{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T12:49:08Z","timestamp":1751374148987,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1525609, CNS-1717425, CCF-1703487"],"award-info":[{"award-number":["CCF-1525609, CNS-1717425, CCF-1703487"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378492","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"987-1000","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["MERR"],"prefix":"10.1145","author":[{"given":"Yuanchao","family":"Xu","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Yan","family":"Solihin","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Xipeng","family":"Shen","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"PaX Team. 2003. [n.d.]. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt .  PaX Team. 2003. [n.d.]. PaX address space layout randomization (ASLR). http:\/\/pax.grsecurity.net\/docs\/aslr.txt ."},{"volume-title":"Proceedings of ACM Conference on Computer and Communications Security (CCS) .","year":"2005","author":"Abadi Martn","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661202"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2070830"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"volume-title":"Proc. of the International Symposium on Computer Architecture .","author":"Alshboul M.","key":"e_1_3_2_1_6_1"},{"volume-title":"Proc. of the International Symposium on Performance Analysis of Systems and Software .","author":"Awad A.","key":"e_1_3_2_1_7_1"},{"volume-title":"Proc. of the International Conference on Supercomputing .","author":"Awad A.","key":"e_1_3_2_1_8_1"},{"volume-title":"Proc. of the International Symposium on Architecture Support for Programming Language and Operating Systems .","author":"Awad A.","key":"e_1_3_2_1_9_1"},{"volume-title":"Proc. of the International Symposium on Computer Architecture .","author":"Awad A.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322250"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304073"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298470"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124543"},{"volume-title":"Proc. of the International Symposium on Computer Architecture .","author":"Chhabra S.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950380"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629589"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592814"},{"volume-title":"Proc. of the International Conference on Parallel Architectures and Compilation Techniques .","author":"Elnawawy H.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Bogdan F. Romanescu Alvin Lebeck Daniel Sorin and Alecia Bracy. 2010. UNified Instruction\/Translation\/Data (UNITD) coherence: One protocol to rule them all. 1--12. https:\/\/doi.org\/10.1109\/HPCA.2010.5416643  Bogdan F. Romanescu Alvin Lebeck Daniel Sorin and Alecia Bracy. 2010. UNified Instruction\/Translation\/Data (UNITD) coherence: One protocol to rule them all. 1--12. https:\/\/doi.org\/10.1109\/HPCA.2010.5416643","DOI":"10.1109\/HPCA.2010.5416643"},{"volume-title":"27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18). 83--97.","author":"Frassetto Tommaso","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304037"},{"volume-title":"USENIX Security Symposium .","author":"Giuffrida C.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750420"},{"key":"e_1_3_2_1_28_1","unstructured":"Intel. [n.d.]. Intel 64 and IA-32 architectures software developer's manual combined volumes 3A 3B and 3C: System programming guide.  Intel. [n.d.]. Intel 64 and IA-32 architectures software developer's manual combined volumes 3A 3B and 3C: System programming guide."},{"key":"e_1_3_2_1_29_1","unstructured":"Andy Rudoff Intel. [n.d.]. Persistent Memory Programming. http:\/\/pmem.io\/.  Andy Rudoff Intel. [n.d.]. Persistent Memory Programming. http:\/\/pmem.io\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978321"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2007.373503"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"volume-title":"Spectre attacks: Exploiting speculative execution. arXiv preprint arXiv:1801.01203","year":"2018","author":"Kocher Paul","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2954679.2872381"},{"volume-title":"12th $$USENIX$$ Workshop on Offensive Technologies ($$WOOT$$ 18) .","author":"Koruyeh Esmaeil Mohammadian","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2013.6557176"},{"volume-title":"11th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 14). 147--163.","author":"Kuznetsov Volodymyr","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.24"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2019.00032"},{"volume-title":"et almbox","year":"2018","author":"Lipp Moritz","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","unstructured":"Kangjie Lu Wenke Lee Stefan N\u00fcrnberger and Michael Backes. 2016. How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.. In NDSS .  Kangjie Lu Wenke Lee Stefan N\u00fcrnberger and Michael Backes. 2016. How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.. In NDSS ."},{"volume-title":"Vijay Janapa Reddi, and Kim Hazelwood","year":"2005","author":"Luk Chi-Keung","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243761"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037730"},{"volume-title":"Smashing the stack for fun and profit. Phrack magazine","year":"1996","author":"One Aleph","key":"e_1_3_2_1_46_1"},{"volume-title":"ACM SIGARCH Computer Architecture News","author":"Pelley Steven","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Felix Schuster Thomas Tendyck Christopher Liebchen Lucas Davi Ahmad-Reza Sadeghi and Thorsten Holz. 2015. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C  Felix Schuster Thomas Tendyck Christopher Liebchen Lucas Davi Ahmad-Reza Sadeghi and Thorsten Holz. 2015. Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C","DOI":"10.1109\/SP.2015.51"},{"volume-title":"2015 IEEE Symposium on Security and Privacy . IEEE, 745--762","key":"e_1_3_2_1_49_1"},{"key":"e_1_3_2_1_50_1","unstructured":"David Sehr Robert Muth Cliff L Biffle Victor Khimenko Egor Pasko Bennet Yee Karl Schimpf and Brad Chen. 2010. Adapting software fault isolation to contemporary CPU architectures. (2010).  David Sehr Robert Muth Cliff L Biffle Victor Khimenko Egor Pasko Bennet Yee Karl Schimpf and Brad Chen. 2010. Adapting software fault isolation to contemporary CPU architectures. (2010)."},{"volume-title":"ACM conference on Computer and communications security","author":"Hovav","key":"e_1_3_2_1_51_1"},{"volume-title":"USENIX Security Symposium . 201--220","year":"2001","author":"Shankar Umesh","key":"e_1_3_2_1_52_1"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3124539"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080240"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.2885589"},{"volume-title":"Workshop on Hot Topics in Operating Systems (HotOS) .","year":"2017","author":"Swift Michael","key":"e_1_3_2_1_57_1"},{"volume-title":"Proceedings of the Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS XVI). ACM","year":"1950","author":"Volos Haris","key":"e_1_3_2_1_58_1"},{"key":"e_1_3_2_1_59_1","volume-title":"ACM SIGOPS Operating Systems Review","volume":"27","author":"Wahbe Robert","year":"1994"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.59"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123981"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00046"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"volume-title":"Shuffler: Fast and deployable continuous code re-randomization. In 12th $$USENIX$$ Symposium on Operating Systems Design and Implementation ($$OSDI$$ 16) . 367--382.","year":"2016","author":"Williams-King David","key":"e_1_3_2_1_64_1"},{"volume-title":"NOVA: A Log-structured File System for Hybrid Volatile\/Non-volatile Main Memories. In 14th USENIX Conference on File and Storage Technologies (FAST 16)","year":"2016","author":"Xu Jian","key":"e_1_3_2_1_65_1"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132761"}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Lausanne Switzerland","acronym":"ASPLOS '20"},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378492","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378492"}},"subtitle":["Improving Security of Persistent Memory Objects via Efficient Memory Exposure Reduction and Randomization"],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":66,"alternative-id":["10.1145\/3373376.3378492","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378492","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}