{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T10:00:26Z","timestamp":1740132026087,"version":"3.37.3"},"reference-count":45,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602469","U1836211"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002367","name":"Fundamental Theory and Cutting Edge Technology Research Program of Institute of Information Engineering, CAS","doi-asserted-by":"publisher","award":["Y7Z0411105"],"id":[{"id":"10.13039\/501100002367","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst."],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1109\/tcad.2020.3012640","type":"journal-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T20:24:18Z","timestamp":1601670258000},"page":"3165-3176","source":"Crossref","is-referenced-by-count":14,"title":["ABCFI: Fast and Lightweight Fine-Grained Hardware-Assisted Control-Flow Integrity"],"prefix":"10.1109","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4115-1369","authenticated-orcid":false,"given":"Jinfeng","family":"Li","sequence":"first","affiliation":[]},{"given":"Liwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5624-2987","authenticated-orcid":false,"given":"Kai","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The rocket chip generator","year":"2012","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594295"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.23919\/DATE.2019.8714980"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69295-9_20"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898098"},{"journal-title":"Arm A-Profile Architecture Developments 2018 ARMV8 5-A","year":"2018","key":"ref30"},{"journal-title":"LLVM—Control Flow Integrity","year":"2015","author":"collingbourne","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23421"},{"key":"ref34","first-page":"27","article-title":"Enforcing forward-edge control-flow integrity in GCC & LLVM","volume":"26","author":"tice","year":"2014","journal-title":"Proc Usenix Security"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918971"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337175"},{"journal-title":"Transparent Runtime Shadow Stack Protection Against Malicious Return Address Modifications","year":"2008","author":"sinnadurai","key":"ref11"},{"key":"ref12","article-title":"Code-pointer integrity","volume":"14","author":"kuznetsov","year":"2014","journal-title":"Proc OSDI"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516649"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523674"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23287"},{"key":"ref17","first-page":"27","article-title":"Mocfi: A framework to mitigate control-flow attacks on smartphones","volume":"26","author":"davi","year":"2012","journal-title":"Proc NDSS"},{"key":"ref18","first-page":"559","article-title":"Practical control flow integrity and randomization for binary executables","author":"zhang","year":"2013","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref19","first-page":"337","article-title":"Control flow integrity for {COTS} binaries","author":"zhang","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23318"},{"key":"ref4","first-page":"243","article-title":"StackGuard: Simple stack smash protection for GCC","author":"wagle","year":"2003","journal-title":"Proc GCC Developers Summit"},{"key":"ref27","first-page":"1","article-title":"Bypass control flow guard comprehensively","author":"yunhai","year":"2015","journal-title":"Proc Black Hat USA"},{"journal-title":"ROPGuard Runtime prevention of return-oriented programming attacks","year":"2012","author":"fratri?","key":"ref3"},{"journal-title":"Whitepaper on Bypassing ASLR\/DEP","year":"2011","author":"katoch","key":"ref6"},{"journal-title":"Control-flow Enforcement Technology Preview","year":"2016","key":"ref29"},{"journal-title":"PaX address space layout randomization (ASLR)","year":"2003","key":"ref5"},{"key":"ref8","first-page":"340","article-title":"Control-flow integrity","author":"abadi","year":"2005","journal-title":"Proc 12th ACM Conf Comput Commun Security (CCS)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"ref2","first-page":"63","article-title":"StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks","volume":"98","author":"cowan","year":"1998","journal-title":"Proc Usenix Security Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"journal-title":"Data Execution Prevention","year":"2004","author":"andersen","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"journal-title":"Intel 64 and IA-32 Architectures Optimization Reference Manual","year":"2014","key":"ref45"},{"key":"ref22","first-page":"447","article-title":"Transparent {ROP} exploit mitigation using indirect branch tracing","author":"pappas","year":"0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.26"},{"journal-title":"Zipper stack Shadow stacks without shadow","year":"2019","author":"li","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866164"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3061639.3062291"},{"key":"ref44","first-page":"125","article-title":"Devirtualization in GCC","author":"namolaru","year":"2006","journal-title":"Proc GCC Developers Summit"},{"journal-title":"Exploring control flow guard in windows 10","year":"2015","author":"tang","key":"ref26"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"}],"container-title":["IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/43\/9244237\/09211437.pdf?arnumber=9211437","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:04:54Z","timestamp":1651068294000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9211437\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":45,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tcad.2020.3012640","relation":{},"ISSN":["0278-0070","1937-4151"],"issn-type":[{"type":"print","value":"0278-0070"},{"type":"electronic","value":"1937-4151"}],"subject":[],"published":{"date-parts":[[2020,11]]}}}