{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:02:46Z","timestamp":1755838966423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T00:00:00Z","timestamp":1590796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US Office of Naval Research","award":["N00014-18-1-2022"],"award-info":[{"award-number":["N00014-18-1-2022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,30]]},"DOI":"10.1145\/3383669.3398280","type":"proceedings-article","created":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T12:25:03Z","timestamp":1590841503000},"page":"49-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["MARDU"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Jelesnianski","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Jinwoo","family":"Yom","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Changwoo","family":"Min","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Oregon State University"}]}],"member":"320","published-online":{"date-parts":[[2020,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. musl libc. https:\/\/wiki.musl-libc.org\/.  2019. musl libc. https:\/\/wiki.musl-libc.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"One Aleph. 1996. Smashing the stack for fun and profit. http:\/\/www.shmoo.com\/phrack\/Phrack49\/p49-14 (1996).  One Aleph. 1996. Smashing the stack for fun and profit. http:\/\/www.shmoo.com\/phrack\/Phrack49\/p49-14 (1996)."},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon. 2019. Amazon EC2 C5 Instances. https:\/\/aws.amazon.com\/ec2\/instance-types\/c5\/.  Amazon. 2019. Amazon EC2 C5 Instances. https:\/\/aws.amazon.com\/ec2\/instance-types\/c5\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Once upon a free ().. Phrack Magazine 11, 57","author":"Anonimo Autore","year":"2001","unstructured":"Autore Anonimo . 2001. Once upon a free ().. Phrack Magazine 11, 57 ( 2001 ). Autore Anonimo. 2001. Once upon a free ().. Phrack Magazine 11, 57 (2001)."},{"key":"e_1_3_2_1_5_1","unstructured":"ARM. 2019. ARM Compiler Software Development Guide: 2.21 Execute-only memory. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.dui0471j\/chr1368698326509.html.  ARM. 2019. ARM Compiler Software Development Guide: 2.21 Execute-only memory. http:\/\/infocenter.arm.com\/help\/index.jsp?topic=\/com.arm.doc.dui0471j\/chr1368698326509.html."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (Security)","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan N\u00fcrnberger . 2014 . Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing . In Proceedings of the 23rd USENIX Security Symposium (Security) . San Diego, CA. Michael Backes and Stefan N\u00fcrnberger. 2014. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. In Proceedings of the 23rd USENIX Security Symposium (Security). San Diego, CA."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.17"},{"key":"e_1_3_2_1_11_1","volume-title":"Code Randomization: Haven't We Solved This Problem Yet?. In Cybersecurity Development (SecDev)","author":"Crane Stephen","year":"2016","unstructured":"Stephen Crane , Andrei Homescu , and Per Larsen . 2016 . Code Randomization: Haven't We Solved This Problem Yet?. In Cybersecurity Development (SecDev) , IEEE. IEEE , 124--129. Stephen Crane, Andrei Homescu, and Per Larsen. 2016. Code Randomization: Haven't We Solved This Problem Yet?. In Cybersecurity Development (SecDev), IEEE. IEEE, 124--129."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.52"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813682"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Ding Ren","year":"2017","unstructured":"Ren Ding , Chenxiong Qian , Chengyu Song , Bill Harris , Taesoo Kim , and Wenke Lee . 2017 . Efficient protection of path-sensitive control security . In Proceedings of the 26th USENIX Security Symposium (Security) . Vancouver, BC, Canada. Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. 2017. Efficient protection of path-sensitive control security. In Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC, Canada."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"volume-title":"Hardening Flags Updates for Fedora 28. https:\/\/fedoraproject.org\/wiki\/Changes\/HardeningFlags28","key":"e_1_3_2_1_16_1","unstructured":"Fedora. 2018. Hardening Flags Updates for Fedora 28. https:\/\/fedoraproject.org\/wiki\/Changes\/HardeningFlags28 . Fedora. 2018. Hardening Flags Updates for Fedora 28. https:\/\/fedoraproject.org\/wiki\/Changes\/HardeningFlags28."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304037"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362833"},{"key":"e_1_3_2_1_20_1","unstructured":"Will Glozer. 2019. a HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk.  Will Glozer. 2019. a HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241104"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_1_24_1","unstructured":"Intel Corporation. 2019. Intel 64 and IA-32 Architectures Software Developer's Manual. https:\/\/software.intel.com\/en-us\/articles\/intelsdm.  Intel Corporation. 2019. Intel 64 and IA-32 Architectures Software Developer's Manual. https:\/\/software.intel.com\/en-us\/articles\/intelsdm."},{"key":"e_1_3_2_1_25_1","unstructured":"Intel Corporation. 2019. INTEL \u00ae XEON \u00ae SCALABLE PROCESSORS. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/processors\/xeon\/scalable.html.  Intel Corporation. 2019. INTEL \u00ae XEON \u00ae SCALABLE PROCESSORS. https:\/\/www.intel.com\/content\/www\/us\/en\/products\/processors\/xeon\/scalable.html."},{"key":"e_1_3_2_1_26_1","unstructured":"Jonathan Corbet. 2004. x86 NX support. https:\/\/lwn.net\/Articles\/87814\/.  Jonathan Corbet. 2004. x86 NX support. https:\/\/lwn.net\/Articles\/87814\/."},{"issue":"8","key":"e_1_3_2_1_27_1","volume":"57","author":"Kaempf Michel","year":"2001","unstructured":"Michel Kaempf . [n. d.]. Vudo malloc tricks. Phrack Magazine , 57 ( 8 ), August 2001 . Michel Kaempf. [n. d.]. Vudo malloc tricks. Phrack Magazine, 57 (8), August 2001.","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.58"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In Proceedings of the 27th USENIX Security Symposium (Security) . Baltimore, MD. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In Proceedings of the 27th USENIX Security Symposium (Security). Baltimore, MD."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23173"},{"key":"e_1_3_2_1_32_1","unstructured":"Michael Larabel. 2017. Glibc Rolls Out Support For Memory Protection Keys. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Glibc-Memory-Protection-Keys.  Michael Larabel. 2017. Glibc Rolls Out Support For Memory Protection Keys. https:\/\/www.phoronix.com\/scan.php?page=news_item&px=Glibc-Memory-Protection-Keys."},{"key":"e_1_3_2_1_33_1","volume-title":"Windows XP Tablet PC Edition","author":"Support Microsoft","year":"2005","unstructured":"Microsoft Support . 2017. A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2 , Windows XP Tablet PC Edition 2005 , and Windows Server 2003. https:\/\/support.microsoft.com\/en-us\/help\/875352\/a-detailed-description-of-the-data-execution-prevention-dep-feature-in. Microsoft Support. 2017. A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition 2005, and Windows Server 2003. https:\/\/support.microsoft.com\/en-us\/help\/875352\/a-detailed-description-of-the-data-execution-prevention-dep-feature-in."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241105"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134626"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"volume-title":"Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland)","author":"Snow K. Z.","key":"e_1_3_2_1_37_1","unstructured":"K. Z. Snow , R. Rogowski , J. Werner , H. Koo , F. Monrose , and M. Polychronakis . 2016. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks . In Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland) . San Jose, CA. K. Z. Snow, R. Rogowski, J. Werner, H. Koo, F. Monrose, and M. Polychronakis. 2016. Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks. In Proceedings of the 37th IEEE Symposium on Security and Privacy (Oakland). San Jose, CA."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050752"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_5"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and Deployable Continuous Code Re-Randomization . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI) . Savannah, GA. David Williams-King, Graham Gobieski, Kent Williams-King, James P Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Savannah, GA."}],"event":{"name":"SYSTOR '20: The 13th ACM International Systems and Storage Conference","sponsor":["Technion Israel Institute of Technology","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Haifa Israel","acronym":"SYSTOR '20"},"container-title":["Proceedings of the 13th ACM International Systems and Storage Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383669.3398280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383669.3398280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:18Z","timestamp":1750199598000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383669.3398280"}},"subtitle":["Efficient and Scalable Code Re-randomization"],"short-title":[],"issued":{"date-parts":[[2020,5,30]]},"references-count":41,"alternative-id":["10.1145\/3383669.3398280","10.1145\/3383669"],"URL":"https:\/\/doi.org\/10.1145\/3383669.3398280","relation":{},"subject":[],"published":{"date-parts":[[2020,5,30]]},"assertion":[{"value":"2020-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}