{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:34:46Z","timestamp":1775054086173,"version":"3.50.1"},"reference-count":14,"publisher":"Pleiades Publishing Ltd","issue":"4","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1134\/s0361768815040052","type":"journal-article","created":{"date-parts":[[2015,7,24]],"date-time":"2015-07-24T03:15:55Z","timestamp":1437707755000},"page":"231-236","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Application of compiler transformations against software vulnerabilities exploitation"],"prefix":"10.1134","volume":"41","author":[{"given":"A. R.","family":"Nurmukhametov","sequence":"first","affiliation":[]},{"given":"Sh. F.","family":"Kurmangaleev","sequence":"additional","affiliation":[]},{"given":"V. V.","family":"Kaushan","sequence":"additional","affiliation":[]},{"given":"S. S.","family":"Gaissaryan","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2015,7,25]]},"reference":[{"key":"6265_CR1","volume-title":"Detecting program vulnerabilities using trace-based security testing","author":"Z Dazhi","year":"2011","unstructured":"Dazhi, Z., Detecting program vulnerabilities using trace-based security testing, Ph. D. Dissertation, Arlington, TX: University of Texas at Arlington, 2011."},{"key":"6265_CR2","first-page":"23","volume":"21","author":"A Avetisyan","year":"2011","unstructured":"Avetisyan, A., Belevantsev, A., Borodin, A., and Nesov, B., The use of static analysis for searching vulnerabilities and critical errors in sources code, Trudy ISP RAN (Proceedings of ISP RAS), 2011, vol. 21, pp. 23\u201338.","journal-title":"Trudy ISP RAN"},{"key":"6265_CR3","doi-asserted-by":"publisher","first-page":"1222","DOI":"10.1109\/ARES.2007.54","volume-title":"Proceedings of the Second International Conference on Availability, Reliability and Security, ARES\u2019 07","author":"N Stojanovski","year":"2007","unstructured":"Stojanovski, N., Gusev, M., Gligoroski, G., and Knapskog, S., Bypassing data execution prevention on Microsoft Windows XP SP2, Proceedings of the Second International Conference on Availability, Reliability and Security, ARES\u2019 07, 2007, pp. 1222\u20131226."},{"key":"6265_CR4","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1145\/1030083.1030124","volume-title":"Proc. of the 11th ACM Conf. on Computer and Communications Security, CCS\u2019 04","author":"H Shacham","year":"2004","unstructured":"Shacham, H., Page, M., Pfaff, B., Goh, E., Modadugu, N., Boneh, D., On the effectiveness of addressspace randomization, Proc. of the 11th ACM Conf. on Computer and Communications Security, CCS\u2019 04, 2004, pp. 298\u2013307."},{"key":"6265_CR5","first-page":"243","volume-title":"Proc. of the GCC Developers Summit","author":"P Wagle","year":"2003","unstructured":"Wagle, P. and Cowan, C., Stackguard: simple stack smash protection for GCC, Proc. of the GCC Developers Summit, 2003, pp. 243\u2013255."},{"key":"6265_CR6","volume-title":"Object size checking to prevent (some) buffer overflows","author":"J Jelinek","year":"2004","unstructured":"Jelinek, J., Object size checking to prevent (some) buffer overflows, 2004. https:\/\/gcc.gnu.org\/ml\/gccpatches\/2004-09\/msg02055.html."},{"key":"6265_CR7","volume-title":"Transparent runtime shadow stack: Protection against malicious return address modifications","author":"S Sinnadurai","year":"2008","unstructured":"Sinnadurai, S., Zhao, Q., and Wong, W., Transparent runtime shadow stack: Protection against malicious return address modifications, 2008."},{"key":"6265_CR8","unstructured":"StackShield: A \u201cstack smashing\u201d technique protection tool for Linux. http:\/www.angelfire.com\/sk\/stackshield."},{"key":"6265_CR9","volume-title":"Technical Report TR-ECE 03-13","author":"H Ozdoganoglu","year":"2004","unstructured":"Ozdoganoglu, H., Vijaykumar, T.N., Brodley, C.E., Jalote, A., and Kuperman, B.A., SmashGuard: A hardware solution to prevent security attacks on the function return address, Technical Report TR-ECE 03-13, Purdue University, 2004."},{"key":"6265_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1920261.1920269","volume-title":"Proc. of the 26th Annual Computer Security Applications Conf., ACSAC\u2019 10","author":"K Onarlioglu","year":"2010","unstructured":"Onarlioglu, K., Bilge, L., Lanzi, A., Balzarotti, D., and Kirda, E., G-Free: defeating return-oriented programming through gadget-less binaries, Proc. of the 26th Annual Computer Security Applications Conf., ACSAC\u2019 10, 2010, pp. 49\u201358."},{"key":"6265_CR11","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/1755913.1755934","volume-title":"Proceedings of the 5th European Conference on Computer Systems, EuroSys\u2019 10","author":"J Li","year":"2010","unstructured":"Li, J., Wang, Z., Jiang, X., Grace, M., and Bahram, S., Defeating return-oriented rootkits with \u201creturn-less\u201d kernels, Proceedings of the 5th European Conference on Computer Systems, EuroSys\u2019 10, 2010, pp. 195\u2013208."},{"issue":"1","key":"6265_CR12","first-page":"327","volume":"26","author":"V Ivannikov","year":"2014","unstructured":"Ivannikov, V., Kurmangaleev, Sh., Belevantsev, A., Nurmukhametov, A., Savchenko, V., Matevosyan, R., and \u00c0vetisyan, A., Implementing obfuscating transformations in the LLVM compiler infrastructure, Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk, 2014, vol. 26, no. 1, pp. 327\u2013342.","journal-title":"Tr. Inst. Sistemnogo Program. Ross. Akad. Nauk"},{"key":"6265_CR13","unstructured":"Stewart, M., Algorithmic diversity for software security. http:\/\/arxiv.org\/abs\/1312.3891."},{"key":"6265_CR14","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1900546.1900550","volume-title":"Proc. of the 2010 Workshop on New Security Paradigms, NSPW\u201910","author":"M Franz","year":"2010","unstructured":"Franz, M., E unibus pluram: Massive-scale software diversity as a defense mechanism, Proc. of the 2010 Workshop on New Security Paradigms, NSPW\u201910, 2010, pp. 7\u201316."}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768815040052.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1134\/S0361768815040052","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768815040052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768815040052.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T02:17:27Z","timestamp":1775009847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1134\/S0361768815040052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":14,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,7]]}},"alternative-id":["6265"],"URL":"https:\/\/doi.org\/10.1134\/s0361768815040052","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7]]},"assertion":[{"value":"12 February 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2015","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}