge X.","key":"e_1_3_2_1_16_1","unstructured":"X. Ge , N. Talele , M. Payer , and T. Jaeger . 2016. Fine-Grained Control-Flow Integrity for Kernel Software . In Proceedings of the European Symposium on Security and Privacy (Euro S&P). X. Ge, N. Talele, M. Payer, and T. Jaeger. 2016. Fine-Grained Control-Flow Integrity for Kernel Software. In Proceedings of the European Symposium on Security and Privacy (Euro S&P)."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2019. Google Chromium. https:\/\/www.chromium.org\/.  Google. 2019. Google Chromium. https:\/\/www.chromium.org\/."},{"volume-title":"Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. ACM","author":"Gu Y.","key":"e_1_3_2_1_18_1","unstructured":"Y. Gu , Q. Zhao , Y. Zhang , and Z. Lin . 2017. PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace . In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. ACM , Scottsdale, Arizona, USA. Y. Gu, Q. Zhao, Y. Zhang, and Z. Lin. 2017. PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy. ACM, Scottsdale, Arizona, USA."},{"volume-title":"Proceedings of the Symposium on Security and Privacy (S&P).","author":"G\u00f6ktas E.","key":"e_1_3_2_1_19_1","unstructured":"E. G\u00f6ktas , E. Athanasopoulos , and H. Bos . 2014. Out Of Control: Overcoming Control-Flow Integrity . In Proceedings of the Symposium on Security and Privacy (S&P). E. G\u00f6ktas, E. Athanasopoulos, and H. Bos. 2014. Out Of Control: Overcoming Control-Flow Integrity. In Proceedings of the Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818025"},{"key":"e_1_3_2_1_21_1","unstructured":"Httpd. 2019. Httpd. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/httpd.html.  Httpd. 2019. Httpd. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/httpd.html."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS).","author":"Ispoglou K. K.","key":"e_1_3_2_1_22_1","unstructured":"K. K. Ispoglou , B. AlBassam , T. Jaeger , and M. Payer . 2018. Block Oriented Programming: Automating Data-Only Attacks . In Proceedings of the Conference on Computer and Communications Security (CCS). K. K. Ispoglou, B. AlBassam, T. Jaeger, and M. Payer. 2018. Block Oriented Programming: Automating Data-Only Attacks. In Proceedings of the Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_23_1","first-page":"x86","volume":"200","author":"S.","unstructured":"S. Krahmer. 200 5. x86 - x64 buffer overflow exploits and the borrowed code chunks exploitation technique. https:\/\/users.suse.com\/~krahmer\/no-nx.pdf. S. Krahmer. 2005. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. https:\/\/users.suse.com\/~krahmer\/no-nx.pdf.","journal-title":"Krahmer."},{"volume-title":"Code-Pointer Integrity. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Kuznetsov V.","key":"e_1_3_2_1_24_1","unstructured":"V. Kuznetsov , L. Szekeres , M. Payer , G. Candea , R. Sekar , and D. Song . 2014 . Code-Pointer Integrity. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song. 2014. Code-Pointer Integrity. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"volume-title":"Proceedings of IEEE Trustcom\/BigDataSE\/ISPA.","author":"Lan B.","key":"e_1_3_2_1_25_1","unstructured":"B. Lan , Y. Li , H. Sun , C. Su , Y. Liu , and Q. Zeng . 2015. Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses . In Proceedings of IEEE Trustcom\/BigDataSE\/ISPA. B. Lan, Y. Li, H. Sun, C. Su, Y. Liu, and Q. Zeng. 2015. Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses. In Proceedings of IEEE Trustcom\/BigDataSE\/ISPA."},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC).","author":"Lettner J.","key":"e_1_3_2_1_26_1","unstructured":"J. Lettner , B. Kollenda , A. Homescu , P. Larsen , F. Schuster , L. Davi , A.-R. Sadeghi , T. Holz , and M. Franz . 2016. Subversive-C: Abusing and Protecting Dynamic Message Dispatch . In Proceedings of the USENIX Annual Technical Conference (USENIX ATC). J. Lettner, B. Kollenda, A. Homescu, P. Larsen, F. Schuster, L. Davi, A.-R. Sadeghi, T. Holz, and M. Franz. 2016. Subversive-C: Abusing and Protecting Dynamic Message Dispatch. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC)."},{"key":"e_1_3_2_1_27_1","unstructured":"Lighthttpd. 2019. Lighthttpd. https:\/\/www.lighttpd.net\/.  Lighthttpd. 2019. Lighthttpd. https:\/\/www.lighttpd.net\/."},{"key":"e_1_3_2_1_28_1","unstructured":"LLVM. 2017. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/.  LLVM. 2017. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/."},{"key":"e_1_3_2_1_29_1","unstructured":"LLVM. 2018. Clang\/LLVM compiler framework. https:\/\/clang.llvm.org\/.  LLVM. 2018. Clang\/LLVM compiler framework. https:\/\/clang.llvm.org\/."},{"key":"e_1_3_2_1_30_1","unstructured":"Memcached. 2019. Memcached. https:\/\/memcached.org\/.  Memcached. 2019. Memcached. https:\/\/memcached.org\/."},{"volume-title":"Proceedings of the Symposium on Research in Attacks, Intrusions, and Defenses (RAID).","author":"Muntean P.","key":"e_1_3_2_1_31_1","unstructured":"P. Muntean , M. Fischer , G. Tan , Z. Lin , J. Grossklags , and C. Eckert . 2018. CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries . In Proceedings of the Symposium on Research in Attacks, Intrusions, and Defenses (RAID). P. Muntean, M. Fischer, G. Tan, Z. Lin, J. Grossklags, and C. Eckert. 2018. CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. In Proceedings of the Symposium on Research in Attacks, Intrusions, and Defenses (RAID)."},{"volume-title":"Proceedings of the European Symposium on Research in Computer Security (ESORICS).","author":"Muntean P.","key":"e_1_3_2_1_32_1","unstructured":"P. Muntean , S. Wuerl , J. Grossklags , and C. Eckert . 2018. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM . In Proceedings of the European Symposium on Research in Computer Security (ESORICS). P. Muntean, S. Wuerl, J. Grossklags, and C. Eckert. 2018. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. In Proceedings of the European Symposium on Research in Computer Security (ESORICS)."},{"key":"e_1_3_2_1_33_1","unstructured":"Nginx. 2019. Nginx. https:\/\/nginx.org\/en\/.  Nginx. 2019. Nginx. https:\/\/nginx.org\/en\/."},{"volume-title":"Proceedings of the Conference on Programming Language Design and Implementation (PLDI).","author":"Niu B.","key":"e_1_3_2_1_34_1","unstructured":"B. Niu and G. Tan . 2014. Modular Control-Flow Integrity . In Proceedings of the Conference on Programming Language Design and Implementation (PLDI). B. Niu and G. Tan. 2014. Modular Control-Flow Integrity. In Proceedings of the Conference on Programming Language Design and Implementation (PLDI)."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS).","author":"Niu B.","key":"e_1_3_2_1_35_1","unstructured":"B. Niu and G. Tan . 2015. Per-Input Control-Flow Integrity . In Proceedings of the Conference on Computer and Communications Security (CCS). B. Niu and G. Tan. 2015. Per-Input Control-Flow Integrity. In Proceedings of the Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_36_1","unstructured":"NodeJS. 2019. NodeJS. https:\/\/nodejs.org\/en\/.  NodeJS. 2019. NodeJS. https:\/\/nodejs.org\/en\/."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Pawlowski A.","key":"e_1_3_2_1_37_1","unstructured":"A. Pawlowski , M. Contag , V. van der Veen, C. Ouwehand, T. Holz, H. Bos, E. Athanasopoulos, and C. Giuffrida. 2017. MARX: Uncovering Class Hierarchies in C++ Programs . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). A. Pawlowski, M. Contag, V. van der Veen, C. Ouwehand, T. Holz, H. Bos, E. Athanasopoulos, and C. Giuffrida. 2017. MARX: Uncovering Class Hierarchies in C++ Programs. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Prakash A.","key":"e_1_3_2_1_38_1","unstructured":"A. Prakash , X. Hu , and H. Yin . 2015. vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). A. Prakash, X. Hu, and H. Yin. 2015. vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_39_1","unstructured":"A. Pslyak. 1997. Return-into-libc overflow exploit. https:\/\/seclists.org\/bugtraq\/1997\/Aug\/63.  A. Pslyak. 1997. Return-into-libc overflow exploit. https:\/\/seclists.org\/bugtraq\/1997\/Aug\/63."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"G. Ramalingam. 1994. The Undecidability of Aliasing. In Transactions on Programming Languages and Systems (TOPLAS).  G. Ramalingam. 1994. The Undecidability of Aliasing. In Transactions on Programming Languages and Systems (TOPLAS).","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_41_1","unstructured":"Redis. 2019. Redis. https:\/\/redis.io\/.  Redis. 2019. Redis. https:\/\/redis.io\/."},{"volume-title":"Proceedings of the Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA).","author":"Rossie J.","key":"e_1_3_2_1_42_1","unstructured":"J. Rossie Jr . and D. Friedman . 1995. An Algebraic Semantics of Subobjects . In Proceedings of the Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). J. Rossie Jr. and D. Friedman. 1995. An Algebraic Semantics of Subobjects. In Proceedings of the Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)."},{"key":"e_1_3_2_1_43_1","unstructured":"J. Salwan. 201"},{"key":"e_1_3_2_1_44_1","unstructured":"S. Schirra. 2017. Ropper. https:\/\/github.com\/sashs\/Ropper.  S. Schirra. 2017. Ropper. https:\/\/github.com\/sashs\/Ropper."},{"key":"e_1_3_2_1_45_1","unstructured":"S. Schirra. 2018. Valgrind Home. http:\/\/valgrind.org\/.  S. Schirra. 2018. Valgrind Home. http:\/\/valgrind.org\/."},{"volume-title":"Proceedings of the Symposium on Security and Privacy (S&P).","author":"Schuster F.","key":"e_1_3_2_1_46_1","unstructured":"F. Schuster , T. Tendyck , C. Liebchen , L. Davi , A.-R. Sadeghi , and T. Holz . 2015. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications . In Proceedings of the Symposium on Security and Privacy (S&P). F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz. 2015. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. In Proceedings of the Symposium on Security and Privacy (S&P)."},{"volume-title":"Proceedings of the Symposium on Research in Attacks, Intrusions, and Defenses (RAID).","author":"Schuster F.","key":"e_1_3_2_1_47_1","unstructured":"F. Schuster , T. Tendyck , J. Pewny , A. Maa\u00df , M. Steegmanns , M. Contag , and T. Holz . 2014. Evaluating the Effectiveness of Current Anti-ROP Defenses . In Proceedings of the Symposium on Research in Attacks, Intrusions, and Defenses (RAID). F. Schuster, T. Tendyck, J. Pewny, A. Maa\u00df, M. Steegmanns, M. Contag, and T. Holz. 2014. Evaluating the Effectiveness of Current Anti-ROP Defenses. In Proceedings of the Symposium on Research in Attacks, Intrusions, and Defenses (RAID)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security).","author":"Tice C.","key":"e_1_3_2_1_49_1","unstructured":"C. Tice , T. Roeder , P. Collingbourne , S. Checkoway , \u00da. Erlingsson, L. Lozano , and G. Pike . 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM . In Proceedings of the USENIX Security Symposium (USENIX Security). C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, \u00da. Erlingsson, L. Lozano, and G. Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM. In Proceedings of the USENIX Security Symposium (USENIX Security)."},{"volume-title":"Proceedings of the Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA).","author":"Tip F.","key":"e_1_3_2_1_50_1","unstructured":"F. Tip , J.-D. Choi , J. Field , and G. Ramalingam . 1996. Slicing Class Hierarchies in C++ . In Proceedings of the Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA). F. Tip, J.-D. Choi, J. Field, and G. Ramalingam. 1996. Slicing Class Hierarchies in C++. In Proceedings of the Annual Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA)."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS).","author":"van der Veen V.","key":"e_1_3_2_1_51_1","unstructured":"V. van der Veen , D. Andriesse , M. Stamatogiannakis , X. Chen , H. Bos , and C. Giuffrida . 2017. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later . In Proceedings of the Conference on Computer and Communications Security (CCS). V. van der Veen, D. Andriesse, M. Stamatogiannakis, X. Chen, H. Bos, and C. Giuffrida. 2017. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. In Proceedings of the Conference on Computer and Communications Security (CCS)."},{"volume-title":"Proceedings of the Symposium on Security and Privacy (S&P).","author":"van der Veen V.","key":"e_1_3_2_1_52_1","unstructured":"V. van der Veen , E. G\u00f6ktas , M. Contag , A. Pawoloski , X. Chen , S. Rawat , H. Bos , T. Holz , E. Athanasopoulos , and C. Giuffrida . 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level . In Proceedings of the Symposium on Security and Privacy (S&P). V. van der Veen, E. G\u00f6ktas, M. Contag, A. Pawoloski, X. Chen, S. Rawat, H. Bos, T. Holz, E. Athanasopoulos, and C. Giuffrida. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. In Proceedings of the Symposium on Security and Privacy (S&P)."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS).","author":"Wang Y.","key":"e_1_3_2_1_53_1","unstructured":"Y. Wang , C. Zhang , X. Xiang , Z. Zhao , W. Li , X. Gong , B. Liu , K. Chen , and W. Zou . 2018. Revery: From Proof-of-Concept to Exploitable . In Proceedings of the Conference on Computer and Communications Security (CCS). Y. Wang, C. Zhang, X. Xiang, Z. Zhao, W. Li, X. Gong, B. Liu, K. Chen, and W. Zou. 2018. Revery: From Proof-of-Concept to Exploitable. In Proceedings of the Conference on Computer and Communications Security (CCS)."},{"volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).","author":"Williams-King D.","key":"e_1_3_2_1_54_1","unstructured":"D. Williams-King , G. Gobieski , K. Williams-King , J. P. Blake , X. Yuan , P. Colp , M. Zheng , V. P. Kemerlis , J. Yang , and W. Aiello . 2016. Shuffler: Fast and Deployable Continous Code Re-Randomization . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). D. Williams-King, G. Gobieski, K. Williams-King, J. P. Blake, X. Yuan, P. Colp, M. Zheng, V. P. Kemerlis, J. Yang, and W. Aiello. 2016. Shuffler: Fast and Deployable Continous Code Re-Randomization. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)."},{"volume-title":"Proceedings of the European Symposium on Research in Computer Security (ESORICS).","author":"Wollgast P.","key":"e_1_3_2_1_55_1","unstructured":"P. Wollgast , R. Gawlik , B. Garmany , B. Kollenda , and T. Holz . 2016. Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets . In Proceedings of the European Symposium on Research in Computer Security (ESORICS). P. Wollgast, R. Gawlik, B. Garmany, B. Kollenda, and T. Holz. 2016. Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets. In Proceedings of the European Symposium on Research in Computer Security (ESORICS)."},{"key":"e_1_3_2_1_56_1","volume-title":"CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Xu X.","year":"1805","unstructured":"X. Xu , M. Ghaffarinia , W. Wang , K. Hamlen , and Z. Lin . 2019 . CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. In 28th USENIX Security Symposium (USENIX Security 19) . Santa Clara, CA , 1805 --1821. X. Xu, M. Ghaffarinia, W. Wang, K. Hamlen, and Z. Lin. 2019. CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. In 28th USENIX Security Symposium (USENIX Security 19). Santa Clara, CA, 1805--1821."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Zhang C.","key":"e_1_3_2_1_57_1","unstructured":"C. Zhang , S. A. Carr , T. Li , Y. Ding , C. Song , M. Payer , and D. Song . 2016. vTrust: Regaining Trust on Virtual Calls . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). C. Zhang, S. A. Carr, T. Li, Y. Ding, C. Song, M. Payer, and D. Song. 2016. vTrust: Regaining Trust on Virtual Calls. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Zhang C.","key":"e_1_3_2_1_58_1","unstructured":"C. Zhang , C. Song , K. Z. Chen , Z. Chen , and D. Song . 2015. vTint: Protecting Virtual Function Tables\u00cdntegrity . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). C. Zhang, C. Song, K. Z. Chen, Z. Chen, and D. Song. 2015. vTint: Protecting Virtual Function Tables\u00cdntegrity. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"volume-title":"Proceedings of the USENIX Security Symposium (USENIX Security).","author":"Zhang M.","key":"e_1_3_2_1_59_1","unstructured":"M. Zhang and R. Sekar . 2013. Control Flow Integrity for COTS Binaries . In Proceedings of the USENIX Security Symposium (USENIX Security). M. Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the USENIX Security Symposium (USENIX Security)."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359806","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:07Z","timestamp":1750202587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":59,"alternative-id":["10.1145\/3359789.3359806","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359806","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}