{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:01Z","timestamp":1750306081373,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134626","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"55-67","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Breaking and Fixing Destructive Code Read Defenses"],"prefix":"10.1145","author":[{"given":"Jannik","family":"Pewny","sequence":"first","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum"}]},{"given":"Philipp","family":"Koppe","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum"}]},{"given":"Lucas","family":"Davi","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Duisburg-Essen"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"IDA Pro - Interactive Disassembler. http:\/\/www.hex-rays.com\/idapro\/. (????).  IDA Pro - Interactive Disassembler. http:\/\/www.hex-rays.com\/idapro\/. (????)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_3_1","volume-title":"Inline Jump Tables on ARM & Function Detection Using The .eh_frame Section. (November","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse . 2016. Inline Jump Tables on ARM & Function Detection Using The .eh_frame Section. (November 2016 ). https:\/\/writings.mistakenot.net\/arm-jump-tables-and-eh_frame\/. Dennis Andriesse. 2016. Inline Jump Tables on ARM & Function Detection Using The .eh_frame Section. (November 2016). https:\/\/writings.mistakenot.net\/arm-jump-tables-and-eh_frame\/."},{"volume-title":"USENIX Security Symposium.","author":"Andriesse Dennis","key":"e_1_3_2_1_4_1","unstructured":"Dennis Andriesse , Xi Chen , Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries . In USENIX Security Symposium. Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In USENIX Security Symposium."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Security Symposium.","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan N\u00fcrnberger . 2014 . Oxymoron: Making Fine-grained Memory Randomization Practical by Allowing Code Sharing . In USENIX Security Symposium. Michael Backes and Stefan N\u00fcrnberger. 2014. Oxymoron: Making Fine-grained Memory Randomization Practical by Allowing Code Sharing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_9_1","unstructured":"C0ntex. 2010. Bypassing non-executable-stack during exploitation using return-to-libc. http:\/\/www.infosecwriters.com\/text_resources\/pdf\/return-to-libc.pdf. (2010).  C0ntex. 2010. Bypassing non-executable-stack during exploitation using return-to-libc. http:\/\/www.infosecwriters.com\/text_resources\/pdf\/return-to-libc.pdf. (2010)."},{"volume-title":"Non-control-data Attacks Are Realistic Threats. In USENIX Security Symposium.","author":"Chen Shuo","key":"e_1_3_2_1_10_1","unstructured":"Shuo Chen , Jun Xu , Emre C. Sezer , Prachi Gauriar , and Ravishankar K. Iyer . 2005 . Non-control-data Attacks Are Realistic Threats. In USENIX Security Symposium. Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer. 2005. Non-control-data Attacks Are Realistic Threats. In USENIX Security Symposium."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857726"},{"volume-title":"ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. In Symposium on Network and Distributed System Security (NDSS).","author":"Cheng Yueqiang","key":"e_1_3_2_1_12_1","unstructured":"Yueqiang Cheng , Zongwei Zhou , Miao Yu , Xuhua Ding , and Robert H. Deng . 2014 . ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. In Symposium on Network and Distributed System Security (NDSS). Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, and Robert H. Deng. 2014. ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813682"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484351"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"volume-title":"Symposium on Network and Distributed System Security (NDSS).","author":"Gawlik R.","key":"e_1_3_2_1_19_1","unstructured":"R. Gawlik , B. Kollenda , P. Koppe , B. Garmany , and T. Holz . 2016. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding . In Symposium on Network and Distributed System Security (NDSS). R. Gawlik, B. Kollenda, P. Koppe, B. Garmany, and T. Holz. 2016. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"volume-title":"Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. In USENIX Security Symposium.","author":"Giuffrida Cristiano","key":"e_1_3_2_1_21_1","unstructured":"Cristiano Giuffrida , Anton Kuijsten , and Andrew S. Tanenbaum . 2012 . Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. In USENIX Security Symposium. Cristiano Giuffrida, Anton Kuijsten, and Andrew S. Tanenbaum. 2012. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. In USENIX Security Symposium."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Security Symposium.","author":"G\u00f6kta\u015f Enes","year":"2014","unstructured":"Enes G\u00f6kta\u015f , Elias Athanasopoulos , Michalis Polychronakis , Herbert Bos , and Georgios Portokalidis . 2014 . Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard . In USENIX Security Symposium. Enes G\u00f6kta\u015f, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, and Georgios Portokalidis. 2014. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. In USENIX Security Symposium."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/browserbench.org\/JetStream\/. 2016. JetStream Browserbenchmark. (2016).  http:\/\/browserbench.org\/JetStream\/. 2016. JetStream Browserbenchmark. (2016)."},{"key":"e_1_3_2_1_27_1","unstructured":"http:\/\/browserbench.org\/Speedometer\/. 2016. Speedometer Browserbenchmark. (2016).  http:\/\/browserbench.org\/Speedometer\/. 2016. Speedometer Browserbenchmark. (2016)."},{"key":"e_1_3_2_1_28_1","unstructured":"http:\/\/dynamorio.org\/. 2016. DynamoRIO: Dynamic Instrumentation Tool Platform. (2016).  http:\/\/dynamorio.org\/. 2016. DynamoRIO: Dynamic Instrumentation Tool Platform. (2016)."},{"key":"e_1_3_2_1_29_1","unstructured":"http:\/\/peacekeeper.futuremark.com\/run.action. 2016. Peacekeeper Browserbenchmark. (2016).  http:\/\/peacekeeper.futuremark.com\/run.action. 2016. Peacekeeper Browserbenchmark. (2016)."},{"key":"e_1_3_2_1_30_1","volume-title":"Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In IEEE Symposium on Security and Privacy.","author":"Hu Hong","year":"2016","unstructured":"Hong Hu , Shweta Shinde , Sendroiu Adrian , Zheng Leong Chua , Prateek Saxena , and Zhenkai Liang . 2016 . Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In IEEE Symposium on Security and Privacy. Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.16"},{"key":"e_1_3_2_1_33_1","volume-title":"Code-pointer Integrity. In USENIX Conference on Operating Systems Design and Implementation (OSDI).","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov , L\u00e1szl\u00f3 Szekeres , Mathias Payer , George Candea , R. Sekar , and Dawn Song . 2014 . Code-pointer Integrity. In USENIX Conference on Operating Systems Design and Implementation (OSDI). Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song. 2014. Code-pointer Integrity. In USENIX Conference on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_35_1","unstructured":"Felix Lindner. 2009. Router Exploitation. (2009).  Felix Lindner. 2009. Router Exploitation. (2009)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813694"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931047"},{"key":"e_1_3_2_1_38_1","volume-title":"Vulnerability Description for CVE-2014-1513. (January","author":"MITRE Corporation","year":"2014","unstructured":"MITRE Corporation . 2014. Vulnerability Description for CVE-2014-1513. (January 2014 ). https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1513. MITRE Corporation. 2014. Vulnerability Description for CVE-2014-1513. (January 2014). https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-1513."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"volume-title":"Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In USENIX Security Symposium.","author":"Pappas Vasilis","key":"e_1_3_2_1_40_1","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos D. Keromytis . 2013 . Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In USENIX Security Symposium. Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_41_1","unstructured":"Sascha Schirra. 2015. Ropper - rop gadget finder and binary information tool. https:\/\/github.com\/sashs\/Ropper. (2015).  Sascha Schirra. 2015. Ropper - rop gadget finder and binary information tool. https:\/\/github.com\/sashs\/Ropper. (2015)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660309"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.61"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_1_48_1","unstructured":"PaX Team. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt. (????).  PaX Team. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt. (????)."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897891"},{"key":"e_1_3_2_1_51_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX Conference on Operating Systems Design and Implementation (OSDI).","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P. Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P. Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX Conference on Operating Systems Design and Implementation (OSDI). David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX Conference on Operating Systems Design and Implementation (OSDI)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"volume-title":"Control Flow Integrity for COTS Binaries. In USENIX Security Symposium.","author":"Zhang Mingwei","key":"e_1_3_2_1_53_1","unstructured":"Mingwei Zhang and R. Sekar . 2013 . Control Flow Integrity for COTS Binaries. In USENIX Security Symposium. Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In USENIX Security Symposium."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134626","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134626","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":53,"alternative-id":["10.1145\/3134600.3134626","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134626","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}