{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T19:00:33Z","timestamp":1772046033567,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/dsn.2012.6263958","type":"proceedings-article","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T20:04:08Z","timestamp":1345147448000},"page":"1-12","source":"Crossref","is-referenced-by-count":42,"title":["CFIMon: Detecting violation of control flow integrity using performance counters"],"prefix":"10.1109","author":[{"family":"Yubin Xia","sequence":"first","affiliation":[]},{"family":"Yutao Liu","sequence":"additional","affiliation":[]},{"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Binyu","family":"Zang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1997.645821"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736062"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.19"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265925"},{"key":"33","first-page":"105","article-title":"N-variant systems: A secretless framework for security through diversity","author":"cox","year":"2006","journal-title":"Proc Usenix Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1086297.1086305"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630087"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181316"},{"key":"39","article-title":"Securing software by enforcing data-flow integrity","author":"castro","year":"2006","journal-title":"Proc OSDI"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"12","first-page":"195","article-title":"Defeating return-oriented rootkits with return-less kernels","author":"li","year":"2010","journal-title":"Proc EuroSys"},{"key":"21","year":"0","journal-title":"Instruction-based Sampling A New Performance Analysis Technique"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028478"},{"key":"43","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proc NDSS"},{"key":"42","first-page":"121","article-title":"Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks","author":"xu","year":"2006","journal-title":"Proc Usenix Security"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"40","first-page":"88","article-title":"XFI: Software guards for system address spaces","author":"erlingsson","year":"2006","journal-title":"Proc OSDI"},{"key":"45","article-title":"TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones","author":"enck","year":"2010","journal-title":"Proc OSDI"},{"key":"44","first-page":"135","article-title":"LIFT: A low-overhead practical information flow tracking system for detecting security attacks","volume":"2006","author":"qin","year":"0","journal-title":"Proc MICRO"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669162"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.18"},{"key":"22","author":"molnar","year":"2009","journal-title":"Performance Counters for Linux V8"},{"key":"23","article-title":"Non-control-data attacks are realistic threats","author":"chen","year":"2005","journal-title":"Proc Usenix Security"},{"key":"24","year":"0"},{"key":"25","year":"0"},{"key":"26","article-title":"Distributed caching with memcached","author":"fitzpatrick","year":"2004","journal-title":"Linux Journal"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/258915.258924"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1088149.1088163"},{"key":"3","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2005.106","article-title":"The blaster worm: Then and now","volume":"3","author":"bailey","year":"2005","journal-title":"IEEE Security & Privacy"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1655108.1655117"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586130"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103807"},{"key":"7","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/1966913.1966919","article-title":"Jump-oriented programming: A new class of code-reuse attack","author":"bletsch","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"6","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/1315245.1315313","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and Communications Security"},{"key":"32","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/1966913.1966920","article-title":"Ropdefender: A detection tool to defend against return-oriented programming attacks","author":"davi","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security"},{"key":"5","article-title":"The advanced return-into-lib (c) exploits: Pax case study","author":"wojtczuk","year":"2001","journal-title":"Phrack Magazine Volume 0x0b Issue 0x3a Phile# 0x04 of 0x0e"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1712605.1712623"},{"key":"4","article-title":"Cybersecurity: A crisis of prioritization","year":"2005","journal-title":"President's Information Technology Advisory Committee (PITAC)"},{"key":"9","article-title":"FormatGuard: Automatic protection from printf format string vulnerabilities","author":"cowan","year":"2001","journal-title":"Proc Usenix Security"},{"key":"8","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks","author":"cowan","year":"1998","journal-title":"Proc Usenix Security"}],"event":{"name":"2012 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","location":"Boston, MA, USA","start":{"date-parts":[[2012,6,25]]},"end":{"date-parts":[[2012,6,28]]}},"container-title":["IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2012)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/6253623\/6263904\/06263958.pdf?arnumber=6263958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T18:46:50Z","timestamp":1643222810000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6263958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":47,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/dsn.2012.6263958","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}