{"id":"https://openalex.org/W4366967482","doi":"https://doi.org/10.1109/access.2023.3269881","title":"NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack","display_name":"NG-MVEE: A New Proposed Hybrid Technique for Enhanced Mitigation of Code Re-Use Attack","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4366967482","doi":"https://doi.org/10.1109/access.2023.3269881"},"language":"en","primary_location":{"id":"doi:10.1109/access.2023.3269881","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3269881","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10107607.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10107607.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079154027","display_name":"Ayman M. El-Zoghby","orcid":null},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Ayman M. El-Zoghby","raw_affiliation_strings":["School of Information Technology and Computer Science, Nile University, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Computer Science, Nile University, Cairo, Egypt","institution_ids":["https://openalex.org/I57629906"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088141347","display_name":"Mahmoud Said Elsayed","orcid":"https://orcid.org/0000-0003-2416-7481"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Mahmoud Said Elsayed","raw_affiliation_strings":["School of Computer Science, University College Dublin, Dublin 4, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin 4, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022546955","display_name":"Anca Delia Jurcut","orcid":"https://orcid.org/0000-0002-2705-1823"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Anca D. Jurcut","raw_affiliation_strings":["School of Computer Science, University College Dublin, Dublin 4, Ireland"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin 4, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026193065","display_name":"Marianne A. Azer","orcid":"https://orcid.org/0000-0002-8068-5120"},"institutions":[{"id":"https://openalex.org/I57629906","display_name":"Nile University","ror":"https://ror.org/03cg7cp61","country_code":"EG","type":"education","lineage":["https://openalex.org/I57629906"]},{"id":"https://openalex.org/I4210165434","display_name":"National Telecommunications Institute","ror":"https://ror.org/05g82f642","country_code":"EG","type":"education","lineage":["https://openalex.org/I4210165434"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Marianne A. Azer","raw_affiliation_strings":["School of Information Technology and Computer Science, Nile University, Cairo, Egypt","National Telecommunication Institute, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Computer Science, Nile University, Cairo, Egypt","institution_ids":["https://openalex.org/I57629906"]},{"raw_affiliation_string":"National Telecommunication Institute, Cairo, Egypt","institution_ids":["https://openalex.org/I4210165434"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079154027"],"corresponding_institution_ids":["https://openalex.org/I57629906"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.3491,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.62883072,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"11","issue":null,"first_page":"48169","last_page":"48191"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6869441270828247},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5271108746528625},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35367709398269653},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18122005462646484}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6869441270828247},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5271108746528625},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35367709398269653},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18122005462646484},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2023.3269881","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3269881","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10107607.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:988a5f67d3ef4cdca16c16c2cb5d3810","is_oa":true,"landing_page_url":"https://doaj.org/article/988a5f67d3ef4cdca16c16c2cb5d3810","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 11, Pp 48169-48191 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2023.3269881","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3269881","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/6514899/10107607.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320858","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4366967482.pdf","grobid_xml":"https://content.openalex.org/works/W4366967482.grobid-xml"},"referenced_works_count":58,"referenced_works":["https://openalex.org/W102746433","https://openalex.org/W1504083933","https://openalex.org/W1515653707","https://openalex.org/W1631846088","https://openalex.org/W1823377586","https://openalex.org/W1968002620","https://openalex.org/W1969338270","https://openalex.org/W1982829328","https://openalex.org/W1999687070","https://openalex.org/W1999936776","https://openalex.org/W2009801020","https://openalex.org/W2027963645","https://openalex.org/W2033593513","https://openalex.org/W2036853599","https://openalex.org/W2060276266","https://openalex.org/W2074943483","https://openalex.org/W2117798902","https://openalex.org/W2121468041","https://openalex.org/W2124360577","https://openalex.org/W2132806808","https://openalex.org/W2138517425","https://openalex.org/W2154435823","https://openalex.org/W2158302406","https://openalex.org/W2158389625","https://openalex.org/W2159059513","https://openalex.org/W2168843528","https://openalex.org/W2213021386","https://openalex.org/W2258876169","https://openalex.org/W2407989913","https://openalex.org/W2529788573","https://openalex.org/W2664885055","https://openalex.org/W2691795444","https://openalex.org/W2915893383","https://openalex.org/W2963120920","https://openalex.org/W2988502170","https://openalex.org/W3000020870","https://openalex.org/W3009315908","https://openalex.org/W3114160048","https://openalex.org/W3118679169","https://openalex.org/W3127782461","https://openalex.org/W3155572459","https://openalex.org/W3189208370","https://openalex.org/W3192786862","https://openalex.org/W3198309584","https://openalex.org/W4200223299","https://openalex.org/W4200473748","https://openalex.org/W4210749966","https://openalex.org/W4214525227","https://openalex.org/W4239035626","https://openalex.org/W4280636562","https://openalex.org/W4282927366","https://openalex.org/W4285104766","https://openalex.org/W6604159213","https://openalex.org/W6630326220","https://openalex.org/W6636574085","https://openalex.org/W6638559843","https://openalex.org/W6680659772","https://openalex.org/W6791983347"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Code-Reuse":[0],"Attacks":[1],"(CRAs)":[2],"are":[3,22,92,101],"solid":[4],"mechanisms":[5],"to":[6,25,36,164,192],"bypass":[7],"advanced":[8],"software":[9],"and":[10,20,69,130,153],"hardware":[11],"defenses":[12],"because":[13],"they":[14,21,100],"use":[15],"the":[16,47,58,62,72,77,83,110,121,174,193,198,209],"software\u2019s":[17],"own":[18],"code":[19],"very":[23],"hard":[24],"be":[26],"detected":[27],"without":[28],"significant":[29],"overhead.":[30],"Numerous":[31],"methods":[32],"have":[33],"been":[34],"proposed":[35,75,210],"protect":[37],"against":[38,168],"memory-based":[39],"attacks":[40],"that":[41,86,91],"result":[42],"from":[43,208],"reusing":[44],"parts":[45],"of":[46,64,71,115,126,173,182,197,203],"attacked":[48],"binary":[49],"code.":[50],"In":[51,109],"this":[52],"paper,":[53],"two":[54,122],"problems":[55],"were":[56],"tackled.":[57],"first":[59],"problem":[60,81],"is":[61,82,118,177],"lack":[63],"a":[65,112,156],"categorized":[66],"survey,":[67],"analysis,":[68],"evaluation":[70],"different":[73,123,157],"CRAs":[74],"in":[76,88,162],"literature.":[78],"The":[79,134,171],"second":[80],"inherent":[84],"vulnerability":[85],"exists":[87],"protection":[89,167,195,211],"techniques":[90,125],"based":[93],"on":[94],"Multi-Variant":[95],"Execution":[96],"Environment":[97],"(MVEE)":[98],"since":[99],"using":[102],"shared":[103],"Linux":[104],"libraries":[105],"with":[106,155,186],"gadget-prone":[107],"codes.":[108],"paper":[111],"novel":[113,135],"framework":[114],"CRA":[116,149,158],"mitigation":[117,136],"introduced;":[119],"fusing":[120],"prominent":[124],"control":[127],"flow":[128],"integrity":[129],"multi-variant":[131],"execution":[132],"environment.":[133],"technique,":[137,185],"named":[138],"Next":[139],"Generation":[140],"MVEE":[141,184],"(NG-MVEE),":[142],"was":[143],"built":[144],"upon":[145],"an":[146,178,183],"existing":[147],"generic":[148],"detection":[150,159],"system":[151,176],"(GHUMVEE)":[152],"complemented":[154],"technique":[160],"(G-Free)":[161],"order":[163],"provide":[165],"comprehensive":[166],"code-reuse":[169],"attacks.":[170],"outcome":[172],"hybrid":[175,180],"optimized":[179],"version":[181],"minimal":[187],"performance":[188,205],"overhead":[189,206],"increase":[190],"due":[191],"added":[194],"layer":[196],"G-Free":[199],"technique.":[200],"A":[201],"median":[202],"7%":[204],"resulted":[207],"system.":[212]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
