{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:06Z","timestamp":1750308006206,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,4,23]],"date-time":"2006-04-23T00:00:00Z","timestamp":1145750400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,4,23]]},"DOI":"10.1145\/1141277.1141364","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"384-391","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Improving address space randomization with a dynamic offset randomization technique"],"prefix":"10.1145","author":[{"given":"Haizhi","family":"Xu","sequence":"first","affiliation":[{"name":"Syracuse University, Syracuse, NY"}]},{"given":"Steve J.","family":"Chapin","sequence":"additional","affiliation":[{"name":"Syracuse University, Syracuse, NY"}]}],"member":"320","published-online":{"date-parts":[[2006,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aleph One. Smashing The Stack For Fun And Profit. www.Phrack.org 49(14) November 1996.  Aleph One. Smashing The Stack For Fun And Profit. www.Phrack.org 49(14) November 1996."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"volume-title":"4th Linux showcase & conference","year":"2000","author":"Bernaschi M.","key":"e_1_3_2_1_3_1"},{"volume-title":"Proceedings of the 12th USENIX Security Symposium, Washington D.C.","year":"2003","author":"Bhatkar S.","key":"e_1_3_2_1_4_1"},{"volume-title":"Proceedings of the 14th USENIX Security Symposium","year":"2005","author":"Bhatkar S.","key":"e_1_3_2_1_5_1"},{"volume-title":"Proceedings of the 12th USENIX Security Symposium","year":"2003","author":"Cowan C.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"U. Drepper. How to write shared libraries January 2005. http:\/\/people.redhat.com\/drepper\/dsohowto.pdf.  U. Drepper. How to write shared libraries January 2005. http:\/\/people.redhat.com\/drepper\/dsohowto.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"T. Durden. Bypassing PaX ASLR protection. www.Phrack.org 59(9) June 2002.  T. Durden. Bypassing PaX ASLR protection. www.Phrack.org 59(9) June 2002."},{"key":"e_1_3_2_1_9_1","unstructured":"eEye Digital Security. ANALYSIS: .ida \"Code Red\" Worm July 2001. http:\/\/www.eeye.com\/html\/research\/advisories\/AL20010717.html.  eEye Digital Security. ANALYSIS: .ida \"Code Red\" Worm July 2001. http:\/\/www.eeye.com\/html\/research\/advisories\/AL20010717.html."},{"key":"e_1_3_2_1_10_1","unstructured":"eEye Digital Security. Microsoft Internet Information Services Remote Buffer Overflow (SYSTEM Level Access) June 2001. http:\/\/www.eeye.com\/html\/Research\/Advisories\/AD20010618.html.  eEye Digital Security. Microsoft Internet Information Services Remote Buffer Overflow (SYSTEM Level Access) June 2001. http:\/\/www.eeye.com\/html\/Research\/Advisories\/AD20010618.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1947337.1947356"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"volume-title":"Stony Brook University","year":"2005","author":"Liang Z.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102150"},{"key":"e_1_3_2_1_15_1","unstructured":"Nergal. The Advanced Return-into-lib(c) Exploits. www.Phrack.org 58(4) December 2001.  Nergal. The Advanced Return-into-lib(c) Exploits. www.Phrack.org 58(4) December 2001."},{"key":"e_1_3_2_1_16_1","unstructured":"openwall. segvguard. ftp:\/\/ftp.pl.openwall.com\/misc\/segvguard\/.  openwall. segvguard. ftp:\/\/ftp.pl.openwall.com\/misc\/segvguard\/."},{"key":"e_1_3_2_1_17_1","unstructured":"W. Purczynski. kNoX---Implementation of Non-Executable Page Protection Mechanism. http:\/\/www.opennet.ru\/prog\/info\/1769.shtml May 2003.  W. Purczynski. kNoX---Implementation of Non-Executable Page Protection Mechanism. http:\/\/www.opennet.ru\/prog\/info\/1769.shtml May 2003."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_19_1","unstructured":"Solar Designer. Non-Executable User Stack. http:\/\/www.openwall.com\/linux\/.  Solar Designer. Non-Executable User Stack. http:\/\/www.openwall.com\/linux\/."},{"volume-title":"The Effectiveness of Instruction Set Randomization. In Proceedings of the 14th USENIX Security Symposium","year":"2005","author":"Sovarel N.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","unstructured":"the Pax team. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  the Pax team. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"volume-title":"Proceedings of the 22nd Symposium on Reliable and Distributed Systems (SRDS)","year":"2003","author":"Xu J.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102151"}],"event":{"name":"SAC06: The 2006 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Dijon France","acronym":"SAC06"},"container-title":["Proceedings of the 2006 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1141277.1141364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:31Z","timestamp":1750259191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1141277.1141364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,23]]},"references-count":24,"alternative-id":["10.1145\/1141277.1141364","10.1145\/1141277"],"URL":"https:\/\/doi.org\/10.1145\/1141277.1141364","relation":{},"subject":[],"published":{"date-parts":[[2006,4,23]]},"assertion":[{"value":"2006-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}