{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:23:21Z","timestamp":1759332201916,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3564627","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"346-360","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["TyPro: Forward CFI for C-Style Indirect Function Calls Using Type Propagation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1609-3726","authenticated-orcid":false,"given":"Markus","family":"Bauer","sequence":"first","affiliation":[{"name":"CISPA \u2013 Helmholtz Center for Information Security, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4744-7507","authenticated-orcid":false,"given":"Ilya","family":"Grishchenko","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2470-8444","authenticated-orcid":false,"given":"Christian","family":"Rossow","sequence":"additional","affiliation":[{"name":"CISPA \u2013 Helmholtz Center for Information Security, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00049"},{"volume-title":"Horn clause solvers for program verification","author":"Bj\u00f8rner Nikolaj","key":"e_1_3_2_1_3_1","unstructured":"Nikolaj Bj\u00f8rner , Arie Gurfinkel , Ken McMillan , and Andrey Rybalchenko . 2015. Horn clause solvers for program verification . In Fields of Logic and Computation II. Springer , 24\u201351. Nikolaj Bj\u00f8rner, Arie Gurfinkel, Ken McMillan, and Andrey Rybalchenko. 2015. Horn clause solvers for program verification. In Fields of Logic and Computation II. Springer, 24\u201351."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23421"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23279"},{"key":"e_1_3_2_1_7_1","volume-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas\u00a0 R. Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 161\u2013176. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/carlini Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas\u00a0R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 161\u2013176. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/carlini"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_10_1","volume-title":"Efficient Protection of Path-Sensitive Control Security. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Ding Ren","year":"2017","unstructured":"Ren Ding , Chenxiong Qian , Chengyu Song , Bill Harris , Taesoo Kim , and Wenke Lee . 2017 . Efficient Protection of Path-Sensitive Control Security. In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association, Vancouver, BC, 131\u2013148. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/ding Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. 2017. Efficient Protection of Path-Sensitive Control Security. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 131\u2013148. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/ding"},{"key":"e_1_3_2_1_11_1","volume-title":"Protecting from stack smashing attacks. (01","author":"Etoh Hiroaki","year":"2000","unstructured":"Hiroaki Etoh and Kunikazu Yoda . 2000. Protecting from stack smashing attacks. (01 2000 ). Hiroaki Etoh and Kunikazu Yoda. 2000. Protecting from stack smashing attacks. (01 2000)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092729"},{"key":"e_1_3_2_1_14_1","volume-title":"Datalog Disassembly. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Flores-Montoya Antonio","year":"2020","unstructured":"Antonio Flores-Montoya and Eric Schulte . 2020 . Datalog Disassembly. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 1075\u20131092. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/flores-montoya Antonio Flores-Montoya and Eric Schulte. 2020. Datalog Disassembly. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1075\u20131092. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/flores-montoya"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037716"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"e_1_3_2_1_17_1","unstructured":"HardenedBSD. 2022. HardenedBSD - Introducing CFI. https:\/\/hardenedbsd.org\/article\/shawn-webb\/2017-03-02\/introducing-cfi  HardenedBSD. 2022. HardenedBSD - Introducing CFI. https:\/\/hardenedbsd.org\/article\/shawn-webb\/2017-03-02\/introducing-cfi"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2307\/2268661"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"e_1_3_2_1_20_1","unstructured":"Intel. 2021. Intel\u00ae Architecture Instruction Set Extensions and Future Features. https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/download\/intel-architecture-instruction-set-extensions-programming-reference.html  Intel. 2021. Intel\u00ae Architecture Instruction Set Extensions and Future Features. https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/download\/intel-architecture-instruction-set-extensions-programming-reference.html"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23287"},{"key":"e_1_3_2_1_22_1","volume-title":"Souffl\u00e9: On Synthesis of Program Analyzers","author":"Jordan Herbert","year":"2016","unstructured":"Herbert Jordan , Bernhard Scholz , and Pavle Suboti\u0107 . 2016 . Souffl\u00e9: On Synthesis of Program Analyzers . In Computer Aided Verification, Swarat Chaudhuri and Azadeh Farzan (Eds.). Springer International Publishing , Cham , 422\u2013430. Herbert Jordan, Bernhard Scholz, and Pavle Suboti\u0107. 2016. Souffl\u00e9: On Synthesis of Program Analyzers. In Computer Aided Verification, Swarat Chaudhuri and Azadeh Farzan (Eds.). Springer International Publishing, Cham, 422\u2013430."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00017"},{"key":"e_1_3_2_1_24_1","volume-title":"Origin-sensitive Control Flow Integrity. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Khandaker Mustakimur\u00a0Rahman","year":"2019","unstructured":"Mustakimur\u00a0Rahman Khandaker , Wenqing Liu , Abu Naser , Zhi Wang , and Jie Yang . 2019 . Origin-sensitive Control Flow Integrity. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 195\u2013211. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/khandaker Mustakimur\u00a0Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, and Jie Yang. 2019. Origin-sensitive Control Flow Integrity. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 195\u2013211. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/khandaker"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417867"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354244"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"key":"e_1_3_2_1_28_1","unstructured":"Microsoft. 2022. Control Flow Guard - Win32 apps. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard  Microsoft. 2022. Control Flow Guard - Win32 apps. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AUSE.0000008666.56394.a1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.00016"},{"key":"e_1_3_2_1_31_1","unstructured":"M.\u00a0R. Miller and K.\u00a0D. Johnson. 2012. Using virtual table protections to prevent the exploitation of object corruption vulnerabilities. Patent number US 2012\/0144480 A1.  M.\u00a0R. Miller and K.\u00a0D. Johnson. 2012. Using virtual table protections to prevent the exploitation of object corruption vulnerabilities. Patent number US 2012\/0144480 A1."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23271"},{"key":"e_1_3_2_1_33_1","volume-title":"Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. In Symposium on Research in Attacks, Intrusion, and Defenses (RAID)","author":"Muench Marius","year":"2016","unstructured":"Marius Muench , Fabio Pagani , Yan Shoshitaishvili , Christopher Kruegel , Giovanni Vigna , and Davide Balzarotti . 2016 . Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. In Symposium on Research in Attacks, Intrusion, and Defenses (RAID) ( Paris) (RAID 16). Springer. Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, and Davide Balzarotti. 2016. Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. In Symposium on Research in Attacks, Intrusion, and Defenses (RAID) (Paris) (RAID 16). Springer."},{"key":"e_1_3_2_1_34_1","unstructured":"musl authors. 2022. musl libc. https:\/\/musl.libc.org\/  musl authors. 2022. musl libc. https:\/\/musl.libc.org\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_1_38_1","unstructured":"Baiju\u00a0V Patel. 2020. A Technical Look at Intel\u2019s Control-flow Enforcement Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/technical-look-control-flow-enforcement-technology.html  Baiju\u00a0V Patel. 2020. A Technical Look at Intel\u2019s Control-flow Enforcement Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/technical-look-control-flow-enforcement-technology.html"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"e_1_3_2_1_40_1","unstructured":"Redis Authors. 2022. Redis benchmark. https:\/\/redis.io\/docs\/reference\/optimization\/benchmarks\/  Redis Authors. 2022. Redis benchmark. https:\/\/redis.io\/docs\/reference\/optimization\/benchmarks\/"},{"key":"e_1_3_2_1_41_1","unstructured":"Giampaolo Rodola. 2016. pyftpdlib\/ftpbench. https:\/\/github.com\/giampaolo\/pyftpdlib\/blob\/master\/scripts\/ftpbench  Giampaolo Rodola. 2016. pyftpdlib\/ftpbench. https:\/\/github.com\/giampaolo\/pyftpdlib\/blob\/master\/scripts\/ftpbench"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892226"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337175"},{"key":"e_1_3_2_1_44_1","volume-title":"Exploiting and Protecting Dynamic Code Generation. In NDSS Symposium 2015","author":"Song Chengyu","year":"2015","unstructured":"Chengyu Song , Chao Zhang , Tielei Wang , Wenke Lee , and David Melski . 2015 . Exploiting and Protecting Dynamic Code Generation. In NDSS Symposium 2015 . https:\/\/doi.org\/0.14722\/ndss.2015.23233 Chengyu Song, Chao Zhang, Tielei Wang, Wenke Lee, and David Melski. 2015. Exploiting and Protecting Dynamic Code Generation. In NDSS Symposium 2015. https:\/\/doi.org\/0.14722\/ndss.2015.23233"},{"key":"e_1_3_2_1_45_1","unstructured":"Standard Performance Evaluation Corporation. 2020. SPEC CPU\u00ae 2006. https:\/\/www.spec.org\/cpu2006\/  Standard Performance Evaluation Corporation. 2020. SPEC CPU\u00ae 2006. https:\/\/www.spec.org\/cpu2006\/"},{"key":"e_1_3_2_1_46_1","unstructured":"The apache software foundation. 2022. ab - Apache HTTP server benchmarking tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html  The apache software foundation. 2022. ab - Apache HTTP server benchmarking tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html"},{"key":"e_1_3_2_1_47_1","unstructured":"The Clang Team. 2021. Control Flow Integrity - Clang 13 documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html  The Clang Team. 2021. Control Flow Integrity - Clang 13 documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html"},{"key":"e_1_3_2_1_48_1","unstructured":"The Clang Team. 2022. Introduction to the Clang AST - Clang 13 documentation. https:\/\/clang.llvm.org\/docs\/IntroductionToTheClangAST.html  The Clang Team. 2022. Introduction to the Clang AST - Clang 13 documentation. https:\/\/clang.llvm.org\/docs\/IntroductionToTheClangAST.html"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671285"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274705"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"volume-title":"Stack Shield: A \"stack smashing\" technique protection tool for Linux","year":"2000","key":"e_1_3_2_1_53_1","unstructured":"Vendicator. 2000 . Stack Shield: A \"stack smashing\" technique protection tool for Linux . http:\/\/www.angelfire.com\/sk\/stackshield\/ Vendicator. 2000. Stack Shield: A \"stack smashing\" technique protection tool for Linux. http:\/\/www.angelfire.com\/sk\/stackshield\/"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263958"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218424"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"volume-title":"Control Flow Integrity for COTS Binaries. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Zhang Mingwei","key":"e_1_3_2_1_57_1","unstructured":"Mingwei Zhang and R. Sekar . 2013 . Control Flow Integrity for COTS Binaries. In 22nd USENIX Security Symposium (USENIX Security 13) . USENIX Association, Washington, D.C., 337\u2013352. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/Zhang Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In 22nd USENIX Security Symposium (USENIX Security 13). USENIX Association, Washington, D.C., 337\u2013352. https:\/\/www.usenix.org\/conference\/usenixsecurity13\/technical-sessions\/presentation\/Zhang"},{"key":"e_1_3_2_1_58_1","unstructured":"Mingqiang Zhuang and Brian Aker. 2022. memaslap - Load testing and benchmarking a server. http:\/\/docs.libmemcached.org\/bin\/memaslap.html  Mingqiang Zhuang and Brian Aker. 2022. memaslap - Load testing and benchmarking a server. http:\/\/docs.libmemcached.org\/bin\/memaslap.html"}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","acronym":"ACSAC","location":"Austin TX USA"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3564627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:11Z","timestamp":1750183751000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":58,"alternative-id":["10.1145\/3564625.3564627","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3564627","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}