{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:09:17Z","timestamp":1761664157390,"version":"3.41.0"},"reference-count":68,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T00:00:00Z","timestamp":1604966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Archit. Code Optim."],"published-print":{"date-parts":[[2020,12,31]]},"abstract":"<jats:p>Instruction Set Randomization (ISR) is able to protect against remote code injection attacks by randomizing the instruction set of each process. Thereby, even if an attacker succeeds to inject code, it will fail to execute on the randomized processor. The majority of existing ISR implementations is based on emulators and binary instrumentation tools that unfortunately: (i) incur significant runtime performance overheads, (ii) limit the ease of deployment, (iii) cannot protect the underlying operating system kernel, and (iv) are vulnerable to evasion attempts that bypass the ISR protection itself.<\/jats:p>\n          <jats:p>To address these issues, we present the design and implementation of ASIST, an architecture with both hardware and operating system support for ISR. ASIST uses our extended SPARC processor that is mapped onto a FPGA board and runs our modified Linux kernel to support the new features. In particular, before executing a new user-level process, the operating system loads its randomization key into a newly defined register, and the modified processor decodes the process\u2019s instructions with this key. Besides that, ASIST uses a separate randomization key for the operating system to protect the base system against attacks that exploit kernel vulnerabilities to run arbitrary code with elevated privileges. Our evaluation shows that ASIST can transparently protect both user-land applications and the operating system kernel from code injection and code reuse attacks, with about 1.5% runtime overhead when using simple encryption schemes, such as XOR and Transposition; more secure ciphers, such as AES, even though they are much more complicated for mapping them to hardware, they are still within acceptable margins,with approximately 10% runtime overhead, when efficiently leveraging the spatial locality of code through modern instruction cache configurations.<\/jats:p>","DOI":"10.1145\/3419841","type":"journal-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T23:16:11Z","timestamp":1605050171000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["On Architectural Support for Instruction Set Randomization"],"prefix":"10.1145","volume":"17","author":[{"given":"George","family":"Christou","sequence":"first","affiliation":[{"name":"Foundation for Research and Technology Hellas (FORTH-ICS), Heraklion, Greece"}]},{"given":"Giorgos","family":"Vasiliadis","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology Hellas (FORTH-ICS), Heraklion, Greece"}]},{"given":"Vassilis","family":"Papaefstathiou","sequence":"additional","affiliation":[{"name":"Foundation for Research and Technology Hellas (FORTH-ICS), Heraklion, Greece"}]},{"given":"Antonis","family":"Papadogiannakis","sequence":"additional","affiliation":[{"name":"Unaffiliated"}]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[{"name":"Technical University of Crete (TUC-ECE), Chania, Greece"}]}],"member":"320","published-online":{"date-parts":[[2020,11,10]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n.d.]. The SPARC Architecture Manual Version 8. Retrieved from www.sparc.com\/standards\/V8.pdf  [n.d.]. The SPARC Architecture Manual Version 8. Retrieved from www.sparc.com\/standards\/V8.pdf"},{"key":"e_1_2_1_2_1","unstructured":"[n.d.]. USA National Vulnerability Database. Retrieved from http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics.  [n.d.]. USA National Vulnerability Database. Retrieved from http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics."},{"key":"e_1_2_1_3_1","unstructured":"2006. Linux Kernel Remote Buffer Overflow Vulnerabilities. Retrieved from http:\/\/secwatch.org\/advisories\/1013445\/.  2006. Linux Kernel Remote Buffer Overflow Vulnerabilities. Retrieved from http:\/\/secwatch.org\/advisories\/1013445\/."},{"key":"e_1_2_1_4_1","unstructured":"2007. OpenBSD IPv6 mbuf Remote Kernel Buffer Overflow. Retrieved from http:\/\/www.securityfocus.com\/archive\/1\/462728\/30\/0\/threaded.  2007. OpenBSD IPv6 mbuf Remote Kernel Buffer Overflow. Retrieved from http:\/\/www.securityfocus.com\/archive\/1\/462728\/30\/0\/threaded."},{"key":"e_1_2_1_5_1","unstructured":"2008. Microsoft Windows TCP\/IP IGMP MLD Remote Buffer Overflow Vulnerability. Retrieved from http:\/\/www.securityfocus.com\/bid\/27100.  2008. Microsoft Windows TCP\/IP IGMP MLD Remote Buffer Overflow Vulnerability. Retrieved from http:\/\/www.securityfocus.com\/bid\/27100."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_2_1_7_1","volume-title":"White Paper","author":"Akdemir Kahraman","year":"2010","unstructured":"Kahraman Akdemir , Martin Dixon , Wajdi Feghali , Patrick Fay , Vinodh Gopal , Jim Guilford , Erdinc Ozturk , Gil Wolrich , and Ronen Zohar . 2010 . Breakthrough AES performance with intel AES new instructions . White Paper , June (2010), 11. Kahraman Akdemir, Martin Dixon, Wajdi Feghali, Patrick Fay, Vinodh Gopal, Jim Guilford, Erdinc Ozturk, Gil Wolrich, and Ronen Zohar. 2010. Breakthrough AES performance with intel AES new instructions. White Paper, June (2010), 11."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053286"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Bhatkar Sandeep","key":"e_1_2_1_10_1","unstructured":"Sandeep Bhatkar , Daniel C. DuVarney , and R. Sekar . 2003. Address obfuscation: An efficient approach to combat a board range of memory error exploits . In Proceedings of the USENIX Security Symposium. Sandeep Bhatkar, Daniel C. DuVarney, and R. Sekar. 2003. Address obfuscation: An efficient approach to combat a board range of memory error exploits. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_2_1_13_1","volume-title":"BlackHat DC Conference","author":"Blazakis Dion","year":"2010","unstructured":"Dion Blazakis . 2010 . Interpreter exploitation: Pointer inference and JIT spraying . In BlackHat DC Conference (2010). Dion Blazakis. 2010. Interpreter exploitation: Pointer inference and JIT spraying. In BlackHat DC Conference (2010)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.58"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914)","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner . 2014 . ROP is still dangerous: Breaking modern defenses . In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914) . Nicholas Carlini and David Wagner. 2014. ROP is still dangerous: Breaking modern defenses. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914)."},{"volume-title":"Proceedings of the Asia-Pacific Workshop on Systems (APSys\u201911)","author":"Chen Haogang","key":"e_1_2_1_19_1","unstructured":"Haogang Chen , Yandong Mao , Xi Wang , Dong Zhou , Nickolai Zeldovich , and M. Frans Kaashoek . 2011. Linux kernel vulnerabilities: State-of-the-art defenses and open problems . In Proceedings of the Asia-Pacific Workshop on Systems (APSys\u201911) . Haogang Chen, Yandong Mao, Xi Wang, Dong Zhou, Nickolai Zeldovich, and M. Frans Kaashoek. 2011. Linux kernel vulnerabilities: State-of-the-art defenses and open problems. In Proceedings of the Asia-Pacific Workshop on Systems (APSys\u201911)."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Chen Shuo","key":"e_1_2_1_20_1","unstructured":"Shuo Chen , Jun Xu , Emre C. Sezer , Prachi Gauriar , and Ravishankar K. Iyer . 2005. Non-control-data attacks are realistic threats . In Proceedings of the USENIX Security Symposium. Shuo Chen, Jun Xu, Emre C. Sezer, Prachi Gauriar, and Ravishankar K. Iyer. 2005. Non-control-data attacks are realistic threats. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_21_1","unstructured":"S. Christey and A. Martin. 2007. Vulnerability Type Distributions in CVE. Retrieved from http:\/\/cve.mitre.org\/docs\/vuln-trends\/vuln-trends.pdf.  S. Christey and A. Martin. 2007. Vulnerability Type Distributions in CVE. Retrieved from http:\/\/cve.mitre.org\/docs\/vuln-trends\/vuln-trends.pdf."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Cowan Crispin","year":"2001","unstructured":"Crispin Cowan , Matt Barringer , Steve Beattie , Greg Kroah-Hartman , Mike Frantzen , and Jamie Lokier . 2001 . FormatGuard: Automatic protection from printf format string vulnerabilities . In Proceedings of the USENIX Security Symposium. Crispin Cowan, Matt Barringer, Steve Beattie, Greg Kroah-Hartman, Mike Frantzen, and Jamie Lokier. 2001. FormatGuard: Automatic protection from printf format string vulnerabilities. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Cowan Crispin","year":"2003","unstructured":"Crispin Cowan , Steve Beattie , John Johansen , and Perry Wagle . 2003 . PointguardTM: Protecting pointers from buffer overflow vulnerabilities . In Proceedings of the USENIX Security Symposium. Crispin Cowan, Steve Beattie, John Johansen, and Perry Wagle. 2003. PointguardTM: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Cowan Crispin","year":"1998","unstructured":"Crispin Cowan , Calton Pu , Dave Maier , Heather Hintony , Jonathan Walpole , Peat Bakke , Steve Beattie , Aaron Grier , Perry Wagle , and Qian Zhang . 1998 . StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proceedings of the USENIX Security Symposium. Crispin Cowan, Calton Pu, Dave Maier, Heather Hintony, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, and Qian Zhang. 1998. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Dalton Michael","year":"2008","unstructured":"Michael Dalton , Hari Kannan , and Christos Kozyrakis . 2008 . Real-world buffer overflow protection for userspace 8 kernelspace . In Proceedings of the USENIX Security Symposium. Michael Dalton, Hari Kannan, and Christos Kozyrakis. 2008. Real-world buffer overflow protection for userspace 8 kernelspace. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2744847"},{"key":"e_1_2_1_28_1","unstructured":"Gaisler Research. 2005. Leon3 synthesizable processor. Retrieved from http:\/\/www.gaisler.com.  Gaisler Research. 2005. Leon3 synthesizable processor. Retrieved from http:\/\/www.gaisler.com."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304037"},{"key":"e_1_2_1_30_1","unstructured":"George Christou. 2020. ASIST Leon3 source code. Retrieved from https:\/\/github.com\/G3org1o\/grlib-asistmmu-aes.  George Christou. 2020. ASIST Leon3 source code. Retrieved from https:\/\/github.com\/G3org1o\/grlib-asistmmu-aes."},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Giuffrida Cristiano","key":"e_1_2_1_31_1","unstructured":"Cristiano Giuffrida , Anton Kuijsten , and Andrew S. Tanenbaum . 2012. Enhanced operating system security through efficient and fine-grained address space randomization . In Proceedings of the USENIX Security Symposium. Cristiano Giuffrida, Anton Kuijsten, and Andrew S. Tanenbaum. 2012. Enhanced operating system security through efficient and fine-grained address space randomization. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00024"},{"key":"e_1_2_1_33_1","unstructured":"Google Project Zero. 2019. Examining Pointer Authentication on the iPhone XS. Retrieved from https:\/\/googleprojectzero.blogspot.com\/2019\/02\/examining-pointer-authentication-on.html.  Google Project Zero. 2019. Examining Pointer Authentication on the iPhone XS. Retrieved from https:\/\/googleprojectzero.blogspot.com\/2019\/02\/examining-pointer-authentication-on.html."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150994"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1134764"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2007.36"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"volume-title":"Proceedings of the USENIX Security Symposium.","author":"Kemerlis Vasileios P.","key":"e_1_2_1_38_1","unstructured":"Vasileios P. Kemerlis , Georgios Portokalidis , and Angelos D. Keromytis . 2012. kGuard: Lightweight kernel protection against return-to-user attacks . In Proceedings of the USENIX Security Symposium. Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis. 2012. kGuard: Lightweight kernel protection against return-to-user attacks. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_2_1_40_1","volume-title":"Bochs: A portable PC emulator for Unix\/X. Linux J.","author":"Lawton Kevin P.","year":"1996","unstructured":"Kevin P. Lawton . 1996 . Bochs: A portable PC emulator for Unix\/X. Linux J. 1996, 29es (1996), 7-es. Kevin P. Lawton. 1996. Bochs: A portable PC emulator for Unix\/X. Linux J. 1996, 29es (1996), 7-es."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 28th USENIX Security Symposium.","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand , Thomas Nyman , Kui Wang , Carlos Chinea Perez , Jan-Erik Ekberg , and N Asokan . 2019 . PAC it up: Towards pointer integrity using ARM pointer authentication . In Proceedings of the 28th USENIX Security Symposium. Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, and N Asokan. 2019. PAC it up: Towards pointer integrity using ARM pointer authentication. In Proceedings of the 28th USENIX Security Symposium."},{"key":"e_1_2_1_42_1","volume-title":"Wenisch","author":"Lim Kevin","year":"2013","unstructured":"Kevin Lim , David Meisner , Ali G. Saidi , Parthasarathy Ranganathan , and Thomas F . Wenisch . 2013 . Thin servers with smart pipes: Designing SoC accelerators for memcached. In Proceedings of the ACM SIGARCH Computer Architecture News , Vol. 41 . Kevin Lim, David Meisner, Ali G. Saidi, Parthasarathy Ranganathan, and Thomas F. Wenisch. 2013. Thin servers with smart pipes: Designing SoC accelerators for memcached. In Proceedings of the ACM SIGARCH Computer Architecture News, Vol. 41."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading kernel memory from user space . In Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918) . Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading kernel memory from user space. In Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"volume-title":"The advanced return-into-lib(c) exploits: PaX case study. Phrack 11, 58","year":"2001","key":"e_1_2_1_45_1","unstructured":"Nergal. 2001. The advanced return-into-lib(c) exploits: PaX case study. Phrack 11, 58 ( 2001 ). Nergal. 2001. The advanced return-into-lib(c) exploits: PaX case study. Phrack 11, 58 (2001)."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516670"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.173"},{"key":"e_1_2_1_49_1","unstructured":"PaX Tream. 2001. Homepage of PaX. Retrieved from http:\/\/pax.grsecurity.net\/.  PaX Tream. 2001. Homepage of PaX. Retrieved from http:\/\/pax.grsecurity.net\/."},{"volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC\u201910)","author":"Portokalidis Georgios","key":"e_1_2_1_50_1","unstructured":"Georgios Portokalidis and Angelos D. Keromytis . 2010. Fast and practical instruction-set randomization for commodity systems . In Proceedings of the Annual Computer Security Applications Conference (ACSAC\u201910) . Georgios Portokalidis and Angelos D. Keromytis. 2010. Fast and practical instruction-set randomization for commodity systems. In Proceedings of the Annual Computer Security Applications Conference (ACSAC\u201910)."},{"volume-title":"Proceedings of the 29th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO 29)","author":"Rotenberg E.","key":"e_1_2_1_51_1","unstructured":"E. Rotenberg , S. Bennett , and J. E. Smith . 1996. Trace cache: A low latency approach to high bandwidth instruction fetching . In Proceedings of the 29th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO 29) . E. Rotenberg, S. Bennett, and J. E. Smith. 1996. Trace cache: A low latency approach to high bandwidth instruction fetching. In Proceedings of the 29th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO 29)."},{"volume-title":"Proceedings of the International Symposium on Code Generation and Optimization: Feedback-Directed and Runtime Optimization (CGO\u201903)","author":"Scott K.","key":"e_1_2_1_52_1","unstructured":"K. Scott , N. Kumar , S. Velusamy , B. Childers , J. W. Davidson , and M. L. Soffa . 2003. Retargetable and reconfigurable software dynamic translation . In Proceedings of the International Symposium on Code Generation and Optimization: Feedback-Directed and Runtime Optimization (CGO\u201903) . K. Scott, N. Kumar, S. Velusamy, B. Childers, J. W. Davidson, and M. L. Soffa. 2003. Retargetable and reconfigurable software dynamic translation. In Proceedings of the International Symposium on Code Generation and Optimization: Feedback-Directed and Runtime Optimization (CGO\u201903)."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294294"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SysSec.2011.27"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/HST.2017.7951732"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the USENIX Annual Technical Conference (ATC\u201912)","author":"Slowinska Asia","year":"2012","unstructured":"Asia Slowinska , Traian Stancescu , and Herbert Bos . 2012 . Body armor for binaries: Preventing buffer overflows without recompilation . In Proceedings of the USENIX Annual Technical Conference (ATC\u201912) . Asia Slowinska, Traian Stancescu, and Herbert Bos. 2012. Body armor for binaries: Preventing buffer overflows without recompilation. In Proceedings of the USENIX Annual Technical Conference (ATC\u201912)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Sovarel Ana Nora","year":"2005","unstructured":"Ana Nora Sovarel , David Evans , and Nathanael Paul . 2005 . Where\u2019s the FEEB? The effectiveness of instruction set randomization . In Proceedings of the USENIX Security Symposium. Ana Nora Sovarel, David Evans, and Nathanael Paul. 2005. Where\u2019s the FEEB? The effectiveness of instruction set randomization. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_2_1_61_1","volume-title":"SPEC CINT2006 Benchmarks.","author":"Standard Performance Evaluation Corporation (SPEC).","year":"2006","unstructured":"Standard Performance Evaluation Corporation (SPEC). 2006 . SPEC CINT2006 Benchmarks. Retrieved from http:\/\/www.spec.org\/cpu2006\/CINT2006. Standard Performance Evaluation Corporation (SPEC). 2006. SPEC CINT2006 Benchmarks. Retrieved from http:\/\/www.spec.org\/cpu2006\/CINT2006."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.20"},{"volume-title":"Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI\u201912)","author":"Wang Xi","key":"e_1_2_1_63_1","unstructured":"Xi Wang , Haogang Chen , Zhihao Jia , Nickolai Zeldovich , and M. Frans Kaashoek . 2012. Improving integer security for systems with KINT . In Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI\u201912) . Xi Wang, Haogang Chen, Zhihao Jia, Nickolai Zeldovich, and M. Frans Kaashoek. 2012. Improving integer security for systems with KINT. In Proceedings of the USENIX Symposium on Operating System Design and Implementation (OSDI\u201912)."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.33"},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James P. Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios P. Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and deployable continuous code re-randomization . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916) . David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and deployable continuous code re-randomization. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201916)."},{"key":"e_1_2_1_67_1","unstructured":"Xilinx. 2011. Xilinx University Program XUPV5-LX110T Development System. Retrieved from http:\/\/www.xilinx.com\/support\/documentation\/boards_and_kits\/ug347.pdf.  Xilinx. 2011. Xilinx University Program XUPV5-LX110T Development System. Retrieved from http:\/\/www.xilinx.com\/support\/documentation\/boards_and_kits\/ug347.pdf."},{"volume-title":"Proceedings of the 22nd USENIX Security Symposium (USENIX Security\u201913)","author":"Zhang Mingwei","key":"e_1_2_1_68_1","unstructured":"Mingwei Zhang and R. Sekar . 2013. Control flow integrity for COTS binaries . In Proceedings of the 22nd USENIX Security Symposium (USENIX Security\u201913) . 337--352. Mingwei Zhang and R. Sekar. 2013. Control flow integrity for COTS binaries. In Proceedings of the 22nd USENIX Security Symposium (USENIX Security\u201913). 337--352."}],"container-title":["ACM Transactions on Architecture and Code Optimization"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419841","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:32:03Z","timestamp":1750195923000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419841"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,10]]},"references-count":68,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,12,31]]}},"alternative-id":["10.1145\/3419841"],"URL":"https:\/\/doi.org\/10.1145\/3419841","relation":{},"ISSN":["1544-3566","1544-3973"],"issn-type":[{"type":"print","value":"1544-3566"},{"type":"electronic","value":"1544-3973"}],"subject":[],"published":{"date-parts":[[2020,11,10]]},"assertion":[{"value":"2019-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-11-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}