{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:34:42Z","timestamp":1740141282827,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2017R1A2B3006360"],"award-info":[{"award-number":["NRF-2017R1A2B3006360"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2661"],"award-info":[{"award-number":["N00014-18-1-2661"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["IITP-2017-0-01853-003"],"award-info":[{"award-number":["IITP-2017-0-01853-003"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,9,1]]},"DOI":"10.1109\/tdsc.2019.2947913","type":"journal-article","created":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T16:37:16Z","timestamp":1571243836000},"page":"2237-2252","source":"Crossref","is-referenced-by-count":0,"title":["On the Analysis of Byte-Granularity Heap Randomization"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9670-2351","authenticated-orcid":false,"given":"Daehee","family":"Jang","sequence":"first","affiliation":[]},{"given":"Jonghwan","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5344-6266","authenticated-orcid":false,"given":"Hojoon","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Minjoon","family":"Park","sequence":"additional","affiliation":[]},{"given":"Yunjong","family":"Jung","sequence":"additional","affiliation":[]},{"given":"Minsu","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8984-1006","authenticated-orcid":false,"given":"Brent Byunghoon","family":"Kang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"8","article-title":"Address obfuscation: An efficient approach to combat a broad range of memory error exploits","author":"bhatkar","year":"2003","journal-title":"Proc 12th Conf Usenix Security Symp"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1133255.1134000"},{"year":"0","key":"ref33"},{"year":"0","key":"ref32"},{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref37","first-page":"177","article-title":"Cling: A memory allocator to mitigate dangling pointers","author":"akritidis","year":"2010","journal-title":"Proc Usenix Security Symp"},{"year":"0","key":"ref36"},{"year":"0","key":"ref35"},{"year":"0","key":"ref34"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991121"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095833"},{"year":"0","key":"ref28"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660309"},{"year":"0","key":"ref27"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"article-title":"The architecture of the Nehalem processor and Nehalem-EP SMP platforms","year":"0","author":"thomadakis","key":"ref65"},{"year":"0","key":"ref29"},{"key":"ref66","article-title":"Windows 8 heap internals","author":"valasek","year":"0","journal-title":"Black Hat USA"},{"article-title":"TSX improves timing attacks against KASLR","year":"2014","author":"wojtczuk","key":"ref67"},{"article-title":"Dice: A nondeterministic memory alignment defense against heap Taichi","year":"2011","author":"zhong","key":"ref68"},{"year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"year":"0","key":"ref20"},{"year":"0","key":"ref22"},{"year":"0","key":"ref21"},{"year":"0","key":"ref24"},{"year":"0","key":"ref23"},{"year":"0","key":"ref26"},{"year":"0","key":"ref25"},{"article-title":"Modern HTTP benchmarking tool","year":"0","author":"glozer","key":"ref50"},{"key":"ref51","article-title":"Understanding weaknesses within Internet Explorer&#x2019;s Isolated Heap and MemoryProtection","author":"hariri","year":"2015","journal-title":"Black Hat USA"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02918-9_7"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1168918.1168884"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.22"},{"key":"ref55","first-page":"64","article-title":"Intel 64 and IA-32 Architectures Software Developers Manual, Volume 3A: System Programming Guide","volume":"1","year":"0"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2905760.2905766"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23271"},{"year":"0","key":"ref10"},{"key":"ref40","first-page":"17","article-title":"Efficient techniques for comprehensive protection from memory error exploits","author":"bhatkar","year":"2005","journal-title":"Proc 14th Conf USENIX Security Symp"},{"year":"0","key":"ref11"},{"year":"0","key":"ref12"},{"year":"0","key":"ref13"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19"},{"year":"0","key":"ref4"},{"year":"0","key":"ref3"},{"year":"0","key":"ref6"},{"year":"0","key":"ref5"},{"year":"0","key":"ref8"},{"key":"ref49","first-page":"475","article-title":"Enhanced operating system security through efficient and fine-grained address space randomization","author":"giuffrida","year":"2012","journal-title":"Proc Usenix Security Symp"},{"year":"0","key":"ref7"},{"year":"0","key":"ref9"},{"key":"ref46","first-page":"2","article-title":"The microarchitecture of Intel, AMD and VIA CPUs: An optimization guide for assembly programmers and compiler makers","author":"fog","year":"2012","journal-title":"Copenhagen University College of Engineering"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23262"},{"year":"0","key":"ref47","article-title":"Coreutils"},{"article-title":"The ARM Architecture Version 6 (ARMv6)","year":"2002","author":"brash","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"article-title":"Creating centralized reporting for microsoft host protection technologies: The enhanced mitigation experience toolkit","year":"2016","author":"lewis","key":"ref44"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920310"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9523876\/08871188.pdf?arnumber=8871188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:37:47Z","timestamp":1641987467000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8871188\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":68,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2019.2947913","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2021,9,1]]}}}