{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:54Z","timestamp":1772164074039,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T00:00:00Z","timestamp":1458864000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CCF-1302682"],"award-info":[{"award-number":["CCF-1302682"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,25]]},"DOI":"10.1145\/2872362.2872408","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T09:24:30Z","timestamp":1459157070000},"page":"727-741","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["HIPStR"],"prefix":"10.1145","author":[{"given":"Ashish","family":"Venkat","sequence":"first","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Sriskanda","family":"Shamasunder","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Hovav","family":"Shacham","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]},{"given":"Dean M.","family":"Tullsen","sequence":"additional","affiliation":[{"name":"University of California, San Diego, La Jolla, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Heterogeneous chip multiprocessors,\" Computer","author":"Kumar R.","unstructured":"R. Kumar , D. M. Tullsen , N. Jouppi , and P. Ranganathan , \" Heterogeneous chip multiprocessors,\" Computer , vol. 38 , no. 11, 2005. R. Kumar, D. M. Tullsen, N. Jouppi, and P. Ranganathan, \"Heterogeneous chip multiprocessors,\" Computer, vol. 38, no. 11, 2005."},{"key":"e_1_3_2_1_2_1","volume-title":"NVidia","author":"Low Power Variable SMP - A","year":"2011","unstructured":"\" Variable SMP - A Multi-Core CPU Architecture for Low Power and High Performance ,\" tech. rep ., NVidia , 2011 . \"Variable SMP - A Multi-Core CPU Architecture for Low Power and High Performance,\" tech. rep., NVidia, 2011."},{"key":"e_1_3_2_1_3_1","volume-title":"ARM","author":"Greenhalgh P.","year":"2011","unstructured":"P. Greenhalgh , \"big. LITTLE Processing with ARM Cortex- A15 & Cortex-A7,\" tech. rep ., ARM , 2011 . P. Greenhalgh, \"big.LITTLE Processing with ARM Cortex- A15 & Cortex-A7,\" tech. rep., ARM, 2011."},{"key":"e_1_3_2_1_4_1","volume-title":"July","author":"Hill M.","year":"2008","unstructured":"M. Hill and M. Marty , \" Amdahl's Law in the Multicore Era,\" Computer , July 2008 . M. Hill and M. Marty, \"Amdahl's Law in the Multicore Era,\" Computer, July 2008."},{"key":"e_1_3_2_1_5_1","volume-title":"Intel","author":"Pro Processor Family Generation Intel","year":"2008","unstructured":"\"2nd Generation Intel Core v Pro Processor Family ,\" tech. rep ., Intel , 2008 . \"2nd Generation Intel Core vPro Processor Family,\" tech. rep., Intel, 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"AMD","year":"2008","unstructured":"\"The future is fusion: The Industry-Changing Impact of Accelerated Computing.,\" tech. rep ., AMD , 2008 . \"The future is fusion: The Industry-Changing Impact of Accelerated Computing.,\" tech. rep., AMD, 2008."},{"key":"e_1_3_2_1_7_1","volume-title":"NVidia","author":"Mobile Devices The Benefits","year":"2010","unstructured":"\" The Benefits of Multiple CPU Cores in Mobile Devices ,\" tech. rep ., NVidia , 2010 . \"The Benefits of Multiple CPU Cores in Mobile Devices,\" tech. rep., NVidia, 2010."},{"key":"e_1_3_2_1_8_1","author":"Kahle J. A.","year":"2005","unstructured":"J. A. Kahle , M. N. Day , H. P. Hofstee , C. R. Johns , T. R. Maeurer , and D. Shippy , \"Introduction to the Cell multiprocessor,\" IBM Journal of Research and Development , July 2005 . J. A. Kahle, M. N. Day, H. P. Hofstee, C. R. Johns, T. R. Maeurer, and D. Shippy, \"Introduction to the Cell multiprocessor,\" IBM Journal of Research and Development, July 2005.","journal-title":"\"Introduction to the Cell multiprocessor,\" IBM Journal of Research and Development"},{"key":"e_1_3_2_1_9_1","volume-title":"The case for energy-proportional computing,\" IEEE computer","author":"Barroso L. A.","year":"2007","unstructured":"L. A. Barroso and U. Holzle , \" The case for energy-proportional computing,\" IEEE computer , 2007 . L. A. Barroso and U. Holzle, \"The case for energy-proportional computing,\" IEEE computer, 2007."},{"key":"e_1_3_2_1_10_1","volume-title":"Towards energy proportionality for large-scale latency-critical workloads,\" in Proceedings of the 41st Annual International Symposium on Computer Architecuture","author":"Lo D.","year":"2014","unstructured":"D. Lo , L. Cheng , R. Govindaraju , L. A. Barroso , and C. Kozyrakis , \" Towards energy proportionality for large-scale latency-critical workloads,\" in Proceedings of the 41st Annual International Symposium on Computer Architecuture , 2014 . D. Lo, L. Cheng, R. Govindaraju, L. A. Barroso, and C. Kozyrakis, \"Towards energy proportionality for large-scale latency-critical workloads,\" in Proceedings of the 41st Annual International Symposium on Computer Architecuture, 2014."},{"key":"e_1_3_2_1_11_1","volume-title":"Trends and effects of energy proportionality on server provisioning in data centers,\" in Proceedings of the 17th Annual International Conference on High Performance Computing","author":"Varsamopoulos G.","year":"2010","unstructured":"G. Varsamopoulos , Z. Abbasi , and S. K. Gupta , \" Trends and effects of energy proportionality on server provisioning in data centers,\" in Proceedings of the 17th Annual International Conference on High Performance Computing , 2010 . G. Varsamopoulos, Z. Abbasi, and S. K. Gupta, \"Trends and effects of energy proportionality on server provisioning in data centers,\" in Proceedings of the 17th Annual International Conference on High Performance Computing, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"Dec.","author":"Kumar R.","year":"2003","unstructured":"R. Kumar , K. I. Farkas , N. P. Jouppi , P. Ranganathan , and D. M. Tullsen , \" Single-ISA Heterogeneous Multi-core Architectures: The Potential for Processor Power Reduction,\" in International Symposium on Microarchitecture , Dec. 2003 . R. Kumar, K. I. Farkas, N. P. Jouppi, P. Ranganathan, and D. M. Tullsen, \"Single-ISA Heterogeneous Multi-core Architectures: The Potential for Processor Power Reduction,\" in International Symposium on Microarchitecture, Dec. 2003."},{"key":"e_1_3_2_1_13_1","volume-title":"June","author":"Kumar R.","year":"2004","unstructured":"R. Kumar , D. M. Tullsen , P. Ranganathan , N. P. Jouppi , and K. I. Farkas , \" Single-ISA Heterogeneous Multi-core Architectures for Multithreaded Workload Performance,\" in International Symposium on Computer Architecture , June 2004 . R. Kumar, D. M. Tullsen, P. Ranganathan, N. P. Jouppi, and K. I. Farkas, \"Single-ISA Heterogeneous Multi-core Architectures for Multithreaded Workload Performance,\" in International Symposium on Computer Architecture, June 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"Execution migration in a heterogeneous-isa chip multiprocessor,\" in Proceedings of the Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems","author":"DeVuyst M.","year":"2012","unstructured":"M. DeVuyst , A. Venkat , and D. M. Tullsen , \" Execution migration in a heterogeneous-isa chip multiprocessor,\" in Proceedings of the Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems , 2012 . M. DeVuyst, A. Venkat, and D. M. Tullsen, \"Execution migration in a heterogeneous-isa chip multiprocessor,\" in Proceedings of the Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems, 2012."},{"key":"e_1_3_2_1_15_1","volume-title":"Harnessing ISA diversity: Design of a heterogeneous-ISA chip multiprocessor,\" in Proceedings of the International Symposium on Computer Architecture","author":"Venkat A.","year":"2014","unstructured":"A. Venkat and D. M. Tullsen , \" Harnessing ISA diversity: Design of a heterogeneous-ISA chip multiprocessor,\" in Proceedings of the International Symposium on Computer Architecture , 2014 . A. Venkat and D. M. Tullsen, \"Harnessing ISA diversity: Design of a heterogeneous-ISA chip multiprocessor,\" in Proceedings of the International Symposium on Computer Architecture, 2014."},{"key":"e_1_3_2_1_16_1","volume-title":"Apr.","author":"Barbalace A.","year":"2015","unstructured":"A. Barbalace , M. Sadini , S. Ansary , C. Jelesnianski , A. Ravichandran , C. Kendir , A. Murray , and B. Ravindran , \" Popcorn: Bridging the Programmability Gap in heterogeneous-ISA Platforms,\" in Proceedings of the 10th European Conference on Computer Systems , Apr. 2015 . A. Barbalace, M. Sadini, S. Ansary, C. Jelesnianski, A. Ravichandran, C. Kendir, A. Murray, and B. Ravindran, \"Popcorn: Bridging the Programmability Gap in heterogeneous-ISA Platforms,\" in Proceedings of the 10th European Conference on Computer Systems, Apr. 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"Jan.","author":"Li T.","year":"2010","unstructured":"T. Li , P. Brett , R. Knauerhase , D. Koufaty , D. Reddy , and S. Hahn , \" Operating system support for overlapping-ISA heterogeneous multi-core architectures,\" in Proceedings of the 16th International Symposium on High Performance Computer Architecture , Jan. 2010 . T. Li, P. Brett, R. Knauerhase, D. Koufaty, D. Reddy, and S. Hahn, \"Operating system support for overlapping-ISA heterogeneous multi-core architectures,\" in Proceedings of the 16th International Symposium on High Performance Computer Architecture, Jan. 2010."},{"key":"e_1_3_2_1_18_1","volume-title":"June","author":"Lustig D.","year":"2015","unstructured":"D. Lustig , C. Trippel , M. Pellauer , and M. Martonosi , \" ArMOR: Defending Against Memory Consistency Model Mismatches in Heterogeneous Architectures,\" in Proceedings of the 42nd International Symposium on Computer Architecture , June 2015 . D. Lustig, C. Trippel, M. Pellauer, and M. Martonosi, \"ArMOR: Defending Against Memory Consistency Model Mismatches in Heterogeneous Architectures,\" in Proceedings of the 42nd International Symposium on Computer Architecture, June 2015."},{"key":"e_1_3_2_1_19_1","author":"Roemer R.","year":"2012","unstructured":"R. Roemer , E. Buchanan , H. Shacham , and S. Savage , \"Return-oriented programming: Systems, languages, and applications,\" ACM Transactions on Information and System Security , 2012 . R. Roemer, E. Buchanan, H. Shacham, and S. Savage, \"Return-oriented programming: Systems, languages, and applications,\" ACM Transactions on Information and System Security, 2012.","journal-title":"\"Return-oriented programming: Systems, languages, and applications,\" ACM Transactions on Information and System Security"},{"key":"e_1_3_2_1_20_1","volume-title":"Return-into-libc without function calls (on the x86),\" in Proceedings of the 14th ACM conference on Computer and Communications Security","author":"Shacham H.","year":"2007","unstructured":"H. Shacham , \" The geometry of innocent flesh on the bone : Return-into-libc without function calls (on the x86),\" in Proceedings of the 14th ACM conference on Computer and Communications Security , 2007 . H. Shacham, \"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86),\" in Proceedings of the 14th ACM conference on Computer and Communications Security, 2007."},{"key":"e_1_3_2_1_21_1","volume-title":"Computer and Communications Security","author":"Bletsch T.","year":"2011","unstructured":"T. Bletsch , X. Jiang , V. W. Freeh , and Z. Liang , \" Jump-oriented programming: a new class of code-reuse attack,\" in Proceedings of the 6th ACM Symposium on Information , Computer and Communications Security , 2011 . T. Bletsch, X. Jiang, V. W. Freeh, and Z. Liang, \"Jump-oriented programming: a new class of code-reuse attack,\" in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011."},{"key":"e_1_3_2_1_22_1","volume-title":"When good instructions go bad: generalizing return-oriented programming to RISC,\" in Proceedings of the 15th ACM conference on Computer and Communications Security","author":"Buchanan E.","year":"2008","unstructured":"E. Buchanan , R. Roemer , H. Shacham , and S. Savage , \" When good instructions go bad: generalizing return-oriented programming to RISC,\" in Proceedings of the 15th ACM conference on Computer and Communications Security , 2008 . E. Buchanan, R. Roemer, H. Shacham, and S. Savage, \"When good instructions go bad: generalizing return-oriented programming to RISC,\" in Proceedings of the 15th ACM conference on Computer and Communications Security, 2008."},{"key":"e_1_3_2_1_23_1","volume-title":"Return-oriented programming without returns,\" in Proceedings of the 17th ACM conference on Computer and Communications Security","author":"Checkoway S.","year":"2010","unstructured":"S. Checkoway , L. Davi , A. Dmitrienko , A.-R. Sadeghi , H. Shacham , and M. Winandy , \" Return-oriented programming without returns,\" in Proceedings of the 17th ACM conference on Computer and Communications Security , 2010 . S. Checkoway, L. Davi, A. Dmitrienko, A.-R. Sadeghi, H. Shacham, and M. Winandy, \"Return-oriented programming without returns,\" in Proceedings of the 17th ACM conference on Computer and Communications Security, 2010."},{"key":"e_1_3_2_1_24_1","volume-title":"Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage","author":"Checkoway S.","year":"2009","unstructured":"S. Checkoway and E. W. Felten , \" Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage ,\" 2009 . S. Checkoway and E. W. Felten, \"Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage,\" 2009."},{"key":"e_1_3_2_1_25_1","volume-title":"Ruhr-Universitat Bochum","author":"Kornau T.","year":"2010","unstructured":"T. Kornau , \"Return oriented programming for the ARM architecture,\" Master's thesis , Ruhr-Universitat Bochum , 2010 . T. Kornau, \"Return oriented programming for the ARM architecture,\" Master's thesis, Ruhr-Universitat Bochum, 2010."},{"key":"e_1_3_2_1_26_1","volume-title":"Control-flow integrity,\" in Proceedings of the 12th ACM conference on Computer and Communications Security","author":"Abadi M.","year":"2005","unstructured":"M. Abadi , M. Budiu , U. Erlingsson , and J. Ligatti , \" Control-flow integrity,\" in Proceedings of the 12th ACM conference on Computer and Communications Security , 2005 . M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, \"Control-flow integrity,\" in Proceedings of the 12th ACM conference on Computer and Communications Security, 2005."},{"key":"e_1_3_2_1_27_1","volume-title":"StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks,\" in Proceedings of the 7th USENIX Security Symposium","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , , \" StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks,\" in Proceedings of the 7th USENIX Security Symposium , 1998 . C. Cowan, C. Pu, D. Maier, et al., \"StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks,\" in Proceedings of the 7th USENIX Security Symposium, 1998."},{"key":"e_1_3_2_1_28_1","volume-title":"Computer and Communications Security","author":"Davi L.","year":"2011","unstructured":"L. Davi , A.-R. Sadeghi , and M. Winandy , \" ROPdefender: A detection tool to defend against return-oriented programming attacks,\" in Proceedings of the 6th ACM Symposium on Information , Computer and Communications Security , 2011 . L. Davi, A.-R. Sadeghi, and M. Winandy, \"ROPdefender: A detection tool to defend against return-oriented programming attacks,\" in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011."},{"key":"e_1_3_2_1_29_1","unstructured":"H. Etoh \"GCC extension for protecting applications from stack-smashing attacks \" 2003.  H. Etoh \"GCC extension for protecting applications from stack-smashing attacks \" 2003."},{"key":"e_1_3_2_1_30_1","volume-title":"Branch regulation: low-overhead protection from code reuse attacks,\" in Proceedings of the 39th Annual International Symposium on Computer Architecture","author":"Kayaalp M.","year":"2012","unstructured":"M. Kayaalp , M. Ozsoy , N. Abu Ghazaleh , and D. Ponomarev , \" Branch regulation: low-overhead protection from code reuse attacks,\" in Proceedings of the 39th Annual International Symposium on Computer Architecture , 2012 . M. Kayaalp, M. Ozsoy, N. Abu Ghazaleh, and D. Ponomarev, \"Branch regulation: low-overhead protection from code reuse attacks,\" in Proceedings of the 39th Annual International Symposium on Computer Architecture, 2012."},{"key":"e_1_3_2_1_31_1","volume-title":"Control flow integrity for COTS binaries,\" in Proceedings of the 22nd USENIX Security Symposium","author":"Zhang M.","year":"2013","unstructured":"M. Zhang and R. Sekar , \" Control flow integrity for COTS binaries,\" in Proceedings of the 22nd USENIX Security Symposium , 2013 . M. Zhang and R. Sekar, \"Control flow integrity for COTS binaries,\" in Proceedings of the 22nd USENIX Security Symposium, 2013."},{"key":"e_1_3_2_1_32_1","volume-title":"Practical control flow integrity and randomization for binary executables,\" in Proceedings of the 34th IEEE Symposium on Security and Privacy","author":"Zhang C.","year":"2013","unstructured":"C. Zhang , T. Wei , Z. Chen , L. Duan , L. Szekeres , S. McCamant , D. Song , and W. Zou , \" Practical control flow integrity and randomization for binary executables,\" in Proceedings of the 34th IEEE Symposium on Security and Privacy , 2013 . C. Zhang, T. Wei, Z. Chen, L. Duan, L. Szekeres, S. McCamant, D. Song, and W. Zou, \"Practical control flow integrity and randomization for binary executables,\" in Proceedings of the 34th IEEE Symposium on Security and Privacy, 2013."},{"key":"e_1_3_2_1_33_1","volume-title":"Code-pointer integrity,\" in USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Kuznetsov V.","year":"2014","unstructured":"V. Kuznetsov , L. Szekeres , M. Payer , G. Candea , R. Sekar , and D. Song , \" Code-pointer integrity,\" in USENIX Symposium on Operating Systems Design and Implementation (OSDI) , 2014 . V. Kuznetsov, L. Szekeres, M. Payer, G. Candea, R. Sekar, and D. Song, \"Code-pointer integrity,\" in USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2014."},{"key":"e_1_3_2_1_34_1","volume-title":"Aug","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan Nurnberger , \"Oxymoron : Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing,\" in Proceedings of the 23rd USENIX Security Symposium , Aug 2014 . Michael Backes and Stefan Nurnberger, \"Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing,\" in Proceedings of the 23rd USENIX Security Symposium, Aug 2014."},{"key":"e_1_3_2_1_35_1","volume-title":"Isomeron: Code randomization resilient to (just-in-time) return-oriented programming","author":"Davi L.","year":"2015","unstructured":"L. Davi , C. Liebchen , A.-R. Sadeghi , K. Z. Snow , and F. Monrose , \" Isomeron: Code randomization resilient to (just-in-time) return-oriented programming ,\" July 2015 . L. Davi, C. Liebchen, A.-R. Sadeghi, K. Z. Snow, and F. Monrose, \"Isomeron: Code randomization resilient to (just-in-time) return-oriented programming,\" July 2015."},{"key":"e_1_3_2_1_36_1","volume-title":"ILR: Where'd My Gadgets Go?,\" in Proceedings of the 33rd IEEE Symposium on Security and Privacy","author":"Hiser J.","year":"2012","unstructured":"J. Hiser , A. Nguyen Tuong , M. Co , M. Hall , and J. W. Davidson , \" ILR: Where'd My Gadgets Go?,\" in Proceedings of the 33rd IEEE Symposium on Security and Privacy , 2012 . J. Hiser, A. Nguyen Tuong, M. Co, M. Hall, and J. W. Davidson, \"ILR: Where'd My Gadgets Go?,\" in Proceedings of the 33rd IEEE Symposium on Security and Privacy, 2012."},{"key":"e_1_3_2_1_37_1","volume-title":"Countering code-injection attacks with instruction-set randomization,\" in Proceedings of the 10th ACM conference on Computer and Communications Security","author":"Kc G. S.","year":"2003","unstructured":"G. S. Kc , A. D. Keromytis , and V. Prevelakis , \" Countering code-injection attacks with instruction-set randomization,\" in Proceedings of the 10th ACM conference on Computer and Communications Security , 2003 . G. S. Kc, A. D. Keromytis, and V. Prevelakis, \"Countering code-injection attacks with instruction-set randomization,\" in Proceedings of the 10th ACM conference on Computer and Communications Security, 2003."},{"key":"e_1_3_2_1_38_1","volume-title":"Smashing the gadgets: Hindering return-oriented programming using in-place code randomization,\" in Proceedings of the 33rd IEEE Symposium on Security and Privacy","author":"Pappas V.","year":"2012","unstructured":"V. Pappas , M. Polychronakis , and A. D. Keromytis , \" Smashing the gadgets: Hindering return-oriented programming using in-place code randomization,\" in Proceedings of the 33rd IEEE Symposium on Security and Privacy , 2012 . V. Pappas, M. Polychronakis, and A. D. Keromytis, \"Smashing the gadgets: Hindering return-oriented programming using in-place code randomization,\" in Proceedings of the 33rd IEEE Symposium on Security and Privacy, 2012."},{"key":"e_1_3_2_1_39_1","unstructured":"PaX Team \"PaX address space layout randomization \" 2003.  PaX Team \"PaX address space layout randomization \" 2003."},{"key":"e_1_3_2_1_40_1","volume-title":"Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.,\" in Proceedings of the 28th Annual Computer Security Applications Conference","author":"Shioji E.","year":"2012","unstructured":"E. Shioji , Y. Kawakoya , M. Iwamura , and T. Hariu , \" Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.,\" in Proceedings of the 28th Annual Computer Security Applications Conference , 2012 . E. Shioji, Y. Kawakoya, M. Iwamura, and T. Hariu, \"Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks.,\" in Proceedings of the 28th Annual Computer Security Applications Conference, 2012."},{"key":"e_1_3_2_1_41_1","volume-title":"Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code,\" in Proceedings of the 2012 ACM conference on Computer and Communications Security","author":"Wartell R.","year":"2012","unstructured":"R. Wartell , V. Mohan , K. W. Hamlen , and Z. Lin , \" Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code,\" in Proceedings of the 2012 ACM conference on Computer and Communications Security , 2012 . R. Wartell, V. Mohan, K. W. Hamlen, and Z. Lin, \"Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code,\" in Proceedings of the 2012 ACM conference on Computer and Communications Security, 2012."},{"key":"e_1_3_2_1_42_1","volume-title":"Surgically returning to randomized lib (c),\" in Proceedings of the 25th Annual Computer Security Applications Conference","author":"Roglia G. F.","year":"2009","unstructured":"G. F. Roglia , L. Martignoni , R. Paleari , and D. Bruschi , \" Surgically returning to randomized lib (c),\" in Proceedings of the 25th Annual Computer Security Applications Conference , 2009 . G. F. Roglia, L. Martignoni, R. Paleari, and D. Bruschi, \"Surgically returning to randomized lib (c),\" in Proceedings of the 25th Annual Computer Security Applications Conference, 2009."},{"key":"e_1_3_2_1_43_1","volume-title":"On the effectiveness of address-space randomization,\" in Proceedings of the 11th ACM conference on Computer and Communications Security","author":"Shacham H.","year":"2004","unstructured":"H. Shacham , M. Page , B. Pfaff , E.-J. Goh , N. Modadugu , and D. Boneh , \" On the effectiveness of address-space randomization,\" in Proceedings of the 11th ACM conference on Computer and Communications Security , 2004 . H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh, \"On the effectiveness of address-space randomization,\" in Proceedings of the 11th ACM conference on Computer and Communications Security, 2004."},{"key":"e_1_3_2_1_44_1","unstructured":"B.-J. Wever \"Internet Explorer IFRAME src&name parameter BoF remote compromise \" 2004.  B.-J. Wever \"Internet Explorer IFRAME src&name parameter BoF remote compromise \" 2004."},{"key":"e_1_3_2_1_45_1","volume-title":"On the effectiveness of fine-grained address space layout randomization,\" in Proceedings of the 34th IEEE Symposium on Security and Privacy","author":"Snow K. Z.","year":"2013","unstructured":"K. Z. Snow , F. Monrose , L. Davi , A. Dmitrienko , C. Liebchen , and A.-R. Sadeghi , \"Just-in-time code reuse : On the effectiveness of fine-grained address space layout randomization,\" in Proceedings of the 34th IEEE Symposium on Security and Privacy , 2013 . K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.-R. Sadeghi, \"Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization,\" in Proceedings of the 34th IEEE Symposium on Security and Privacy, 2013."},{"key":"e_1_3_2_1_46_1","volume-title":"July","author":"Bittau A.","year":"2014","unstructured":"A. Bittau , A. Belay , A. Mashtizadeh , D. Mazieres , and D. Boneh , \" Hacking Blind,\" in Security and Privacy , July 2014 . A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh, \"Hacking Blind,\" in Security and Privacy, July 2014."},{"key":"e_1_3_2_1_47_1","unstructured":"H. D. Moore \"Microsoft Internet Explorer data binding memory corruption \" 2010.  H. D. Moore \"Microsoft Internet Explorer data binding memory corruption \" 2010."},{"key":"e_1_3_2_1_48_1","unstructured":"Solar Designer \"Getting around non-executable stack (and fix) \" 1997.  Solar Designer \"Getting around non-executable stack (and fix) \" 1997."},{"key":"e_1_3_2_1_49_1","volume-title":"A Technical Review,\" tech. rep","author":"Kyriazia G.","year":"2012","unstructured":"G. Kyriazia , \" Heterogeneous Systems Architecture : A Technical Review,\" tech. rep ., 2012 . G. Kyriazia, \"Heterogeneous Systems Architecture: A Technical Review,\" tech. rep., 2012."},{"key":"e_1_3_2_1_50_1","volume-title":"June","author":"Putnam A.","year":"2014","unstructured":"A. Putnam , A. M. Caulfield , E. S. Chung , D. Chiou , K. Constantinides , J. Demme , H. Esmaeilzadeh , J. Fowers , G. P. Gopal , J. Gray , , \" A reconfigurable fabric for accelerating large-scale datacenter services,\" in Proceedings of the 41st International Symposium on Computer Architecture , June 2014 . A. Putnam, A. M. Caulfield, E. S. Chung, D. Chiou, K. Constantinides, J. Demme, H. Esmaeilzadeh, J. Fowers, G. P. Gopal, J. Gray, et al., \"A reconfigurable fabric for accelerating large-scale datacenter services,\" in Proceedings of the 41st International Symposium on Computer Architecture, June 2014."},{"key":"e_1_3_2_1_51_1","volume-title":"Texas Instruments","author":"Allred D.","year":"2010","unstructured":"D. Allred and G. Martinez , \" Maximizing the Power of ARM with DSP,\" tech. rep ., Texas Instruments , 2010 . D. Allred and G. Martinez, \"Maximizing the Power of ARM with DSP,\" tech. rep., Texas Instruments, 2010."},{"key":"e_1_3_2_1_52_1","volume-title":"Viper: A multiprocessor SoC for advanced set-top box and digital TV systems,\" Design & Test of Computers","author":"Dutta S.","unstructured":"S. Dutta , R. Jensen , and A. Rieckmann , \" Viper: A multiprocessor SoC for advanced set-top box and digital TV systems,\" Design & Test of Computers , IEEE , vol. 18 , no. 5, 2001. S. Dutta, R. Jensen, and A. Rieckmann, \"Viper: A multiprocessor SoC for advanced set-top box and digital TV systems,\" Design & Test of Computers, IEEE, vol. 18, no. 5, 2001."},{"key":"e_1_3_2_1_53_1","volume-title":"rep","author":"Network Processor Intel","year":"2006","unstructured":"\" Intel IXP425 Network Processor ,\" tech. rep ., 2006 . \"Intel IXP425 Network Processor,\" tech. rep., 2006."},{"key":"e_1_3_2_1_54_1","volume-title":"Oct.","author":"Processors Snapdragon","year":"2011","unstructured":"Qualcomm, \" Snapdragon S4 Processors : System on Chip Solutions for a New Mobile Age,\" tech. rep ., Oct. 2011 . Qualcomm, \"Snapdragon S4 Processors: System on Chip Solutions for a New Mobile Age,\" tech. rep., Oct. 2011."},{"key":"e_1_3_2_1_55_1","unstructured":"\"National Vulnerability Database \"  \"National Vulnerability Database \""},{"key":"e_1_3_2_1_56_1","volume-title":"Feb.","author":"Jang D.","year":"2014","unstructured":"D. Jang , Z. Tatlock , and S. Lerner , \" SAFEDISPATCH: Securing C++ virtual calls from memory corruption attacks,\" in Proceedings of the 21st International Symposium on Network and Distributed System Security , Feb. 2014 . D. Jang, Z. Tatlock, and S. Lerner, \"SAFEDISPATCH: Securing C++ virtual calls from memory corruption attacks,\" in Proceedings of the 21st International Symposium on Network and Distributed System Security, Feb. 2014."},{"key":"e_1_3_2_1_57_1","volume-title":"Q: Exploit Hardening Made Easy.,\" in Proceddings of the 20th USENIX Security Symposium","author":"Schwartz E. J.","year":"2011","unstructured":"E. J. Schwartz , T. Avgerinos , and D. Brumley , \" Q: Exploit Hardening Made Easy.,\" in Proceddings of the 20th USENIX Security Symposium , 2011 . E. J. Schwartz, T. Avgerinos, and D. Brumley, \"Q: Exploit Hardening Made Easy.,\" in Proceddings of the 20th USENIX Security Symposium, 2011."},{"key":"e_1_3_2_1_58_1","volume-title":"Keromytis, \"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing,\" in Proceedings of the 22nd USENIX Security Symposium","author":"Pappas Vasilis","year":"2013","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos D . Keromytis, \"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing,\" in Proceedings of the 22nd USENIX Security Symposium , 2013 . Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis, \"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing,\" in Proceedings of the 22nd USENIX Security Symposium, 2013."},{"key":"e_1_3_2_1_59_1","volume-title":"Protecting systems from stack smashing attacks with StackGuard,\" in Proceedings of the 5th Linux Expo","author":"Cowan C.","year":"1999","unstructured":"C. Cowan , S. Beattie , R. F. Day , C. Pu , P. Wagle , and E. Walthinsen , \" Protecting systems from stack smashing attacks with StackGuard,\" in Proceedings of the 5th Linux Expo , 1999 . C. Cowan, S. Beattie, R. F. Day, C. Pu, P. Wagle, and E. Walthinsen, \"Protecting systems from stack smashing attacks with StackGuard,\" in Proceedings of the 5th Linux Expo, 1999."},{"key":"e_1_3_2_1_60_1","author":"Ozdoganoglu H.","year":"2006","unstructured":"H. Ozdoganoglu , T. Vijaykumar , C. E. Brodley , B. A. Kuperman , and A. Jalote , \"SmashGuard: A hardware solution to prevent security attacks on the function return address,\" IEEE Transactions on Computers , 2006 . H. Ozdoganoglu, T. Vijaykumar, C. E. Brodley, B. A. Kuperman, and A. Jalote, \"SmashGuard: A hardware solution to prevent security attacks on the function return address,\" IEEE Transactions on Computers, 2006.","journal-title":"\"SmashGuard: A hardware solution to prevent security attacks on the function return address,\" IEEE Transactions on Computers"},{"key":"e_1_3_2_1_61_1","volume-title":"Secure program execution via dynamic information flow tracking,\" in Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Suh G. E.","year":"2004","unstructured":"G. E. Suh , J. W. Lee , D. Zhang , and S. Devadas , \" Secure program execution via dynamic information flow tracking,\" in Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems , 2004 . G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas, \"Secure program execution via dynamic information flow tracking,\" in Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, 2004."},{"key":"e_1_3_2_1_62_1","volume-title":"A Stack Smashing Technique Protection Tool for Linux","year":"2001","unstructured":"Vendicator, \"StackShield : A Stack Smashing Technique Protection Tool for Linux ,\" 2001 . Vendicator, \"StackShield: A Stack Smashing Technique Protection Tool for Linux,\" 2001."},{"key":"e_1_3_2_1_63_1","volume-title":"Missing the point (er): On the effectiveness of code pointer integrity1,\" in Proceedings of the 36th IEEE Symposium on Security and Privacy","author":"Evans I.","year":"2015","unstructured":"I. Evans , S. Fingeret , J. Gonzalez , U. Otgonbaatar , T. Tang , H. Shrobe , S. Sidiroglou-Douskos , M. Rinard , and H. Okhravi , \" Missing the point (er): On the effectiveness of code pointer integrity1,\" in Proceedings of the 36th IEEE Symposium on Security and Privacy , 2015 . I. Evans, S. Fingeret, J. Gonzalez, U. Otgonbaatar, T. Tang, H. Shrobe, S. Sidiroglou-Douskos, M. Rinard, and H. Okhravi, \"Missing the point (er): On the effectiveness of code pointer integrity1,\" in Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015."},{"key":"e_1_3_2_1_64_1","volume-title":"Control-flow bending: On the effectiveness of control-flow integrity,\" in Proceedings of the 24th USENIX Security Symposium","author":"Carlini N.","year":"2015","unstructured":"N. Carlini , A. Barresi , M. Payer , D. Wagner , and T. R. Gross , \" Control-flow bending: On the effectiveness of control-flow integrity,\" in Proceedings of the 24th USENIX Security Symposium , 2015 . N. Carlini, A. Barresi, M. Payer, D. Wagner, and T. R. Gross, \"Control-flow bending: On the effectiveness of control-flow integrity,\" in Proceedings of the 24th USENIX Security Symposium, 2015."},{"key":"e_1_3_2_1_65_1","volume-title":"May","author":"Goktas E.","year":"2014","unstructured":"E. Goktas , E. Athanasopoulos , H. Bos , and G. Portokalidis , \" Out of control: Overcoming control-flow integrity,\" in Proceedings of the 35th IEEE Symposium on Security and Privacy , May 2014 . E. Goktas, E. Athanasopoulos, H. Bos, and G. Portokalidis, \"Out of control: Overcoming control-flow integrity,\" in Proceedings of the 35th IEEE Symposium on Security and Privacy, May 2014."},{"key":"e_1_3_2_1_66_1","volume-title":"Aug.","author":"Goktas E.","year":"2014","unstructured":"E. Goktas , E. Athanasopoulos , M. Polychronakis , H. Bos , and G. Portokalidis , \" Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard,\" in Proceedings of the 23rd USENIX Security Symposium , Aug. 2014 . E. Goktas, E. Athanasopoulos, M. Polychronakis, H. Bos, and G. Portokalidis, \"Size does matter: Why using gadget-chain length to prevent code-reuse attacks is hard,\" in Proceedings of the 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_67_1","volume-title":"Aug.","author":"Carlini N.","year":"2014","unstructured":"N. Carlini and D. Wagner , \" Rop is still dangerous: Breaking modern defenses,\" in Proceedings of the 23rd USENIX Security Symposium , Aug. 2014 . N. Carlini and D. Wagner, \"Rop is still dangerous: Breaking modern defenses,\" in Proceedings of the 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_68_1","volume-title":"Aug","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi , Daniel Lehmann , and Ahmad-Reza Sadeghi , \" The Beast is in Your Memory : Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Te chniques,\" in BlackHat USA , Aug 2014 . Lucas Davi, Daniel Lehmann, and Ahmad-Reza Sadeghi, \"The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Te chniques,\" in BlackHat USA, Aug 2014."},{"key":"e_1_3_2_1_69_1","volume-title":"Aug.","author":"Davi L.","year":"2014","unstructured":"L. Davi , D. Lehmann , A.-R. Sadeghi , and F. Monrose , \" Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection,\" in Proceedings of the 23rd USENIX Security Symposium , Aug. 2014 . L. Davi, D. Lehmann, A.-R. Sadeghi, and F. Monrose, \"Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection,\" in Proceedings of the 23rd USENIX Security Symposium, Aug. 2014."},{"key":"e_1_3_2_1_70_1","volume-title":"Counterfeit object-oriented programming","author":"Schuster F.","year":"2015","unstructured":"F. Schuster , T. Tendyck , C. Liebchen , L. Davi , A.-R. Sadeghi , and T. Holz , \" Counterfeit object-oriented programming ,\" May 2015 . F. Schuster, T. Tendyck, C. Liebchen, L. Davi, A.-R. Sadeghi, and T. Holz, \"Counterfeit object-oriented programming,\" May 2015."},{"key":"e_1_3_2_1_71_1","volume-title":"Data space randomization,\" in Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Bhatkar S.","year":"2008","unstructured":"S. Bhatkar and R. Sekar , \" Data space randomization,\" in Detection of Intrusions and Malware, and Vulnerability Assessment , 2008 . S. Bhatkar and R. Sekar, \"Data space randomization,\" in Detection of Intrusions and Malware, and Vulnerability Assessment, 2008."},{"key":"e_1_3_2_1_73_1","volume-title":"G-Free: defeating return-oriented programming through gadget-less binaries,\" in Proceedings of the 26th Annual Computer Security Applications Conference","author":"Onarlioglu K.","year":"2010","unstructured":"K. Onarlioglu , L. Bilge , A. Lanzi , D. Balzarotti , and E. Kirda , \" G-Free: defeating return-oriented programming through gadget-less binaries,\" in Proceedings of the 26th Annual Computer Security Applications Conference , 2010 . K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, \"G-Free: defeating return-oriented programming through gadget-less binaries,\" in Proceedings of the 26th Annual Computer Security Applications Conference, 2010."},{"key":"e_1_3_2_1_74_1","volume-title":"ASIST: architectural support for instruction set randomization,\" in Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security","author":"Papadogiannakis A.","year":"2013","unstructured":"A. Papadogiannakis , L. Loutsis , V. Papaefstathiou , and S. Ioannidis , \" ASIST: architectural support for instruction set randomization,\" in Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security , 2013 . A. Papadogiannakis, L. Loutsis, V. Papaefstathiou, and S. Ioannidis, \"ASIST: architectural support for instruction set randomization,\" in Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, 2013."},{"key":"e_1_3_2_1_75_1","volume-title":"USA","author":"Rohlf C.","year":"2011","unstructured":"C. Rohlf and Y. Ivnitskiy , \" Attacking clientside JIT compilers,\" Black Hat , USA , 2011 . C. Rohlf and Y. Ivnitskiy, \"Attacking clientside JIT compilers,\" Black Hat, USA, 2011."},{"key":"e_1_3_2_1_76_1","volume-title":"Virtual Machines: Versatile Platforms for Systems and Processes","author":"Smith J.","year":"2005","unstructured":"J. Smith and R. Nair , Virtual Machines: Versatile Platforms for Systems and Processes . Morgan Kaufmann Publishers Inc ., June 2005 . J. Smith and R. Nair, Virtual Machines: Versatile Platforms for Systems and Processes. Morgan Kaufmann Publishers Inc., June 2005."},{"key":"e_1_3_2_1_77_1","volume-title":"Apr.","author":"Bellard F.","year":"2005","unstructured":"F. Bellard , \"Qemu , a fast and portable dynamic translator,\" in USENIX Technical Conference , Apr. 2005 . F. Bellard, \"Qemu, a fast and portable dynamic translator,\" in USENIX Technical Conference, Apr. 2005."},{"key":"e_1_3_2_1_78_1","unstructured":"MSDN \"Introduction to code signing \"  MSDN \"Introduction to code signing \""},{"key":"e_1_3_2_1_79_1","volume-title":"Language- independent sandboxing of just-in-time compilation and self- modifying code,\" ACM SIGPLAN Notices","author":"Ansel J.","year":"2011","unstructured":"J. Ansel , P. Marchenko , U. Erlingsson , E. Taylor , B. Chen , D. L. Schuff , D. Sehr , C. L. Biffle , and B. Yee , \" Language- independent sandboxing of just-in-time compilation and self- modifying code,\" ACM SIGPLAN Notices , 2011 . J. Ansel, P. Marchenko, U. Erlingsson, E. Taylor, B. Chen, D. L. Schuff, D. Sehr, C. L. Biffle, and B. Yee, \"Language- independent sandboxing of just-in-time compilation and self- modifying code,\" ACM SIGPLAN Notices, 2011."},{"key":"e_1_3_2_1_80_1","unstructured":"Intel \"Software guard extensions programming reference \" 2014.  Intel \"Software guard extensions programming reference \" 2014."},{"key":"e_1_3_2_1_81_1","volume-title":"ROPecker: A generic and practical approach for defending against ROP attacks,\" in Symposium on Network and Distributed System Security (NDSS)","author":"Cheng Y.","year":"2014","unstructured":"Y. Cheng , Z. Zhou , M. Yu , X. Ding , and R. H. Deng , \" ROPecker: A generic and practical approach for defending against ROP attacks,\" in Symposium on Network and Distributed System Security (NDSS) , 2014 . Y. Cheng, Z. Zhou, M. Yu, X. Ding, and R. H. Deng, \"ROPecker: A generic and practical approach for defending against ROP attacks,\" in Symposium on Network and Distributed System Security (NDSS), 2014."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2006.82"},{"key":"e_1_3_2_1_83_1","volume-title":"Oct.","author":"Sherwood T.","year":"2002","unstructured":"T. Sherwood , E. Perelman , G. Hamerly , and B. Calder , \" Automatically Characterizing Large Scale Program Behavior,\" in Proceedings of the 7th International Conference on Architectural Support for Programming Languages and Operating Systems , Oct. 2002 . T. Sherwood, E. Perelman, G. Hamerly, and B. Calder, \"Automatically Characterizing Large Scale Program Behavior,\" in Proceedings of the 7th International Conference on Architectural Support for Programming Languages and Operating Systems, Oct. 2002."},{"key":"e_1_3_2_1_84_1","volume-title":"Binary Translation driven Program State Relocation,\" in United States Patent Grant US009135435B2","author":"Venkat A.","year":"2015","unstructured":"A. Venkat , A. Krishnaswamy , K. Yamada , and R. Palanivel , \" Binary Translation driven Program State Relocation,\" in United States Patent Grant US009135435B2 , 2015 . A. Venkat, A. Krishnaswamy, K. Yamada, and R. Palanivel, \"Binary Translation driven Program State Relocation,\" in United States Patent Grant US009135435B2, 2015."}],"event":{"name":"ASPLOS '16: Architectural Support for Programming Languages and Operating Systems","location":"Atlanta Georgia USA","acronym":"ASPLOS '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872408","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2872362.2872408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:39:04Z","timestamp":1750207144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2872362.2872408"}},"subtitle":["Heterogeneous-ISA Program State Relocation"],"short-title":[],"issued":{"date-parts":[[2016,3,25]]},"references-count":83,"alternative-id":["10.1145\/2872362.2872408","10.1145\/2872362"],"URL":"https:\/\/doi.org\/10.1145\/2872362.2872408","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2954679.2872408","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2980024.2872408","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,3,25]]},"assertion":[{"value":"2016-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}