{"id":"https://openalex.org/W4400977832","doi":"https://doi.org/10.1145/3664476.3670432","title":"Analysis of the Windows Control Flow Guard","display_name":"Analysis of the Windows Control Flow Guard","publication_year":2024,"publication_date":"2024-07-25","ids":{"openalex":"https://openalex.org/W4400977832","doi":"https://doi.org/10.1145/3664476.3670432"},"language":"en","primary_location":{"id":"doi:10.1145/3664476.3670432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670432","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3664476.3670432","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105049312","display_name":"Niels Pfau","orcid":null},"institutions":[{"id":"https://openalex.org/I25485817","display_name":"St. P\u00f6lten University of Applied Sciences","ror":"https://ror.org/039a2re55","country_code":"AT","type":"education","lineage":["https://openalex.org/I25485817"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Niels Pfau","raw_affiliation_strings":["Institute of IT Security Research, St. P\u00f6lten University of Applied Sciences, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of IT Security Research, St. P\u00f6lten University of Applied Sciences, Austria","institution_ids":["https://openalex.org/I25485817"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013592673","display_name":"Patrick Kochberger","orcid":"https://orcid.org/0000-0002-0898-9824"},"institutions":[{"id":"https://openalex.org/I25485817","display_name":"St. P\u00f6lten University of Applied Sciences","ror":"https://ror.org/039a2re55","country_code":"AT","type":"education","lineage":["https://openalex.org/I25485817"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Patrick Kochberger","raw_affiliation_strings":["Institute of IT Security Research, St. P\u00f6lten University of Applied Sciences, Austria"],"affiliations":[{"raw_affiliation_string":"Institute of IT Security Research, St. P\u00f6lten University of Applied Sciences, Austria","institution_ids":["https://openalex.org/I25485817"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5105049312"],"corresponding_institution_ids":["https://openalex.org/I25485817"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08935649,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.717085599899292},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6303574442863464},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.5140169858932495},{"id":"https://openalex.org/keywords/flow-control","display_name":"Flow control (data)","score":0.4556267261505127},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.15879768133163452},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.12212982773780823}],"concepts":[{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.717085599899292},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6303574442863464},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.5140169858932495},{"id":"https://openalex.org/C186766456","wikidata":"https://www.wikidata.org/wiki/Q612457","display_name":"Flow control (data)","level":2,"score":0.4556267261505127},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.15879768133163452},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.12212982773780823}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3664476.3670432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670432","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3664476.3670432","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3664476.3670432","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Availability, Reliability and Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2479612266","https://openalex.org/W3106633543","https://openalex.org/W3215234832","https://openalex.org/W4283789005","https://openalex.org/W4287849805","https://openalex.org/W4387321736"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4254637722","https://openalex.org/W2980401999","https://openalex.org/W3016483420","https://openalex.org/W2331628363","https://openalex.org/W2390279801","https://openalex.org/W2393030234","https://openalex.org/W2358668433","https://openalex.org/W3198851420"],"abstract_inverted_index":{"Cybersecurity\u2019s":[0],"constantly":[1],"evolving":[2],"field":[3],"demands":[4],"defense":[5],"mechanisms\u2019":[6],"continuous":[7],"development":[8],"and":[9,17,46,64],"refinement.":[10],"Memory":[11],"corruption":[12],"attacks,":[13],"including":[14],"buffer":[15],"overflows":[16],"use-after-free":[18],"vulnerabilities,":[19],"have":[20],"long":[21],"been":[22],"a":[23,37,94,106],"significant":[24],"threat,":[25],"especially":[26],"for":[27],"web":[28],"browsers.":[29],"Microsoft":[30],"introduced":[31],"Control":[32],"Flow":[33],"Guard":[34],"(CFG)":[35],"as":[36],"mitigative":[38],"measure":[39],"against":[40],"advanced":[41],"exploitation":[42],"techniques,":[43],"like":[44],"ROP":[45],"use-after-free-based":[47],"exploits,":[48],"to":[49,111],"address":[50,109],"these":[51],"risks.":[52],"This":[53],"paper":[54],"delves":[55],"into":[56],"the":[57,81,113],"internals":[58],"of":[59,75,86,99],"CFG,":[60],"its":[61,70],"implementation,":[62],"effectiveness,":[63],"possible":[65],"bypasses":[66],"that":[67],"could":[68],"undermine":[69],"security.":[71],"A":[72],"thorough":[73],"examination":[74],"Microsoft\u2019s":[76],"CFG":[77,88],"design":[78],"principles":[79],"gives":[80],"reader":[82],"an":[83],"in-depth":[84],"understanding":[85],"how":[87],"enforces":[89],"control":[90],"flow":[91],"integrity":[92],"within":[93],"program\u2019s":[95],"execution.":[96],"The":[97],"limitations":[98],"this":[100],"mitigation":[101],"are":[102],"highlighted":[103],"by":[104],"employing":[105],"direct":[107],"return":[108],"overwrite":[110],"exploit":[112],"ChakraCore":[114],"JavaScript":[115],"engine.":[116]},"counts_by_year":[],"updated_date":"2025-12-26T23:08:49.675405","created_date":"2025-10-10T00:00:00"}
