{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:06Z","timestamp":1750220526983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471847","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"162-176","source":"Crossref","is-referenced-by-count":1,"title":["iTOP: Automating Counterfeit Object-Oriented Programming Attacks"],"prefix":"10.1145","author":[{"given":"Paul","family":"Muntean","sequence":"first","affiliation":[{"name":"Technical Univ. of Munich, Germany"}]},{"given":"Richard","family":"Viehoever","sequence":"additional","affiliation":[{"name":"Technical Univ. of Munich, Germany"}]},{"given":"Zhiqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"The Univ. of Ohio, United States of America"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Penn State Univ., United States of America"}]},{"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[{"name":"Technical Univ. of Munich, Germany"}]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[{"name":"Technical Univ. of Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. pyelftools. https:\/\/github.com\/eliben\/pyelftools.  2018. pyelftools. https:\/\/github.com\/eliben\/pyelftools."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. System \u2013 Execute a shell command in Linux man pages. https:\/\/linux.die.net\/man\/3\/system.  2018. System \u2013 Execute a shell command in Linux man pages. https:\/\/linux.die.net\/man\/3\/system."},{"key":"e_1_3_2_1_3_1","unstructured":"ANTLR. 2020. ANother Tool for Language Recognition. https:\/\/www.antlr.org\/.  ANTLR. 2020. ANother Tool for Language Recognition. https:\/\/www.antlr.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache. 2017. Apache Httpd. https:\/\/httpd.apache.org\/.  Apache. 2017. Apache Httpd. https:\/\/httpd.apache.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Apple. 2020. Apple Security Bounty. https:\/\/developer.apple.com\/security-bounty\/.  Apple. 2020. Apple Security Bounty. https:\/\/developer.apple.com\/security-bounty\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"T. Avgerinos S.\u00a0K. Cha A. Rebert E. Schwartz M. Woo and D. Brumley. 2015. Automatic exploit generation. In Communications of the ACM. ACM.  T. Avgerinos S.\u00a0K. Cha A. Rebert E. Schwartz M. Woo and D. Brumley. 2015. Automatic exploit generation. In Communications of the ACM. ACM.","DOI":"10.1145\/2560217.2560219"},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS). ISOC.","author":"Bounov D.","key":"e_1_3_2_1_7_1","unstructured":"D. Bounov , R.\u00a0 G. Kici , and S. Lerner . 2016. Protecting C++ Dynamic Dispatch Through VTable Interleaving . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). ISOC. D. Bounov, R.\u00a0G. Kici, and S. Lerner. 2016. Protecting C++ Dynamic Dispatch Through VTable Interleaving. In Proceedings of the Symposium on Network and Distributed System Security (NDSS). ISOC."},{"key":"e_1_3_2_1_8_1","unstructured":"Capstone. 2019. Capstone Disassembly Framework. http:\/\/www.capstone-engine.org\/.  Capstone. 2019. Capstone Disassembly Framework. http:\/\/www.capstone-engine.org\/."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). USENIX.","author":"Carlini N.","year":"2015","unstructured":"N. Carlini , A. Barresi , M. Payer , D. Wagner , and T.\u00a0 R. Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity . In Proceedings of USENIX Security Symposium (USENIX Security). USENIX. N. Carlini, A. Barresi, M. Payer, D. Wagner, and T.\u00a0R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proceedings of USENIX Security Symposium (USENIX Security). USENIX."},{"key":"e_1_3_2_1_10_1","unstructured":"Clang. [n.d.]. Clang SafeStack. https:\/\/clang.llvm.org\/docs\/SafeStack.html.  Clang. [n.d.]. Clang SafeStack. https:\/\/clang.llvm.org\/docs\/SafeStack.html."},{"volume-title":"Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). ACM.","author":"Dang Y.","key":"e_1_3_2_1_11_1","unstructured":"T.\u00a0H.\u00a0 Y. Dang , P. Maniatis , and D. Wagner . 2015. The Performance Cost of Shadow Stacks and Stack Canaries . In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). ACM. T.\u00a0H.\u00a0Y. Dang, P. Maniatis, and D. Wagner. 2015. The Performance Cost of Shadow Stacks and Stack Canaries. In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). ACM."},{"volume-title":"Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). ACM.","author":"Elsabagh M.","key":"e_1_3_2_1_12_1","unstructured":"M. Elsabagh , D. Fleck , and A. Stavrou . 2017. Strict Virtual Call Integrity Checking for C ++ Binaries . In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). ACM. M. Elsabagh, D. Fleck, and A. Stavrou. 2017. Strict Virtual Call Integrity Checking for C ++ Binaries. In Proceedings of the Asia Conference on Computer and Communications Security (AsiaCCS). ACM."},{"key":"e_1_3_2_1_13_1","unstructured":"Firefox. 2019. Firefox. https:\/\/www.mozilla.org\/en-US\/firefox.  Firefox. 2019. Firefox. https:\/\/www.mozilla.org\/en-US\/firefox."},{"key":"e_1_3_2_1_14_1","unstructured":"Firefox. 2019. LibTorrent. https:\/\/www.libtorrent.org\/.  Firefox. 2019. LibTorrent. https:\/\/www.libtorrent.org\/."},{"volume-title":"Proceedings of the International Workshop on Security and Trust Management (STM). ACM.","author":"Follner A.","key":"e_1_3_2_1_15_1","unstructured":"A. Follner , A. Bartel , H. Peng , Y.\u00a0 C. Chang , K. Ispoglou , M. Payer , and E. Bodden . 2016. PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution . In Proceedings of the International Workshop on Security and Trust Management (STM). ACM. A. Follner, A. Bartel, H. Peng, Y.\u00a0C. Chang, K. Ispoglou, M. Payer, and E. Bodden. 2016. PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution. In Proceedings of the International Workshop on Security and Trust Management (STM). ACM."},{"key":"e_1_3_2_1_16_1","unstructured":"GCC. 2016. shadow stack proposal. https:\/\/gcc.gnu.org\/ml\/gcc\/2016-04\/msg00083.html.  GCC. 2016. shadow stack proposal. https:\/\/gcc.gnu.org\/ml\/gcc\/2016-04\/msg00083.html."},{"volume-title":"Proceedings of the Symposium on Security and Privacy (S&P). IEEE.","author":"Goektas E.","key":"e_1_3_2_1_17_1","unstructured":"E. Goektas , E. Athanasopoulos , H. Bos , and G. Portokalidis . 2014. Out Of Control: Overcoming Control-Flow Integrity . In Proceedings of the Symposium on Security and Privacy (S&P). IEEE. E. Goektas, E. Athanasopoulos, H. Bos, and G. Portokalidis. 2014. Out Of Control: Overcoming Control-Flow Integrity. In Proceedings of the Symposium on Security and Privacy (S&P). IEEE."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2017. Google Chrome. https:\/\/www.chromium.org\/.  Google. 2017. Google Chrome. https:\/\/www.chromium.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2020. Google Application Security. https:\/\/www.google.ch\/about\/appsecurity\/reward-program\/.  Google. 2020. Google Application Security. https:\/\/www.google.ch\/about\/appsecurity\/reward-program\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2020. Google\u2019s Project Zero. https:\/\/googleprojectzero.blogspot.com\/.  Google. 2020. Google\u2019s Project Zero. https:\/\/googleprojectzero.blogspot.com\/."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Gras B.","year":"2017","unstructured":"B. Gras , K. Razavi , E. Bosman , B. Herbert , and C. Giuffrida . 2017. ASLR on the Line: Practical Cache Attacks on the MMU . Proceedings of the Network and Distributed System Security Symposium (NDSS) ( 2017 ). B. Gras, K. Razavi, E. Bosman, B. Herbert, and C. Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU. Proceedings of the Network and Distributed System Security Symposium (NDSS) (2017)."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS). ACM.","author":"Gruss D.","key":"e_1_3_2_1_22_1","unstructured":"D. Gruss , C. Maurice , A. Fogh , M. Lipp , and S. Mangard . 2016. Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR . In Proceedings of the Conference on Computer and Communications Security (CCS). ACM. D. Gruss, C. Maurice, A. Fogh, M. Lipp, and S. Mangard. 2016. Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. In Proceedings of the Conference on Computer and Communications Security (CCS). ACM."},{"volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC). ACM.","author":"Haller I.","key":"e_1_3_2_1_23_1","unstructured":"I. Haller , E. Goktas , E. Athanasopoulos , G. Portokalidis , and H. Bos . 2015. ShrinkWrap: VTable Protection Without Loose Ends . In Proceedings of the Annual Computer Security Applications Conference (ACSAC). ACM. I. Haller, E. Goktas, E. Athanasopoulos, G. Portokalidis, and H. Bos. 2015. ShrinkWrap: VTable Protection Without Loose Ends. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). ACM."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS). ACM.","author":"Ispoglou K.","key":"e_1_3_2_1_24_1","unstructured":"K. Ispoglou , B. AlBassam , T. Jaeger , and M. Payer . 2018. Block Oriented Programming: Automating Data-Only Attacks . In Proceedings of the Conference on Computer and Communications Security (CCS). ACM. K. Ispoglou, B. AlBassam, T. Jaeger, and M. Payer. 2018. Block Oriented Programming: Automating Data-Only Attacks. In Proceedings of the Conference on Computer and Communications Security (CCS). ACM."},{"volume-title":"Proceedings of the European Symposium on Security and Privacy (Euro S&P). IEEE.","author":"Koschel J.","key":"e_1_3_2_1_25_1","unstructured":"J. Koschel , C. Giuffrida , H. Bos , and K. Razavi . 2020. TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs . In Proceedings of the European Symposium on Security and Privacy (Euro S&P). IEEE. J. Koschel, C. Giuffrida, H. Bos, and K. Razavi. 2020. TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs. In Proceedings of the European Symposium on Security and Privacy (Euro S&P). IEEE."},{"key":"e_1_3_2_1_26_1","unstructured":"Metasploit. 2019. Metasploit Framework. https:\/\/github.com\/rapid7\/metasploit-framework.  Metasploit. 2019. Metasploit Framework. https:\/\/github.com\/rapid7\/metasploit-framework."},{"key":"e_1_3_2_1_27_1","unstructured":"Microsoft. 2009. The STRIDE Threat Model. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN.  Microsoft. 2009. The STRIDE Threat Model. https:\/\/docs.microsoft.com\/en-us\/previous-versions\/commerce-server\/ee823878(v=cs.20)?redirectedfrom=MSDN."},{"key":"e_1_3_2_1_28_1","unstructured":"Microsoft. 2020. Microsoft Bug Bounty Program. https:\/\/www.microsoft.com\/en-us\/msrc\/bounty.  Microsoft. 2020. Microsoft Bug Bounty Program. https:\/\/www.microsoft.com\/en-us\/msrc\/bounty."},{"key":"e_1_3_2_1_29_1","unstructured":"Changes to Functionality in Microsoft Windows XP Service Pack\u00a02. Microsoft. 2003. . https:\/\/technet.microsoft.com\/en-us\/library\/bb457151.aspx.  Changes to Functionality in Microsoft Windows XP Service Pack\u00a02. Microsoft. 2003. . https:\/\/technet.microsoft.com\/en-us\/library\/bb457151.aspx."},{"volume-title":"Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS\/ETAPS). Springer.","author":"Bjorner N.","key":"e_1_3_2_1_30_1","unstructured":"L.\u00a0d. Moura and N. Bjorner . 2008. Z3: An efficient SMT solver . In Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS\/ETAPS). Springer. L.\u00a0d. Moura and N. Bjorner. 2008. Z3: An efficient SMT solver. In Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS\/ETAPS). Springer."},{"volume-title":"Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Springer.","author":"Muntean P.","key":"e_1_3_2_1_31_1","unstructured":"P. Muntean , M. Fischer , G. Tan , Z. Lin , J. Grossklags , and C. Eckert . 2018. \u03c4FI: Type-Assisted Control Flow Integrity for x86-64 Binaries . In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Springer. P. Muntean, M. Fischer, G. Tan, Z. Lin, J. Grossklags, and C. Eckert. 2018. \u03c4FI: Type-Assisted Control Flow Integrity for x86-64 Binaries. In Proceedings of the International Symposium on Research in Attacks, Intrusions, and Defenses (RAID). Springer."},{"volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC). ACM.","author":"Muntean P.","key":"e_1_3_2_1_32_1","unstructured":"P. Muntean , M. Neumayer , Z. Lin , G. Tan , J. Grossklags , and C. Eckert . 2019. Analyzing Control Flow Integrity with LLVM-CFI . In Proceedings of the Annual Computer Security Applications Conference (ACSAC). ACM. P. Muntean, M. Neumayer, Z. Lin, G. Tan, J. Grossklags, and C. Eckert. 2019. Analyzing Control Flow Integrity with LLVM-CFI. In Proceedings of the Annual Computer Security Applications Conference (ACSAC). ACM."},{"volume-title":"Annual Computer Security Applications Conference (ACSAC). ACM.","author":"Muntean P.","key":"e_1_3_2_1_33_1","unstructured":"P. Muntean , M. Neumayer , Z. Lin , G. Tan , J. Grossklags , and C. Eckert . 2020. \u03c1FEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings . In Annual Computer Security Applications Conference (ACSAC). ACM. P. Muntean, M. Neumayer, Z. Lin, G. Tan, J. Grossklags, and C. Eckert. 2020. \u03c1FEM: Efficient Backward-edge Protection Using Reversed Forward-edge Mappings. In Annual Computer Security Applications Conference (ACSAC). ACM."},{"volume-title":"Proceedings of the European Symposium on Research in Computer Security (ESORICS). Springer.","author":"Muntean P.","key":"e_1_3_2_1_34_1","unstructured":"P. Muntean , S. Wuerl , J. Grossklags , and C. Eckert . 2018. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM . In Proceedings of the European Symposium on Research in Computer Security (ESORICS). Springer. P. Muntean, S. Wuerl, J. Grossklags, and C. Eckert. 2018. CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. In Proceedings of the European Symposium on Research in Computer Security (ESORICS). Springer."},{"key":"e_1_3_2_1_35_1","unstructured":"Nginx. 2017. Nginx web server. https:\/\/nginx.org\/en\/.  Nginx. 2017. Nginx web server. https:\/\/nginx.org\/en\/."},{"volume-title":"Proceedings of the Symposium on Programming Language Design and Implementation (PLDI). ACM.","author":"Niu B.","key":"e_1_3_2_1_36_1","unstructured":"B. Niu and G. Tan . 2014. Modular Control-Flow Integrity . In Proceedings of the Symposium on Programming Language Design and Implementation (PLDI). ACM. B. Niu and G. Tan. 2014. Modular Control-Flow Integrity. In Proceedings of the Symposium on Programming Language Design and Implementation (PLDI). ACM."},{"key":"e_1_3_2_1_37_1","unstructured":"NodeJS. 2017. Open-source cross-platform JavaScript run-time environment. https:\/\/nodejs.org\/en\/.  NodeJS. 2017. Open-source cross-platform JavaScript run-time environment. https:\/\/nodejs.org\/en\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Pakt. 2013. ropc: A turing complete ROP compiler. https:\/\/github.com\/pakt\/ropc.  Pakt. 2013. ropc: A turing complete ROP compiler. https:\/\/github.com\/pakt\/ropc."},{"volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS). ISOC.","author":"Pawlowski A.","key":"e_1_3_2_1_39_1","unstructured":"A. Pawlowski , M. Contag , V. van\u00a0der Veen , C. Ouwehand , T. Holz , H. Bos , E. Athanasopoulos , and C. Giuffrida . 2017. MARX: Uncovering Class Hierarchies in C++ Programs . In Proceedings of the Network and Distributed System Security Symposium (NDSS). ISOC. A. Pawlowski, M. Contag, V. van\u00a0der Veen, C. Ouwehand, T. Holz, H. Bos, E. Athanasopoulos, and C. Giuffrida. 2017. MARX: Uncovering Class Hierarchies in C++ Programs. In Proceedings of the Network and Distributed System Security Symposium (NDSS). ISOC."},{"key":"e_1_3_2_1_40_1","unstructured":"Application\u00a0Entry Point. 2021. InfoSec Institure. https:\/\/resources.infosecinstitute.com\/topic\/discovering-entry-points\/.  Application\u00a0Entry Point. 2021. InfoSec Institure. https:\/\/resources.infosecinstitute.com\/topic\/discovering-entry-points\/."},{"key":"e_1_3_2_1_41_1","unstructured":"Redis. 2017. Redis in-memory database. https:\/\/redis.io\/.  Redis. 2017. Redis in-memory database. https:\/\/redis.io\/."},{"key":"e_1_3_2_1_42_1","unstructured":"J. Salwan. 201"},{"volume-title":"Proceedings of the Symposium on Security and Privacy (S&P). IEEE.","author":"Schuster F.","key":"e_1_3_2_1_43_1","unstructured":"F. Schuster , T. Tendyck , C. Liebchen , L. Davi , A.-R. Sadeghi , and T. Holz . 2015. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications . In Proceedings of the Symposium on Security and Privacy (S&P). IEEE. F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz. 2015. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. In Proceedings of the Symposium on Security and Privacy (S&P). IEEE."},{"volume-title":"Proceedings of the Conference on Security (USENIX Security). USENIX.","author":"Schwartz J.","key":"e_1_3_2_1_44_1","unstructured":"E.\u00a0 J. Schwartz , T. Avgerinos , and D. Brumley . 2011. Q: Exploit Hardening Made Easy . In Proceedings of the Conference on Security (USENIX Security). USENIX. E.\u00a0J. Schwartz, T. Avgerinos, and D. Brumley. 2011. Q: Exploit Hardening Made Easy. In Proceedings of the Conference on Security (USENIX Security). USENIX."},{"volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS). ISOC.","author":"Shoshitaishvili Y.","key":"e_1_3_2_1_45_1","unstructured":"Y. Shoshitaishvili , R. Wang , C. Hauser , C. Kruegel , and G. Vigna . 2015. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware . In Proceedings of the Symposium on Network and Distributed System Security (NDSS). ISOC. Y. Shoshitaishvili, R. Wang, C. Hauser, C. Kruegel, and G. Vigna. 2015. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. In Proceedings of the Symposium on Network and Distributed System Security (NDSS). ISOC."},{"volume-title":"Proceedings of the Symposium on Security and Privacy (S&P). IEEE.","author":"Shoshitaishvili Y.","key":"e_1_3_2_1_46_1","unstructured":"Y. Shoshitaishvili , R. Wang , C. Salls , N. Stephens , M. Polino , A. Dutcher , J. Grosen , S. Feng , C. Hauser , C. Kruegel , and G. Vigna . 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis . In Proceedings of the Symposium on Security and Privacy (S&P). IEEE. Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen, S. Feng, C. Hauser, C. Kruegel, and G. Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In Proceedings of the Symposium on Security and Privacy (S&P). IEEE."},{"volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). USENIX.","author":"Tice C.","key":"e_1_3_2_1_47_1","unstructured":"C. Tice , T. Roeder , P. Collingbourne , S. Checkoway , \u00da. Erlingsson, L. Lozano , and G. Pike . 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM . In Proceedings of USENIX Security Symposium (USENIX Security). USENIX. C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, \u00da. Erlingsson, L. Lozano, and G. Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM. In Proceedings of USENIX Security Symposium (USENIX Security). USENIX."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS). ACM.","author":"Andriesse D.","key":"e_1_3_2_1_48_1","unstructured":"V.\u00a0van\u00a0der. Veen, D. Andriesse , M. Stamatogiannakis , X. Chen , H. Bos , and C. Giuffrida . 2017. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later . In Proceedings of the Conference on Computer and Communications Security (CCS). ACM. V.\u00a0van\u00a0der. Veen, D. Andriesse, M. Stamatogiannakis, X. Chen, H. Bos, and C. Giuffrida. 2017. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. In Proceedings of the Conference on Computer and Communications Security (CCS). ACM."},{"volume-title":"Proceedings of the Conference on Computer and Communications Security (CCS). ACM.","author":"Wang Y.","key":"e_1_3_2_1_49_1","unstructured":"Y. Wang , C. Zhang , X. Xiang , Z. Zhao , W. Li , X. Gong , B. Liu , K. Chen , and W. Zou . 2018. Revery: From Proof-of-Concept to Exploitable . In Proceedings of the Conference on Computer and Communications Security (CCS). ACM. Y. Wang, C. Zhang, X. Xiang, Z. Zhao, W. Li, X. Gong, B. Liu, K. Chen, and W. Zou. 2018. Revery: From Proof-of-Concept to Exploitable. In Proceedings of the Conference on Computer and Communications Security (CCS). ACM."},{"volume-title":"Proceedings of the European Symposium on Research in Computer Security (ESORICS). Springer.","author":"Wollgast P.","key":"e_1_3_2_1_50_1","unstructured":"P. Wollgast , R. Gawlik , B. Garmany , B. Kollenda , and T. Holz . 2016. Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets . In Proceedings of the European Symposium on Research in Computer Security (ESORICS). Springer. P. Wollgast, R. Gawlik, B. Garmany, B. Kollenda, and T. Holz. 2016. Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets. In Proceedings of the European Symposium on Research in Computer Security (ESORICS). Springer."},{"volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). USENIX.","author":"Wu W.","key":"e_1_3_2_1_51_1","unstructured":"W. Wu , Y Chen , X Xing , and W. Zou . 2019. Kepler: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities . In Proceedings of USENIX Security Symposium (USENIX Security). USENIX. W. Wu, Y Chen, X Xing, and W. Zou. 2019. Kepler: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. In Proceedings of USENIX Security Symposium (USENIX Security). USENIX."},{"volume-title":"Integrity. In Proceedings of the Network and Distributed System Security Symposium (NDSS). ISOC.","author":"Zhang C.","key":"e_1_3_2_1_52_1","unstructured":"C. Zhang , C. Song , K.\u00a0Chen Zhijie, Z. Chen , and D. Song . 2015. vTint: Protecting Virtual Function Tables\u2019 Integrity. In Proceedings of the Network and Distributed System Security Symposium (NDSS). ISOC. C. Zhang, C. Song, K.\u00a0Chen Zhijie, Z. Chen, and D. Song. 2015. vTint: Protecting Virtual Function Tables\u2019 Integrity. In Proceedings of the Network and Distributed System Security Symposium (NDSS). ISOC."}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID '21","location":"San Sebastian Spain"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471847","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471847","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471847"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":52,"alternative-id":["10.1145\/3471621.3471847","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471847","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}