{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:43:35Z","timestamp":1775123015842,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2263 and N00014-17-1-2788"],"award-info":[{"award-number":["N00014-16-1-2263 and N00014-17-1-2788"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378470","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"133-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Egalito"],"prefix":"10.1145","author":[{"given":"David","family":"Williams-King","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Hidenori","family":"Kobayashi","sequence":"additional","affiliation":[{"name":"Canon Inc., Tokyo, Japan"}]},{"given":"Kent","family":"Williams-King","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]},{"given":"Graham","family":"Patterson","sequence":"additional","affiliation":[{"name":"Bloomberg L.C., New York, NY, USA"}]},{"given":"Frank","family":"Spano","sequence":"additional","affiliation":[{"name":"Bloomberg L.C., New York, NY, USA"}]},{"given":"Yu Jian","family":"Wu","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Junfeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Vasileios P.","family":"Kemerlis","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Control-flow Integrity. In Proc. of ACM CCS. 340--353","author":"Abadi Mart\u00edn","year":"2005","unstructured":"Mart\u00edn Abadi , Mihai Budiu , \u00dalfar Erlingsson , and Jay Ligatti . 2005 . Control-flow Integrity. In Proc. of ACM CCS. 340--353 . Mart\u00edn Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. 2005. Control-flow Integrity. In Proc. of ACM CCS. 340--353."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of USENIX SEC. 583--600","author":"Andriesse Dennis","unstructured":"Dennis Andriesse , Xi Chen , Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries .. In Proc. of USENIX SEC. 583--600 . Dennis Andriesse, Xi Chen, Victor van der Veen, Asia Slowinska, and Herbert Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86\/x64 Binaries.. In Proc. of USENIX SEC. 583--600."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. of USENIX SEC. 433--447","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan N\u00fcrnberger . 2014 . Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing . In Proc. of USENIX SEC. 433--447 . Michael Backes and Stefan N\u00fcrnberger. 2014. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. In Proc. of USENIX SEC. 433--447."},{"key":"e_1_3_2_1_6_1","volume-title":"Hamlen","author":"Bauman Erick","year":"2018","unstructured":"Erick Bauman , Zhiqiang Lin , and Kevin W . Hamlen . 2018 . Superset Disassembly : Statically Rewriting x86 Binaries Without Heuristics. In Proc. of NDSS. 40--47. Erick Bauman, Zhiqiang Lin, and Kevin W. Hamlen. 2018. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. In Proc. of NDSS. 40--47."},{"key":"e_1_3_2_1_7_1","unstructured":"Eli Bendersky. 2011. Position Independent Code (PIC) in shared libraries on x64. https:\/\/eli.thegreenplace.net\/2011\/11\/11\/positionindependent- code-pic-in-shared-libraries-on-x64.  Eli Bendersky. 2011. Position Independent Code (PIC) in shared libraries on x64. https:\/\/eli.thegreenplace.net\/2011\/11\/11\/positionindependent- code-pic-in-shared-libraries-on-x64."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_9_1","volume-title":"Hacking Blind. In Proc. of IEEE S&P. 227--242","author":"Bittau Andrea","year":"2014","unstructured":"Andrea Bittau , Adam Belay , Ali Mashtizadeh , David Mazieres , and Dan Boneh . 2014 . Hacking Blind. In Proc. of IEEE S&P. 227--242 . Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. 2014. Hacking Blind. In Proc. of IEEE S&P. 227--242."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191551"},{"key":"e_1_3_2_1_11_1","volume-title":"Schwartz","author":"Brumley David","year":"2011","unstructured":"David Brumley , Ivan Jager , Thanassis Avgerinos , and Edward J . Schwartz . 2011 . BAP : A Binary Analysis Platform. In Proc. of CAV. 463--469. David Brumley, Ivan Jager, Thanassis Avgerinos, and Edward J. Schwartz. 2011. BAP: A Binary Analysis Platform. In Proc. of CAV. 463--469."},{"key":"e_1_3_2_1_12_1","first-page":"317","article-title":"An API for Runtime Code Patching","volume":"14","author":"Buck Bryan","year":"2000","unstructured":"Bryan Buck and Jeffrey K. Hollingsworth . 2000 . An API for Runtime Code Patching . IJHPCA 14 , 4 (2000), 317 -- 329 . Bryan Buck and Jeffrey K. Hollingsworth. 2000. An API for Runtime Code Patching. IJHPCA 14, 4 (2000), 317--329.","journal-title":"IJHPCA"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141235.3141243"},{"key":"e_1_3_2_1_15_1","unstructured":"GNU Compiler Collection. 2017. Using the GNU Compiler Collection (GCC): AArch64 Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/ AArch64-Options.html.  GNU Compiler Collection. 2017. Using the GNU Compiler Collection (GCC): AArch64 Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/ AArch64-Options.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_17_1","unstructured":"Al Danial. 2017. AlDanial\/cloc. https:\/\/github.com\/AlDanial\/cloc.  Al Danial. 2017. AlDanial\/cloc. https:\/\/github.com\/AlDanial\/cloc."},{"key":"e_1_3_2_1_18_1","unstructured":"Debian. 2015. Hardening - Debian Wiki. https:\/\/wiki.debian.org\/ Hardening.  Debian. 2015. Hardening - Debian Wiki. https:\/\/wiki.debian.org\/ Hardening."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_20_1","unstructured":"Chris Eagle. 2011. The IDA Pro Book: The Unofficial Guide to theWorld's Most Popular Disassembler. No Starch Press.  Chris Eagle. 2011. The IDA Pro Book: The Unofficial Guide to theWorld's Most Popular Disassembler. No Starch Press."},{"key":"e_1_3_2_1_21_1","unstructured":"Fedora. 2016. Harden All Packages - Fedora Project. https:\/\/ fedoraproject.org\/wiki\/Changes\/Harden_All_Packages.  Fedora. 2016. Harden All Packages - Fedora Project. https:\/\/ fedoraproject.org\/wiki\/Changes\/Harden_All_Packages."},{"key":"e_1_3_2_1_22_1","volume-title":"Design Patterns: Elements of Reusable Object- Oriented Software. Pearson Education, India.","author":"Gamma Erich","year":"1995","unstructured":"Erich Gamma . 1995 . Design Patterns: Elements of Reusable Object- Oriented Software. Pearson Education, India. Erich Gamma. 1995. Design Patterns: Elements of Reusable Object- Oriented Software. Pearson Education, India."},{"key":"e_1_3_2_1_23_1","unstructured":"Google. 2018. fuchsia Git repositories. https:\/\/fuchsia.googlesource. com\/.  Google. 2018. fuchsia Git repositories. https:\/\/fuchsia.googlesource. com\/."},{"key":"e_1_3_2_1_24_1","unstructured":"Cosmin Gorgovan. 2016. Escaping DynamoRIO and Pin - or why it's a worse-than-you-think idea to run untrusted code or to input untrusted data. https:\/\/github.com\/lgeek\/dynamorio_pin_escape.  Cosmin Gorgovan. 2016. Escaping DynamoRIO and Pin - or why it's a worse-than-you-think idea to run untrusted code or to input untrusted data. https:\/\/github.com\/lgeek\/dynamorio_pin_escape."},{"key":"e_1_3_2_1_25_1","first-page":"14","article-title":"MAMBO: A Low-Overhead Dynamic Binary Modification Tool for ARM","volume":"13","author":"Gorgovan Cosmin","year":"2016","unstructured":"Cosmin Gorgovan , Amanieu D'antras , and Mikel Luj\u00e1n . 2016 . MAMBO: A Low-Overhead Dynamic Binary Modification Tool for ARM . ACM TACO 13 , 1 (2016), 14 . Cosmin Gorgovan, Amanieu D'antras, and Mikel Luj\u00e1n. 2016. MAMBO: A Low-Overhead Dynamic Binary Modification Tool for ARM. ACM TACO 13, 1 (2016), 14.","journal-title":"ACM TACO"},{"key":"e_1_3_2_1_26_1","unstructured":"Thomas Huet. 2017. AFL. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/ docs\/technical_details.txt.  Thomas Huet. 2017. AFL. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/ docs\/technical_details.txt."},{"key":"e_1_3_2_1_27_1","unstructured":"Intel. 2016. Intel is innovating to stop cyber attacks. https:\/\/blogs.intel. com\/blog\/intel-innovating-stop-cyber-attacks\/.  Intel. 2016. Intel is innovating to stop cyber attacks. https:\/\/blogs.intel. com\/blog\/intel-innovating-stop-cyber-attacks\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Intel. 2017. Control-flow Enforcement Technology Preview. https: \/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flowenforcement- technology-preview.pdf.  Intel. 2017. Control-flow Enforcement Technology Preview. https: \/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flowenforcement- technology-preview.pdf."},{"key":"e_1_3_2_1_29_1","volume-title":"Keromytis","author":"Kemerlis Vasileios P.","year":"2012","unstructured":"Vasileios P. Kemerlis , Georgios Portokalidis , and Angelos D . Keromytis . 2012 . kGuard: Lightweight Kernel Protection against Return-to-user Attacks. In Proc. of USENIX SEC. 459--474. Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis. 2012. kGuard: Lightweight Kernel Protection against Return-to-user Attacks. In Proc. of USENIX SEC. 459--474."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134627"},{"key":"e_1_3_2_1_31_1","volume-title":"Proc. of USENIX SEC. 191--206","author":"Kiriansky Vladimir","year":"2002","unstructured":"Vladimir Kiriansky , Derek Bruening , and Saman Amarasinghe . 2002 . Secure Execution via Program Shepherding . In Proc. of USENIX SEC. 191--206 . Vladimir Kiriansky, Derek Bruening, and Saman Amarasinghe. 2002. Secure Execution via Program Shepherding. In Proc. of USENIX SEC. 191--206."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00029"},{"key":"e_1_3_2_1_34_1","unstructured":"Michael Larabel. 2018. Benchmarking Retpoline-Enabled GCC 8 With -mindirect-branch=thunk. https:\/\/www.phoronix.com\/scan.php?page= article&item=gcc8-mindirect-thunk&num=2.  Michael Larabel. 2018. Benchmarking Retpoline-Enabled GCC 8 With -mindirect-branch=thunk. https:\/\/www.phoronix.com\/scan.php?page= article&item=gcc8-mindirect-thunk&num=2."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_1_37_1","unstructured":"LLVM. 2019. LLVM Language Reference Manual. https:\/\/llvm.org\/ docs\/LangRef.html.  LLVM. 2019. LLVM Language Reference Manual. https:\/\/llvm.org\/ docs\/LangRef.html."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_39_1","unstructured":"Marcus Meissner. 2017. openSUSE Tumbleweed now full of PIE. https: \/\/lists.opensuse.org\/opensuse-factory\/2017-06\/msg00403.html.  Marcus Meissner. 2017. openSUSE Tumbleweed now full of PIE. https: \/\/lists.opensuse.org\/opensuse-factory\/2017-06\/msg00403.html."},{"key":"e_1_3_2_1_40_1","unstructured":"Microsoft. 2016. -DYNAMICBASE (Use address space layout randomization). https:\/\/docs.microsoft.com\/en-us\/cpp\/build\/reference\/ dynamicbase-use-address-space\\protect\\discretionary{\\char\\ hyphenchar\\font}{}{}layout-randomization.  Microsoft. 2016. -DYNAMICBASE (Use address space layout randomization). https:\/\/docs.microsoft.com\/en-us\/cpp\/build\/reference\/ dynamicbase-use-address-space\\protect\\discretionary{\\char\\ hyphenchar\\font}{}{}layout-randomization."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_43_1","first-page":"49","article-title":"Smashing The Stack For Fun And Profit","volume":"7","author":"One Aleph","year":"1996","unstructured":"Aleph One . 1996 . Smashing The Stack For Fun And Profit . Phrack 7 , 49 (Nov 1996). Aleph One. 1996. Smashing The Stack For Fun And Profit. Phrack 7, 49 (Nov 1996).","journal-title":"Phrack"},{"key":"e_1_3_2_1_44_1","volume-title":"Keromytis","author":"Pappas Vasilis","year":"2012","unstructured":"Vasilis Pappas , Michalis Polychronakis , and Angelos D . Keromytis . 2012 . Smashing the Gadgets : Hindering Return-Oriented Programming using In-Place Code Randomization. In Proc. of IEEE S &P. 601--615. Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis. 2012. Smashing the Gadgets: Hindering Return-Oriented Programming using In-Place Code Randomization. In Proc. of IEEE S&P. 601--615."},{"key":"e_1_3_2_1_45_1","unstructured":"Avery Pennarun Bill Allombert and Petter Reinholdtsen. 2019. Debian Popularity Contest. https:\/\/popcon.debian.org\/.  Avery Pennarun Bill Allombert and Petter Reinholdtsen. 2019. Debian Popularity Contest. https:\/\/popcon.debian.org\/."},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. of ARES. 507--512. ASPLOS '20, March 16--20","author":"Ramaswamy Ashwin","year":"2020","unstructured":"Ashwin Ramaswamy , Sergey Bratus , Sean W. Smith , and Michael E. Locasto . 2010. Katana: A Hot Patching Framework for ELF Executables . In Proc. of ARES. 507--512. ASPLOS '20, March 16--20 , 2020 , Lausanne, Switzerland D. Williams-King, H. Kobayashi, K. Williams-King, et al. Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, and Michael E. Locasto. 2010. Katana: A Hot Patching Framework for ELF Executables. In Proc. of ARES. 507--512. ASPLOS '20, March 16--20, 2020, Lausanne, Switzerland D. Williams-King, H. Kobayashi, K. Williams-King, et al."},{"key":"e_1_3_2_1_47_1","unstructured":"Martin Richtarsky. 2017. Hardening C\/C++ Programs Part II - Executable-Space Protection and ASLR. https:\/\/www.productivecpp. com\/hardening-cpp-programs-executable-space-protectionaddress- space-layout-randomization-aslr\/.  Martin Richtarsky. 2017. Hardening C\/C++ Programs Part II - Executable-Space Protection and ASLR. https:\/\/www.productivecpp. com\/hardening-cpp-programs-executable-space-protectionaddress- space-layout-randomization-aslr\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_50_1","unstructured":"Maksim Shudrak. 2019. drAFL. https:\/\/github.com\/mxmssh\/drAFL.  Maksim Shudrak. 2019. drAFL. https:\/\/github.com\/mxmssh\/drAFL."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_52_1","unstructured":"Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/ 7625886.  Paul Turner. 2018. Retpoline: a software construct for preventing branch-target-injection. https:\/\/support.google.com\/faqs\/answer\/ 7625886."},{"key":"e_1_3_2_1_53_1","unstructured":"Ubuntu. 2016. Security\/features - Ubuntu Wiki. https:\/\/wiki.ubuntu. com\/Security\/Features#Userspace_Hardening.  Ubuntu. 2016. Security\/features - Ubuntu Wiki. https:\/\/wiki.ubuntu. com\/Security\/Features#Userspace_Hardening."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.106"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420995"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23808-6_34"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"David Williams-King etal 2020. columbia\/egalito. https:\/\/github.com\/ columbia\/egalito.  David Williams-King et al. 2020. columbia\/egalito. https:\/\/github.com\/ columbia\/egalito.","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"David Williams-King etal 2020. Egalito. https:\/\/egalito.org.  David Williams-King et al. 2020. Egalito. https:\/\/egalito.org.","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_61_1","volume-title":"Proc. of USENIX OSDI. 367--382","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P. Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P. Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and Deployable Continuous Code Re-Randomization . In Proc. of USENIX OSDI. 367--382 . David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In Proc. of USENIX OSDI. 367--382."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338502.3359763"},{"key":"e_1_3_2_1_63_1","unstructured":"Michal Zalewski. 2019. AFL. http:\/\/lcamtuf.coredump.cx\/afl\/.  Michal Zalewski. 2019. AFL. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674025.2576208"},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. of USENIX SEC. 337--352","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar . 2013 . Control Flow Integrity for COTS Binaries . In Proc. of USENIX SEC. 337--352 . Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proc. of USENIX SEC. 337--352."}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '20","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378470","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3373376.3378470","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378470","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378470"}},"subtitle":["Layout-Agnostic Binary Recompilation"],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":65,"alternative-id":["10.1145\/3373376.3378470","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378470","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}