{"id":"https://openalex.org/W2293710610","doi":"https://doi.org/10.4018/ijmstr.2015010103","title":"An Enhanced Dynamic Information Flow Tracking Method with Reverse Stack Execution","display_name":"An Enhanced Dynamic Information Flow Tracking Method with Reverse Stack Execution","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2293710610","doi":"https://doi.org/10.4018/ijmstr.2015010103","mag":"2293710610"},"language":"en","primary_location":{"id":"doi:10.4018/ijmstr.2015010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijmstr.2015010103","pdf_url":null,"source":{"id":"https://openalex.org/S4210228540","display_name":"International Journal of Monitoring and Surveillance Technologies Research","issn_l":"2166-7241","issn":["2166-7241","2166-725X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Monitoring and Surveillance Technologies Research","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090298844","display_name":"Anna Trikalinou","orcid":null},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anna Trikalinou","raw_affiliation_strings":["Intel Corporation, Portland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Intel Corporation, Portland, OR, USA","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025446324","display_name":"Nikolaos Bourbakis","orcid":"https://orcid.org/0000-0003-1507-614X"},"institutions":[{"id":"https://openalex.org/I19648265","display_name":"Wright State University","ror":"https://ror.org/04qk6pt94","country_code":"US","type":"education","lineage":["https://openalex.org/I19648265"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nikolaos Bourbakis","raw_affiliation_strings":["Center of Assistive Research Technologies (CART), Wright State University, Dayton, OH, USA"],"affiliations":[{"raw_affiliation_string":"Center of Assistive Research Technologies (CART), Wright State University, Dayton, OH, USA","institution_ids":["https://openalex.org/I19648265"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5090298844"],"corresponding_institution_ids":["https://openalex.org/I1343180700"],"apc_list":null,"apc_paid":null,"fwci":0.8629,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83447445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":"1","first_page":"40","last_page":"58"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8488744497299194},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.7582021355628967},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6224250197410583},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.5790584683418274},{"id":"https://openalex.org/keywords/resource-consumption","display_name":"Resource consumption","score":0.5225443243980408},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.47677281498908997},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4626041650772095},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46218714118003845},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.45572179555892944},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.44454288482666016},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.4074966609477997},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.30380016565322876},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.19931212067604065}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8488744497299194},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.7582021355628967},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6224250197410583},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.5790584683418274},{"id":"https://openalex.org/C2777480716","wikidata":"https://www.wikidata.org/wiki/Q23582796","display_name":"Resource consumption","level":2,"score":0.5225443243980408},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.47677281498908997},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4626041650772095},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46218714118003845},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.45572179555892944},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.44454288482666016},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.4074966609477997},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.30380016565322876},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.19931212067604065},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4018/ijmstr.2015010103","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijmstr.2015010103","pdf_url":null,"source":{"id":"https://openalex.org/S4210228540","display_name":"International Journal of Monitoring and Surveillance Technologies Research","issn_l":"2166-7241","issn":["2166-7241","2166-725X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Monitoring and Surveillance Technologies Research","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.5400000214576721,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1832558306","https://openalex.org/W1977336977","https://openalex.org/W1996931407","https://openalex.org/W2037017056","https://openalex.org/W2100666033","https://openalex.org/W2102970979","https://openalex.org/W2103919170","https://openalex.org/W2117798902","https://openalex.org/W2129482816","https://openalex.org/W2144789413","https://openalex.org/W2154795299","https://openalex.org/W2158799455","https://openalex.org/W2325736839","https://openalex.org/W2549548403"],"related_works":["https://openalex.org/W1537002606","https://openalex.org/W4226215696","https://openalex.org/W4307888121","https://openalex.org/W4224692222","https://openalex.org/W2072754671","https://openalex.org/W4247959794","https://openalex.org/W2960453428","https://openalex.org/W2119424404","https://openalex.org/W2809457911","https://openalex.org/W2136651729"],"abstract_inverted_index":{"Memory":[0],"errors":[1,26],"have":[2],"long":[3],"been":[4],"a":[5,59],"critical":[6],"security":[7,61,97],"issue":[8],"primarily":[9],"for":[10],"C/C++":[11],"programming":[12],"languages":[13],"and":[14,44,48,67,82,124],"are":[15],"still":[16],"considered":[17],"one":[18],"of":[19,108],"the":[20,29,35,75,92,100,105,109,114],"top":[21],"three":[22],"most":[23],"dangerous":[24],"software":[25],"according":[27],"to":[28,127],"MITRE":[30],"ranking.":[31],"In":[32],"this":[33],"paper":[34],"authors":[36,101],"focus":[37],"on":[38,74],"their":[39,122],"exploitation":[40],"via":[41],"control-flow":[42],"hijacking":[43],"data-only":[45,85],"attacks":[46],"(stack,":[47],"partially":[49],"heap":[50],"(G.":[51],"Novarck":[52],"&amp;":[53],"E.":[54],"Berger,":[55],"2010))":[56],"by":[57,88],"proposing":[58],"synergistic":[60],"methodology,":[62,111],"which":[63],"can":[64,102],"accurately":[65],"detect":[66],"thwart":[68],"them.":[69],"Their":[70,117],"methodology":[71],"is":[72,125],"based":[73],"Dynamic":[76],"Information":[77],"Flow":[78],"Tracking":[79],"(DIFT)":[80],"technique":[81],"improves":[83],"its":[84],"attack":[86,135],"detection":[87],"utilizing":[89],"features":[90],"from":[91],"Reverse":[93],"Stack":[94],"Execution":[95],"(RSE)":[96],"technique.":[98],"Thus,":[99],"significantly":[103],"lower":[104],"resource":[106],"consumption":[107],"latter":[110],"while":[112],"increasing":[113],"former's":[115],"accuracy.":[116],"proof-of-concept":[118],"compiler":[119],"implementation":[120],"verifies":[121],"assumptions":[123],"able":[126],"protect":[128],"vulnerable":[129],"C":[130],"programs":[131],"against":[132],"various":[133],"real-world":[134],"scenarios.":[136]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
