{"id":"https://openalex.org/W2982485227","doi":"https://doi.org/10.1109/ewdts.2019.8884464","title":"CFI: Control Flow Integrity or Control Flow Interruption?","display_name":"CFI: Control Flow Integrity or Control Flow Interruption?","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2982485227","doi":"https://doi.org/10.1109/ewdts.2019.8884464","mag":"2982485227"},"language":"en","primary_location":{"id":"doi:10.1109/ewdts.2019.8884464","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2019.8884464","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055234714","display_name":"Nicol\u00f2 Maunero","orcid":"https://orcid.org/0000-0002-4331-1066"},"institutions":[{"id":"https://openalex.org/I4210152452","display_name":"Consorzio Interuniversitario Nazionale per l'Informatica","ror":"https://ror.org/03v8v5y65","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210152452"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Nicolo Maunero","raw_affiliation_strings":["CINI Cybersecurity National Lab., Turin, Italy"],"affiliations":[{"raw_affiliation_string":"CINI Cybersecurity National Lab., Turin, Italy","institution_ids":["https://openalex.org/I4210152452"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036258272","display_name":"P. Prinetto","orcid":"https://orcid.org/0000-0003-2400-8245"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Paolo Prinetto","raw_affiliation_strings":["CINI Cybersecurity National Lab., Politecnico di Torino, Turin, Italy"],"affiliations":[{"raw_affiliation_string":"CINI Cybersecurity National Lab., Politecnico di Torino, Turin, Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048351413","display_name":"Gianluca Roascio","orcid":"https://orcid.org/0000-0003-0457-0855"},"institutions":[{"id":"https://openalex.org/I4210152452","display_name":"Consorzio Interuniversitario Nazionale per l'Informatica","ror":"https://ror.org/03v8v5y65","country_code":"IT","type":"facility","lineage":["https://openalex.org/I4210152452"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Gianluca Roascio","raw_affiliation_strings":["CINI Cybersecurity National Lab., Turin, Italy"],"affiliations":[{"raw_affiliation_string":"CINI Cybersecurity National Lab., Turin, Italy","institution_ids":["https://openalex.org/I4210152452"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055234714"],"corresponding_institution_ids":["https://openalex.org/I4210152452"],"apc_list":null,"apc_paid":null,"fwci":0.7001,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.78482249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interrupt","display_name":"Interrupt","score":0.9224426746368408},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8010640144348145},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.779934287071228},{"id":"https://openalex.org/keywords/interrupt-handler","display_name":"Interrupt handler","score":0.7480171918869019},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.6276164650917053},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.5346822738647461},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.477695494890213},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.46547386050224304},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.46488189697265625},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4566866159439087},{"id":"https://openalex.org/keywords/exception-handling","display_name":"Exception handling","score":0.442921906709671},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4319300055503845},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.42746931314468384},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4070962965488434},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3508608937263489},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3449481725692749},{"id":"https://openalex.org/keywords/microcontroller","display_name":"Microcontroller","score":0.1158895194530487},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10313710570335388}],"concepts":[{"id":"https://openalex.org/C41661131","wikidata":"https://www.wikidata.org/wiki/Q220764","display_name":"Interrupt","level":3,"score":0.9224426746368408},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8010640144348145},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.779934287071228},{"id":"https://openalex.org/C28533478","wikidata":"https://www.wikidata.org/wiki/Q1541162","display_name":"Interrupt handler","level":4,"score":0.7480171918869019},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.6276164650917053},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.5346822738647461},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.477695494890213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.46547386050224304},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.46488189697265625},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4566866159439087},{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.442921906709671},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4319300055503845},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.42746931314468384},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4070962965488434},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3508608937263489},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3449481725692749},{"id":"https://openalex.org/C173018170","wikidata":"https://www.wikidata.org/wiki/Q165678","display_name":"Microcontroller","level":2,"score":0.1158895194530487},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10313710570335388},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ewdts.2019.8884464","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ewdts.2019.8884464","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE East-West Design &amp; Test Symposium (EWDTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8500000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":55,"referenced_works":["https://openalex.org/W70478248","https://openalex.org/W1495630617","https://openalex.org/W1515653707","https://openalex.org/W1538332098","https://openalex.org/W1544471297","https://openalex.org/W1545927878","https://openalex.org/W1592300071","https://openalex.org/W1631846088","https://openalex.org/W1655226010","https://openalex.org/W1823377586","https://openalex.org/W1968002620","https://openalex.org/W1969501726","https://openalex.org/W1989060313","https://openalex.org/W1996931407","https://openalex.org/W2004456327","https://openalex.org/W2006621394","https://openalex.org/W2022292029","https://openalex.org/W2074943483","https://openalex.org/W2089448621","https://openalex.org/W2099382052","https://openalex.org/W2109219878","https://openalex.org/W2117798902","https://openalex.org/W2141021963","https://openalex.org/W2141389113","https://openalex.org/W2153256720","https://openalex.org/W2159216827","https://openalex.org/W2162800072","https://openalex.org/W2162986442","https://openalex.org/W2171143790","https://openalex.org/W2171929398","https://openalex.org/W2295234910","https://openalex.org/W2346595863","https://openalex.org/W2397986719","https://openalex.org/W2406423978","https://openalex.org/W2543022537","https://openalex.org/W2612418998","https://openalex.org/W2754627801","https://openalex.org/W2761655430","https://openalex.org/W2784642434","https://openalex.org/W2794591470","https://openalex.org/W2886993607","https://openalex.org/W2992077216","https://openalex.org/W3103277946","https://openalex.org/W4238983745","https://openalex.org/W6602906054","https://openalex.org/W6629740654","https://openalex.org/W6635517346","https://openalex.org/W6636574085","https://openalex.org/W6638559843","https://openalex.org/W6652039329","https://openalex.org/W6676126365","https://openalex.org/W6683671222","https://openalex.org/W6712915683","https://openalex.org/W6770886153","https://openalex.org/W7038687428"],"related_works":["https://openalex.org/W2033946387","https://openalex.org/W2138385884","https://openalex.org/W4384302888","https://openalex.org/W2166895275","https://openalex.org/W2998775986","https://openalex.org/W157564837","https://openalex.org/W1999711970","https://openalex.org/W2433374248","https://openalex.org/W2527112196","https://openalex.org/W2626499139"],"abstract_inverted_index":{"Runtime":[0],"memory":[1],"vulnerabilities,":[2],"especially":[3],"present":[4,130],"in":[5],"widely":[6],"used":[7],"languages":[8],"as":[9,55,74,124],"C":[10],"and":[11,21,50,59,102,126,143,152],"C++,":[12],"are":[13],"exploited":[14],"by":[15,136],"attackers":[16],"to":[17,34,37,86],"corrupt":[18],"code":[19,71],"pointers":[20],"hijack":[22],"the":[23,42,66,140,146,153],"execution":[24,155],"flow":[25],"of":[26,44,51,139,149,156],"a":[27,31,83,108,114,117],"program":[28],"running":[29],"on":[30,111,133],"target":[32],"system":[33],"force":[35],"it":[36],"behave":[38],"abnormally.":[39],"This":[40],"is":[41,82],"principle":[43],"modern":[45],"Code":[46],"Reuse":[47],"Attacks":[48],"(CRAs)":[49],"famous":[52],"attack":[53],"paradigms":[54],"Return-Oriented":[56],"Programming":[57,61],"(ROP)":[58],"Jump-Oriented":[60],"(JOP),":[62],"which":[63],"have":[64,96],"defeated":[65],"previous":[67],"defenses":[68,142],"against":[69,88],"malicious":[70],"injection":[72],"such":[73,89],"Data":[75],"Execution":[76],"Prevention":[77],"(DEP).":[78],"Control-Flow":[79],"Integrity":[80],"(CFI)":[81],"promising":[84],"approach":[85],"protect":[87],"runtime":[90],"attacks.":[91],"Recently,":[92],"many":[93],"CFI":[94],"solutions":[95],"been":[97],"proposed,":[98],"with":[99,113,121],"both":[100],"hardware":[101],"software":[103],"implementations.":[104],"But":[105],"how":[106,145],"can":[107,162],"defense":[109],"based":[110],"complying":[112],"graph":[115],"calculated":[116],"priori":[118],"efficiently":[119],"deal":[120],"something":[122],"unpredictable":[123],"exceptions":[125],"interrupt":[127,151],"requests?":[128],"The":[129],"paper":[131],"focuses":[132],"this":[134],"dichotomy":[135],"analysing":[137],"some":[138],"CFI-based":[141],"showing":[144],"unexpected":[147],"trigger":[148],"an":[150,157],"sudden":[154],"Interrupt":[158],"Service":[159],"Routine":[160],"(ISR)":[161],"circumvent":[163],"them.":[164]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
