{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:41Z","timestamp":1750221281594,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8750-17-2-0079,FA8750-15-C-0118,FA8750-14-C-0110"],"award-info":[{"award-number":["FA8750-17-2-0079,FA8750-15-C-0118,FA8750-14-C-0110"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3140549.3140551","type":"proceedings-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:31:37Z","timestamp":1509453097000},"page":"27-37","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Mixr"],"prefix":"10.1145","author":[{"given":"William","family":"Hawkins","sequence":"first","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Anh","family":"Nguyen-Tuong","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Jason D.","family":"Hiser","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Michele","family":"Co","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Jack W.","family":"Davidson","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_3_1","volume-title":"Interpreter Exploitation. In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10)","author":"Blazakis Dionysus","year":"2010","unstructured":"Dionysus Blazakis . 2010 . Interpreter Exploitation. In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10) . USENIX Association, Berkeley, CA, USA, 1--9. Dionysus Blazakis. 2010. Interpreter Exploitation. In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10). USENIX Association, Berkeley, CA, USA, 1--9."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.17"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857726"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0050"},{"volume-title":"Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. In 2015 Network and Distributed System Security","author":"Crane Stephen","key":"e_1_3_2_1_7_1","unstructured":"Stephen Crane , Andrei Homescu , Stefan Brunthaler , Per Larsen , and Michael Fraz . 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. In 2015 Network and Distributed System Security . Internet Society , San Diego, CA . https:\/\/www.sba-research.org\/wp-content\/uploads\/publications\/ndss15b.pdf Stephen Crane, Andrei Homescu, Stefan Brunthaler, Per Larsen, and Michael Fraz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. In 2015 Network and Distributed System Security. Internet Society, San Diego, CA. https:\/\/www.sba-research.org\/wp-content\/uploads\/publications\/ndss15b.pdf"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451141"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484351"},{"key":"e_1_3_2_1_12_1","first-page":"3","article-title":"Chronomorphic Programs: Runtime Diversity Prevents Exploits and Reconnaissance","volume":"8","author":"Friedman Scott","year":"2015","unstructured":"Scott Friedman , David Musliner , and Peter Keller . 2015 . Chronomorphic Programs: Runtime Diversity Prevents Exploits and Reconnaissance . International Journal on Advances in Security 8 , 3 - 4 (2015), 120--192. Scott Friedman, David Musliner, and Peter Keller. 2015. Chronomorphic Programs: Runtime Diversity Prevents Exploits and Reconnaissance. International Journal on Advances in Security 8, 3-4 (2015), 120--192.","journal-title":"International Journal on Advances in Security"},{"key":"e_1_3_2_1_13_1","volume-title":"Tanenbaum","author":"Giuffrida Cristiano","year":"2012","unstructured":"Cristiano Giuffrida , Anton Kuijsten , and Andrew S . Tanenbaum . 2012 . Enhanced operating system security through efficient and fine-grained address space randomization. (2012), 475--490 pages. Cristiano Giuffrida, Anton Kuijsten, and Andrew S. Tanenbaum. 2012. Enhanced operating system security through efficient and fine-grained address space randomization. (2012), 475--490 pages."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2345384"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.27"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663474.2663480"},{"key":"e_1_3_2_1_17_1","volume-title":"Advances in Information Security","volume":"54","author":"Jajodia Sushil","year":"2011","unstructured":"Sushil Jajodia , Anup K. Ghosh , Vipin Swarup , Cliff Wang , and X. Sean Wang ( Eds .). 2011 . Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats . Advances in Information Security , Vol. 54 . Springer New York, New York, NY. Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang (Eds.). 2011. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security, Vol. 54. Springer New York, New York, NY."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.34"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2990483"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23173"},{"key":"e_1_3_2_1_24_1","volume-title":"Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. In 2012 IEEE Symposium on Security and Privacy. IEEE, 601--615","author":"Pappas Vasilis","year":"2012","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos D. Keromytis . 2012 . Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. In 2012 IEEE Symposium on Security and Privacy. IEEE, 601--615 . https:\/\/doi.org\/10.1109\/SP. 2012 .41 10.1109\/SP.2012.41 Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. 2012. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization. In 2012 IEEE Symposium on Security and Privacy. IEEE, 601--615. https:\/\/doi.org\/10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_25_1","unstructured":"Pax Team. 2003. PaX ASLR Design and Implementation. (2003). https:\/\/pax.grsecurity.net\/docs\/aslr.txt  Pax Team. 2003. PaX ASLR Design and Implementation. (2003). https:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16)","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P. Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P. Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and Deployable Continuous Code Re-randomization . In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16) . USENIX Association, Berkeley, CA, USA, 367--382. David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-randomization. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16). USENIX Association, Berkeley, CA, USA, 367--382."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141364"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 22nd International Symposium on Reliable Distributed Systems (SRDS'06)","author":"Xu Jun","year":"2003","unstructured":"Jun Xu , Z. Kalbarczyk , and R.K. Iyer . 2006. Transparent runtime randomization for security . In Proceedings of the 22nd International Symposium on Reliable Distributed Systems (SRDS'06) . IEEE Comput. Soc, 260--269. https:\/\/doi.org\/10.1109\/RELDIS. 2003 .1238076 10.1109\/RELDIS.2003.1238076 Jun Xu, Z. Kalbarczyk, and R.K. Iyer. 2006. Transparent runtime randomization for security. In Proceedings of the 22nd International Symposium on Reliable Distributed Systems (SRDS'06). IEEE Comput. Soc, 260--269. https:\/\/doi.org\/10.1109\/RELDIS.2003.1238076"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140551","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140551","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3140549.3140551","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:20Z","timestamp":1750212680000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3140549.3140551"}},"subtitle":["Flexible Runtime Rerandomization for Binaries"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":29,"alternative-id":["10.1145\/3140549.3140551","10.1145\/3140549"],"URL":"https:\/\/doi.org\/10.1145\/3140549.3140551","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}