{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T04:10:18Z","timestamp":1746850218706,"version":"3.40.5"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/desec.2017.8073800","type":"proceedings-article","created":{"date-parts":[[2017,10,25]],"date-time":"2017-10-25T19:22:28Z","timestamp":1508959348000},"page":"98-106","source":"Crossref","is-referenced-by-count":0,"title":["MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation"],"prefix":"10.1109","author":[{"given":"Zhenghao","family":"Hu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Wenbo","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"journal-title":"ContraPolice A libc extension for protecting applications from heap-smashing attacks","year":"2003","author":"krennmair","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39235-1_11"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23173"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.22"},{"key":"ref30","first-page":"17","article-title":"Using valgrind to detect #ff0000 value errors with bit-precision","author":"seward","year":"0"},{"journal-title":"Exploiting linux and pax aslrs weaknesses on 32-and 64-bit systems","year":"2016","author":"marco-gisbert","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.54"},{"key":"ref35","first-page":"309","article-title":"Address-sanitizer: A fast address sanity checker","author":"serebryany","year":"0"},{"key":"ref34","first-page":"159","article-title":"A practical dynamic buffer overflow detector","volume":"2004","author":"ruwase","year":"2004","journal-title":"NDSS"},{"key":"ref10","first-page":"2","article-title":"Nginx: the high-performance web server and reverse proxy","volume":"2008","author":"reese","year":"2008","journal-title":"Linux Journal"},{"key":"ref40","first-page":"6","article-title":"Heapshield: Library-based heap overflow protection for free","author":"berger","year":"2006","journal-title":"UMass CS TR"},{"journal-title":"Php zend allocator","year":"0","key":"ref11"},{"journal-title":"Guard pages","year":"0","key":"ref12"},{"key":"ref13","first-page":"431","article-title":"Micro-virtualization memory tracing to detect and prevent spraying attacks","author":"cristalli","year":"0"},{"journal-title":"Pax randmmap","year":"0","key":"ref14"},{"key":"ref15","first-page":"194","article-title":"Address space layout permutation","author":"kil","year":"0","journal-title":"DSN 2006"},{"key":"ref16","first-page":"105","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","volume":"3","author":"bhatkar","year":"2003","journal-title":"Usenix Security"},{"key":"ref17","article-title":"Efficient techniques for comprehensive protection from memory error exploits","author":"bhatkar","year":"2005","journal-title":"Usenix Security"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238076"},{"journal-title":"Malloc des-male carum","year":"0","key":"ref19"},{"journal-title":"Partitionalloc","year":"0","key":"ref28"},{"journal-title":"PaX address space layout randomization (ASLR)","year":"2003","author":"team","key":"ref4"},{"journal-title":"G-wan apachebench \/ weighttp \/ httperf wrapper","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2002.1173063"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764689"},{"key":"ref5","article-title":"A new malloc (3) for openbsd","volume":"9","author":"moerbeek","year":"2009","journal-title":"Proceedings of the 2009 European BSD Conference EuroBSDCon"},{"key":"ref8","article-title":"Ptmalloc","author":"gloger","year":"2006","journal-title":"consult&#x00E9;"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380100607"},{"key":"ref2","article-title":"Heap feng shui in javascript","author":"sotirov","year":"2007","journal-title":"Black Hat Europe'06"},{"journal-title":"Dlmalloc","year":"2010","author":"lea","key":"ref9"},{"journal-title":"Advanced Heap Spraying Techniques","year":"0","key":"ref1"},{"journal-title":"Understanding glibc malloc","year":"0","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2365864.2151043"},{"key":"ref21","first-page":"1","article-title":"Understanding the heap by breaking it","author":"ferguson","year":"2007","journal-title":"Black Hat USA"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"journal-title":"Cve-2014-0133","year":"0","key":"ref23"},{"journal-title":"Blind return oriented programming (brop)","year":"0","key":"ref26"},{"key":"ref25","article-title":"The advanced return-into-lib (c) exploits: Pax case study","volume":"x0b","author":"wojtczuk","year":"2001","journal-title":"Phrack Magazine"}],"event":{"name":"2017 IEEE Conference on Dependable and Secure Computing","start":{"date-parts":[[2017,8,7]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2017,8,10]]}},"container-title":["2017 IEEE Conference on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8053489\/8073795\/08073800.pdf?arnumber=8073800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T17:57:35Z","timestamp":1746813455000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8073800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/desec.2017.8073800","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}