{"id":"https://openalex.org/W2735214320","doi":"https://doi.org/10.1145/3092703.3092729","title":"Boosting the precision of virtual call integrity protection with partial pointer analysis for C++","display_name":"Boosting the precision of virtual call integrity protection with partial pointer analysis for C++","publication_year":2017,"publication_date":"2017-07-10","ids":{"openalex":"https://openalex.org/W2735214320","doi":"https://doi.org/10.1145/3092703.3092729","mag":"2735214320"},"language":"en","primary_location":{"id":"doi:10.1145/3092703.3092729","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3092703.3092729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/1959.4/60113","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100965934","display_name":"Xiaokang Fan","orcid":null},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Xiaokang Fan","raw_affiliation_strings":["UNSW, Australia"],"affiliations":[{"raw_affiliation_string":"UNSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053058502","display_name":"Yulei Sui","orcid":"https://orcid.org/0000-0002-9510-6574"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yulei Sui","raw_affiliation_strings":["UNSW, Australia"],"affiliations":[{"raw_affiliation_string":"UNSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000688713","display_name":"Xiangke Liao","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangke Liao","raw_affiliation_strings":["National University of Defense Technology, China"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024664385","display_name":"Jingling Xue","orcid":"https://orcid.org/0000-0003-0380-3506"},"institutions":[{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jingling Xue","raw_affiliation_strings":["UNSW, Australia"],"affiliations":[{"raw_affiliation_string":"UNSW, Australia","institution_ids":["https://openalex.org/I31746571"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100965934"],"corresponding_institution_ids":["https://openalex.org/I31746571"],"apc_list":null,"apc_paid":null,"fwci":3.9452,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.9491758,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"329","last_page":"340"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9793999791145325,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7813640236854553},{"id":"https://openalex.org/keywords/boosting","display_name":"Boosting (machine learning)","score":0.7053515315055847},{"id":"https://openalex.org/keywords/pointer-analysis","display_name":"Pointer analysis","score":0.7010945081710815},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6879678964614868},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.628295361995697},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.45641782879829407},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4537827968597412},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34739983081817627},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.23432177305221558},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.22226905822753906},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13420188426971436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7813640236854553},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.7053515315055847},{"id":"https://openalex.org/C7263679","wikidata":"https://www.wikidata.org/wiki/Q5978076","display_name":"Pointer analysis","level":3,"score":0.7010945081710815},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6879678964614868},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.628295361995697},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.45641782879829407},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4537827968597412},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34739983081817627},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.23432177305221558},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.22226905822753906},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13420188426971436}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3092703.3092729","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3092703.3092729","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/126672","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/126672","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/60113","is_oa":true,"landing_page_url":"http://hdl.handle.net/1959.4/60113","pdf_url":null,"source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"http://purl.org/coar/resource_type/c_db06"},{"id":"doi:10.26190/unsworks/20495","is_oa":true,"landing_page_url":"https://doi.org/10.26190/unsworks/20495","pdf_url":null,"source":{"id":"https://openalex.org/S7407053176","display_name":"University of New South Wales","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"thesis"}],"best_oa_location":{"id":"pmh:oai:unsworks.library.unsw.edu.au:1959.4/60113","is_oa":true,"landing_page_url":"http://hdl.handle.net/1959.4/60113","pdf_url":null,"source":{"id":"https://openalex.org/S4306401737","display_name":"UNSWorks (University of New South Wales, Sydney, Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I40053085","host_organization_name":"Australian Defence Force Academy","host_organization_lineage":["https://openalex.org/I40053085"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"http://purl.org/coar/resource_type/c_db06"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W46012774","https://openalex.org/W951859702","https://openalex.org/W1538332098","https://openalex.org/W1655226010","https://openalex.org/W1816718056","https://openalex.org/W1996567876","https://openalex.org/W1999517284","https://openalex.org/W2006790656","https://openalex.org/W2048229966","https://openalex.org/W2056331235","https://openalex.org/W2072385532","https://openalex.org/W2080205938","https://openalex.org/W2080313875","https://openalex.org/W2084063516","https://openalex.org/W2086839628","https://openalex.org/W2098806455","https://openalex.org/W2109219878","https://openalex.org/W2111760587","https://openalex.org/W2122757982","https://openalex.org/W2124360577","https://openalex.org/W2134569009","https://openalex.org/W2136271630","https://openalex.org/W2148755014","https://openalex.org/W2153578567","https://openalex.org/W2155851497","https://openalex.org/W2157896026","https://openalex.org/W2171240827","https://openalex.org/W2296346842","https://openalex.org/W2297774820","https://openalex.org/W2409015667","https://openalex.org/W2439372080","https://openalex.org/W2511015845","https://openalex.org/W2516933175","https://openalex.org/W2547862110","https://openalex.org/W2578771209","https://openalex.org/W2579099470","https://openalex.org/W3147482974","https://openalex.org/W4241352414"],"related_works":["https://openalex.org/W4241634182","https://openalex.org/W2213281886","https://openalex.org/W3121955897","https://openalex.org/W2065476456","https://openalex.org/W2999115679","https://openalex.org/W1566618018","https://openalex.org/W1820823692","https://openalex.org/W2370320024","https://openalex.org/W2134569009","https://openalex.org/W23987500"],"abstract_inverted_index":{"We":[0],"present,":[1],"VIP,":[2],"an":[3],"approach":[4,88],"to":[5],"boosting":[6],"the":[7,26,45,74,86],"precision":[8],"of":[9,47],"Virtual":[10],"call":[11],"Integrity":[12],"Protection":[13],"for":[14,25,42,64],"large-scale":[15],"real-world":[16],"C++":[17,56],"programs":[18],"(e.g.,":[19],"Chrome)":[20],"by":[21,80],"using":[22],"pointer":[23,40],"analysis":[24,41],"first":[27],"time.":[28],"VIP":[29,72],"introduces":[30],"two":[31],"new":[32],"techniques:":[33],"(1)":[34],"a":[35,60],"sound":[36],"and":[37,58],"scalable":[38],"partial":[39],"discovering":[43],"statically":[44],"sets":[46],"legitimate":[48],"targets":[49],"at":[50,70],"virtual":[51],"callsites":[52],"from":[53],"separately":[54],"compiled":[55],"modules":[57],"(2)":[59],"lightweight":[61],"instrumentation":[62],"technique":[63],"performing":[65],"(virtual":[66],"call)":[67],"integrity":[68],"checks":[69],"runtime.":[71],"raises":[73],"bar":[75],"against":[76],"vtable":[77],"hijacking":[78],"attacks":[79],"providing":[81],"stronger":[82],"security":[83],"guarantees":[84],"than":[85],"CHA-based":[87],"with":[89],"comparable":[90],"performance":[91],"overhead.":[92]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
