{"id":"https://openalex.org/W2767198771","doi":"https://doi.org/10.1145/3133956.3134037","title":"JITGuard","display_name":"JITGuard","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2767198771","doi":"https://doi.org/10.1145/3133956.3134037","mag":"2767198771"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3134037","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039031031","display_name":"Tommaso Frassetto","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Tommaso Frassetto","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018913372","display_name":"David Gen\ufffds","orcid":"https://orcid.org/0009-0000-7096-7426"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"David Gens","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076563200","display_name":"Christopher Liebchen","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Christopher Liebchen","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079497016","display_name":"Ahmad\u2010Reza Sadeghi","orcid":"https://orcid.org/0000-0001-6833-3598"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ahmad-Reza Sadeghi","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039031031"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":2.9253,"has_fulltext":false,"cited_by_count":36,"citation_normalized_percentile":{"value":0.93053339,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2405","last_page":"2419"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9811999797821045,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8736307621002197},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.8319481611251831},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5141246914863586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5111687779426575},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.5059708952903748},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.49907469749450684},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.49009430408477783},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4816652536392212},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4599766731262207},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.37036994099617004},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.35468339920043945},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3354913592338562}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8736307621002197},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.8319481611251831},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5141246914863586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5111687779426575},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.5059708952903748},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.49907469749450684},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.49009430408477783},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4816652536392212},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4599766731262207},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.37036994099617004},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.35468339920043945},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3354913592338562},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3134037","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1112477","https://openalex.org/W99657086","https://openalex.org/W1429241971","https://openalex.org/W1538332098","https://openalex.org/W1544471297","https://openalex.org/W1591211019","https://openalex.org/W1605557845","https://openalex.org/W1631846088","https://openalex.org/W1967216565","https://openalex.org/W1978174330","https://openalex.org/W1990465482","https://openalex.org/W1993736952","https://openalex.org/W2001978806","https://openalex.org/W2003619630","https://openalex.org/W2012559808","https://openalex.org/W2012578421","https://openalex.org/W2022292029","https://openalex.org/W2022413220","https://openalex.org/W2033593513","https://openalex.org/W2066852506","https://openalex.org/W2072102701","https://openalex.org/W2081105932","https://openalex.org/W2081768685","https://openalex.org/W2109219878","https://openalex.org/W2122757982","https://openalex.org/W2124360577","https://openalex.org/W2149603369","https://openalex.org/W2155851497","https://openalex.org/W2159216827","https://openalex.org/W2162800072","https://openalex.org/W2168628991","https://openalex.org/W2301356482","https://openalex.org/W2402789968","https://openalex.org/W2404678703","https://openalex.org/W2491836893","https://openalex.org/W2510394756","https://openalex.org/W2512784977","https://openalex.org/W2572561587","https://openalex.org/W2978757628","https://openalex.org/W6600040955","https://openalex.org/W6670601980","https://openalex.org/W6678545021"],"related_works":["https://openalex.org/W4240253816","https://openalex.org/W3096456556","https://openalex.org/W2182697532","https://openalex.org/W1517387344","https://openalex.org/W1544062218","https://openalex.org/W1964111631","https://openalex.org/W185550498","https://openalex.org/W2348203156","https://openalex.org/W2226868092","https://openalex.org/W2164928043"],"abstract_inverted_index":{"Memory-corruption":[0],"vulnerabilities":[1,13],"pose":[2],"a":[3,118,147,171,180,215],"serious":[4],"threat":[5],"to":[6,14,22,80,104,129,150,169,179,187,194,205],"modern":[7],"computer":[8],"security.":[9],"Attackers":[10],"exploit":[11],"these":[12,69],"manipulate":[15],"code":[16,76,82,178],"and":[17,30,63,77,98,154,191,213],"data":[18,44],"of":[19,28,38,55,68,87,110,217,222,237],"vulnerable":[20],"applications":[21],"generate":[23,105],"malicious":[24],"behavior":[25],"by":[26,41],"means":[27],"code-injection":[29],"code-reuse":[31],"attacks.":[32,65],"Researchers":[33],"already":[34],"demonstrated":[35],"the":[36,50,85,176,188,195,200,207],"power":[37],"data-only":[39,64,120,131,155],"attacks":[40,132,156],"disclosing":[42,136],"secret":[43,137,181],"such":[45],"as":[46],"cryptographic":[47],"keys":[48],"in":[49],"past.":[51],"A":[52],"large":[53],"body":[54],"literature":[56],"has":[57],"investigated":[58],"defenses":[59,70],"against":[60,122,157],"code-injection,":[61,152],"code-reuse,":[62,153],"Unfortunately,":[66],"most":[67],"are":[71],"tailored":[72],"towards":[73],"statically":[74],"generated":[75],"their":[78],"adaption":[79],"dynamic":[81,106,177],"comes":[83],"with":[84],"price":[86],"security":[88,208],"or":[89],"performance":[90],"penalties.":[91],"However,":[92],"many":[93],"common":[94,240],"applications,":[95],"like":[96],"browsers":[97],"document":[99],"viewers,":[100],"embed":[101],"just-in-time":[102,158],"compilers":[103,159],"code.":[107],"The":[108],"contribution":[109],"this":[111],"paper":[112],"is":[113,184,199],"twofold:":[114],"first,":[115],"we":[116,144,224],"propose":[117,145],"generic":[119],"attack":[121],"JIT":[123,189,210,229],"compilers,":[124],"dubbed":[125],"DOJITA.":[126],"In":[127],"contrast":[128],"previous":[130],"that":[133],"aimed":[134],"at":[135],"data,":[138],"DOJITA":[139],"enables":[140],"arbitrary":[141],"code-execution.":[142],"Second,":[143],"JITGuard,":[146],"novel":[148],"defense":[149],"mitigate":[151],"(including":[160],"DOJITA).":[161],"JITGuard":[162,226],"utilizes":[163],"Intel's":[164],"Software":[165],"Guard":[166],"Extensions":[167],"(SGX)":[168],"provide":[170],"secure":[172],"environment":[173],"for":[174,227,239],"emitting":[175],"region,":[182],"which":[183],"only":[185],"known":[186],"compiler,":[190],"hence,":[192],"inaccessible":[193],"attacker.":[196],"Our":[197,232],"proposal":[198],"first":[201],"solution":[202],"leveraging":[203],"SGX":[204],"protect":[206],"critical":[209],"compiler":[211,230],"operations,":[212],"tackles":[214],"number":[216],"difficult":[218],"challenges.":[219],"As":[220],"proof":[221],"concept":[223],"implemented":[225],"Firefox's":[228],"SpiderMonkey.":[231],"evaluation":[233],"shows":[234],"reasonable":[235],"overhead":[236],"9.8%":[238],"benchmarks.":[241]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2017-11-10T00:00:00"}
