{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:46Z","timestamp":1772164006438,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,13]],"date-time":"2010-03-13T00:00:00Z","timestamp":1268438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,13]]},"DOI":"10.1145\/1736020.1736062","type":"proceedings-article","created":{"date-parts":[[2010,3,16]],"date-time":"2010-03-16T15:27:05Z","timestamp":1268753225000},"page":"371-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Orthrus"],"prefix":"10.1145","author":[{"given":"Ruirui","family":"Huang","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel Y.","family":"Deng","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/320080.320111"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of 12th USENIX Security Symposium","author":"Bhatkar S.","year":"2003","unstructured":"S. Bhatkar , D. C. DuVarney , and R. Sekar . Address obfuscation: an efficient approach to combat a broad range of memory error exploitsth . In Proceedings of 12th USENIX Security Symposium , 2003 . S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploitsth. In Proceedings of 12th USENIX Security Symposium, 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555777"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224058"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.20"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321673"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 15th USENUX Security Symposium","author":"Cox B.","year":"2006","unstructured":"B. Cox , D. Evans , A. Filipi , J. Rowanhill , W. Hu , J. Davidson , J. Knight , A. Nguyen-Tuong , and J. Hiser . N-variant systems: A secretless framework for security through diversity . In Proceedings of the 15th USENUX Security Symposium , August 2006 . B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: A secretless framework for security through diversity. In Proceedings of the 15th USENUX Security Symposium, August 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCETECH.2008.32"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.869367"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.26"},{"key":"e_1_3_2_1_20_1","volume-title":"Intel Details Upcoming New Processor Generations","author":"Intel Inc.","year":"2007","unstructured":"Intel Inc. Intel Details Upcoming New Processor Generations , 2007 . http:\/\/www.intel.com\/pressroom\/archive\/releases\/20070328fact.html. Intel Inc. Intel Details Upcoming New Processor Generations, 2007. http:\/\/www.intel.com\/pressroom\/archive\/releases\/20070328fact.html."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Jim T.","year":"2002","unstructured":"T. Jim , G. Morrisett , D. Grossman , M. Hicks , J. Cheney , and Y. Wang . Cyclone : A safe dialect of C . In Proceedings of the USENIX Annual Technical Conference , 2002 . T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y.Wang. Cyclone: A safe dialect of C. In Proceedings of the USENIX Annual Technical Conference, 2002."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669161"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_25_1","volume-title":"Workshop on the Evaluation of Software Defect Detection Tools(PLDI'05)","author":"Lu S.","year":"2005","unstructured":"S. Lu , Z. Li , F. Qin , L. Tan , P. Zhou , and Y. Zhou . Bugbench: Benchmarks for evaluating bug detection tools . In Workshop on the Evaluation of Software Defect Detection Tools(PLDI'05) , 2005 . S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou. Bugbench: Benchmarks for evaluating bug detection tools. In Workshop on the Evaluation of Software Defect Detection Tools(PLDI'05), 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.36"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Workshop on Interaction between Compilers and Computer Architectures","author":"Nagarajan V.","year":"2008","unstructured":"V. Nagarajan , H.-S. Kim , Y. Wu , and R. Gupta . Dynamic information flow tracking on multicores . In Proceedings of the Workshop on Interaction between Compilers and Computer Architectures , 2008 . V. Nagarajan, H.-S. Kim, Y. Wu, and R. Gupta. Dynamic information flow tracking on multicores. In Proceedings of the Workshop on Interaction between Compilers and Computer Architectures, 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630087"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.15"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 11th Annual Network and Distributed System Security Symposium","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. S. Lam . A practical dynamic buffer overflow detector . In Proceedings of the 11th Annual Network and Distributed System Security Symposium , 2004 . O. Ruwase and M. S. Lam. A practical dynamic buffer overflow detector. In Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_1_35_1","volume-title":"Secure Coding in C and C++ (SEI Series in Software Engineering). Addison--Wesley Professional","author":"Seacord R. C.","year":"2005","unstructured":"R. C. Seacord . Secure Coding in C and C++ (SEI Series in Software Engineering). Addison--Wesley Professional , 2005 . ISBN 0321335724. R. C. Seacord. Secure Coding in C and C++ (SEI Series in Software Engineering). Addison--Wesley Professional, 2005. ISBN 0321335724."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.8"},{"key":"e_1_3_2_1_38_1","volume-title":"WRL Research Report","author":"Shivakumar P.","year":"2001","unstructured":"P. Shivakumar and N. J. Jouppi . CACTI 3.0: An integrated cache timing, power, and area model. Technical report , WRL Research Report , Feb. 2001 . P. Shivakumar and N. J. Jouppi. CACTI 3.0: An integrated cache timing, power, and area model. Technical report, WRL Research Report, Feb. 2001."},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 14th USENIX Security Symposium","author":"Sovarel A. N.","year":"2005","unstructured":"A. N. Sovarel , D. Evans , and N. Paul . Wheres the FEEB? the effectiveness of instruction set randomizationth . In Proceedings of the 14th USENIX Security Symposium , 2005 . A. N. Sovarel, D. Evans, and N. Paul. Wheres the FEEB? the effectiveness of instruction set randomizationth. In Proceedings of the 14th USENIX Security Symposium, 2005."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508267"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/846216.846957"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/647882.738066"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of 22nd International Symposium on Reliable Distributed Systems (SRDS03)","author":"Xu J.","year":"2003","unstructured":"J. Xu , Z. Kalbarczyk , and R. K. Iyer . Transparent runtime randomization for security . In Proceedings of 22nd International Symposium on Reliable Distributed Systems (SRDS03) , 2003 . J. Xu, Z. Kalbarczyk, and R. K. Iyer. Transparent runtime randomization for security. In Proceedings of 22nd International Symposium on Reliable Distributed Systems (SRDS03), 2003."},{"key":"e_1_3_2_1_45_1","volume-title":"NSDI","author":"Yumerefendi A. R.","year":"2007","unstructured":"A. R. Yumerefendi , B. Mickle , and L. P. Cox . Tightlip: Keeping applications from spilling the beans . In NSDI , 2007 . A. R. Yumerefendi, B. Mickle, and L. P. Cox. Tightlip: Keeping applications from spilling the beans. In NSDI, 2007."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.3"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1041685.1029911"}],"event":{"name":"ASPLOS '10: Architectural Support for Programming Languages and Operating Systems","location":"Pittsburgh Pennsylvania USA","acronym":"ASPLOS '10","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the fifteenth International Conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1736020.1736062","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1736020.1736062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:41:22Z","timestamp":1750236082000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1736020.1736062"}},"subtitle":["efficient software integrity protection on multi-cores"],"short-title":[],"issued":{"date-parts":[[2010,3,13]]},"references-count":46,"alternative-id":["10.1145\/1736020.1736062","10.1145\/1736020"],"URL":"https:\/\/doi.org\/10.1145\/1736020.1736062","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1735970.1736062","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1735971.1736062","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,3,13]]},"assertion":[{"value":"2010-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}