{"id":"https://openalex.org/W2584029330","doi":"https://doi.org/10.1145/3037697.3037716","title":"GRIFFIN","display_name":"GRIFFIN","publication_year":2017,"publication_date":"2017-04-04","ids":{"openalex":"https://openalex.org/W2584029330","doi":"https://doi.org/10.1145/3037697.3037716","mag":"2584029330"},"language":"en","primary_location":{"id":"doi:10.1145/3037697.3037716","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3037697.3037716","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3037697.3037716","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3037697.3037716","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085945429","display_name":"Xinyang Ge","orcid":"https://orcid.org/0000-0001-6030-2068"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xinyang Ge","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112117974","display_name":"Weidong Cui","orcid":"https://orcid.org/0000-0002-2871-9485"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weidong Cui","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055045569","display_name":"Trent Jaeger","orcid":"https://orcid.org/0000-0002-4964-1170"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Trent Jaeger","raw_affiliation_strings":["The Pennsylvania State University, University Park, PA, USA"],"affiliations":[{"raw_affiliation_string":"The Pennsylvania State University, University Park, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085945429"],"corresponding_institution_ids":["https://openalex.org/I1290206253"],"apc_list":null,"apc_paid":null,"fwci":8.9385,"has_fulltext":true,"cited_by_count":76,"citation_normalized_percentile":{"value":0.98131314,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"585","last_page":"598"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8136826753616333},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.7179727554321289},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6145530343055725},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.6076940894126892},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5326008200645447},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.5151385068893433},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5105918049812317},{"id":"https://openalex.org/keywords/instrumentation","display_name":"Instrumentation (computer programming)","score":0.440860390663147},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.4408006966114044},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.338961660861969},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17093709111213684}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8136826753616333},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.7179727554321289},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6145530343055725},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.6076940894126892},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5326008200645447},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.5151385068893433},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5105918049812317},{"id":"https://openalex.org/C118530786","wikidata":"https://www.wikidata.org/wiki/Q1134732","display_name":"Instrumentation (computer programming)","level":2,"score":0.440860390663147},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.4408006966114044},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.338961660861969},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17093709111213684}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3037697.3037716","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3037697.3037716","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3037697.3037716","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3037697.3037716","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3037697.3037716","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3037697.3037716","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2043895709","display_name":null,"funder_award_id":"W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G3166108113","display_name":null,"funder_award_id":"CNS-1408880","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3337628798","display_name":"TWC: Medium: Collaborative: Retrofitting Software for Defense-in-Depth","funder_award_id":"1408880","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3693556586","display_name":null,"funder_award_id":"2-004","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3732666562","display_name":null,"funder_award_id":"W911NF-13","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G4307486606","display_name":null,"funder_award_id":"W911NF-13-2-0045 (ARL Cyber Security CRA)","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G5259331294","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"},{"id":"https://openalex.org/G8727049869","display_name":null,"funder_award_id":"W911NF-13","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8763038417","display_name":null,"funder_award_id":"Cooperative Agreement Number W911NF-13-2-0045","funder_id":"https://openalex.org/F4320338295","funder_display_name":"Army Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320314997","display_name":"Strong","ror":"https://ror.org/041vyzr56"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2584029330.pdf","grobid_xml":"https://content.openalex.org/works/W2584029330.grobid-xml"},"referenced_works_count":47,"referenced_works":["https://openalex.org/W70478248","https://openalex.org/W173413620","https://openalex.org/W1429241971","https://openalex.org/W1477563924","https://openalex.org/W1538332098","https://openalex.org/W1544471297","https://openalex.org/W1591211019","https://openalex.org/W1631846088","https://openalex.org/W1816718056","https://openalex.org/W1823377586","https://openalex.org/W1968002620","https://openalex.org/W1969338270","https://openalex.org/W1982829328","https://openalex.org/W1990465482","https://openalex.org/W1993682390","https://openalex.org/W1993736952","https://openalex.org/W2001978806","https://openalex.org/W2004456327","https://openalex.org/W2015083179","https://openalex.org/W2020208333","https://openalex.org/W2022292029","https://openalex.org/W2027963645","https://openalex.org/W2074943483","https://openalex.org/W2080313875","https://openalex.org/W2088383546","https://openalex.org/W2089448621","https://openalex.org/W2109219878","https://openalex.org/W2118315969","https://openalex.org/W2124360577","https://openalex.org/W2133592286","https://openalex.org/W2136096788","https://openalex.org/W2138019494","https://openalex.org/W2138517425","https://openalex.org/W2159216827","https://openalex.org/W2159558457","https://openalex.org/W2171929398","https://openalex.org/W2295234910","https://openalex.org/W2296563811","https://openalex.org/W2368550879","https://openalex.org/W2397986719","https://openalex.org/W2516933175","https://openalex.org/W2559798902","https://openalex.org/W2602748134","https://openalex.org/W2612611921","https://openalex.org/W6638559843","https://openalex.org/W6648649210","https://openalex.org/W6678545021"],"related_works":["https://openalex.org/W2480874422","https://openalex.org/W2953905390","https://openalex.org/W2433374248","https://openalex.org/W4328027208","https://openalex.org/W2982485227","https://openalex.org/W2074943483","https://openalex.org/W2599697152","https://openalex.org/W2527112196","https://openalex.org/W4226254400","https://openalex.org/W3211669773"],"abstract_inverted_index":{"Researchers":[0],"are":[1,49],"actively":[2],"exploring":[3],"techniques":[4],"to":[5,14,25,73,87,105,189],"enforce":[6,55,172],"control-flow":[7,76],"integrity":[8],"(CFI),":[9],"which":[10],"restricts":[11],"program":[12],"execution":[13],"a":[15,93,126,139,154,184],"predefined":[16],"set":[17],"of":[18,70,133,156],"targets":[19],"for":[20,37,117,129,205,210],"each":[21],"indirect":[22],"control":[23,57],"transfer":[24],"prevent":[26],"code-reuse":[27],"attacks.":[28],"While":[29,100],"hardware-assisted":[30,47,94],"CFI":[31,95,119,134,151,174],"enforcement":[32,96,120,152],"may":[33,98],"have":[34,137],"the":[35,67,144,159],"potential":[36],"advantages":[38],"in":[39,62,107,143],"performance":[40,185,203],"and":[41,91,110,162],"flexibility":[42],"over":[43,121,153],"software":[44],"instrumentation,":[45],"current":[46],"defenses":[48],"either":[50],"incomplete":[51],"(i.e.,":[52],"do":[53],"not":[54],"all":[56],"transfers)":[58],"or":[59],"less":[60],"efficient":[61,90],"comparison.":[63],"We":[64,136],"find":[65,196],"that":[66,148,169,186,197],"recent":[68],"introduction":[69],"hardware":[71,212],"features":[72],"log":[74],"complete":[75,150],"traces,":[77],"such":[78],"as":[79,179],"Intel":[80,101],"Processor":[81],"Trace":[82],"(PT),":[83],"provides":[84],"an":[85],"opportunity":[86],"explore":[88,114],"how":[89],"flexible":[92],"system":[97],"become.":[99],"PT":[102],"was":[103],"designed":[104],"aid":[106],"offline":[108],"debugging":[109],"failure":[111],"diagnosis,":[112],"we":[113,195],"its":[115,163],"effectiveness":[116],"online":[118],"unmodified":[122],"binaries":[123],"by":[124,181],"designing":[125],"parallelized":[127],"method":[128],"enforcing":[130],"various":[131],"types":[132],"policies.":[135],"implemented":[138],"prototype":[140],"called":[141],"GRIFFIN":[142,170],"Linux":[145],"4.2":[146],"kernel":[147],"enables":[149],"variety":[155],"software,":[157],"including":[158],"Firefox":[160],"browser":[161],"jitted":[164],"code.":[165],"Our":[166],"experiments":[167],"show":[168],"can":[171],"fine-grained":[173],"policies":[175],"with":[176],"shadow":[177],"stack":[178],"recommended":[180],"researchers":[182],"at":[183],"is":[187],"comparable":[188],"software-only":[190],"instrumentation":[191],"techniques.":[192],"In":[193],"addition,":[194],"alternative":[198],"logging":[199],"approaches":[200],"yield":[201],"significant":[202],"improvements":[204],"trace":[206],"processing,":[207],"identifying":[208],"opportunities":[209],"further":[211],"assistance.":[213]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":23},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":5}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2017-02-10T00:00:00"}
