{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652659,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427246","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"466-479","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["\u03c1FEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings"],"prefix":"10.1145","author":[{"given":"Paul","family":"Muntean","sequence":"first","affiliation":[{"name":"TU Munich"}]},{"given":"Mathias","family":"Neumayer","sequence":"additional","affiliation":[{"name":"TU Munich"}]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"Ohio State University, United States of America"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Penn State Univ., United States of America"}]},{"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[{"name":"TU Munich"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume":"200","author":"Abadi M.","unstructured":"M. Abadi , M. Budiu , \u00da. Erlingsson, and J. Ligatti. 200 5. Control Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). M. Abadi, M. Budiu, \u00da. Erlingsson, and J. Ligatti. 2005. Control Flow Integrity. In ACM Conference on Computer and Communications Security (CCS).","journal-title":"J. Ligatti."},{"volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Almakhdhub S.","key":"e_1_3_2_1_2_1","unstructured":"N.\u00a0 S. Almakhdhub , A.\u00a0 A. Clements , S. Bagchi , and M. Payer . 2020. \u03bcRAI: Securing Embedded Systems with Return Address Integrity . In Network and Distributed System Security Symposium (NDSS). N.\u00a0S. Almakhdhub, A.\u00a0A. Clements, S. Bagchi, and M. Payer. 2020. \u03bcRAI: Securing Embedded Systems with Return Address Integrity. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_3_1","unstructured":"Apache Software Foundation. 2017. Apache Httpd. https:\/\/httpd.apache.org\/.  Apache Software Foundation. 2017. Apache Httpd. https:\/\/httpd.apache.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Software Foundation. 2017. Apache Traffic Server. http:\/\/trafficserver.apache.org\/.  Apache Software Foundation. 2017. Apache Traffic Server. http:\/\/trafficserver.apache.org\/."},{"volume-title":"HAFIX: Hardware-Assisted Flow Integrity Extension. In Annual Design Automation Conference (DAC).","author":"Arias O.","key":"e_1_3_2_1_5_1","unstructured":"O. Arias , L. Davi , M. Hanreich , Y. Jin , P. Koeberl , D. Paul , A.-R. Sadeghi , and D. Sullivan . 2015 . HAFIX: Hardware-Assisted Flow Integrity Extension. In Annual Design Automation Conference (DAC). O. Arias, L. Davi, M. Hanreich, Y. Jin, P. Koeberl, D. Paul, A.-R. Sadeghi, and D. Sullivan. 2015. HAFIX: Hardware-Assisted Flow Integrity Extension. In Annual Design Automation Conference (DAC)."},{"key":"e_1_3_2_1_6_1","unstructured":"ARM. 2015. C++ ABI for the ARM Architecture. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ihi0041e\/IHI0041E cppabi.pdf.  ARM. 2015. C++ ABI for the ARM Architecture. http:\/\/infocenter.arm.com\/help\/topic\/com.arm.doc.ihi0041e\/IHI0041E cppabi.pdf."},{"volume-title":"Mitigating Code-reuse Attacks with Control-flow Locking. In Annual Computer Security Applications Conference (ACSAC).","author":"Bletsch T.","key":"e_1_3_2_1_7_1","unstructured":"T. Bletsch , X. Jiang , and V. Freeh . 2011 . Mitigating Code-reuse Attacks with Control-flow Locking. In Annual Computer Security Applications Conference (ACSAC). T. Bletsch, X. Jiang, and V. Freeh. 2011. Mitigating Code-reuse Attacks with Control-flow Locking. In Annual Computer Security Applications Conference (ACSAC)."},{"volume-title":"Jump-Oriented Programming: A New Class of Code-Reuse Attack. In ACM Asia Conference on Computer & Communications Security (AsiaCCS).","author":"Bletsch T.","key":"e_1_3_2_1_8_1","unstructured":"T. Bletsch , X. Jiang , V.\u00a0 W. Freeh , and Z. Liang . 2011 . Jump-Oriented Programming: A New Class of Code-Reuse Attack. In ACM Asia Conference on Computer & Communications Security (AsiaCCS). T. Bletsch, X. Jiang, V.\u00a0W. Freeh, and Z. Liang. 2011. Jump-Oriented Programming: A New Class of Code-Reuse Attack. In ACM Asia Conference on Computer & Communications Security (AsiaCCS)."},{"volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Bounov D.","key":"e_1_3_2_1_9_1","unstructured":"D. Bounov , R.\u00a0 G. Kici , and S. Lerner . 2016. Protecting C++ Dynamic Dispatch Through VTable Interleaving . In Network and Distributed System Security Symposium (NDSS). D. Bounov, R.\u00a0G. Kici, and S. Lerner. 2016. Protecting C++ Dynamic Dispatch Through VTable Interleaving. In Network and Distributed System Security Symposium (NDSS)."},{"volume-title":"ACM Conference on Computer and Communications Security (CCS).","author":"Buchanan E.","key":"e_1_3_2_1_10_1","unstructured":"E. Buchanan , R. Roemer , H. Shacham , and S. Savage . 2008. When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC . In ACM Conference on Computer and Communications Security (CCS). E. Buchanan, R. Roemer, H. Shacham, and S. Savage. 2008. When Good Instructions Go Bad: Generalizing Return-oriented Programming to RISC. In ACM Conference on Computer and Communications Security (CCS)."},{"volume-title":"SoK: Shining Light on Shadow Stacks. In IEEE Symposium on Security and Privacy (S&P).","author":"Burow N.","key":"e_1_3_2_1_11_1","unstructured":"N. Burow , X. Zhang , and M. Payer . 2019 . SoK: Shining Light on Shadow Stacks. In IEEE Symposium on Security and Privacy (S&P). N. Burow, X. Zhang, and M. Payer. 2019. SoK: Shining Light on Shadow Stacks. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_12_1","volume-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium (USENIX Security).","author":"Carlini N.","year":"2015","unstructured":"N. Carlini , A. Barresi , M. Payer , D. Wagner , and T.\u00a0 R. Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium (USENIX Security). N. Carlini, A. Barresi, M. Payer, D. Wagner, and T.\u00a0R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium (USENIX Security)."},{"volume-title":"International Conference on Distributed Computing Systems (ICDCS).","author":"Chiueh T.","key":"e_1_3_2_1_13_1","unstructured":"T. Chiueh and F.H. Hsu . 2001. RAD: A Compile-Time Solution to Buffer Overflow Attacks . In International Conference on Distributed Computing Systems (ICDCS). T. Chiueh and F.H. Hsu. 2001. RAD: A Compile-Time Solution to Buffer Overflow Attacks. In International Conference on Distributed Computing Systems (ICDCS)."},{"key":"e_1_3_2_1_14_1","unstructured":"Clang\/LLVM. [n. d.]. Clang\/LLVM compiler framework. https:\/\/clang.llvm.org\/.  Clang\/LLVM. [n. d.]. Clang\/LLVM compiler framework. https:\/\/clang.llvm.org\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Clang\/LLVM. [n. d.]. Clang\u2019s SafeStack. https:\/\/clang.llvm.org\/docs\/SafeStack.html.  Clang\/LLVM. [n. d.]. Clang\u2019s SafeStack. https:\/\/clang.llvm.org\/docs\/SafeStack.html."},{"key":"e_1_3_2_1_16_1","unstructured":"Industry Coalition. [n. d.]. Itanium C++ ABI. https:\/\/mentorembedded.github.io\/cxx-abi\/abi.html.  Industry Coalition. [n. d.]. Itanium C++ ABI. https:\/\/mentorembedded.github.io\/cxx-abi\/abi.html."},{"volume-title":"The Performance Cost of Shadow Stacks and Stack Canaries. In ACM Asia Conference on Computer & Communications Security (AsiaCCS).","author":"Dang Y.","key":"e_1_3_2_1_17_1","unstructured":"T.\u00a0H.\u00a0 Y. Dang , P. Maniatis , and D. Wagner . 2015 . The Performance Cost of Shadow Stacks and Stack Canaries. In ACM Asia Conference on Computer & Communications Security (AsiaCCS). T.\u00a0H.\u00a0Y. Dang, P. Maniatis, and D. Wagner. 2015. The Performance Cost of Shadow Stacks and Stack Canaries. In ACM Asia Conference on Computer & Communications Security (AsiaCCS)."},{"volume-title":"Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium (USENIX Security).","author":"Ding R.","key":"e_1_3_2_1_18_1","unstructured":"R. Ding , C. Qian , C. Song , W. Harris , T. Kim , and W. Lee . 2017 . Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium (USENIX Security). R. Ding, C. Qian, C. Song, W. Harris, T. Kim, and W. Lee. 2017. Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_19_1","unstructured":"GCC. 2019. GCC\u2019s Shadow Stack Proposal. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Common-Function-Attributes.html#index-stack_005fprotect-function-attribute.  GCC. 2019. GCC\u2019s Shadow Stack Proposal. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Common-Function-Attributes.html#index-stack_005fprotect-function-attribute."},{"volume-title":"Fine-Grained Control-Flow Integrity for Kernel Software. In European Symposium on Security and Privacy (EuroS&P).","author":"Ge X.","key":"e_1_3_2_1_20_1","unstructured":"X. Ge , N. Talele , M. Payer , and T. Jaeger . 2016 . Fine-Grained Control-Flow Integrity for Kernel Software. In European Symposium on Security and Privacy (EuroS&P). X. Ge, N. Talele, M. Payer, and T. Jaeger. 2016. Fine-Grained Control-Flow Integrity for Kernel Software. In European Symposium on Security and Privacy (EuroS&P)."},{"volume-title":"Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. In European Symposium on Security and Privacy (EuroS&P).","author":"Goktas E.","key":"e_1_3_2_1_21_1","unstructured":"E. Goktas , B. Kollenda , P. Koppe , G. Bosman , Portokalidis, T. Holz , H. Bos , and C. Giuffrida . 2018 . Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. In European Symposium on Security and Privacy (EuroS&P). E. Goktas, B. Kollenda, P. Koppe, G. Bosman, Portokalidis, T. Holz, H. Bos, and C. Giuffrida. 2018. Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. In European Symposium on Security and Privacy (EuroS&P)."},{"key":"e_1_3_2_1_22_1","volume":"201","author":"Goktas K.","unstructured":"E.\u00a0 K. Goktas , A. Oikonomopoulos , R. Gawlik , B. Kollenda , I. Athanasopoulos , C. Giuffrida , G. Portokalidis , and H.\u00a0 J. Bos. 201 6. Bypassing Clang\u2019s SafeStack for Fun and Profit. In Black Hat Europe. E.\u00a0K. Goktas, A. Oikonomopoulos, R. Gawlik, B. Kollenda, I. Athanasopoulos, C. Giuffrida, G. Portokalidis, and H.\u00a0J. Bos. 2016. Bypassing Clang\u2019s SafeStack for Fun and Profit. In Black Hat Europe.","journal-title":"J. Bos."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2017. Google\u2019s Chrome Web browser. https:\/\/www.chromium.org\/.  Google. 2017. Google\u2019s Chrome Web browser. https:\/\/www.chromium.org\/."},{"key":"e_1_3_2_1_24_1","unstructured":"J. Gray. 199"},{"volume-title":"Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY).","author":"Gu Y.","key":"e_1_3_2_1_25_1","unstructured":"Y. Gu , Q. Zhao , Y. Zhang , and Z. Lin . 2017. PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace . In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY). Y. Gu, Q. Zhao, Y. Zhang, and Z. Lin. 2017. PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. In Proceedings of the 7th ACM Conference on Data and Application Security and Privacy (CODASPY)."},{"volume-title":"ShrinkWrap: VTable Protection Without Loose Ends. In Annual Computer Security Applications Conference (ACSAC).","author":"Haller I.","key":"e_1_3_2_1_26_1","unstructured":"I. Haller , E. Goktas , E. Athanasopoulos , G. Portokalidis , and H. Bos . 2015 . ShrinkWrap: VTable Protection Without Loose Ends. In Annual Computer Security Applications Conference (ACSAC). I. Haller, E. Goktas, E. Athanasopoulos, G. Portokalidis, and H. Bos. 2015. ShrinkWrap: VTable Protection Without Loose Ends. In Annual Computer Security Applications Conference (ACSAC)."},{"key":"e_1_3_2_1_27_1","unstructured":"Intel. [n. d.]. Intel Control-Flow Enforcement Technology (CET). https:\/\/software.intel.com\/en-us\/blogs\/2016\/06\/09\/intel-release-new-technology-specifications-protect-rop-attacks.  Intel. [n. d.]. Intel Control-Flow Enforcement Technology (CET). https:\/\/software.intel.com\/en-us\/blogs\/2016\/06\/09\/intel-release-new-technology-specifications-protect-rop-attacks."},{"key":"e_1_3_2_1_28_1","unstructured":"J. Salwan. 201"},{"volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Jang D.","key":"e_1_3_2_1_29_1","unstructured":"D. Jang , Z. Tatlock , and S. Lerner . 2014. SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks . In Network and Distributed System Security Symposium (NDSS). D. Jang, Z. Tatlock, and S. Lerner. 2014. SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_30_1","unstructured":"LightHTTPD. 2017. LightHTTPD. https:\/\/www.lighttpd.net\/.  LightHTTPD. 2017. LightHTTPD. https:\/\/www.lighttpd.net\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Memcached. 2017. Memcached. https:\/\/memcached.org\/.  Memcached. 2017. Memcached. https:\/\/memcached.org\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Microsoft. 2009. The STRIDE Threat Model. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN.  Microsoft. 2009. The STRIDE Threat Model. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN."},{"key":"e_1_3_2_1_33_1","unstructured":"Microsoft. 2018. Microsft\u2019s Data Execution Prevention. https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa366553(v=vs.85).aspx.  Microsoft. 2018. Microsft\u2019s Data Execution Prevention. https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/aa366553(v=vs.85).aspx."},{"volume-title":"Symposium on Research in Attacks, Intrusions, and Defenses (RAID).","author":"Muntean P.","key":"e_1_3_2_1_34_1","unstructured":"P. Muntean , M. Fischer , G. Tan , Z. Lin , J. Grossklags , and C. Eckert . 2018. \u03c4CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries . In Symposium on Research in Attacks, Intrusions, and Defenses (RAID). P. Muntean, M. Fischer, G. Tan, Z. Lin, J. Grossklags, and C. Eckert. 2018. \u03c4CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. In Symposium on Research in Attacks, Intrusions, and Defenses (RAID)."},{"volume-title":"Analyzing Control Flow Integrity with LLVM-CFI. In Annual Computer Security Applications Conference (ACSAC).","author":"Muntean P.","key":"e_1_3_2_1_35_1","unstructured":"P. Muntean , M. Neumayer , Z. Lin , G. Tan , J. Grossklags , and C. Eckert . 2019 . Analyzing Control Flow Integrity with LLVM-CFI. In Annual Computer Security Applications Conference (ACSAC). P. Muntean, M. Neumayer, Z. Lin, G. Tan, J. Grossklags, and C. Eckert. 2019. Analyzing Control Flow Integrity with LLVM-CFI. In Annual Computer Security Applications Conference (ACSAC)."},{"volume-title":"European Symposium on Research in Computer Security (ESORICS).","author":"Muntean P.","key":"e_1_3_2_1_36_1","unstructured":"P. Muntean , S. Wuerl , J. Grossklags , and C. Eckert . 2018. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM . In European Symposium on Research in Computer Security (ESORICS). P. Muntean, S. Wuerl, J. Grossklags, and C. Eckert. 2018. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. In European Symposium on Research in Computer Security (ESORICS)."},{"key":"e_1_3_2_1_37_1","unstructured":"Nginx. 2017. Nginx. https:\/\/nginx.org\/en\/.  Nginx. 2017. Nginx. https:\/\/nginx.org\/en\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"B. Niu and G. Tan. 2014. Modular Control-Flow Integrity. In Programming Language Design and Implementation (PLDI).  B. Niu and G. Tan. 2014. Modular Control-Flow Integrity. In Programming Language Design and Implementation (PLDI).","DOI":"10.1145\/2594291.2594295"},{"volume-title":"RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS).","author":"Niu B.","key":"e_1_3_2_1_39_1","unstructured":"B. Niu and G. Tan . 2014 . RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). B. Niu and G. Tan. 2014. RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS)."},{"volume-title":"Per-Input Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS).","author":"Niu B.","key":"e_1_3_2_1_40_1","unstructured":"B. Niu and G. Tan . 2015 . Per-Input Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). B. Niu and G. Tan. 2015. Per-Input Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_41_1","unstructured":"Node.js Foundation. 2017. NodeJS. https:\/\/nodejs.org\/en\/.  Node.js Foundation. 2017. NodeJS. https:\/\/nodejs.org\/en\/."},{"volume-title":"Poking Holes in Information Hiding. In USENIX Security Symposium (USENIX Security).","author":"Oikonomopoulos A.","key":"e_1_3_2_1_42_1","unstructured":"A. Oikonomopoulos , E. Athanasopoulos , H. Bos , and C. Giuffrida . 2018 . Poking Holes in Information Hiding. In USENIX Security Symposium (USENIX Security). A. Oikonomopoulos, E. Athanasopoulos, H. Bos, and C. Giuffrida. 2018. Poking Holes in Information Hiding. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"G. Ramalingam. 1994. The Undecidability of Aliasing. In Transactions on Programming Languages and Systems (TOPLAS) ACM.  G. Ramalingam. 1994. The Undecidability of Aliasing. In Transactions on Programming Languages and Systems (TOPLAS) ACM.","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_44_1","unstructured":"Redis. 2017. Redis. https:\/\/redis.io\/.  Redis. 2017. Redis. https:\/\/redis.io\/."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Rudd R.","key":"e_1_3_2_1_45_1","unstructured":"R. Rudd , R. Skowyra , D. Bigelow , V. Dedhia , T. Hobson , S. Crane , C. Liebchen , P. Larsen , L. Davi , and M. Franz . [n. d.]. Address oblivious code reuse: On the effectiveness of leakage resilient diversity .. In Proceedings of the Symposium on Network and Distributed System Security (NDSS). R. Rudd, R. Skowyra, D. Bigelow, V. Dedhia, T. Hobson, S. Crane, C. Liebchen, P. Larsen, L. Davi, and M. Franz. [n. d.]. Address oblivious code reuse: On the effectiveness of leakage resilient diversity.. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"volume-title":"Evaluating the Effectiveness of Current Anti-ROP Defenses. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID).","author":"Schuster F.","key":"e_1_3_2_1_46_1","unstructured":"F. Schuster , T. Tendyck , J. Pewny , A. Tendyck , M. Steegmanns , M. Contag , and T. Holz . 2014 . Evaluating the Effectiveness of Current Anti-ROP Defenses. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID). F. Schuster, T. Tendyck, J. Pewny, A. Tendyck, M. Steegmanns, M. Contag, and T. Holz. 2014. Evaluating the Effectiveness of Current Anti-ROP Defenses. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_49_1","unstructured":"M. Theodorides and D. Wagner. [n. d.]. Breaking Active-Set Backward-Edge CFI. In Hardware Oriented Security and Trust (HOST).  M. Theodorides and D. Wagner. [n. d.]. Breaking Active-Set Backward-Edge CFI. In Hardware Oriented Security and Trust (HOST)."},{"volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM. In USENIX Security Symposium (USENIX Security).","author":"Tice C.","key":"e_1_3_2_1_50_1","unstructured":"C. Tice , T. Roeder , P. Collingbourne , S. Checkoway , U. Erlingsson , L. Lozano , and G. Pike . 2014 . Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM. In USENIX Security Symposium (USENIX Security). C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, U. Erlingsson, L. Lozano, and G. Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM. In USENIX Security Symposium (USENIX Security)."},{"volume-title":"Practical Context-Sensiticve CFI. In ACM Conference on Computer and Communications Security (CCS).","author":"Veen \u00a0van\u00a0der","key":"e_1_3_2_1_51_1","unstructured":"V. \u00a0van\u00a0der Veen , D. Andriesse , E. G\u00f6ktas , B. Gras , L. Sambuc , A. Slowinska , H. Bos , and C. Giuffrida . 2015 . Practical Context-Sensiticve CFI. In ACM Conference on Computer and Communications Security (CCS). V.\u00a0van\u00a0der Veen, D. Andriesse, E. G\u00f6ktas, B. Gras, L. Sambuc, A. Slowinska, H. Bos, and C. Giuffrida. 2015. Practical Context-Sensiticve CFI. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_52_1","unstructured":"xLab. [n. d.]. Return Flow Guard. http:\/\/xlab.tencent.com\/en\/2016\/11\/02\/return-flow-guard\/.  xLab. [n. d.]. Return Flow Guard. http:\/\/xlab.tencent.com\/en\/2016\/11\/02\/return-flow-guard\/."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Zhang C.","key":"e_1_3_2_1_53_1","unstructured":"C. Zhang , S.\u00a0 A. Carr , T. Li , Y. Ding , C. Song , M. Payer , and D. Song . 2016. vTrust: Regaining Trust on Virtual Calls . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). C. Zhang, S.\u00a0A. Carr, T. Li, Y. Ding, C. Song, M. Payer, and D. Song. 2016. vTrust: Regaining Trust on Virtual Calls. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"volume-title":"Control Flow Integrity for COTS Binaries. In USENIX Security Symposium (USENIX Security).","author":"Zhang M.","key":"e_1_3_2_1_54_1","unstructured":"M. Zhang and R. Sekar . 2013 . Control Flow Integrity for COTS Binaries. In USENIX Security Symposium (USENIX Security). M. Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_55_1","volume":"201","author":"Zieris P.","unstructured":"P. Zieris and J. Horsch. 201 8. A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity. In ACM Asia Conference on Computer and Communications Security (AsiaCCS). P. Zieris and J. Horsch. 2018. A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity. In ACM Asia Conference on Computer and Communications Security (AsiaCCS).","journal-title":"J. Horsch."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":54,"alternative-id":["10.1145\/3427228.3427246","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427246","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}