{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:01:40Z","timestamp":1772042500650,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2261, N00014-17-1-2788"],"award-info":[{"award-number":["N00014-16-1-2261, N00014-17-1-2788"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359823","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"70-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":57,"title":["Nibbler"],"prefix":"10.1145","author":[{"given":"Ioannis","family":"Agadakos","sequence":"first","affiliation":[{"name":"SRI International"}]},{"given":"Di","family":"Jin","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"David","family":"Williams-King","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Vasileios P.","family":"Kemerlis","sequence":"additional","affiliation":[{"name":"Brown University"}]},{"given":"Georgios","family":"Portokalidis","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Control-Flow Integrity. In Proc. of ACM CCS. 340--353","author":"Abadi Mart\u00edn","year":"2005","unstructured":"Mart\u00edn Abadi , Mihai Budiu , \u00dalfar Erlingsson , and Jay Ligatti . 2005 . Control-Flow Integrity. In Proc. of ACM CCS. 340--353 . Mart\u00edn Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. 2005. Control-Flow Integrity. In Proc. of ACM CCS. 340--353."},{"key":"e_1_3_2_1_2_1","unstructured":"Alexa. 2018. The top 500 sites on the web. https:\/\/www.alexa.com\/topsites.  Alexa. 2018. The top 500 sites on the web. https:\/\/www.alexa.com\/topsites."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"e_1_3_2_1_4_1","volume-title":"Data Execution Prevention","author":"Andersen Starr","unstructured":"Starr Andersen and Vincent Abella . 2004. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies , Data Execution Prevention . Microsoft TechNet Library . http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx Starr Andersen and Vincent Abella. 2004. Changes to Functionality in Microsoft Windows XP Service Pack 2, Part 3: Memory Protection Technologies, Data Execution Prevention. Microsoft TechNet Library. http:\/\/technet.microsoft.com\/en-us\/library\/bb457155.aspx"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of USENIX SEC. 583--600","author":"Andriesse Dennis","unstructured":"Dennis Andriesse , Xi Chen , Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries . In Proc. of USENIX SEC. 583--600 . Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries. In Proc. of USENIX SEC. 583--600."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_7_1","volume-title":"Schwartz","author":"Brumley David","year":"2011","unstructured":"David Brumley , Ivan Jager , Thanassis Avgerinos , and Edward J . Schwartz . 2011 . BAP : A Binary Analysis Platform. In Proc. of CAV. 463--469. David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz. 2011. BAP: A Binary Analysis Platform. In Proc. of CAV. 463--469."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of USENIX SEC. 353--368","author":"Brumley David","year":"2013","unstructured":"David Brumley , JongHyup Lee , Edward J. Schwartz , and Maverick Woo . 2013 . Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring . In Proc. of USENIX SEC. 353--368 . David Brumley, JongHyup Lee, Edward J. Schwartz, and Maverick Woo. 2013. Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring. In Proc. of USENIX SEC. 353--368."},{"key":"e_1_3_2_1_9_1","volume-title":"Carey","author":"Bu Yingyi","year":"2013","unstructured":"Yingyi Bu , Vinayak Borkar , Guoqing Xu , and Michael J . Carey . 2013 . A Bloat-aware Design for Big Data Applications. In Proc. of ISMM. 119--130. Yingyi Bu, Vinayak Borkar, Guoqing Xu, and Michael J. Carey. 2013. A Bloat-aware Design for Big Data Applications. In Proc. of ISMM. 119--130."},{"key":"e_1_3_2_1_10_1","unstructured":"Amat Cama. 2014. Tool to generate ROP gadgets for ARM AARCH64 x86 MIPS PPC RISCV SH4 and SPARC. https:\/\/github.com\/acama\/xrop.  Amat Cama. 2014. Tool to generate ROP gadgets for ARM AARCH64 x86 MIPS PPC RISCV SH4 and SPARC. https:\/\/github.com\/acama\/xrop."},{"key":"e_1_3_2_1_11_1","volume-title":"Gross","author":"Carlini Nicolas","year":"2015","unstructured":"Nicolas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R . Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proc. of USENIX SEC. 161--176. Nicolas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proc. of USENIX SEC. 161--176."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.17"},{"key":"e_1_3_2_1_15_1","unstructured":"Chromium Blog . 2012. A Tale of Two Pwnies. https:\/\/blog.chromium.org\/2012\/05\/tale-of-two-pwnies-part-1.html.  Chromium Blog . 2012. A Tale of Two Pwnies. https:\/\/blog.chromium.org\/2012\/05\/tale-of-two-pwnies-part-1.html."},{"key":"e_1_3_2_1_16_1","unstructured":"Corelan. 2011. Corelan Repository for mona.py. https:\/\/github.com\/corelan\/mona.  Corelan. 2011. Corelan Repository for mona.py. https:\/\/github.com\/corelan\/mona."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535813.2535824"},{"key":"e_1_3_2_1_18_1","unstructured":"National Vulnerability Database. 2019. BlueKeep Vulnerability (CVE-2019-0708). NIST. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-0708  National Vulnerability Database. 2019. BlueKeep Vulnerability (CVE-2019-0708). NIST. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-0708"},{"key":"e_1_3_2_1_19_1","unstructured":"Bruce Dawson. 2013. Symbols on Linux update: Fedora Fixes. https:\/\/randomascii.wordpress.com\/2013\/03\/05\/symbols-on-linux-update-fedora-fixes\/  Bruce Dawson. 2013. Symbols on Linux update: Fedora Fixes. https:\/\/randomascii.wordpress.com\/2013\/03\/05\/symbols-on-linux-update-fedora-fixes\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Solar Designer. 1997. Getting around non-executable stack (and fix). BugTraq. https:\/\/seclists.org\/bugtraq\/1997\/Aug\/63  Solar Designer. 1997. Getting around non-executable stack (and fix). BugTraq. https:\/\/seclists.org\/bugtraq\/1997\/Aug\/63"},{"key":"e_1_3_2_1_21_1","unstructured":"Ulrich Drepper. [n.d.]. ELF Symbol Versioning. https:\/\/www.akkadia.org\/drepper\/symbol-versioning.  Ulrich Drepper. [n.d.]. ELF Symbol Versioning. https:\/\/www.akkadia.org\/drepper\/symbol-versioning."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/265563.265576"},{"key":"e_1_3_2_1_24_1","volume-title":"Tanenbaum","author":"Giuffrida Cristiano","year":"2012","unstructured":"Cristiano Giuffrida , Anton Kuijsten , and Andrew S . Tanenbaum . 2012 . Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. In Proc. of USENIX SEC. 475--490. Cristiano Giuffrida, Anton Kuijsten, and Andrew S. Tanenbaum. 2012. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. In Proc. of USENIX SEC. 475--490."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of IEEE SCAM. 129--136","author":"Hamilton J.","unstructured":"J. Hamilton and S. Danicic . 2009. An Evaluation of Current Java Bytecode Decompilers . In Proc. of IEEE SCAM. 129--136 . J. Hamilton and S. Danicic. 2009. An Evaluation of Current Java Bytecode Decompilers. In Proc. of IEEE SCAM. 129--136."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_1_28_1","unstructured":"Hex-Rays. 2016. The IDA Pro Disassembler and Debugger. https:\/\/www.hex-rays.com\/products\/ida\/  Hex-Rays. 2016. The IDA Pro Disassembler and Debugger. https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"e_1_3_2_1_29_1","unstructured":"Patrick Horgan. [n.d.]. Linux x86 Program Start Up. http:\/\/dbp-consulting.com\/tutorials\/debugging\/linuxProgramStartup.html.  Patrick Horgan. [n.d.]. Linux x86 Program Start Up. http:\/\/dbp-consulting.com\/tutorials\/debugging\/linuxProgramStartup.html."},{"key":"e_1_3_2_1_30_1","unstructured":"Intel. 2013. System V Application Binary Interface. https:\/\/software.intel.com\/sites\/default\/files\/article\/402129\/mpx-linux64-abi.pdf.  Intel. 2013. System V Application Binary Interface. https:\/\/software.intel.com\/sites\/default\/files\/article\/402129\/mpx-linux64-abi.pdf."},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of IEEE COMPSAC. 12--21","author":"Jiang Y.","unstructured":"Y. Jiang , D. Wu , and P. Liu . 2016. JRed: Program Customization and Bloatware Mitigation Based on Static Analysis . In Proc. of IEEE COMPSAC. 12--21 . Y. Jiang, D. Wu, and P. Liu. 2016. JRed: Program Customization and Bloatware Mitigation Based on Static Analysis. In Proc. of IEEE COMPSAC. 12--21."},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of IEEE HASE. 122--131","author":"Jiang Y.","unstructured":"Y. Jiang , C. Zhang , D. Wu , and P. Liu . 2016. Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods . In Proc. of IEEE HASE. 122--131 . Y. Jiang, C. Zhang, D. Wu, and P. Liu. 2016. Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods. In Proc. of IEEE HASE. 122--131."},{"key":"e_1_3_2_1_33_1","unstructured":"JoeDog. 2017. Siege - an http load tester and benchmarking utility. https:\/\/github.com\/JoeDog\/siege.  JoeDog. 2017. Siege - an http load tester and benchmarking utility. https:\/\/github.com\/JoeDog\/siege."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of FMCAD. 43--50","author":"Kinder Johannes","year":"2010","unstructured":"Johannes Kinder and Helmut Veith . 2010 . Precise Static Analysis of Untrusted Driver Binaries . In Proc. of FMCAD. 43--50 . Johannes Kinder and Helmut Veith. 2010. Precise Static Analysis of Untrusted Driver Binaries. In Proc. of FMCAD. 43--50."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312501"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. of NDSS.","author":"Kurmus Anil","year":"2013","unstructured":"Anil Kurmus , Reinhard Tartler , Daniela Dorneanu , Bernhard Heinloth , Valentin Rothberg , Andreas Ruprecht , Wolfgang Schr\u00f6der-Preikschat , Daniel Lohmann , and R\u00fcdiger Kapitza . 2013 . Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring . In Proc. of NDSS. Anil Kurmus, Reinhard Tartler, Daniela Dorneanu, Bernhard Heinloth, Valentin Rothberg, Andreas Ruprecht, Wolfgang Schr\u00f6der-Preikschat, Daniel Lohmann, and R\u00fcdiger Kapitza. 2013. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. In Proc. of NDSS."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768424"},{"key":"e_1_3_2_1_38_1","volume-title":"Linkers and Loaders","author":"Levine John R.","unstructured":"John R. Levine . 1999. Linkers and Loaders ( 1 st ed.). Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA. John R. Levine. 1999. Linkers and Loaders (1st ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.","edition":"1"},{"key":"e_1_3_2_1_39_1","unstructured":"Linux Programmer's Manual. 2018. rtld-audit - auditing API for the dynamic linker. http:\/\/man7.org\/linux\/man-pages\/man7\/rtld-audit.7.html  Linux Programmer's Manual. 2018. rtld-audit - auditing API for the dynamic linker. http:\/\/man7.org\/linux\/man-pages\/man7\/rtld-audit.7.html"},{"key":"e_1_3_2_1_40_1","unstructured":"LLVM Project. 2018. LLVM Link Time Optimization: Design and Implementation.  LLVM Project. 2018. LLVM Link Time Optimization: Design and Implementation."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695751"},{"key":"e_1_3_2_1_42_1","volume-title":"Control Flow Guard","unstructured":"Microsoft. 2015. Control Flow Guard . Windows Dev Center . https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/mt637065(v=vs.85).aspx Microsoft. 2015. Control Flow Guard. Windows Dev Center. https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/mt637065(v=vs.85).aspx"},{"key":"e_1_3_2_1_43_1","unstructured":"Microsoft. 2017. Symbols and Symbol Files. Microsoft Developer Network. https:\/\/msdn.microsoft.com\/en-us\/library\/ff558825.aspx  Microsoft. 2017. Symbols and Symbol Files. Microsoft Developer Network. https:\/\/msdn.microsoft.com\/en-us\/library\/ff558825.aspx"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274703"},{"key":"e_1_3_2_1_46_1","unstructured":"Collin Mulliner and Matthias Neugschwandtner. 2015. Breaking Pay-loads with Runtime Code Stripping and Image Freezing. BHUSA. https:\/\/www.blackhat.com\/us-15\/briefings.html#breaking-payloads-with-runtime-code-stripping-and-image-freezing  Collin Mulliner and Matthias Neugschwandtner. 2015. Breaking Pay-loads with Runtime Code Stripping and Image Freezing. BHUSA. https:\/\/www.blackhat.com\/us-15\/briefings.html#breaking-payloads-with-runtime-code-stripping-and-image-freezing"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/279310.279314"},{"key":"e_1_3_2_1_48_1","unstructured":"National Security Agency. 2019. Ghidra. nsa.gov. https:\/\/www.nsa.gov\/resources\/everyone\/ghidra\/  National Security Agency. 2019. Ghidra. nsa.gov. https:\/\/www.nsa.gov\/resources\/everyone\/ghidra\/"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491416"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594295"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_1_52_1","unstructured":"PaX Team. 2003. Address Space Layout Randomization (ASLR). https:\/\/pax.grsecurity.net\/docs\/aslr.txt  PaX Team. 2003. Address Space Layout Randomization (ASLR). https:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"e_1_3_2_1_53_1","volume-title":"27th USENIX Security Symposium. USENIX Association","author":"Quach Anh","year":"2018","unstructured":"Anh Quach , Aravind Prakash , and Lok Yan . 2018 . Debloating Software through Piece-Wise Compilation and Loading . In 27th USENIX Security Symposium. USENIX Association , Baltimore, MD, 869--886. Anh Quach, Aravind Prakash, and Lok Yan. 2018. Debloating Software through Piece-Wise Compilation and Loading. In 27th USENIX Security Symposium. USENIX Association, Baltimore, MD, 869--886."},{"key":"e_1_3_2_1_54_1","volume-title":"Capstone: Next-Gen Disassembly Framework. In BHUSA.","author":"Quynh Nguyen Anh","year":"2014","unstructured":"Nguyen Anh Quynh . 2014 . Capstone: Next-Gen Disassembly Framework. In BHUSA. Nguyen Anh Quynh. 2014. Capstone: Next-Gen Disassembly Framework. In BHUSA."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_56_1","unstructured":"Jonathan Salwan. 2011. ROPgadget - Gadgets finder and auto-roper. http:\/\/shell-storm.org\/project\/ROPgadget\/.  Jonathan Salwan. 2011. ROPgadget - Gadgets finder and auto-roper. http:\/\/shell-storm.org\/project\/ROPgadget\/."},{"key":"e_1_3_2_1_57_1","unstructured":"Sascha Schirra. 2014. Ropper - rop gadget finder and binary information tool. https:\/\/scoding.de\/ropper\/.  Sascha Schirra. 2014. Ropper - rop gadget finder and binary information tool. https:\/\/scoding.de\/ropper\/."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_59_1","volume-title":"Proc. of USENIX SEC. 25--41","author":"Schwartz Edward J.","year":"2011","unstructured":"Edward J. Schwartz , Thanassis Avgerinos , and David Brumley . 2011 . Q: Exploit Hardening Made Easy . In Proc. of USENIX SEC. 25--41 . Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. 2011. Q: Exploit Hardening Made Easy. In Proc. of USENIX SEC. 25--41."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519145"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180236"},{"key":"e_1_3_2_1_66_1","unstructured":"t0\u00d70sh. 2014. A tool to help you write binary exploits. https:\/\/github.com\/t00sh\/rop-tool.  t0\u00d70sh. 2014. A tool to help you write binary exploits. https:\/\/github.com\/t00sh\/rop-tool."},{"key":"e_1_3_2_1_67_1","unstructured":"The Chromium Projects. 2018. Testing and infrastructure. https:\/\/www.chromium.org\/developers\/testing  The Chromium Projects. 2018. Testing and infrastructure. https:\/\/www.chromium.org\/developers\/testing"},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. of USENIX SEC. 941--955","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-edge Control-Flow Integrity in GCC & LLVM . In Proc. of USENIX SEC. 941--955 . Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-edge Control-Flow Integrity in GCC & LLVM. In Proc. of USENIX SEC. 941--955."},{"key":"e_1_3_2_1_69_1","unstructured":"TIS Committee. 1995. Tool Interface Standard (TIS)- Executable and Linking Format (ELF)- Specification- Version 1.2. http:\/\/refspecs.linuxbase.org\/elf\/elf.pdf.  TIS Committee. 1995. Tool Interface Standard (TIS)- Executable and Linking Format (ELF)- Specification- Version 1.2. http:\/\/refspecs.linuxbase.org\/elf\/elf.pdf."},{"key":"e_1_3_2_1_70_1","unstructured":"Trail of Bits. 2019. McSema. GitHub. https:\/\/github.com\/trailofbits\/mcsema  Trail of Bits. 2019. McSema. GitHub. https:\/\/github.com\/trailofbits\/mcsema"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_72_1","first-page":"11","article-title":"Slimming\" a Java Virtual Machine by Way of Cold Code Removal and Optimistic Partial Program","volume":"76","author":"Wagner Gregor","year":"2011","unstructured":"Gregor Wagner , Andreas Gal , and Michael Franz . 2011 . \" Slimming\" a Java Virtual Machine by Way of Cold Code Removal and Optimistic Partial Program Loading. Sci. Comput. Program. 76 , 11 (Nov. 2011), 1037--1053. Gregor Wagner, Andreas Gal, and Michael Franz. 2011. \"Slimming\" a Java Virtual Machine by Way of Cold Code Removal and Optimistic Partial Program Loading. Sci. Comput. Program. 76, 11 (Nov. 2011), 1037--1053.","journal-title":"Loading. Sci. Comput. Program."},{"key":"e_1_3_2_1_73_1","volume-title":"Reassembleable Disassembling. In 24th USENIX Security Symposium (USENIX Security). 627--642","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang , Pei Wang , and Dinghao Wu . 2015 . Reassembleable Disassembling. In 24th USENIX Security Symposium (USENIX Security). 627--642 . Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable Disassembling. In 24th USENIX Security Symposium (USENIX Security). 627--642."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050752"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23808-6_34"},{"key":"e_1_3_2_1_76_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX OSDI. 367--382.","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P. Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P. Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX OSDI. 367--382. David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In USENIX OSDI. 367--382."},{"key":"e_1_3_2_1_77_1","unstructured":"Windows Dev Center. 2018. PE Format. https:\/\/msdn.microsoft.com\/library\/windows\/desktop\/ms680547(v=vs.85).aspx.  Windows Dev Center. 2018. PE Format. https:\/\/msdn.microsoft.com\/library\/windows\/desktop\/ms680547(v=vs.85).aspx."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_30"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384690"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_81_1","volume-title":"Proc. of IEEE S&P. 559--573","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang , Tao Wei , Zhaofeng Chen , Lei Duan , Laszlo Szekeres , Stephen McCamant , Dawn Song , and Wei Zou . 2013 . Practical Control Flow Integrity and Randomization for Binary Executables . In Proc. of IEEE S&P. 559--573 . Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical Control Flow Integrity and Randomization for Binary Executables. In Proc. of IEEE S&P. 559--573."},{"key":"e_1_3_2_1_82_1","volume-title":"Proc. of USENIX SEC. 337--352","author":"Zhang Mingwei","unstructured":"Mingwei Zhang and R. Sekar . 2013. Control Flow Integrity for COTS Binaries . In Proc. of USENIX SEC. 337--352 . Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proc. of USENIX SEC. 337--352."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359823","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359823"}},"subtitle":["debloating binary shared libraries"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":82,"alternative-id":["10.1145\/3359789.3359823","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359823","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}