{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:39:29Z","timestamp":1765438769034,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T00:00:00Z","timestamp":1649116800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102175,62002151"],"award-info":[{"award-number":["62102175,62002151"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science, Technology and Innovation Commission of Shenzhen Municipality","award":["SGDX20201103095408029"],"award-info":[{"award-number":["SGDX20201103095408029"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,5]]},"DOI":"10.1145\/3517208.3523758","type":"proceedings-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T22:12:16Z","timestamp":1648505536000},"page":"50-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["RetTag"],"prefix":"10.1145","author":[{"given":"Yu","family":"Wang","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology"}]},{"given":"Jinting","family":"Wu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology"}]},{"given":"Tai","family":"Yue","sequence":"additional","affiliation":[{"name":"National University of Defense Technology and Southern University of Science and Technology"}]},{"given":"Zhenyu","family":"Ning","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology"}]},{"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology"}]}],"member":"320","published-online":{"date-parts":[[2022,4,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Intel Control-flow Enforcement Technology Preview document. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf.  2017. Intel Control-flow Enforcement Technology Preview document. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Riscv-coremark. https:\/\/github.com\/riscv-boom\/riscv-coremark.  2021. Riscv-coremark. https:\/\/github.com\/riscv-boom\/riscv-coremark."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Riscv-gnu-toolchain. https:\/\/github.com\/riscv-collab\/riscv-gnu-toolchain.  2021. Riscv-gnu-toolchain. https:\/\/github.com\/riscv-collab\/riscv-gnu-toolchain."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Riscv-pk. https:\/\/github.com\/riscv\/riscv-pk.  2021. Riscv-pk. https:\/\/github.com\/riscv\/riscv-pk."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Rocket-chip. https:\/\/github.com\/chipsalliance\/rocket-chip.  2021. Rocket-chip. https:\/\/github.com\/chipsalliance\/rocket-chip."},{"key":"e_1_3_2_1_6_1","volume-title":"Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC)","author":"Abadi Mart\u00edn","year":"2009","unstructured":"Mart\u00edn Abadi , Mihai Budiu , and et. al. 2009. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC) ( 2009 ). Mart\u00edn Abadi, Mihai Budiu, and et. al. 2009. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC) (2009)."},{"key":"e_1_3_2_1_7_1","volume-title":"The rocket chip generator. EECS Department","author":"Asanovic Krste","year":"2016","unstructured":"Krste Asanovic , Rimas Avizienis , and et. al. 2016. The rocket chip generator. EECS Department , University of California , Berkeley, Tech . Rep. UCB\/EECS- 2016 -17 (2016). Krste Asanovic, Rimas Avizienis, and et. al. 2016. The rocket chip generator. EECS Department, University of California, Berkeley, Tech. Rep. UCB\/EECS-2016-17 (2016)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228584"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of USENIX Security'15","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , and et. al. 2015 . Control-flow bending: On the effectiveness of control-flow integrity . In Proceedings of USENIX Security'15 . Nicholas Carlini, Antonio Barresi, and et. al. 2015. Control-flow bending: On the effectiveness of control-flow integrity. In Proceedings of USENIX Security'15."},{"key":"e_1_3_2_1_13_1","unstructured":"Cristian Chitu. [n.d.]. AES128 Reference Manual. ([n.d.]).  Cristian Chitu. [n.d.]. AES128 Reference Manual. ([n.d.])."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings 21st International Conference on Distributed Computing Systems. IEEE, 409--417","author":"Fu-Hau Hsu Chiueh","year":"2001","unstructured":"Tzi-cker Chiueh and Fu-Hau Hsu . 2001 . RAD: A compile-time solution to buffer overflow attacks . In Proceedings 21st International Conference on Distributed Computing Systems. IEEE, 409--417 . Tzi-cker Chiueh and Fu-Hau Hsu. 2001. RAD: A compile-time solution to buffer overflow attacks. In Proceedings 21st International Conference on Distributed Computing Systems. IEEE, 409--417."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"volume-title":"USENIX security symposium","author":"Cowan Crispan","key":"e_1_3_2_1_16_1","unstructured":"Crispan Cowan , Calton Pu , Dave Maier , Jonathan Walpole , Peat Bakke , Steve Beattie , Aaron Grier , Perry Wagle , Qian Zhang , and Heather Hinton . 1998. Stack-guard: automatic adaptive detection and prevention of buffer-overflow attacks .. In USENIX security symposium , Vol. 98 . San Antonio , TX , 63--78. Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. 1998. Stack-guard: automatic adaptive detection and prevention of buffer-overflow attacks.. In USENIX security symposium, Vol. 98. San Antonio, TX, 63--78."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.26"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411495.3421366"},{"key":"e_1_3_2_1_21_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Delshadtehrani Leila","year":"2020","unstructured":"Leila Delshadtehrani , Sadullah Canakci , Boyou Zhou , Schuyler Eldridge , Ajay Joshi , and Manuel Egele . 2020 . {PHMon}: A Programmable Hardware Monitor and Its Security Use Cases . In 29th USENIX Security Symposium (USENIX Security 20) . 807--824. Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, and Manuel Egele. 2020. {PHMon}: A Programmable Hardware Monitor and Its Security Use Cases. In 29th USENIX Security Symposium (USENIX Security 20). 807--824."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384738"},{"key":"e_1_3_2_1_25_1","volume-title":"Whitepaper on bypassing aslr\/dep","author":"Katoch Vinay","year":"2011","unstructured":"Vinay Katoch . 2011. Whitepaper on bypassing aslr\/dep . S. Technologies, Ed., ed ( 2011 ). Vinay Katoch. 2011. Whitepaper on bypassing aslr\/dep. S. Technologies, Ed., ed (2011)."},{"key":"e_1_3_2_1_26_1","volume-title":"Zipper Stack: Shadow Stacks Without Shadow. arXiv:1902.00888 [cs.CR]","author":"Li Jinfeng","year":"2020","unstructured":"Jinfeng Li , Liwei Chen , and et. al. 2020 . Zipper Stack: Shadow Stacks Without Shadow. arXiv:1902.00888 [cs.CR] Jinfeng Li, Liwei Chen, and et. al. 2020. Zipper Stack: Shadow Stacks Without Shadow. arXiv:1902.00888 [cs.CR]"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of USENIX Security'19)","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand , Thomas Nyman , and et. al. 2019 . PAC it up: Towards Pointer Integrity using ARM Pointer Authentication . In Proceedings of USENIX Security'19) . Hans Liljestrand, Thomas Nyman, and et. al. 2019. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. In Proceedings of USENIX Security'19)."},{"volume-title":"30th {USENIX} Security Symposium ({USENIX} Security 21).","author":"Liljestrand Hans","key":"e_1_3_2_1_28_1","unstructured":"Hans Liljestrand , Thomas Nyman , Lachlan J Gunn , Jan-Erik Ekberg , and N Asokan . 2021. PACStack: an Authenticated Call Stack . In 30th {USENIX} Security Symposium ({USENIX} Security 21). Hans Liljestrand, Thomas Nyman, Lachlan J Gunn, Jan-Erik Ekberg, and N Asokan. 2021. PACStack: an Authenticated Call Stack. In 30th {USENIX} Security Symposium ({USENIX} Security 21)."},{"key":"e_1_3_2_1_29_1","unstructured":"LLVM. 2020. LLVM 10 User Guides. https:\/\/releases.llvm.org\/10.0.0\/docs\/UserGuides.html.  LLVM. 2020. LLVM 10 User Guides. https:\/\/releases.llvm.org\/10.0.0\/docs\/UserGuides.html."},{"key":"e_1_3_2_1_30_1","volume-title":"Exploiting Linux and PaX ASLR's weaknesses on 32-and 64-bit systems. BlackHat Asia","author":"Marco-Gisbert Hector","year":"2016","unstructured":"Hector Marco-Gisbert and Ismael Ripoll-Ripoll . 2016. Exploiting Linux and PaX ASLR's weaknesses on 32-and 64-bit systems. BlackHat Asia ( 2016 ). Hector Marco-Gisbert and Ismael Ripoll-Ripoll. 2016. Exploiting Linux and PaX ASLR's weaknesses on 32-and 64-bit systems. BlackHat Asia (2016)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"key":"e_1_3_2_1_32_1","unstructured":"Uwe F Mayer. 2003. Linux\/unix nbench.  Uwe F Mayer. 2003. Linux\/unix nbench."},{"key":"e_1_3_2_1_33_1","volume-title":"NDSS","volume":"5","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Xiaodong Song . 2005 . Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software .. In NDSS , Vol. 5 . Citeseer, 3--4. James Newsome and Dawn Xiaodong Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.. In NDSS, Vol. 5. Citeseer, 3--4."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of USENIX Security'13","author":"Pappas Vasilis","year":"2013","unstructured":"Vasilis Pappas , Michalis Polychronakis , and et. al. 2013 . Transparent ROP Exploit Mitigation Using Indirect Branch Tracing . In Proceedings of USENIX Security'13 . Vasilis Pappas, Michalis Polychronakis, and et. al. 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In Proceedings of USENIX Security'13."},{"key":"e_1_3_2_1_36_1","volume-title":"Control flow integrity based on lightweight encryption architecture","author":"Qiu Pengfei","year":"2017","unstructured":"Pengfei Qiu , Yongqiang Lyu , and et. al. 2017. Control flow integrity based on lightweight encryption architecture . IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( 2017 ). Pengfei Qiu, Yongqiang Lyu, and et. al. 2017. Control flow integrity based on lightweight encryption architecture. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2017)."},{"key":"e_1_3_2_1_37_1","unstructured":"Qualcomm. 2017. Pointer authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf.  Qualcomm. 2017. Pointer authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"volume-title":"The RISC-V Instruction Set Manual, Volume I: User-Level ISA","author":"Waterman Editors Andrew","key":"e_1_3_2_1_40_1","unstructured":"Editors Andrew Waterman and Krste Asanovi\u0107 . 2019. The RISC-V Instruction Set Manual, Volume I: User-Level ISA . RISC-V Foundation . Editors Andrew Waterman and Krste Asanovi\u0107. 2019. The RISC-V Instruction Set Manual, Volume I: User-Level ISA. RISC-V Foundation."},{"volume-title":"Document Version 20190608-Priv-MSU-Ratified","author":"Waterman Editors Andrew","key":"e_1_3_2_1_41_1","unstructured":"Editors Andrew Waterman and Krste Asanovi\u0107 . June 2019. The RISC-V Instruction Set Manual, Volume II: Privileged Architecture , Document Version 20190608-Priv-MSU-Ratified . RISC-V Foundation . Editors Andrew Waterman and Krste Asanovi\u0107. June 2019. The RISC-V Instruction Set Manual, Volume II: Privileged Architecture, Document Version 20190608-Priv-MSU-Ratified. RISC-V Foundation."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076739"},{"key":"e_1_3_2_1_43_1","volume-title":"CRHC-02-05","author":"Xu Jun","year":"2002","unstructured":"Jun Xu , Zbigniew Kalbarczyk , Sanjay Patel , and Ravishankar K Iyer . 2002. Architecture support for defending against buffer overflow attacks. Coordinated Science Laboratory Report no. UILU-ENG-02-2205 , CRHC-02-05 ( 2002 ). Jun Xu, Zbigniew Kalbarczyk, Sanjay Patel, and Ravishankar K Iyer. 2002. Architecture support for defending against buffer overflow attacks. Coordinated Science Laboratory Report no. UILU-ENG-02-2205, CRHC-02-05 (2002)."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of IEEE S&P'13","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang , Tao Wei , and et. al. 2013 . Practical control flow integrity and randomization for binary executables . In Proceedings of IEEE S&P'13 . Chao Zhang, Tao Wei, and et. al. 2013. Practical control flow integrity and randomization for binary executables. In Proceedings of IEEE S&P'13."},{"key":"e_1_3_2_1_45_1","volume-title":"HCIC: Hardware-assisted control-flow integrity checking","author":"Zhang Jiliang","year":"2018","unstructured":"Jiliang Zhang , Binhang Qi , and et. al. 2018 . HCIC: Hardware-assisted control-flow integrity checking . IEEE Internet of Things Journal ( 2018). Jiliang Zhang, Binhang Qi, and et. al. 2018. HCIC: Hardware-assisted control-flow integrity checking. IEEE Internet of Things Journal (2018)."},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of USENIX Security'13","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar . 2013 . Control flow integrity for COTS binaries . In Proceedings of USENIX Security'13 . 337--352. Mingwei Zhang and R Sekar. 2013. Control flow integrity for COTS binaries. In Proceedings of USENIX Security'13. 337--352."}],"event":{"name":"EuroSys '22: Seventeenth European Conference on Computer Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Rennes France","acronym":"EuroSys '22"},"container-title":["Proceedings of the 15th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517208.3523758","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3517208.3523758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:29Z","timestamp":1750188689000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3517208.3523758"}},"subtitle":["hardware-assisted return address integrity on RISC-V"],"short-title":[],"issued":{"date-parts":[[2022,4,5]]},"references-count":45,"alternative-id":["10.1145\/3517208.3523758","10.1145\/3517208"],"URL":"https:\/\/doi.org\/10.1145\/3517208.3523758","relation":{},"subject":[],"published":{"date-parts":[[2022,4,5]]},"assertion":[{"value":"2022-04-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}