{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T18:54:03Z","timestamp":1777488843561,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Research Council (ERC)","award":["850868"],"award-info":[{"award-number":["850868"]}]},{"name":"NSF","award":["CNS-1801601"],"award-info":[{"award-number":["CNS-1801601"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447844","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"257-268","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Code Specialization through Dynamic Feature Observation"],"prefix":"10.1145","author":[{"given":"Priyam","family":"Biswas","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Nathan","family":"Burow","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Online; accssed 10-Oct-2020. Fuzzing. https:\/\/www.owasp.org\/index.php\/ Fuzzing.  Online; accssed 10-Oct-2020. Fuzzing. https:\/\/www.owasp.org\/index.php\/ Fuzzing."},{"key":"e_1_3_2_2_2_1","unstructured":"Online; accssed 11-Oct-2020. american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/.  Online; accssed 11-Oct-2020. american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Online; accssed 11-Oct-2020. Control-flow Enforcement Technology. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flowenforcement-technology-preview.pdf.  Online; accssed 11-Oct-2020. Control-flow Enforcement Technology. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flowenforcement-technology-preview.pdf."},{"key":"e_1_3_2_2_4_1","unstructured":"Online; accssed 11-Oct-2020. Control Flow Integrity. https:\/\/clang.llvm.org\/docs\/ ControlFlowIntegrity.html.  Online; accssed 11-Oct-2020. Control Flow Integrity. https:\/\/clang.llvm.org\/docs\/ ControlFlowIntegrity.html."},{"key":"e_1_3_2_2_5_1","unstructured":"Online; accssed 11-Oct-2020. Control Flow Integrity Design Documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrityDesign.html.  Online; accssed 11-Oct-2020. Control Flow Integrity Design Documentation. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrityDesign.html."},{"key":"e_1_3_2_2_6_1","unstructured":"Online; accssed 11-Oct-2020. honggfuzz. https:\/\/github.com\/google\/honggfuzz.  Online; accssed 11-Oct-2020. honggfuzz. https:\/\/github.com\/google\/honggfuzz."},{"key":"e_1_3_2_2_7_1","unstructured":"Online; accssed 11-Oct-2020. libpng. http:\/\/www.libpng.org\/pub\/png\/libpng.html.  Online; accssed 11-Oct-2020. libpng. http:\/\/www.libpng.org\/pub\/png\/libpng.html."},{"key":"e_1_3_2_2_8_1","unstructured":"Online; accssed 11-Oct-2020. libTIFF. http:\/\/www.libtiff.org\/.  Online; accssed 11-Oct-2020. libTIFF. http:\/\/www.libtiff.org\/."},{"key":"e_1_3_2_2_9_1","unstructured":"Online; accssed 11-Oct-2020. UndefinedBehaviorSanitizer. https: \/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html.  Online; accssed 11-Oct-2020. UndefinedBehaviorSanitizer. https: \/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html."},{"key":"e_1_3_2_2_10_1","first-page":"27","volume":"2020","year":"2020","unstructured":"Online; accssed 13-Oct- 2020 . Linux in 2020 : 27 .8 million lines of code in the kernel, 1.3 million in systemd. https:\/\/www.linux.com\/news\/linux-in-2020-27-8-millionlines-of-code-in-the-kernel-1-3-million-in-systemd\/. Online; accssed 13-Oct-2020. Linux in 2020: 27.8 million lines of code in the kernel, 1.3 million in systemd. https:\/\/www.linux.com\/news\/linux-in-2020-27-8-millionlines-of-code-in-the-kernel-1-3-million-in-systemd\/.","journal-title":"Linux in"},{"key":"e_1_3_2_2_11_1","unstructured":"Online; accssed 13-Oct-2020. Linux Kernel. https:\/\/en.wikipedia.org\/wiki\/Linux_ kernel.  Online; accssed 13-Oct-2020. Linux Kernel. https:\/\/en.wikipedia.org\/wiki\/Linux_ kernel."},{"key":"e_1_3_2_2_12_1","unstructured":"Online; accssed 15-Jan-2021. CVE-2014-0038: Privilege escalation in X32 ABI. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0038.  Online; accssed 15-Jan-2021. CVE-2014-0038: Privilege escalation in X32 ABI. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2014-0038."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"e_1_3_2_2_15_1","unstructured":"Google Android. 2018. Kernel Control Flow Integrity. https:\/\/source.android.com\/ devices\/tech\/debug\/kcfi.  Google Android. 2018. Kernel Control Flow Integrity. https:\/\/source.android.com\/ devices\/tech\/debug\/kcfi."},{"key":"e_1_3_2_2_16_1","volume-title":"12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19).","author":"Brown Michael D","unstructured":"Michael D Brown and Santosh Pande . 2019. Is less really more? towards better metrics for measuring security improvements realized through software debloating . In 12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19). Michael D Brown and Santosh Pande. 2019. Is less really more? towards better metrics for measuring security improvements realized through software debloating. In 12th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 19)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_2_18_1","volume-title":"SoK: Shining Light on Shadow Stacks. SP'19","author":"Burow Nathan","year":"2019","unstructured":"Nathan Burow , Xinping Zhang , and Mathias Payer . 2019 . SoK: Shining Light on Shadow Stacks. SP'19 (2019). Nathan Burow, Xinping Zhang, and Mathias Payer. 2019. SoK: Shining Light on Shadow Stacks. SP'19 (2019)."},{"key":"e_1_3_2_2_19_1","volume-title":"USENIX Security Symposium. 161--176","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini , Antonio Barresi , Mathias Payer , David Wagner , and Thomas R Gross . 2015 . Control-Flow Bending: On the Effectiveness of Control-Flow Integrity .. In USENIX Security Symposium. 161--176 . Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.. In USENIX Security Symposium. 161--176."},{"key":"e_1_3_2_2_20_1","volume-title":"Chromium: Control Flow Integrity. https:\/\/www.chromium.org\/developers\/testing\/control-flow-integrity.","author":"Chromium Google","year":"2017","unstructured":"Google Chromium . 2017 . Chromium: Control Flow Integrity. https:\/\/www.chromium.org\/developers\/testing\/control-flow-integrity. Google Chromium. 2017. Chromium: Control Flow Integrity. https:\/\/www.chromium.org\/developers\/testing\/control-flow-integrity."},{"key":"e_1_3_2_2_21_1","volume-title":"26th {USENIX} Security Symposium ({USENIX} Security 17). 131--148.","author":"Ding Ren","unstructured":"Ren Ding , Chenxiong Qian , Chengyu Song , Bill Harris , Taesoo Kim , and Wenke Lee . 2017. Efficient protection of path-sensitive control security . In 26th {USENIX} Security Symposium ({USENIX} Security 17). 131--148. Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. 2017. Efficient protection of path-sensitive control security. In 26th {USENIX} Security Symposium ({USENIX} Security 17). 131--148."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 25th International Conference on Compiler Construction, CC, Ayal Zaks and Manuel V. Hermenegildo (Eds.). 132--142","author":"Gregory","unstructured":"Gregory J. Duck and Roland H. C. Yap. 2016. Heap bounds protection with low fat pointers . In Proceedings of the 25th International Conference on Compiler Construction, CC, Ayal Zaks and Manuel V. Hermenegildo (Eds.). 132--142 . Gregory J. Duck and Roland H. C. Yap. 2016. Heap bounds protection with low fat pointers. In Proceedings of the 25th International Conference on Compiler Construction, CC, Ayal Zaks and Manuel V. Hermenegildo (Eds.). 132--142."},{"key":"e_1_3_2_2_23_1","volume-title":"Stack Bounds Protection with Low Fat Pointers. In 24th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society.","author":"Duck Gregory J.","unstructured":"Gregory J. Duck , Roland H. C. Yap , and Lorenzo Cavallaro. 2017 . Stack Bounds Protection with Low Fat Pointers. In 24th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society. Gregory J. Duck, Roland H. C. Yap, and Lorenzo Cavallaro. 2017. Stack Bounds Protection with Low Fat Pointers. In 24th Annual Network and Distributed System Security Symposium, NDSS. The Internet Society."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092729"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664249"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037716"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345665"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_2_30_1","volume-title":"Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. In WOOT.","author":"Homescu Andrei","year":"2012","unstructured":"Andrei Homescu , Michael Stewart , Per Larsen , Stefan Brunthaler , and Michael Franz . 2012 . Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. In WOOT. Andrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, and Michael Franz. 2012. Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. In WOOT."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243739"},{"key":"e_1_3_2_2_34_1","volume-title":"FuZZan: Efficient Sanitizer Metadata Design for Fuzzing. In Usenix Annual Technical Conference.","author":"Jeon Yuseok","year":"2020","unstructured":"Yuseok Jeon , WookHyun Han , Nathan Burow , and Mathias Payer . 2020 . FuZZan: Efficient Sanitizer Metadata Design for Fuzzing. In Usenix Annual Technical Conference. Yuseok Jeon, WookHyun Han, Nathan Burow, and Mathias Payer. 2020. FuZZan: Efficient Sanitizer Metadata Design for Fuzzing. In Usenix Annual Technical Conference."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00029"},{"key":"e_1_3_2_2_36_1","unstructured":"Neil D Jones Carsten K Gomard and Peter Sestoft. 1993. Partial evaluation and automatic program generation. Peter Sestoft.  Neil D Jones Carsten K Gomard and Peter Sestoft. 1993. Partial evaluation and automatic program generation. Peter Sestoft."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568296"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_2_40_1","volume-title":"Taesoo Kim, and Wenke Lee.","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian , Hong Hu , Mansour Alharthi , Pak Ho Chung , Taesoo Kim, and Wenke Lee. 2019 . {RAZOR}: A Framework for Post-deployment Software Debloating. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1733--1750. Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, and Wenke Lee. 2019. {RAZOR}: A Framework for Post-deployment Software Debloating. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1733--1750."},{"key":"e_1_3_2_2_41_1","volume-title":"Debloating Software through Piece-Wise Compilation and Loading. arXiv preprint arXiv:1802.00759","author":"Quach Anh","year":"2018","unstructured":"Anh Quach , Aravind Prakash , and Lok Kwong Yan . 2018. Debloating Software through Piece-Wise Compilation and Loading. arXiv preprint arXiv:1802.00759 ( 2018 ). Anh Quach, Aravind Prakash, and Lok Kwong Yan. 2018. Debloating Software through Piece-Wise Compilation and Loading. arXiv preprint arXiv:1802.00759 (2018)."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106271"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_23"},{"key":"e_1_3_2_2_46_1","unstructured":"Address Sanitizer. Online; accssed 10-Oct-2020. ASan.  Address Sanitizer. Online; accssed 10-Oct-2020. ASan."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_2_48_1","volume-title":"USENIX Annual Technical Conference. 309--318","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitriy Vyukov . 2012 . AddressSanitizer: A Fast Address Sanity Checker .. In USENIX Annual Technical Conference. 309--318 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker.. In USENIX Annual Technical Conference. 309--318."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_2_50_1","volume-title":"SoK: Sanitizing for Security. arXiv preprint arXiv:1806.04355","author":"Song Dokyung","year":"2018","unstructured":"Dokyung Song , Julian Lettner , Prabhu Rajasekaran , Yeoul Na , Stijn Volckaert , Per Larsen , and Michael Franz . 2018. SoK: Sanitizing for Security. arXiv preprint arXiv:1806.04355 ( 2018 ). Dokyung Song, Julian Lettner, Prabhu Rajasekaran, Yeoul Na, Stijn Volckaert, Per Larsen, and Michael Franz. 2018. SoK: Sanitizing for Security. arXiv preprint arXiv:1806.04355 (2018)."},{"key":"e_1_3_2_2_51_1","volume-title":"Proceedings of the 13th Annual IEEE\/ACM International Symposium on Code Generation and Optimization. IEEE Computer Society, 46--55","author":"Stepanov Evgeniy","year":"2015","unstructured":"Evgeniy Stepanov and Konstantin Serebryany . 2015 . MemorySanitizer: fast detector of uninitialized memory use in C++ . In Proceedings of the 13th Annual IEEE\/ACM International Symposium on Code Generation and Optimization. IEEE Computer Society, 46--55 . Evgeniy Stepanov and Konstantin Serebryany. 2015. MemorySanitizer: fast detector of uninitialized memory use in C++. In Proceedings of the 13th Annual IEEE\/ACM International Symposium on Code Generation and Optimization. IEEE Computer Society, 46--55."},{"key":"e_1_3_2_2_52_1","volume-title":"InUSENIX Security Symposium. 941--955","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM .. InUSENIX Security Symposium. 941--955 . Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM.. InUSENIX Security Symposium. 941--955."},{"key":"e_1_3_2_2_53_1","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 927--940","author":"van der Veen Victor","year":"2015","unstructured":"Victor van der Veen , Dennis Andriesse , Enes G\u00f6kta?, Ben Gras , Lionel Sambuc , Asia Slowinska , Herbert Bos , and Cristiano Giuffrida . 2015 . Practical contextsensitive CFI . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 927--940 . Victor van der Veen, Dennis Andriesse, Enes G\u00f6kta?, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, and Cristiano Giuffrida. 2015. Practical contextsensitive CFI. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 927--940."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","location":"Virtual Event USA","acronym":"CODASPY '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447844","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447844","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447844"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":53,"alternative-id":["10.1145\/3422337.3447844","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447844","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}