{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:59:58Z","timestamp":1764403198873,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390781972,236615297"],"award-info":[{"award-number":["390781972,236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545997","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"30-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64"],"prefix":"10.1145","author":[{"given":"Tobias","family":"Cloosters","sequence":"first","affiliation":[{"name":"University of Duisburg-Essen, Germany"}]},{"given":"David","family":"Paa\u00dfen","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Germany"}]},{"given":"Jianqiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"Oussama","family":"Draissi","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Germany"}]},{"given":"Patrick","family":"Jauernig","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"Emmanuel","family":"Stapf","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]},{"given":"Lucas","family":"Davi","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Germany"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Sergi Alvarez. 2008. radare2. https\/\/rada.re\/n\/radare2.html  Sergi Alvarez. 2008. radare2. https\/\/rada.re\/n\/radare2.html"},{"key":"e_1_3_2_1_2_1","unstructured":"angr Team. 2014. angrop. https\/\/github.com\/angr\/angrop\/  angr Team. 2014. angrop. https\/\/github.com\/angr\/angrop\/"},{"key":"e_1_3_2_1_3_1","volume-title":"Automatic Exploit Generation. Commun. ACM","author":"Avgerinos Thanassis","year":"2014","unstructured":"Thanassis Avgerinos , Sang\u00a0Kil Cha , Alexandre Rebert , Edward\u00a0 J Schwartz , Maverick Woo , and David Brumley . 2014. Automatic Exploit Generation. Commun. ACM ( 2014 ). Thanassis Avgerinos, Sang\u00a0Kil Cha, Alexandre Rebert, Edward\u00a0J Schwartz, Maverick Woo, and David Brumley. 2014. Automatic Exploit Generation. Commun. ACM (2014)."},{"key":"e_1_3_2_1_4_1","volume-title":"The Guard\u2019s Dilemma Efficient Code-Reuse Attacks Against Intel SGX. In USENIX Security Symposium.","author":"Biondo Andrea","year":"2018","unstructured":"Andrea Biondo , Mauro Conti , Lucas Davi , Tommaso Frassetto , and Ahmad-Reza Sadeghi . 2018 . The Guard\u2019s Dilemma Efficient Code-Reuse Attacks Against Intel SGX. In USENIX Security Symposium. Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. 2018. The Guard\u2019s Dilemma Efficient Code-Reuse Attacks Against Intel SGX. In USENIX Security Symposium."},{"key":"e_1_3_2_1_5_1","volume-title":"Jump-Oriented Programming A New Class of Code-Reuse Attack. In ACM Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Bletsch Tyler","year":"2011","unstructured":"Tyler Bletsch , Xuxian Jiang , Vince\u00a0 W. Freeh , and Zhenkai Liang . 2011 . Jump-Oriented Programming A New Class of Code-Reuse Attack. In ACM Asia Conference on Computer and Communications Security (AsiaCCS). Tyler Bletsch, Xuxian Jiang, Vince\u00a0W. Freeh, and Zhenkai Liang. 2011. Jump-Oriented Programming A New Class of Code-Reuse Attack. In ACM Asia Conference on Computer and Communications Security (AsiaCCS)."},{"key":"e_1_3_2_1_6_1","volume-title":"ACM Conference on Computer and Communications Security (CCS).","author":"Buchanan Erik","year":"2008","unstructured":"Erik Buchanan , Ryan Roemer , Hovav Shacham , and Stefan Savage . 2008 . When Good Instructions Go Bad Generalizing Return-Oriented Programming to RISC . In ACM Conference on Computer and Communications Security (CCS). Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage. 2008. When Good Instructions Go Bad Generalizing Return-Oriented Programming to RISC. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_7_1","unstructured":"Amat Cama. 2017. xrop. https\/\/github.com\/acama\/xrop  Amat Cama. 2017. xrop. https\/\/github.com\/acama\/xrop"},{"key":"e_1_3_2_1_8_1","volume-title":"Control-Flow Bending On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium.","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas\u00a0 R. Gross . 2015 . Control-Flow Bending On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium. Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas\u00a0R. Gross. 2015. Control-Flow Bending On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_10_1","volume-title":"TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In USENIX Security Symposium.","author":"Cloosters Tobias","year":"2020","unstructured":"Tobias Cloosters , Michael Rodler , and Lucas Davi . 2020 . TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In USENIX Security Symposium. Tobias Cloosters, Michael Rodler, and Lucas Davi. 2020. TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves. In USENIX Security Symposium."},{"key":"e_1_3_2_1_11_1","volume-title":"SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. In USENIX Security Symposium.","author":"Cloosters Tobias","year":"2022","unstructured":"Tobias Cloosters , Johannes Willbold , Thorsten Holz , and Lucas Davi . 2022 . SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. In USENIX Security Symposium. Tobias Cloosters, Johannes Willbold, Thorsten Holz, and Lucas Davi. 2022. SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_12_1","unstructured":"CVE-2013-2028 2013. nginx-1.4.0 for the analysis of CVE-2013-2028. https\/\/github.com\/danghvu\/nginx-1.4.0  CVE-2013-2028 2013. nginx-1.4.0 for the analysis of CVE-2013-2028. https\/\/github.com\/danghvu\/nginx-1.4.0"},{"key":"e_1_3_2_1_13_1","volume-title":"International Conference on Information Security. Springer.","author":"Davi Lucas","year":"2010","unstructured":"Lucas Davi , Alexandra Dmitrienko , Ahmad-Reza Sadeghi , and Marcel Winandy . 2010 . Privilege escalation attacks on Android . In International Conference on Information Security. Springer. Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, and Marcel Winandy. 2010. Privilege escalation attacks on Android. In International Conference on Information Security. Springer."},{"key":"e_1_3_2_1_15_1","volume-title":"Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium.","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi , Ahmad-Reza Sadeghi , Daniel Lehmann , and Fabian Monrose . 2014 . Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium. Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, and Fabian Monrose. 2014. Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","volume-title":"ACM Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Davi Lucas","year":"2011","unstructured":"Lucas Davi , Ahmad-Reza Sadeghi , and Marcel Winandy . 2011 . ROPdefender A Detection Tool to Defend against Return-Oriented Programming Attacks . In ACM Asia Conference on Computer and Communications Security (AsiaCCS). Lucas Davi, Ahmad-Reza Sadeghi, and Marcel Winandy. 2011. ROPdefender A Detection Tool to Defend against Return-Oriented Programming Attacks. In ACM Asia Conference on Computer and Communications Security (AsiaCCS)."},{"key":"e_1_3_2_1_17_1","volume-title":"Automation & Test in Europe Conference & Exhibition (DATE).","author":"De Asmit","year":"2019","unstructured":"Asmit De , Aditya Basu , Swaroop Ghosh , and Trent Jaeger . 2019 . FIXER Flow integrity extensions for embedded RISC-V. In IEEE Design , Automation & Test in Europe Conference & Exhibition (DATE). Asmit De, Aditya Basu, Swaroop Ghosh, and Trent Jaeger. 2019. FIXER Flow integrity extensions for embedded RISC-V. In IEEE Design, Automation & Test in Europe Conference & Exhibition (DATE)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Leonardo de Moura and Nikolaj Bj\u00f8rner. 2008. Z3 An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems.  Leonardo de Moura and Nikolaj Bj\u00f8rner. 2008. Z3 An Efficient SMT Solver. In Tools and Algorithms for the Construction and Analysis of Systems.","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_19_1","volume-title":"Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium.","author":"Ding Ren","year":"2017","unstructured":"Ren Ding , Chenxiong Qian , Chengyu Song , Bill Harris , Taesoo Kim , and Wenke Lee . 2017 . Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium. Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. 2017. Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium."},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium.","author":"Farkhani Reza\u00a0Mirzazade","year":"2021","unstructured":"Reza\u00a0Mirzazade Farkhani , Mansour Ahmadi , and Long Lu . 2021 . PTAuth Temporal Memory Safety via Robust Points-to Authentication . In USENIX Security Symposium. Reza\u00a0Mirzazade Farkhani, Mansour Ahmadi, and Long Lu. 2021. PTAuth Temporal Memory Safety via Robust Points-to Authentication. In USENIX Security Symposium."},{"key":"e_1_3_2_1_21_1","volume-title":"Code Injection Attacks on Harvard-Architecture Devices. In ACM Conference on Computer and Communications Security (CCS).","author":"Francillon Aur\u00e9lien","year":"2008","unstructured":"Aur\u00e9lien Francillon and Claude Castelluccia . 2008 . Code Injection Attacks on Harvard-Architecture Devices. In ACM Conference on Computer and Communications Security (CCS). Aur\u00e9lien Francillon and Claude Castelluccia. 2008. Code Injection Attacks on Harvard-Architecture Devices. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_22_1","unstructured":"Google. 2022. opentitan. https\/\/opentitan.org\/  Google. 2022. opentitan. https\/\/opentitan.org\/"},{"key":"e_1_3_2_1_23_1","unstructured":"Garrett Gu and Hovav Shacham. 2020. No RISC No Reward Return-Oriented Programming in RISC-V. https\/\/arxiv.org\/abs\/2007.14995  Garrett Gu and Hovav Shacham. 2020. No RISC No Reward Return-Oriented Programming in RISC-V. https\/\/arxiv.org\/abs\/2007.14995"},{"key":"e_1_3_2_1_24_1","volume-title":"Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms. In USENIX Security Symposium.","author":"Hund Ralf","year":"2009","unstructured":"Ralf Hund , Thorsten Holz , and Felix\u00a0 C. Freiling . 2009 . Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms. In USENIX Security Symposium. Ralf Hund, Thorsten Holz, and Felix\u00a0C. Freiling. 2009. Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms. In USENIX Security Symposium."},{"key":"e_1_3_2_1_25_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security.","author":"Ispoglou K","year":"2018","unstructured":"Kyriakos\u00a0 K Ispoglou , Bader AlBassam , Trent Jaeger , and Mathias Payer . 2018 . Block oriented programming Automating data-only attacks . In ACM SIGSAC Conference on Computer and Communications Security. Kyriakos\u00a0K Ispoglou, Bader AlBassam, Trent Jaeger, and Mathias Payer. 2018. Block oriented programming Automating data-only attacks. In ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_26_1","volume-title":"Return-Oriented Programming on RISC-V. In ACM Asia Conference on Computer and Communications Security (AsiaCCS).","author":"Jaloyan Georges-Axel","year":"2020","unstructured":"Georges-Axel Jaloyan , Konstantinos Markantonakis , Raja\u00a0Naeem Akram , David Robin , Keith Mayes , and David Naccache . 2020 . Return-Oriented Programming on RISC-V. In ACM Asia Conference on Computer and Communications Security (AsiaCCS). Georges-Axel Jaloyan, Konstantinos Markantonakis, Raja\u00a0Naeem Akram, David Robin, Keith Mayes, and David Naccache. 2020. Return-Oriented Programming on RISC-V. In ACM Asia Conference on Computer and Communications Security (AsiaCCS)."},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Security Symposium.","author":"Khandaker Mustakimur\u00a0Rahman","year":"2019","unstructured":"Mustakimur\u00a0Rahman Khandaker , Wenqing Liu , Abu Naser , Zhi Wang , and Jie Yang . 2019 . Origin-sensitive control flow integrity . In USENIX Security Symposium. Mustakimur\u00a0Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, and Jie Yang. 2019. Origin-sensitive control flow integrity. In USENIX Security Symposium."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24386"},{"volume-title":"Return oriented programming for the ARM architecture. Master\u2019s thesis","author":"Kornau Tim","key":"e_1_3_2_1_29_1","unstructured":"Tim Kornau . 2009. Return oriented programming for the ARM architecture. Master\u2019s thesis . Ruhr-University Bochum . https\/\/zynamics.com\/downloads\/kornau-tim--diplomarbeit--rop.pdf Tim Kornau. 2009. Return oriented programming for the ARM architecture. Master\u2019s thesis. Ruhr-University Bochum. https\/\/zynamics.com\/downloads\/kornau-tim--diplomarbeit--rop.pdf"},{"key":"e_1_3_2_1_30_1","volume-title":"Keystone An Open Framework for Architecting Trusted Execution Environments. In European Conference on Computer Systems (EuroSys).","author":"Lee Dayeol","year":"2020","unstructured":"Dayeol Lee , David Kohlbrenner , Shweta Shinde , Krste Asanovic , and Dawn Song . 2020 . Keystone An Open Framework for Architecting Trusted Execution Environments. In European Conference on Computer Systems (EuroSys). Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanovic, and Dawn Song. 2020. Keystone An Open Framework for Architecting Trusted Execution Environments. In European Conference on Computer Systems (EuroSys)."},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Symposium.","author":"Liljestrand Hans","year":"2021","unstructured":"Hans Liljestrand , Thomas Nyman , Lachlan\u00a0 J Gunn , Jan-Erik Ekberg , and N Asokan . 2021 . PACStack an Authenticated Call Stack . In USENIX Security Symposium. Hans Liljestrand, Thomas Nyman, Lachlan\u00a0J Gunn, Jan-Erik Ekberg, and N Asokan. 2021. PACStack an Authenticated Call Stack. In USENIX Security Symposium."},{"key":"e_1_3_2_1_32_1","volume-title":"RISC-V high performance embedded SweRV\u2122 core microarchitecture, performance and CHIPS Alliance","author":"Marena Ted","year":"2019","unstructured":"Ted Marena . 2019. RISC-V high performance embedded SweRV\u2122 core microarchitecture, performance and CHIPS Alliance . Western Digital Corporation( 2019 ). Ted Marena. 2019. RISC-V high performance embedded SweRV\u2122 core microarchitecture, performance and CHIPS Alliance. Western Digital Corporation(2019)."},{"key":"e_1_3_2_1_33_1","unstructured":"nginx 2019. nginx. https\/\/nginx.org\/  nginx 2019. nginx. https\/\/nginx.org\/"},{"key":"e_1_3_2_1_34_1","volume-title":"Smashing the Gadgets Hindering Return-Oriented Programming Using In-place Code Randomization. In IEEE Symposium on Security and Privacy (S&P).","author":"Pappas Vasilis","year":"2012","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos\u00a0 D. Keromytis . 2012 . Smashing the Gadgets Hindering Return-Oriented Programming Using In-place Code Randomization. In IEEE Symposium on Security and Privacy (S&P). Vasilis Pappas, Michalis Polychronakis, and Angelos\u00a0D. Keromytis. 2012. Smashing the Gadgets Hindering Return-Oriented Programming Using In-place Code Randomization. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_35_1","volume-title":"Bratter An Instruction Set Extension for Forward Control-Flow Integrity in RISC-V. Sensors","author":"Park Seonghwan","year":"2022","unstructured":"Seonghwan Park , Dongwook Kang , Jeonghwan Kang , and Donghyun Kwon . 2022. Bratter An Instruction Set Extension for Forward Control-Flow Integrity in RISC-V. Sensors ( 2022 ). Seonghwan Park, Dongwook Kang, Jeonghwan Kang, and Donghyun Kwon. 2022. Bratter An Instruction Set Extension for Forward Control-Flow Integrity in RISC-V. Sensors (2022)."},{"key":"e_1_3_2_1_36_1","unstructured":"rizin 2020. rizin. https\/\/rizin.re\/  rizin 2020. rizin. https\/\/rizin.re\/"},{"key":"e_1_3_2_1_37_1","unstructured":"Jonathan Salwan. 2011. ROPgadget Tool. http\/\/shell-storm.org\/project\/ROPgadget\/  Jonathan Salwan. 2011. ROPgadget Tool. http\/\/shell-storm.org\/project\/ROPgadget\/"},{"key":"e_1_3_2_1_38_1","volume-title":"Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains. In European Symposium on Research in Computer Security (ESORICS).","author":"Schloegel Moritz","year":"2021","unstructured":"Moritz Schloegel , Tim Blazytko , Julius Basler , Fabian Hemmer , and Thorsten Holz . 2021 . Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains. In European Symposium on Research in Computer Security (ESORICS). Moritz Schloegel, Tim Blazytko, Julius Basler, Fabian Hemmer, and Thorsten Holz. 2021. Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains. In European Symposium on Research in Computer Security (ESORICS)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_40_1","volume-title":"USENIX Security Symposium.","author":"Schwartz J","year":"2011","unstructured":"Edward\u00a0 J Schwartz , Thanassis Avgerinos , and David Brumley . 2011 . Q Exploit hardening made easy . In USENIX Security Symposium. Edward\u00a0J Schwartz, Thanassis Avgerinos, and David Brumley. 2011. Q Exploit hardening made easy. In USENIX Security Symposium."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_43_1","volume-title":"Just-In-Time Code Reuse On the Effectiveness of Fine-Grained Address Space Layout Randomization. In IEEE Symposium on Security and Privacy (S&P).","author":"Snow Z.","year":"2013","unstructured":"Kevin\u00a0 Z. Snow , Fabian Monrose , Lucas Davi , Alexandra Dmitrienko , Christopher Liebchen , and Ahmad-Reza Sadeghi . 2013 . Just-In-Time Code Reuse On the Effectiveness of Fine-Grained Address Space Layout Randomization. In IEEE Symposium on Security and Privacy (S&P). Kevin\u00a0Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2013. Just-In-Time Code Reuse On the Effectiveness of Fine-Grained Address Space Layout Randomization. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_44_1","volume-title":"SoK Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P).","author":"Szekeres L\u00e1szl\u00f3","year":"2013","unstructured":"L\u00e1szl\u00f3 Szekeres , Mathias Payer , Tao Wei , and Dawn Song . 2013 . SoK Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P). L\u00e1szl\u00f3 Szekeres, Mathias Payer, Tao Wei, and Dawn Song. 2013. SoK Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_45_1","unstructured":"PaX Team. 2003. PaX non-executable pages design & implementation.https\/\/pax.grsecurity.net\/docs\/noexec.txt  PaX Team. 2003. PaX non-executable pages design & implementation.https\/\/pax.grsecurity.net\/docs\/noexec.txt"},{"key":"e_1_3_2_1_46_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium.","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"ACM Conference on Computer and Communications Security (CCS).","author":"Bulck Jo Van","year":"2019","unstructured":"Jo Van Bulck , David Oswald , Eduard Marin , Abdulla Aldoseri , Flavio\u00a0 D Garcia , and Frank Piessens . 2019 . A Tale of Two Worlds Assessing the Vulnerability of Enclave Shielding Runtimes . In ACM Conference on Computer and Communications Security (CCS). Jo Van Bulck, David Oswald, Eduard Marin, Abdulla Aldoseri, Flavio\u00a0D Garcia, and Frank Piessens. 2019. A Tale of Two Worlds Assessing the Vulnerability of Enclave Shielding Runtimes. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_48_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security.","author":"Veen Victor Van\u00a0der","year":"2015","unstructured":"Victor Van\u00a0der Veen , Dennis Andriesse , Enes G\u00f6kta\u015f , Ben Gras , Lionel Sambuc , Asia Slowinska , Herbert Bos , and Cristiano Giuffrida . 2015 . Practical context-sensitive CFI . In ACM SIGSAC Conference on Computer and Communications Security. Victor Van\u00a0der Veen, Dennis Andriesse, Enes G\u00f6kta\u015f, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida. 2015. Practical context-sensitive CFI. In ACM SIGSAC Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_49_1","volume-title":"Practical Control Flow Integrity and Randomization for Binary Executables. In IEEE Symposium on Security and Privacy (S&P).","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang , Tao Wei , Zhaofeng Chen , Lei Duan , L\u00e1szl\u00f3 Szekeres , Stephen McCamant , Dawn Song , and Wei Zou . 2013 . Practical Control Flow Integrity and Randomization for Binary Executables. In IEEE Symposium on Security and Privacy (S&P). Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, L\u00e1szl\u00f3 Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical Control Flow Integrity and Randomization for Binary Executables. In IEEE Symposium on Security and Privacy (S&P)."}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2022","location":"Limassol Cyprus"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:17Z","timestamp":1750188617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545997"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":48,"alternative-id":["10.1145\/3545948.3545997","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545997","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}