{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:05Z","timestamp":1763468165395,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,7,29]],"date-time":"2013-07-29T00:00:00Z","timestamp":1375056000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1053143"],"award-info":[{"award-number":["CNS-1053143"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-10-2-4089"],"award-info":[{"award-number":["N66001-10-2-4089"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,7,29]]},"DOI":"10.1145\/2500727.2500747","type":"proceedings-article","created":{"date-parts":[[2013,8,13]],"date-time":"2013-08-13T12:31:21Z","timestamp":1376397081000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Security bugs in embedded interpreters"],"prefix":"10.1145","author":[{"given":"Haogang","family":"Chen","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Cody","family":"Cutler","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Yandong","family":"Mao","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Xi","family":"Wang","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"M. Frans","family":"Kaashoek","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2013,7,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bitcoin. Script - Bitcoin 2013. https:\/\/en.bitcoin.it\/wiki\/Script.  Bitcoin. Script - Bitcoin 2013. https:\/\/en.bitcoin.it\/wiki\/Script."},{"key":"e_1_3_2_1_2_1","volume-title":"BlackHat DC","author":"Blazakis D.","year":"2010","unstructured":"D. Blazakis . Interpreter exploitation : Pointer inference and JIT spraying . BlackHat DC , 2010 . D. Blazakis. Interpreter exploitation: Pointer inference and JIT spraying. BlackHat DC, 2010."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI) , San Diego, CA , Dec. 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, Dec. 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"Apr.","author":"Corbet J.","year":"2011","unstructured":"J. Corbet . A JIT for packet filters , Apr. 2011 . http:\/\/lwn.net\/Articles\/437981\/. J. Corbet. A JIT for packet filters, Apr. 2011. http:\/\/lwn.net\/Articles\/437981\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346312"},{"key":"e_1_3_2_1_6_1","volume-title":"Dragonflybsd bug 1748","author":"BSD.","year":"2010","unstructured":"DragonFly BSD. Dragonflybsd bug 1748 , 2010 . http:\/\/bugs.dragonflybsd.org\/issues\/1748. DragonFlyBSD. Dragonflybsd bug 1748, 2010. http:\/\/bugs.dragonflybsd.org\/issues\/1748."},{"key":"e_1_3_2_1_7_1","volume-title":"Jan.","author":"Drewry W.","year":"2012","unstructured":"W. Drewry . SECure COMPuting with filters , Jan. 2012 . http:\/\/lwn.net\/Articles\/498231\/. W. Drewry. SECure COMPuting with filters, Jan. 2012. http:\/\/lwn.net\/Articles\/498231\/."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231411"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224076"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"volume-title":"Dec.","year":"2011","key":"e_1_3_2_1_11_1","unstructured":"Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification , Dec. 2011 . http:\/\/www.acpi.info\/DOWNLOADS\/ACPIspec50.pdf. Hewlett-Packard, Intel, Microsoft, Phoenix, and Toshiba. Advanced configuration and power interface specification, Dec. 2011. http:\/\/www.acpi.info\/DOWNLOADS\/ACPIspec50.pdf."},{"key":"e_1_3_2_1_12_1","unstructured":"A. S. Incorporated. The type 2 charstring format Mar. 2000. http:\/\/partners.adobe.com\/public\/developer\/en\/font\/5177.Type2.pdf.  A. S. Incorporated. The type 2 charstring format Mar. 2000. http:\/\/partners.adobe.com\/public\/developer\/en\/font\/5177.Type2.pdf."},{"key":"e_1_3_2_1_13_1","volume-title":"Sept.","author":"Kuznetosv A.","year":"2001","unstructured":"A. Kuznetosv . SS utility : Quick intro , Sept. 2001 . http:\/\/www.cyberciti.biz\/files\/ss.html. A. Kuznetosv. SS utility: Quick intro, Sept. 2001. http:\/\/www.cyberciti.biz\/files\/ss.html."},{"key":"e_1_3_2_1_14_1","unstructured":"K. McAllister. Attacking hardened Linux systems with kernel JIT spraying Nov. 2012. http:\/\/mainisusuallyafunction.blogspot.com\/2012\/11\/attacking-hardened-linux-systems-with.html.  K. McAllister. Attacking hardened Linux systems with kernel JIT spraying Nov. 2012. http:\/\/mainisusuallyafunction.blogspot.com\/2012\/11\/attacking-hardened-linux-systems-with.html."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the","author":"McCanne S.","year":"1993","unstructured":"S. McCanne and V. Jacobson . The BSD packet filter: A new architecture for user-level packet capture . In Proceedings of the Winter 1993 USENIX Annual Technical Conference, San Diego, CA , Jan. 1993. S. McCanne and V. Jacobson. The BSD packet filter: A new architecture for user-level packet capture. In Proceedings of the Winter 1993 USENIX Annual Technical Conference, San Diego, CA, Jan. 1993."},{"key":"e_1_3_2_1_16_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin: A peer-to-peer electronic cash system , 2008 . http:\/\/bitcoin.org\/bitcoin.pdf. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system, 2008. http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_17_1","volume-title":"Fun with constrained programming","author":"Ormandy T.","year":"2012","unstructured":"T. Ormandy . Fun with constrained programming , 2012 . http:\/\/blog.cmpxchg8b.com\/2012\/09\/fun-with-constrained-programming.html. T. Ormandy. Fun with constrained programming, 2012. http:\/\/blog.cmpxchg8b.com\/2012\/09\/fun-with-constrained-programming.html."},{"key":"e_1_3_2_1_18_1","volume-title":"Pickle protocol version 4. PEP","author":"Pitrou A.","year":"2011","unstructured":"A. Pitrou . Pickle protocol version 4. PEP 3154, Dec. 2011 . http:\/\/www.python.org\/dev\/peps\/pep-3154. A. Pitrou. Pickle protocol version 4. PEP 3154, Dec. 2011. http:\/\/www.python.org\/dev\/peps\/pep-3154."},{"key":"e_1_3_2_1_19_1","volume-title":"Signaling compression (SigComp). RFC","author":"Price R.","year":"2003","unstructured":"R. Price , C. Bormann , J. Christoffersson , H. Hannu , Z. Liu , and J. Rosenberg . Signaling compression (SigComp). RFC 3320, Jan. 2003 . http:\/\/www.ietf.org\/rfc\/rfc3320.txt. R. Price, C. Bormann, J. Christoffersson, H. Hannu, Z. Liu, and J. Rosenberg. Signaling compression (SigComp). RFC 3320, Jan. 2003. http:\/\/www.ietf.org\/rfc\/rfc3320.txt."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536616.1536634"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.53"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_24_1","volume-title":"July","author":"Sigwald J.","year":"2011","unstructured":"J. Sigwald . Analysis of the jailbreakme v3 font exploit , July 2011 . http:\/\/esec-lab.sogeti.com\/post\/Analysis-of-the-jailbreakme-v3-font-exploit. J. Sigwald. Analysis of the jailbreakme v3 font exploit, July 2011. http:\/\/esec-lab.sogeti.com\/post\/Analysis-of-the-jailbreakme-v3-font-exploit."},{"key":"e_1_3_2_1_25_1","volume-title":"Sour pickles: Shellcoding in Python's serialisation format","author":"Slaviero M.","year":"2011","unstructured":"M. Slaviero . Sour pickles: Shellcoding in Python's serialisation format , 2011 . https:\/\/media.blackhat.com\/bh-us-11\/Slaviero\/BH_US_11_Slaviero_Sour_Pickles_WP.pdf. M. Slaviero. Sour pickles: Shellcoding in Python's serialisation format, 2011. https:\/\/media.blackhat.com\/bh-us-11\/Slaviero\/BH_US_11_Slaviero_Sour_Pickles_WP.pdf."},{"volume-title":"The instruction set","year":"2011","key":"e_1_3_2_1_26_1","unstructured":"TrueType. The instruction set , 2011 . https:\/\/developer.apple.com\/fonts\/TTRefMan\/RM05\/Chap5.html. TrueType. The instruction set, 2011. https:\/\/developer.apple.com\/fonts\/TTRefMan\/RM05\/Chap5.html."},{"volume-title":"TrueType hinting","year":"2012","key":"e_1_3_2_1_27_1","unstructured":"TrueType. TrueType hinting , 2012 . http:\/\/www.truetype-typography.com\/tthints.htm. TrueType. TrueType hinting, 2012. http:\/\/www.truetype-typography.com\/tthints.htm."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_29_1","first-page":"163","volume-title":"Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Wang X.","year":"2012","unstructured":"X. Wang , H. Chen , Z. Jia , N. Zeldovich , and M. F. Kaashoek . Improving integer security for systems with Kint . In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI) , pages 163 -- 177 , Hollywood, CA , Oct. 2012 . X. Wang, H. Chen, Z. Jia, N. Zeldovich, and M. F. Kaashoek. Improving integer security for systems with Kint. In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI), pages 163--177, Hollywood, CA, Oct. 2012."},{"key":"e_1_3_2_1_30_1","volume-title":"Nov.","author":"Wu A.","year":"2010","unstructured":"A. Wu . Bytecode signatures for polymorphic malware , Nov. 2010 . http:\/\/blog.clamav.net\/2011\/11\/bytecode-signatures-for-polymorphic.html. A. Wu. Bytecode signatures for polymorphic malware, Nov. 2010. http:\/\/blog.clamav.net\/2011\/11\/bytecode-signatures-for-polymorphic.html."}],"event":{"name":"APSys '13: Asia-Pacific Workshop on Systems","sponsor":["Nanyang Technological University","SUTD Singapore University of Technology and Design","NUS NUS","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Singapore Singapore","acronym":"APSys '13"},"container-title":["Proceedings of the 4th Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2500727.2500747","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2500727.2500747","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:26Z","timestamp":1750232066000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2500727.2500747"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,29]]},"references-count":30,"alternative-id":["10.1145\/2500727.2500747","10.1145\/2500727"],"URL":"https:\/\/doi.org\/10.1145\/2500727.2500747","relation":{},"subject":[],"published":{"date-parts":[[2013,7,29]]},"assertion":[{"value":"2013-07-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}