{"id":"https://openalex.org/W2897174340","doi":"https://doi.org/10.1109/iolts.2018.8474130","title":"Effective Control Flow Integrity Checks for Intrusion Detection","display_name":"Effective Control Flow Integrity Checks for Intrusion Detection","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2897174340","doi":"https://doi.org/10.1109/iolts.2018.8474130","mag":"2897174340"},"language":"en","primary_location":{"id":"doi:10.1109/iolts.2018.8474130","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2018.8474130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109959166","display_name":"Ameya Chaudhari","orcid":null},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ameya Chaudhari","raw_affiliation_strings":["The University of Texas at Austin, Austin, Texas, U.S.A"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin, Austin, Texas, U.S.A","institution_ids":["https://openalex.org/I86519309"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068070739","display_name":"Jacob A. Abraham","orcid":"https://orcid.org/0000-0002-5336-5631"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jacob A. Abraham","raw_affiliation_strings":["The University of Texas at Austin, Austin, Texas, U.S.A"],"affiliations":[{"raw_affiliation_string":"The University of Texas at Austin, Austin, Texas, U.S.A","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109959166"],"corresponding_institution_ids":["https://openalex.org/I86519309"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.59538659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8064405918121338},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.6469086408615112},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6387467980384827},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.514556348323822},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5073637366294861},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.49543988704681396},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.49442315101623535},{"id":"https://openalex.org/keywords/intrusion-tolerance","display_name":"Intrusion tolerance","score":0.45469656586647034},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.41915518045425415},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4074466824531555},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35713082551956177},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.34253114461898804},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.26991623640060425},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.10708793997764587}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8064405918121338},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.6469086408615112},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6387467980384827},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.514556348323822},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5073637366294861},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.49543988704681396},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.49442315101623535},{"id":"https://openalex.org/C196903269","wikidata":"https://www.wikidata.org/wiki/Q6059063","display_name":"Intrusion tolerance","level":3,"score":0.45469656586647034},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.41915518045425415},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4074466824531555},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35713082551956177},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.34253114461898804},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.26991623640060425},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.10708793997764587},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iolts.2018.8474130","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iolts.2018.8474130","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 24th International Symposium on On-Line Testing And Robust System Design (IOLTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W173413620","https://openalex.org/W1511186238","https://openalex.org/W1544225867","https://openalex.org/W1595579786","https://openalex.org/W1607921603","https://openalex.org/W1631846088","https://openalex.org/W1985743139","https://openalex.org/W2042856445","https://openalex.org/W2087223915","https://openalex.org/W2109219878","https://openalex.org/W2119971343","https://openalex.org/W2122403474","https://openalex.org/W2128171167","https://openalex.org/W2138517425","https://openalex.org/W2139090828","https://openalex.org/W2146966321","https://openalex.org/W2147657366","https://openalex.org/W2157676568","https://openalex.org/W2753562754","https://openalex.org/W4251451722","https://openalex.org/W6607078713","https://openalex.org/W6630580321","https://openalex.org/W6636204006","https://openalex.org/W6636574085","https://openalex.org/W6678209921","https://openalex.org/W6743608623"],"related_works":["https://openalex.org/W2931688134","https://openalex.org/W2377919138","https://openalex.org/W2378857091","https://openalex.org/W4256502920","https://openalex.org/W103652678","https://openalex.org/W4226090359","https://openalex.org/W2389356976","https://openalex.org/W2353050426","https://openalex.org/W1539957869","https://openalex.org/W2487262093"],"abstract_inverted_index":{"Ensuring":[0],"run":[1,54],"time":[2,55],"Control":[3],"Flow":[4],"Integrity":[5],"(CFI)":[6],"has":[7],"proven":[8],"to":[9,14,31,44,61,82,116],"be":[10],"a":[11,73,79,104,118],"good":[12],"way":[13],"detect":[15],"and":[16,65,87,101,120],"prevent":[17],"intrusions":[18],"which":[19],"result":[20],"from":[21],"exploitation":[22],"of":[23,40,85,91,103],"unknown":[24],"vulnerabilities":[25],"in":[26],"the":[27,33,37,41,88,97,111],"software.":[28],"Attackers":[29],"need":[30],"change":[32],"control":[34,89],"flow":[35,90],"and/or":[36],"code":[38,86],"text":[39],"victim":[42],"application":[43],"achieve":[45],"their":[46,62],"malicious":[47],"intent.":[48],"However,":[49],"existing":[50],"techniques":[51],"for":[52],"monitoring":[53],"CFI":[56],"have":[57],"been":[58],"impractical":[59],"due":[60],"large":[63],"software":[64],"hardware":[66,75,113],"costs.":[67],"In":[68],"this":[69],"paper,":[70],"we":[71],"describe":[72],"practical":[74,119],"based":[76,107,114],"approach":[77],"at":[78],"fine":[80],"granularity":[81],"ensure":[83],"integrity":[84],"an":[92],"executing":[93],"application.":[94],"We":[95],"utilize":[96],"low":[98],"power":[99],"benefits":[100],"randomness":[102],"stream":[105],"cipher":[106],"hash,":[108],"combined":[109],"with":[110],"efficient":[112],"monitoring,":[115],"provide":[117],"functional":[121],"defense":[122],"against":[123],"intrusion":[124],"attacks.":[125]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
