{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T17:36:03Z","timestamp":1762104963374,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2153748"],"award-info":[{"award-number":["2153748"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620666.3651342","type":"proceedings-article","created":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T12:08:21Z","timestamp":1713960501000},"page":"283-300","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enforcing C\/C++ Type and Scope at Runtime for Control-Flow and Data-Flow Integrity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2976-0532","authenticated-orcid":false,"given":"Mohannad","family":"Ismail","sequence":"first","affiliation":[{"name":"Bradley Department of Electrical &amp; Computer Engineering, Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8067-2151","authenticated-orcid":false,"given":"Christopher","family":"Jelesnianski","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical &amp; Computer Engineering, Virginia Tech, Blacksburg, VA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4368-9736","authenticated-orcid":false,"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6225-5357","authenticated-orcid":false,"given":"Changwoo","family":"Min","sequence":"additional","affiliation":[{"name":"Igalia, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7626-2651","authenticated-orcid":false,"given":"Wenjie","family":"Xiong","sequence":"additional","affiliation":[{"name":"Bradley Department of Electrical &amp; Computer Engineering, Virginia Tech, Blacksburg, VA, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apple LLVM. https:\/\/github.com\/apple\/swift-llvm."},{"key":"e_1_3_2_1_2_1","unstructured":"Llvm pointer authentication. https:\/\/llvm.org\/docs\/PointerAuth.html."},{"key":"e_1_3_2_1_3_1","unstructured":"PyTorch Benchmarks. https:\/\/github.com\/pytorch\/benchmark."},{"key":"e_1_3_2_1_4_1","volume-title":"18th USENIX Security Symposium (USENIX Security 09)","author":"Baggy","year":"2009","unstructured":"Baggy bounds checking: An efficient and Backwards-Compatible defense against Out-of-Bounds errors. In 18th USENIX Security Symposium (USENIX Security 09), Montreal, Quebec, August 2009. USENIX Association."},{"key":"e_1_3_2_1_5_1","unstructured":"Clang 13. ShadowCallStack 2021. https:\/\/clang.llvm.org\/docs\/ShadowCallStack.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"volume-title":"Apple Mac Mini M1","year":"2020","key":"e_1_3_2_1_8_1","unstructured":"Apple. Apple Mac Mini M1, 2020. https:\/\/www.apple.com\/shop\/buy-mac\/mac-mini\/apple-m1-chip-with-8-core-cpu-and-8-core-gpu-256gb."},{"volume-title":"Apple unleashes M1","year":"2020","key":"e_1_3_2_1_9_1","unstructured":"Apple. Apple unleashes M1, 2020. https:\/\/www.apple.com\/newsroom\/2020\/11\/apple-unleashes-m1\/."},{"volume-title":"Operating system integrity","year":"2021","key":"e_1_3_2_1_10_1","unstructured":"Apple. Operating system integrity, 2021. https:\/\/support.apple.com\/en-hk\/guide\/security\/sec8b776536b\/1\/web."},{"key":"e_1_3_2_1_11_1","unstructured":"Arm. Fixed Virtual Platforms. https:\/\/developer.arm.com\/tools-and-software\/simulation-models\/fixed-virtual-platforms."},{"volume-title":"Top Byte Ignore","year":"2018","key":"e_1_3_2_1_12_1","unstructured":"Arm. Top Byte Ignore, 2018. https:\/\/en.wikichip.org\/wiki\/arm\/tbi."},{"key":"e_1_3_2_1_13_1","unstructured":"Arm. PACBTI 2020. https:\/\/community.arm.com\/arm-community-blogs\/b\/architectures-and-processors-blog\/posts\/armv8-1-m-pointer-authentication-and-branch-target-identification-extension."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_15_1","first-page":"30","volume-title":"Zhenkai Liang. Jump-Oriented Programming: A New Class of Code-Reuse Attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS)","author":"Bletsch Tyler","year":"2011","unstructured":"Tyler Bletsch, Xuxian Jiang, Vince W. Freeh, and Zhenkai Liang. Jump-Oriented Programming: A New Class of Code-Reuse Attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS), page 30--40, Hong Kong, China, March 2011."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"e_1_3_2_1_17_1","volume-title":"Control-flow integrity: Precision, security, and performance. ACM Computing Surveys (CSUR), 50(1):16","author":"Burow Nathan","year":"2017","unstructured":"Nathan Burow, Scott A Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, and Mathias Payer. Control-flow integrity: Precision, security, and performance. ACM Computing Surveys (CSUR), 50(1):16, 2017."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23279"},{"key":"e_1_3_2_1_19_1","volume-title":"Thomas R Gross. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proceedings of the 24th USENIX Security Symposium (Security)","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R Gross. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proceedings of the 24th USENIX Security Symposium (Security), Washington, DC, August 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (Security)","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner. Rop is still dangerous: Breaking modern defenses. In Proceedings of the 23rd USENIX Security Symposium (Security), San Diego, CA, August 2014."},{"key":"e_1_3_2_1_21_1","first-page":"193","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17","author":"Scott","year":"2017","unstructured":"Scott A. Carr and Mathias Payer. Datashield: Configurable data confidentiality and integrity. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17, page 193--204, New York, NY, USA, 2017. Association for Computing Machinery."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298470"},{"key":"e_1_3_2_1_23_1","volume-title":"14th USENIX Security Symposium (USENIX Security 05)","author":"Chen Shuo","year":"2005","unstructured":"Shuo Chen, Jun Xu, and Emre C. Sezer. Non-Control-Data attacks are realistic threats. In 14th USENIX Security Symposium (USENIX Security 05), Baltimore, MD, July 2005. USENIX Association."},{"key":"e_1_3_2_1_24_1","volume-title":"14th USENIX Security Symposium (USENIX Security 05)","author":"Chen Shuo","year":"2005","unstructured":"Shuo Chen, Jun Xu, and Emre C. Sezer. Non-Control-Data attacks are realistic threats. In 14th USENIX Security Symposium (USENIX Security 05), Baltimore, MD, July 2005. USENIX Association."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_26_1","volume-title":"12th USENIX Security Symposium (USENIX Security 03)","author":"Cowan Crispin","year":"2003","unstructured":"Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. Point-Guard\u2122: Protecting pointers from buffer overflow vulnerabilities. In 12th USENIX Security Symposium (USENIX Security 03), Washington, D.C., August 2003. USENIX Association."},{"key":"e_1_3_2_1_27_1","volume-title":"TRaP: Table Randomization and Protection Against Function-reuse Attacks. In Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland)","author":"Crane Stephen J","year":"2015","unstructured":"Stephen J Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, and Michael Franz. It's a TRaP: Table Randomization and Protection Against Function-reuse Attacks. In Proceedings of the 36th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, May 2015."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (Security)","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, and Fabian Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In Proceedings of the 23rd USENIX Security Symposium (Security), San Diego, CA, August 2014."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_30_1","first-page":"144","volume-title":"Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '06","author":"Dhurjati Dinakar","year":"2006","unstructured":"Dinakar Dhurjati, Sumant Kowshik, and Vikram Adve. Safecode: Enforcing alias analysis for weakly typed languages. In Proceedings of the 27th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '06, page 144--157, New York, NY, USA, 2006. Association for Computing Machinery."},{"key":"e_1_3_2_1_31_1","first-page":"131","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Ding Ren","year":"2017","unstructured":"Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. Efficient protection of path-sensitive control security. In Proceedings of the 26th USENIX Security Symposium (Security), pages 131--148, Vancouver, BC, Canada, August 2017."},{"key":"e_1_3_2_1_32_1","first-page":"181","volume-title":"Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2018","author":"Gregory","year":"2018","unstructured":"Gregory J. Duck and Roland H. C. Yap. Effectivesan: Type and memory error detection using dynamically typed c\/c++. In Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2018, page 181--195, New York, NY, USA, 2018. Association for Computing Machinery."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_34_1","first-page":"901","volume-title":"Stelios Sidiroglou-Douskos. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS)","author":"Evans Isaac","year":"2015","unstructured":"Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard Shrobe, Martin Rinard, Hamed Okhravi, and Stelios Sidiroglou-Douskos. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), page 901--913, Denver, Colorado, October 2015."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037716"},{"key":"e_1_3_2_1_36_1","volume-title":"a HTTP benchmarking tool","author":"Glozer Will","year":"2019","unstructured":"Will Glozer. a HTTP benchmarking tool, 2019. https:\/\/github.com\/wg\/wrk."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","author":"Grossklags Jens","year":"2018","unstructured":"Jens Grossklags and Claudia Eckert. \u03c4CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. In Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Heraklion, Crete, Greece, September 2018."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813611"},{"key":"e_1_3_2_1_41_1","volume-title":"September","author":"Henning John L.","year":"2006","unstructured":"John L. Henning. Spec cpu2006 benchmark descriptions. SIGARCH Comput. Archit. News, 34(4):1--17, September 2006."},{"key":"e_1_3_2_1_42_1","volume-title":"Pacsafe: Leveraging arm pointer authentication for memory safety in c\/c++","author":"Hohentanner Konrad","year":"2022","unstructured":"Konrad Hohentanner, Philipp Zieris, and Julian Horsch. Pacsafe: Leveraging arm pointer authentication for memory safety in c\/c++, 2022."},{"key":"e_1_3_2_1_43_1","volume-title":"Wenke Lee. Enforcing Unique Code Target Property for Control-Flow Integrity. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS)","author":"Hu Hong","year":"2018","unstructured":"Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, and Wenke Lee. Enforcing Unique Code Target Property for Control-Flow Integrity. In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS), Toronto, ON, Canada, October 2018."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_1_45_1","volume-title":"Pointer Authentication on ARMv8.3","author":"Qualcomm Technologies Inc.","year":"2017","unstructured":"Qualcomm Technologies Inc. Pointer Authentication on ARMv8.3, 2017. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf."},{"volume-title":"Support for Intel\u00ae Memory Protection Extensions (Intel\u00ae MPX) Technology","year":"2015","key":"e_1_3_2_1_46_1","unstructured":"Intel. Support for Intel\u00ae Memory Protection Extensions (Intel\u00ae MPX) Technology, 2015. https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000059823\/processors.html."},{"key":"e_1_3_2_1_47_1","first-page":"3717","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Ismail Mohannad","year":"2022","unstructured":"Mohannad Ismail, Andrew Quach, Christopher Jelesnianski, Yeongjin Jang, and Changwoo Min. Tightly seal your sensitive pointers with PACTight. In 31st USENIX Security Symposium (USENIX Security 22), pages 3717--3734, Boston, MA, August 2022. USENIX Association."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485376"},{"key":"e_1_3_2_1_49_1","volume-title":"x86 NX support","author":"Corbet Jonathan","year":"2004","unstructured":"Jonathan Corbet. x86 NX support, 2004. https:\/\/lwn.net\/Articles\/87814\/."},{"key":"e_1_3_2_1_50_1","volume-title":"Jie Yang. Origin-sensitive Control Flow Integrity. In Proceedings of the 28th USENIX Security Symposium (Security)","author":"Khandaker Mustakimur Rahman","year":"2019","unstructured":"Mustakimur Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, and Jie Yang. Origin-sensitive Control Flow Integrity. In Proceedings of the 28th USENIX Security Symposium (Security), Santa Clara, CA, August 2019."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00095"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_53_1","volume-title":"Dawn Song. Code-Pointer Integrity. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, R Sekar, and Dawn Song. Code-Pointer Integrity. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, Colorado, October 2014."},{"key":"e_1_3_2_1_54_1","first-page":"1901","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS '22","author":"Li Yuan","year":"2022","unstructured":"Yuan Li, Wende Tan, Zhizheng Lv, Songtao Yang, Mathias Payer, Ying Liu, and Chao Zhang. Pacmem: Enforcing spatial and temporal memory safety via arm pointer authentication. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS '22, page 1901--1915, New York, NY, USA, 2022. Association for Computing Machinery."},{"key":"e_1_3_2_1_55_1","first-page":"177","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security)","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, and N. Asokan. PAC it up: Towards pointer integrity using ARM pointer authentication. In Proceedings of the 28th USENIX Security Symposium (Security), pages 177--194, Santa Clara, CA, August 2019."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.18"},{"key":"e_1_3_2_1_57_1","volume-title":"Flexible and efficient memory object metadata. page 36--46, jun","author":"Liu Zhengyang","year":"2017","unstructured":"Zhengyang Liu and John Criswell. Flexible and efficient memory object metadata. page 36--46, jun 2017."},{"key":"e_1_3_2_1_58_1","volume-title":"David Mazi\u00e8res. CCFI: Cryptographically Enforced Control Flow Integrity. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS)","author":"Mashtizadeh Ali Jose","year":"2015","unstructured":"Ali Jose Mashtizadeh, Andrea Bittau, Dan Boneh, and David Mazi\u00e8res. CCFI: Cryptographically Enforced Control Flow Integrity. In Proceedings of the 22nd ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, October 2015."},{"key":"e_1_3_2_1_59_1","unstructured":"Uwe Mayer. Linux\/Unix nbench 2017. https:\/\/www.math.utah.edu\/~mayer\/linux\/bmark.html."},{"key":"e_1_3_2_1_60_1","volume-title":"NGINX Plus Sizing Guide: How We Tested","author":"Memon Faisal","year":"2016","unstructured":"Faisal Memon. NGINX Plus Sizing Guide: How We Tested, 2016. https:\/\/www.nginx.com\/blog\/nginx-plus-sizing-guide-how-we-tested\/."},{"key":"e_1_3_2_1_61_1","volume-title":"Windows XP Tablet PC Edition","author":"Support Microsoft","year":"2005","unstructured":"Microsoft Support. A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition 2005, and Windows Server 2003, 2017. https:\/\/support.microsoft.com\/en-us\/help\/875352\/a-detailed-description-of-the-data-execution-prevention-dep-feature-in."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833675"},{"key":"e_1_3_2_1_63_1","volume-title":"1st Summit on Advances in Programming Languages (SNAPL","author":"Nagarakatte Santosh","year":"2015","unstructured":"Santosh Nagarakatte, Milo MK Martin, and Steve Zdancewic. Everything you want to know about pointer-based checking. In 1st Summit on Advances in Programming Languages (SNAPL 2015). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2015."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_1_66_1","volume-title":"Angelos D Keromytis. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In Proceedings of the 22th USENIX Security Symposium (Security)","author":"Pappas Vasilis","year":"2013","unstructured":"Vasilis Pappas, Michalis Polychronakis, and Angelos D Keromytis. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In Proceedings of the 22th USENIX Security Symposium (Security), Washington, DC, August 2013."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527429"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23477"},{"key":"e_1_3_2_1_70_1","volume-title":"Ropgadget: Gadgets finder and auto-roper","author":"Salwan Jonathan","year":"2019","unstructured":"Jonathan Salwan. Ropgadget: Gadgets finder and auto-roper, 2019. https:\/\/github.com\/JonathanSalwan\/ROPgadget."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.16"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-140502"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_74_1","volume-title":"Ahmad-Reza Sadeghi. Just-in-time Code Reuse: On the Effectiveness of Fine-grained Address Space Layout Randomization. In Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland)","author":"Snow Kevin Z","year":"2013","unstructured":"Kevin Z Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. Just-in-time Code Reuse: On the Effectiveness of Fine-grained Address Space Layout Randomization. In Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, May 2013."},{"key":"e_1_3_2_1_75_1","volume-title":"Yunheung Pack. HDFI: Hardware-Assisted Data-flow Isolation. In Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland)","author":"Song Chengyu","year":"2016","unstructured":"Chengyu Song, Hyungon Moon, Monjur Alam, Insu Yun, Byoungyoung Lee, Taesoo Kim, Wenke Lee, and Yunheung Pack. HDFI: Hardware-Assisted Data-flow Isolation. In Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland), San Jose, CA, May 2016."},{"key":"e_1_3_2_1_76_1","volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland)","author":"Szekeres Laszlo","year":"2013","unstructured":"Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. Sok: Eternal war in memory. In Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, May 2013."},{"key":"e_1_3_2_1_77_1","volume-title":"Clang 10 documentation: CONTROL FLOW INTEGRITY","author":"Team The Clang","year":"2019","unstructured":"The Clang Team. Clang 10 documentation: CONTROL FLOW INTEGRITY, 2019. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html."},{"key":"e_1_3_2_1_78_1","volume-title":"Geoff Pike. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In Proceedings of the 23rd USENIX Security Symposium (Security)","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In Proceedings of the 23rd USENIX Security Symposium (Security), San Diego, CA, August 2014."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274705"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134026"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665740"},{"key":"e_1_3_2_1_84_1","first-page":"89","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Yoo Sungbae","year":"2022","unstructured":"Sungbae Yoo, Jinbum Park, Seolheui Kim, Yeji Kim, and Taesoo Kim. In-Kernel Control-Flow integrity on commodity OSes using ARM pointer authentication. In 31st USENIX Security Symposium (USENIX Security 22), pages 89--106, Boston, MA, August 2022. USENIX Association."},{"key":"e_1_3_2_1_85_1","volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland)","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. Practical control flow integrity and randomization for binary executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland), San Francisco, CA, May 2013."},{"key":"e_1_3_2_1_86_1","volume-title":"Zhang and R Sekar. Control Flow Integrity for COTS Binaries. In Proceedings of the 22th USENIX Security Symposium (Security)","author":"Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar. Control Flow Integrity for COTS Binaries. In Proceedings of the 22th USENIX Security Symposium (Security), Washington, DC, August 2013."},{"key":"e_1_3_2_1_87_1","first-page":"631","volume-title":"Proceedings of the 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Zhang Tong","year":"2019","unstructured":"Tong Zhang, Dongyoon Lee, and Changhee Jung. BOGO: Buy Spatial Memory Safety, Get Temporal Memory Safety (Almost) Free. In Proceedings of the 24th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), page 631--644, Providence, RI, April 2019."}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"La Jolla CA USA","acronym":"ASPLOS '24"},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620666.3651342","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3620666.3651342","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:43Z","timestamp":1750291423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620666.3651342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":87,"alternative-id":["10.1145\/3620666.3651342","10.1145\/3620666"],"URL":"https:\/\/doi.org\/10.1145\/3620666.3651342","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}