{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:57:52Z","timestamp":1773154672055,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678920","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"419-434","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Integrating Static Analyses for High-Precision Control-Flow Integrity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1649-3127","authenticated-orcid":false,"given":"Florian","family":"Kasten","sequence":"first","affiliation":[{"name":"Fraunhofer AISEC, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9658-1572","authenticated-orcid":false,"given":"Philipp","family":"Zieris","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9018-7048","authenticated-orcid":false,"given":"Julian","family":"Horsch","sequence":"additional","affiliation":[{"name":"Fraunhofer AISEC, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"e_1_3_2_1_3_1","volume-title":"Program analysis and specialization for the C programming language. Ph.\u00a0D. Dissertation","author":"Andersen Lars\u00a0Ole","unstructured":"Lars\u00a0Ole Andersen. 1994. Program analysis and specialization for the C programming language. Ph.\u00a0D. Dissertation. University of Copenhagen."},{"key":"e_1_3_2_1_4_1","unstructured":"Android Open Source Project. 2023. Control Flow Integrity. https:\/\/source.android.com\/devices\/tech\/debug\/cfi"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_1_9_1","volume-title":"24th USENIX Security Symposium USENIX Security 15)","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas\u00a0R Gross. 2015. Control-flow bending: On the effectiveness of control-flow integrity. In 24th USENIX Security Symposium USENIX Security 15). 161\u2013176."},{"key":"e_1_3_2_1_10_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner. 2014. ROP is still dangerous: Breaking modern defenses. In 23rd USENIX Security Symposium (USENIX Security 14). 385\u2013399."},{"key":"e_1_3_2_1_11_1","unstructured":"Chrome. [n. d.]. Control Flow Integrity. https:\/\/www.chromium.org\/developers\/testing\/control-flow-integrity"},{"key":"e_1_3_2_1_12_1","unstructured":"Chrome security team. 2020. Memory safety. https:\/\/www.chromium.org\/Home\/chromium-security\/memory-safety\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Clang. [n. d.]. Control Flow Integrity Design Documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrityDesign.html"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.24"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_17_1","unstructured":"John Henning. 2022. SPEC CPU\u00ae2017 Overview. https:\/\/www.spec.org\/cpu2017\/Docs\/overview.html"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"e_1_3_2_1_19_1","unstructured":"John Kennedy Kent Sharkey David Coulter Drew Batchelor Nicholas Adman Erik Swan Mike Jacobs and Michael Satran. 2022. Control Flow Guard. Microsoft. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard"},{"key":"e_1_3_2_1_20_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Khandaker Mustakimur\u00a0Rahman","year":"2019","unstructured":"Mustakimur\u00a0Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, and Jie Yang. 2019. Origin-sensitive control flow integrity. In 28th USENIX Security Symposium (USENIX Security 19). 195\u2013211."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11688839_5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/318774.318943"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354244"},{"key":"e_1_3_2_1_24_1","unstructured":"Microsoft. 2019. A proactive approach to more secure code. https:\/\/msrc.microsoft.com\/blog\/2019\/07\/a-proactive-approach-to-more-secure-code\/"},{"key":"e_1_3_2_1_25_1","unstructured":"MITRE. 2023. 2022 CWE Top 25 Most Dangerous Software Weaknesses. MITRE. https:\/\/cwe.mitre.org\/top25\/archive\/2022\/2022_cwe_top25.html"},{"key":"e_1_3_2_1_26_1","unstructured":"Ingo Molnar and Arjan van\u00a0de Ven. 2004. New Security Enhancements in Red Hat Enterprise Linux. https:\/\/static.redhat.com\/legacy\/f\/pdf\/rhel\/WHP0006US_Execshield.pdf"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508275"},{"key":"e_1_3_2_1_28_1","unstructured":"[28] Nginx. 2024. http:\/\/nginx.org\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594295"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_1_31_1","unstructured":"Baiju Patel. [n. d.]. A Technical Look at Intel\u2019s Control-flow Enforcement Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/technical-look-control-flow-enforcement-technology.html"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1290520.1290524"},{"key":"e_1_3_2_1_33_1","unstructured":"[33] Redis. 2024. https:\/\/github.com\/redis\/redis."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/345099.345137"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337175"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_38_1","unstructured":"The White House. 2024. Back to the Building Blocks: A Path Towards Secure and Measurable Software. https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2024\/02\/Final-ONCD-Technical-Report.pdf"},{"key":"e_1_3_2_1_39_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 941\u2013955. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/tice"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy","acronym":"RAID '24"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678920","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678920"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":41,"alternative-id":["10.1145\/3678890.3678920","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678920","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}