{"id":"https://openalex.org/W4220653854","doi":"https://doi.org/10.1145/3517208.3523758","title":"RetTag","display_name":"RetTag","publication_year":2022,"publication_date":"2022-03-28","ids":{"openalex":"https://openalex.org/W4220653854","doi":"https://doi.org/10.1145/3517208.3523758"},"language":"en","primary_location":{"id":"doi:10.1145/3517208.3523758","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3517208.3523758","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3517208.3523758","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th European Workshop on Systems Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3517208.3523758","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100445144","display_name":"Yu Wang","orcid":"https://orcid.org/0000-0002-0431-1039"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Wang","raw_affiliation_strings":["Southern University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101188246","display_name":"Jinting Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinting Wu","raw_affiliation_strings":["Southern University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075919641","display_name":"Tai Yue","orcid":"https://orcid.org/0000-0002-7276-8735"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]},{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tai Yue","raw_affiliation_strings":["National University of Defense Technology and Southern University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"National University of Defense Technology and Southern University of Science and Technology","institution_ids":["https://openalex.org/I170215575","https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080692598","display_name":"Zhenyu Ning","orcid":"https://orcid.org/0000-0001-7763-1079"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhenyu Ning","raw_affiliation_strings":["Southern University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology","institution_ids":["https://openalex.org/I3045169105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101886601","display_name":"Fengwei Zhang","orcid":"https://orcid.org/0000-0003-3365-2526"},"institutions":[{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fengwei Zhang","raw_affiliation_strings":["Southern University of Science and Technology"],"affiliations":[{"raw_affiliation_string":"Southern University of Science and Technology","institution_ids":["https://openalex.org/I3045169105"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100445144"],"corresponding_institution_ids":["https://openalex.org/I3045169105"],"apc_list":null,"apc_paid":null,"fwci":1.8042,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86983689,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"50","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7690824270248413},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7538783550262451},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5992891192436218},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5814701914787292},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5802456736564636},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5247711539268494},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4870362877845764},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.44774749875068665},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3370268642902374},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.11921563744544983},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.11574754118919373},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09427934885025024}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7690824270248413},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7538783550262451},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5992891192436218},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5814701914787292},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5802456736564636},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5247711539268494},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4870362877845764},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.44774749875068665},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3370268642902374},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.11921563744544983},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.11574754118919373},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09427934885025024}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3517208.3523758","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3517208.3523758","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3517208.3523758","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th European Workshop on Systems Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3517208.3523758","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3517208.3523758","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3517208.3523758","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th European Workshop on Systems Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8299999833106995}],"awards":[{"id":"https://openalex.org/G3859114411","display_name":null,"funder_award_id":"SGDX20201103095408029","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7025609064","display_name":null,"funder_award_id":"62102175","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7218247225","display_name":null,"funder_award_id":"SGDX20201103095408029","funder_id":"https://openalex.org/F4320326705","funder_display_name":"Science, Technology and Innovation Commission of Shenzhen Municipality"},{"id":"https://openalex.org/G8542201988","display_name":null,"funder_award_id":"62102175,62002151","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8652604020","display_name":null,"funder_award_id":"62002151","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G96548948","display_name":null,"funder_award_id":"201103","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326705","display_name":"Science, Technology and Innovation Commission of Shenzhen Municipality","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4220653854.pdf","grobid_xml":"https://content.openalex.org/works/W4220653854.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1964281299","https://openalex.org/W1969338270","https://openalex.org/W1982829328","https://openalex.org/W1983394510","https://openalex.org/W2001978806","https://openalex.org/W2015083179","https://openalex.org/W2020208333","https://openalex.org/W2022292029","https://openalex.org/W2042856445","https://openalex.org/W2098010707","https://openalex.org/W2099382052","https://openalex.org/W2162800072","https://openalex.org/W2293825325","https://openalex.org/W2753562754","https://openalex.org/W2899759798","https://openalex.org/W3091997824","https://openalex.org/W3097679923","https://openalex.org/W3101740510","https://openalex.org/W3103277946","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2163300008","https://openalex.org/W3126185480","https://openalex.org/W1978415201","https://openalex.org/W2375248064","https://openalex.org/W3208245578","https://openalex.org/W2112715807","https://openalex.org/W2384845090","https://openalex.org/W199500277","https://openalex.org/W2390441702","https://openalex.org/W2224800844"],"abstract_inverted_index":{"Memory-corruption-based":[0],"return":[1],"address":[2],"hijacking,":[3],"such":[4],"as":[5],"Return-oriented":[6],"Programming":[7],"(ROP),":[8],"is":[9],"a":[10],"prevalent":[11],"attack":[12],"technique":[13],"that":[14],"compromises":[15],"the":[16],"program's":[17],"control":[18],"flow":[19],"integrity.":[20],"So":[21],"far,":[22],"software-based":[23],"defenses":[24],"against":[25],"these":[26],"attacks":[27],"either":[28],"introduce":[29],"heavy":[30],"performance":[31],"overhead":[32],"or":[33],"trade-off":[34],"security":[35],"for":[36,46],"performance.":[37],"Meanwhile,":[38],"some":[39],"hardware-assisted":[40],"defense":[41],"mechanisms":[42],"are":[43],"not":[44],"practical":[45],"large-scale":[47],"deployment":[48],"due":[49],"to":[50],"additional":[51],"requirements":[52],"of":[53],"hardware":[54],"features":[55],"and":[56],"flaws":[57],"caused":[58],"by":[59],"complicated":[60],"design.":[61]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5},{"year":2022,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2022-04-03T00:00:00"}
