{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:31Z","timestamp":1771699831643,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fund for Scientific Re- search - Flanders (FWO)","award":["3G013013"],"award-info":[{"award-number":["3G013013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2808475.2808487","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"49-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Adaptive Just-In-Time Code Diversification"],"prefix":"10.1145","author":[{"given":"Abhinav","family":"Jangda","sequence":"first","affiliation":[{"name":"IIT (BHU) Varanasi, Varanais, UNK, India"}]},{"given":"Mohit","family":"Mishra","sequence":"additional","affiliation":[{"name":"IIT (BHU) Varanasi, Varanasi, UNK, India"}]},{"given":"Bjorn","family":"De Sutter","sequence":"additional","affiliation":[{"name":"Ghent University, Ghent, UNK, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"T.\n      Jackson Compiler-generated software diversity. Moving Target Defense volume \n  54\n   of \n  Advances in Information Security pages \n  77\n  --\n  98\n  . \n  Springer New York 2011\n  .  T. Jackson et al. Compiler-generated software diversity. Moving Target Defense volume 54 of Advances in Information Security pages 77--98. Springer New York 2011.","DOI":"10.1007\/978-1-4614-0977-9_4"},{"key":"e_1_3_2_1_3_1","first-page":"475","volume-title":"Proc. USENIX Security Symp","author":"Giuffrida C.","year":"2012"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_10_1","first-page":"323","volume-title":"Proc. ICIST","author":"Wei T.","year":"2011"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0142"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_12"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. USENIX Workshop on Offensive technologies (WOOT)","author":"Blazakis D.","year":"2010"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. NDSS","author":"Niu B.","year":"2015"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.113"},{"key":"e_1_3_2_1_23_1","unstructured":"Java 7 SE Memory Corruption. Pwn2Own 2013. Accuvant Labs. Online whitepaper.  Java 7 SE Memory Corruption. Pwn2Own 2013. Accuvant Labs. Online whitepaper."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.442.0399"},{"key":"e_1_3_2_1_25_1","unstructured":"PaX non-executable pages design & implementation. http:\/\/pax.grsecurity.net\/docs\/noexec.txt. (2004)  PaX non-executable pages design & implementation. http:\/\/pax.grsecurity.net\/docs\/noexec.txt. (2004)"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Second ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808475.2808487","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808475.2808487","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:42Z","timestamp":1750227162000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808475.2808487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":25,"alternative-id":["10.1145\/2808475.2808487","10.1145\/2808475"],"URL":"https:\/\/doi.org\/10.1145\/2808475.2808487","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}