{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:35:53Z","timestamp":1775745353235,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,28]],"date-time":"2016-10-28T00:00:00Z","timestamp":1477612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,28]]},"DOI":"10.1145\/2995306.2995309","type":"proceedings-article","created":{"date-parts":[[2016,10,27]],"date-time":"2016-10-27T13:53:40Z","timestamp":1477576420000},"page":"15-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ROP Gadget Prevalence and Survival under Compiler-based Binary Diversification Schemes"],"prefix":"10.1145","author":[{"given":"Joel","family":"Coffman","sequence":"first","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory, Laurel, MD, USA"}]},{"given":"Daniel M.","family":"Kelly","sequence":"additional","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory, Laurel, MD, USA"}]},{"given":"Christopher C.","family":"Wellons","sequence":"additional","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory, Laurel, MD, USA"}]},{"given":"Andrew S.","family":"Gearhart","sequence":"additional","affiliation":[{"name":"Johns Hopkins University Applied Physics Laboratory, Laurel, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1988.5291"},{"key":"e_1_3_2_1_2_1","first-page":"23","volume-title":"Software Fault Tolerance","author":"A. A.","year":"1995","unstructured":"A. A. Avi\\vzienis. The Methodology of N-Version Programming . In M. R. Lyu, editor, Software Fault Tolerance , chapter 2, pages 23 -- 46 . John Wiley & Son Inc ., 1995 . A. A. Avi\\vzienis. The Methodology of N-Version Programming. In M. R. Lyu, editor, Software Fault Tolerance, chapter 2, pages 23--46. John Wiley & Son Inc., 1995."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/30401.315746"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2400682.2400683"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484351"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900550"},{"key":"e_1_3_2_1_16_1","volume-title":"Cyber Insecurity: The Cost of Monopoly. Technical report","author":"Geer D.","year":"2003","unstructured":"D. Geer , R. Bace , P. Gutmann , P. Metzger , C. P. Pfleeger , J. S. Quarterman , and B. Schneier . Cyber Insecurity: The Cost of Monopoly. Technical report , Computer & Communications Industry Association , September 2003 . D. Geer, R. Bace, P. Gutmann, P. Metzger, C. P. Pfleeger, J. S. Quarterman, and B. Schneier. Cyber Insecurity: The Cost of Monopoly. Technical report, Computer & Communications Industry Association, September 2003."},{"key":"e_1_3_2_1_17_1","volume-title":"Defense Science Board","author":"Gosler J. R.","year":"2013","unstructured":"J. R. Gosler and L. Von Thaer . Resilient Military Systems and the Advanced Cyber Threat. Technical report , Defense Science Board , January 2013 . J. R. Gosler and L. Von Thaer. Resilient Military Systems and the Advanced Cyber Threat. Technical report, Defense Science Board, January 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2013.6494997"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007626510002"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821429.2821434"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_22_1","first-page":"5","article-title":"La Cryptographie Militaire","author":"Kerckhoffs A.","year":"1883","unstructured":"A. Kerckhoffs . La Cryptographie Militaire . Journal des Sciences Militaires , IX : 5 -- 38 , January 1883 . A. Kerckhoffs. La Cryptographie Militaire. Journal des Sciences Militaires, IX:5--38, January 1883.","journal-title":"Journal des Sciences Militaires"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.129"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_26_1","first-page":"3","article-title":"Obfuscating C+ Programs via Control Flow Flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae","volume":"30","author":"L\u00e1szl\u00f3 T.","year":"2009","unstructured":"T. L\u00e1szl\u00f3 and \u00c1. Kiss . Obfuscating C+ Programs via Control Flow Flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae , Sectio Computatorica , 30 : 3 -- 19 , 2009 . T. L\u00e1szl\u00f3 and \u00c1. Kiss. Obfuscating C+ Programs via Control Flow Flattening. Annales Universitatis Scientarum Budapestinensis de Rolando E\u00f6tv\u00f6s Nominatae, Sectio Computatorica, 30:3--19, 2009.","journal-title":"Sectio Computatorica"},{"key":"e_1_3_2_1_27_1","first-page":"75","volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In International Symposium on Code Generation and Optimization, CGO 2004","author":"Lattner C.","year":"2004","unstructured":"C. Lattner and V. Adve . LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In International Symposium on Code Generation and Optimization, CGO 2004 , pages 75 -- 86 , March 2004 . C. Lattner and V. Adve. LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In International Symposium on Code Generation and Optimization, CGO 2004, pages 75--86, March 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146276"},{"key":"e_1_3_2_1_29_1","first-page":"28","volume-title":"Binary code obfuscation through C+ template metaprogramming","author":"Neves S.","year":"2012","unstructured":"S. Neves and F. Araujo . Binary code obfuscation through C+ template metaprogramming . In A. Lopes and J. O. Pereira, editors, INForum 2012 , pages 28 -- 40 , September 2012. S. Neves and F. Araujo. Binary code obfuscation through C+ template metaprogramming. In A. Lopes and J. O. Pereira, editors, INForum 2012, pages 28--40, September 2012."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516670"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920268"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security Symposium","author":"Schwartz E. J.","year":"2011","unstructured":"E. J. Schwartz , T. Avgerinos , and D. Brumley . Q: Exploit Hardening Made Easy . In USENIX Security Symposium , August 2011 . E. J. Schwartz, T. Avgerinos, and D. Brumley. Q: Exploit Hardening Made Easy. In USENIX Security Symposium, August 2011."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_36_1","series-title":"Monographs on Statistics and Applied Probability","volume-title":"Density Estimation for Statistics and Data Analysis","author":"Silverman B. W.","year":"1986","unstructured":"B. W. Silverman . Density Estimation for Statistics and Data Analysis , volume 26 of Monographs on Statistics and Applied Probability . Chapman and Hall , London , 1986 . B. W. Silverman. Density Estimation for Statistics and Data Analysis, volume 26 of Monographs on Statistics and Applied Probability. Chapman and Hall, London, 1986."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146273"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM Workshop on Software PROtection"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2995306.2995309","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2995306.2995309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:24Z","timestamp":1750273524000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2995306.2995309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,28]]},"references-count":40,"alternative-id":["10.1145\/2995306.2995309","10.1145\/2995306"],"URL":"https:\/\/doi.org\/10.1145\/2995306.2995309","relation":{},"subject":[],"published":{"date-parts":[[2016,10,28]]},"assertion":[{"value":"2016-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}