{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:40:33Z","timestamp":1775054433791,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/trustcom.2015.374","type":"proceedings-article","created":{"date-parts":[[2015,12,3]],"date-time":"2015-12-03T16:12:00Z","timestamp":1449159120000},"page":"190-197","source":"Crossref","is-referenced-by-count":7,"title":["Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern Defenses"],"prefix":"10.1109","author":[{"given":"Bingchen","family":"Lan","sequence":"first","affiliation":[]},{"given":"Yan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qingkai","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Counterfeit Object-oriented Programming","author":"schuster","year":"2015","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref10","article-title":"Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard","author":"g\u00f6ktas","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref11","article-title":"On the Expressiveness of Return-into-libc Attacks","author":"tran","year":"0"},{"key":"ref12","article-title":"StackGhost: Hardware facilitated stack protection","author":"frantzen","year":"2001","journal-title":"USENIX Security Symposium"},{"key":"ref13","article-title":"Address Space Layout Randomization (ASLR)","author":"team","year":"2003"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1145\/1966913.1966920","article-title":"ROPdefender: a detection tool to defend against return-oriented programming attacks","author":"davi","year":"2011","journal-title":"ACM Symposium on Information Computer and Communications Security (ASIACCS)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref16","article-title":"Control flow integrity for COTS binaries","author":"zhang","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref17","article-title":"CFIMon: Detecting violation of control flow integrity using performance counters","author":"xia","year":"2012","journal-title":"Conference on Dependable Systems and Networks (DSN)"},{"key":"ref18","article-title":"Practical Control Flow Integrity and Randomization for Binary Executables","author":"zhang","year":"2013","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337171"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"ref27","year":"0","journal-title":"Mitre Cve-2012&#x2013;1889"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_5"},{"key":"ref6","volume":"2","year":"2010","journal-title":"Intel 64 and IA-32 architectures software developer's manual"},{"key":"ref29","article-title":"Code-pointer integrity","author":"kuznetsov","year":"2014","journal-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI)"},{"key":"ref5","doi-asserted-by":"crossref","DOI":"10.1145\/1966913.1966919","article-title":"Jump-oriented programming: a new class of code-reuse attack","author":"bletsch","year":"2011","journal-title":"ACM Symposium on Information Computer and Communications Security (ASIACCS)"},{"key":"ref8","article-title":"Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection","author":"davi","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref7","article-title":"ROP is still dangerous: Breaking modern defenses","author":"carlini","year":"2014","journal-title":"USENIX Security Symposium"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1145\/1315245.1315313","article-title":"The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref9","year":"2001","journal-title":"Advanced Return-into-lib(c) Exploits (PaX Case Study)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_5"},{"key":"ref20","article-title":"Transparent ROP exploit mitigation using indirect branch tracing","author":"pappas","year":"2013","journal-title":"USENIX Security Symposium"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"ref24","article-title":"Practical return-oriented programming","author":"dai zovi","year":"2010","journal-title":"SOURCE Boston"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1145\/1102120.1102165","article-title":"Control-flow integrity","author":"abadi","year":"2005","journal-title":"Proceedings of ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"ref25","year":"2009","journal-title":"DarkReading &#x201C;Heap spraying Attackers' latest weapon of choice"}],"event":{"name":"2015 IEEE Trustcom\/BigDataSE\/ISPA","location":"Helsinki, Finland","start":{"date-parts":[[2015,8,20]]},"end":{"date-parts":[[2015,8,22]]}},"container-title":["2015 IEEE Trustcom\/BigDataSE\/ISPA"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7293439\/7345233\/07345282.pdf?arnumber=7345282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:59:13Z","timestamp":1498251553000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7345282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2015.374","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}