{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:37:34Z","timestamp":1774366654840,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,9]],"date-time":"2017-03-09T00:00:00Z","timestamp":1489017600000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1453020"],"award-info":[{"award-number":["1453020"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,9]]},"DOI":"10.1145\/2857705.2857726","type":"proceedings-article","created":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T15:57:50Z","timestamp":1457107070000},"page":"50-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Remix"],"prefix":"10.1145","author":[{"given":"Yue","family":"Chen","sequence":"first","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Zhi","family":"Wang","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"David","family":"Whalley","sequence":"additional","affiliation":[{"name":"Florida State University, Tallahassee, FL, USA"}]},{"given":"Long","family":"Lu","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/93548.93576"},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. OS X MountainLion Core Technologies Overview. http:\/\/movies.apple.com\/media\/us\/osx\/2012\/docs\/OSX_MountainLion_Core_Technologies_Overview.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"ARM: the Architecture for the Digital World. http:\/\/www.arm.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Linux Kernel Address Space Layout Randomization. http:\/\/lwn.net\/Articles\/569635\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671253"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671250"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267308.1267319"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/520033.858247"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251353.1251360"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_20_1","unstructured":"Memory Protection Technologies. http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx."},{"key":"e_1_3_2_1_21_1","unstructured":"x86 NX support. http:\/\/lwn.net\/Articles\/87814\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671251"},{"key":"e_1_3_2_1_24_1","unstructured":"Data Execution Prevention. http:\/\/en.wikipedia.org\/wiki\/Data_Execution_Prevention."},{"key":"e_1_3_2_1_25_1","volume-title":"Mar. 13","author":"Erlingsson U.","year":"2012","unstructured":"U. Erlingsson, M. Abadi, and M.-D. Budiu. Architectural Support for Software-based Protection, Mar. 13 2012. US Patent 8,136,091."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362833"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671252"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_31_1","volume-title":"Intel 64 and IA-32 Architectures Software Developer\\'s Manual","year":"2014","unstructured":"Intel. Intel 64 and IA-32 Architectures Software Developer\\'s Manual, 2014."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/519563"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755934"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2432156"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23271"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_40_1","volume-title":"Iozone Filesystem Benchmark. URL: www.iozone.org","author":"Norcott W. D.","year":"2003","unstructured":"W. D. Norcott and D. Capps. Iozone Filesystem Benchmark. URL: www.iozone.org, 2003."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534805"},{"key":"e_1_3_2_1_44_1","unstructured":"H. Reiser. ReiserFS 2004."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_48_1","volume-title":"PaX Address Space Layout Randomization (ASLR)","author":"Team P.","year":"2003","unstructured":"P. Team. PaX Address Space Layout Randomization (ASLR), 2003."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_50_1","unstructured":"Wikipedia. Basic Block. http:\/\/en.wikipedia.org\/wiki\/Basic_block."},{"key":"e_1_3_2_1_51_1","unstructured":"Wikipedia. Pwn2Own. http:\/\/en.wikipedia.org\/wiki\/Pwn2Own."},{"key":"e_1_3_2_1_52_1","unstructured":"Wikipedia. Tail Call. http:\/\/en.wikipedia.org\/wiki\/Tail_call."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534796"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776855"}],"event":{"name":"CODASPY'16: Sixth ACM Conference on Data and Application Security and Privacy","location":"New Orleans Louisiana USA","acronym":"CODASPY'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857705.2857726","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2857705.2857726","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2857705.2857726","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:47:05Z","timestamp":1763459225000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857705.2857726"}},"subtitle":["On-demand Live Randomization"],"short-title":[],"issued":{"date-parts":[[2016,3,9]]},"references-count":56,"alternative-id":["10.1145\/2857705.2857726","10.1145\/2857705"],"URL":"https:\/\/doi.org\/10.1145\/2857705.2857726","relation":{},"subject":[],"published":{"date-parts":[[2016,3,9]]},"assertion":[{"value":"2016-03-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}