{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T10:21:09Z","timestamp":1725877269395},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319519654"},{"type":"electronic","value":"9783319519661"}],"license":[{"start":{"date-parts":[[2016,12,29]],"date-time":"2016-12-29T00:00:00Z","timestamp":1482969600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-51966-1_6","type":"book-chapter","created":{"date-parts":[[2016,12,28]],"date-time":"2016-12-28T11:11:08Z","timestamp":1482923468000},"page":"85-93","source":"Crossref","is-referenced-by-count":3,"title":["Attack Mitigation by Data Structure Randomization"],"prefix":"10.1007","author":[{"given":"Zhongtian","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hao","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,29]]},"reference":[{"key":"6_CR1","unstructured":"Openssl speed. http:\/\/www.openssl.org\/docs\/apps\/speed.html"},{"key":"6_CR2","unstructured":"Pax aslr documentation. http:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity. In: ACM Conference on Computer and Communications Security (CCS 2005) (2005)","DOI":"10.1145\/1102120.1102165"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Backes, M., Holz, T., Kollenda, B., Koppe, P., N\u00fcrnberger, S., Pewny, J.: You can run but you can\u2019t read: preventing disclosure exploits in executable code. In: ACM SIGSAC Conference on Computer and Communications Security (CCS 2014) (2014)","DOI":"10.1145\/2660267.2660378"},{"key":"6_CR5","unstructured":"Backes, M., N\u00fcrnberger, S.: Oxymoron: making fine-grained memory randomization practical by allowing code sharing. In: USENIX Security Symposium (Security 2014) (2014)"},{"key":"6_CR6","unstructured":"Bhatkar, E., Duvarney, D.C., Sekar, R.: Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In: Proceedings of the 12th USENIX Security Symposium, pp. 105\u2013120 (2003)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Bhatkar, S., Sekar, R.: Data space randomization. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2008) (2008)","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"6_CR8","unstructured":"Bhatkar, S., Sekar, R., DuVarney, D.C.: Efficient techniques for comprehensive protection from memory error exploits. In: Proceedings of the 14th Conference on USENIX Security Symposium, Berkeley, CA, USA, vol. 14, p. 17 (2005)"},{"key":"6_CR9","unstructured":"Castro, M., Costa, M., Harris, T.: Securing software by enforcing data-flow integrity. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI 2006) (2006)"},{"key":"6_CR10","unstructured":"Davi, L., Dmitrienko, A., Egele, M., Fischer, T., Holz, T., Hund, R., Nrnberger, S., Sadeghi, A.-R.: Mocfi: a framework to mitigate control-flow attacks on smartphones. In: Annual Network and Distributed System Security Symposium (NDSS 2012) (2012)"},{"key":"6_CR11","unstructured":"Hu, H., Chua, Z. L., Adrian, S., Saxena, P., Liang, Z.: Automatic generation of data-oriented exploits. In: Proceedings of the 24th USENIX Security Symposium (Security 2015) (2015)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Hu, H., Shinde, S., Adrian, S., Chua, Z.L., Saxena, P., Liang, Z.: Data-oriented programming: on the expressiveness of non-control data attacks. In: IEEE Symposium on Security and Privacy (Oakland 2016) (2016)","DOI":"10.1109\/SP.2016.62"},{"key":"6_CR13","unstructured":"Jim, T., Morrisett, J.G., Grossman, D., Hicks, M.W., Cheney, J., Wang, Y.: Cyclone: a safe dialect of C. In: General Track of the Annual Conference on USENIX Annual Technical Conference, ATEC 2002 (2002)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Nagarakatte, S., Zhao, J., Martin, M.M., Zdancewic, S.: Softbound: highly compatible and complete spatial memory safety for C. In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2009) (2009)","DOI":"10.1145\/1542476.1542504"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Necula, G.C., McPeak, S., Weimer, W.: CCured: type-safe retrofitting of legacy code. In: 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2002) (2002)","DOI":"10.1145\/503272.503286"},{"key":"6_CR16","unstructured":"Pax Team: Pax address space layout randomization (aslr). http:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Wang, Z., Jiang, X.: Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: IEEE Symposium on Security and Privacy (Oakland 2010) (2010)","DOI":"10.1109\/SP.2010.30"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, C., Wei, T., Chen, Z., Duan, L., McCamant, S., Szekeres, L., Song, D., Zou, W.: Practical control flow integrity and randomization for binary executables. In: IEEE Symposium on Security and Privacy (Oakland 2013) (2013)","DOI":"10.1109\/SP.2013.44"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51966-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:55:33Z","timestamp":1498373733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51966-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,29]]},"ISBN":["9783319519654","9783319519661"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51966-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016,12,29]]}}}