{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:28Z","timestamp":1750221148347,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,14]],"date-time":"2018-10-14T00:00:00Z","timestamp":1539475200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["780351 (ENACT)"],"award-info":[{"award-number":["780351 (ENACT)"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["270933 (DiversIoT)"],"award-info":[{"award-number":["270933 (DiversIoT)"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,14]]},"DOI":"10.1145\/3239372.3239393","type":"proceedings-article","created":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T12:21:55Z","timestamp":1538655715000},"page":"155-165","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Engineering Software Diversity"],"prefix":"10.1145","author":[{"given":"Brice","family":"Morin","sequence":"first","affiliation":[{"name":"SINTEF Digital, Oslo, Norway"}]},{"given":"Jakob","family":"H\u00f8genes","sequence":"additional","affiliation":[{"name":"SINTEF Digital, Oslo, Norway"}]},{"given":"Hui","family":"Song","sequence":"additional","affiliation":[{"name":"SINTEF Digital, Oslo, Norway"}]},{"given":"Nicolas","family":"Harrand","sequence":"additional","affiliation":[{"name":"KTH, Stockholm, Sweden"}]},{"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2018,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807593"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_3_1","first-page":"472","volume-title":"Compiler-assisted Code Randomization. In 2018 IEEE Symposium on Security and Privacy (SP)","volume":"00","author":"Koo H.","year":"2018","unstructured":"H. Koo , Y. Chen , L. Lu , V. P. Kemerlis , and M. Polychronakis . Compiler-assisted Code Randomization. In 2018 IEEE Symposium on Security and Privacy (SP) , volume 00 , pages 472 -- 488 , 2018 . H. Koo, Y. Chen, L. Lu, V. P. Kemerlis, and M. Polychronakis. Compiler-assisted Code Randomization. In 2018 IEEE Symposium on Security and Privacy (SP), volume 00, pages 472--488, 2018."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2015.29"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073289"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"e_1_3_2_1_7_1","first-page":"318","volume-title":"2017 IEEE 2nd International Workshops on","author":"Shao Sicong","year":"2017","unstructured":"Sicong Shao , Cihan Tunc , Pratik Satam , and Salim Hariri . Real-Time IRC Threat Detection Framework. In Foundations and Applications of Self* Systems (FAS* W) , 2017 IEEE 2nd International Workshops on , pages 318 -- 323 . IEEE, 2017 . Sicong Shao, Cihan Tunc, Pratik Satam, and Salim Hariri. Real-Time IRC Threat Detection Framework. In Foundations and Applications of Self* Systems (FAS* W), 2017 IEEE 2nd International Workshops on, pages 318--323. IEEE, 2017."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2017.11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.137"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976767.2976812"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2050655.2050689"},{"key":"e_1_3_2_1_13_1","first-page":"63","volume-title":"USENIX Security Symposium","volume":"98","author":"Cowan Crispan","year":"1998","unstructured":"Crispan Cowan , Calton Pu , Dave Maier , Jonathan Walpole , Peat Bakke , Steve Beattie , Aaron Grier , Perry Wagle , Qian Zhang , and Heather Hinton . Stackguard : Automatic adaptive detection and prevention of buffer-overflow attacks . In USENIX Security Symposium , volume 98 , pages 63 -- 78 . San Antonio, TX , 1998 . Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton. Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks. In USENIX Security Symposium, volume 98, pages 63--78. San Antonio, TX, 1998."},{"key":"e_1_3_2_1_14_1","first-page":"91","volume-title":"Proceedings of the 12th conference on USENIX Security Symposium","volume":"12","author":"Cowan Crispin","year":"2003","unstructured":"Crispin Cowan , Steve Beattie , John Johansen , and Perry Wagle . Pointguard TM : protecting pointers from buffer overflow vulnerabilities . In Proceedings of the 12th conference on USENIX Security Symposium , volume 12 , pages 91 -- 104 , 2003 . Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. Pointguard TM: protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th conference on USENIX Security Symposium, volume 12, pages 91--104, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659532.2659642"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948149"},{"key":"e_1_3_2_1_19_1","first-page":"275","volume-title":"Gregory R Andrews. Binary Obfuscation Using Signals. In USENIX Security Symposium","author":"Popov Igor V","year":"2007","unstructured":"Igor V Popov , Saumya K Debray , and Gregory R Andrews. Binary Obfuscation Using Signals. In USENIX Security Symposium , pages 275 -- 290 , 2007 . Igor V Popov, Saumya K Debray, and Gregory R Andrews. Binary Obfuscation Using Signals. In USENIX Security Symposium, pages 275--290, 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2016.01.003"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382210"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCCS.2015.7374189"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2821404.2821414"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i1.307-328"},{"key":"e_1_3_2_1_27_1","first-page":"19","volume-title":"Proceedings of the 11th Annual Symposium On Information Assurance. NYS Cyber Security Conference","author":"Persaud Bheesham","year":"2016","unstructured":"Bheesham Persaud , Borke Obada-Obieh , Nilofar Mansourzadeh , Ashley Moni , and Anil Somayaji . Frankenssl : Recombining cryptographic libraries for software diversity . In Proceedings of the 11th Annual Symposium On Information Assurance. NYS Cyber Security Conference , pages 19 -- 25 , 2016 . Bheesham Persaud, Borke Obada-Obieh, Nilofar Mansourzadeh, Ashley Moni, and Anil Somayaji. Frankenssl: Recombining cryptographic libraries for software diversity. In Proceedings of the 11th Annual Symposium On Information Assurance. NYS Cyber Security Conference, pages 19--25, 2016."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"}],"event":{"name":"MODELS '18: ACM\/IEEE 21th International Conference on Model Driven Engineering Languages and Systems","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Copenhagen Denmark","acronym":"MODELS '18"},"container-title":["Proceedings of the 21th ACM\/IEEE International Conference on Model Driven Engineering Languages and Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3239372.3239393","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3239372.3239393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:19Z","timestamp":1750208899000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3239372.3239393"}},"subtitle":["a Model-Based Approach to Systematically Diversify Communications"],"short-title":[],"issued":{"date-parts":[[2018,10,14]]},"references-count":28,"alternative-id":["10.1145\/3239372.3239393","10.1145\/3239372"],"URL":"https:\/\/doi.org\/10.1145\/3239372.3239393","relation":{},"subject":[],"published":{"date-parts":[[2018,10,14]]},"assertion":[{"value":"2018-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}