{"payload":{"header_redesign_enabled":false,"results":[{"id":"39587177","archived":true,"color":"#555555","followers":152,"has_funding_file":false,"hl_name":"nsacyber/Control-Flow-Integrity","hl_trunc_description":"A proposed hardware-based method for stopping known memory corruption exploitation techniques. #nsacyber","language":"C","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":39587177,"name":"Control-Flow-Integrity","owner_id":6088344,"owner_login":"nsacyber","updated_at":"2017-05-10T21:18:08.716Z","has_issues":true}},"sponsorable":false,"topics":["control-flow","control-flow-analysis","control-flow-integrity"],"type":"Public archive","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":82,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Ansacyber%252FControl-Flow-Integrity%2B%2Blanguage%253AC","metadata":null,"csrf_tokens":{"/nsacyber/Control-Flow-Integrity/star":{"post":"2XIsFfBB5wx49ps0MMQu37YAhVA_uhT1vn2-ivUSKymJg_TIUgpJvVjf6QpT4b5cKN8RepTPzbkslm-Oi-yeLA"},"/nsacyber/Control-Flow-Integrity/unstar":{"post":"fyPb6e4oC1vKN-B-G4INBNbzU0sAxEnv6e5gaKi3COZbyWoIhIvnDn57-xNoiHvqTFKs5Jj89b7PGH1ddwPhIQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"rCaJczR3tciX3mFXU7S375oOKo50SYGdSM37TXExwYphKfRdxKar1efr5HVNcSb8TwY8sWqzki5iG4iBX00tWA"}}},"title":"Repository search results"}