{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:30:39Z","timestamp":1759091439945,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134627","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"412-424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["RevARM"],"prefix":"10.1145","author":[{"given":"Taegyu","family":"Kim","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Chung Hwan","family":"Kim","sequence":"additional","affiliation":[{"name":"NEC Laboratories America"}]},{"given":"Hongjun","family":"Choi","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Yonghwi","family":"Kwon","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Brendan","family":"Saltaformaggio","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Dongyan","family":"Xu","sequence":"additional","affiliation":[{"name":"Purdue University"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1995. Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification Version 1.2. http:\/\/refspecs.linuxbase.org\/elf\/elf.pdf.  1995. Tool Interface Standard (TIS) Executable and Linking Format (ELF) Specification Version 1.2. http:\/\/refspecs.linuxbase.org\/elf\/elf.pdf."},{"key":"e_1_3_2_1_2_1","unstructured":"2012. LLVM 3.1 release note. http:\/\/releases.llvm.org\/3.1\/docs\/ReleaseNotes.html.  2012. LLVM 3.1 release note. http:\/\/releases.llvm.org\/3.1\/docs\/ReleaseNotes.html."},{"key":"e_1_3_2_1_3_1","unstructured":"2013. Ardupilot File System Corruption Bug - DataFlash: don't try to create a directory that exists. https:\/\/github.com\/ArduPilot\/ardupilot\/commit\/4ce2555a6563939f95991621facc7ff4b9f27d1d.  2013. Ardupilot File System Corruption Bug - DataFlash: don't try to create a directory that exists. https:\/\/github.com\/ArduPilot\/ardupilot\/commit\/4ce2555a6563939f95991621facc7ff4b9f27d1d."},{"key":"e_1_3_2_1_4_1","unstructured":"2013. Hacking Drones - Overview of the Main Threats. http:\/\/resources.infosecinstitute.com\/hacking-drones-overview-of-the-main-threats.  2013. Hacking Drones - Overview of the Main Threats. http:\/\/resources.infosecinstitute.com\/hacking-drones-overview-of-the-main-threats."},{"key":"e_1_3_2_1_5_1","unstructured":"2014. Nuttx File System Corruption Bug - FAT: move cluster expansion checks to start of IO loops. https:\/\/github.com\/PX4\/NuttX\/commit\/ed45e813aff84f5646ea7ad1d7ab50f597bdebb9.  2014. Nuttx File System Corruption Bug - FAT: move cluster expansion checks to start of IO loops. https:\/\/github.com\/PX4\/NuttX\/commit\/ed45e813aff84f5646ea7ad1d7ab50f597bdebb9."},{"key":"e_1_3_2_1_6_1","unstructured":"2014. Processors | ARMv7-M. https:\/\/silver.arm.com\/download\/ARM_and_AMBA_Architecture\/AR580-DA-70000-r0p0-05rel0\/DDI0403E_B_armv7m_arm.pdf.  2014. Processors | ARMv7-M. https:\/\/silver.arm.com\/download\/ARM_and_AMBA_Architecture\/AR580-DA-70000-r0p0-05rel0\/DDI0403E_B_armv7m_arm.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"2015. Firmware Control Output Handling Bug - IO driver: Ensure comms protocol cannot get into integer overflow. https:\/\/github.com\/PX4\/Firmware\/commit\/e09f5d2871f0c23cf8eb8154a2fa8831d9b96062.  2015. Firmware Control Output Handling Bug - IO driver: Ensure comms protocol cannot get into integer overflow. https:\/\/github.com\/PX4\/Firmware\/commit\/e09f5d2871f0c23cf8eb8154a2fa8831d9b96062."},{"key":"e_1_3_2_1_8_1","unstructured":"2015. Firmware Memory Vulnerability - i2c: prevent double free of _dev pointer. https:\/\/github.com\/PX4\/Firmware\/commit\/1b8a830a38caf393cb308ad206d3c23329d58a48.  2015. Firmware Memory Vulnerability - i2c: prevent double free of _dev pointer. https:\/\/github.com\/PX4\/Firmware\/commit\/1b8a830a38caf393cb308ad206d3c23329d58a48."},{"key":"e_1_3_2_1_9_1","unstructured":"2015. Hijacking drones with a MAVLink exploit on DIY Drones. http:\/\/diydrones.com\/profiles\/blogs\/hijacking-quadcopters-with-a-mavlink-exploit.  2015. Hijacking drones with a MAVLink exploit on DIY Drones. http:\/\/diydrones.com\/profiles\/blogs\/hijacking-quadcopters-with-a-mavlink-exploit."},{"key":"e_1_3_2_1_10_1","unstructured":"2015. S.F. Express Launches First Drone Delivery Service in China. http:\/\/english.cri.cn\/12394\/2015\/03\/24\/1261s871432.htm.  2015. S.F. Express Launches First Drone Delivery Service in China. http:\/\/english.cri.cn\/12394\/2015\/03\/24\/1261s871432.htm."},{"key":"e_1_3_2_1_11_1","unstructured":"2015. Xaircraft - Drone Vendor. http:\/\/www.xaircraft.cn.  2015. Xaircraft - Drone Vendor. http:\/\/www.xaircraft.cn."},{"key":"e_1_3_2_1_12_1","unstructured":"2016. ArduPilot Autopilot Suite. http:\/\/ardupilot.org\/ardupilot\/index.html.  2016. ArduPilot Autopilot Suite. http:\/\/ardupilot.org\/ardupilot\/index.html."},{"key":"e_1_3_2_1_13_1","unstructured":"2016. Ardupilot Memory Vulnerability - GCS_MAVLink: fixed null termination bug. https:\/\/github.com\/ArduPilot\/ardupilot\/commit\/197e72acc0efa094c48070b6409d605b00b36ba6.  2016. Ardupilot Memory Vulnerability - GCS_MAVLink: fixed null termination bug. https:\/\/github.com\/ArduPilot\/ardupilot\/commit\/197e72acc0efa094c48070b6409d605b00b36ba6."},{"key":"e_1_3_2_1_14_1","unstructured":"2016. Firmware Memory Vulnerability - Prevents the possibility of buffer overflow in mixer parsing. https:\/\/github.com\/PX4\/Firmware\/commit\/db44129ec099a05debf9187da2fd09035c9a67d7.  2016. Firmware Memory Vulnerability - Prevents the possibility of buffer overflow in mixer parsing. https:\/\/github.com\/PX4\/Firmware\/commit\/db44129ec099a05debf9187da2fd09035c9a67d7."},{"volume-title":"Hackers take over security camera","key":"e_1_3_2_1_15_1","unstructured":"2016. Hackers take over security camera ; live stream girls' bedroom on Internet . https:\/\/www.hackread.com\/hackers-live-stream-hacked-security-camera. 2016. Hackers take over security camera; live stream girls' bedroom on Internet. https:\/\/www.hackread.com\/hackers-live-stream-hacked-security-camera."},{"key":"e_1_3_2_1_16_1","unstructured":"2016. Hex-Rays IDA Pro disassembler. http:\/\/www.hex-rays.com\/products\/ida.  2016. Hex-Rays IDA Pro disassembler. http:\/\/www.hex-rays.com\/products\/ida."},{"key":"e_1_3_2_1_17_1","unstructured":"2016. How Hackers Violate Privacy and Security of the Smart Home. http:\/\/resources.infosecinstitute.com\/how-hackers-violate-privacy-and-security-of-the-smart-home.  2016. How Hackers Violate Privacy and Security of the Smart Home. http:\/\/resources.infosecinstitute.com\/how-hackers-violate-privacy-and-security-of-the-smart-home."},{"key":"e_1_3_2_1_18_1","unstructured":"2016. MAVLink - Micro Air Vehicle Communication Protocol. http:\/\/qgroundcontrol.org\/mavlink\/start.  2016. MAVLink - Micro Air Vehicle Communication Protocol. http:\/\/qgroundcontrol.org\/mavlink\/start."},{"key":"e_1_3_2_1_19_1","unstructured":"2016. Technical Analysis of Pegasus Spyware. https:\/\/info.lookout.com\/rs\/051-ESQ-475\/images\/lookout-pegasus-technical-analysis.pdf.  2016. Technical Analysis of Pegasus Spyware. https:\/\/info.lookout.com\/rs\/051-ESQ-475\/images\/lookout-pegasus-technical-analysis.pdf."},{"key":"e_1_3_2_1_20_1","unstructured":"2017. 3DR Pixhawk | 3DR - Drone & UAV Technology. (2017). http:\/\/3dr.com\/support\/articles\/207358096\/3dr_pixhawk.  2017. 3DR Pixhawk | 3DR - Drone & UAV Technology. (2017). http:\/\/3dr.com\/support\/articles\/207358096\/3dr_pixhawk."},{"key":"e_1_3_2_1_21_1","unstructured":"2017. Amazon Echo - Smart Speaker. https:\/\/www.amazon.com\/Amazon-Echo-Bluetooth-Speaker-with-WiFi-Alexa\/dp\/B00X4WHP5E.  2017. Amazon Echo - Smart Speaker. https:\/\/www.amazon.com\/Amazon-Echo-Bluetooth-Speaker-with-WiFi-Alexa\/dp\/B00X4WHP5E."},{"key":"e_1_3_2_1_22_1","unstructured":"2017. BAT - Binary Analysis Tool. http:\/\/www.binaryanalysis.org\/en\/home.  2017. BAT - Binary Analysis Tool. http:\/\/www.binaryanalysis.org\/en\/home."},{"key":"e_1_3_2_1_23_1","unstructured":"2017. Binwalk - Firmware Analysis Tool. http:\/\/binwalk.org.  2017. Binwalk - Firmware Analysis Tool. http:\/\/binwalk.org."},{"key":"e_1_3_2_1_24_1","unstructured":"2017. Capstone. http:\/\/www.capstone-engine.org.  2017. Capstone. http:\/\/www.capstone-engine.org."},{"key":"e_1_3_2_1_25_1","unstructured":"2017. Clutch - Fast iOS executable dumper. https:\/\/github.com\/KJCracks\/Clutch.  2017. Clutch - Fast iOS executable dumper. https:\/\/github.com\/KJCracks\/Clutch."},{"key":"e_1_3_2_1_26_1","unstructured":"2017. CoreMark - Industry-Standard Benchmarks for Embedded Systems. http:\/\/www.eembc.org\/coremark.  2017. CoreMark - Industry-Standard Benchmarks for Embedded Systems. http:\/\/www.eembc.org\/coremark."},{"key":"e_1_3_2_1_27_1","unstructured":"2017. IRIS+ | 3DR - Drone & UAV Technology. http:\/\/3dr.com\/support\/articles\/207358106\/iris.  2017. IRIS+ | 3DR - Drone & UAV Technology. http:\/\/3dr.com\/support\/articles\/207358106\/iris."},{"volume-title":"Nov.","year":"2016","key":"e_1_3_2_1_28_1","unstructured":"2017. McAfee Labs 2017 Threats Predictions , Nov. 2016 . https:\/\/www.mcafee.com\/kr\/resources\/reports\/rp-threats-predictions-2017.pdf. 2017. McAfee Labs 2017 Threats Predictions, Nov. 2016. https:\/\/www.mcafee.com\/kr\/resources\/reports\/rp-threats-predictions-2017.pdf."},{"key":"e_1_3_2_1_29_1","unstructured":"2017. NuttX Real-Time Operating System. http:\/\/nuttx.org.  2017. NuttX Real-Time Operating System. http:\/\/nuttx.org."},{"key":"e_1_3_2_1_30_1","unstructured":"2017. PerformanceTest Mobile. http:\/\/www.passmark.com\/products\/pt_mobile.htm.  2017. PerformanceTest Mobile. http:\/\/www.passmark.com\/products\/pt_mobile.htm."},{"key":"e_1_3_2_1_31_1","unstructured":"2017. radare. https:\/\/www.radare.org.  2017. radare. https:\/\/www.radare.org."},{"key":"e_1_3_2_1_32_1","unstructured":"2017. Roomba - Robot Vacuum Cleaner. http:\/\/www.irobot.com\/For-the-Home\/Vacuuming\/Roomba.aspx.  2017. Roomba - Robot Vacuum Cleaner. http:\/\/www.irobot.com\/For-the-Home\/Vacuuming\/Roomba.aspx."},{"volume-title":"Threat Report","year":"2017","key":"e_1_3_2_1_33_1","unstructured":"2017. Symantec Internet Security Threat Report 2017 , Volume 22 . https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-22-2017-en.pdf. 2017. Symantec Internet Security Threat Report 2017, Volume 22. https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-22-2017-en.pdf."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)","author":"Andriesse Dennis","key":"e_1_3_2_1_35_1","unstructured":"Dennis Andriesse , Xi Chen , Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries . In Proceedings of the 25th USENIX Security Symposium (USENIX Security '16) . Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In Proceedings of the 25th USENIX Security Symposium (USENIX Security '16)."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the USENIX Annual Technical Conference, FREENIX Track (ATC '05)","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a fast and portable dynamic translator . In Proceedings of the USENIX Annual Technical Conference, FREENIX Track (ATC '05) . Fabrice Bellard. 2005. QEMU, a fast and portable dynamic translator. In Proceedings of the USENIX Annual Technical Conference, FREENIX Track (ATC '05)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714629"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400404"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12)","author":"Davi Lucas","year":"2012","unstructured":"Lucas Davi , Alexandra Dmitrienko , Manuel Egele , Thomas Fischer , Thorsten Holz , Ralf Hund , Stefan N\u00fcrnberger , and Ahmad-Reza Sadeghi . 2012 . MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones . In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12) . Lucas Davi, Alexandra Dmitrienko, Manuel Egele, Thomas Fischer, Thorsten Holz, Ralf Hund, Stefan N\u00fcrnberger, and Ahmad-Reza Sadeghi. 2012. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. In Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS '12)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086642.1086645"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813675"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_12"},{"key":"e_1_3_2_1_44_1","unstructured":"Andrew Edwards Hoi Vo and Amitabh Srivastava. 2001. Vulcan binary transformation in a distributed environment. (2001).  Andrew Edwards Hoi Vo and Amitabh Srivastava. 2001. Vulcan binary transformation in a distributed environment. (2001)."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 3rd USENIX Windows NT Symposium.","author":"Hunt Galen","year":"1999","unstructured":"Galen Hunt and Doug Brubacher . 1999 . Detours: Binary Interception of Win32 Functions . In Proceedings of the 3rd USENIX Windows NT Symposium. Galen Hunt and Doug Brubacher. 1999. Detours: Binary Interception of Win32 Functions. In Proceedings of the 3rd USENIX Windows NT Symposium."},{"volume-title":"Diversifying the software stack using randomized NOP insertion","author":"Jackson Todd","key":"e_1_3_2_1_46_1","unstructured":"Todd Jackson , Andrei Homescu , Stephen Crane , Per Larsen , Stefan Brunthaler , and Michael Franz . 2013. Diversifying the software stack using randomized NOP insertion . In Moving Target Defense II. Springer . Todd Jackson, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, and Michael Franz. 2013. Diversifying the software stack using randomized NOP insertion. In Moving Target Defense II. Springer."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968505"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21424-0_13"},{"volume-title":"Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)","author":"Pawlowski Andre","key":"e_1_3_2_1_53_1","unstructured":"Andre Pawlowski , Moritz Contag , Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida. 2017. MARX: Uncovering class hierarchies in C++ programs . In Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17) . Andre Pawlowski, Moritz Contag, Victor van der Veen, Chris Ouwehand, Thorsten Holz, Herbert Bos, Elias Athanasopoulos, and Cristiano Giuffrida. 2017. MARX: Uncovering class hierarchies in C++ programs. In Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS '17)."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the USENIX Windows NT Workshop.","author":"Romer Ted","year":"1997","unstructured":"Ted Romer , Geoff Voelker , Dennis Lee , Alec Wolman , Wayne Wong , Hank Levy , Brian Bershad , and Brad Chen . 1997 . Instrumentation and optimization of Win32\/Intel executables using Etch . In Proceedings of the USENIX Windows NT Workshop. Ted Romer, Geoff Voelker, Dennis Lee, Alec Wolman, Wayne Wong, Hank Levy, Brian Bershad, and Brad Chen. 1997. Instrumentation and optimization of Win32\/Intel executables using Etch. In Proceedings of the USENIX Windows NT Workshop."},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the Workshop on Binary Translation (WBT '01)","author":"Schwarz Benjamin","year":"2001","unstructured":"Benjamin Schwarz , Saumya Debray , Gregory Andrews , and Matthew Legendre . 2001 . Plto: A link-time optimizer for the Intel IA-32 architecture . In Proceedings of the Workshop on Binary Translation (WBT '01) . Benjamin Schwarz, Saumya Debray, Gregory Andrews, and Matthew Legendre. 2001. Plto: A link-time optimizer for the Intel IA-32 architecture. In Proceedings of the Workshop on Binary Translation (WBT '01)."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 19th USENIX Security Symposium (USENIX Security '10)","author":"Sehr David","year":"2010","unstructured":"David Sehr , Robert Muth , Cliff Biffle , Victor Khimenko , Egor Pasko , Karl Schimpf , Bennet Yee , and Brad Chen . 2010 . Adapting Software Fault Isolation to Contemporary CPU Architectures . In Proceedings of the 19th USENIX Security Symposium (USENIX Security '10) . David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. 2010. Adapting Software Fault Isolation to Contemporary CPU Architectures. In Proceedings of the 19th USENIX Security Symposium (USENIX Security '10)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831199"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831183"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.106"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security '13)","author":"Wang Tielei","year":"2013","unstructured":"Tielei Wang , Kangjie Lu , Long Lu , Simon Chung , and Wenke Lee . 2013 . Jekyll on ios: When benign apps become evil . In Proceedings of the 22nd USENIX Security Symposium (USENIX Security '13) . Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee. 2013. Jekyll on ios: When benign apps become evil. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security '13)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802557"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security '13)","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar . 2013 . Control flow integrity for COTS binaries . In Proceedings of the 22nd USENIX Security Symposium (USENIX Security '13) . Mingwei Zhang and R Sekar. 2013. Control flow integrity for COTS binaries. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security '13)."}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134627"}},"subtitle":["A Platform-Agnostic ARM Binary Rewriter for Security Applications"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":68,"alternative-id":["10.1145\/3134600.3134627","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134627","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}