{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:13:19Z","timestamp":1771701199831,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134026","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1675-1689","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["The Dynamics of Innocent Flesh on the Bone"],"prefix":"10.1145","author":[{"given":"Victor","family":"van der Veen","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Dennis","family":"Andriesse","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Manolis","family":"Stamatogiannakis","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Xi","family":"Chen","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam &amp; Microsoft, Amsterdam, Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Cristiano","family":"Giuffrdia","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","unstructured":"Mart\u00edn Abadi Mihai Budiu \u00dalfar Erlingsson and Jay Ligatti 2005. Control-Flow Integrity. In CCS. 10.1145\/1102120.1102165","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_2_2_1","volume-title":"Data Execution Prevention.","author":"Andersen S.","year":"2004","unstructured":"S. Andersen and V. Abella. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, Data Execution Prevention. (2004). http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Michael Backes Thorsten Holz Benjamin Kollenda Philipp Koppe Stefan N\u00fcrnberger and Jannik Pewny 2014. You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code CCS.","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_2_4_1","unstructured":"Michael Backes and Stefan N\u00fcrnberger 2014. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing USENIX SEC."},{"key":"e_1_3_2_2_5_1","volume-title":"Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits USENIX SEC.","author":"Bhatkar Sandeep","year":"2003","unstructured":"Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. 2003. Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits USENIX SEC."},{"key":"e_1_3_2_2_6_1","unstructured":"Sandeep Bhatkar Daniel C. DuVarney and R. Sekar. 2005. Efficient Techniques for Comprehensive Protection from Memory Error Exploits USENIX SEC."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"crossref","unstructured":"David Bigelow Thomas Hobson Robert Rudd William Streilein and Hamed Okhravi 2015. Timely Rerandomization for Mitigating Memory Disclosures CCS.","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Andrea Bittau Adam Belay Ali Mashtizadeh David Mazi\u00e8res and Dan Boneh. 2014. Hacking Blind S&P.","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Tyler Bletsch Xuxian Jiang Vince W. Freeh and Zhenkai Liang 2011. Jump-Oriented Programming: A New Class of Code-Reuse Attack ASIACCS.","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Erik Bosman and Herbert Bos 2014. Framing Signals--A Return to Portable Shellcode S&P.","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Erik Bosman Kaveh Razavi Herbert Bos and Cristiano Giuffrida 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector S&P.","DOI":"10.1109\/SP.2016.63"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Kjell Braden Stephen Crane Lucas Davi Michael Franz Per Larsen Christopher Liebchen and Ahmad-Reza Sadeghi 2016. Leakage-Resilient Layout Randomization for Mobile Devices NDSS.","DOI":"10.14722\/ndss.2016.23364"},{"key":"e_1_3_2_2_13_1","volume-title":"Gross","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity USENIX SEC."},{"key":"e_1_3_2_2_14_1","unstructured":"Nicholas Carlini and David Wagner 2014. ROP is Still Dangerous: Breaking Modern Defenses USENIX SEC."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Xi Chen Herbert Bos and Cristiano Giuffrida. 2017. CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks EuroS&P.","DOI":"10.1109\/EuroSP.2017.17"},{"key":"e_1_3_2_2_16_1","volume-title":"Deng","author":"Cheng Yueqiang","year":"2014","unstructured":"Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, and Robert H. Deng 2014. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks NDSS."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"crossref","unstructured":"Mauro Conti Stephen Crane Tommaso Frassetto Andrei Homescu Georg Koppen Per Larsen Christopher Liebchen Mike Perry and Ahmad-Reza Sadeghi 2016. Selfrando: Securing the Tor Browser against De-anonymization Exploits PETS.","DOI":"10.1515\/popets-2016-0050"},{"key":"e_1_3_2_2_18_1","volume-title":"Code Randomization: Haven't We Solved This Problem Yet? SecDev.","author":"Crane Stephen","year":"2016","unstructured":"Stephen Crane, Andrei Homescu, and Per Larsen. 2016. Code Randomization: Haven't We Solved This Problem Yet? SecDev."},{"key":"e_1_3_2_2_19_1","volume-title":"Readactor: Practical Code Randomization Resilient to Memory Disclosure S&P.","author":"Crane Stephen","year":"2015","unstructured":"Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stephan Brunthaler, and Michael Franz. 2015. Readactor: Practical Code Randomization Resilient to Memory Disclosure S&P."},{"key":"e_1_3_2_2_20_1","volume-title":"Bjorn De Sutter, and Michael Franz","author":"Crane Stephen","year":"2015","unstructured":"Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz, Bjorn De Sutter, and Michael Franz. 2015. It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks CCS."},{"key":"e_1_3_2_2_21_1","unstructured":"Thurston H.Y. Dang Petros Maniatis and David Wagner. 2015. The Performance Cost of Shadow Stacks and Stack Canaries ASIACCS."},{"key":"e_1_3_2_2_22_1","volume-title":"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming NDSS.","author":"Davi Lucas","year":"2015","unstructured":"Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, and Fabian Monrose. 2015. Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming NDSS."},{"key":"e_1_3_2_2_23_1","unstructured":"Lucas Davi Ahmad-Reza Sadeghi Daniel Lehmann and Fabian Monrose 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX SEC."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Lucas Davi Ahmad-Reza Sadeghi and Marcel Winandy. 2009. Dynamic Integrity Measurement and Attestation: Towards Defense Against Return-oriented Programming Attacks. In ACM STC.","DOI":"10.1145\/1655108.1655117"},{"key":"e_1_3_2_2_25_1","volume-title":"Return-to-libc attack. BugTraq. (Aug","author":"Designer Solar","year":"1997","unstructured":"Solar Designer. Return-to-libc attack. BugTraq. (Aug. 1997)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Isaac Evans Sam Fingeret Julian Gonzalez Ulziibayar Otgonbaatar Tiffany Tang Howard Shrobe Stelios Sidiroglou-Douskos Martin Rinard and Hamed Okhravi. 2015. Missing the Point(er): On the Effectiveness of Code Pointer Integrity S&P.","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_2_28_1","unstructured":"Xinyang Ge Weidong Cui and Trent Jaeger 2017. GRIFFIN: Guarding Control Flows Using Intel Processor Trace ASPLOS."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Jason Gionta William Enck and Per Larsen 2016. Preventing Kernel Code-Reuse Attacks Through Disclosure Resistant Code Diversification CNS.","DOI":"10.1109\/CNS.2016.7860485"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","unstructured":"Jason Gionta William Enck and Peng Ning 2015. HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. In CODASPY. 10.1145\/2699026.2699107","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_2_2_31_1","volume-title":"Tanenbaum","author":"Giuffrida Cristiano","year":"2012","unstructured":"Cristiano Giuffrida, Anton Kuijsten, and Andrew S. Tanenbaum. 2012. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. In USENIX SEC."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"Enes Goktas Elias Athanasopoulos Herbert Bos and Georgios Portokalidis 2014. Out Of Control: Overcoming Control-Flow Integrity. S&P.","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_2_33_1","unstructured":"Enes Goktas Elias Athanasopoulos Michalis Polychronakis Herbert Bos and Georgios Portokalidis 2014. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard USENIX SEC."},{"key":"e_1_3_2_2_34_1","unstructured":"Yufei Gu Qingchuan Zhao Yinqian Zhang and Zhiqiang Lin. 2017. PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace CODASPY."},{"key":"e_1_3_2_2_35_1","volume-title":"Davidson","author":"Hiser Jason","year":"2012","unstructured":"Jason Hiser, Anh Nguyen-Tuong, Michele Co, Matthew Hall, and Jack W. Davidson 2012. ILR: Where'D My Gadgets Go?. In S&P."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","unstructured":"Andrei Homescu Steven Neisius Per Larsen Stefan Brunthaler and Michael Franz 2013. Profile-guided Automated Software Diversity. In CGO. 10.1109\/CGO.2013.6494997","DOI":"10.1109\/CGO.2013.6494997"},{"key":"e_1_3_2_2_37_1","volume-title":"Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang","author":"Hu Hong","year":"2015","unstructured":"Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang 2015. Automatic Generation of Data-Oriented Exploits. In USENIX SEC."},{"key":"e_1_3_2_2_38_1","volume-title":"Prateek Saxena, and Zhenkai Liang.","author":"Hu Hong","year":"2016","unstructured":"Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks S&P."},{"key":"e_1_3_2_2_39_1","volume-title":"Keromytis","author":"Kemerlis Vasileios P.","year":"2012","unstructured":"Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos D. Keromytis. 2012. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems VEE."},{"key":"e_1_3_2_2_40_1","unstructured":"Chongkyung Kil Jinsuk Jun Christopher Bookholt Jun Xu and Peng Ning 2006. Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. In ACSAC."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"crossref","unstructured":"Koen Koning Herbert Bos and Cristiano Giuffrida. 2016. Secure and Efficient Multi-Variant Execution Using Hardware-assisted Process Virtualization DSN.","DOI":"10.1109\/DSN.2016.46"},{"key":"e_1_3_2_2_42_1","unstructured":"Hyungjoon Koo and Michalis Polychronakis 2016. Juggling the Gadgets: Binary-level Code Randomization Using Instruction Displacement ASIACCS."},{"key":"e_1_3_2_2_43_1","unstructured":"Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R. Sekar and Dawn Song 2014. Code-Pointer Integrity. In OSDI."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Yutao Liu Peitao Shi Xinran Wang Haibo Chen Binyu Zang and Haibing Guan. 2017. Transparent and Efficient CFI Enforcement with Intel Processor Trace HPCA.","DOI":"10.1109\/HPCA.2017.18"},{"key":"e_1_3_2_2_45_1","unstructured":"Kangjie Lu Stefan N\u00fcrnberger Michael Backes and Wenke Lee 2016. How to make ASLR win the Clone Wars: Runtime Re-Randomization NDSS."},{"key":"e_1_3_2_2_46_1","unstructured":"Kangjie Lu Chengyu Song Byoungyoung Lee Simon P. Chung Taesoo Kim and Wenke Lee. 2015. ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks CCS."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"crossref","unstructured":"Ali Jose Mashtizadeh Andrea Bittau Dan Boneh and David Mazi\u00e8res 2015. CCFI: Cryptographically Enforced Control Flow Integrity CCS.","DOI":"10.1145\/2810103.2813676"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"crossref","unstructured":"Santosh Nagarakatte Jianzhou Zhao Milo M.K. Martin and Steve Zdancewic 2009. SoftBound: Highly Compatible and Complete Spatial Memory Safety for C PLDI.","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","unstructured":"Santosh Nagarakatte Jianzhou Zhao Milo M.K. Martin and Steve Zdancewic 2010. CETS: Compiler Enforced Temporal Safety for C. ISMM. 10.1145\/1806651.1806657","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"crossref","unstructured":"Ben Niu and Gang Tan. 2014. Modular Control-Flow Integrity. In PLDI.","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"crossref","unstructured":"Ben Niu and Gang Tan. 2015. Per-Input Control-Flow Integrity. In CCS.","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_2_52_1","unstructured":"Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida 2016. Poking Holes in Information Hiding. In USENIX SEC."},{"key":"e_1_3_2_2_53_1","volume-title":"Keromytis","author":"Pappas Vasilis","year":"2012","unstructured":"Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. 2012. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization S&P."},{"key":"e_1_3_2_2_54_1","volume-title":"Keromytis","author":"Pappas Vasilis","year":"2013","unstructured":"Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing USENIX SEC."},{"key":"e_1_3_2_2_55_1","unstructured":"PaX Team. Address Space Layout Randomization (ASLR). (2003). pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_2_56_1","volume-title":"Kemerlis","author":"Pomonis Marios","year":"2017","unstructured":"Marios Pomonis, Theofilos Petsios, Angelos D. Keromytis, Michalis Polychronakis, and Vasileios P. Kemerlis. 2017. kR X: Comprehensive Kernel Protection against Just-In-Time Code Reuse EuroSys."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"crossref","unstructured":"Robert Rudd Richard Skowyra David Bigelow Veer Dedhia Thomas Hobson Stephen Crane Christopher Liebchen Per Larsen Lucas Davi Michael Franz Ahmad-Reza Sadeghi and Hamed Okhravi. 2017. Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity NDSS.","DOI":"10.14722\/ndss.2017.23477"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"crossref","unstructured":"Felix Schuster Thomas Tendyck Christopher Liebchen Lucas Davi Ahmad-Reza Sadeghi and Thorsten Holz 2015. Counterfeit Object-Oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C Applications. In S&P.","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_2_60_1","unstructured":"Edward J. Schwartz Thanassis Avgerinos and David Brumley 2011. Q: Exploit Hardening Made Easy. In USENIX SEC."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"crossref","unstructured":"Jeff Seibert Hamed Okhravi and Eric S\u00f6derstr\u00f6m. 2014. Information Leaks Without Memory Disclosures: Remote Side Channel Attacks on Diversified Code CCS.","DOI":"10.1145\/2660267.2660309"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"crossref","unstructured":"Hovav Shacham. 2007. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In CCS.","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"crossref","unstructured":"Kevin Z. Snow Fabian Monrose Lucas Davi Alexandra Dmitrienko Christopher Liebchen and Ahmad-Reza Sadeghi 2013. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. In S&P.","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_2_64_1","unstructured":"Mingshen Sun John C. S. Lui and Yajin Zhou 2016. Blender: Self-Randomizing Address Space Layout for Android Apps RAID."},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_2_66_1","unstructured":"Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM USENIX SEC."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","unstructured":"Victor van der Veen Dennis Andriesse Enes Goktas Ben Gras Lionel Sambuc Asia Slowinska Herbert Bos and Cristiano Giuffrida 2015. Practical Context-sensitive CFI. In CCS. 10.1145\/2810103.2813673","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"crossref","unstructured":"Victor van der Veen Enes G\u00f6ktacs Moritz Contag Andre Pawloski Xi Chen Sanjay Rawat Herbert Bos Thorsten Holz Elias Athanasopoulos and Cristiano Giuffrida. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks At The Binary Level S&P.","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Stijn Volckaert Bart Coppens and Bjorn de Sutter. 2015. Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution TDSC.","DOI":"10.1109\/TDSC.2015.2411254"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"crossref","unstructured":"Zhe Wang Chenggang Wu Jianjun Li Yuanming Lai Xiangyu Zhang Wei-Chung Hsu and Yueqiang Cheng 2017. ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks VEE.","DOI":"10.1145\/3050748.3050752"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"crossref","unstructured":"Richard Wartell Vishwath Mohan Kevin W. Hamlen and Zhiqiang Lin 2012. Binary Stirring: Self-Randomizing Instruction Addresses of Legacy x86 Binary Code CCS.","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"crossref","unstructured":"Jan Werner George Baltas Rob Dallara Nathan Otterness Kevin Z. Snow Fabian Monrose and Michalis Polychronakis 2016. No-Execute-After-Read: Preventing Code Disclosure in Commodity Software ASIACCS.","DOI":"10.1145\/2897845.2897891"},{"key":"e_1_3_2_2_73_1","unstructured":"David Williams-King Graham Gobieski Kent Williams-King James P Blake Xinhao Yuan Patrick Colp Michelle Zheng Vasileios P. Kemerlis Junfeng Yang and William Aiello 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization OSDI."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"crossref","unstructured":"Chao Zhang Tao Wei Zhaofeng Chen Lei Duan Laszlo Szekeres Stephen McCamant Dawn Song and Wei Zou. 2013. Practical Control Flow Integrity and Randomization for Binary Executables S&P.","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_2_75_1","unstructured":"Mingwei Zhang and R. Sekar 2013. Control Flow Integrity for COTS Binaries. In USENIX SEC."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134026","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134026","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:02Z","timestamp":1750212662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134026"}},"subtitle":["Code Reuse Ten Years Later"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":75,"alternative-id":["10.1145\/3133956.3134026","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134026","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}