{"id":"https://openalex.org/W1992931950","doi":"https://doi.org/10.1145/2656075.2656092","title":"Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity","display_name":"Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity","publication_year":2014,"publication_date":"2014-10-07","ids":{"openalex":"https://openalex.org/W1992931950","doi":"https://doi.org/10.1145/2656075.2656092","mag":"1992931950"},"language":"en","primary_location":{"id":"doi:10.1145/2656075.2656092","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2656075.2656092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 International Conference on Hardware/Software Codesign and System Synthesis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100322200","display_name":"Chen Liu","orcid":"https://orcid.org/0000-0003-1558-6836"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Chen Liu","raw_affiliation_strings":["University of Delaware, Newark, DE"],"affiliations":[{"raw_affiliation_string":"University of Delaware, Newark, DE","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016268650","display_name":"Chengmo Yang","orcid":"https://orcid.org/0000-0003-0978-1504"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chengmo Yang","raw_affiliation_strings":["University of Delaware, Newark, DE"],"affiliations":[{"raw_affiliation_string":"University of Delaware, Newark, DE","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103853086","display_name":"Yuanqi Shen","orcid":null},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuanqi Shen","raw_affiliation_strings":["University of Delaware, Newark, DE"],"affiliations":[{"raw_affiliation_string":"University of Delaware, Newark, DE","institution_ids":["https://openalex.org/I86501945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100322200"],"corresponding_institution_ids":["https://openalex.org/I86501945"],"apc_list":null,"apc_paid":null,"fwci":0.818,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79844607,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9825000166893005,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8150725364685059},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6477557420730591},{"id":"https://openalex.org/keywords/branch-predictor","display_name":"Branch predictor","score":0.609563410282135},{"id":"https://openalex.org/keywords/instruction-prefetch","display_name":"Instruction prefetch","score":0.6025474667549133},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5698552131652832},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.5358295440673828},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5275530219078064},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5156984925270081},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.50397127866745},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4337174892425537},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3578668534755707},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.23202213644981384}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8150725364685059},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6477557420730591},{"id":"https://openalex.org/C168522837","wikidata":"https://www.wikidata.org/wiki/Q679552","display_name":"Branch predictor","level":2,"score":0.609563410282135},{"id":"https://openalex.org/C133588205","wikidata":"https://www.wikidata.org/wiki/Q28455645","display_name":"Instruction prefetch","level":3,"score":0.6025474667549133},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5698552131652832},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.5358295440673828},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5275530219078064},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5156984925270081},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.50397127866745},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4337174892425537},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3578668534755707},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.23202213644981384},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2656075.2656092","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2656075.2656092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 International Conference on Hardware/Software Codesign and System Synthesis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W1568035385","https://openalex.org/W1593678010","https://openalex.org/W1655226010","https://openalex.org/W1666083638","https://openalex.org/W1933230280","https://openalex.org/W1963947298","https://openalex.org/W1971787401","https://openalex.org/W1989060313","https://openalex.org/W2009801020","https://openalex.org/W2044851785","https://openalex.org/W2098010707","https://openalex.org/W2104225326","https://openalex.org/W2111817346","https://openalex.org/W2121218648","https://openalex.org/W2128462419","https://openalex.org/W2132806808","https://openalex.org/W2133189397","https://openalex.org/W2144975273","https://openalex.org/W2150277819","https://openalex.org/W2159059513","https://openalex.org/W2162800072","https://openalex.org/W2171929398"],"related_works":["https://openalex.org/W2510306697","https://openalex.org/W3130987982","https://openalex.org/W2268822470","https://openalex.org/W1978925434","https://openalex.org/W2152620203","https://openalex.org/W2111401192","https://openalex.org/W2209148515","https://openalex.org/W2128781483","https://openalex.org/W4254204727","https://openalex.org/W4248729273"],"abstract_inverted_index":{"Stack":[0],"buffer":[1,78],"overflow":[2,79],"is":[3,67,83],"a":[4,20,33,70,111,124],"serious":[5],"security":[6,151],"threat":[7],"to":[8,22,58,68,73,86,114,134,141,157],"program":[9],"execution.":[10],"A":[11],"malicious":[12],"attacker":[13],"may":[14],"overwrite":[15],"the":[16,98,105,144,150,158],"return":[17,99,159],"address":[18,100,160],"of":[19,35,146,149,180],"procedure":[21],"alter":[23],"its":[24,30],"control":[25,87,137],"flow":[26,88,138],"and":[27,52,165],"hence":[28],"change":[29],"functionality.":[31],"While":[32],"number":[34],"hardware":[36],"and/or":[37],"software":[38],"based":[39],"protection":[40],"schemes":[41],"have":[42],"been":[43],"developed,":[44],"these":[45,116,173],"countermeasures":[46],"introduce":[47],"sizable":[48],"overhead":[49],"in":[50,97,104],"performance":[51],"energy,":[53],"thus":[54],"limiting":[55],"their":[56],"applicability":[57],"embedded":[59],"systems.":[60],"To":[61],"reduce":[62,143,176],"such":[63,94],"overhead,":[64],"our":[65],"goal":[66],"develop":[69],"low-cost":[71],"scheme":[72,113,130],"\"filter":[74],"out\"":[75],"potential":[76],"stack":[77,101],"attacks.":[80],"Our":[81],"observation":[82],"that":[84,172],"attacks":[85],"will":[89,131],"trigger":[90],"certain":[91],"microarchitectural":[92],"events,":[93],"as":[95],"mis-predictions":[96],"or":[102],"misses":[103],"instruction":[106,162,166],"cache.":[107],"We":[108],"therefore":[109],"propose":[110,154],"hardware-based":[112],"monitor":[115],"events.":[117],"Only":[118],"upon":[119],"detecting":[120],"any":[121],"suspicious":[122],"behavior,":[123],"more":[125,177],"precise":[126],"but":[127],"costly":[128],"diagnosis":[129],"be":[132],"invoked":[133],"thoroughly":[135],"check":[136],"integrity.":[139],"Meanwhile,":[140],"further":[142],"rate":[145],"false":[147,181,186],"positives":[148,182],"filter,":[152],"we":[153],"three":[155],"enhancements":[156,174],"stack,":[161],"prefetch":[163],"engine":[164],"cache,":[167],"respectively.":[168],"The":[169],"results":[170],"show":[171],"effectively":[175],"than":[178],"95%":[179],"with":[183],"almost":[184],"no":[185],"negatives":[187],"introduced.":[188]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
