{"id":"https://openalex.org/W2805788024","doi":"https://doi.org/10.1145/3196494.3196531","title":"A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity","display_name":"A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2805788024","doi":"https://doi.org/10.1145/3196494.3196531","mag":"2805788024"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1806.09496","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Philipp Zieris","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Philipp Zieris","raw_affiliation_strings":["Fraunhofer AISEC, Garching b. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching b. M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I4210136922"]}]},{"author_position":"last","author":{"id":null,"display_name":"Julian Horsch","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136922","display_name":"Fraunhofer Institute for Applied and Integrated Security","ror":"https://ror.org/03w0bbr97","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210136922","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Julian Horsch","raw_affiliation_strings":["Fraunhofer AISEC, Garching b. M\u00fcnchen, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer AISEC, Garching b. M\u00fcnchen, Germany","institution_ids":["https://openalex.org/I4210136922"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210136922"],"apc_list":null,"apc_paid":null,"fwci":1.1846,"has_fulltext":false,"cited_by_count":16,"citation_normalized_percentile":{"value":0.8414227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"369","last_page":"380"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.973800003528595,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9444000124931335,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.8788999915122986},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.7820000052452087},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.6945000290870667},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6287000179290771},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46790000796318054},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.3995000123977661}],"concepts":[{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.8788999915122986},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.7820000052452087},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7318999767303467},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.6945000290870667},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6287000179290771},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46790000796318054},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43880000710487366},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.3995000123977661},{"id":"https://openalex.org/C38601921","wikidata":"https://www.wikidata.org/wiki/Q1757693","display_name":"Protocol stack","level":3,"score":0.32850000262260437},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.2709999978542328},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25369998812675476},{"id":"https://openalex.org/C200833197","wikidata":"https://www.wikidata.org/wiki/Q333707","display_name":"Compile time","level":3,"score":0.2524999976158142}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3196494.3196531","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196531","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1806.09496","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1806.09496","pdf_url":"https://arxiv.org/pdf/1806.09496","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:fraunhofer.de:N-497400","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-497400.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer AISEC","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/400756","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/400756","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1806.09496","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1806.09496","pdf_url":"https://arxiv.org/pdf/1806.09496","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1591211019","https://openalex.org/W1903241486","https://openalex.org/W1946775303","https://openalex.org/W1968002620","https://openalex.org/W1969338270","https://openalex.org/W1982829328","https://openalex.org/W1992741024","https://openalex.org/W1996931407","https://openalex.org/W2001978806","https://openalex.org/W2004456327","https://openalex.org/W2022188239","https://openalex.org/W2022292029","https://openalex.org/W2071985251","https://openalex.org/W2109219878","https://openalex.org/W2117798902","https://openalex.org/W2119971343","https://openalex.org/W2124194648","https://openalex.org/W2136096788","https://openalex.org/W2138517425","https://openalex.org/W2155810272","https://openalex.org/W2160418053","https://openalex.org/W2162800072","https://openalex.org/W2171929398","https://openalex.org/W2293825325","https://openalex.org/W2572561587","https://openalex.org/W2584029330","https://openalex.org/W2602748134","https://openalex.org/W2612611921"],"related_works":[],"abstract_inverted_index":{"Manipulations":[0],"of":[1,13,71,79,126,155,164,188,199],"return":[2,27,46,62],"addresses":[3,28,47],"on":[4,15,76,190,194],"the":[5,8,69,77,80,102,153,160,173,180,196],"stack":[6,23,43,51,82,89,104,123,137,146],"are":[7,91,98],"basis":[9],"for":[10,25,57,145,179],"a":[11,40,61,66,119,142,169],"variety":[12],"attacks":[14,55,96],"programs":[16],"written":[17],"in":[18,83],"memory":[19],"unsafe":[20,50],"languages.":[21],"Dual":[22],"schemes":[24,90,138],"protecting":[26],"promise":[29],"an":[30,186],"efficient":[31],"and":[32,106,139,162,182,192],"effective":[33],"defense":[34],"against":[35],"such":[36],"attacks.":[37,131],"By":[38],"introducing":[39],"second,":[41],"safe":[42,81,103,156],"to":[44,93,100,152],"separate":[45],"from":[48],"potentially":[49],"objects,":[52],"they":[53],"prevent":[54],"that,":[56],"example,":[58],"maliciously":[59],"modify":[60],"address":[63],"by":[64,167],"overflowing":[65],"buffer.":[67],"However,":[68],"security":[70,112],"dual":[72,88,122,136],"stacks":[73],"is":[74,202],"based":[75],"concealment":[78],"memory.":[84],"Unfortunately,":[85],"all":[86],"current":[87],"vulnerable":[92],"information":[94,129],"disclosure":[95,130,154],"that":[97,148],"able":[99],"reveal":[101],"location,":[105],"therefore":[107],"effectively":[108],"break":[109],"their":[110],"promised":[111],"properties.":[113],"In":[114],"this":[115],"paper,":[116],"we":[117],"present":[118],"new,":[120],"leak-resilient":[121],"scheme":[124],"capable":[125],"withstanding":[127],"sophisticated":[128],"We":[132,158],"carefully":[133],"study":[134],"previous":[135],"systematically":[140],"develop":[141],"novel":[143],"design":[144],"separation":[147],"eliminates":[149],"flaws":[150],"leading":[151],"stacks.":[157],"show":[159],"feasibility":[161],"practicality":[163],"our":[165,200],"approach":[166],"presenting":[168],"full":[170],"integration":[171],"into":[172],"LLVM":[174],"compiler":[175],"framework":[176],"with":[177],"support":[178],"x86-64":[181,191],"ARM64":[183],"architectures.":[184],"With":[185],"average":[187],"2.7%":[189],"0.0%":[193],"ARM64,":[195],"performance":[197],"overhead":[198],"implementation":[201],"negligible.":[203]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2018-06-13T00:00:00"}
