{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T06:45:56Z","timestamp":1762325156439,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T00:00:00Z","timestamp":1636934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["1908313"],"award-info":[{"award-number":["1908313"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3465413.3488573","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T15:20:12Z","timestamp":1636816812000},"page":"11-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Framework for Automatic Exploit Generation for JIT Compilers"],"prefix":"10.1145","author":[{"given":"Xiyu","family":"Kang","sequence":"first","affiliation":[{"name":"The University of Arizona, Tucson, AZ, USA"}]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[{"name":"The University of Arizona, Tucson, AZ, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,15]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Michalis Athanasakis Elias Athanasopoulos Michalis Polychronakis Georgios Portokalidis and Sotiris Ioannidis. 2015. The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.  Michalis Athanasakis Elias Athanasopoulos Michalis Polychronakis Georgios Portokalidis and Sotiris Ioannidis. 2015. The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines.","DOI":"10.14722\/ndss.2015.23209"},{"key":"e_1_3_2_2_2_1","volume-title":"AEG: Automatic Exploit Generation. In Network and Distributed System Security Symposium. Internet Society.","author":"Avgerinos Thanassis","year":"2011","unstructured":"Thanassis Avgerinos , Sang Kil Cha , Brent Lim , and David Brumley . 2011 . AEG: Automatic Exploit Generation. In Network and Distributed System Security Symposium. Internet Society. Thanassis Avgerinos, Sang Kil Cha, Brent Lim, and David Brumley. 2011. AEG: Automatic Exploit Generation. In Network and Distributed System Security Symposium. Internet Society."},{"key":"e_1_3_2_2_3_1","unstructured":"bugs.chromium.org. 2017. Issue 716044: V8: OOB write in Array.prototype.map builtin. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=716044  bugs.chromium.org. 2017. Issue 716044: V8: OOB write in Array.prototype.map builtin. https:\/\/bugs.chromium.org\/p\/chromium\/issues\/detail?id=716044"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489274"},{"key":"e_1_3_2_2_6_1","unstructured":"ctf.pediy.com. 2019. XiaoHuHuanXiang. https:\/\/ctf.pediy.com\/game-season_fight-129.htm  ctf.pediy.com. 2019. XiaoHuHuanXiang. https:\/\/ctf.pediy.com\/game-season_fight-129.htm"},{"key":"e_1_3_2_2_7_1","unstructured":"ctftime.org. 2019. oob-v8. https:\/\/ctftime.org\/task\/8393  ctftime.org. 2019. oob-v8. https:\/\/ctftime.org\/task\/8393"},{"key":"e_1_3_2_2_8_1","unstructured":"cve.mitre.org. 2019. CVE-2019--5782. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-5782  cve.mitre.org. 2019. CVE-2019--5782. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-5782"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277212"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274723"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3307423.3307433"},{"key":"e_1_3_2_2_13_1","unstructured":"Sean Heelan and D. Kroening. 2009. MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.  Sean Heelan and D. Kroening. 2009. MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354224"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831155"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.20"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.58"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241106"},{"key":"#cr-split#-e_1_3_2_2_19_1.1","doi-asserted-by":"crossref","unstructured":"Taemin Park Karel Dhondt David Gens Yeoul Na Stijn Volckaert and Michael Franz. 2020. NoJITsu: Locking Down JavaScript Engines. https:\/\/doi.org\/10.14722\/ndss.2020.24262 10.14722\/ndss.2020.24262","DOI":"10.14722\/ndss.2020.24262"},{"key":"#cr-split#-e_1_3_2_2_19_1.2","doi-asserted-by":"crossref","unstructured":"Taemin Park Karel Dhondt David Gens Yeoul Na Stijn Volckaert and Michael Franz. 2020. NoJITsu: Locking Down JavaScript Engines. https:\/\/doi.org\/10.14722\/ndss.2020.24262","DOI":"10.14722\/ndss.2020.24262"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139337.3139346"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Chengyu Song Chao Zhang Tielei Wang Wenke Lee and David Melski. 2015. Exploiting and Protecting Dynamic Code Generation.. In NDSS.  Chengyu Song Chao Zhang Tielei Wang Wenke Lee and David Melski. 2015. Exploiting and Protecting Dynamic Code Generation.. In NDSS.","DOI":"10.14722\/ndss.2015.23233"},{"key":"e_1_3_2_2_22_1","unstructured":"v8.dev. 2021. TurboFan. https:\/\/v8.dev\/docs\/turbofan  v8.dev. 2021. TurboFan. https:\/\/v8.dev\/docs\/turbofan"},{"key":"e_1_3_2_2_23_1","volume-title":"Lingyun Ying, Yi Yang, and Dengguo Feng.","author":"Wang Minghua","year":"2013","unstructured":"Minghua Wang , Purui Su , qi li , Lingyun Ying, Yi Yang, and Dengguo Feng. 2013 . Automatic Polymorphic Exploit Generation for Software Vulnerabilities , Vol . 127. 216--233. https:\/\/doi.org\/10.1007\/978-3-319-04283-1_14 10.1007\/978-3-319-04283-1_14 Minghua Wang, Purui Su, qi li, Lingyun Ying, Yi Yang, and Dengguo Feng. 2013. Automatic Polymorphic Exploit Generation for Software Vulnerabilities, Vol. 127. 216--233. https:\/\/doi.org\/10.1007\/978-3-319-04283-1_14"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243847"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897891"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361421"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277262"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489275"},{"key":"e_1_3_2_2_29_1","volume-title":"AutoDE: Automated Vulnerability Discovery and Exploitation. In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). 46--53","author":"Zhang Y.","year":"2019","unstructured":"Y. Zhang , T. Liu , Z. Wang , Q. Ruan , and B. Fang . 2019 . AutoDE: Automated Vulnerability Discovery and Exploitation. In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). 46--53 . https:\/\/doi.org\/10.1109\/DSC. 2019 .00016 10.1109\/DSC.2019.00016 Y. Zhang, T. Liu, Z. Wang, Q. Ruan, and B. Fang. 2019. AutoDE: Automated Vulnerability Discovery and Exploitation. In 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC). 46--53. https:\/\/doi.org\/10.1109\/DSC.2019.00016"},{"key":"e_1_3_2_2_30_1","volume-title":"HAEPG: An Automatic Multi-hop Exploitation Generation Framework. 89--109. https:\/\/doi.org\/10.1007\/978-3-030-52683-2_5","author":"Zhao Zixuan","year":"2020","unstructured":"Zixuan Zhao , Yan Wang , and Xiaorui Gong . 2020 . HAEPG: An Automatic Multi-hop Exploitation Generation Framework. 89--109. https:\/\/doi.org\/10.1007\/978-3-030-52683-2_5 10.1007\/978-3-030-52683-2_5 Zixuan Zhao, Yan Wang, and Xiaorui Gong. 2020. HAEPG: An Automatic Multi-hop Exploitation Generation Framework. 89--109. https:\/\/doi.org\/10.1007\/978-3-030-52683-2_5"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) Attacks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465413.3488573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3465413.3488573","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465413.3488573","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3465413.3488573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:31Z","timestamp":1750191511000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465413.3488573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,15]]},"references-count":31,"alternative-id":["10.1145\/3465413.3488573","10.1145\/3465413"],"URL":"https:\/\/doi.org\/10.1145\/3465413.3488573","relation":{},"subject":[],"published":{"date-parts":[[2021,11,15]]},"assertion":[{"value":"2021-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}