{"id":"https://openalex.org/W2914237914","doi":"https://doi.org/10.1109/reconfig.2018.8641707","title":"Language Abstractions for Hardware-based Control-Flow Integrity Monitoring","display_name":"Language Abstractions for Hardware-based Control-Flow Integrity Monitoring","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2914237914","doi":"https://doi.org/10.1109/reconfig.2018.8641707","mag":"2914237914"},"language":"en","primary_location":{"id":"doi:10.1109/reconfig.2018.8641707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/reconfig.2018.8641707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103052303","display_name":"William L. Harrison","orcid":"https://orcid.org/0000-0002-3760-3556"},"institutions":[{"id":"https://openalex.org/I76835614","display_name":"University of Missouri","ror":"https://ror.org/02ymw8z06","country_code":"US","type":"education","lineage":["https://openalex.org/I76835614"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"William L. Harrison","raw_affiliation_strings":["Department of Electrical Engineering & Computer Science, University of Missouri Columbia, Missouri, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering & Computer Science, University of Missouri Columbia, Missouri, USA","institution_ids":["https://openalex.org/I76835614"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070038296","display_name":"Gerard Allwein","orcid":null},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]},{"id":"https://openalex.org/I4388482696","display_name":"Naval Research Laboratory Information Technology Division","ror":"https://ror.org/04xfp8b22","country_code":null,"type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028","https://openalex.org/I4388482696"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gerard Allwein","raw_affiliation_strings":["Center for High Assurance Computer Systems US Naval Research Laboratory, Washington, DC, USA"],"affiliations":[{"raw_affiliation_string":"Center for High Assurance Computer Systems US Naval Research Laboratory, Washington, DC, USA","institution_ids":["https://openalex.org/I1288214837","https://openalex.org/I4388482696"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103052303"],"corresponding_institution_ids":["https://openalex.org/I76835614"],"apc_list":null,"apc_paid":null,"fwci":0.1629,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61822767,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"abs 1706 7257","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8677396178245544},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.7011390328407288},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6652028560638428},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5694296956062317},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.539952278137207},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5369192361831665},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5297891497612},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.5054445266723633},{"id":"https://openalex.org/keywords/domain-specific-language","display_name":"Domain-specific language","score":0.421487420797348},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.41413414478302},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.40440523624420166},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3269176781177521}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8677396178245544},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.7011390328407288},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6652028560638428},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5694296956062317},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.539952278137207},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5369192361831665},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5297891497612},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.5054445266723633},{"id":"https://openalex.org/C135257023","wikidata":"https://www.wikidata.org/wiki/Q691358","display_name":"Domain-specific language","level":2,"score":0.421487420797348},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.41413414478302},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.40440523624420166},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3269176781177521},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/reconfig.2018.8641707","is_oa":false,"landing_page_url":"https://doi.org/10.1109/reconfig.2018.8641707","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on ReConFigurable Computing and FPGAs (ReConFig)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W313632754","https://openalex.org/W1429241971","https://openalex.org/W1964825150","https://openalex.org/W1983394510","https://openalex.org/W2001978806","https://openalex.org/W2013088096","https://openalex.org/W2022292029","https://openalex.org/W2109219878","https://openalex.org/W2136021246","https://openalex.org/W2159319976","https://openalex.org/W2162800072","https://openalex.org/W2258876169","https://openalex.org/W2276559697","https://openalex.org/W2295234910","https://openalex.org/W2513361541","https://openalex.org/W2543022537","https://openalex.org/W2567865805","https://openalex.org/W2714546933","https://openalex.org/W2765192396","https://openalex.org/W6628351959","https://openalex.org/W6676126365"],"related_works":["https://openalex.org/W2182697532","https://openalex.org/W4310506228","https://openalex.org/W2128417157","https://openalex.org/W1517387344","https://openalex.org/W1544062218","https://openalex.org/W4281950471","https://openalex.org/W1964111631","https://openalex.org/W2788011716","https://openalex.org/W185550498","https://openalex.org/W2348203156"],"abstract_inverted_index":{"Control-Flow":[0],"Integrity":[1],"(CFI)":[2],"is":[3,81,89,150,165],"a":[4,10,90,97,123,136],"software":[5],"protection":[6],"mechanism":[7],"that":[8,138,164],"detects":[9],"class":[11],"of":[12,29,33,41,70,85,117],"code":[13],"reuse":[14],"attacks":[15],"by":[16],"identifying":[17],"anomalous":[18],"control-flows":[19],"within":[20],"an":[21,82,156],"executing":[22],"program.":[23],"Hardware-based":[24],"CFI":[25,34,63,80,94,118,163],"has":[26],"the":[27,30,36,68,102,113,140,147],"promise":[28],"security":[31],"benefits":[32],"without":[35,67],"performance":[37,55],"overhead":[38],"and":[39,87,115,168],"complexity":[40],"software-based":[42,58],"CFI:":[43],"generally":[44],"speaking,":[45],"hardware-based":[46,62,79,160],"monitors":[47,161],"are":[48],"more":[49],"difficult":[50],"to":[51,101,112,158,175],"bypass,":[52],"offer":[53],"lower":[54],"overheads":[56],"than":[57],"monitors,":[59],"and,":[60],"furthermore,":[61],"can":[64],"be":[65],"performed":[66],"necessity":[69],"altering":[71],"application":[72],"binaries":[73],"or":[74],"instrumenting":[75],"language":[76,126,144],"compilers.":[77],"Although":[78],"active":[83],"area":[84],"research":[86],"there":[88,99],"growing":[91],"literature":[92],"describing":[93],"strategies":[95],"at":[96],"high-level,":[98],"is,":[100],"authors'":[103],"best":[104],"knowledge,":[105],"no":[106],"work":[107],"on":[108],"languages":[109],"specially":[110],"tailored":[111],"specification":[114],"implementation":[116],"monitors.":[119],"This":[120],"article":[121],"presents":[122],"proof-of-concept":[124],"domain-specific":[125],"with":[127,135],"built-in":[128],"abstractions":[129],"for":[130],"expressing":[131],"control-flow":[132],"constraints":[133],"along":[134],"compiler":[137],"targets":[139],"functional":[141],"hardware":[142],"description":[143],"ReWire.":[145],"While":[146],"case":[148],"study":[149],"small,":[151],"it":[152],"indicates,":[153],"we":[154],"argue,":[155],"approach":[157],"rapid-prototyping":[159],"enforcing":[162],"quick,":[166],"flexible,":[167],"extensible":[169],"as":[170,172],"well":[171],"being":[173],"amenable":[174],"formal":[176],"verification.":[177]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
