{"id":"https://openalex.org/W4376167296","doi":"https://doi.org/10.48550/arxiv.2305.06092","title":"SafeLLVM: LLVM Without The ROP Gadgets!","display_name":"SafeLLVM: LLVM Without The ROP Gadgets!","publication_year":2023,"publication_date":"2023-05-10","ids":{"openalex":"https://openalex.org/W4376167296","doi":"https://doi.org/10.48550/arxiv.2305.06092"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2305.06092","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2305.06092","pdf_url":"https://arxiv.org/pdf/2305.06092","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2305.06092","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061118771","display_name":"Federico Cassano","orcid":"https://orcid.org/0000-0002-9318-7454"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Cassano, Federico","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091926851","display_name":"Charles Bershatsky","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bershatsky, Charles","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091926852","display_name":"Jacob Ginesin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ginesin, Jacob","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Bashenko, Sasha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bashenko, Sasha","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5061118771"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9869999885559082,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8552935123443604},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.81163489818573},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.6433169841766357},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.46693676710128784},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4578273892402649},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3503096103668213},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.34628888964653015}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8552935123443604},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.81163489818573},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.6433169841766357},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.46693676710128784},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4578273892402649},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3503096103668213},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.34628888964653015}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2305.06092","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2305.06092","pdf_url":"https://arxiv.org/pdf/2305.06092","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"doi:10.48550/arxiv.2305.06092","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2305.06092","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2305.06092","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2305.06092","pdf_url":"https://arxiv.org/pdf/2305.06092","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[{"score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4376167296.pdf","grobid_xml":"https://content.openalex.org/works/W4376167296.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4254787146","https://openalex.org/W1713081424","https://openalex.org/W2132806979","https://openalex.org/W2127315869","https://openalex.org/W1523769955","https://openalex.org/W2390939225","https://openalex.org/W2245390655","https://openalex.org/W4379536100","https://openalex.org/W188282463","https://openalex.org/W2348052088"],"abstract_inverted_index":{"Memory":[0],"safety":[1],"is":[2,142],"a":[3,14,44,99,126],"cornerstone":[4],"of":[5,17,38,51,79,101,112,128,148],"secure":[6],"and":[7,19,115,135],"robust":[8],"software":[9],"systems,":[10],"as":[11,32,161],"it":[12],"prevents":[13],"wide":[15],"range":[16],"vulnerabilities":[18],"exploitation":[20],"techniques.":[21],"Among":[22],"these,":[23],"we":[24,70,97],"focus":[25],"on":[26,150],"Return-Oriented":[27],"Programming":[28],"(ROP).":[29],"ROP":[30,118,149],"works":[31],"such:":[33],"the":[34,39,56,63,77,86,91,104,110,151,158,162],"attacker":[35],"takes":[36,49],"control":[37],"program's":[40,57],"execution":[41],"flow":[42],"via":[43],"memory":[45],"corruption":[46],"attack,":[47],"then":[48],"advantages":[50],"code":[52],"snippets":[53],"already":[54],"in":[55,81,94],"memory,":[58],"dubbed":[59],"\"gadgets,\"":[60],"to":[61,75,108,144],"achieve":[62],"attacker's":[64],"desired":[65],"effect.":[66],"In":[67],"this":[68],"paper,":[69],"introduce":[71],"SafeLLVM,":[72],"an":[73],"approach":[74,123],"minimize":[76,109],"number":[78,111,127],"gadgets":[80,113],"x86-64":[82],"binaries":[83,152],"compiled":[84,153],"with":[85,154],"LLVM":[87,105],"infrastructure.":[88],"Building":[89],"upon":[90],"techniques":[92],"outlined":[93],"previous":[95],"works,":[96],"implement":[98],"series":[100],"passes":[102],"within":[103],"compiler's":[106],"backend":[107],"present":[114],"thus":[116],"prevent":[117,145],"attacks.":[119],"We":[120],"evaluated":[121],"our":[122,140],"by":[124],"compiling":[125],"real-world":[129],"applications,":[130],"including":[131],"cJSON,":[132],"zlib,":[133],"curl,":[134],"mimalloc.":[136],"The":[137],"results":[138],"show":[139],"solution":[141],"able":[143],"any":[146],"form":[147],"SafeLLVM":[155],"while":[156],"maintaining":[157],"same":[159],"functionality":[160],"original":[163],"binaries.":[164]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
