{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:26:02Z","timestamp":1775067962477,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,11]],"date-time":"2009-10-11T00:00:00Z","timestamp":1255219200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,11]]},"DOI":"10.1145\/1629575.1629585","type":"proceedings-article","created":{"date-parts":[[2009,10,13]],"date-time":"2009-10-13T15:11:11Z","timestamp":1255446671000},"page":"87-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":264,"title":["Automatically patching errors in deployed software"],"prefix":"10.1145","author":[{"given":"Jeff H.","family":"Perkins","sequence":"first","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Sunghun","family":"Kim","sequence":"additional","affiliation":[{"name":"HKUST, Hong Kong, MA, USA"}]},{"given":"Sam","family":"Larsen","sequence":"additional","affiliation":[{"name":"VMWare, Redwood, MA, USA"}]},{"given":"Saman","family":"Amarasinghe","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Jonathan","family":"Bachrach","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Michael","family":"Carbin","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Carlos","family":"Pacheco","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Frank","family":"Sherwood","sequence":"additional","affiliation":[{"name":"None, Scottsville, VA, USA"}]},{"given":"Stelios","family":"Sidiroglou","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]},{"given":"Greg","family":"Sullivan","sequence":"additional","affiliation":[{"name":"BAE, Burlington, MA, USA"}]},{"given":"Weng-Fai","family":"Wong","sequence":"additional","affiliation":[{"name":"NUS, Singapore, MA, Singapore"}]},{"given":"Yoav","family":"Zibin","sequence":"additional","affiliation":[{"name":"Come2Play, Haifa, MA, Israel"}]},{"given":"Michael D.","family":"Ernst","sequence":"additional","affiliation":[{"name":"Washington University, Seattle, WA, USA"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"USENIX Security (Aug.","author":"ANAGNOSTAKIS K.","year":"2005","unstructured":"ANAGNOSTAKIS , K. , SIDIROGLOU , S. , AKRITIDIS , P. , XINIDIS , K. , MARKATOS , E. , AND KEROMYTIS , A.D. Detecting targeted attacks using shadow honeypots . In USENIX Security (Aug. 2005 ). ANAGNOSTAKIS, K., SIDIROGLOU, S., AKRITIDIS, P., XINIDIS, K., MARKATOS, E., AND KEROMYTIS, A.D. Detecting targeted attacks using shadow honeypots. In USENIX Security (Aug. 2005)."},{"key":"e_1_3_2_1_2_1","volume-title":"PLDI (June","author":"AUSTIN T.","year":"2004","unstructured":"AUSTIN , T. , BREACH , S. , AND SOHI , G. Efficient detection of all pointer and array access errors . In PLDI (June 2004 ). AUSTIN, T., BREACH, S., AND SOHI, G. Efficient detection of all pointer and array access errors. In PLDI (June 2004)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_5_1","volume-title":"MIT Department of Electrical Engineering and Computer Science","author":"BRUENING D.","year":"2004","unstructured":"BRUENING , D. Efficient, Transparent, and Comprehensive Runtime Code Manipulation. Ph. D. , MIT Department of Electrical Engineering and Computer Science , Cambridge, MA , Sep. 2004 . BRUENING, D. Efficient, Transparent, and Comprehensive Runtime Code Manipulation. Ph.D., MIT Department of Electrical Engineering and Computer Science, Cambridge, MA, Sep. 2004."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876408"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781157"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security (January","author":"COWAN C.","year":"1998","unstructured":"COWAN , C. , PU , C. , MAIER , D. , WALPOLE , J. , BAKKE , P. , BEATTIE , S. , GRIER , A. , WAGLE , P. , ZHANG , Q. , AND HINTON , H. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In USENIX Security (January 1998 ). COWAN, C., PU, C., MAIER, D., WALPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., ZHANG, Q., AND HINTON, H. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security (January 1998)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.34"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949314"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062499"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570031"},{"key":"e_1_3_2_1_19_1","volume-title":"Morgan Kaufmann","author":"GRAY J.","year":"1993","unstructured":"GRAY , J. , AND REUTER , A. Transaction Processing : Concepts and Techniques . Morgan Kaufmann , 1993 . GRAY, J., AND REUTER, A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1993."},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX (June","author":"JIM T.","year":"2002","unstructured":"JIM , T. , MORRISETT , G. , GROSSMAN , D. , HICKS , M. , CHENEY , J. , AND WANG , Y. Cyclone: A safe dialect of C . In USENIX (June 2002 ). JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M., CHENEY, J., AND WANG, Y. Cyclone: A safe dialect of C. In USENIX (June 2002)."},{"key":"e_1_3_2_1_21_1","volume-title":"AADEBUG (May","author":"JONES R.","year":"1997","unstructured":"JONES , R. , AND KELLY , P. Backwards-compatible bounds checking for arrays and pointers in C programs . In AADEBUG (May 1997 ). JONES, R., AND KELLY, P. Backwards-compatible bounds checking for arrays and pointers in C programs. In AADEBUG (May 1997)."},{"key":"e_1_3_2_1_22_1","first-page":"295","volume-title":"OSDI (Dec.","author":"JULA H.","year":"2008","unstructured":"JULA , H. , TRALAMAZZA , D. , ZAMFIR , C. , AND CANDEA , G. Deadlock immunity : Enabling systems to defend against deadlocks . In OSDI (Dec. 2008 ), pp. 295 -- 308 . JULA, H., TRALAMAZZA, D., ZAMFIR, C., AND CANDEA, G. Deadlock immunity: Enabling systems to defend against deadlocks. In OSDI (Dec. 2008), pp. 295--308."},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Summer","author":"KENDALL S.C.","year":"1983","unstructured":"KENDALL , S.C. Bcc: Run-time checking for C programs . In USENIX Summer ( 1983 ). KENDALL, S.C. Bcc: Run-time checking for C programs. In USENIX Summer (1983)."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security (Aug.","author":"KIRIANSKY V.","year":"2002","unstructured":"KIRIANSKY , V. , BRUENING , D. , AND AMARASINGHE , S. Secure execution via program shepherding . In USENIX Security (Aug. 2002 ). KIRIANSKY, V., BRUENING, D., AND AMARASINGHE, S. Secure execution via program shepherding. In USENIX Security (Aug. 2002)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007540"},{"key":"e_1_3_2_1_26_1","volume-title":"Mobility: processes, computers, and agents","author":"LITZKOW M.","year":"1999","unstructured":"LITZKOW , M. , AND SOLOMON , M. The evolution of condor checkpointing . In Mobility: processes, computers, and agents ( 1999 ), ACM Press\/Addison-Wesley . LITZKOW, M., AND SOLOMON, M. The evolution of condor checkpointing. In Mobility: processes, computers, and agents (1999), ACM Press\/Addison-Wesley."},{"key":"e_1_3_2_1_27_1","volume-title":"SNDSS (Feb.","author":"LOCASTO M.E.","year":"2005","unstructured":"LOCASTO , M.E. , SIDIROGLOU , S. , AND KEROMYTIS , A.D. Software self-healing using collaborative application communities . In SNDSS (Feb. 2005 ). LOCASTO, M.E., SIDIROGLOU, S., AND KEROMYTIS, A.D. Software self-healing using collaborative application communities. In SNDSS (Feb. 2005)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1337691.1338370"},{"key":"e_1_3_2_1_29_1","volume-title":"NDSS (Feb.","author":"NEWSOME J.","year":"2005","unstructured":"NEWSOME , J. , AND SONG , D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In NDSS (Feb. 2005 ). NEWSOME, J., AND SONG, D. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS (Feb. 2005)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409360.1409382"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029901"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095833"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/949344.949402"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.2"},{"key":"e_1_3_2_1_35_1","volume-title":"OSDI (December","author":"RINARD M.","year":"2004","unstructured":"RINARD , M. , CADAR , C. , DUMITRAN , D. , ROY , D.M. , LEU , T. , AND WILLIAM S. BEEBEE , J. Enhancing server availability and security through failure-oblivious computing . In OSDI (December 2004 ). RINARD, M., CADAR, C., DUMITRAN, D., ROY, D.M., LEU, T., AND WILLIAM S. BEEBEE, J. Enhancing server availability and security through failure-oblivious computing. In OSDI (December 2004)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094855.1094866"},{"key":"e_1_3_2_1_37_1","volume-title":"NDSS (February","author":"RUWASE O.","year":"2004","unstructured":"RUWASE , O. , AND LAM , M.S. A practical dynamic buffer overflow detector . In NDSS (February 2004 ). RUWASE, O., AND LAM, M.S. A practical dynamic buffer overflow detector. In NDSS (February 2004)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.38"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX (Apr.","author":"SIDIROGLOU S.","year":"2005","unstructured":"SIDIROGLOU , S. , LOCASTO , M.E. , BOYD , S.W. , AND KEROMYTIS , A.D. Building a reactive immune system for software services . In USENIX (Apr. 2005 ). SIDIROGLOU, S., LOCASTO, M.E., BOYD, S.W., AND KEROMYTIS, A.D. Building a reactive immune system for software services. In USENIX (Apr. 2005)."},{"key":"e_1_3_2_1_43_1","volume-title":"AND CHIUEH","author":"SMIRNOV A.","year":"2005","unstructured":"SMIRNOV , A. , AND CHIUEH , T. DIRA : Automatic detection, identification and repair of control-hijacking attacks. In NDSS (Feb . 2005 ). SMIRNOV, A., AND CHIUEH, T. DIRA: Automatic detection, identification and repair of control-hijacking attacks. In NDSS (Feb. 2005)."},{"key":"e_1_3_2_1_44_1","volume-title":"Honeypots: Tracking Hackers","author":"SPITZNER L.","year":"2002","unstructured":"SPITZNER , L. Honeypots: Tracking Hackers . Addison-Wesley , 2002 . SPITZNER, L. Honeypots: Tracking Hackers. Addison-Wesley, 2002."},{"key":"e_1_3_2_1_45_1","unstructured":"Stackshield. www.angelfire.com\/sk\/stackshield.  Stackshield. www.angelfire.com\/sk\/stackshield."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_47_1","volume-title":"Sep.","year":"2006","unstructured":"Symantech Internet security threat report. www.symantec.com , Sep. 2006 . Symantech Internet security threat report. www.symantec.com, Sep. 2006."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273010"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940113"}],"event":{"name":"SOSP09: ACM SIGOPS 22nd Symposium on Operating Systems Principles","location":"Big Sky Montana USA","acronym":"SOSP09","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629575.1629585","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1629575.1629585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:27Z","timestamp":1750249407000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629575.1629585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,11]]},"references-count":49,"alternative-id":["10.1145\/1629575.1629585","10.1145\/1629575"],"URL":"https:\/\/doi.org\/10.1145\/1629575.1629585","relation":{},"subject":[],"published":{"date-parts":[[2009,10,11]]},"assertion":[{"value":"2009-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}