{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:53:57Z","timestamp":1755838437822,"version":"3.37.3"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency (DARPA)","doi-asserted-by":"publisher","award":["D11PC20024"],"award-info":[{"award-number":["D11PC20024"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency (DARPA)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000201","name":"U.S. Department of the Interior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000201","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Business Center"},{"name":"Acquisition Services Directorate"},{"name":"Sierra Vista Branch"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2017,3,1]]},"DOI":"10.1109\/tdsc.2015.2433252","type":"journal-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T22:35:56Z","timestamp":1434148556000},"page":"158-171","source":"Crossref","is-referenced-by-count":23,"title":["Large-Scale Automated Software Diversity\u2014Program Evolution Redux"],"prefix":"10.1109","volume":"14","author":[{"given":"Andrei","family":"Homescu","sequence":"first","affiliation":[]},{"given":"Todd","family":"Jackson","sequence":"additional","affiliation":[]},{"given":"Stephen","family":"Crane","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Brunthaler","sequence":"additional","affiliation":[]},{"given":"Per","family":"Larsen","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Franz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89598-5_7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"year":"0","author":"payer","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.129"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-1-4614-5416-8_8","article-title":"Diversifying the software stack using randomized NOP insertion","volume":"100","author":"jackson","year":"2012","journal-title":"Moving Target Defense II Application of Game Theory and Adversarial Modeling"},{"key":"ref35","first-page":"122","article-title":"Superoptimizer: A look at the smallest program","author":"massalin","year":"0","journal-title":"Proc Int Conf Arch Support Program Lang Operat Syst"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168906"},{"key":"ref28","first-page":"105","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","author":"bhatkar","year":"0","journal-title":"Proc 12th USENIX Security Symp"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420997"},{"key":"ref29","first-page":"271","article-title":"Efficient techniques for comprehensive protection from memory error exploits","author":"bhatkar","year":"0","journal-title":"Proc 14th USENIX Security Symp"},{"year":"0","author":"obes","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-0_12"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"journal-title":"Homepage of the PaX Team","year":"0","key":"ref22"},{"key":"ref21","first-page":"25","article-title":"Q: Exploit hardening made easy","author":"schwartz","year":"0","journal-title":"20th USENIX Security Symp"},{"key":"ref24","first-page":"113","article-title":"N-version programminc: A fault-tolerance approach to rellablllty of software operatlon","author":"chen","year":"1995","journal-title":"Proc 25th Int Symp Fault-Tolerant Comput Highlights Twenty-Five Years"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"journal-title":"Surreptitious Software Obfuscation Watermarking and Tamperproofing for Software Protection","year":"2009","author":"collberg","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"ref50","first-page":"209","author":"mccamant","year":"0","journal-title":"Proc 15th Usenix Security Symp"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"key":"ref59","first-page":"417","article-title":"Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard","author":"goktas","year":"0","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref58","first-page":"385","article-title":"ROP is still dangerous: Breaking modern defenses","author":"carlini","year":"0","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"ref56","first-page":"447","article-title":"Transparent ROP exploit mitigation using indirect branch tracing","author":"pappas","year":"0","journal-title":"Proc 22nd USENIX Security Symp"},{"key":"ref55","first-page":"163","article-title":"Drop: Detecting return-oriented programming malicious code","author":"chen","year":"0","journal-title":"Proc 5th Int Conf Inf Syst Security"},{"key":"ref54","article-title":"Cache missing for fun and profit","author":"percival","year":"0","journal-title":"Proc Technical BSD Conf"},{"key":"ref53","first-page":"401","article-title":"Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection","author":"davi","year":"0","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"volume":"16","article-title":"Microsoft security intelligence report","year":"2013","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"ref12","first-page":"75","author":"lattner","year":"0","journal-title":"Proc IEEE Int Symp Code Generation Optimization"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462165"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764669"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"ref18","first-page":"475","article-title":"Enhanced operating system security through efficient and fine-grained address space randomization","author":"giuffrida","year":"0","journal-title":"Proc 21st USENIX Security Symp"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"journal-title":"Phrack Mag","year":"0","key":"ref6"},{"key":"ref5","first-page":"552","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"0","journal-title":"Proc 14th ACM Conf Comput Commun Security"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"year":"0","author":"krahmer","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"ref9","first-page":"30","article-title":"Jump-oriented programming: a new class of code-reuse attack","author":"bletsch","year":"0","journal-title":"Proc 6th ACM Symp Inf Comput Commun Security"},{"key":"ref46","first-page":"340","article-title":"Control-flow integrity","author":"abadi","year":"0","journal-title":"Proc 12th ACM Conf Comput Commun Security"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076783"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref42","first-page":"1342","article-title":"HideM: Protecting the contents of userspace memory in the face of disclosure vulnerabilities","author":"gionta","year":"0","journal-title":"Proc ACM Conf Data Appl Security Privacy"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"ref43","article-title":"Readactor: Practical code randomization resilient to memory disclosure","author":"crane","year":"0","journal-title":"Proc 36th IEEE Symp Security and Privacy"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/8858\/7875391\/7122891-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/4358699\/07122891.pdf?arnumber=7122891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:51:29Z","timestamp":1649443889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7122891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,1]]},"references-count":59,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2433252","relation":{},"ISSN":["1545-5971"],"issn-type":[{"type":"print","value":"1545-5971"}],"subject":[],"published":{"date-parts":[[2017,3,1]]}}}