{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:32Z","timestamp":1771699832145,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":21,"publisher":"Springer New York","isbn-type":[{"value":"9781461409762","type":"print"},{"value":"9781461409779","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4614-0977-9_4","type":"book-chapter","created":{"date-parts":[[2011,8,19]],"date-time":"2011-08-19T16:24:22Z","timestamp":1313771062000},"page":"77-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Compiler-Generated Software Diversity"],"prefix":"10.1007","author":[{"given":"Todd","family":"Jackson","sequence":"first","affiliation":[]},{"given":"Babak","family":"Salamat","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Homescu","sequence":"additional","affiliation":[]},{"given":"Karthikeyan","family":"Manivannan","sequence":"additional","affiliation":[]},{"given":"Gregor","family":"Wagner","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Gal","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Brunthaler","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wimmer","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Franz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,5]]},"reference":[{"key":"4_CR1_4","unstructured":"Aleph One. Smashing the stack for fun and profit. Phrack Magazine, Issue 49, 1996."},{"key":"4_CR2_4","doi-asserted-by":"crossref","unstructured":"E.D. Berger and B.G. Zorn. DieHard: Probabilistic Memory Safety for Unsafe Languages. In Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, pages 158\u2013168. ACM Press, 2006.","DOI":"10.1145\/1133255.1134000"},{"key":"4_CR3_4","unstructured":"S. Bhatkar, D.C. DuVarney, and R. Sekar. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits. In Proceedings of the 12th USENIX Security Symposium, pages 105\u2013120. USENIX Association, 2003."},{"key":"4_CR4_4","unstructured":"Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack Magazine, Issue 56, 2000."},{"key":"4_CR5_4","doi-asserted-by":"crossref","unstructured":"S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham, and M. Winandy. Return- Oriented Programming without Returns. In Proceedings of the 17th ACM Conference on Computer and Communications Security, pages 559\u201372. ACM Press, October 2010.","DOI":"10.1145\/1866307.1866370"},{"key":"4_CR6_4","unstructured":"M. Chew and D. Song. Mitigating Buffer Overflows by Operating System Randomization. Technical Report CMU-CS-02-197, Department of Computer Science, Carnegie Mellon University, 2002."},{"key":"4_CR7_4","unstructured":"C. Cowan, C. Pu, D. Maier, J.Walpole, P. Bakke, D. Beattie, A. Grier, P.Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Proceedings of the 7th USENIX Security Symposium, pages 63\u201378. USENIX Association, 1998."},{"key":"4_CR8_4","unstructured":"B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: A Secretless Framework for Security through Diversity. In Proceedings of the 15th USENIX Security Symposium, pages 105\u2013120. USENIX Association, 2006."},{"key":"4_CR9_4","doi-asserted-by":"crossref","unstructured":"M. Franz. E unibus pluram: Massive-Scale Software Diversity as a Defense Mechanism. In Proceedings of the 2010 Workshop on New Security Paradigms, NSPW \u201910, pages 7\u201316, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1900546.1900550"},{"key":"4_CR10_4","doi-asserted-by":"crossref","unstructured":"Intel. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual, March 2009. 11. T. Jackson, B. Salamat, G.Wagner, C.Wimmer, and M. Franz. On the Effectiveness of Multi- Variant Program Execution for Vulnerability Detection and Prevention. In Proceedings of the 6th International Workshop on Security Measurements and Metrics, MetriSec \u201910, pages 7:1\u20138, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1853919.1853929"},{"key":"4_CR11_4","doi-asserted-by":"crossref","unstructured":"T. Jackson, C. Wimmer, and M. Franz. Multi-Variant Program Execution for Vulnerability Detection and Analysis. In Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, CSIIRW \u201910, pages 38:1\u20134, New York, NY, USA, 2010. ACM.","DOI":"10.1145\/1852666.1852708"},{"key":"4_CR12_4","doi-asserted-by":"crossref","unstructured":"X. Jiang, H.J. Wang, D. Xu, and Y. Wang. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization. In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems, SRDS \u201907, pages 209\u2013218, Washington, DC, USA, 2007. IEEE Computer Society.","DOI":"10.1109\/SRDS.2007.36"},{"key":"4_CR13_4","unstructured":"G.S. Kc, A.D. Keromytis, and V. Prevelakis. Countering Code-Injection Attacks with Instruction-Set Randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security, pages 272\u2013280. ACM Press, 2003."},{"key":"4_CR14_4","unstructured":"S. McCamant and G. Morrisett. Evaluating SFI for a CISC architecture. In Proceedings of the 15th USENIX Security Symposium, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"4_CR15_4","unstructured":"C. Miller. The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales. In In Sixth Workshop on the Economics of Information Security, 2007."},{"key":"4_CR16_4","unstructured":"PaX. Homepage of The PaX Team, 2009. http:\/\/pax.grsecurity.net (April 2011)."},{"key":"4_CR17_4","volume-title":"and M","author":"B Salamat","year":"2008","unstructured":"B. Salamat, A. Gal, and M. Franz. Reverse Stack Execution in a Multi-Variant Execution Environment. In Workshop on Compiler and Architectural Techniques for Application Reliability and Security, 2008."},{"key":"4_CR18_4","volume-title":"and M","author":"B Salamat","year":"2011","unstructured":"B. Salamat, T. Jackson, G. Wagner, C. Wimmer, and M. Franz. Run-Time Defense against Code Injection Attacks using Replicated Execution. IEEE Transactions on Dependable and Secure Computing, 2011."},{"key":"4_CR19_4","doi-asserted-by":"crossref","unstructured":"H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 552\u201361. ACM Press, October 2007.","DOI":"10.1145\/1315245.1315313"},{"key":"4_CR20_4","unstructured":"A. Sotirov and M. Dowd. Bypassing Browser Memory Protections. In Black Hat, 2008."},{"key":"4_CR21_4","unstructured":"A.N. Sovarel, D. Evans, and N. Paul. Where\u2019s the FEEB?: The Effectiveness of Instruction Set Randomization. In Proceedings of the 14th USENIX Security Symposium, pages 145\u2013160. USENIX Association, 2005. Todd Jackson et al."}],"container-title":["Advances in Information Security","Moving Target Defense"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-0977-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T23:21:26Z","timestamp":1741476086000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4614-0977-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781461409762","9781461409779"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-0977-9_4","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"5 August 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}