{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T18:36:00Z","timestamp":1763058960401,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,10]],"date-time":"2023-09-10T00:00:00Z","timestamp":1694304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,10]]},"DOI":"10.1145\/3609021.3609293","type":"proceedings-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T17:13:20Z","timestamp":1692378800000},"page":"84-85","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Practical and Flexible Kernel CFI Enforcement using eBPF"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0837-4677","authenticated-orcid":false,"given":"Jinghao","family":"Jia","sequence":"first","affiliation":[{"name":"IBM Research, Yorktown Heights, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5000-6393","authenticated-orcid":false,"given":"Michael V.","family":"Le","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0290-5367","authenticated-orcid":false,"given":"Salman","family":"Ahmed","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1537-0525","authenticated-orcid":false,"given":"Dan","family":"Williams","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, United States of America"},{"name":"IBM Research, Yorktown Heights, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6143-1064","authenticated-orcid":false,"given":"Hani","family":"Jamjoom","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Control-Flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security.","author":"Abadi Mart\u00edn","year":"2005","unstructured":"Mart\u00edn Abadi , Mihai Budiu , \u00dalfar Erlingsson , and Jay Ligatti . 2005 . Control-Flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security. Mart\u00edn Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. 2005. Control-Flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_2_1","volume-title":"KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. In 2014 IEEE Symposium on Security and Privacy.","author":"Criswell John","year":"2014","unstructured":"John Criswell , Nathan Dautenhahn , and Vikram Adve . 2014 . KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. In 2014 IEEE Symposium on Security and Privacy. John Criswell, Nathan Dautenhahn, and Vikram Adve. 2014. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. In 2014 IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_3_1","volume-title":"Efficient Protection of Path-Sensitive Control Security. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Ding Ren","year":"2017","unstructured":"Ren Ding , Chenxiong Qian , Chengyu Song , Bill Harris , Taesoo Kim , and Wenke Lee . 2017 . Efficient Protection of Path-Sensitive Control Security. In 26th USENIX Security Symposium (USENIX Security 17) . Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. 2017. Efficient Protection of Path-Sensitive Control Security. In 26th USENIX Security Symposium (USENIX Security 17)."},{"key":"e_1_3_2_1_4_1","volume-title":"Return to Sender - Detecting Kernel Exploits with eBPF. https:\/\/i.blackhat.com\/USA-22\/Wednesday\/US-22-Fournier-Return-To-Sender.pdf. (2022). Accessed","author":"Fournier Guillaume","year":"2023","unstructured":"Guillaume Fournier . 2022. Return to Sender - Detecting Kernel Exploits with eBPF. https:\/\/i.blackhat.com\/USA-22\/Wednesday\/US-22-Fournier-Return-To-Sender.pdf. (2022). Accessed 2023 . Guillaume Fournier. 2022. Return to Sender - Detecting Kernel Exploits with eBPF. https:\/\/i.blackhat.com\/USA-22\/Wednesday\/US-22-Fournier-Return-To-Sender.pdf. (2022). Accessed 2023."},{"key":"e_1_3_2_1_5_1","volume-title":"Fine-Grained Control-Flow Integrity for Kernel Software. In IEEE European Symposium on Security and Privacy.","author":"Ge Xinyang","year":"2016","unstructured":"Xinyang Ge , Nirupama Talele , Mathias Payer , and Trent Jaeger . 2016 . Fine-Grained Control-Flow Integrity for Kernel Software. In IEEE European Symposium on Security and Privacy. Xinyang Ge, Nirupama Talele, Mathias Payer, and Trent Jaeger. 2016. Fine-Grained Control-Flow Integrity for Kernel Software. In IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"e_1_3_2_1_7_1","volume-title":"Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels","author":"Li Jinku","year":"2018","unstructured":"Jinku Li , Xiaomeng Tong , Fengwei Zhang , and Jianfeng Ma. 2018. Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels . IEEE Transactions on Information Forensics and Security ( 2018 ). Jinku Li, Xiaomeng Tong, Fengwei Zhang, and Jianfeng Ma. 2018. Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels. IEEE Transactions on Information Forensics and Security (2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"Control Flow Integrity Design Documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrityDesign.html. (2023). Accessed","author":"LLVM.","year":"2023","unstructured":"LLVM. 2023. Control Flow Integrity Design Documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrityDesign.html. (2023). Accessed 2023 . LLVM. 2023. Control Flow Integrity Design Documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrityDesign.html. (2023). Accessed 2023."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"}],"event":{"name":"eBPF '23: 1st Workshop on eBPF and Kernel Extensions","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"New York NY USA","acronym":"eBPF '23"},"container-title":["Proceedings of the 1st Workshop on eBPF and Kernel Extensions"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609021.3609293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:57Z","timestamp":1750182537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609021.3609293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,10]]},"references-count":9,"alternative-id":["10.1145\/3609021.3609293","10.1145\/3609021"],"URL":"https:\/\/doi.org\/10.1145\/3609021.3609293","relation":{},"subject":[],"published":{"date-parts":[[2023,9,10]]},"assertion":[{"value":"2023-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}