{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:35:50Z","timestamp":1759091750767,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-15-1-2378 and N00014-17-1-2891"],"award-info":[{"award-number":["N00014-15-1-2378 and N00014-17-1-2891"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1319137"],"award-info":[{"award-number":["CNS-1319137"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134634","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"128-140","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks"],"prefix":"10.1145","author":[{"given":"Mingwei","family":"Zhang","sequence":"first","affiliation":[{"name":"Intel Labs, Hillsboro, OR, USA"}]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]},{"given":"R.","family":"Sekar","sequence":"additional","affiliation":[{"name":"Stony Brook University, Stony Brook, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2013. MWR Labs Pwn2Own 2013 Write-up - Webkit Exploit. (2013). http:\/\/labs.mwrinfosecurity.com\/blog\/2013\/04\/19\/mwr-labs-pwn2own-2013-write-up---webkit-exploit\/.  2013. MWR Labs Pwn2Own 2013 Write-up - Webkit Exploit. (2013). http:\/\/labs.mwrinfosecurity.com\/blog\/2013\/04\/19\/mwr-labs-pwn2own-2013-write-up---webkit-exploit\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2014. PSI Version 1.1. http:\/\/www.seclab.cs.sunysb.edu\/seclab\/psi\/. (2014).  2014. PSI Version 1.1. http:\/\/www.seclab.cs.sunysb.edu\/seclab\/psi\/. (2014)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_5_1","volume-title":"Analysis of a Malware ROP Chain. (Oct","author":"Antoniewicz Brad","year":"2013","unstructured":"Brad Antoniewicz . 2013. Analysis of a Malware ROP Chain. (Oct . 2013 ). http:\/\/blog.opensecurityresearch.com\/2013\/10\/analysis-of-malware-rop-chain.html. Brad Antoniewicz. 2013. Analysis of a Malware ROP Chain. (Oct. 2013). http:\/\/blog.opensecurityresearch.com\/2013\/10\/analysis-of-malware-rop-chain.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_1_7_1","volume-title":"Oxymoron: Making Fine-grained Memory Randomization Practical by Allowing Code Sharing. In USENIX Security.","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan N\u00fcrnberger . 2014 . Oxymoron: Making Fine-grained Memory Randomization Practical by Allowing Code Sharing. In USENIX Security. Michael Backes and Stefan N\u00fcrnberger. 2014. Oxymoron: Making Fine-grained Memory Randomization Practical by Allowing Code Sharing. In USENIX Security."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of OSDI. 423--436","author":"Ben-Yehuda Muli","year":"2010","unstructured":"Muli Ben-Yehuda , Michael D. Day , Zvi Dubitzky , Michael Factor , Nadav Har'El , Abel Gordon , Anthony Liguori , Orit Wasserman , and Ben-Ami Yassour . 2010 . The Turtles Project: Design and Implementation of Nested Virtualization . In Proc. of OSDI. 423--436 . Muli Ben-Yehuda, Michael D. Day, Zvi Dubitzky, Michael Factor, Nadav Har'El, Abel Gordon, Anthony Liguori, Orit Wasserman, and Ben-Ami Yassour. 2010. The Turtles Project: Design and Implementation of Nested Virtualization. In Proc. of OSDI. 423--436."},{"key":"e_1_3_2_1_9_1","unstructured":"Sandeep Bhatkar Daniel C. DuVarney and R. Sekar. 2003. Address obfuscation: an efficient approach to combat a board range of memory error exploits. In USENIX Security.   Sandeep Bhatkar Daniel C. DuVarney and R. Sekar. 2003. Address obfuscation: an efficient approach to combat a board range of memory error exploits. In USENIX Security."},{"key":"e_1_3_2_1_10_1","unstructured":"Sandeep Bhatkar R. Sekar and Daniel DuVarney. 2005. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security.   Sandeep Bhatkar R. Sekar and Daniel DuVarney. 2005. Efficient techniques for comprehensive protection from memory error exploits. In USENIX Security."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Kjell Braden Stephen Crane Lucas Davi Michael Franz Per Larsen Christopher Liebchen and Ahmad-Reza Sadeghi. 2016. Leakage-Resilient Layout Randomization for Mobile Devices. In NDSS.  Kjell Braden Stephen Crane Lucas Davi Michael Franz Per Larsen Christopher Liebchen and Ahmad-Reza Sadeghi. 2016. Leakage-Resilient Layout Randomization for Mobile Devices. In NDSS.","DOI":"10.14722\/ndss.2016.23364"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Kjell Bradeny Stephen Crane Lucas Davi Michael Franz and Per Larson. 2016. Leakage-Resilient Layout Randomization for Mobile Devices. In NDSS.  Kjell Bradeny Stephen Crane Lucas Davi Michael Franz and Per Larson. 2016. Leakage-Resilient Layout Randomization for Mobile Devices. In NDSS.","DOI":"10.14722\/ndss.2016.23364"},{"key":"e_1_3_2_1_16_1","volume-title":"Gross","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R . Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In USENIX Security 15. Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In USENIX Security 15."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.30"},{"key":"e_1_3_2_1_18_1","unstructured":"Tzi-cker Chiueh and Fu-hau Hsu. 2001. RAD: a Compile-Time Solution to Buffer Overflow Attacks. In ICDCS.   Tzi-cker Chiueh and Fu-hau Hsu. 2001. RAD: a Compile-Time Solution to Buffer Overflow Attacks. In ICDCS."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813682"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_24_1","volume-title":"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. In NDSS.","author":"Davi Lucas","year":"2015","unstructured":"Lucas Davi , Christopher Liebchen , Ahmad-Reza Sadeghi , Kevin Z. Snow , and Fabian Monrose . 2015 . Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. In NDSS. Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, and Fabian Monrose. 2015. Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. In NDSS."},{"key":"e_1_3_2_1_25_1","unstructured":"Lucas Davi Ahmad-Reza Sadeghi Daniel Lehmann and Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security.   Lucas Davi Ahmad-Reza Sadeghi Daniel Lehmann and Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484351"},{"key":"e_1_3_2_1_28_1","unstructured":"Solar Designer. 1997. Getting around non-executable stack (and fix). http:\/\/seclists.org\/bugtraq\/1997\/Aug\/63. (1997).  Solar Designer. 1997. Getting around non-executable stack (and fix). http:\/\/seclists.org\/bugtraq\/1997\/Aug\/63. (1997)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_3_2_1_31_1","unstructured":"Bryan Ford and Russ Cox. 2008. Vx32: lightweight user-level sandboxing on the x86. In USENIX ATC.   Bryan Ford and Russ Cox. 2008. Vx32: lightweight user-level sandboxing on the x86. In USENIX ATC."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Enes G\u00f6ktas Elias Athanasopoulos Herbert Bos and Georgios Portokalidis. 2014. Out of Control: Overcoming Control-Flow Integrity. In Security and Privacy.  Enes G\u00f6ktas Elias Athanasopoulos Herbert Bos and Georgios Portokalidis. 2014. Out of Control: Overcoming Control-Flow Integrity. In Security and Privacy.","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_34_1","unstructured":"Enes G\u00f6kta\u015f Elias Athanasopoulos Michalis Polychronakis Herbert Bos and Georgios Portokalidis. 2014. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. In USENIX Security.  Enes G\u00f6kta\u015f Elias Athanasopoulos Michalis Polychronakis Herbert Bos and Georgios Portokalidis. 2014. Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard. In USENIX Security."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_37_1","volume-title":"Dissecting the newest IE10 0-day exploit (CVE-2014-0322). (Feb","author":"Kotov Vadim","year":"2014","unstructured":"Vadim Kotov . 2014. Dissecting the newest IE10 0-day exploit (CVE-2014-0322). (Feb . 2014 ). http:\/\/labs.bromium.com\/2014\/02\/25\/dissecting-the-newest-ie10-0-day-exploit-cve-2014-0322\/. Vadim Kotov. 2014. Dissecting the newest IE10 0-day exploit (CVE-2014-0322). (Feb. 2014). http:\/\/labs.bromium.com\/2014\/02\/25\/dissecting-the-newest-ie10-0-day-exploit-cve-2014-0322\/."},{"key":"e_1_3_2_1_38_1","first-page":"x86","volume":"200","unstructured":"Sebastian Krahmer. 200 5. x86 - x64 buffer overflow exploits and the borrowed code chunks exploitation technique. http:\/\/www.suse.de\/~krahmer\/no-nx.pdf. (2005). Sebastian Krahmer. 2005. x86-64 buffer overflow exploits and the borrowed code chunks exploitation technique. http:\/\/www.suse.de\/~krahmer\/no-nx.pdf. (2005).","journal-title":"Sebastian Krahmer."},{"key":"e_1_3_2_1_39_1","unstructured":"Volodymyr Kuznetsov Laszlo Szekeres Mathias Payer George Candea R. Sekar and Dawn Song. 2014. Code-Pointer Integrity. In OSDI.   Volodymyr Kuznetsov Laszlo Szekeres Mathias Payer George Candea R. Sekar and Dawn Song. 2014. Code-Pointer Integrity. In OSDI."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Lixin Li James Just and R. Sekar. 2006. Address-Space Randomization for Windows Systems.  Lixin Li James Just and R. Sekar. 2006. Address-Space Randomization for Windows Systems.","DOI":"10.1109\/ACSAC.2006.10"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_42_1","unstructured":"the PaX team. 2001. Address Space Layout Randomization. http:\/\/pax.grsecurity.net\/docs\/aslr.txt. (2001).  the PaX team. 2001. Address Space Layout Randomization. http:\/\/pax.grsecurity.net\/docs\/aslr.txt. (2001)."},{"key":"e_1_3_2_1_43_1","unstructured":"Matt Miller Ken Johnson Nitin Goel and Vanegue Julien. 2011. Intra-modular Displacement Randomization. (2011).  Matt Miller Ken Johnson Nitin Goel and Vanegue Julien. 2011. Intra-modular Displacement Randomization. (2011)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_47_1","unstructured":"Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking Holes in Information Hiding. In USENIX Security.  Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking Holes in Information Hiding. In USENIX Security."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20550-2_8"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064216"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Aravind Prakashm Xunchao Hu and Heng Ying. 2015. vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. In NDSS.  Aravind Prakashm Xunchao Hu and Heng Ying. 2015. vfGuard: Strict Protection for Virtual Function Calls in COTS C++ Binaries. In NDSS.","DOI":"10.14722\/ndss.2015.23297"},{"key":"e_1_3_2_1_53_1","unstructured":"Manish Prasad and Tzi-cker Chiueh. 2003. A Binary Rewriting Defense against Stack Based Overflow attacks. In USENIX ATC.  Manish Prasad and Tzi-cker Chiueh. 2003. A Binary Rewriting Defense against Stack Based Overflow attacks. In USENIX ATC."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Rui Qiao and R. Sekar. 2017. Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. In Dependable Systems and Networks.  Rui Qiao and R. Sekar. 2017. Function Interface Analysis: A Principled Approach for Function Recognition in COTS Binaries. In Dependable Systems and Networks.","DOI":"10.1109\/DSN.2017.29"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818021"},{"key":"e_1_3_2_1_56_1","unstructured":"Jonathan Salwan. 2012. ROPGadget. http:\/\/shell-storm.org\/project\/ROPgadget. (2012).  Jonathan Salwan. 2012. ROPGadget. http:\/\/shell-storm.org\/project\/ROPgadget. (2012)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_58_1","volume-title":"the 20th conference on USENIX Security Symposium.","author":"Schwartz Edward J.","year":"2011","unstructured":"Edward J. Schwartz , Thanassis Avgerinos , and David Brumley . 2011 . Q: exploit hardening made easy . In the 20th conference on USENIX Security Symposium. Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. 2011. Q: exploit hardening made easy. In the 20th conference on USENIX Security Symposium."},{"key":"e_1_3_2_1_59_1","unstructured":"K. Scott N. Kumar S. Velusamy B. Childers J. Davidson and M. Soffa. 2003. Retargetable and reconfigurable software dynamic translation. In CGO.   K. Scott N. Kumar S. Velusamy B. Childers J. Davidson and M. Soffa. 2003. Retargetable and reconfigurable software dynamic translation. In CGO."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660309"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_63_1","volume-title":"Compiler Internals: Exceptions and RTTI. In Recon.","author":"Skochinsky Igor","year":"2012","unstructured":"Igor Skochinsky . 2012 . Compiler Internals: Exceptions and RTTI. In Recon. Igor Skochinsky. 2012. Compiler Internals: Exceptions and RTTI. In Recon."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Chengyu Song Chao Zhang Tielei Wang Wenke Lee and David Melski. 2015. Exploiting and Protecting Dynamic Code Generation. In NDSS.  Chengyu Song Chao Zhang Tielei Wang Wenke Lee and David Melski. 2015. Exploiting and Protecting Dynamic Code Generation. In NDSS.","DOI":"10.14722\/ndss.2015.23233"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_1_67_1","unstructured":"PaX Team. 2002. PaX SEGMEXEC. Technical Report.  PaX Team. 2002. PaX SEGMEXEC. Technical Report."},{"key":"e_1_3_2_1_68_1","unstructured":"Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security.   Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Victor van der Veen Enes Goktas Moritz Contag Andre Pawlowski Xi Chen Sanjay Rawat Herbert Bos Thorsten Holz Elias Athanasopoulos and Cristiano Giuffrida. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks At The Binary Level. In Security and Privacy.  Victor van der Veen Enes Goktas Moritz Contag Andre Pawlowski Xi Chen Sanjay Rawat Herbert Bos Thorsten Holz Elias Athanasopoulos and Cristiano Giuffrida. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks At The Binary Level. In Security and Privacy.","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897891"},{"key":"e_1_3_2_1_75_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P. Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P. Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and Deployable Continuous Code Re-Randomization. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)."},{"key":"e_1_3_2_1_76_1","volume-title":"Iyer","author":"Xu Jun","year":"2003","unstructured":"Jun Xu , Zbigniew Kalbarczyk , and Ravishankar K . Iyer . 2003 . Transparent Runtime Randomization for Security. Florence, Italy . Jun Xu, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. 2003. Transparent Runtime Randomization for Security. Florence, Italy."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576208"},{"key":"e_1_3_2_1_79_1","unstructured":"Mingwei Zhang and R. Sekar. 2013. Control flow integrity for COTS binaries. In USENIX Security.   Mingwei Zhang and R. Sekar. 2013. Control flow integrity for COTS binaries. In USENIX Security."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818016"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134634","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":78,"alternative-id":["10.1145\/3134600.3134634","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134634","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}