{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:37Z","timestamp":1763468317321,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T00:00:00Z","timestamp":1496102400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1127361, 1421703"],"award-info":[{"award-number":["1127361, 1421703"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2897845.2897891","type":"proceedings-article","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T08:37:36Z","timestamp":1464338256000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["No-Execute-After-Read"],"prefix":"10.1145","author":[{"given":"Jan","family":"Werner","sequence":"first","affiliation":[{"name":"RENCI, Chapel Hill, NC, USA"}]},{"given":"George","family":"Baltas","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]},{"given":"Rob","family":"Dallara","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]},{"given":"Nathan","family":"Otterness","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]},{"given":"Kevin Z.","family":"Snow","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]},{"given":"Fabian","family":"Monrose","sequence":"additional","affiliation":[{"name":"University of North Carolina, Chapel Hill, NC, USA"}]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","unstructured":"ARM Cortex-A57 MPCore Processor Technical Reference Manual ARM 2013."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671253"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_6_1","volume-title":"Pointer inference and jit spraying,\" in Black Hat DC","author":"Blazakis D.","year":"2010","unstructured":"D. Blazakis, \"Interpreter exploitation: Pointer inference and jit spraying,\" in Black Hat DC, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_8_1","volume-title":"Exoshim: Preventing memory disclosure using execute-only kernel code,\" in International Conference on Cyber Warfare and Security","author":"Brookes S.","year":"2016","unstructured":"S. Brookes, R. Denz, M. Osterloh, and S. Taylor, \"Exoshim: Preventing memory disclosure using execute-only kernel code,\" in International Conference on Cyber Warfare and Security, 2016."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831154"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_11_1","first-page":"142","article-title":"JITDefender: A defense against jit spraying attacks","author":"Chen P.","year":"2011","unstructured":"P. Chen, Y. Fang, B. Mao, and L. Xie, \"JITDefender: A defense against jit spraying attacks,\" in IFIP International Information Security Conference, 2011, pp. 142--153.","journal-title":"IFIP International Information Security Conference"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_13_1","volume-title":"Isomeron: Code randomization resilient to (just-in-time) return-oriented programming,\" in Symposium on Network and Distributed System Security","author":"Davi L.","year":"2015","unstructured":"L. Davi, C. Liebchen, A.-R. Sadeghi, K. Z. Snow, and F. Monrose, \"Isomeron: Code randomization resilient to (just-in-time) return-oriented programming,\" in Symposium on Network and Distributed System Security, 2015."},{"key":"e_1_3_2_1_14_1","unstructured":"S. Designer \"return-to-libc attack \" Bugtraq Aug 1997."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362833"},{"key":"e_1_3_2_1_19_1","volume-title":"Memory protection keys","author":"Hansen D.","year":"2015","unstructured":"D. Hansen, \"{RFC} x86: Memory protection keys,\" 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"volume-title":"Intel","year":"2015","key":"e_1_3_2_1_22_1","unstructured":"Best Practices for Paravirtualization Enhancements from Intel Virtualization Technology: EPT and VT-d, Intel, 2015."},{"key":"e_1_3_2_1_23_1","volume-title":"Intel","author":"Architectures Software Developer's Manual R","year":"2015","unstructured":"Intel R 64 and IA-32 Architectures Software Developer's Manual: Combined Volumes 1, 2A, 2B, 2C, 3A, 3B and 3C, Intel, 2015."},{"key":"e_1_3_2_1_24_1","unstructured":"Intel VTune Amplifier 2016 Intel 2015."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_27_1","volume-title":"Attacking clientside JIT compilers,\" in Black Hat USA","author":"Rohlf C.","year":"2011","unstructured":"C. Rohlf and Y. Ivnitskiy, \"Attacking clientside JIT compilers,\" in Black Hat USA, 2011."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_29_1","unstructured":"F. J. Serna \"The info leak era on software exploitation \" in Black Hat USA 2012."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831182"},{"key":"e_1_3_2_1_33_1","volume-title":"Return to the zombie gadgets: Undermining destructive code reads via code inference attacks,\" in IEEE Symposium on Security and Privacy","author":"Snow K.","year":"2016","unstructured":"K. Snow, R. Rogowski, J. Werner, H. Koo, F. Monrose, and M. Polychronakis, \"Return to the zombie gadgets: Undermining destructive code reads via code inference attacks,\" in IEEE Symposium on Security and Privacy, 2016."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_35_1","volume-title":"Bypassing browser memory protections in Windows Vista","author":"Sotirov A.","year":"2008","unstructured":"A. Sotirov and M. Dowd, \"Bypassing browser memory protections in Windows Vista,\" 2008."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_1_38_1","unstructured":"P. Team \"Pax address space layout randomization (aslr) \" Sep. 2015."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2034161.2034196"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897891","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897891","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2897845.2897891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:19:51Z","timestamp":1763457591000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2897845.2897891"}},"subtitle":["Preventing Code Disclosure in Commodity Software"],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":41,"alternative-id":["10.1145\/2897845.2897891","10.1145\/2897845"],"URL":"https:\/\/doi.org\/10.1145\/2897845.2897891","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}