{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:44:20Z","timestamp":1740102260830,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":189,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-2238467"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005651","name":"Computing Research Association","doi-asserted-by":"publisher","award":["CIF2020-BU-04"],"id":[{"id":"10.13039\/100005651","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607219","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"527-546","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6234-6514","authenticated-orcid":false,"given":"Alexander J.","family":"Gaidis","sequence":"first","affiliation":[{"name":"Brown University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3380-3585","authenticated-orcid":false,"given":"Joao","family":"Moreira","sequence":"additional","affiliation":[{"name":"Intel Corporation, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9663-5081","authenticated-orcid":false,"given":"Ke","family":"Sun","sequence":"additional","affiliation":[{"name":"Intel Corporation, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7237-875X","authenticated-orcid":false,"given":"Alyssa","family":"Milburn","sequence":"additional","affiliation":[{"name":"Intel Corporation, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5490-9648","authenticated-orcid":false,"given":"Vaggelis","family":"Atlidakis","sequence":"additional","affiliation":[{"name":"Brown University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6528-437X","authenticated-orcid":false,"given":"Vasileios P.","family":"Kemerlis","sequence":"additional","affiliation":[{"name":"Brown University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. Control-Flow Integrity Relevance Metrics. https:\/\/github.com\/SoftwareLanguagesSecurityLab\/ConFIRM."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Fine-grained Forward CFI on top of Intel CET\/IBT. https:\/\/www.openwall.com\/lists\/kernel-hardening\/2021\/02\/11\/1."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. sysbench. https:\/\/github.com\/akopytov\/sysbench."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. wrk \u2013 a HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Functional differences from glibc. https:\/\/wiki.musl-libc.org\/functional-differences-from-glibc.html."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. MariaDB. https:\/\/mariadb.com."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. musl libc. https:\/\/musl.libc.org."},{"key":"e_1_3_2_1_8_1","unstructured":"2023. nginx. https:\/\/nginx.org."},{"key":"e_1_3_2_1_9_1","unstructured":"2023. Redis. https:\/\/redis.io."},{"key":"e_1_3_2_1_10_1","unstructured":"2023. SQLite. https:\/\/www.sqlite.org."},{"key":"e_1_3_2_1_11_1","unstructured":"2023. The Void (Linux) distribution. https:\/\/voidlinux.org."},{"key":"e_1_3_2_1_12_1","volume-title":"Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 340\u2013353","author":"Abadi Mart\u00edn","year":"2005","unstructured":"Mart\u00edn Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. 2005. Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 340\u2013353."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134618"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3414997"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"e_1_3_2_1_18_1","volume-title":"Preventing Memory Error Exploits with WIT. In IEEE Symposium on Security and Privacy (S&P). 263\u2013277","author":"Akritidis Periklis","year":"2008","unstructured":"Periklis Akritidis, Cristian Cadar, Costin Raiciu, Manuel Costa, and Miguel Castro. 2008. Preventing Memory Error Exploits with WIT. In IEEE Symposium on Security and Privacy (S&P). 263\u2013277."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24016"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"e_1_3_2_1_21_1","unstructured":"AMD64 ABI. 2018. System V Application Binary Interface \u2013 AMD64 Architecture Processor Supplement. https:\/\/raw.githubusercontent.com\/wiki\/hjl-tools\/x86-psABI\/x86-64-psABI-draft.pdf."},{"key":"e_1_3_2_1_22_1","unstructured":"Android Open Source Project. 2022. Control Flow Integrity. https:\/\/source.android.com\/devices\/tech\/debug\/cfi."},{"key":"e_1_3_2_1_23_1","volume-title":"Data Space Randomization. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 1\u201322","author":"Bhatkar Sandeep","year":"2008","unstructured":"Sandeep Bhatkar and R Sekar. 2008. Data Space Randomization. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 1\u201322."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23318"},{"key":"e_1_3_2_1_25_1","volume-title":"Hacking Blind. In IEEE Symposium on Security and Privacy (S&P). 227\u2013242","author":"Bittau Andrea","year":"2014","unstructured":"Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi\u00e8res, and Dan Boneh. 2014. Hacking Blind. In IEEE Symposium on Security and Privacy (S&P). 227\u2013242."},{"key":"e_1_3_2_1_26_1","volume-title":"Mitigating Code-Reuse Attacks with Control-Flow Locking. In Annual Computer Security Applications Conference (ACSAC). 353\u2013362","author":"Bletsch Tyler","year":"2011","unstructured":"Tyler Bletsch, Xuxian Jiang, and Vince Freeh. 2011. Mitigating Code-Reuse Attacks with Control-Flow Locking. In Annual Computer Security Applications Conference (ACSAC). 353\u2013362."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23421"},{"key":"e_1_3_2_1_30_1","volume-title":"Leakage-Resilient Layout Randomization for Mobile Devices. In Network and Distributed System Security Symposium (NDSS).","author":"Braden Kjell","year":"2016","unstructured":"Kjell Braden, Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Stephen Crane, Michael Franz, and Per Larsen. 2016. Leakage-Resilient Layout Randomization for Mobile Devices. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"e_1_3_2_1_32_1","unstructured":"Bugtraq. 1997. Getting around non-executable stack (and fix). https:\/\/seclists.org\/bugtraq\/1997\/Aug\/63."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_1_34_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Burow Nathan","year":"2018","unstructured":"Nathan Burow, Derrick McKee, Scott\u00a0A Carr, and Mathias Payer. 2018. CFIXX: Object Type Integrity for C++ Virtual Dispatch. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_35_1","volume-title":"SoK: Shining Light on Shadow Stacks. In IEEE Symposium on Security and Privacy (S&P). 985\u2013999","author":"Burow Nathan","year":"2019","unstructured":"Nathan Burow, Xinping Zhang, and Mathias Payer. 2019. SoK: Shining Light on Shadow Stacks. In IEEE Symposium on Security and Privacy (S&P). 985\u2013999."},{"key":"e_1_3_2_1_36_1","volume-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium (SEC). 161\u2013176","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas\u00a0R Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In USENIX Security Symposium (SEC). 161\u2013176."},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Security Symposium (SEC). 385\u2013399","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner. 2014. ROP is Still Dangerous: Breaking Modern Defenses. In USENIX Security Symposium (SEC). 385\u2013399."},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI). 147\u2013160","author":"Castro Miguel","year":"2006","unstructured":"Miguel Castro, Manuel Costa, and Tim Harris. 2006. Securing software by enforcing data-flow integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 147\u2013160."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_4"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857722"},{"key":"e_1_3_2_1_43_1","unstructured":"Clang 17.0.0git documentation. 2023. Control Flow Integrity. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2021.3112026"},{"key":"e_1_3_2_1_45_1","volume-title":"Introduction and Overview of the Multics System. In American Federation of Information Processing Societies Fall Joint Computer Conference (AFIPS FJCC). 185\u2013196","author":"Corbat\u00f3 J.","year":"1965","unstructured":"F.\u00a0J. Corbat\u00f3 and V.\u00a0A. Vyssotsky. 1965. Introduction and Overview of the Multics System. In American Federation of Information Processing Societies Fall Joint Computer Conference (AFIPS FJCC). 185\u2013196."},{"key":"e_1_3_2_1_46_1","unstructured":"Intel Corporation. 2019. Control-flow Enforcement Technology Specification."},{"key":"e_1_3_2_1_47_1","unstructured":"Intel Corporation. 2021. Intel 64 and IA-32 Architectures Optimization Reference Manual."},{"key":"e_1_3_2_1_48_1","unstructured":"Intel Corporation. 2021. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual."},{"key":"e_1_3_2_1_49_1","unstructured":"Intel Corporation. 2021. Linux Intel Quilt. https:\/\/github.com\/intel\/linux-intel-quilt\/tree\/mainline-tracking-v5.13-yocto-210727T062416Z."},{"key":"e_1_3_2_1_50_1","volume-title":"StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In USENIX Security Symposium (SEC), Vol.\u00a098","author":"Cowan Crispan","year":"1998","unstructured":"Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. 1998. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In USENIX Security Symposium (SEC), Vol.\u00a098. 63\u201378."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_52_1","volume-title":"KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. In IEEE Symposium on Security and Privacy (S&P). 292\u2013307","author":"Criswell John","year":"2014","unstructured":"John Criswell, Nathan Dautenhahn, and Vikram Adve. 2014. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. In IEEE Symposium on Security and Privacy (S&P). 292\u2013307."},{"key":"e_1_3_2_1_53_1","volume-title":"The Performance Cost of Shadow Stacks and Stack Canaries. In ACM Asia Symposium on Information, Computer and Communications Security (ASIACCS). 555\u2013566","author":"Dang HY","year":"2015","unstructured":"Thurston\u00a0HY Dang, Petros Maniatis, and David Wagner. 2015. The Performance Cost of Shadow Stacks and Stack Canaries. In ACM Asia Symposium on Information, Computer and Communications Security (ASIACCS). 555\u2013566."},{"key":"e_1_3_2_1_54_1","volume-title":"Network and Distributed System Security Symposium (NDSS).","author":"Davi Lucas","year":"2012","unstructured":"Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan N\u00fcrnberger, and Ahmad-Reza Sadeghi. 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596656"},{"key":"e_1_3_2_1_57_1","volume-title":"Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium (SEC). 401\u2013416","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, and Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium (SEC). 401\u2013416."},{"key":"e_1_3_2_1_58_1","volume-title":"RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE Symposium on Security and Privacy (S&P). 1497\u20131511","author":"Dinesh Sushant","year":"2020","unstructured":"Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. 2020. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE Symposium on Security and Privacy (S&P). 1497\u20131511."},{"key":"e_1_3_2_1_59_1","volume-title":"Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium (SEC). 131\u2013148","author":"Ding Ren","year":"2017","unstructured":"Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. 2017. Efficient Protection of Path-Sensitive Control Security. In USENIX Security Symposium (SEC). 131\u2013148."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Victor Duta Cristiano Giuffrida Herbert Bos and Erik Van Der\u00a0Kouwe. 2021. PIBE: Practical Kernel Control-Flow Hardening with Profile-Guided Indirect Branch Elimination. In ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). 743\u2013757.","DOI":"10.1145\/3445814.3446740"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052976"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST52912.2021.9647781"},{"key":"e_1_3_2_1_63_1","volume-title":"XFI: Software Guards for System Address Spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 75\u201388","author":"Erlingsson Ulfar","year":"2006","unstructured":"Ulfar Erlingsson, Mart\u00edn Abadi, Michael Vrable, Mihai Budiu, and George\u00a0C Necula. 2006. XFI: Software Guards for System Address Spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 75\u201388."},{"key":"e_1_3_2_1_64_1","volume-title":"IRM Enforcement of Java Stack Inspection. In IEEE Symposium on Security and Privacy (S&P). 246\u2013255","author":"Erlingsson Ulfar","year":"2000","unstructured":"Ulfar Erlingsson and Fred\u00a0B Schneider. 2000. IRM Enforcement of Java Stack Inspection. In IEEE Symposium on Security and Privacy (S&P). 246\u2013255."},{"volume-title":"SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop (NSPW). 87\u201395","author":"Schneider \u00dalfar","key":"e_1_3_2_1_65_1","unstructured":"Erlingsson, \u00dalfar and Schneider, Fred B.1999. SASI Enforcement of Security Policies: A Retrospective. In New Security Paradigms Workshop (NSPW). 87\u201395."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_67_1","unstructured":"Eyal Itkin. 2017. Bypassing Return Flow Guard (RFG). https:\/\/eyalitkin.wordpress.com\/2017\/08\/18\/bypassing-return-flow-guard-rfg\/."},{"key":"e_1_3_2_1_68_1","volume-title":"Building Diverse Computer Systems. In Workshop on Hot Topics in Operating Systems (HotOS). 67\u201372","author":"Forrest Stephanie","year":"1997","unstructured":"Stephanie Forrest, Anil Somayaji, and David\u00a0H. Ackley. 1997. Building Diverse Computer Systems. In Workshop on Hot Topics in Operating Systems (HotOS). 67\u201372."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664249"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093336.3037716"},{"key":"e_1_3_2_1_72_1","volume-title":"Fine-Grained Control-Flow Integrity for Kernel Software. In IEEE European Symposium on Security and Privacy (EuroS&P). 179\u2013194","author":"Ge Xinyang","year":"2016","unstructured":"Xinyang Ge, Nirupama Talele, Mathias Payer, and Trent Jaeger. 2016. Fine-Grained Control-Flow Integrity for Kernel Software. In IEEE European Symposium on Security and Privacy (EuroS&P). 179\u2013194."},{"key":"e_1_3_2_1_73_1","volume-title":"Out Of Control: Overcoming Control-Flow Integrity. In IEEE Symposium on Security and Privacy (S&P). 575\u2013589","author":"G\u00f6ktas Enes","year":"2014","unstructured":"Enes G\u00f6ktas, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis. 2014. Out Of Control: Overcoming Control-Flow Integrity. In IEEE Symposium on Security and Privacy (S&P). 575\u2013589."},{"key":"e_1_3_2_1_74_1","volume-title":"USENIX Security Symposium (SEC). 417\u2013432","author":"G\u00f6kta\u015f Enes","year":"2014","unstructured":"Enes G\u00f6kta\u015f, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis. 2014. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. In USENIX Security Symposium (SEC). 417\u2013432."},{"key":"e_1_3_2_1_75_1","volume-title":"Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. In IEEE European Symposium on Security and Privacy (EuroS&P). 227\u2013242","author":"G\u00f6ktas Enes","year":"2018","unstructured":"Enes G\u00f6ktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, and Cristiano Giuffrida. 2018. Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. In IEEE European Symposium on Security and Privacy (EuroS&P). 227\u2013242."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417289"},{"key":"e_1_3_2_1_77_1","unstructured":"Google Security Blog. 2021. Mitigating Memory Safety Issues in Open Source Software. https:\/\/security.googleblog.com\/2021\/02\/mitigating-memory-safety-issues-in-open.html."},{"key":"e_1_3_2_1_78_1","volume-title":"International Symposium on Research in Attacks, Intrusions and Defenses (RAID).","author":"Grossklags Jens","year":"2018","unstructured":"Jens Grossklags and Claudia Eckert. 2018. \u03c4 CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID)."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss. 2018. Software-based Microarchitectural Attacks. (2018).","DOI":"10.1515\/itit-2018-0034"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818025"},{"key":"e_1_3_2_1_82_1","volume-title":"Enforcing Unique Code Target Property for Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 1470\u20131486","author":"Hu Hong","year":"2018","unstructured":"Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak\u00a0Ho Chung, William\u00a0R Harris, Taesoo Kim, and Wenke Lee. 2018. Enforcing Unique Code Target Property for Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 1470\u20131486."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23287"},{"key":"e_1_3_2_1_84_1","volume-title":"Countering Code-Injection Attacks With Instruction-Set Randomization. In ACM Conference on Computer and Communications Security (CCS). 272\u2013280","author":"Kc S","year":"2003","unstructured":"Gaurav\u00a0S Kc, Angelos\u00a0D Keromytis, and Vassilis Prevelakis. 2003. Countering Code-Injection Attacks With Instruction-Set Randomization. In ACM Conference on Computer and Communications Security (CCS). 272\u2013280."},{"key":"e_1_3_2_1_85_1","volume-title":"USENIX Security Symposium (SEC). 459\u2013474","author":"Kemerlis P","year":"2012","unstructured":"Vasileios\u00a0P Kemerlis, Georgios Portokalidis, and Angelos\u00a0D Keromytis. 2012. kGuard: Lightweight Kernel Protection against Return-to-User Attacks. In USENIX Security Symposium (SEC). 459\u2013474."},{"key":"e_1_3_2_1_86_1","volume-title":"Adaptive Call-Site Sensitive Control Flow Integrity. In IEEE European Symposium on Security and Privacy (EuroS&P). 95\u2013110","author":"Khandaker Mustakimur","year":"2019","unstructured":"Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, and Yueqiang Cheng. 2019. Adaptive Call-Site Sensitive Control Flow Integrity. In IEEE European Symposium on Security and Privacy (EuroS&P). 95\u2013110."},{"key":"e_1_3_2_1_87_1","volume-title":"Origin-sensitive Control Flow Integrity. In USENIX Security Symposium (SEC). 195\u2013211","author":"Khandaker Mustakimur\u00a0Rahman","year":"2019","unstructured":"Mustakimur\u00a0Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, and Jie Yang. 2019. Origin-sensitive Control Flow Integrity. In USENIX Security Symposium (SEC). 195\u2013211."},{"key":"e_1_3_2_1_88_1","volume-title":"USENIX Security Symposium (SEC).","author":"Kiriansky Vladimir","year":"2002","unstructured":"Vladimir Kiriansky, Derek Bruening, and Saman Amarasinghe. 2002. Secure Execution via Program Shepherding. In USENIX Security Symposium (SEC)."},{"key":"e_1_3_2_1_89_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy (S&P). 1\u201319","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In IEEE Symposium on Security and Privacy (S&P). 1\u201319."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_91_1","volume-title":"Compiler-assisted Code Randomization. In IEEE Symposium on Security and Privacy (S&P). 461\u2013477","author":"Koo Hyungjoon","year":"2018","unstructured":"Hyungjoon Koo, Yaohui Chen, Long Lu, Vasileios\u00a0P Kemerlis, and Michalis Polychronakis. 2018. Compiler-assisted Code Randomization. In IEEE Symposium on Security and Privacy (S&P). 461\u2013477."},{"key":"e_1_3_2_1_92_1","volume-title":"USENIX Workshop on Offensive Technologies (WOOT).","author":"Koruyeh Esmaeil\u00a0Mohammadian","year":"2018","unstructured":"Esmaeil\u00a0Mohammadian Koruyeh, Khaled\u00a0N Khasawneh, Chengyu Song, and Nael Abu-Ghazaleh. 2018. Spectre Returns! Speculation Attacks using the Return Stack Buffer. In USENIX Workshop on Offensive Technologies (WOOT)."},{"key":"e_1_3_2_1_93_1","volume-title":"Code-Pointer Integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 147\u2013163","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George\u00a0Candea nd R.\u00a0Sekar, and Dawn Song. 2014. Code-Pointer Integrity. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 147\u2013163."},{"key":"e_1_3_2_1_94_1","volume-title":"VM-CFI: Control-Flow Integrity for Virtual Machine Kernel Using Intel PT. In International Conference on Computational Science and Its Applications (ICCSA). 127\u2013137","author":"Kwon Donghyun","year":"2018","unstructured":"Donghyun Kwon, Jiwon Seo, Sehyun Baek, Giyeol Kim, Sunwoo Ahn, and Yunheung Paek. 2018. VM-CFI: Control-Flow Integrity for Virtual Machine Kernel Using Intel PT. In International Conference on Computational Science and Its Applications (ICCSA). 127\u2013137."},{"key":"e_1_3_2_1_95_1","volume-title":"SoK: Automated Software Diversity. In IEEE Symposium on Security and Privacy (S&P). 276\u2013291","author":"Larsen Per","year":"2014","unstructured":"Per Larsen, Andrei Homescu, Stefan Brunthaler, and Michael Franz. 2014. SoK: Automated Software Diversity. In IEEE Symposium on Security and Privacy (S&P). 276\u2013291."},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2020.3012640"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2797932"},{"key":"e_1_3_2_1_98_1","unstructured":"ARM Limited. 2020. ARM A64 Instruction Set Architecture \u2013 Branch Target Identification."},{"key":"e_1_3_2_1_99_1","unstructured":"Linux Foundation. 2015. Linux Standard Base Core Specification for x86-64. https:\/\/refspecs.linuxfoundation.org\/LSB_5.0.0\/LSB-Core-AMD64\/LSB-Core-AMD64.pdf."},{"key":"e_1_3_2_1_100_1","unstructured":"LLVM Project. 2023. Writing an LLVM Pass. https:\/\/llvm.org\/docs\/WritingAnLLVMPass.html."},{"key":"e_1_3_2_1_101_1","volume-title":"Control-Flow Enforcement Technology. In Linux Plumbers Conference (LPC).","author":"Lu Hong\u00a0Jiu","year":"2018","unstructured":"Hong\u00a0Jiu Lu. 2018. Control-Flow Enforcement Technology. In Linux Plumbers Conference (LPC)."},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354244"},{"key":"e_1_3_2_1_103_1","unstructured":"LWN.net. 2004. x86 NX support. https:\/\/lwn.net\/Articles\/87814\/."},{"key":"e_1_3_2_1_104_1","unstructured":"LWN.net. 2020. Control-flow integrity for the kernel. https:\/\/lwn.net\/Articles\/810077\/."},{"volume-title":"Control-flow Enforcement: Shadow Stack. https:\/\/lwn.net\/Articles\/846525\/.","year":"2021","key":"e_1_3_2_1_105_1","unstructured":"LWN.net. 2021. Control-flow Enforcement: Shadow Stack. https:\/\/lwn.net\/Articles\/846525\/."},{"key":"e_1_3_2_1_106_1","unstructured":"LWN.net. 2022. Shadow stacks for userspace. https:\/\/lwn.net\/Articles\/883340\/."},{"key":"e_1_3_2_1_107_1","unstructured":"LWN.net. 2023. Kernel release status. https:\/\/lwn.net\/Articles\/924113\/."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00048"},{"key":"e_1_3_2_1_110_1","unstructured":"MariaDB. 2011. MariaDB Tools. https:\/\/github.com\/MariaDB\/mariadb.org-tools\/blob\/master\/sysbench\/run-sysbench.sh."},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"key":"e_1_3_2_1_112_1","unstructured":"MaskRay. 2021. When can glibc be built with Clang?https:\/\/maskray.me\/blog\/2021-10-10-when-can-glibc-be-built-with-clang."},{"key":"e_1_3_2_1_113_1","volume-title":"USENIX Security Symposium (SEC). 209\u2013224","author":"McCamant Stephen","year":"2006","unstructured":"Stephen McCamant and Greg Morrisett. 2006. Evaluating SFI for a CISC Architecture. In USENIX Security Symposium (SEC). 209\u2013224."},{"key":"e_1_3_2_1_114_1","unstructured":"Microsoft Docs. 2022. Data Execution Prevention. https:\/\/docs.microsoft.com\/en-us\/."},{"key":"e_1_3_2_1_115_1","unstructured":"Microsoft Security Response Center. 2019. A proactive approach to more secure code. https:\/\/msrc.microsoft.com\/blog\/2019\/07\/a-proactive-approach-to-more-secure-code\/."},{"key":"e_1_3_2_1_116_1","unstructured":"Microsoft technical documentation. 2022. Control Flow Guard for platform security. https:\/\/docs.microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard."},{"key":"e_1_3_2_1_117_1","volume-title":"You Cannot Always Win the Race: Analyzing the LFENCE\/JMP Mitigation for Branch Target Injection. arXiv preprint arXiv:2203.04277","author":"Milburn Alyssa","year":"2022","unstructured":"Alyssa Milburn, Ke Sun, and Henrique Kawakami. 2022. You Cannot Always Win the Race: Analyzing the LFENCE\/JMP Mitigation for Branch Target Injection. arXiv preprint arXiv:2203.04277 (2022)."},{"key":"e_1_3_2_1_118_1","volume-title":"Opaque Control-Flow Integrity. In Network and Distributed System Security Symposium (NDSS).","author":"Mohan Vishwath","year":"2015","unstructured":"Vishwath Mohan, Per Larsen, Stefan Brunthaler, Kevin\u00a0W Hamlen, and Michael Franz. 2015. Opaque Control-Flow Integrity. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_119_1","unstructured":"Joao Moreira. 2021. [X86] Enable ibt-seal optimization when LTO is used in Kernel. https:\/\/reviews.llvm.org\/D116070."},{"key":"e_1_3_2_1_120_1","volume-title":"DROP THE ROP: Fine-grained Control-flow Integrity for the Linux Kernel. Black Hat Asia (BHASIA)","author":"Moreira Jo\u00e3o","year":"2017","unstructured":"Jo\u00e3o Moreira, Sandro Rigo, Michalis Polychronakis, and Vasileios\u00a0P Kemerlis. 2017. DROP THE ROP: Fine-grained Control-flow Integrity for the Linux Kernel. Black Hat Asia (BHASIA) (2017)."},{"key":"e_1_3_2_1_121_1","volume-title":"Linux Kernel Control-Flow Integrity Support. In Linux Plumbers Conference (LPC).","author":"Moreira Joao","year":"2022","unstructured":"Joao Moreira, Mark Rutland, Peter Zijlstra, and Sami Tolvanen. 2022. Linux Kernel Control-Flow Integrity Support. In Linux Plumbers Conference (LPC)."},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_124_1","volume-title":"Monitor Integrity Protection with Space Efficiency and Separate Compilation. In ACM Conference on Computer and Communications Security (CCS). 199\u2013210","author":"Niu Ben","year":"2013","unstructured":"Ben Niu and Gang Tan. 2013. Monitor Integrity Protection with Space Efficiency and Separate Compilation. In ACM Conference on Computer and Communications Security (CCS). 199\u2013210."},{"key":"e_1_3_2_1_125_1","volume-title":"Modular Control-Flow Integrity. In ACM Conference on Programming Language Design and Implementation (PLDI). 577\u2013587","author":"Niu Ben","year":"2014","unstructured":"Ben Niu and Gang Tan. 2014. Modular Control-Flow Integrity. In ACM Conference on Programming Language Design and Implementation (PLDI). 577\u2013587."},{"key":"e_1_3_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_127_1","volume-title":"Per-Input Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 914\u2013926","author":"Niu Ben","year":"2015","unstructured":"Ben Niu and Gang Tan. 2015. Per-Input Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 914\u2013926."},{"key":"e_1_3_2_1_128_1","volume-title":"CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 259\u2013284","author":"Nyman Thomas","year":"2017","unstructured":"Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, and N Asokan. 2017. CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 259\u2013284."},{"key":"e_1_3_2_1_129_1","article-title":"Smashing The Stack For Fun And Profit","volume":"7","author":"One Aleph","year":"1996","unstructured":"Aleph One. 1996. Smashing The Stack For Fun And Profit. Phrack Magazine 7, 49 (1996).","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_130_1","unstructured":"OpenBSD. 2003. i386 W\u2303X. https:\/\/marc.info\/?l=openbsd-misc&m=105056000801065."},{"key":"e_1_3_2_1_131_1","unstructured":"Oracle Solaris \u2013 Linkers and Libraries Guide. 2012. Procedure Linkage Table. https:\/\/docs.oracle.com\/cd\/E26502_01\/html\/E26507\/chapter6-1235.html."},{"key":"e_1_3_2_1_132_1","volume-title":"USENIX Security Symposium (SEC). 447\u2013462","author":"Pappas Vasilis","year":"2013","unstructured":"Vasilis Pappas, Michalis Polychronakis, and Angelos\u00a0D Keromytis. 2013. Transparent ROP Exploit Mitigation using Indirect Branch Tracing. In USENIX Security Symposium (SEC). 447\u2013462."},{"key":"e_1_3_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22041392"},{"key":"e_1_3_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23096"},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359797"},{"key":"e_1_3_2_1_136_1","unstructured":"PaX Team. 2003. What the future holds for PaX. https:\/\/pax.grsecurity.net\/docs\/pax-future.txt."},{"key":"e_1_3_2_1_137_1","volume-title":"Fine-Grained Control-Flow Integrity Through Binary Hardening. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 144\u2013164","author":"Payer Mathias","year":"2015","unstructured":"Mathias Payer, Antonio Barresi, and Thomas\u00a0R Gross. 2015. Fine-Grained Control-Flow Integrity Through Binary Hardening. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). 144\u2013164."},{"key":"e_1_3_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523674"},{"key":"e_1_3_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064216"},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"e_1_3_2_1_141_1","unstructured":"Android Open\u00a0Source Project. 2022. Control Flow Integrity. https:\/\/source.android.com\/docs\/security\/test\/cfi."},{"key":"e_1_3_2_1_142_1","unstructured":"The\u00a0Chromium Projects. 2023. Control Flow Integrity. https:\/\/www.chromium.org\/developers\/testing\/control-flow-integrity\/."},{"key":"e_1_3_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00041"},{"key":"e_1_3_2_1_144_1","volume-title":"USENIX Security Symposium (SEC). 869\u2013886","author":"Quach Anh","year":"2018","unstructured":"Anh Quach, Aravind Prakash, and Lok Yan. 2018. Debloating Software through Piece-Wise Compilation and Loading. In USENIX Security Symposium (SEC). 869\u2013886."},{"key":"e_1_3_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384757"},{"key":"e_1_3_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_147_1","volume-title":"Security Technologies: RELRO. https:\/\/www.redhat.com\/en\/blog\/hardening-elf-binaries-using-relocation-read-only-relro.","author":"Huzaifa Sidhpurwala Red Hat","year":"2019","unstructured":"Red Hat Blog \u2013 Huzaifa Sidhpurwala. 2019. Security Technologies: RELRO. https:\/\/www.redhat.com\/en\/blog\/hardening-elf-binaries-using-relocation-read-only-relro."},{"key":"e_1_3_2_1_148_1","unstructured":"Redis. 2023. memtier_benchmark. https:\/\/github.com\/RedisLabs\/memtier_benchmark."},{"key":"e_1_3_2_1_149_1","volume-title":"Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. In Network and Distributed System Security Symposium (NDSS).","author":"Rudd Robert","year":"2017","unstructured":"Robert Rudd, Richard Skowyra, David Bigelow, Veer Dedhia, Thomas Hobson, Stephen Crane, Christopher Liebchen, Per Larsen, Lucas Davi, Michael Franz, Ahmad-Reza Sadeghi, and Hamed Okhravi. 2017. Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_150_1","unstructured":"SANS Institute. 2023. CWE\/SANS TOP 25 Most Dangerous Software Errors. https:\/\/www.sans.org\/top25-software-errors\/."},{"key":"e_1_3_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_152_1","volume-title":"USENIX Security Symposium (SEC). 1\u201311","author":"Sehr David","year":"2010","unstructured":"David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. 2010. Adapting Software Fault Isolation to Contemporary CPU Architectures. In USENIX Security Symposium (SEC). 1\u201311."},{"key":"e_1_3_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_154_1","volume-title":"Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity. In International Workshop on Hardware and Architectural Support for Security and Privacy (HASP).","author":"Shanbhogue Vedvyas","year":"2019","unstructured":"Vedvyas Shanbhogue, Deepak Gupta, and Ravi Sahita. 2019. Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity. In International Workshop on Hardware and Architectural Support for Security and Privacy (HASP)."},{"key":"e_1_3_2_1_155_1","volume-title":"Reviving Instruction Set Randomization. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 21\u201328","author":"Sinha Kanad","year":"2017","unstructured":"Kanad Sinha, Vasileios\u00a0P Kemerlis, and Simha Sethumadhavan. 2017. Reviving Instruction Set Randomization. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST). 21\u201328."},{"key":"e_1_3_2_1_156_1","volume-title":"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. In IEEE Symposium on Security and Privacy (S&P). 574\u2013588","author":"Snow Z","year":"2013","unstructured":"Kevin\u00a0Z Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2013. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. In IEEE Symposium on Security and Privacy (S&P). 574\u2013588."},{"key":"e_1_3_2_1_157_1","unstructured":"SQLite. 2023. Database Speed Comparison. https:\/\/www.sqlite.com\/speed.html."},{"key":"e_1_3_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897937.2898098"},{"key":"e_1_3_2_1_159_1","volume-title":"Sok: Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P). 48\u201362","author":"Szekeres Laszlo","year":"2013","unstructured":"Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. 2013. Sok: Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P). 48\u201362."},{"key":"e_1_3_2_1_160_1","unstructured":"Microsoft Defender Security\u00a0Research Team. 2017. Analysis of the Shadow Brokers release and mitigation with Windows 10 virtualization-based security. https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/06\/16\/analysis-of-the-shadow-brokers-release-and-mitigation-with-windows-10-virtualization-based-security\/?source=mmpc."},{"key":"e_1_3_2_1_161_1","volume-title":"RAP: RIP ROP. In Hackers 2 Hackers Conference (H2HC).","author":"Team X","year":"2015","unstructured":"PaX Team. 2015. RAP: RIP ROP. In Hackers 2 Hackers Conference (H2HC)."},{"key":"e_1_3_2_1_162_1","unstructured":"Ubuntu\u00a0Security Team. 2022. Security Features in Ubuntu. https:\/\/wiki.ubuntu.com\/Security\/Features."},{"key":"e_1_3_2_1_163_1","unstructured":"The Chromium Projects. 2023. Memory safety. https:\/\/www.chromium.org\/Home\/chromium-security\/memory-safety\/."},{"key":"e_1_3_2_1_164_1","unstructured":"The Systems Security Group at University of Minnesota. 2023. TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets. https:\/\/github.com\/umnsec\/mlta."},{"key":"e_1_3_2_1_165_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium (SEC). 941\u2013955","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium (SEC). 941\u2013955."},{"key":"e_1_3_2_1_166_1","volume-title":"Practical Context-Sensitive CFI. In ACM Conference on Computer and Communications Security (CCS). 927\u2013940","author":"Veen Victor Van\u00a0der","year":"2015","unstructured":"Victor Van\u00a0der Veen, Dennis Andriesse, Enes G\u00f6kta\u015f, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida. 2015. Practical Context-Sensitive CFI. In ACM Conference on Computer and Communications Security (CCS). 927\u2013940."},{"key":"e_1_3_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134026"},{"key":"e_1_3_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_5"},{"key":"e_1_3_2_1_170_1","unstructured":"Virus Bulletin. 2012. Code injection via return-oriented programming. https:\/\/www.virusbulletin.com\/virusbulletin\/2012\/10\/code-injection-return-oriented-programming."},{"key":"e_1_3_2_1_171_1","volume-title":"Control-Flow Integrity for Real-Time Embedded Systems. In Euromicro Conference on Real-Time Systems (ECRTS).","author":"Walls J","year":"2019","unstructured":"Robert\u00a0J Walls, Nicholas\u00a0F Brown, Thomas Le\u00a0Baron, Craig\u00a0A Shue, Hamed Okhravi, and Bryan\u00a0C Ward. 2019. Control-Flow Integrity for Real-Time Embedded Systems. In Euromicro Conference on Real-Time Systems (ECRTS)."},{"key":"e_1_3_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818017"},{"key":"e_1_3_2_1_173_1","volume-title":"Object Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 1909\u20131924","author":"Wang Wenhao","year":"2017","unstructured":"Wenhao Wang, Xiaoyang Xu, and Kevin\u00a0W Hamlen. 2017. Object Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). 1909\u20131924."},{"key":"e_1_3_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_175_1","volume-title":"Sponge-Based Control-Flow Protection for IoT Devices. In IEEE European Symposium on Security and Privacy (EuroS&P). 214\u2013226","author":"Werner Mario","year":"2018","unstructured":"Mario Werner, Thomas Unterluggauer, David Schaffenrath, and Stefan Mangard. 2018. Sponge-Based Control-Flow Protection for IoT Devices. In IEEE European Symposium on Security and Privacy (EuroS&P). 214\u2013226."},{"key":"e_1_3_2_1_176_1","unstructured":"Wikipedia. 2023. NX bit. https:\/\/en.wikipedia.org\/wiki\/NX_bit."},{"key":"e_1_3_2_1_177_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 367\u2013382","author":"Williams-King David","year":"2016","unstructured":"David Williams-King, Graham Gobieski, Kent Williams-King, James\u00a0P Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios\u00a0P Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 367\u2013382."},{"key":"e_1_3_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978340"},{"key":"e_1_3_2_1_180_1","volume-title":"CONFIRM: Evaluating Compatibility and Relevance of Control-Flow Integrity Protections for Modern Software. In USENIX Security Symposium (SEC). 1805\u20131821","author":"Xu Xiaoyang","year":"2019","unstructured":"Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin\u00a0W Hamlen, and Zhiqiang Lin. 2019. CONFIRM: Evaluating Compatibility and Relevance of Control-Flow Integrity Protections for Modern Software. In USENIX Security Symposium (SEC). 1805\u20131821."},{"key":"e_1_3_2_1_181_1","volume-title":"USENIX Security Symposium (SEC). 719\u2013732","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In USENIX Security Symposium (SEC). 719\u2013732."},{"key":"e_1_3_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_183_1","volume-title":"Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 66\u201385","author":"Yuan Pinghai","year":"2015","unstructured":"Pinghai Yuan, Qingkai Zeng, and Xuhua Ding. 2015. Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID). 66\u201385."},{"key":"e_1_3_2_1_184_1","volume-title":"VTint: Protecting Virtual Function Tables\u2019 Integrity. In Network and Distributed System Security Symposium (NDSS).","author":"Zhang Chao","year":"2015","unstructured":"Chao Zhang, Chengyu Song, Kevin\u00a0Zhijie Chen, Zhaofeng Chen, and Dawn Song. 2015. VTint: Protecting Virtual Function Tables\u2019 Integrity. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_185_1","volume-title":"VTrust: Regaining Trust on Virtual Calls. In Network and Distributed System Security Symposium (NDSS).","author":"Zhang Chao","year":"2016","unstructured":"Chao Zhang, Dawn Song, Scott\u00a0A Carr, Mathias Payer, Tongxin Li, Yu Ding, and Chengyu Song. 2016. VTrust: Regaining Trust on Virtual Calls. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_186_1","volume-title":"Practical Control Flow Integrity and Randomization for Binary Executables. In IEEE Symposium on Security and Privacy (S&P). 559\u2013573","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical Control Flow Integrity and Randomization for Binary Executables. In IEEE Symposium on Security and Privacy (S&P). 559\u2013573."},{"key":"e_1_3_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/3075564.3075570"},{"key":"e_1_3_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2866164"},{"key":"e_1_3_2_1_189_1","volume-title":"Control Flow Integrity for COTS Binaries. In USENIX Security Symposium (SEC). 337\u2013352","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries. In USENIX Security Symposium (SEC). 337\u2013352."}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607219","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607219","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:33:06Z","timestamp":1729074786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607219"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":189,"alternative-id":["10.1145\/3607199.3607219","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607219","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}