{"id":"https://openalex.org/W2889046186","doi":"https://doi.org/10.1109/asap.2018.8445132","title":"Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks","display_name":"Clean the Scratch Registers: A Way to Mitigate Return-Oriented Programming Attacks","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2889046186","doi":"https://doi.org/10.1109/asap.2018.8445132","mag":"2889046186"},"language":"en","primary_location":{"id":"doi:10.1109/asap.2018.8445132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2018.8445132","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017293650","display_name":"Zelin Rong","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zelin Rong","raw_affiliation_strings":["Zeling Rong is with National, University of Defense Technology, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Zeling Rong is with National, University of Defense Technology, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111933401","display_name":"Peidai Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peidai Xie","raw_affiliation_strings":["Zeling Rong is with National, University of Defense Technology, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Zeling Rong is with National, University of Defense Technology, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400846","display_name":"Jingyuan Wang","orcid":"https://orcid.org/0000-0003-0651-1592"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyuan Wang","raw_affiliation_strings":["Zeling Rong is with National, University of Defense Technology, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Zeling Rong is with National, University of Defense Technology, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084128665","display_name":"Shenglin Xu","orcid":"https://orcid.org/0000-0001-9533-4086"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shenglin Xu","raw_affiliation_strings":["Zeling Rong is with National, University of Defense Technology, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Zeling Rong is with National, University of Defense Technology, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100424209","display_name":"Yongjun Wang","orcid":"https://orcid.org/0000-0002-3627-1465"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yongjun Wang","raw_affiliation_strings":["Zeling Rong is with National, University of Defense Technology, Hunan, China"],"affiliations":[{"raw_affiliation_string":"Zeling Rong is with National, University of Defense Technology, Hunan, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017293650"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.58559756,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"40","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8270604610443115},{"id":"https://openalex.org/keywords/scratch","display_name":"Scratch","score":0.7506179809570312},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6493862271308899},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5255704522132874},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5107269287109375},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4358168840408325},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35667684674263},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2607007324695587}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8270604610443115},{"id":"https://openalex.org/C2781235140","wikidata":"https://www.wikidata.org/wiki/Q275131","display_name":"Scratch","level":2,"score":0.7506179809570312},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6493862271308899},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5255704522132874},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5107269287109375},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4358168840408325},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35667684674263},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2607007324695587},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/asap.2018.8445132","is_oa":false,"landing_page_url":"https://doi.org/10.1109/asap.2018.8445132","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 29th International Conference on Application-specific Systems, Architectures and Processors (ASAP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324150","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W70478248","https://openalex.org/W148956775","https://openalex.org/W199961241","https://openalex.org/W1515653707","https://openalex.org/W1968002620","https://openalex.org/W1969501726","https://openalex.org/W1982829328","https://openalex.org/W1989773959","https://openalex.org/W1996931407","https://openalex.org/W2009801020","https://openalex.org/W2021806553","https://openalex.org/W2027963645","https://openalex.org/W2074943483","https://openalex.org/W2121468041","https://openalex.org/W2132806808","https://openalex.org/W2134633067","https://openalex.org/W2149918819","https://openalex.org/W2154435823","https://openalex.org/W2156858199","https://openalex.org/W2159216827","https://openalex.org/W2160468841","https://openalex.org/W2162800072","https://openalex.org/W2978757628","https://openalex.org/W4239035626","https://openalex.org/W6602906054","https://openalex.org/W6606033369","https://openalex.org/W6683671222"],"related_works":["https://openalex.org/W2475116013","https://openalex.org/W2066741154","https://openalex.org/W17155033","https://openalex.org/W2770018148","https://openalex.org/W2358308169","https://openalex.org/W2385135707","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W2140315382","https://openalex.org/W2059109728"],"abstract_inverted_index":{"With":[0],"the":[1,16,59,65,70],"implementation":[2],"of":[3,72],"W":[4],"\u2295":[5],"X":[6],"security":[7],"model":[8],"on":[9,54,69,83,88],"computer":[10],"system,":[11],"Return-Oriented":[12],"Programming(ROP)":[13],"has":[14],"become":[15],"primary":[17],"exploitation":[18],"technique":[19],"for":[20],"adversaries.":[21],"Although":[22],"many":[23],"solutions":[24],"that":[25,51,94],"defend":[26],"against":[27],"ROP":[28,49,73,101],"exploits":[29],"have":[30],"been":[31],"proposed,":[32],"they":[33],"still":[34],"suffer":[35],"from":[36],"various":[37],"shortcomings.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42],"propose":[43],"a":[44],"new":[45],"way":[46],"to":[47],"mitigate":[48,99],"attacks":[50],"are":[52,63],"based":[53,68,87],"return":[55],"instructions.":[56],"We":[57],"clean":[58],"scratch":[60],"registers":[61,67],"which":[62],"also":[64],"parameter":[66],"features":[71],"malicious":[74],"code":[75],"and":[76],"calling":[77],"convention.":[78],"A":[79],"prototype":[80],"is":[81],"implemented":[82],"x64-based":[84],"Linux":[85],"platform":[86],"Pin.":[89],"Preliminary":[90],"experimental":[91],"results":[92],"show":[93],"our":[95],"method":[96],"can":[97],"efficiently":[98],"conventional":[100],"attacks.":[102]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
