{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:00:10Z","timestamp":1773511210158,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ONR bft","award":["N00014-15-1-2162"],"award-info":[{"award-number":["N00014-15-1-2162"]}]},{"name":"DARPA Transparent Computing program","award":["DARPA-15-15-TC-FP006"],"award-info":[{"award-number":["DARPA-15-15-TC-FP006"]}]},{"name":"ONR Protocol Debloating","award":["N00014-18-1-2662"],"award-info":[{"award-number":["N00014-18-1-2662"]}]},{"name":"ONR OS Debloating","award":["N00014-17-1-2895"],"award-info":[{"award-number":["N00014-17-1-2895"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243797","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1470-1486","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Enforcing Unique Code Target Property for Control-Flow Integrity"],"prefix":"10.1145","author":[{"given":"Hong","family":"Hu","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Chenxiong","family":"Qian","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Carter","family":"Yagemann","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Simon Pak Ho","family":"Chung","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"William R.","family":"Harris","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology &amp; Galois Inc., Atlanta, GA, USA"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_2_2_1","first-page":"2016","volume":"201","unstructured":"Ali Juanquan. 201 7. FFmpeg CVE- 2016 -- 10191 . http:\/\/www.freebuf.com\/vuls\/148389.html. Ali Juanquan. 2017. FFmpeg CVE-2016--10191. http:\/\/www.freebuf.com\/vuls\/148389.html.","journal-title":"Ali Juanquan."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium.","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan N\u00fcrnberger . 2014 . Oxymoron: Making Fine-grained Memory Randomization Practical by Allowing Code Sharing . In Proceedings of the 23rd USENIX Conference on Security Symposium. Michael Backes and Stefan N\u00fcrnberger. 2014. Oxymoron: Making Fine-grained Memory Randomization Practical by Allowing Code Sharing. In Proceedings of the 23rd USENIX Conference on Security Symposium."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_2_6_1","unstructured":"bird. 2017. CVE-2016--10190 FFmpeg Heap Overflow. https:\/\/security.tencent.com\/index.php\/blog\/msg\/116.  bird. 2017. CVE-2016--10190 FFmpeg Heap Overflow. https:\/\/security.tencent.com\/index.php\/blog\/msg\/116."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.23"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the 24th USENIX Security Symposium.","author":"Carlini Nicholas","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R. Gross . 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity . In Proceedings of the 24th USENIX Security Symposium. Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proceedings of the 24th USENIX Security Symposium."},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium.","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner . 2014 . ROP is Still Dangerous: Breaking Modern Defenses . In Proceedings of the 23rd USENIX Conference on Security Symposium. Nicholas Carlini and David Wagner. 2014. ROP is Still Dangerous: Breaking Modern Defenses. In Proceedings of the 23rd USENIX Conference on Security Symposium."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267308.1267319"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 14th USENIX Security Symposium.","author":"Chen Shuo","unstructured":"Shuo Chen , Jun Xu , Emre C. Sezer , Prachi Gauriar , and Ravishankar K. Iyer . 2005. Non-Control-Data Attacks Are Realistic Threats . In Proceedings of the 14th USENIX Security Symposium. Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer. 2005. Non-Control-Data Attacks Are Realistic Threats. In Proceedings of the 14th USENIX Security Symposium."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_2_18_1","volume-title":"Proceedings of the 26th USENIX Security Symposium.","author":"Dang Thurston H.Y.","year":"2017","unstructured":"Thurston H.Y. Dang , Petros Maniatis , and David Wagner . 2017 . Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers . In Proceedings of the 26th USENIX Security Symposium. Thurston H.Y. Dang, Petros Maniatis, and David Wagner. 2017. Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. In Proceedings of the 26th USENIX Security Symposium."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23262"},{"key":"e_1_3_2_2_20_1","unstructured":"dctf. 2017. sploit.php. https:\/\/github.com\/dctf\/exploits\/blob\/master\/CVE-2015--8617\/sploit.php.  dctf. 2017. sploit.php. https:\/\/github.com\/dctf\/exploits\/blob\/master\/CVE-2015--8617\/sploit.php."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241201"},{"key":"e_1_3_2_2_22_1","unstructured":"Aeon Flux. 2013. sudo 1.8.0 < 1.8.3p1 - 'sudo_debug' glibc FORTIFY_SOURCE Bypass  Aeon Flux. 2013. sudo 1.8.0 < 1.8.3p1 - 'sudo_debug' glibc FORTIFY_SOURCE Bypass"},{"key":"e_1_3_2_2_23_1","unstructured":"Privilege Escalation. https:\/\/www.exploit-db.com\/exploits\/25134\/.  Privilege Escalation. https:\/\/www.exploit-db.com\/exploits\/25134\/."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037716"},{"key":"e_1_3_2_2_25_1","unstructured":"Xinyang Ge Weidong Cui and Trent Jaeger. 2017. Griffin Trace. https:\/\/github.com\/TJAndHisStudents\/Griffin-Trace.  Xinyang Ge Weidong Cui and Trent Jaeger. 2017. Griffin Trace. https:\/\/github.com\/TJAndHisStudents\/Griffin-Trace."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the 25th USENIX Security Symposium.","author":"Enes G\u00f6ktac","year":"2016","unstructured":"Enes G\u00f6ktac s, Robert Gawlik , Benjamin Kollenda , Elias Athanasopoulos , Georgios Portokalidis , Cristiano Giuffrida , and Herbert Bos . 2016 . Undermining Information Hiding (and What to Do about It) . In Proceedings of the 25th USENIX Security Symposium. Enes G\u00f6ktac s, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, and Herbert Bos. 2016. Undermining Information Hiding (and What to Do about It). In Proceedings of the 25th USENIX Security Symposium."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23271"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference.","author":"Guo Fan","unstructured":"Fan Guo , Yongkun Li , Yinlong Xu , Song Jiang , and John C. S. Lui . 2017. SmartMD: A High Performance Deduplication Engine with Mixed Pages . In Proceedings of the 2017 USENIX Annual Technical Conference. Fan Guo, Yongkun Li, Yinlong Xu, Song Jiang, and John C. S. Lui. 2017. SmartMD: A High Performance Deduplication Engine with Mixed Pages. In Proceedings of the 2017 USENIX Annual Technical Conference."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978405"},{"key":"e_1_3_2_2_32_1","unstructured":"Michael Hicks. 2014. What is memory safety? http:\/\/www.pl-enthusiast.net\/2014\/07\/21\/memory-safety\/.  Michael Hicks. 2014. What is memory safety? http:\/\/www.pl-enthusiast.net\/2014\/07\/21\/memory-safety\/."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_2_34_1","unstructured":"Intel. 2016. Intel Releases New Technology Specifications to Protect Against ROP attacks. https:\/\/software.intel.com\/en-us\/blogs\/2016\/06\/09\/intel-release-new-technology-specifications-protect-rop-attacks.  Intel. 2016. Intel Releases New Technology Specifications to Protect Against ROP attacks. https:\/\/software.intel.com\/en-us\/blogs\/2016\/06\/09\/intel-release-new-technology-specifications-protect-rop-attacks."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516704"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the USENIX Annual Technical Conference.","author":"Jim Trevor","year":"2002","unstructured":"Trevor Jim , J. Greg Morrisett , Dan Grossman , Michael W. Hicks , James Cheney , and Yanling Wang . 2002 . Cyclone: A Safe Dialect of C . In Proceedings of the USENIX Annual Technical Conference. Trevor Jim, J. Greg Morrisett, Dan Grossman, Michael W. Hicks, James Cheney, and Yanling Wang. 2002. Cyclone: A Safe Dialect of C. In Proceedings of the USENIX Annual Technical Conference."},{"key":"e_1_3_2_2_37_1","volume-title":"Code-pointer Integrity. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation.","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov , L\u00e1szl\u00f3 Szekeres , Mathias Payer , George Candea , R. Sekar , and Dawn Song . 2014 . Code-pointer Integrity. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation. Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song. 2014. Code-pointer Integrity. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23238"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 24th USENIX Security Symposium.","author":"Lee Byoungyoung","year":"2015","unstructured":"Byoungyoung Lee , Chengyu Song , Taesoo Kim , and Wenke Lee . 2015 b. Type Casting Verification: Stopping an Emerging Attack Vector . In Proceedings of the 24th USENIX Security Symposium. Byoungyoung Lee, Chengyu Song, Taesoo Kim, and Wenke Lee. 2015b. Type Casting Verification: Stopping an Emerging Attack Vector. In Proceedings of the 24th USENIX Security Symposium."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23173"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813694"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings of the 2013 USENIX Annual Technical Conference.","author":"Miller Konrad","year":"2013","unstructured":"Konrad Miller , Fabian Franz , Marc Rittinghaus , Marius Hillenbrand , and Frank Bellosa . 2013 . XLH: More Effective Memory Deduplication Scanners Through Cross-layer Hints . In Proceedings of the 2013 USENIX Annual Technical Conference. Konrad Miller, Fabian Franz, Marc Rittinghaus, Marius Hillenbrand, and Frank Bellosa. 2013. XLH: More Effective Memory Deduplication Scanners Through Cross-layer Hints. In Proceedings of the 2013 USENIX Annual Technical Conference."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_2_46_1","unstructured":"Nergal. 2001. The Advanced Return-into-lib(c) Exploits. http:\/\/phrack.org\/issues\/58\/4.html.  Nergal. 2001. The Advanced Return-into-lib(c) Exploits. http:\/\/phrack.org\/issues\/58\/4.html."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241105"},{"key":"e_1_3_2_2_51_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium.","author":"Pappas Vasilis","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos D. Keromytis . 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing . In Proceedings of the 22nd USENIX Security Symposium. Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In Proceedings of the 22nd USENIX Security Symposium."},{"key":"e_1_3_2_2_52_1","unstructured":"PaX Team. 2003. PaX Address Space Layout Randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt.  PaX Team. 2003. PaX Address Space Layout Randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt."},{"key":"e_1_3_2_2_53_1","unstructured":"Tristan Ravitch. 2017. Whole Program LLVM. https:\/\/github.com\/travitch\/whole-program-llvm.  Tristan Ravitch. 2017. Whole Program LLVM. https:\/\/github.com\/travitch\/whole-program-llvm."},{"key":"e_1_3_2_2_54_1","unstructured":"relax Karlsruhe Institute of Technology. 2016. Exploitation Training -- CVE-2013--2028: Nginx Stack Based Buffer Overflow. https:\/\/github.com\/kitctf\/nginxpwn.  relax Karlsruhe Institute of Technology. 2016. Exploitation Training -- CVE-2013--2028: Nginx Stack Based Buffer Overflow. https:\/\/github.com\/kitctf\/nginxpwn."},{"key":"e_1_3_2_2_55_1","unstructured":"relax Tencent Xuanwu Lab. 2016. Return Flow Guard. http:\/\/xlab.tencent.com\/en\/2016\/11\/02\/return-flow-guard\/.  relax Tencent Xuanwu Lab. 2016. Return Flow Guard. http:\/\/xlab.tencent.com\/en\/2016\/11\/02\/return-flow-guard\/."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_2_57_1","volume-title":"Proceedings of the 36th IEEE Symposium on Security and Privacy.","unstructured":"Applications. In Proceedings of the 36th IEEE Symposium on Security and Privacy. Applications. In Proceedings of the 36th IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"e_1_3_2_2_61_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-edge Control-flow Integrity in GCC & LLVM . In Proceedings of the 23rd USENIX Security Symposium. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-edge Control-flow Integrity in GCC & LLVM. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064211"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_2_65_1","unstructured":"w00d. 2013. Analysis of nginx 1.3.9\/1.4.0 stack buffer overflow and x64 exploitation (CVE-2013--2028). http:\/\/www.vnsecurity.net\/research\/2013\/05\/21\/analysis-of-nginx-cve-2013--2028.html.  w00d. 2013. Analysis of nginx 1.3.9\/1.4.0 stack buffer overflow and x64 exploitation (CVE-2013--2028). http:\/\/www.vnsecurity.net\/research\/2013\/05\/21\/analysis-of-nginx-cve-2013--2028.html."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_2_67_1","volume-title":"Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks.","author":"Xia Yubin","year":"2012","unstructured":"Yubin Xia , Yutao Liu , Haibo Chen , and Binyu Zang . 2012 . CFIMon: Detecting Violation of Control Flow Integrity Using Performance Counters . In Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. 2012. CFIMon: Detecting Violation of Control Flow Integrity Using Performance Counters. In Proceedings of the 42nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23190"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755707"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_2_71_1","volume-title":"Proceedings of the 22nd USENIX Security Symposium.","author":"Zhang Mingwei","unstructured":"Mingwei Zhang and R. Sekar . 2013. Control Flow Integrity for COTS Binaries . In Proceedings of the 22nd USENIX Security Symposium. Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the 22nd USENIX Security Symposium."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":71,"alternative-id":["10.1145\/3243734.3243797","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243797","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}