{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:57:42Z","timestamp":1773154662676,"version":"3.50.1"},"reference-count":58,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/hst.2017.7951732","type":"proceedings-article","created":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T16:30:01Z","timestamp":1497889801000},"page":"21-28","source":"Crossref","is-referenced-by-count":20,"title":["Reviving instruction set randomization"],"prefix":"10.1109","author":[{"given":"Kanad","family":"Sinha","sequence":"first","affiliation":[]},{"given":"Vasileios P.","family":"Kemerlis","sequence":"additional","affiliation":[]},{"given":"Simha","family":"Sethumadhavan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2003","journal-title":"Address space layout randomization"},{"key":"ref38","first-page":"279","article-title":"lmbench: Portable Tools for Performance Analysis","author":"mcvoy","year":"1996","journal-title":"Proc of USENIX ATC"},{"key":"ref33","author":"corbet","year":"2009","journal-title":"An updated guide to debugfs"},{"key":"ref32","first-page":"255","article-title":"Efficient Techniques for Comprehensive Protection from Memory Error Exploits","author":"bhatkar","year":"2005","journal-title":"Proc USENIX SEC"},{"key":"ref31","year":"2014","journal-title":"Exploit Database"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250713"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1186736.1186737","article-title":"SPEC CPU2006 Benchmark Descriptions","volume":"34","author":"henning","year":"2006","journal-title":"SIGARCH Comput Archit News"},{"key":"ref35","article-title":"Performance Analysis Guide for Intel&#x00AE; Core&#x2122; i7 Processor and Intel&#x00AE; Core&#x2122; 5500 processors","author":"levinthal","year":"0","journal-title":"Technical report Intel Corporation"},{"key":"ref34","article-title":"Cortex-A15 Technical Reference Manual","year":"2011","journal-title":"A Technical Report"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23164"},{"key":"ref27","article-title":"Protecting C++ Dynamic Dispatch Through Table Interleaving","author":"dimitar bounov","year":"2016","journal-title":"Proc of NDSS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660309"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"ref22","year":"1997","journal-title":"Getting Around Non-executable Stack (And Fix)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586132"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813682"},{"key":"ref23","first-page":"745","article-title":"Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications","author":"schuster","year":"2015","journal-title":"Proc of IEEE S&P"},{"key":"ref26","first-page":"69","article-title":"A Practical Approach for Adaptive Data Structure Layout Randomization","author":"chen","year":"2015","journal-title":"Proc of ESORICS"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"ref58","first-page":"179","article-title":"Improving Cost, Performance, and Security of Memory Encryption and Authentication","author":"yan","year":"2006","journal-title":"Proc of ISCA"},{"key":"ref57","first-page":"12","article-title":"High Efficiency Counter Mode Security Architecture via Prediction and Precomputation","author":"shi","year":"2005","journal-title":"Proc of ISCA"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2003.1253207"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2014.25"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.14"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.58"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920268"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516670"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref14","article-title":"Bochs: A Portable PC Emulator for Unix\/X","volume":"1996","author":"lawton","year":"1996","journal-title":"Linux Journal"},{"key":"ref15","first-page":"145","article-title":"Where's the FEEB? The Effectiveness of Instruction Set Randomization","author":"sovarel","year":"2005","journal-title":"Proc USENIX SEC"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.33"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"ref18","first-page":"177","article-title":"Non-Control-Data Attacks Are Realistic Threats","author":"chen","year":"2005","journal-title":"Proc USENIX SEC"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-38a"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref3","first-page":"552","article-title":"The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proc of ACM CCS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref5","first-page":"433","article-title":"Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing","author":"backes","year":"2014","journal-title":"Proc USENIX SEC"},{"key":"ref8","first-page":"1","article-title":"A Comparison of the Standardized Versions of ECIES","author":"mart\u00ednez","year":"2010","journal-title":"Proc of IEEE IAS"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"ref7","article-title":"FIBS 197, Advanced Encryption Standard (AES)","year":"2001","journal-title":"Tech Rep"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134764"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813694"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"ref42","first-page":"763","article-title":"Readactor: Practical Code Randomization Resilient to Memory Disclosure","author":"crane","year":"2015","journal-title":"Proc of IEEE S&P"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"ref43","article-title":"Leakage-Resilient Layout Randomization for Mobile Devices","author":"braden","year":"2016","journal-title":"Proc of NDSS"}],"event":{"name":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","location":"Mclean, VA, USA","start":{"date-parts":[[2017,5,1]]},"end":{"date-parts":[[2017,5,5]]}},"container-title":["2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7940186\/7951727\/07951732.pdf?arnumber=7951732","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T04:59:33Z","timestamp":1569473973000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7951732\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/hst.2017.7951732","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}