{"id":"https://openalex.org/W3006379033","doi":"https://doi.org/10.7916/d8-83r5-1c58","title":"Preventing Code Reuse Attacks On Modern Operating Systems","display_name":"Preventing Code Reuse Attacks On Modern Operating Systems","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3006379033","doi":"https://doi.org/10.7916/d8-83r5-1c58","mag":"3006379033"},"language":"en","primary_location":{"id":"mag:3006379033","is_oa":false,"landing_page_url":"https://academiccommons.columbia.edu/doi/10.7916/d8-83r5-1c58","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":null},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.7916/d8-83r5-1c58","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054337139","display_name":"Marios Pomonis","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Pomonis, Marios","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5054337139"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01705069,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5781934857368469},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5525781512260437},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.502159833908081},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4773552417755127},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.42258235812187195},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.30596762895584106},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.24009567499160767},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2279389202594757},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.1267649233341217}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5781934857368469},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5525781512260437},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.502159833908081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4773552417755127},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.42258235812187195},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.30596762895584106},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.24009567499160767},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2279389202594757},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.1267649233341217},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"mag:3006379033","is_oa":false,"landing_page_url":"https://academiccommons.columbia.edu/doi/10.7916/d8-83r5-1c58","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null},{"id":"doi:10.7916/d8-83r5-1c58","is_oa":true,"landing_page_url":"https://doi.org/10.7916/d8-83r5-1c58","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.7916/d8-83r5-1c58","is_oa":true,"landing_page_url":"https://doi.org/10.7916/d8-83r5-1c58","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W173413620","https://openalex.org/W1429241971","https://openalex.org/W1447175589","https://openalex.org/W1535810264","https://openalex.org/W1576624296","https://openalex.org/W1591211019","https://openalex.org/W1593678010","https://openalex.org/W1605557845","https://openalex.org/W1631846088","https://openalex.org/W1655226010","https://openalex.org/W1691322864","https://openalex.org/W1746694335","https://openalex.org/W1964281299","https://openalex.org/W1969338270","https://openalex.org/W1980296610","https://openalex.org/W2012559808","https://openalex.org/W2022413220","https://openalex.org/W2057732821","https://openalex.org/W2071985251","https://openalex.org/W2081105932","https://openalex.org/W2099382052","https://openalex.org/W2111927651","https://openalex.org/W2117590013","https://openalex.org/W2119746900","https://openalex.org/W2124360577","https://openalex.org/W2132806808","https://openalex.org/W2134138865","https://openalex.org/W2142889610","https://openalex.org/W2155306121","https://openalex.org/W2159216827","https://openalex.org/W2168872572","https://openalex.org/W2241531943","https://openalex.org/W2293825325","https://openalex.org/W2368550879","https://openalex.org/W2460232746","https://openalex.org/W2529582363","https://openalex.org/W2584744348","https://openalex.org/W2589255614","https://openalex.org/W2605597658","https://openalex.org/W2649320370","https://openalex.org/W2725598243","https://openalex.org/W2891196279","https://openalex.org/W2899759798"],"related_works":["https://openalex.org/W594717421","https://openalex.org/W1612293527","https://openalex.org/W132793872","https://openalex.org/W2121672086","https://openalex.org/W2791617895","https://openalex.org/W1846189620","https://openalex.org/W1979387750","https://openalex.org/W2388794213","https://openalex.org/W186121596","https://openalex.org/W2490081855","https://openalex.org/W2078970418","https://openalex.org/W2508938036","https://openalex.org/W2062752657","https://openalex.org/W1937970120","https://openalex.org/W2315631633","https://openalex.org/W1993090666","https://openalex.org/W3028194394","https://openalex.org/W3164114447","https://openalex.org/W2133895099","https://openalex.org/W2112188386"],"abstract_inverted_index":{"Modern":[0],"operating":[1,73],"systems":[2,216,245,252,388],"are":[3],"often":[4],"the":[5,69,81,109,124,130,146,161,182,189,200,222,265,286,326,334,337,366,380],"target":[6],"of":[7,71,85,101,111,134,163,273,289,330,336,368,382],"attacks":[8],"that":[9,35,62,79,92,144,180,195,231,258,371],"exploit":[10],"vulnerabilities":[11],"to":[12,32,47,149,178,313,346,379],"escalate":[13],"their":[14,117,279,282,308],"privilege":[15],"level.":[16],"Recently":[17],"introduced":[18],"hardening":[19],"features":[20],"prevent":[21,80],"attackers":[22,151,197,351],"from":[23,152,198,352],"using":[24],"traditional":[25],"kernel":[26,86,183],"exploitation":[27,42],"methodologies":[28,65],"and":[29,67,83,116,132,138,247,254,276,281,328,390],"force":[30],"them":[31,173,345],"employ":[33],"techniques":[34],"were":[36],"originally":[37],"designed":[38],"for":[39,108,122,307],"user":[40],"space":[41],"\u2014such":[43],"as":[44],"code":[45,50,87,102,113,147,154,202,356],"reuse\u2014":[46],"execute":[48,93],"arbitrary":[49],"with":[51,191,211,394],"elevated":[52],"privileges.":[53],"In":[54],"this":[55],"dissertation,":[56],"we":[57,76,128],"present":[58,77,129],"novel":[59],"protection":[60,270],"mechanisms":[61],"render":[63],"such":[64],"ineffective":[66],"improve":[68],"security":[70],"today\u2019s":[72],"systems.":[74,227,293],"Specifically,":[75],"solutions":[78],"leakage":[82,100,162],"corruption":[84,118],"pointers":[88,103,177,357],"without":[89],"employing":[90],"entities":[91],"on":[94,214,225,237,242,250,264,291,385,391],"super-privileged":[95],"mode":[96],"(e.g.,":[97,333],"hypervisors).":[98],"The":[99],"is":[104,119,141,295],"an":[105,304],"essential":[106],"step":[107],"construction":[110],"reliable":[112],"reuse":[114,155],"exploits":[115,156],"typically":[120],"necessary":[121],"mounting":[123],"attack.":[125],"More":[126],"concretely,":[127],"design":[131],"implementation":[133],"two":[135],"systems:":[136],"kR^X":[137,140,290],"kSplitStack.":[139],"a":[142,192,298,314,374],"system":[143],"diversifies":[145],"layout":[148],"thwart":[150],"constructing":[153],"statically.":[157],"It":[158],"also":[159],"prevents":[160,196],"return":[164,274,321],"addresses":[165,275],"through":[166,221,297],"XOR-":[167],"based":[168],"encryption":[169],"or":[170,217,319,354,361],"by":[171,205,218,284,343,358],"hiding":[172],"among":[174],"decoys":[175],"(fake":[176],"instructions":[179],"trap":[181],"when":[184,240,317],"executed).":[185],"Finally,":[186,365],"it":[187,232,372],"couples":[188],"above":[190],"self-protection":[193],"mechanism":[194,288],"leaking":[199,353],"diversified":[201],"layout,":[203],"either":[204],"instrumenting":[206],"every":[207],"memory":[208],"read":[209],"instruction":[210,338],"range":[212],"checks":[213],"x86-64":[215,244,256,292,387],"imposing":[219],"limits":[220],"segmentation":[223],"unit":[224],"x86":[226,251],"Evaluation":[228],"results":[229],"show":[230],"imposes":[233,373],"small":[234,375],"runtime":[235,376],"overhead":[236],"real-world":[238],"applications":[239],"measured":[241],"legacy":[243,386],"(~3.63%)":[246],"significantly":[248],"lower":[249],"(~1.32%)":[253],"newer":[255,392],"CPUs":[257,393],"provide":[259],"hardware":[260,363,395],"assistance":[261,396],"(~2.32%).":[262],"kSplitStack,":[263],"other":[266,362],"hand,":[267],"provides":[268],"stronger":[269],"against":[271],"leaks":[272],"guarantees":[277],"both":[278,384],"secrecy":[280,327],"integrity":[283,329],"augmenting":[285],"isolation":[287],"This":[294],"achieved":[296],"split":[299],"stack":[300,306],"scheme:":[301],"functions":[302],"use":[303],"unprotected":[305],"local":[309],"variables":[310],"but":[311],"switch":[312],"protected":[315,347],"one":[316,381],"pushing":[318],"poping":[320],"addresses.":[322],"Moreover,":[323],"kSplitStack":[324,369],"protects":[325],"control":[331],"data":[332],"value":[335],"pointer)":[339],"in":[340],"interrupt":[341],"contexts":[342],"redirecting":[344],"stacks,":[348],"thus":[349],"thwarting":[350],"corrupting":[355],"inducing":[359],"interrupts":[360],"events.":[364],"evaluation":[367],"shows":[370],"overhead,":[377],"comparable":[378],"kR^X,":[383],"(~3.66%)":[389],"(~2.50%).":[397]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
