{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:19:00Z","timestamp":1759033140644,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2011, N00014-17-1-2897, N00014-15-1-2948"],"award-info":[{"award-number":["N00014-17-1-2011, N00014-17-1-2897, N00014-15-1-2948"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134611","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"141-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Piston"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Salls","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Yan","family":"Shoshitaishvili","sequence":"additional","affiliation":[{"name":"Arizona State University"}]},{"given":"Nick","family":"Stephens","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cve-2013-2028 advisory. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-2028.  Cve-2013-2028 advisory. https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-2028."},{"key":"e_1_3_2_1_2_1","unstructured":"Nginx cve 2013-2028 kingcope exploit. https:\/\/www.exploit-db.com\/exploits\/26737\/.  Nginx cve 2013-2028 kingcope exploit. https:\/\/www.exploit-db.com\/exploits\/26737\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Nginx cve 2013-2028 patch. http:\/\/nginx.org\/download\/patch.2013.chunked.txt.  Nginx cve 2013-2028 patch. http:\/\/nginx.org\/download\/patch.2013.chunked.txt."},{"key":"e_1_3_2_1_4_1","unstructured":"Vulnerability distribution of CVE security vulnerabilities by type. http:\/\/www.cvedetails.com\/vulnerabilities-by-types.php.  Vulnerability distribution of CVE security vulnerabilities by type. http:\/\/www.cvedetails.com\/vulnerabilities-by-types.php."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519085"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_7_1","volume-title":"Accurate comparison of binary executables","author":"Bourquin M.","year":"2013","unstructured":"M. Bourquin , A. King , and E. Robbins . Accurate comparison of binary executables . 2013 . M. Bourquin, A. King, and E. Robbins. Accurate comparison of binary executables. 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.17"},{"key":"e_1_3_2_1_10_1","first-page":"209","volume-title":"OSDI","volume":"8","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , D. R. Engler , : Unassisted and automatic generation of high-coverage tests for complex systems programs . In OSDI , volume 8 , pages 209 -- 224 , 2008 . C. Cadar, D. Dunbar, D. R. Engler, et al. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, volume 8, pages 209--224, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029631"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_13_1","first-page":"1290","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on","author":"Chang Y.-Y.","year":"2011","unstructured":"Y.-Y. Chang , P. Zavarsky , R. Ruhl , and D. Lindskog . Trend analysis of the cve for software vulnerability management. In Privacy, Security , Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on , pages 1290 -- 1293 . IEEE, 2011 . Y.-Y. Chang, P. Zavarsky, R. Ruhl, and D. Lindskog. Trend analysis of the cve for software vulnerability management. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, pages 1290--1293. IEEE, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.79"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.1950396"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/520033.858247"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"Graph-based comparison of executable objects (english version)","volume":"5","author":"Dullien T.","year":"2005","unstructured":"T. Dullien and R. Rolles . Graph-based comparison of executable objects (english version) . SSTIC , 5 : 1 -- 3 , 2005 . T. Dullien and R. Rolles. Graph-based comparison of executable objects (english version). SSTIC, 5:1--3, 2005.","journal-title":"SSTIC"},{"key":"e_1_3_2_1_18_1","first-page":"303","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Egele M.","year":"2014","unstructured":"M. Egele , M. Woo , P. Chapman , and D. Brumley . Blanket execution: Dynamic similarity testing for program binaries and components . In 23rd USENIX Security Symposium (USENIX Security 14) , pages 303 -- 317 , 2014 . M. Egele, M. Woo, P. Chapman, and D. Brumley. Blanket execution: Dynamic similarity testing for program binaries and components. In 23rd USENIX Security Symposium (USENIX Security 14), pages 303--317, 2014."},{"key":"e_1_3_2_1_19_1","volume-title":"Structural comparison of executable objects","author":"Flake H.","year":"2004","unstructured":"H. Flake . Structural comparison of executable objects . 2004 . H. Flake. Structural comparison of executable objects. 2004."},{"key":"e_1_3_2_1_20_1","first-page":"89","volume-title":"LISA","author":"Giuffrida C.","year":"2013","unstructured":"C. Giuffrida , C. Iorgulescu , A. Kuijsten , and A. S. Tanenbaum . Back to the future: Fault-tolerant live update with time-traveling state transfer . In LISA , pages 89 -- 104 , 2013 . C. Giuffrida, C. Iorgulescu, A. Kuijsten, and A. S. Tanenbaum. Back to the future: Fault-tolerant live update with time-traveling state transfer. In LISA, pages 89--104, 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451147"},{"key":"e_1_3_2_1_22_1","volume-title":"not xp, was the reason last week's wcry worm spread so widely","author":"Goodin D.","year":"2017","unstructured":"D. Goodin . Windows 7 , not xp, was the reason last week's wcry worm spread so widely , 2017 . https:\/\/arstechnica.com\/security\/2017\/05\/windows-7-not-xp-was-the-reason-last-weeks-wcry-worm-spread-so-widely\/. D. Goodin. Windows 7, not xp, was the reason last week's wcry worm spread so widely, 2017. https:\/\/arstechnica.com\/security\/2017\/05\/windows-7-not-xp-was-the-reason-last-weeks-wcry-worm-spread-so-widely\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398857.2384635"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2011.5767632"},{"key":"e_1_3_2_1_25_1","first-page":"18","volume-title":"USENIX security Symposium","author":"Kruegel C.","year":"2004","unstructured":"C. Kruegel , W. Robertson , F. Valeur , and G. Vigna . Static disassembly of obfuscated binaries . In USENIX security Symposium , volume 13 , pages 18 -- 18 , 2004 . C. Kruegel, W. Robertson, F. Valeur, and G. Vigna. Static disassembly of obfuscated binaries. In USENIX security Symposium, volume 13, pages 18--18, 2004."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2011","author":"Lee J.","year":"2011","unstructured":"J. Lee , T. Avgerinos , and D. Brumley . TIE: principled reverse engineering of types in binary programs . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011 , San Diego, California, USA, 6th February - 9th February 2011 , 2011. J. Lee, T. Avgerinos, and D. Brumley. TIE: principled reverse engineering of types in binary programs. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011, 2011."},{"key":"e_1_3_2_1_27_1","first-page":"2013","volume-title":"SAFECOMP 2013-Workshop CARS (2nd Workshop on Critical Automotive applications: Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security","author":"Martorell H.","unstructured":"H. Martorell , J.-C. Fabre , M. Roy , and R. Valentin . Towards dynamic updates in autosar . In SAFECOMP 2013-Workshop CARS (2nd Workshop on Critical Automotive applications: Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security , page NA, 2013 . H. Martorell, J.-C. Fabre, M. Roy, and R. Valentin. Towards dynamic updates in autosar. In SAFECOMP 2013-Workshop CARS (2nd Workshop on Critical Automotive applications: Robustness & Safety) of the 32nd International Conference on Computer Safety, Reliability and Security, page NA, 2013."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554965"},{"key":"e_1_3_2_1_29_1","unstructured":"G. McManus hal and saelo. Nginx cve 2013-2028 metasploit exploit. https:\/\/github.com\/rapid7\/metasploit-framework\/blob\/master\/modules\/exploits\/linux\/http\/nginx_chunked_size.rb.  G. McManus hal and saelo. Nginx cve 2013-2028 metasploit exploit. https:\/\/github.com\/rapid7\/metasploit-framework\/blob\/master\/modules\/exploits\/linux\/http\/nginx_chunked_size.rb."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2009.186"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523679"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.48"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35182-2_9"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542479"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133255.1133991"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908119"},{"key":"e_1_3_2_1_37_1","unstructured":"Oracle. Ksplice. http:\/\/www.ksplice.com\/.  Oracle. Ksplice. http:\/\/www.ksplice.com\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1941304"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.49"},{"key":"e_1_3_2_1_41_1","first-page":"49","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Ramos D. A.","year":"2015","unstructured":"D. A. Ramos and D. Engler . Under-constrained symbolic execution: correctness checking for real code . In 24th USENIX Security Symposium (USENIX Security 15) , pages 49 -- 64 , 2015 . D. A. Ramos and D. Engler. Under-constrained symbolic execution: correctness checking for real code. In 24th USENIX Security Symposium (USENIX Security 15), pages 49--64, 2015."},{"key":"e_1_3_2_1_42_1","first-page":"45","volume-title":"Proceedings. Ninth working conference on","author":"Schwarz B.","year":"2002","unstructured":"B. Schwarz , S. Debray , and G. Andrews . Disassembly of executable code revisited. In Reverse engineering, 2002 . Proceedings. Ninth working conference on , pages 45 -- 54 . IEEE, 2002 . B. Schwarz, S. Debray, and G. Andrews. Disassembly of executable code revisited. In Reverse engineering, 2002. Proceedings. Ninth working conference on, pages 45--54. IEEE, 2002."},{"volume-title":"Resources vulnerability review","year":"2015","key":"e_1_3_2_1_43_1","unstructured":"Secunia. Resources vulnerability review 2015 . http:\/\/secunia.com\/resources\/vulnerability-review\/introduction\/. Secunia. Resources vulnerability review 2015. http:\/\/secunia.com\/resources\/vulnerability-review\/introduction\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575312"},{"key":"e_1_3_2_1_46_1","volume-title":"BlackHat USA","author":"Sotirov A.","year":"2006","unstructured":"A. Sotirov . Hotpatching and the rise of third-party patches . BlackHat USA , 2006 . A. Sotirov. Hotpatching and the rise of third-party patches. BlackHat USA, 2006."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/11688839_3"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/882506.885135"},{"key":"e_1_3_2_1_49_1","first-page":"30","volume-title":"Gartner says 6.4 billion connected \"things\" will be in use","author":"van der Meulen R.","year":"2016","unstructured":"R. van der Meulen . Gartner says 6.4 billion connected \"things\" will be in use in 2016 , up 30 percent from 2015. http:\/\/www.gartner.com\/newsroom\/id\/3165317. R. van der Meulen. Gartner says 6.4 billion connected \"things\" will be in use in 2016, up 30 percent from 2015. http:\/\/www.gartner.com\/newsroom\/id\/3165317."},{"key":"e_1_3_2_1_50_1","first-page":"687","volume-title":"USENIX Security","author":"Wang R.","year":"2013","unstructured":"R. Wang , Y. Shoshitaishvili , C. Kruegel , and G. Vigna . Steal this movie: Automatically bypassing drm protection in streaming media services . In USENIX Security , pages 687 -- 702 , 2013 . R. Wang, Y. Shoshitaishvili, C. Kruegel, and G. Vigna. Steal this movie: Automatically bypassing drm protection in streaming media services. In USENIX Security, pages 687--702, 2013."},{"key":"e_1_3_2_1_51_1","unstructured":"Wikipedia. Dll injection. https:\/\/en.wikipedia.org\/wiki\/DLL_injection.  Wikipedia. Dll injection. https:\/\/en.wikipedia.org\/wiki\/DLL_injection."},{"key":"e_1_3_2_1_52_1","volume-title":"Constructing precise control flow graphs from binaries","author":"Xu L.","year":"2009","unstructured":"L. Xu , F. Sun , and Z. Su . Constructing precise control flow graphs from binaries . University of California , Davis, Tech . Rep, 2009 . L. Xu, F. Sun, and Z. Su. Constructing precise control flow graphs from binaries. University of California, Davis, Tech. Rep, 2009."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134611","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134611","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134611","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134611"}},"subtitle":["Uncooperative Remote Runtime Patching"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":52,"alternative-id":["10.1145\/3134600.3134611","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134611","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}