[
    {
        "key": "Z2URJKHB",
        "version": 22,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/Z2URJKHB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/Z2URJKHB",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/9T4P8JRF",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "Z2URJKHB",
            "version": 22,
            "parentItem": "9T4P8JRF",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Göktas et al_2014_Out of control.pdf",
            "accessDate": "2014-05-11T03:08:06Z",
            "url": "http://www.cs.stevens.edu/~gportoka/files/outofcontrol_oakland14.pdf",
            "note": "<p xmlns=\"http://www.w3.org/1999/xhtml\" id=\"title\"><strong>Contents</strong></p><ul xmlns=\"http://www.w3.org/1999/xhtml\" style=\"list-style-type: none; padding-left:0px\" id=\"toc\"><li><a href=\"zotero://open-pdf/1648462_Z2URJKHB/1\">I Introduction</a></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/2\">II Control-Flow Integrity</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/2\">II-A Ideal CFI</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/2\">II-B Practical CFI</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/3\">II-C Weaknesses</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/4\">III Code-reuse Attacks Under CFI</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/4\">III-A Traditional Code-reuse Attacks</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/4\">III-B Gadgets in CFI</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/5\">III-C Locating the Gadgets</a></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/5\">III-D Calling Functions</a><ul style=\"list-style-type: none; padding-left:24px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/5\">III-D1 Through Indirect Calls</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/5\">III-D2 Calling through Gadgets</a></li></ul></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/6\">III-E Linking Gadgets</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/6\">III-F From Code-reuse to Code-injection</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/7\">IV Proof-of-Concept Exploitation</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/7\">IV-A Gadget Locations in CCFIR</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/7\">IV-B Exploitation Requirements</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/7\">IV-C Memory Disclosure</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/8\">IV-D Gadget chaining</a></li></ul></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/9\">V Evaluation</a></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/10\">VI Discussion</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/10\">VI-A Other Vulnerable Defenses</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/11\">VI-B Possible Defenses</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/11\">VII Related Work</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/11\">VII-A Advanced Mitigation Techniques</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/12\">VII-B CFI Research</a></li></ul></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/12\">VIII Conclusion</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/12\">References</a></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/14\">Appendix</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_Z2URJKHB/14\">A PoC Exploit Gadgets</a></li></ul></li></ul>",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Göktas et al_2014_Out of control.pdf",
            "md5": "1deca6472f0aa297138cf3a80c91df0f",
            "mtime": 1409340677000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T03:08:06Z",
            "dateModified": "2017-10-29T01:56:51Z"
        }
    },
    {
        "key": "D8EF32VF",
        "version": 22,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/D8EF32VF",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/D8EF32VF",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/QXEBVAU2",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "D8EF32VF",
            "version": 22,
            "parentItem": "QXEBVAU2",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "Zhang_Sekar_2013_Control Flow Integrity for COTS Binaries.pdf",
            "accessDate": "",
            "url": "",
            "note": "<p xmlns=\"http://www.w3.org/1999/xhtml\" id=\"title\"><strong>Contents</strong></p><ul xmlns=\"http://www.w3.org/1999/xhtml\" style=\"list-style-type: none; padding-left:0px\" id=\"toc\"><li><a href=\"zotero://open-pdf/1648462_D8EF32VF/1\">1 Introduction</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/1\">1.1 CFI for COTS Binaries</a></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/2\">1.2 Quality of Protection</a><ul style=\"list-style-type: none; padding-left:24px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/3\">1.2.1 Experimental Evaluation</a></li></ul></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/3\">2 Disassembly</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/3\">2.1 Background</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/3\">2.2 Our Disassembly Technique</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/4\">3 Indirect Control Flow Analysis</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/4\">3.1 Identifying Code Pointer Constants (CK)</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/4\">3.2 Identifying Computed Code Pointers (CC)</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/5\">3.3 Identifying Other Code Addresses</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/6\">4 Defining and Assessing CFI for Binaries</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/6\">4.1 A Metric for Measuring CFI Strength</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/6\">4.2 A Simple CFI Property based on Relocation</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/6\">4.3 Strict-CFI: A CFI Property for Binaries Closely Matching Reloc-CFI</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/6\">4.4 Bin-CFI: CFI for Complex Binaries</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/7\">5 Implementation</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/7\">5.1 Disassembly</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/7\">5.2 Instrumentation and Regeneration of Binary</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/8\">5.3 Instrumentation for CFI</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/9\">6 Optimizations</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/9\">6.1 Improving Branch Prediction (BP)</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/10\">6.2 Avoiding Address Translation (AT)</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/10\">6.3 Violating Transparency (VT)</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/10\">7 Evaluation</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/11\">7.1 Functionality</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/11\">7.2 CFI Effectiveness Evaluation</a></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/11\">7.3 Security Evaluation</a><ul style=\"list-style-type: none; padding-left:24px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/11\">7.3.1 Control-Flow Hijack Attacks</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/12\">7.3.2 ROP Attacks</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/12\">7.4 Performance Evaluation</a><ul style=\"list-style-type: none; padding-left:24px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/12\">7.4.1 Runtime Overhead</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/12\">7.4.2 Space and Memory Overhead</a></li></ul></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/13\">7.5 Limitations</a></li></ul></li><li style=\"padding-top:8px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/13\">8 Related Work</a><ul style=\"list-style-type: none; padding-left:12px\"><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/13\">8.1 ROP Attacks and Defenses</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/14\">8.2 Control Flow Integrity</a></li></ul></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/14\">9 Conclusions</a></li><li style=\"padding-top:4px\"><a href=\"zotero://open-pdf/1648462_D8EF32VF/15\">10 Acknowledgements</a></li></ul>",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Zhang_Sekar_2013_Control Flow Integrity for COTS Binaries.pdf",
            "md5": "c936021f30c796e854b5b5f4eb15fde6",
            "mtime": 1409340560000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:56:50Z"
        }
    },
    {
        "key": "VENXCFG4",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/VENXCFG4",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/VENXCFG4",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/FBK7D49I",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "VENXCFG4",
            "version": 21,
            "parentItem": "FBK7D49I",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Pappas_2012_kBouncer.pdf",
            "accessDate": "2014-05-11T03:08:52Z",
            "url": "http://www.cs.columbia.edu/~vpappas/papers/kbouncer.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Pappas_2012_kBouncer.pdf",
            "md5": "70e63851b6790feef743d8c636091cc9",
            "mtime": 1399777734000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T03:08:52Z",
            "dateModified": "2017-10-29T01:51:07Z"
        }
    },
    {
        "key": "T89WX7HE",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/T89WX7HE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/T89WX7HE",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/FJBDTUFN",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "T89WX7HE",
            "version": 21,
            "parentItem": "FJBDTUFN",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Andersen_1994_Program analysis and specialization for the C programming language.pdf",
            "accessDate": "2014-03-13T11:28:59Z",
            "url": "http://www-ti.informatik.uni-tuebingen.de/~behrend/PaperSeminar/Program%20Analysis%20and%20SpecializationPhD.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Andersen_1994_Program analysis and specialization for the C programming language.pdf",
            "md5": "c850eac27da116ea85d50e3346987eb7",
            "mtime": 1394710413000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:51:05Z"
        }
    },
    {
        "key": "RGWXXDPE",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/RGWXXDPE",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/RGWXXDPE",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/PQ79UNZM",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "RGWXXDPE",
            "version": 21,
            "parentItem": "PQ79UNZM",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Zeng et al_2011_Combining control-flow integrity and static analysis for efficient and.pdf",
            "accessDate": "2013-01-30T20:50:25Z",
            "url": "http://dl.acm.org/ft_gateway.cfm?id=2046713&type=pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Zeng et al_2011_Combining control-flow integrity and static analysis for efficient and.pdf",
            "md5": "1d90ba5675b70640973376333c6391d9",
            "mtime": 1394710413000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:51:03Z"
        }
    },
    {
        "key": "QKEMT3ZX",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/QKEMT3ZX",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/QKEMT3ZX",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/H83NFPWA",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "QKEMT3ZX",
            "version": 21,
            "parentItem": "H83NFPWA",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "Abadi et al_2005_Control-flow integrity.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Abadi et al_2005_Control-flow integrity.pdf",
            "md5": "4ee0f2bd9169df02c6ffc2e4b0ad2599",
            "mtime": 1394710412000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:51:01Z"
        }
    },
    {
        "key": "M7KK6GI8",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/M7KK6GI8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/M7KK6GI8",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/WHF8CDZG",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "M7KK6GI8",
            "version": 21,
            "parentItem": "WHF8CDZG",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Zhang et al_2013_Practical control flow integrity and randomization for binary executables.pdf",
            "accessDate": "2014-05-11T04:09:38Z",
            "url": "http://bitblaze.cs.berkeley.edu/papers/CCFIR-oakland-CR.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Zhang et al_2013_Practical control flow integrity and randomization for binary executables.pdf",
            "md5": "17693eff0d592b57c650cf61d3c8d5e6",
            "mtime": 1399781379000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T04:09:38Z",
            "dateModified": "2017-10-29T01:50:59Z"
        }
    },
    {
        "key": "GWGD7K2V",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/GWGD7K2V",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/GWGD7K2V",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/9Z8HFWTD",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "GWGD7K2V",
            "version": 21,
            "parentItem": "9Z8HFWTD",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Cheng et al_2014_ROPecker.pdf",
            "accessDate": "2014-05-11T03:09:23Z",
            "url": "http://users.ece.cmu.edu/~zongweiz/media/ropecker.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Cheng et al_2014_ROPecker.pdf",
            "md5": "673be1745e5fd0cf7e5f8d6d0cf3debd",
            "mtime": 1399777773000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T03:09:23Z",
            "dateModified": "2017-10-29T01:50:57Z"
        }
    },
    {
        "key": "GPWXSAZ8",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/GPWXSAZ8",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/GPWXSAZ8",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/J6JQK8I2",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "GPWXSAZ8",
            "version": 21,
            "parentItem": "J6JQK8I2",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Davi et al_2012_MoCFI.pdf",
            "accessDate": "2014-02-21T02:07:38Z",
            "url": "http://www.contrib.andrew.cmu.edu/~megele/static/pdf/MoCFI.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Davi et al_2012_MoCFI.pdf",
            "md5": "4643a62a6a77a3c1eebeeb520e544ac6",
            "mtime": 1409340573000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:50:55Z"
        }
    },
    {
        "key": "DDGMS8VB",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/DDGMS8VB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/DDGMS8VB",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/FM8NE2G6",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "DDGMS8VB",
            "version": 21,
            "parentItem": "FM8NE2G6",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Zhang et al_2013_Practical control flow integrity and randomization for binary executables.pdf",
            "accessDate": "2014-05-11T04:10:02Z",
            "url": "http://bitblaze.cs.berkeley.edu/papers/CCFIR-oakland-CR.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Zhang et al_2013_Practical control flow integrity and randomization for binary executables.pdf",
            "md5": "17693eff0d592b57c650cf61d3c8d5e6",
            "mtime": 1399781403000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T04:10:02Z",
            "dateModified": "2017-10-29T01:50:53Z"
        }
    },
    {
        "key": "D8GCGW5G",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/D8GCGW5G",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/D8GCGW5G",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/AVBDVGEN",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "D8GCGW5G",
            "version": 21,
            "parentItem": "AVBDVGEN",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Davi et al_2014_Hardware-Assisted Fine-Grained Control-Flow Integrity.pdf",
            "accessDate": "2014-05-11T03:09:04Z",
            "url": "https://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/PubsPDF/hardware-assisted-cfi.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Davi et al_2014_Hardware-Assisted Fine-Grained Control-Flow Integrity.pdf",
            "md5": "bc7a30c44f5b8720fea01b6b6b28fa85",
            "mtime": 1399777746000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T03:09:04Z",
            "dateModified": "2017-10-29T01:50:51Z"
        }
    },
    {
        "key": "CXMTNIHU",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/CXMTNIHU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/CXMTNIHU",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/8IV7H6U7",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "CXMTNIHU",
            "version": 21,
            "parentItem": "8IV7H6U7",
            "itemType": "attachment",
            "linkMode": "imported_file",
            "title": "Zeng et al_2013_Strato.pdf",
            "accessDate": "",
            "url": "",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Zeng et al_2013_Strato.pdf",
            "md5": "6d17c49b94c11abbff87e19ce0a5c744",
            "mtime": 1409340559000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T02:59:15Z",
            "dateModified": "2017-10-29T01:50:47Z"
        }
    },
    {
        "key": "8BKZFGT2",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/8BKZFGT2",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/8BKZFGT2",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/W7FHRU4C",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "8BKZFGT2",
            "version": 21,
            "parentItem": "W7FHRU4C",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Bletsch et al_2011_Mitigating code-reuse attacks with control-flow locking.pdf",
            "accessDate": "2014-05-15T04:53:13Z",
            "url": "http://www.csc.ncsu.edu/faculty/jiang/pubs/ACSAC11_CFL.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Bletsch et al_2011_Mitigating code-reuse attacks with control-flow locking.pdf",
            "md5": "e9be9181aca555d048e8e773ff1a280d",
            "mtime": 1400129594000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-15T04:53:13Z",
            "dateModified": "2017-10-29T01:50:45Z"
        }
    },
    {
        "key": "6N7UIDWB",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/6N7UIDWB",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/6N7UIDWB",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/FFPFK86D",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "6N7UIDWB",
            "version": 21,
            "parentItem": "FFPFK86D",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Steensgaard_1996_Points-to analysis in almost linear time.pdf",
            "accessDate": "2014-03-13T11:28:59Z",
            "url": "http://courses.cs.washington.edu/courses/cse503/10wi/readings/steensgaard-popl96.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Steensgaard_1996_Points-to analysis in almost linear time.pdf",
            "md5": "bf018752044382525bce70c488c8912d",
            "mtime": 1394710413000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:50:43Z"
        }
    },
    {
        "key": "2V9ETSNX",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/2V9ETSNX",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/2V9ETSNX",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/AUB85NZ8",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "2V9ETSNX",
            "version": 21,
            "parentItem": "AUB85NZ8",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Erlingsson et al_2006_XFI.pdf",
            "accessDate": "2014-02-26T14:49:48Z",
            "url": "http://dl.acm.org/ft_gateway.cfm?id=1298463&type=pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Erlingsson et al_2006_XFI.pdf",
            "md5": "2ba25ce4093051fab317d4e00acb79aa",
            "mtime": 1394710413000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:50:41Z"
        }
    },
    {
        "key": "2GEJ8CFU",
        "version": 21,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/2GEJ8CFU",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/2GEJ8CFU",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/TICMCTXS",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "2GEJ8CFU",
            "version": 21,
            "parentItem": "TICMCTXS",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Lattner et al_2007_Making context-sensitive points-to analysis with heap cloning practical for the.pdf",
            "accessDate": "2014-03-13T11:06:57Z",
            "url": "http://llvm.cs.uiuc.edu/pubs/2007-06-10-PLDI-DSA.pdf",
            "note": "",
            "contentType": "application/pdf",
            "charset": "",
            "filename": "Lattner et al_2007_Making context-sensitive points-to analysis with heap cloning practical for the.pdf",
            "md5": "634d435839754cbe656b1f2c20f2e278",
            "mtime": 1394710413000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-03-13T11:33:32Z",
            "dateModified": "2017-10-29T01:50:39Z"
        }
    },
    {
        "key": "MWM7MPMC",
        "version": 19,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/MWM7MPMC",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/MWM7MPMC",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/W7FHRU4C",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "MWM7MPMC",
            "version": 19,
            "parentItem": "W7FHRU4C",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Snapshot",
            "accessDate": "2014-05-15T04:53:16Z",
            "url": "http://dl.acm.org/citation.cfm?id=2076783",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "citation.html",
            "md5": "c8fe2c7898f82626c8bfcf57d66f9fa5",
            "mtime": 1400129596000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-15T04:53:16Z",
            "dateModified": "2014-05-15T04:53:16Z"
        }
    },
    {
        "key": "W7FHRU4C",
        "version": 18,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/W7FHRU4C",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/W7FHRU4C",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Bletsch et al.",
            "parsedDate": "2011",
            "numChildren": 2
        },
        "data": {
            "key": "W7FHRU4C",
            "version": 18,
            "itemType": "conferencePaper",
            "title": "Mitigating code-reuse attacks with control-flow locking",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Tyler",
                    "lastName": "Bletsch"
                },
                {
                    "creatorType": "author",
                    "firstName": "Xuxian",
                    "lastName": "Jiang"
                },
                {
                    "creatorType": "author",
                    "firstName": "Vince",
                    "lastName": "Freeh"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Proceedings of the 27th Annual Computer Security Applications Conference",
            "conferenceName": "",
            "publisher": "ACM",
            "place": "",
            "date": "2011",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "353–362",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://dl.acm.org/citation.cfm?id=2076783",
            "accessDate": "2014-05-15T04:53:13Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "C3RX2NSR"
            ],
            "relations": {},
            "dateAdded": "2014-05-15T04:53:13Z",
            "dateModified": "2014-05-15T04:53:13Z"
        }
    },
    {
        "key": "KZB78JQD",
        "version": 17,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/KZB78JQD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/KZB78JQD",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/FM8NE2G6",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "KZB78JQD",
            "version": 17,
            "parentItem": "FM8NE2G6",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Snapshot",
            "accessDate": "2014-05-11T04:10:05Z",
            "url": "http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&tp=&arnumber=6547133&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6547133",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "login.html",
            "md5": "6d976a52bd25d12967d3db972d53580e",
            "mtime": 1399781406000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T04:10:05Z",
            "dateModified": "2014-05-11T04:10:05Z"
        }
    },
    {
        "key": "RSXQMREA",
        "version": 17,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/RSXQMREA",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/RSXQMREA",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/WHF8CDZG",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            }
        },
        "data": {
            "key": "RSXQMREA",
            "version": 17,
            "parentItem": "WHF8CDZG",
            "itemType": "attachment",
            "linkMode": "imported_url",
            "title": "Snapshot",
            "accessDate": "2014-05-11T04:09:42Z",
            "url": "http://ieeexplore.ieee.org/xpl/login.jsp?reload=true&tp=&arnumber=6547133&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6547133",
            "note": "",
            "contentType": "text/html",
            "charset": "utf-8",
            "filename": "login.html",
            "md5": "0ad8e8cc4b30a7a11c3bc0d19aaed723",
            "mtime": 1399781382000,
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T04:09:42Z",
            "dateModified": "2014-05-11T04:09:42Z"
        }
    },
    {
        "key": "WHF8CDZG",
        "version": 16,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/WHF8CDZG",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/WHF8CDZG",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Zhang et al.",
            "parsedDate": "2013",
            "numChildren": 2
        },
        "data": {
            "key": "WHF8CDZG",
            "version": 16,
            "itemType": "conferencePaper",
            "title": "Practical control flow integrity and randomization for binary executables",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Chao",
                    "lastName": "Zhang"
                },
                {
                    "creatorType": "author",
                    "firstName": "Tao",
                    "lastName": "Wei"
                },
                {
                    "creatorType": "author",
                    "firstName": "Zhaofeng",
                    "lastName": "Chen"
                },
                {
                    "creatorType": "author",
                    "firstName": "Lei",
                    "lastName": "Duan"
                },
                {
                    "creatorType": "author",
                    "firstName": "László",
                    "lastName": "Szekeres"
                },
                {
                    "creatorType": "author",
                    "firstName": "Stephen",
                    "lastName": "McCamant"
                },
                {
                    "creatorType": "author",
                    "firstName": "Dawn",
                    "lastName": "Song"
                },
                {
                    "creatorType": "author",
                    "firstName": "Wei",
                    "lastName": "Zou"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "Security and Privacy (SP), 2013 IEEE Symposium on",
            "conferenceName": "",
            "publisher": "IEEE",
            "place": "",
            "date": "2013",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "559–573",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6547133",
            "accessDate": "2014-05-11T04:09:38Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "C3RX2NSR"
            ],
            "relations": {},
            "dateAdded": "2014-05-11T04:09:38Z",
            "dateModified": "2014-05-11T04:09:38Z"
        }
    },
    {
        "key": "KRQINMNZ",
        "version": 15,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/KRQINMNZ",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/KRQINMNZ",
                "type": "text/html"
            },
            "up": {
                "href": "https://api.zotero.org/groups/254011/items/8IV7H6U7",
                "type": "application/json"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "numChildren": 0
        },
        "data": {
            "key": "KRQINMNZ",
            "version": 15,
            "parentItem": "8IV7H6U7",
            "itemType": "note",
            "note": "<p>&lt;=== Summary ===&gt;</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&lt;=== Implementation Details ===&gt;</p>\n<p>- All pointers are \"Guarded\" and then the subsequent uses are mangaged explicitly</p>\n<p>&nbsp;</p>\n<p>&nbsp;</p>\n<p>&lt;=== Assumptions ===&gt;</p>\n<p>- Must insert No-OP instructions --- we should be faster!</p>",
            "tags": [],
            "relations": {},
            "dateAdded": "2014-05-11T03:29:09Z",
            "dateModified": "2014-05-11T03:31:55Z"
        }
    },
    {
        "key": "9Z8HFWTD",
        "version": 9,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/9Z8HFWTD",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/9Z8HFWTD",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Cheng et al.",
            "parsedDate": "2014",
            "numChildren": 1
        },
        "data": {
            "key": "9Z8HFWTD",
            "version": 9,
            "itemType": "conferencePaper",
            "title": "ROPecker: A Generic and Practical Approach for Defending Against ROP Attacks",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Yueqiang",
                    "lastName": "Cheng"
                },
                {
                    "creatorType": "author",
                    "firstName": "Zongwei",
                    "lastName": "Zhou"
                },
                {
                    "creatorType": "author",
                    "firstName": "Miao",
                    "lastName": "Yu"
                },
                {
                    "creatorType": "author",
                    "firstName": "Xuhua",
                    "lastName": "Ding"
                },
                {
                    "creatorType": "author",
                    "firstName": "Robert H.",
                    "lastName": "Deng"
                }
            ],
            "abstractNote": "",
            "proceedingsTitle": "",
            "conferenceName": "",
            "publisher": "The 21th Annual Network and Distributed System Security Symposium (NDSS’14)",
            "place": "",
            "date": "2014",
            "eventPlace": "",
            "volume": "",
            "issue": "",
            "numberOfVolumes": "",
            "pages": "",
            "series": "",
            "seriesNumber": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://users.ece.cmu.edu/~zongweiz/media/ropecker.pdf",
            "accessDate": "2014-05-11T03:09:23Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "ROPecker",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "C3RX2NSR"
            ],
            "relations": {},
            "dateAdded": "2014-05-11T03:09:23Z",
            "dateModified": "2014-05-11T03:09:23Z"
        }
    },
    {
        "key": "AVBDVGEN",
        "version": 9,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/AVBDVGEN",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/AVBDVGEN",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Davi et al.",
            "parsedDate": "2014",
            "numChildren": 1
        },
        "data": {
            "key": "AVBDVGEN",
            "version": 9,
            "itemType": "journalArticle",
            "title": "Hardware-Assisted Fine-Grained Control-Flow Integrity: Towards Efficient Protection of Embedded Systems Against Software Exploitation",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Lucas",
                    "lastName": "Davi"
                },
                {
                    "creatorType": "author",
                    "firstName": "Patrick",
                    "lastName": "Koeberl"
                },
                {
                    "creatorType": "author",
                    "firstName": "Ahmad-Reza",
                    "lastName": "Sadeghi"
                }
            ],
            "abstractNote": "",
            "publicationTitle": "",
            "publisher": "",
            "place": "",
            "date": "2014",
            "volume": "",
            "issue": "",
            "section": "",
            "partNumber": "",
            "partTitle": "",
            "pages": "",
            "series": "",
            "seriesTitle": "",
            "seriesText": "",
            "journalAbbreviation": "",
            "DOI": "",
            "citationKey": "",
            "url": "https://www.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_TRUST/PubsPDF/hardware-assisted-cfi.pdf",
            "accessDate": "2014-05-11T03:09:04Z",
            "PMID": "",
            "PMCID": "",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "Hardware-Assisted Fine-Grained Control-Flow Integrity",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "C3RX2NSR"
            ],
            "relations": {},
            "dateAdded": "2014-05-11T03:09:04Z",
            "dateModified": "2014-05-11T03:09:04Z"
        }
    },
    {
        "key": "FBK7D49I",
        "version": 9,
        "library": {
            "type": "group",
            "id": 254011,
            "name": "llvm-cfi",
            "links": {
                "alternate": {
                    "href": "https://www.zotero.org/groups/llvm-cfi",
                    "type": "text/html"
                }
            }
        },
        "links": {
            "self": {
                "href": "https://api.zotero.org/groups/254011/items/FBK7D49I",
                "type": "application/json"
            },
            "alternate": {
                "href": "https://www.zotero.org/groups/llvm-cfi/items/FBK7D49I",
                "type": "text/html"
            }
        },
        "meta": {
            "createdByUser": {
                "id": 799993,
                "username": "ndauten",
                "name": "Nathan Dautenhahn",
                "links": {
                    "alternate": {
                        "href": "https://www.zotero.org/ndauten",
                        "type": "text/html"
                    }
                }
            },
            "creatorSummary": "Pappas",
            "parsedDate": "2012",
            "numChildren": 1
        },
        "data": {
            "key": "FBK7D49I",
            "version": 9,
            "itemType": "report",
            "title": "kBouncer: Efficient and transparent ROP mitigation",
            "creators": [
                {
                    "creatorType": "author",
                    "firstName": "Vasilis",
                    "lastName": "Pappas"
                }
            ],
            "abstractNote": "",
            "reportNumber": "",
            "reportType": "",
            "institution": "Technical report, Columbia University",
            "place": "",
            "date": "2012",
            "seriesTitle": "",
            "seriesNumber": "",
            "pages": "",
            "DOI": "",
            "ISBN": "",
            "citationKey": "",
            "url": "http://www.cs.columbia.edu/~vpappas/papers/kbouncer.pdf",
            "accessDate": "2014-05-11T03:08:52Z",
            "ISSN": "",
            "archive": "",
            "archiveLocation": "",
            "shortTitle": "kBouncer",
            "language": "",
            "libraryCatalog": "Google Scholar",
            "callNumber": "",
            "rights": "",
            "extra": "",
            "tags": [],
            "collections": [
                "C3RX2NSR"
            ],
            "relations": {},
            "dateAdded": "2014-05-11T03:08:52Z",
            "dateModified": "2014-05-11T03:08:52Z"
        }
    }
]