{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:18:33Z","timestamp":1763018313552,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100015089","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2891"],"award-info":[{"award-number":["N00014-17-1-2891"]}],"id":[{"id":"10.13039\/100015089","id-type":"DOI","asserted-by":"publisher"}]},{"name":"NSF","award":["CNS- 1918667"],"award-info":[{"award-number":["CNS- 1918667"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427292","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"401-414","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Practical\u00a0Fine-Grained\u00a0Binary\u00a0Code\u00a0Randomization\u2020"],"prefix":"10.1145","author":[{"given":"Soumyakant","family":"Priyadarshan","sequence":"first","affiliation":[{"name":"Stony Brook University, USA"}]},{"given":"Huan","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Stony Brook University, USA"}]},{"given":"R.","family":"Sekar","sequence":"additional","affiliation":[{"name":"Stony Brook University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"volume-title":"CFI: Principles, implementations, and applications. In ACM CCS.","year":"2005","author":"Abadi Mart\u0131n","key":"e_1_3_2_1_1_1"},{"volume-title":"Control-flow integrity principles, implementations, and applications. ACM TISSEC","year":"2009","author":"Abadi Mart\u00edn","key":"e_1_3_2_1_2_1"},{"volume-title":"USENIX Security Symposium.","year":"2016","author":"Andriesse Dennis","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.11"},{"volume-title":"BYTEWEIGHT: Learning to Recognize Functions in Binary Code. In USENIX Security.","year":"2014","author":"Bao T.","key":"e_1_3_2_1_5_1"},{"volume-title":"USENIX Security Symposium.","year":"2005","author":"Bhatkar Sandeep","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Tyler Bletsch Xuxian Jiang Vince\u00a0W. Freeh and Zhenkai Liang. 2011. Jump-oriented programming: a new class of code-reuse attack. In ASIACCS.  Tyler Bletsch Xuxian Jiang Vince\u00a0W. Freeh and Zhenkai Liang. 2011. Jump-oriented programming: a new class of code-reuse attack. In ASIACCS.","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_8_1","unstructured":"Derek Bruening Timothy Garnett and Saman Amarasinghe. 2003. An infrastructure for adaptive dynamic optimization. In Code Generation and Optimization.  Derek Bruening Timothy Garnett and Saman Amarasinghe. 2003. An infrastructure for adaptive dynamic optimization. In Code Generation and Optimization."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"volume-title":"USENIX Security Symposium.","year":"2015","author":"Carlini Nicholas","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Xi Chen Herbert Bos and Cristiano Giuffrida. 2017. CodeArmor: Virtualizing the code space to counter disclosure attacks. In Euro S&P.  Xi Chen Herbert Bos and Cristiano Giuffrida. 2017. CodeArmor: Virtualizing the code space to counter disclosure attacks. In Euro S&P.","DOI":"10.1109\/EuroSP.2017.17"},{"volume-title":"NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64","year":"2017","author":"Chen Yaohui","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0050"},{"volume-title":"Readactor: Practical code randomization resilient to memory disclosure","year":"2015","author":"Crane Stephen","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Lucas Davi Ra Dmitrienko Manuel Egele Thomas Fischer Thorsten Holz Ralf Hund Stefan N\u00fcrnberger and Ahmad reza Sadeghi. 2012. MoCFI: a framework to mitigate control-flow attacks on smartphones. In NDSS.  Lucas Davi Ra Dmitrienko Manuel Egele Thomas Fischer Thorsten Holz Ralf Hund Stefan N\u00fcrnberger and Ahmad reza Sadeghi. 2012. MoCFI: a framework to mitigate control-flow attacks on smartphones. In NDSS."},{"volume-title":"Isomeron: Code randomization resilient to (just-in-time) return-oriented programming. In NDSS.","year":"2015","author":"Davi Lucas","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Lucas Davi Ahmad-Reza Sadeghi and Marcel Winandy. 2011. ROPdefender: a detection tool to defend against return-oriented programming attacks. In ASIACCS.  Lucas Davi Ahmad-Reza Sadeghi and Marcel Winandy. 2011. ROPdefender: a detection tool to defend against return-oriented programming attacks. In ASIACCS.","DOI":"10.1145\/1966913.1966920"},{"key":"e_1_3_2_1_18_1","unstructured":"Lucas\u00a0Vincenzo Davi Alexandra Dmitrienko Stefan N\u00fcrnberger and Ahmad-Reza Sadeghi. 2013. Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In ACM CCS.  Lucas\u00a0Vincenzo Davi Alexandra Dmitrienko Stefan N\u00fcrnberger and Ahmad-Reza Sadeghi. 2013. Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM. In ACM CCS."},{"volume-title":"RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE Symposium on Security and Privacy.","year":"2020","author":"Dinesh Sushant","key":"e_1_3_2_1_19_1"},{"volume-title":"USENIX Security Symposium.","year":"2017","author":"Ding Ren","key":"e_1_3_2_1_20_1"},{"volume-title":"XFI: Software guards for system address spaces. In Operating systems design and implementation.","year":"2006","author":"Erlingsson \u00dalfar","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Jason Gionta William Enck and Peng Ning. 2015. HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. In Data and Application Security and Privacy (CODASPY).  Jason Gionta William Enck and Peng Ning. 2015. HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. In Data and Application Security and Privacy (CODASPY).","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818025"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Niranjan Hasabnis and R Sekar. 2016. Extracting Instruction Semantics Via Symbolic Execution of Code Generators. In ACM Foundations of Software Engineering.  Niranjan Hasabnis and R Sekar. 2016. Extracting Instruction Semantics Via Symbolic Execution of Code Generators. In ACM Foundations of Software Engineering.","DOI":"10.1145\/2950290.2950335"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Niranjan Hasabnis and R Sekar. 2016. Lifting assembly to intermediate representation: A novel approach leveraging compilers. In Architectural Support for Programming Languages and Operating Systems.  Niranjan Hasabnis and R Sekar. 2016. Lifting assembly to intermediate representation: A novel approach leveraging compilers. In Architectural Support for Programming Languages and Operating Systems.","DOI":"10.1145\/2872362.2872380"},{"volume-title":"ILR: Where\u2019d my gadgets go?","year":"2012","author":"Hiser Jason","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Andrei Homescu Steven Neisius Per Larsen Stefan Brunthaler and Michael Franz. 2013. Profile-guided automated software diversity. In CGO.  Andrei Homescu Steven Neisius Per Larsen Stefan Brunthaler and Michael Franz. 2013. Profile-guided automated software diversity. In CGO.","DOI":"10.1109\/CGO.2013.6494997"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"volume-title":"USENIX Security Symposium.","year":"2019","author":"Khandaker Mustakimur\u00a0Rahman","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_31_1","unstructured":"Hyungjoon Koo Yaohui Chen Long Lu Vasileios\u00a0P Kemerlis and Michalis Polychronakis. 2018. Compiler-assisted code randomization. In Security and Privacy.  Hyungjoon Koo Yaohui Chen Long Lu Vasileios\u00a0P Kemerlis and Michalis Polychronakis. 2018. Compiler-assisted code randomization. In Security and Privacy."},{"key":"e_1_3_2_1_32_1","unstructured":"Hyungjoon Koo and Michalis Polychronakis. 2016. Juggling the gadgets: Binary-level code randomization using instruction displacement. In Asia CCS.  Hyungjoon Koo and Michalis Polychronakis. 2016. Juggling the gadgets: Binary-level code randomization using instruction displacement. In Asia CCS."},{"volume-title":"Annual Computer Security Applications Conference.","author":"Li Lixin","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"Chi-Keung Luk Robert Cohn Robert Muth Harish Patil Artur Klauser Geoff Lowney Steven Wallace Vijay\u00a0Janapa Reddi and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. In Programming language design and implementation.  Chi-Keung Luk Robert Cohn Robert Muth Harish Patil Artur Klauser Geoff Lowney Steven Wallace Vijay\u00a0Janapa Reddi and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. In Programming language design and implementation."},{"volume-title":"LISC v2: Learning Instruction Semantics from Code Generators","author":"Nguyen Huan","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Ben Niu and Gang Tan. 2014. RockJIT: Securing just-in-time compilation using modular control-flow integrity. In ACM CCS.  Ben Niu and Gang Tan. 2014. RockJIT: Securing just-in-time compilation using modular control-flow integrity. In ACM CCS.","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_1_37_1","unstructured":"James Oakley and Sergey Bratus. 2011. Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code. In WOOT.  James Oakley and Sergey Bratus. 2011. Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code. In WOOT."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Vasilis Pappas Michalis Polychronakis and Angelos\u00a0D Keromytis. 2012. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Security and Privacy.  Vasilis Pappas Michalis Polychronakis and Angelos\u00a0D Keromytis. 2012. Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In Security and Privacy.","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_39_1","unstructured":"Vasilis Pappas Michalis Polychronakis and Angelos\u00a0D Keromytis. 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In USENIX Security.  Vasilis Pappas Michalis Polychronakis and Angelos\u00a0D Keromytis. 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In USENIX Security."},{"key":"e_1_3_2_1_40_1","unstructured":"Marios Pomonis Theofilos Petsios Angelos\u00a0D Keromytis Michalis Polychronakis and Vasileios\u00a0P Kemerlis. 2017. kR2303 X: Comprehensive kernel protection against just-in-time code reuse. In EuroSys.  Marios Pomonis Theofilos Petsios Angelos\u00a0D Keromytis Michalis Polychronakis and Vasileios\u00a0P Kemerlis. 2017. kR2303 X: Comprehensive kernel protection against just-in-time code reuse. In EuroSys."},{"volume-title":"Secure Systems Lab","author":"Priyadarshan Soumyakant","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Soumyakant Priyadarshan Huan Nguyen and R. Sekar. 2020. On the Impact of Exception Handling Compatibility on Binary Instrumentation. In ACM FEAST.  Soumyakant Priyadarshan Huan Nguyen and R. Sekar. 2020. On the Impact of Exception Handling Compatibility on Binary Instrumentation. In ACM FEAST.","DOI":"10.1145\/3411502.3418428"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Rui Qiao and R Sekar. 2017. A Principled Approach for Function Recognition in COTS Binaries. In Dependable Systems and Networks (DSN).  Rui Qiao and R Sekar. 2017. A Principled Approach for Function Recognition in COTS Binaries. In Dependable Systems and Networks (DSN).","DOI":"10.1109\/DSN.2017.29"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818021"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Robert Rudd Richard Skowyra David Bigelow Veer Dedhia Thomas Hobson Stephen Crane Christopher Liebchen Per Larsen Lucas Davi Michael Franz 2017. Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. In NDSS.  Robert Rudd Richard Skowyra David Bigelow Veer Dedhia Thomas Hobson Stephen Crane Christopher Liebchen Per Larsen Lucas Davi Michael Franz 2017. Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity. In NDSS.","DOI":"10.14722\/ndss.2017.23477"},{"volume-title":"Counterfeit object-oriented programming: On the difficulty of preventing code reuse attacks in C++ applications","author":"Schuster Felix","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Hovav Shacham 2007. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In ACM CCS.  Hovav Shacham 2007. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). In ACM CCS.","DOI":"10.1145\/1315245.1315313"},{"volume-title":"USENIX Security Symposium.","year":"2015","author":"Chul\u00a0Richard Shin Eui","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2013.6671280"},{"volume-title":"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization","author":"Snow Z.","key":"e_1_3_2_1_50_1"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813685"},{"key":"e_1_3_2_1_52_1","unstructured":"Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM. In USENIX Security.  Caroline Tice Tom Roeder Peter Collingbourne Stephen Checkoway \u00dalfar Erlingsson Luis Lozano and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC and LLVM. In USENIX Security."},{"volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 927\u2013940","year":"2015","author":"Veen Victor Van\u00a0der","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Robert Wahbe Steven Lucco Thomas\u00a0E. Anderson and Susan\u00a0L. Graham. 1993. Efficient software-based fault isolation. In SOSP.  Robert Wahbe Steven Lucco Thomas\u00a0E. Anderson and Susan\u00a0L. Graham. 1993. Efficient software-based fault isolation. In SOSP.","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Richard Wartell Vishwath Mohan Kevin\u00a0W Hamlen and Zhiqiang Lin. 2012. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In ACM CCS.  Richard Wartell Vishwath Mohan Kevin\u00a0W Hamlen and Zhiqiang Lin. 2012. Binary stirring: Self-randomizing instruction addresses of legacy x86 binary code. In ACM CCS.","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897891"},{"volume-title":"Shuffler: Fast and deployable continuous code re-randomization. In OSDI.","year":"2016","author":"Williams-King David","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Chao Zhang Chengyu Song Z.\u00a0Kevin Chen Zhaofeng Chen and Dawn Song. 2015. VTint: Protecting Virtual Function Tables\u2019 Integrity. In NDSS.  Chao Zhang Chengyu Song Z.\u00a0Kevin Chen Zhaofeng Chen and Dawn Song. 2015. VTint: Protecting Virtual Function Tables\u2019 Integrity. In NDSS.","DOI":"10.14722\/ndss.2015.23099"},{"volume-title":"Practical control flow integrity and randomization for binary executables","author":"Zhang Chao","key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2013.44"},{"volume-title":"Annual Computer Security Applications Conference.","year":"2017","author":"Zhang Mingwei","key":"e_1_3_2_1_62_1"},{"volume-title":"A platform for secure static binary instrumentation. ACM VEE","year":"2014","author":"Zhang Mingwei","key":"e_1_3_2_1_63_1"},{"key":"e_1_3_2_1_64_1","unstructured":"Mingwei Zhang and R Sekar. 2013. Control flow integrity for COTS binaries. In USENIX Security.  Mingwei Zhang and R Sekar. 2013. Control flow integrity for COTS binaries. In USENIX Security."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Mingwei Zhang and R Sekar. 2015. Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks. In ACSAC.  Mingwei Zhang and R Sekar. 2015. Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks. In ACSAC.","DOI":"10.1145\/2818000.2818016"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427292","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427292","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427292","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427292"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":65,"alternative-id":["10.1145\/3427228.3427292","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427292","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}