{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,11]],"date-time":"2026-01-11T01:53:18Z","timestamp":1768096398221,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,16]],"date-time":"2020-06-16T00:00:00Z","timestamp":1592265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Office of Naval Research","award":["N00014-18-1-2020"],"award-info":[{"award-number":["N00014-18-1-2020"]}]},{"name":"U.S. Department of Energy Office of Advanced Scientific Computing Research (ASCR)","award":["DE-SC0014134"],"award-info":[{"award-number":["DE-SC0014134"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,16]]},"DOI":"10.1145\/3372799.3394360","type":"proceedings-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T15:04:12Z","timestamp":1590764652000},"page":"62-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Path Sensitive Signatures for Control Flow Error Detection"],"prefix":"10.1145","author":[{"given":"Ze","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Sunghyun","family":"Park","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Scott","family":"Mahlke","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,6,16]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.774911"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2013.2248373"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1999.809458"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.842263"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.4"},{"key":"e_1_3_2_2_7_1","volume-title":"Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on. IEEE, 12--21","author":"Bernick David","year":"2005","unstructured":"David Bernick , Bill Bruckert , Paul Del Vigna , David Garcia , Robert Jardine , Jim Klecka , and Jim Smullen . 2005 . NonStop\/spl reg\/advanced architecture . In Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on. IEEE, 12--21 . David Bernick, Bill Bruckert, Paul Del Vigna, David Garcia, Robert Jardine, Jim Klecka, and Jim Smullen. 2005. NonStop\/spl reg\/advanced architecture. In Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on. IEEE, 12--21."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.33"},{"key":"e_1_3_2_2_11_1","first-page":"3","article-title":"Microarchitecture and design challenges for gigascale integration","volume":"37","author":"Shekhar Borkar","year":"2004","unstructured":"Shekhar Borkar et almbox. 2004 . Microarchitecture and design challenges for gigascale integration . In MICRO , Vol. 37. 3 -- 3 . Shekhar Borkar et almbox. 2004. Microarchitecture and design challenges for gigascale integration. In MICRO, Vol. 37. 3--3.","journal-title":"MICRO"},{"key":"e_1_3_2_2_12_1","volume-title":"A foundation for the accurate prediction of the soft error vulnerability of scientific applications","author":"Bronevetsky Greg","unstructured":"Greg Bronevetsky , B de Supinski , and Martin Schulz . 2009. A foundation for the accurate prediction of the soft error vulnerability of scientific applications . Technical Report. Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States) . Greg Bronevetsky, B de Supinski, and Martin Schulz. 2009. A foundation for the accurate prediction of the soft error vulnerability of scientific applications. Technical Report. Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2903150.2903170"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2897996"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8020166"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062265"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203792"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736063"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155667"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/951947.951989"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.38"},{"key":"e_1_3_2_2_22_1","volume-title":"SPEC CPU2006 benchmark descriptions. ACM SIGARCH Computer Architecture News","volume":"34","author":"Henning John L","year":"2006","unstructured":"John L Henning . 2006 . SPEC CPU2006 benchmark descriptions. ACM SIGARCH Computer Architecture News , Vol. 34 , 4 (2006), 1--17. John L Henning. 2006. SPEC CPU2006 benchmark descriptions. ACM SIGARCH Computer Architecture News, Vol. 34, 4 (2006), 1--17."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-017-0492-3"},{"key":"e_1_3_2_2_24_1","volume-title":"ACM SIGPLAN Notices","volume":"48","author":"Khudia Daya Shanker","year":"2013","unstructured":"Daya Shanker Khudia and Scott Mahlke . 2013 . Low cost control flow protection using abstract control signatures . In ACM SIGPLAN Notices , Vol. 48 . ACM, 3--12. Daya Shanker Khudia and Scott Mahlke. 2013. Low cost control flow protection using abstract control signatures. In ACM SIGPLAN Notices, Vol. 48. ACM, 3--12."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.33"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Volodymyr Kuznetzov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2018. Code-pointer integrity. In The Continuing Arms Race: Code-Reuse Attacks and Defenses. 81--116.  Volodymyr Kuznetzov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2018. Code-pointer integrity. In The Continuing Arms Race: Code-Reuse Attacks and Defenses. 81--116.","DOI":"10.1145\/3129743.3129748"},{"key":"e_1_3_2_2_27_1","volume-title":"Computer Systems Laboratory and David Jun Lu","author":"Stanford University","year":"1980","unstructured":"Stanford University . Computer Systems Laboratory and David Jun Lu . 1980 . Watchdog processors and VLSI. Center for Reliable Computing, Computer Systems Laboratory, Stanford University . Stanford University. Computer Systems Laboratory and David Jun Lu. 1980. Watchdog processors and VLSI. Center for Reliable Computing, Computer Systems Laboratory, Stanford University."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.174"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/3014904.3014931"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195668"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930667"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1982.1676066"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.2145"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.18"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1991.146682"},{"key":"e_1_3_2_2_37_1","volume-title":"International Workshop on Languages and Compilers for Parallel Computing. Springer, 217--233","author":"Mitropoulou Konstantina","year":"2013","unstructured":"Konstantina Mitropoulou , Vasileios Porpodas , and Marcelo Cintra . 2013 . DRIFT: Decoupled compiler-based instruction-level fault-tolerance . In International Workshop on Languages and Compilers for Parallel Computing. Springer, 217--233 . Konstantina Mitropoulou, Vasileios Porpodas, and Marcelo Cintra. 2013. DRIFT: Decoupled compiler-based instruction-level fault-tolerance. In International Workshop on Languages and Compilers for Parallel Computing. Springer, 217--233."},{"key":"e_1_3_2_2_38_1","unstructured":"Shubu Mukherjee. 2011. Architecture design for soft errors. Morgan Kaufmann.  Shubu Mukherjee. 2011. Architecture design for soft errors. Morgan Kaufmann."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2002.1003566"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253181"},{"key":"e_1_3_2_2_41_1","first-page":"1","article-title":"A New Control Flow Checking Method to Improve Reliability of Embedded Systems","volume":"8","author":"Nikookar Hamed","year":"2017","unstructured":"Hamed Nikookar and Ahmad Patooghy . 2017 . A New Control Flow Checking Method to Improve Reliability of Embedded Systems . Journal of Advances in Computer Research , Vol. 8 , 2 (2017), 1 -- 11 . Hamed Nikookar and Ahmad Patooghy. 2017. A New Control Flow Checking Method to Improve Reliability of Embedded Systems. Journal of Advances in Computer Research, Vol. 8, 2 (2017), 1--11.","journal-title":"Journal of Advances in Computer Research"},{"key":"e_1_3_2_2_42_1","volume-title":"2002 a. Control-flow checking by software signatures","author":"Oh Nahmsuk","year":"2002","unstructured":"Nahmsuk Oh , Philip P Shirvani , and Edward J McCluskey . 2002 a. Control-flow checking by software signatures . IEEE transactions on Reliability , Vol. 51 , 1 ( 2002 ), 111--122. Nahmsuk Oh, Philip P Shirvani, and Edward J McCluskey. 2002 a. Control-flow checking by software signatures. IEEE transactions on Reliability, Vol. 51, 1 (2002), 111--122."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.994913"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368826.3377920"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176254.1176280"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/339647.339652"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.34"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113841.1113843"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1999.781037"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2013.2297573"},{"key":"e_1_3_2_2_51_1","volume-title":"Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering","author":"Sever'inov\u00e1 H","unstructured":"H Sever'inov\u00e1 , J Abaffy , and T Krajvc ovivc. 2015. Control-Flow Checking Using Binary Encoded Software Signatures . In Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering . Springer , 345--347. H Sever'inov\u00e1, J Abaffy, and T Krajvc ovivc. 2015. Control-Flow Checking Using Binary Encoded Software Signatures. In Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering. Springer, 345--347."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2593195"},{"key":"e_1_3_2_2_53_1","volume-title":"Mark D Hill, and David A Wood.","author":"Sorin Daniel J","year":"2002","unstructured":"Daniel J Sorin , Milo MK Martin , Mark D Hill, and David A Wood. 2002 . SafetyNet: improving the availability of shared memory multiprocessors with global checkpoint\/recovery. In ACM SIGARCH Computer Architecture News, Vol. 30 . IEEE Computer Society , 123--134. Daniel J Sorin, Milo MK Martin, Mark D Hill, and David A Wood. 2002. SafetyNet: improving the availability of shared memory multiprocessors with global checkpoint\/recovery. In ACM SIGARCH Computer Architecture News, Vol. 30. IEEE Computer Society, 123--134."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2754548"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.101"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/OLT.2003.1214380"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.7"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.1996.495891"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-011-0183-4"},{"key":"e_1_3_2_2_62_1","volume-title":"Control Flow Checking Optimization Based on Regular Patterns Analysis. In 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 203--212","author":"Zhu Zhiqi","year":"2018","unstructured":"Zhiqi Zhu , Joseph Callenes-Sloan , and Benjamin Carrion Schafer . 2018 . Control Flow Checking Optimization Based on Regular Patterns Analysis. In 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 203--212 . Zhiqi Zhu, Joseph Callenes-Sloan, and Benjamin Carrion Schafer. 2018. Control Flow Checking Optimization Based on Regular Patterns Analysis. In 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC). IEEE, 203--212."}],"event":{"name":"LCTES '20: 21st ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems","location":"London United Kingdom","acronym":"LCTES '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["The 21st ACM SIGPLAN\/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372799.3394360","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3372799.3394360","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372799.3394360","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372799.3394360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:08Z","timestamp":1750200068000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372799.3394360"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,16]]},"references-count":62,"alternative-id":["10.1145\/3372799.3394360","10.1145\/3372799"],"URL":"https:\/\/doi.org\/10.1145\/3372799.3394360","relation":{},"subject":[],"published":{"date-parts":[[2020,6,16]]},"assertion":[{"value":"2020-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}