{"id":"https://openalex.org/W4302784197","doi":"https://doi.org/10.1145/3243734.3243739","title":"Block Oriented Programming","display_name":"Block Oriented Programming","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W4302784197","doi":"https://doi.org/10.1145/3243734.3243739"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243739","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243739","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243739","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243739","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072470440","display_name":"Kyriakos K. Ispoglou","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kyriakos K. Ispoglou","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059172899","display_name":"Bader AlBassam","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bader AlBassam","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055045569","display_name":"Trent Jaeger","orcid":"https://orcid.org/0000-0002-4964-1170"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Trent Jaeger","raw_affiliation_strings":["Pennsylvania State University, State College, PA, USA"],"affiliations":[{"raw_affiliation_string":"Pennsylvania State University, State College, PA, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065116578","display_name":"Mathias Payer","orcid":"https://orcid.org/0000-0001-5054-7547"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mathias Payer","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5072470440"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":6.7696,"has_fulltext":true,"cited_by_count":86,"citation_normalized_percentile":{"value":0.97419596,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1868","last_page":"1882"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8363299369812012},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.7306252121925354},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.5531201362609863},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.49235260486602783},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4680684804916382},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.46374639868736267},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44077014923095703},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4139895439147949},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3594895303249359},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3542550504207611},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.35238656401634216},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1207737922668457}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8363299369812012},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.7306252121925354},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.5531201362609863},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.49235260486602783},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4680684804916382},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.46374639868736267},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44077014923095703},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4139895439147949},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3594895303249359},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3542550504207611},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.35238656401634216},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1207737922668457},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3243739","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243739","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243739","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3243734.3243739","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243739","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243739","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8399999737739563,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G3166108113","display_name":null,"funder_award_id":"CNS-1408880","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3337628798","display_name":"TWC: Medium: Collaborative: Retrofitting Software for Defense-in-Depth","funder_award_id":"1408880","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G3558297769","display_name":null,"funder_award_id":"N00014-17-1-2498","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4424407468","display_name":"TWC: TTP Option: Medium: Collaborative: ENCORE - ENhanced program protection through COmpiler-REwriter cooperation","funder_award_id":"1513783","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4504108201","display_name":null,"funder_award_id":"N00014-17-1","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4571663597","display_name":null,"funder_award_id":"N00014-17-1-2513","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4751570384","display_name":null,"funder_award_id":"4-17-1-","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G6132254293","display_name":"SaTC: CORE: Medium: Collaborative: Threat-Aware Defense: Evaluating Threats for Continuous Improvement","funder_award_id":"1801601","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G682598287","display_name":null,"funder_award_id":"CNS-1801534, CNS-1801601","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7492200658","display_name":null,"funder_award_id":"CNS-1408880 CNS-1513783 CNS-1801534 CNS-1801601","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8751232811","display_name":null,"funder_award_id":"CNS-1801601","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320307102","display_name":"Intel Corporation","ror":"https://ror.org/01ek73717"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4302784197.pdf","grobid_xml":"https://content.openalex.org/works/W4302784197.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W93261043","https://openalex.org/W1477563924","https://openalex.org/W1538332098","https://openalex.org/W1968002620","https://openalex.org/W1969338270","https://openalex.org/W1969501726","https://openalex.org/W1982829328","https://openalex.org/W1993682390","https://openalex.org/W1996931407","https://openalex.org/W2022292029","https://openalex.org/W2051990174","https://openalex.org/W2060276266","https://openalex.org/W2063123613","https://openalex.org/W2072102701","https://openalex.org/W2080313875","https://openalex.org/W2098010707","https://openalex.org/W2101512909","https://openalex.org/W2124360577","https://openalex.org/W2159059513","https://openalex.org/W2162800072","https://openalex.org/W2258876169","https://openalex.org/W2350778671","https://openalex.org/W2512784977","https://openalex.org/W2514974017","https://openalex.org/W2766313665","https://openalex.org/W3023860284","https://openalex.org/W4234542549","https://openalex.org/W6678545021"],"related_works":["https://openalex.org/W2142189862","https://openalex.org/W2182697532","https://openalex.org/W1517387344","https://openalex.org/W1544062218","https://openalex.org/W185550498","https://openalex.org/W2348203156","https://openalex.org/W2226868092","https://openalex.org/W2164928043","https://openalex.org/W2433374248","https://openalex.org/W1991166235"],"abstract_inverted_index":{"With":[0],"the":[1,33,113,119,180,193,207,220,227,268,280],"widespread":[2],"deployment":[3],"of":[4,37,118,195,233,279],"Control-Flow":[5,270],"Integrity":[6],"(CFI),":[7],"control-flow":[8,42],"hijacking":[9],"attacks,":[10,15],"and":[11,48,100,138,214,250],"consequently":[12],"code":[13,30,69,165],"reuse":[14,166],"are":[16,105],"significantly":[17],"more":[18],"difficult.":[19],"CFI":[20,47,185,275],"limits":[21],"control":[22],"flow":[23],"to":[24,60,153,198,218,222,242],"well-known":[25],"locations,":[26],"severely":[27],"restricting":[28],"arbitrary":[29,68,140],"execution.":[31],"Assessing":[32],"remaining":[34],"attack":[35],"surface":[36],"an":[38,52,64,127,139,273],"application":[39,146],"under":[40,272],"advanced":[41],"hijack":[43],"defenses":[44],"such":[45],"as":[46,173,230],"shadow":[49,187],"stacks":[50],"remains":[51],"open":[53],"problem.":[54],"We":[55,190,236],"introduce":[56],"BOPC,":[57],"a":[58,71,82,90,108,130,135,154,163,231],"mechanism":[59],"automatically":[61],"assess":[62],"whether":[63],"attacker":[65],"can":[66],"execute":[67,237],"on":[70,116],"binary":[72],"hardened":[73],"with":[74],"CFI/shadow":[75],"stack":[76,188],"defenses.":[77],"BOPC":[78,125,157,204,225,246],"computes":[79],"exploits":[80],"for":[81,124],"target":[83,120],"program":[84,109,155,199],"from":[85,134],"payload":[86,229],"specifications":[87],"written":[88],"in":[89,179,277],"Turing-complete,":[91],"high-level":[92],"language":[93],"called":[94],"SPL":[95,103,128,151,239],"that":[96,111,144,168,192],"abstracts":[97],"away":[98],"architecture":[99],"program-specific":[101],"details.":[102],"payloads":[104,152,197,240,249],"compiled":[106],"into":[107],"trace":[110],"executes":[112],"desired":[114],"behavior":[115],"top":[117],"binary.":[121],"The":[122],"input":[123],"is":[126,201],"payload,":[129],"starting":[131],"point":[132],"(e.g.,":[133],"fuzzer":[136],"crash)":[137],"memory":[141,234],"write":[142],"primitive":[143],"allows":[145],"state":[147],"corruption.":[148],"To":[149],"map":[150],"trace,":[156],"introduces":[158],"Block":[159],"Oriented":[160],"Programming":[161],"(BOP),":[162],"new":[164],"technique":[167],"utilizes":[169],"entire":[170],"basic":[171],"blocks":[172],"gadgets":[174],"along":[175],"valid":[176],"execution":[177,252],"paths":[178,213],"program,":[181],"i.e.,":[182],"without":[183],"violating":[184],"or":[186],"policies.":[189],"find":[191],"problem":[194],"mapping":[196],"traces":[200,253],"NP-hard,":[202],"so":[203],"first":[205],"reduces":[206],"search":[208,221],"space":[209],"by":[210],"pruning":[211],"infeasible":[212],"then":[215],"uses":[216],"heuristics":[217],"guide":[219],"probable":[223],"paths.":[224],"encodes":[226],"BOP":[228],"set":[232],"writes.":[235],"13":[238],"applied":[241],"10":[243],"popular":[244],"applications.":[245],"successfully":[247],"finds":[248],"complex":[251],"--":[254,265],"which":[255],"would":[256],"likely":[257],"not":[258],"have":[259],"been":[260],"found":[261],"through":[262],"manual":[263],"analysis":[264],"while":[266],"following":[267],"target's":[269],"Graph":[271],"ideal":[274],"policy":[276],"81%":[278],"cases.":[281]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":14},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":11}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2022-10-07T00:00:00"}
