{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:43:16Z","timestamp":1775122996682,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1564055"],"award-info":[{"award-number":["CNS-1564055"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ONR","award":["N00014-17-1-2788"],"award-info":[{"award-number":["N00014-17-1-2788"]}]},{"name":"ONR","award":["N00014-16-1-2263"],"award-info":[{"award-number":["N00014-16-1-2263"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338502.3359763","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"47-53","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["CodeMason"],"prefix":"10.1145","author":[{"given":"David","family":"Williams-King","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Junfeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Egalito: Layout-Agnostic Binary Recompilation. (under submission).  2019. Egalito: Layout-Agnostic Binary Recompilation. (under submission)."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Gentoo Linux. https:\/\/www.gentoo.org\/.  2019. Gentoo Linux. https:\/\/www.gentoo.org\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 25th Network and Distributed Systems Security Symposium (NDSS)","volume":"12","author":"Bauman Erick","unstructured":"Erick Bauman , Zhiqiang Lin , Kevin W Hamlen , Ahmad M Mustafa , Gbadebo Ayoade , Khaled Al-Naami , Latifur Khan , Kevin W Hamlen , Bhavani M Thuraisingham , Frederico Araujo , Superset Disassembly : Statically Rewriting x86 Binaries Without Heuristics . In Proceedings of the 25th Network and Distributed Systems Security Symposium (NDSS) , Vol. 12 . Springer, 40--47. Erick Bauman, Zhiqiang Lin, Kevin W Hamlen, Ahmad M Mustafa, Gbadebo Ayoade, Khaled Al-Naami, Latifur Khan, Kevin W Hamlen, Bhavani M Thuraisingham, Frederico Araujo, et al. [n. d.]. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. In Proceedings of the 25th Network and Distributed Systems Security Symposium (NDSS), Vol. 12. Springer, 40--47."},{"key":"e_1_3_2_1_4_1","unstructured":"Derek Bruening Timothy Garnett and Saman Amarasinghe. 2003. An Infrastructure for Adaptive Dynamic Optimization. In CGO.  Derek Bruening Timothy Garnett and Saman Amarasinghe. 2003. An Infrastructure for Adaptive Dynamic Optimization. In CGO."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772963"},{"key":"e_1_3_2_1_7_1","volume-title":"Berger","author":"Curtsinger Charlie","year":"2013","unstructured":"Charlie Curtsinger and Emery D . Berger . 2013 . STABILIZER : Statistically Sound Performance Evaluation. In Proc. of ACM SIGARCH. 219--228. Charlie Curtsinger and Emery D. Berger. 2013. STABILIZER: Statistically Sound Performance Evaluation. In Proc. of ACM SIGARCH. 219--228."},{"key":"e_1_3_2_1_8_1","volume-title":"Ludo Van Put, Dominique Chanet, and Koen De Bosschere.","author":"Bus Bruno De","year":"2004","unstructured":"Bruno De Bus , Bjorn De Sutter , Ludo Van Put, Dominique Chanet, and Koen De Bosschere. 2004 . Link-time optimization of ARM binaries. In ACM SIGPLAN Notices, Vol. 39 . ACM , 211--220. Bruno De Bus, Bjorn De Sutter, Ludo Van Put, Dominique Chanet, and Koen De Bosschere. 2004. Link-time optimization of ARM binaries. In ACM SIGPLAN Notices, Vol. 39. ACM, 211--220."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_10_1","unstructured":"Honza Hubicka. 2014. Linktime optimization in GCC part 1 - brief history. http:\/\/hubicka.blogspot.com\/2014\/04\/ linktime-optimization-in-gcc-1-brief.html.  Honza Hubicka. 2014. Linktime optimization in GCC part 1 - brief history. http:\/\/hubicka.blogspot.com\/2014\/04\/ linktime-optimization-in-gcc-1-brief.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Intel. 2011. Intel 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/software.intel.com\/en-us\/download\/ intel-64-and-ia-32-architectures-optimization-reference-manual.  Intel. 2011. Intel 64 and IA-32 Architectures Optimization Reference Manual. https:\/\/software.intel.com\/en-us\/download\/ intel-64-and-ia-32-architectures-optimization-reference-manual."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_13_1","unstructured":"Michael Larabel. 2018. A Fresh Look At The PGO Performance With GCC 8. https:\/\/www.phoronix.com\/scan.php?page= article&item=gcc-82-pgo&num=1.  Michael Larabel. 2018. A Fresh Look At The PGO Performance With GCC 8. https:\/\/www.phoronix.com\/scan.php?page= article&item=gcc-82-pgo&num=1."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_16_1","unstructured":"Phoronix. 2012. The Performance Between GCC Optimization Levels. https:\/\/www.phoronix.com\/scan.php?page=article& item=gcc 47 optimizations&num=1.  Phoronix. 2012. The Performance Between GCC Optimization Levels. https:\/\/www.phoronix.com\/scan.php?page=article& item=gcc 47 optimizations&num=1."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_19_1","volume-title":"Ramblr: Making Reassembly Great Again.","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang , Yan Shoshitaishvili , Antonio Bianchi , Aravind Machiry , John Grosen , Paul Grosen , Christopher Kruegel , and Giovanni Vigna . 2017 . Ramblr: Making Reassembly Great Again. (2017). Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again. (2017)."},{"key":"e_1_3_2_1_20_1","volume-title":"2016 IEEE 23rd International Conference on","volume":"1","author":"Wang Shuai","year":"2016","unstructured":"Shuai Wang , Pei Wang , and Dinghao Wu . 2016 . UROBOROS: Instrumenting Stripped Binaries with Static Reassembling. In Software Analysis, Evolution, and Reengineering (SANER) , 2016 IEEE 23rd International Conference on , Vol. 1 . IEEE, 236--247. Shuai Wang, Pei Wang, and Dinghao Wu. 2016. UROBOROS: Instrumenting Stripped Binaries with Static Reassembling. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, Vol. 1. IEEE, 236--247."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_22_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization. In OSDI. 367--382.","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and Deployable Continuous Code Re-Randomization. In OSDI. 367--382. David Williams-King, Graham Gobieski, Kent Williams-King, James P Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In OSDI. 367--382."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674025.2576208"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338502.3359763","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338502.3359763","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338502.3359763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338502.3359763"}},"subtitle":["Binary-Level Profile-Guided Optimization"],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":23,"alternative-id":["10.1145\/3338502.3359763","10.1145\/3338502"],"URL":"https:\/\/doi.org\/10.1145\/3338502.3359763","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}