{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T16:58:31Z","timestamp":1774717111179,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,24]],"date-time":"2017-10-24T00:00:00Z","timestamp":1508803200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA Transparent Computing program","award":["DARPA-15-15-TC-FP-006"],"award-info":[{"award-number":["DARPA-15-15-TC-FP-006"]}]},{"name":"United States Air Force","award":["FA8650-10-C-7025"],"award-info":[{"award-number":["FA8650-10-C-7025"]}]},{"name":"ONR","award":["N000140911042 and N000141512162"],"award-info":[{"award-number":["N000140911042 and N000141512162"]}]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1017265 CNS-0831300 CNS-1149051 CNS-1563848 and DGE-15000"],"award-info":[{"award-number":["CNS-1017265 CNS-0831300 CNS-1149051 CNS-1563848 and DGE-15000"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DHS","award":["N66001-12-C-0133"],"award-info":[{"award-number":["N66001-12-C-0133"]}]},{"name":"ETRI","award":["MSIP\/IITP[B0101-15-0644]"],"award-info":[{"award-number":["MSIP\/IITP[B0101-15-0644]"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978366","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T08:46:35Z","timestamp":1477385195000},"page":"920-932","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["UniSan"],"prefix":"10.1145","author":[{"given":"Kangjie","family":"Lu","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"LLVM Classes Definition 2016. http:\/\/llvm.org\/docs\/doxygen\/html\/annotated.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929836"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217943"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2190025.2190067"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103805"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23248"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251398.1251420"},{"key":"e_1_3_2_1_9_1","volume-title":"Kernel address space layout randomization","author":"Cook K.","year":"2013","unstructured":"K. Cook. Kernel address space layout randomization, 2013.URLhttp:\/\/outflux.net\/slides\/2013\/lss\/kaslr.pdf."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267549.1267554"},{"key":"e_1_3_2_1_11_1","volume-title":"Vulnerabilities By Type","author":"Details C.","year":"2016","unstructured":"C. Details. Vulnerabilities By Type, 2016. http:\/\/www.cvedetails.com\/vulnerabilities-by-types.php."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133999"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2387880.2387887"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924954"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512563"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250767"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362832"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671286"},{"key":"e_1_3_2_1_19_1","volume-title":"CVE-2013--1825: various info leaks in Linux kernel","author":"Krause M.","year":"2013","unstructured":"M. Krause. CVE-2013--1825: various info leaks in Linux kernel, 2013.URLhttp:\/\/www.openwall.com\/lists\/oss-security\/2013\/03\/07\/2."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660331"},{"key":"e_1_3_2_1_21_1","volume-title":"LLVM Alias Analysis Infrastructure","author":"LLVM.","year":"2016","unstructured":"LLVM. LLVM Alias Analysis Infrastructure, 2016. http:\/\/llvm.org\/docs\/AliasAnalysis.html."},{"key":"e_1_3_2_1_22_1","unstructured":"LLVM. The LLVM Compiler Infrastructure 2016. http:\/\/llvm.org\/."},{"key":"e_1_3_2_1_23_1","volume-title":"The LLVMLinux Project","year":"2016","unstructured":"LLVMLinux. The LLVMLinux Project, 2016. http:\/\/llvm.linuxfoundation.org\/index.php\/Main_Page."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1268299.1268322"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815422"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544137.2544147"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_31_1","unstructured":"V. Nossum. Getting Started With kmemcheck 2015. https:\/\/www.kernel.org\/doc\/Documentation\/kmemcheck.txt."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07995-0_32"},{"key":"e_1_3_2_1_33_1","volume-title":"Data alignment: Straighten up and fly right -- Align your data for speed and correctness","author":"Rentzsch J.","year":"2005","unstructured":"J. Rentzsch. Data alignment: Straighten up and fly right -- Align your data for speed and correctness, 2005.URLhttps:\/\/www.ibm.com\/developerworks\/library\/pa-dalign\/pa-dalign-pdf.pdf."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342821.2342849"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247362"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2015.7054186"},{"key":"e_1_3_2_1_40_1","unstructured":"P. Team. PaX - gcc plugins galore 2013.URLhttps:\/\/pax.grsecurity.net\/docs\/PaXTeam-H2HC13-PaX-gcc-plugins.pdf."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671285"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2349896.2349905"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2387880.2387897"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544154"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978366","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978366","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978366","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:23:43Z","timestamp":1763457823000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978366"}},"subtitle":["Proactive Kernel Memory Initialization to Eliminate Data Leakages"],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":44,"alternative-id":["10.1145\/2976749.2978366","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978366","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}