Table of Contents Author Guidelines Submit a Manuscript
Research Article
Security and Communication Networks
Volume 2018, Article ID 5618453, 1 page

Corrigendum to “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS”

Services Computing Technology and System Lab, Cluster and Grid Computing Lab, Big Data Security Engineering Research Center, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China

Correspondence should be addressed to Jiangying Zhong; nc.ude.tsuh@yjz_neelie

Received 19 November 2018; Accepted 19 November 2018; Published 24 December 2018

Copyright © 2018 Weizhong Qiang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

In the article titled “Fine-Grained Control-Flow Integrity Based on Points-to Analysis for CPS” [1], Ms. Jiangying Zhong was missing from the authors’ list and should be listed as the corresponding author. Ms. Jiangying Zhong contributed in terms of the implementation of increased functionality of the prototype, experiments, results analysis, and editing the revised content for the revised version of the article. The corrected authors’ list is shown above.

Moreover, in the Method Overview section, the sentence “the destination of an indirect function call” should be corrected to “the destination of an indirect function-call”. In addition, in the Related Work section, the sentence “and focuses on protecting indirect function calls of C programs” should be updated to “and focuses on protecting indirect function-calls of C programs or virtual table pointer dereferencing of C++ programs”.

These corrections have been applied in place.


  1. W. Qiang, S. Wang, and H. Jin, “Fine-grained control-flow integrity based on points-to analysis for CPS,” Security and Communication Networks, vol. 2018, Article ID 3130652, 11 pages, 2018. View at Publisher · View at Google Scholar