{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:25:25Z","timestamp":1759091125106,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"United States Office of Naval Research","award":["N00014-17-1-2782"],"award-info":[{"award-number":["N00014-17-1-2782"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411496.3421226","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T21:10:40Z","timestamp":1604351440000},"page":"45-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Adoption Challenges of Code Randomization"],"prefix":"10.1145","author":[{"given":"Per","family":"Larsen","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Michael","family":"Franz","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","unstructured":"ARM Ltd. 2017. ARM Architecture Reference Manual ARMv8. https:\/\/static.docs. arm.com\/ddi0487\/ca\/DDI0487C_a_armv8_arm.pdf.  ARM Ltd. 2017. ARM Architecture Reference Manual ARMv8. https:\/\/static.docs. arm.com\/ddi0487\/ca\/DDI0487C_a_armv8_arm.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium.","author":"Backes Michael","year":"2014","unstructured":"Michael Backes and Stefan N\u00fcrnberger . 2014 . Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing . In USENIX Security Symposium. Michael Backes and Stefan N\u00fcrnberger. 2014. Oxymoron: Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23318"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"volume-title":"Control-Flow Bending: On the Effectiveness of Control-flow Integrity. In USENIX Security Symposium.","author":"Carlini Nicolas","key":"e_1_3_2_1_6_1","unstructured":"Nicolas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R. Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-flow Integrity. In USENIX Security Symposium. Nicolas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-flow Integrity. In USENIX Security Symposium."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_3_2_1_8_1","volume-title":"Selfrando: Securing The Tor Browser Against De-anonymization Exploits. In Privacy Enhancing Technologies Symposium (PETS).","author":"Conti Mauro","year":"2016","unstructured":"Mauro Conti , Stephen Crane , Tommaso Frassetto , Andrei Homescu , Georg Koppen , Per Larsen , Christopher Liebchen , Mike Perry , and Ahmad-Reza Sadeghi . 2016 . Selfrando: Securing The Tor Browser Against De-anonymization Exploits. In Privacy Enhancing Technologies Symposium (PETS). Mauro Conti, Stephen Crane, Tommaso Frassetto, Andrei Homescu, Georg Koppen, Per Larsen, Christopher Liebchen, Mike Perry, and Ahmad-Reza Sadeghi. 2016. Selfrando: Securing The Tor Browser Against De-anonymization Exploits. In Privacy Enhancing Technologies Symposium (PETS)."},{"key":"e_1_3_2_1_9_1","volume-title":"Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium.","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi , Daniel Lehmann , Ahmad-Reza Sadeghi , and Fabian Monrose . 2014 . Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium. Lucas Davi, Daniel Lehmann, Ahmad-Reza Sadeghi, and Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection. In USENIX Security Symposium."},{"key":"e_1_3_2_1_10_1","volume-title":"Linux Plumbers Conference, https:\/\/www.linuxplumbersconf.org\/event\/4\/contributions\/571\/attachments\/399\/642\/MTE_LPC.pdf.","author":"Frascino Vincenzo","year":"2019","unstructured":"Vincenzo Frascino . 2019 . ARM v8.5 Memory Tagging Extension . Linux Plumbers Conference, https:\/\/www.linuxplumbersconf.org\/event\/4\/contributions\/571\/attachments\/399\/642\/MTE_LPC.pdf. Vincenzo Frascino. 2019. ARM v8.5 Memory Tagging Extension. Linux Plumbers Conference, https:\/\/www.linuxplumbersconf.org\/event\/4\/contributions\/571\/attachments\/399\/642\/MTE_LPC.pdf."},{"key":"e_1_3_2_1_11_1","volume-title":"Out of Control: Overcoming Control-Flow Integrity. In IEEE Symposium on Security and Privacy (S&P).","author":"G\u00f6ktas Enes","year":"2014","unstructured":"Enes G\u00f6ktas , Elias Athanasopoulos , Herbert Bos , and Georgios Portokalidis . 2014 . Out of Control: Overcoming Control-Flow Integrity. In IEEE Symposium on Security and Privacy (S&P). Enes G\u00f6ktas, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis. 2014. Out of Control: Overcoming Control-Flow Integrity. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_14_1","unstructured":"V. J. M. Man\u00e8s H. Han C. Han S. K. Cha M. Egele E. J. Schwartz and M. Woo. 2019. The Art Science and Engineering of Fuzzing: A Survey. IEEE Transactions on Software Engineering (2019). Early Access. https:\/\/ieeexplore.ieee.org\/document\/8863940.  V. J. M. Man\u00e8s H. Han C. Han S. K. Cha M. Egele E. J. Schwartz and M. Woo. 2019. The Art Science and Engineering of Fuzzing: A Survey. IEEE Transactions on Software Engineering (2019). Early Access. https:\/\/ieeexplore.ieee.org\/document\/8863940."},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft. 2006. Data Execution Prevention (DEP). http:\/\/support.microsoft.com\/kb\/875352\/EN-US.  Microsoft. 2006. Data Execution Prevention (DEP). http:\/\/support.microsoft.com\/kb\/875352\/EN-US."},{"key":"e_1_3_2_1_16_1","unstructured":"Microsoft Corporation 2018. Microsoft Control-Flow Guard. https:\/\/docs. microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard.  Microsoft Corporation 2018. Microsoft Control-Flow Guard. https:\/\/docs. microsoft.com\/en-us\/windows\/win32\/secbp\/control-flow-guard."},{"key":"e_1_3_2_1_17_1","volume-title":"Accessed September 12th","author":"Miller Matt","year":"2015","unstructured":"Matt Miller . 2015 . https:\/\/msrc-blog.microsoft.com\/2015\/09\/08\/what-makes-a-good-microsoft-defense-bounty-submission\/ . Accessed September 12th , 2020. Matt Miller. 2015. https:\/\/msrc-blog.microsoft.com\/2015\/09\/08\/what-makes-a-good-microsoft-defense-bounty-submission\/. Accessed September 12th, 2020."},{"key":"e_1_3_2_1_18_1","unstructured":"PaX Team. 2001. Homepage of The PaX Team. http:\/\/pax.grsecurity.net.  PaX Team. 2001. Homepage of The PaX Team. http:\/\/pax.grsecurity.net."},{"key":"e_1_3_2_1_19_1","unstructured":"Qualcomm Technologies Inc. 2017. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointerauthentication-on-armv8-3.pdf.  Qualcomm Technologies Inc. 2017. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointerauthentication-on-armv8-3.pdf."},{"key":"e_1_3_2_1_20_1","unstructured":"Kostya Serebryany Evgenii Stepanov Aleksey Shlyapnikov Vlad Tsyrklevich and Dmitry Vyukov. 2018. Memory Tagging and how it improves C\/C++ memory safety. https:\/\/arxiv.org\/pdf\/1802.09517.pdf.  Kostya Serebryany Evgenii Stepanov Aleksey Shlyapnikov Vlad Tsyrklevich and Dmitry Vyukov. 2018. Memory Tagging and how it improves C\/C++ memory safety. https:\/\/arxiv.org\/pdf\/1802.09517.pdf."},{"key":"e_1_3_2_1_21_1","unstructured":"Fermin J. Serna. 201"},{"key":"e_1_3_2_1_22_1","volume-title":"On the Effectiveness of Address-Space Randomization. In ACM Conference on Computer and Communications Security (CCS).","author":"Shacham Hovav","year":"2004","unstructured":"Hovav Shacham , Matthew Page , Ben Pfaff , Eu-Jin Goh , Nagendra Modadugu , and Dan Boneh . 2004 . On the Effectiveness of Address-Space Randomization. In ACM Conference on Computer and Communications Security (CCS). Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. 2004. On the Effectiveness of Address-Space Randomization. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_23_1","volume-title":"SoK: Sanitizing for Security. In IEEE Symposium on Security and Privacy (S&P).","author":"Song Dokyung","year":"2019","unstructured":"Dokyung Song , Julian Lettner , Prabhu Rajasekaran , Yeoul Na , Stijn Volckaert , Per Larsen , and Michael Franz . 2019 . SoK: Sanitizing for Security. In IEEE Symposium on Security and Privacy (S&P). Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, and Michael Franz. 2019. SoK: Sanitizing for Security. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_24_1","volume-title":"SoK: Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P).","author":"Szekeres Laszlo","year":"2013","unstructured":"Laszlo Szekeres , Mathias Payer , Tao Wei , and Dawn Song . 2013 . SoK: Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P). Laszlo Szekeres, Mathias Payer, Tao Wei, and Dawn Song. 2013. SoK: Eternal War in Memory. In IEEE Symposium on Security and Privacy (S&P)."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Annual Technical Conference.","author":"Volckaert Stijn","year":"2016","unstructured":"Stijn Volckaert , Bart Coppens , Alexios Voulimeneas , Andrei Homescu , Per Larsen , Bjorn De Sutter , and Michael Franz . 2016 . Secure and Efficient Application Monitoring and Replication .. In USENIX Annual Technical Conference. Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, and Michael Franz. 2016. Secure and Efficient Application Monitoring and Replication.. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_26_1","unstructured":"Tielei Wang and Hao Xu. 2019. Attacking iPhone XS Max. https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#attacking-iphone-xs-max-14444. BlackHat USA.  Tielei Wang and Hao Xu. 2019. Attacking iPhone XS Max. https:\/\/www.blackhat.com\/us-19\/briefings\/schedule\/#attacking-iphone-xs-max-14444. BlackHat USA."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 7th ACM Workshop on Moving Target Defense"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411496.3421226","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411496.3421226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411496.3421226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":26,"alternative-id":["10.1145\/3411496.3421226","10.1145\/3411496"],"URL":"https:\/\/doi.org\/10.1145\/3411496.3421226","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}