{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T20:49:24Z","timestamp":1776977364912,"version":"3.51.4"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T00:00:00Z","timestamp":1751500800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1109\/icecet63943.2025.11472128","type":"proceedings-article","created":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T19:42:35Z","timestamp":1775763755000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Preventative Exploitation of Computer Systems Using Binary Diversification"],"prefix":"10.1109","author":[{"given":"Christpher","family":"Stricklan","sequence":"first","affiliation":[{"name":"Kraetonics, LLC.,West Melbourne,FL,USA"}]},{"given":"Christophe","family":"Curtis","sequence":"additional","affiliation":[{"name":"Kraetonics, LLC.,West Melbourne,FL,USA"}]},{"given":"Gilbert","family":"Carranza","sequence":"additional","affiliation":[{"name":"Kraetonics, LLC.,West Melbourne,FL,USA"}]},{"given":"Christopher","family":"Blackwell","sequence":"additional","affiliation":[{"name":"Kraetonics, LLC.,West Melbourne,FL,USA"}]},{"given":"Luis","family":"Abraham","sequence":"additional","affiliation":[{"name":"Kraetonics, LLC.,West Melbourne,FL,USA"}]},{"given":"TJ","family":"O\u2019Connor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"LLVM and Clang: Next generation compiler technology","volume-title":"The BSD conference","author":"Lattner"},{"issue":"49","key":"ref2","first-page":"8","article-title":"Smashing The Stack For Fun And Profit","author":"One","year":"1996","journal-title":"Phrack"},{"key":"ref3","article-title":"PaX address space layout randomization (ASLR)","year":"2003"},{"key":"ref4","volume-title":"Memory protection technologies"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref6","article-title":"Mitigating buffer overflows by operating system randomization","volume-title":"Technical Report CMU-CS-02-197","author":"Chew","year":"2002"},{"key":"ref7","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","volume-title":"12th USENIX Security Symposium","author":"Bhatkarp"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2400682.2400683"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"ref15","first-page":"1","article-title":"Reverse stack execution in a multi-variant execution environment","volume-title":"Workshop on Compiler and Architectural Techniques for Application Reliability and Security","author":"Salamat"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"ref18","article-title":"Tigress: A Source-to-Source-ish Obfuscation Tool","author":"Collberg","year":"2018","journal-title":"SSPREW-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SPRO.2015.10"},{"key":"ref20","volume-title":"Ultimate Packer for eXecutables (UPX)","year":"2023"},{"key":"ref21","article-title":"CVE-2024-47177"},{"key":"ref22","article-title":"Sudo","author":"Robert"},{"key":"ref23","article-title":"openssl"},{"key":"ref24","article-title":"XZ Utils"},{"key":"ref25","article-title":"2022 Top Routinely Exploited Vulnerabilities"}],"event":{"name":"2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)","location":"Paris, France","start":{"date-parts":[[2025,7,3]]},"end":{"date-parts":[[2025,7,6]]}},"container-title":["2025 5th International Conference on Electrical, Computer and Energy Technologies (ICECET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11471878\/11471697\/11472128.pdf?arnumber=11472128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T19:56:52Z","timestamp":1776974212000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11472128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icecet63943.2025.11472128","relation":{},"subject":[],"published":{"date-parts":[[2025,7,3]]}}}