{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T07:32:24Z","timestamp":1769844744781,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","award":["1138109"],"award-info":[{"award-number":["1138109"]}],"id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["786669"],"award-info":[{"award-number":["786669"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["639.021.753"],"award-info":[{"award-number":["639.021.753"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304054","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"559-572","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["kMVX"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"\u00d6sterlund","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Koen","family":"Koning","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Pierre","family":"Olivier","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Antonio","family":"Barbalace","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1929820.1929836"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629579"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"D. Bruschi L. Cavallaro and A. Lanzi. 2007. Diversified Process Replicae for Defeating Memory Error Exploits. In IPCCC.","DOI":"10.1109\/PCCC.2007.358924"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"Haogang Chen Yandong Mao Xi Wang Dong Zhou Nickolai Zeldovich and M. Frans Kaashoek. 2011. Linux kernel vulnerabilities: State-of-the-art defenses and open problems. In ApSys. 10.1145\/2103799.2103805","DOI":"10.1145\/2103799.2103805"},{"key":"e_1_3_2_1_6_1","unstructured":"Liming Chen and Algirdas Avizienis. 1978. N-Version programming: A Fault-Tolerance Approach to Reliability of Software Operation. In FTCS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267336.1267344"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","unstructured":"S. Forrest A. Somayaji and D. Ackley. 1997. Building Diverse Computer Systems. In HotOS.","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40667-1_16"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362833"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Petr Hosek and Cristian Cadar. 2015. VARAN the Unbelievable: An Efficient N-version Execution Framework. In ASPLOS. 10.1145\/2694344.2694390","DOI":"10.1145\/2694344.2694390"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671286"},{"key":"e_1_3_2_1_14_1","unstructured":"The Linux Kernel. 2007. Getting started with kmemcheck. https:\/\/www.kernel.org\/doc\/Documentation\/dev-tools\/kmemcheck.rst. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_15_1","unstructured":"The Linux Kernel. 2015. The Kernel Address Sanitizer (KASAN). https:\/\/www.kernel.org\/doc\/Documentation\/dev-tools\/kasan.rst. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_16_1","unstructured":"The kernel development community. 2018a. Coccinelle. https:\/\/static.lwn.net\/kerneldoc\/dev-tools\/coccinelle.html. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_17_1","unstructured":"The kernel development community. 2018b. Sparse. https:\/\/static.lwn.net\/kerneldoc\/dev-tools\/sparse.html. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Dohyeong Kim Yonghwi Kwon William N. Sumner Xiangyu Zhang and Dongyan Xu. 2015. Dual Execution for On the Fly Fine Grained Execution Comparison. In ASPLOS. 10.1145\/2694344.2694394","DOI":"10.1145\/2694344.2694394"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Koen Koning Herbert Bos and Cristiano Giuffrida. 2016. Secure and Efficient Multi-Variant Execution Using Hardware-Assisted Process Virtualization. In DSN.","DOI":"10.1109\/DSN.2016.46"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","unstructured":"Koen Koning Xi Chen Herbert Bos Cristiano Giuffrida and Elias Athanasopoulos. 2017. No Need to Hide: Protecting Safe Regions on Commodity Hardware. In EuroSys. 10.1145\/3064176.3064217","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_21_1","unstructured":"Greg Kroah-Hartman. 2018. The Linux Kernel Driver Interface. https:\/\/www.kernel.org\/doc\/Documentation\/process\/stable-api-nonsense.rst. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","unstructured":"Anil Kurmus and Robby Zippel. 2014. A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel. In CCS. 10.1145\/2660267.2660331","DOI":"10.1145\/2660267.2660331"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872395"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","unstructured":"Per Larsen Andrei Homescu Stefan Brunthaler and Michael Franz. 2014. SoK: Automated Software Diversity. In S&P. 10.1109\/SP.2014.25","DOI":"10.1109\/SP.2014.25"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Giuliano Losa Antonio Barbalace Yuzhong Wen Marina Sadini Ho-Ren Chuang and Binoy Ravindran. 2017. Transparent Fault-Tolerance using Intra-Machine Full-Software-Stack Replication on Commodity Multicore Hardware. In ICDCS.","DOI":"10.1109\/ICDCS.2017.140"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Kangjie Lu Chengyu Song Taesoo Kim and Wenke Lee. 2016. UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages. In CCS. 10.1145\/2976749.2978366","DOI":"10.1145\/2976749.2978366"},{"key":"e_1_3_2_1_27_1","unstructured":"Kangjie Lu Marie-Therese Walter David Pfaff Stefan N\u00fcrnberger Wenke Lee and Michael Backes. 2017. Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying. In NDSS."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Alyssa Milburn Herbert Bos and Cristiano Giuffrida. 2017. SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. In NDSS.","DOI":"10.14722\/ndss.2017.23183"},{"key":"e_1_3_2_1_29_1","unstructured":"Ingo Molnar. 2015. fs\/proc core\/debug: Don't expose absolute kernel addresses via wchan. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=b2f73922d119686323f14fbbe46587f863852328. Accessed: 2018-01--30."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.53354"},{"key":"e_1_3_2_1_31_1","volume-title":"Christof Fetzer, and William Okelo-Odongo.","author":"Okech Peter","year":"2013","unstructured":"Peter Okech, Nicholas Mc Guire, Christof Fetzer, and William Okelo-Odongo. 2013. Investigating execution path non-determinism in the Linux kernel. In OSADL."},{"key":"e_1_3_2_1_32_1","unstructured":"Serkan \u00d6zkan. 2017a. CVE Details Linux Kernel. https:\/\/www.cvedetails.com\/product\/47\/Linux-Linux-Kernel.html?vendor_id=33. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_33_1","unstructured":"Serkan \u00d6zkan. 2017b. Linux Kernel : Security Vulnerabilities Published In 2017 (Gain Information). https:\/\/www.cvedetails.com\/vulnerability-list.php?vendor_id=33&product_id=47&opginf=1&year=2017. Accessed: 2018-04--30."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241203"},{"key":"e_1_3_2_1_35_1","volume-title":"M. Masmano, and A. Crespo.","author":"Peir\u00f3 S.","year":"2014","unstructured":"S. Peir\u00f3, M. Mu n oz, M. Masmano, and A. Crespo. 2014. Detecting Stack based kernel Information leaks. In CISIS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304063"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Luis Pina Daniel Grumberg Anastasios Andronidis and Cristian Cadar. 2017. A DSL Approach to Reconcile Equivalent Divergent Program Executions. In USENIX ATC.","DOI":"10.5555\/3154690.3154730"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064216"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Sergej Schumilo Cornelius Aschermann Robert Gawlik Sebastian Schinzel and Thorsten Holz. 2017. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. In USENIX Security.","DOI":"10.5555\/3241189.3241204"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX ATC.","DOI":"10.5555\/2342821.2342849"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Dannie M Stanley Dongyan Xu and Eugene H Spafford. 2013. Improved kernel security through memory layout randomization. In IPCCC.","DOI":"10.1109\/PCCC.2013.6742768"},{"key":"e_1_3_2_1_44_1","unstructured":"stress-ng team. 2018. stress-ng: a tool to load and stress a computer system. http:\/\/kernel.ubuntu.com\/ cking\/stress-ng\/. Accessed: 2018-04--30."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","unstructured":"Laszlo Szekeres Mathias Payer Tao Wei and Dawn Song. 2013. SoK: Eternal War in Memory. In S&P. 10.1109\/SP.2013.13","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_46_1","unstructured":"The PaX Team. 2017. Grsecurity and PaX Configuration Options. https:\/\/en.wikibooks.org\/wiki\/Grsecurity\/Appendix\/Grsecurity_and_PaX_Configuration_Options. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_47_1","unstructured":"The PaX Team. 2018. PaX - gcc plugins galore. https:\/\/pax.grsecurity.net\/docs\/PaXTeam-H2HC13-PaX-gcc-plugins.pdf. Accessed: 2018-01--22."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"Erik van der Kouwe Taddeus Kroes Chris Ouwehand Herbert Bos and Cristiano Giuffrida. 2018. Type-After-Type: Practical and Complete Type-Safe Memory Reuse. In ACSAC. 10.1145\/3274694.3274705","DOI":"10.1145\/3274694.3274705"},{"key":"e_1_3_2_1_49_1","unstructured":"Maxime Villard. 2017. Kernel address space layout randomization. https:\/\/blog.netbsd.org\/tnf\/entry\/kernel_aslr_on_amd64. Accessed: 2018-02-05."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2411254"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026959.3026976"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37119-6_17"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","unstructured":"Wen Xu Juanru Li Junliang Shu Wenbo Yang Tianyi Xie Yuanyuan Zhang and Dawu Gu. 2015. From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. In CCS. 10.1145\/2810103.2813637","DOI":"10.1145\/2810103.2813637"}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","location":"Providence RI USA","acronym":"ASPLOS '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304054","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:15Z","timestamp":1750204395000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304054"}},"subtitle":["Detecting Kernel Information Leaks with Multi-variant Execution"],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":51,"alternative-id":["10.1145\/3297858.3304054","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304054","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}