{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:35Z","timestamp":1763507735758,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T00:00:00Z","timestamp":1554336000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["No. 786669 (ReAct)"],"award-info":[{"award-number":["No. 786669 (ReAct)"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1- 2782"],"award-info":[{"award-number":["N00014-17-1- 2782"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004351","name":"Cisco Systems","doi-asserted-by":"publisher","award":["#1138109"],"award-info":[{"award-number":["#1138109"]}],"id":[{"id":"10.13039\/100004351","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["NWO 639.023.309 VICI ?Dowsing?, NWO 639.021.753 VENI ?PantaRhei?"],"award-info":[{"award-number":["NWO 639.023.309 VICI ?Dowsing?, NWO 639.021.753 VENI ?PantaRhei?"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,4]]},"DOI":"10.1145\/3297858.3304073","type":"proceedings-article","created":{"date-parts":[[2019,4,4]],"date-time":"2019-04-04T18:38:43Z","timestamp":1554403123000},"page":"545-558","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ProbeGuard"],"prefix":"10.1145","author":[{"given":"Koustubha","family":"Bhat","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Erik","family":"van der Kouwe","sequence":"additional","affiliation":[{"name":"Leiden University, Leiden, Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Martin Abadi Mihai Budiu \u00dalfar Erlingsson and Jay Ligatti. 2005. Control-flow Integrity. In CCS. 10.1145\/1102120.1102165","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519085"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Michael Backes Thorsten Holz Benjamin Kollenda Philipp Koppe Stefan N\u00fcrnberger and Jannik Pewny. 2014. You can run but you can't read: Preventing disclosure exploits in executable code. In CCS. 10.1145\/2660267.2660378","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671253"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"David Bigelow Thomas Hobson Robert Rudd William Streilein and Hamed Okhravi. 2015. Timely rerandomization for mitigating memory disclosures. In CCS. 10.1145\/2810103.2813691","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Andrea Bittau Adam Belay Ali Mashtizadeh David Mazi\u00e8res and Dan Boneh. 2014. Hacking blind. In S&P. 10.1109\/SP.2014.22","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Erik Bosman Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. In S&P.","DOI":"10.1109\/SP.2016.63"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Kjell Braden Lucas Davi Christopher Liebchen Ahmad-Reza Sadeghi Stephen Crane Michael Franz and Per Larsen. 2016. Leakage-Resilient Layout Randomization for Mobile Devices.. In NDSS.","DOI":"10.14722\/ndss.2016.23364"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Xi Chen Herbert Bos and Cristiano Giuffrida. 2017. CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. In EuroS&P.","DOI":"10.1109\/EuroSP.2017.17"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Xi Chen Asia Slowinska Dennis Andriesse Herbert Bos and Cristiano Giuffrida. 2015. StackArmor: Comprehensive Protection from Stack-based Memory Error Vulnerabilities for Binaries. In NDSS.","DOI":"10.14722\/ndss.2015.23248"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_13_1","unstructured":"Thurston HY Dang Petros Maniatis and David Wagner. 2015. The performance cost of shadow stacks and stack canaries. In ASIACCS."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"Lucas Davi Patrick Koeberl and Ahmad-Reza Sadeghi. 2014. Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation. In ACM DAC. 10.1145\/2593069.2596656","DOI":"10.1145\/2593069.2596656"},{"key":"e_1_3_2_1_15_1","volume-title":"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.. In NDSS.","author":"Davi Lucas","year":"2015","unstructured":"Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z Snow, and Fabian Monrose. 2015. Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.. In NDSS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Gregory J Duck and Roland HC Yap. 2016. Heap bounds protection with low fat pointers. In ACM CC. 10.1145\/2892208.2892212","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Isaac Evans Sam Fingeret Juli\u00e1n Gonz\u00e1lez Ulziibayar Otgonbaatar Tiffany Tang Howard Shrobe Stelios Sidiroglou-Douskos Martin Rinard and Hamed Okhravi. 2015. Missing the point (er): On the effectiveness of code pointer integrity. In S&P. 10.1109\/SP.2015.53","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany and Thorsten Holz. 2016. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding. In NDSS.","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2555492.2555500"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663165.2663328"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451147"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2664350.2664354"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Enes G\u00f6ktas Elias Athanasopoulos Herbert Bos and Georgios Portokalidis. 2014. Out of control: Overcoming control-flow integrity. S&P.","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_24_1","unstructured":"E G\u00f6ktas R Gawlik B Kollenda E Athanasopoulos G Portokalidis C Giuffrida and H Bos. 2016. Undermining information hiding (and what to do about it). In USENIX Security."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Enes Goktas Benjamin Kollenda Philipp Koppe Erik Bosman Georgios Portokalidis Thorsten Holz Herbert Bos and Cristiano Giuffrida. 2018. Position-independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. In EuroS&P.","DOI":"10.1109\/EuroSP.2018.00024"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","unstructured":"Ben Gras Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2018. Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. In USENIX Security.","DOI":"10.5555\/3277203.3277275"},{"key":"e_1_3_2_1_27_1","volume-title":"ASLR on the line: Practical cache attacks on the MMU. NDSS","author":"Gras Ben","year":"2017","unstructured":"Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, and Cristiano Giuffrida. 2017. ASLR on the line: Practical cache attacks on the MMU. NDSS (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Istvan Haller Jeon Yuseok Hui Peng Mathias Payer Cristiano Giuffrida Herbert Bos and Erik van der Kouwe. 2016. TypeSan: Practical Type Confusion Detection. In CCS. 10.1145\/2976749.2978405","DOI":"10.1145\/2976749.2978405"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384635"},{"key":"e_1_3_2_1_30_1","volume-title":"Prateek Saxena, and Zhenkai Liang.","author":"Hu Hong","year":"2016","unstructured":"Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-oriented programming: On the expressiveness of non-control data attacks. In S&P. IEEE."},{"key":"e_1_3_2_1_31_1","unstructured":"Intel. Processor Tracing. https:\/\/software.intel.com\/en-us\/blogs\/2013\/09\/18\/processor-tracing. ( ????)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"Yeongjin Jang Sangho Lee and Taesoo Kim. 2016. Breaking Kernel Address Space Layout Randomization with Intel TSX. In ACM CCS. 10.1145\/2976749.2978321","DOI":"10.1145\/2976749.2978321"},{"key":"e_1_3_2_1_33_1","unstructured":"Andi Kleen. https:\/\/lwn.net\/Articles\/648154\/. ( ????)."},{"key":"e_1_3_2_1_34_1","volume-title":"Cristiano Giuffrida, Herbert Bos, and Thorsten Holz.","author":"Kollenda Benjamin","year":"2017","unstructured":"Benjamin Kollenda, Enes G\u00f6ktas, Tim Blazytko, Philipp Koppe, Robert Gawlik, Radhesh Krishnan Konoth, Cristiano Giuffrida, Herbert Bos, and Thorsten Holz. 2017. Towards Automated Discovery of Crash-Resistant Primitives in Binaries. In DSN."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","unstructured":"Koen Koning Xi Chen Herbert Bos Cristiano Giuffrida and Elias Athanasopoulos. 2017. No Need to Hide: Protecting Safe Regions on Commodity Hardware. In EuroSys. 10.1145\/3064176.3064217","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190553"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2014. Code-pointer integrity. In OSDI.","DOI":"10.5555\/2685048.2685061"},{"key":"e_1_3_2_1_38_1","volume-title":"Poster: Getting the point (er): On the feasibility of attacks on code-pointer integrity. In S&P.","author":"Kuznetsov Volodymyr","year":"2015","unstructured":"Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, and Dawn Song. 2015. Poster: Getting the point (er): On the feasibility of attacks on code-pointer integrity. In S&P."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","unstructured":"Kangjie Lu Chengyu Song Byoungyoung Lee Simon P Chung Taesoo Kim and Wenke Lee. 2015. ASLR-Guard: Stopping address space leakage for code reuse attacks. In ACM CCS. 10.1145\/2810103.2813694","DOI":"10.1145\/2810103.2813694"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Kristis Makris and Rida A Bazzi. 2009. Immediate Multi-Threaded Dynamic Software Updates Using Stack Reconstruction. In USENIX ATC.","DOI":"10.5555\/1855807.1855838"},{"key":"e_1_3_2_1_42_1","unstructured":"Ali Jose Mashtizadeh Andrea Bittau David Mazieres and Dan Boneh. 2015. Cryptographically enforced control flow integrity. ACM CCS."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Vishwath Mohan Per Larsen Stefan Brunthaler Kevin W Hamlen and Michael Franz. 2015. Opaque Control-Flow Integrity. In NDSS.","DOI":"10.14722\/ndss.2015.23271"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","unstructured":"Iulian Neamtiu Michael Hicks Gareth Stoyle and Manuel Oriol. 2006. Practical Dynamic Software Updating for C. In PLDI. 10.1145\/1133981.1133991","DOI":"10.1145\/1133981.1133991"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","unstructured":"Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking holes in information hiding. In USENIX Security.","DOI":"10.5555\/3241094.3241105"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.152"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Robert Rudd Richard Skowyra David Bigelow Veer Dedhia Thomas Hobson Stephen Crane Christopher Liebchen Per Larsen Lucas Davi Michael Franz and others. 2017. Address-Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity. (2017).","DOI":"10.14722\/ndss.2017.23477"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","unstructured":"Jeff Seibert Hamed Okhravi and Eric S\u00f6derstr\u00f6m. 2014. Information leaks without memory disclosures: Remote side channel attacks on diversified code. In CCS. 10.1145\/2660267.2660309","DOI":"10.1145\/2660267.2660309"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. AddressSanitizer: a fast address sanity checker. USENIX ATC.","DOI":"10.5555\/2342821.2342849"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","unstructured":"Kevin Z Snow Fabian Monrose Lucas Davi Alexandra Dmitrienko Christopher Liebchen and Ahmad-Reza Sadeghi. 2013. Just-in-time code reuse: On the effectiveness of fine-grained address space layout randomization. In S&P. IEEE. 10.1109\/SP.2013.45","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","unstructured":"Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike. 2014. Enforcing forward-edge control-flow integrity in GCC & LLVM. In USENIX Security.","DOI":"10.5555\/2671225.2671285"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","unstructured":"Erik van der Kouwe Vinod Nigade and Cristiano Giuffrida. 2017. DangSan: Scalable Use-after-free Detection. In EuroSys. 10.1145\/3064176.3064211","DOI":"10.1145\/3064176.3064211"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","unstructured":"Victor van der Veen Dennis Andriesse Enes G\u00f6ktas Ben Gras Lionel Sambuc Asia Slowinska Herbert Bos and Cristiano Giuffrida. 2015. Practical Context-Sensitive CFI. In CCS. 10.1145\/2810103.2813673","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","unstructured":"Victor van der Veen Dennis Andriesse Manolis Stamatogiannakis Xi Chen Herbert Bos and Cristiano Giuffrdia. 2017. The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later. In CCS. 10.1145\/3133956.3134026","DOI":"10.1145\/3133956.3134026"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","unstructured":"Robert Wahbe Steven Lucco Thomas E Anderson and Susan L Graham. 1993. Efficient software-based fault isolation. In SOSP. 10.1145\/168619.168635","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026906"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"Chao Zhang Tao Wei Zhaofeng Chen Lei Duan Laszlo Szekeres Stephen McCamant Dawn Song and Wei Zou. 2013. Practical control flow integrity and randomization for binary executables. In S&P. 10.1109\/SP.2013.44","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"Mingwei Zhang and R Sekar. 2013. Control flow integrity for COTS binaries. In USENIX Security.","DOI":"10.5555\/2534766.2534796"}],"event":{"name":"ASPLOS '19: Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Providence RI USA","acronym":"ASPLOS '19"},"container-title":["Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304073","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297858.3304073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:15Z","timestamp":1750204395000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297858.3304073"}},"subtitle":["Mitigating Probing Attacks Through Reactive Program Transformations"],"short-title":[],"issued":{"date-parts":[[2019,4,4]]},"references-count":61,"alternative-id":["10.1145\/3297858.3304073","10.1145\/3297858"],"URL":"https:\/\/doi.org\/10.1145\/3297858.3304073","relation":{},"subject":[],"published":{"date-parts":[[2019,4,4]]},"assertion":[{"value":"2019-04-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}