{"id":"https://openalex.org/W2772617935","doi":"https://doi.org/10.1145/3134600.3134641","title":"Supplementing Modern Software Defenses with Stack-Pointer Sanity","display_name":"Supplementing Modern Software Defenses with Stack-Pointer Sanity","publication_year":2017,"publication_date":"2017-12-04","ids":{"openalex":"https://openalex.org/W2772617935","doi":"https://doi.org/10.1145/3134600.3134641","mag":"2772617935"},"language":"en","primary_location":{"id":"doi:10.1145/3134600.3134641","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3134600.3134641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079192392","display_name":"Anh Quach","orcid":null},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anh Quach","raw_affiliation_strings":["Binghamton University"],"affiliations":[{"raw_affiliation_string":"Binghamton University","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017888466","display_name":"Matthew Cole","orcid":"https://orcid.org/0000-0003-1743-1504"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Cole","raw_affiliation_strings":["Binghamton University"],"affiliations":[{"raw_affiliation_string":"Binghamton University","institution_ids":["https://openalex.org/I123946342"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110290219","display_name":"Aravind Prakash","orcid":"https://orcid.org/0000-0002-2994-0480"},"institutions":[{"id":"https://openalex.org/I123946342","display_name":"Binghamton University","ror":"https://ror.org/008rmbt77","country_code":"US","type":"education","lineage":["https://openalex.org/I123946342"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aravind Prakash","raw_affiliation_strings":["Binghamton University"],"affiliations":[{"raw_affiliation_string":"Binghamton University","institution_ids":["https://openalex.org/I123946342"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5079192392"],"corresponding_institution_ids":["https://openalex.org/I123946342"],"apc_list":null,"apc_paid":null,"fwci":0.7801,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.80142106,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"116","last_page":"127"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9667999744415283,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sanity","display_name":"Sanity","score":0.8361366987228394},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7035607695579529},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.5794919729232788},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5685842633247375},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5430213809013367},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5428034067153931},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.5025343894958496},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4755028188228607},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4558284878730774},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36425864696502686},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.32250139117240906},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.07174250483512878}],"concepts":[{"id":"https://openalex.org/C2777607469","wikidata":"https://www.wikidata.org/wiki/Q2915214","display_name":"Sanity","level":2,"score":0.8361366987228394},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7035607695579529},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.5794919729232788},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5685842633247375},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5430213809013367},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5428034067153931},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.5025343894958496},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4755028188228607},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4558284878730774},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36425864696502686},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.32250139117240906},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.07174250483512878},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3134600.3134641","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3134600.3134641","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 33rd Annual Computer Security Applications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15","score":0.5299999713897705}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1429241971","https://openalex.org/W1538332098","https://openalex.org/W1545927878","https://openalex.org/W1605557845","https://openalex.org/W1634837753","https://openalex.org/W1816718056","https://openalex.org/W1820833458","https://openalex.org/W1823377586","https://openalex.org/W1969338270","https://openalex.org/W1990465482","https://openalex.org/W1993682390","https://openalex.org/W1993736952","https://openalex.org/W2006790656","https://openalex.org/W2009801020","https://openalex.org/W2022292029","https://openalex.org/W2022413220","https://openalex.org/W2035991175","https://openalex.org/W2042856445","https://openalex.org/W2059969702","https://openalex.org/W2065540707","https://openalex.org/W2074943483","https://openalex.org/W2076895302","https://openalex.org/W2080313875","https://openalex.org/W2109219878","https://openalex.org/W2111760587","https://openalex.org/W2121468041","https://openalex.org/W2134633067","https://openalex.org/W2138517425","https://openalex.org/W2162800072","https://openalex.org/W2168843528","https://openalex.org/W2205902796","https://openalex.org/W2207780581","https://openalex.org/W2209345602","https://openalex.org/W2293825325","https://openalex.org/W2409015667","https://openalex.org/W2487602542","https://openalex.org/W2516933175","https://openalex.org/W2518603954","https://openalex.org/W2578771209","https://openalex.org/W4239813889"],"related_works":["https://openalex.org/W2138385884","https://openalex.org/W2166895275","https://openalex.org/W2998775986","https://openalex.org/W157564837","https://openalex.org/W2080313875","https://openalex.org/W3110989686","https://openalex.org/W2011536294","https://openalex.org/W4210453401","https://openalex.org/W4384302888","https://openalex.org/W2127961981"],"abstract_inverted_index":{"The":[0],"perpetual":[1],"cat-and-mouse":[2],"game":[3],"between":[4],"attackers":[5],"and":[6,15],"software":[7],"defenders":[8],"has":[9],"highlighted":[10],"the":[11],"need":[12],"for":[13],"strong":[14],"robust":[16],"security.":[17],"With":[18],"performance":[19],"as":[20],"a":[21,32,40,45,72],"key":[22],"concern,":[23],"most":[24],"modern":[25,67],"defenses":[26],"focus":[27],"on":[28],"control-flow":[29,48],"integrity":[30],"(CFI),":[31],"program":[33,41],"property":[34],"that":[35,69],"requires":[36],"runtime":[37],"execution":[38],"of":[39],"to":[42,44,63,71],"adhere":[43,70],"statically":[46,73],"determined":[47],"graph":[49],"(CFG).":[50],"Despite":[51],"its":[52],"success":[53],"in":[54],"preventing":[55],"traditional":[56],"return-oriented":[57],"programming":[58],"(ROP),":[59],"CFI":[60],"is":[61],"known":[62],"be":[64],"ineffective":[65],"against":[66],"attacks":[68],"recovered":[74],"CFG":[75],"(e.g.,":[76],"COOP).":[77]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
