{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T13:07:16Z","timestamp":1746536836739,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7906978","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T17:12:50Z","timestamp":1493053970000},"page":"301-308","source":"Crossref","is-referenced-by-count":1,"title":["libmask: Protecting browser JIT engines from the devil in the constants"],"prefix":"10.1109","author":[{"family":"Abhinav","sequence":"first","affiliation":[]},{"given":"Mohit","family":"Mishra","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"V8 Runtime Functions","year":"0","key":"ref38"},{"year":"0","key":"ref33"},{"year":"0","key":"ref32"},{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11747-3_1"},{"journal-title":"Heap Spraying","year":"2007","key":"ref36"},{"volume":"49","journal-title":"Aleph One Smashing the stack for fun and profit","year":"0","key":"ref35"},{"year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"journal-title":"Exploiting and protecting dynamic code generation in Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium","year":"2015","author":"song","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_12"},{"journal-title":"Control-flow integrity in ACM Conference on Computer and Communications Security (CCS)","year":"2005","author":"abadi","key":"ref14"},{"journal-title":"Browser Statistics and Trends","year":"0","key":"ref15"},{"journal-title":"Octane 2 0 JavaScript Benchmark","year":"0","key":"ref16"},{"journal-title":"The Devil is in the Constants Bypassing Defenses in Browser JIT Engines in Network and Data Security Symposium NDSS&#x2019; 15","year":"0","author":"athanasakis","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"journal-title":"ROPgadget tool 2012","year":"0","author":"salwan","key":"ref19"},{"journal-title":"Image Has Safe Exception Handlers","year":"2005","key":"ref28"},{"journal-title":"Data Execution Prevention Changes to Functionality in Microsoft Windows XP Service Pack 2 Part 3 Memory Protection Technologies","year":"2004","author":"andersen","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref3","first-page":"475","author":"giuffrida","year":"2012","journal-title":"Enhanced operating system security through efficient and fine-grained address space randomization In Proceedings of the 21st USENIX Security Symposium"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9_4"},{"journal-title":"adaptive Adaptive Just-In-Time Code Diversification In Proceedings of MTD ACM CCS'15","year":"2015","author":"jangda","key":"ref29"},{"journal-title":"Interpreter Exploitation Pointer Inference and Jit Spraying","year":"0","author":"blazakis","key":"ref5"},{"journal-title":"librando Transparent Code Randomization for Just-in-Time Compilers In ACM Conference on Computer and Communications Security CCS&#x2019; 13","year":"0","author":"homescu","key":"ref8"},{"journal-title":"Profile-guided automated software diversity In Proceedings of the 2013 International Symposium on Code Generation and Optimization CGO &#x2032;13","year":"2013","author":"homescu","key":"ref7"},{"key":"ref2","first-page":"67","author":"forrest","year":"1997","journal-title":"Building diverse computer systems In Proceedings of the 6th Workshop on Hot Topics in Operating Systems Hot OS"},{"key":"ref9","first-page":"571","author":"hiser","year":"2012","journal-title":"ILR Where'd my gadgets go? In Proceedings of the 33rd IEEE Symposium on Security and Privacy S&P &#x2018;12"},{"key":"ref1","first-page":"565","volume":"12","author":"cohen","year":"1993","journal-title":"Operating system protection through program evolution Computers and Security"},{"journal-title":"V8 Constant Blinding SafePush","year":"0","key":"ref20"},{"key":"ref22","first-page":"323","article-title":"INSeRT: Protect dynamic code generation against spraying","author":"wei","year":"2011","journal-title":"Proceedings of the 2011 International Conference on Information Science and Technology ICIST &#x2018;11"},{"journal-title":"V8 Constant Blinding SafeMove","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191551"},{"key":"ref23","first-page":"559","article-title":"Practical control flow integrity and randomization for binary executables","year":"2013","journal-title":"IEEE Symposium on Security and Privacy SP"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191531"},{"journal-title":"Valgrind A program supervision framework Electronic Notes in Theoretical Computer Science","year":"2003","author":"nethercote","key":"ref25"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2016,12,12]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07906978.pdf?arnumber=7906978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T22:40:33Z","timestamp":1506984033000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7906978\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7906978","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}