{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:13:09Z","timestamp":1763017989233,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR0011-18-C-0019"],"award-info":[{"award-number":["HR0011-18-C-0019"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304037","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"469-484","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["Morpheus"],"prefix":"10.1145","author":[{"given":"Mark","family":"Gallagher","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Lauren","family":"Biernacki","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Shibo","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Zelalem Birhanu","family":"Aweke","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Salessawi Ferede","family":"Yitbarek","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Misiker Tadesse","family":"Aga","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Austin","family":"Harris","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"given":"Zhixing","family":"Xu","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Baris","family":"Kasikci","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Valeria","family":"Bertacco","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Sharad","family":"Malik","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Mohit","family":"Tiwari","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, Austin, TX, USA"}]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","article-title":"Smashing the stack for fun and profit","author":"One Aleph","year":"1996","unstructured":"Aleph One. 1996. Smashing the stack for fun and profit. Phrack Magazine. Retrieved April 6, 2018 from http:\/\/www.phrack.org\/archives\/49\/P49--14","journal-title":"Phrack Magazine. Retrieved"},{"key":"e_1_3_2_1_3_1","volume-title":"Andes Technology GitHub - riscv-llvm. Retrieved","author":"Tech Andes","year":"2018","unstructured":"Andes Tech. 2017. Andes Technology GitHub - riscv-llvm. Retrieved August 2, 2018 from https:\/\/github.com\/andestech\/riscv-llvm"},{"key":"e_1_3_2_1_4_1","volume-title":"Undefined Behavior Sanitizer. Retrieved Au-gust 6","author":"Apple Corporation","year":"2018","unstructured":"Apple Corporation. 2018. Undefined Behavior Sanitizer. Retrieved Au-gust 6, 2018 from https:\/\/developer.apple.com\/documentation\/code_diagnostics\/undefined_behavior_sanitizer"},{"key":"e_1_3_2_1_5_1","first-page":"1","article-title":"The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes","volume":"2017","author":"Avanzi Roberto","year":"2017","unstructured":"Roberto Avanzi. 2017. The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes. IACR Transactions on Symmetric Cryptology 2017, 1 (Mar. 2017), 4--44.","journal-title":"IACR Transactions on Symmetric Cryptology"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70542-0_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_12_1","unstructured":"blexim. 2002. Basic integer overflows. Phrack Magazine. Retrieved April 6 2018 from http:\/\/phrack.org\/issues\/60\/10.html"},{"volume-title":"2016 IEEE Symposium on Security and Privacy(SP). IEEE Computer Society","author":"Bosman Erik","key":"e_1_3_2_1_13_1","unstructured":"Erik Bosman, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida.2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. In 2016 IEEE Symposium on Security and Privacy(SP). IEEE Computer Society, Washington, DC, USA, 987--1004."},{"key":"e_1_3_2_1_14_1","volume-title":"Real Time Linux Scheduling Comparison. In Embedded Linux Conference 2015 (ELC 15)","author":"Bridgers Vince","year":"2015","unstructured":"Vince Bridgers. 2015. Real Time Linux Scheduling Comparison. In Embedded Linux Conference 2015 (ELC 15). The Linux Foundation,CA.http:\/\/events17.linuxfoundation.org\/sites\/events\/files\/slides\/Real-Time-Linux-Comparison-Bridgers-ELC2015.pdf"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298470"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857726"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251353.1251360"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267336.1267344"},{"volume-title":"Chaos for a Fast, Secure, and Predictable Future. InFun and Interesting Thoughts at the 31st ACMSIGPLAN Conference on Programming Language Design and Imple-mentation (FIT PLDI '10). 2","author":"Criswell John","key":"e_1_3_2_1_20_1","unstructured":"John Criswell and Vikram Adve. 2010. Chaos for a Fast, Secure, and Predictable Future. InFun and Interesting Thoughts at the 31st ACMSIGPLAN Conference on Programming Language Design and Imple-mentation (FIT PLDI '10). 2. http:\/\/pldi10fit.blogspot.com\/2010\/05\/chaos-for-fast-secure-and-predictable.html"},{"key":"e_1_3_2_1_21_1","volume-title":"CVE Details: Vulnerabilities By Type. Retrieved","author":"Type Es","year":"2018","unstructured":"CVEs by Type. 2018. CVE Details: Vulnerabilities By Type. Retrieved April 6, 2018 from https:\/\/www.cvedetails.com\/vulnerabilities-by-types.php"},{"volume-title":"CWE-122: Heap-based Buffer Overflow. Retrieved","year":"2018","key":"e_1_3_2_1_22_1","unstructured":"CWE-122. 2018. CWE-122: Heap-based Buffer Overflow. Retrieved April 6, 2018 from https:\/\/cwe.mitre.org\/data\/definitions\/122.html"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694383"},{"key":"e_1_3_2_1_25_1","volume-title":"Draper Laboratory GitHub - hope-RIPE. Retrieved","author":"Laboratory Draper","year":"2018","unstructured":"Draper Laboratory. 2018. Draper Laboratory GitHub - hope-RIPE. Retrieved April 6, 2018 from https:\/\/github.com\/draperlaboratory\/hope-RIPE"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3195638.3195686"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23271"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771784"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1128020.1128563"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_34_1","volume-title":"Data-Oriented Programming:On the Expressiveness of Non-control Data Attacks. In2016 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society","author":"Hu Hong","year":"2016","unstructured":"Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Pra-teek Saxena, and Zhenkai Liang. 2016. Data-Oriented Programming:On the Expressiveness of Non-control Data Attacks. In2016 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, Washing-ton, DC, USA, 969--986."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134764"},{"key":"e_1_3_2_1_36_1","volume-title":"Heap Overflows and Double-Free Attacks. Retrieved","author":"Huang Yan","year":"2018","unstructured":"Yan Huang. 2016. Heap Overflows and Double-Free Attacks. Retrieved April 6, 2018 from http:\/\/homes.soic.indiana.edu\/yh33\/Teaching\/I433--2016\/lec13-HeapAttacks.pdf"},{"key":"e_1_3_2_1_37_1","unstructured":"Intel Corporation. 2017.Control-flow Enforcement Tech-nology Preview.Retrieved August 6 2018 from https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2038041"},{"key":"e_1_3_2_1_39_1","volume-title":"InProceedings of the Network and Distributed SystemSecurity Symposium 2011 (NDSS '11)","author":"Kang Min Gyung","year":"2011","unstructured":"Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, and Dawn Song. 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. InProceedings of the Network and Distributed SystemSecurity Symposium 2011 (NDSS '11). Internet Society, Reston, VA, USA."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_42_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. CoRRabs\/1801.01203","author":"Kocher Paul","year":"2018","unstructured":"Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2018. Spectre Attacks: Exploiting Speculative Execution. CoRRabs\/1801.01203 (2018). arXiv:1801.01203http:\/\/arxiv.org\/abs\/1801.01203"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685061"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","unstructured":"Chris Lattner and Vikram Adve. 2004. LLVM: A Compilation Frame-work for Lifelong Program Analysis & Transformation. InProceedingsof the International Symposium on Code Generation and Optimization:Feedback-directed and Runtime Optimization (CGO '04). IEEE Computer Society Washington DC USA 75--86.","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_45_1","volume-title":"lowRISC Project.Retrieved","author":"RISC.","year":"2018","unstructured":"lowRISC. 2018. lowRISC Project.Retrieved April 5, 2018 fromhttp:\/\/www.lowrisc.org\/"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23173"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_49_1","volume-title":"National Vulnerability Database. Retrieved","author":"National Institute of Standards and Technology. 2018.","year":"2018","unstructured":"National Institute of Standards and Technology. 2018. National Vulnerability Database. Retrieved April 6, 2018 from https:\/\/nvd.nist.gov"},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the Network and DistributedSystem Security Symposium 2005 (NDSS '05)","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploitson Commodity Software. In Proceedings of the Network and DistributedSystem Security Symposium 2005 (NDSS '05). Internet Society, Reston,VA, USA."},{"volume-title":"2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE Press","author":"Nguyen-Tuong Anh","key":"e_1_3_2_1_51_1","unstructured":"Anh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, and Jack W. Davidson. 2008. Security through redundant data diversity. In 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN). IEEE Press, Piscataway, NJ, USA, 187--196."},{"key":"e_1_3_2_1_52_1","volume-title":"Format string attack. Retrieved","author":"OWASP.","year":"2018","unstructured":"OWASP. 2015. Format string attack. Retrieved April 6, 2018 fromhttps:\/\/www.owasp.org\/index.php\/Format_string_attack"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516670"},{"key":"e_1_3_2_1_54_1","volume-title":"PaX address space layout randomization (ASLR). Retrieved","author":"Team X","year":"2018","unstructured":"PaX Team. 2003. PaX address space layout randomization (ASLR). Retrieved April 6, 2018 from http:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"volume-title":"Technical Report. ETH Zurich, Department of Computer Science, Z\u00fcrich.","author":"Payer Mathias","key":"e_1_3_2_1_55_1","unstructured":"Mathias Payer. 2012.Too much PIE is bad for performance. Technical Report. ETH Zurich, Department of Computer Science, Z\u00fcrich. Technical Reports D-INFK."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the Technical BSD Conference 2005 (BSDCan '05)","author":"Percival Colin","year":"2005","unstructured":"Colin Percival. 2005. Cache missing for fun and profit. In Proceedings of the Technical BSD Conference 2005 (BSDCan '05)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.36"},{"key":"e_1_3_2_1_59_1","unstructured":"riq and gera. 2001. Advances in Format String Exploiting. PhrackMagazine. Retrieved April 6 2018 from http:\/\/phrack.org\/issues\/59\/7.html"},{"key":"e_1_3_2_1_60_1","volume-title":"Editors","author":"Instruction Set Manual RISC-V","year":"2017","unstructured":"RISC-V Foundation 2017.The RISC-V Instruction Set Manual, Volume I:User-Level ISA, Document Version 2.2. RISC-V Foundation, Berkeley, CA, USA. Editors Andrew Waterman and Krste Asanovic. May 2017."},{"key":"e_1_3_2_1_61_1","volume-title":"Stan","author":"Roelke Alec","year":"2017","unstructured":"Alec Roelke and Mircea R. Stan. 2017. RISC5: Implementing the RISC-V ISA in gem5. In Proceedings of Computer Architecture Research in RISC-V(14)(CARRV '17). 7."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/L-CA.2011.4"},{"volume-title":"rv8.io GitHub - musl-riscv. Retrieved","year":"2018","key":"e_1_3_2_1_64_1","unstructured":"rv8. 2018. rv8.io GitHub - musl-riscv. Retrieved August 2, 2018 from https:\/\/github.com\/rv8-io\/musl-riscv"},{"key":"e_1_3_2_1_65_1","unstructured":"Fermin J. Serna. 2012. The info leak era on software exploitation. In Black Hat USA."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_1_67_1","volume-title":"Retrieved","author":"Shvets Gennadiy","year":"2018","unstructured":"Gennadiy Shvets. 2018. Enhanced Virus Protection \/ Execute Disable Bit. Retrieved January 24, 2019 from http:\/\/www.cpu-world.com\/Glossary\/E\/EVP_XD.html"},{"volume-title":"Reviving instruction set randomization. In 2017 IEEE InternationalSymposium on Hardware Oriented Security and Trust (HOST)","author":"Sinha Kanad","key":"e_1_3_2_1_68_1","unstructured":"Kanad Sinha, Vasileios P. Kemerlis, and Simha Sethumadhavan. 2017. Reviving instruction set randomization. In 2017 IEEE InternationalSymposium on Hardware Oriented Security and Trust (HOST). IEEE Press, Piscataway, NJ, USA, 21--28."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_70_1","unstructured":"Solar Designer. 1997. lpr LIBC RETURN exploit. Retrieved April 6 2018 from http:\/\/insecure.org\/sploits\/linux.libc.return.lpr.sploit.html"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/THS.2017.7943502"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_75_1","volume-title":"Breaking Active-Set Backward-Edge CFI. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE Press","author":"Theodorides Michael","year":"2017","unstructured":"Michael Theodorides and David Wagner. 2017. Breaking Active-Set Backward-Edge CFI. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE Press, Piscataway, NJ, USA, 85--89."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2009.38"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.20"},{"volume-title":"Technical Report","author":"Venkataraman Aditya","key":"e_1_3_2_1_78_1","unstructured":"Aditya Venkataraman and Kishore Kumar Jagadeesha. 2015.Evaluation of Inter-Process Communication Mechanisms. Technical Report. University of Wisconsin-Madison, Madison, WI, USA."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586145"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2349896.2349905"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076739"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026906"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665740"},{"key":"e_1_3_2_1_85_1","unstructured":"James Yonan. 2010. OpenVPN 2.0.x man pages.Re-trieved April 6 2018 from https:\/\/openvpn.net\/index.php\/open-source\/documentation\/manuals\/65-openvpn-20x-manpage.html"}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Providence RI USA","acronym":"ASPLOS '19"},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304037","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304037","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:14Z","timestamp":1750204394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304037"}},"subtitle":["A Vulnerability-Tolerant Secure Architecture Based on Ensembles of Moving Target Defenses with Churn"],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":83,"alternative-id":["10.1145\/3297858.3304037","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304037","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}