{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:01:46Z","timestamp":1772042506221,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T00:00:00Z","timestamp":1686614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["468988364, 501887536"],"award-info":[{"award-number":["468988364, 501887536"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,13]]},"DOI":"10.1145\/3589610.3596281","type":"proceedings-article","created":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T15:13:34Z","timestamp":1686669214000},"page":"64-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Thread-Level Attack-Surface Reduction"],"prefix":"10.1145","author":[{"given":"Florian","family":"Rommel","sequence":"first","affiliation":[{"name":"Leibniz University Hannover, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Dietrich","sequence":"additional","affiliation":[{"name":"Hamburg University of Technology, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andreas","family":"Ziegler","sequence":"additional","affiliation":[{"name":"University of Erlangen-Nuremberg, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Illia","family":"Ostapyshyn","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Lohmann","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,6,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Context-Based Text Elimination.  https:\/\/github.com\/luhsra\/cte \t\t\t\t  [n. d.]. Context-Based Text Elimination.  https:\/\/github.com\/luhsra\/cte"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Linux with mmview extensions.  https:\/\/github.com\/luhsra\/linux-mmview \t\t\t\t  [n. d.]. Linux with mmview extensions.  https:\/\/github.com\/luhsra\/linux-mmview"},{"key":"e_1_3_2_1_3_1","unstructured":"2022. Intel\u00ae 64 and IA-32 Architectures Software Developer\u2019s Manual Combined Volumes: 1 2A 2B 2C 2D 3A 3B 3C 3D and 4. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/671200 \t\t\t\t  2022. Intel\u00ae 64 and IA-32 Architectures Software Developer\u2019s Manual Combined Volumes: 1 2A 2B 2C 2D 3A 3B 3C 3D and 4. https:\/\/cdrdv2.intel.com\/v1\/dl\/getContent\/671200"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3414997"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3095716"},{"key":"e_1_3_2_1_7_1","unstructured":"Arm Limited. 2022. Arm \u00ae Architecture Reference Manual for A-Profile Architecture. DDI 0487H.a \t\t\t\t  Arm Limited. 2022. Arm \u00ae Architecture Reference Manual for A-Profile Architecture. DDI 0487H.a"},{"key":"e_1_3_2_1_8_1","unstructured":"Florian Bernd. [n. d.]. Zydis: Fast and lightweight x86\/x86-64 disassembler and code generation library..  https:\/\/github.com\/zyantific\/zydis \t\t\t\t  Florian Bernd. [n. d.]. Zydis: Fast and lightweight x86\/x86-64 disassembler and code generation library..  https:\/\/github.com\/zyantific\/zydis"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201908)","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau , Petr Marchenko , Mark Handley , and Brad Karp . 2008 . Wedge: Splitting Applications into Reduced-Privilege Compartments . In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201908) . USENIX Association, USA. 309\u2013322. isbn:11 19995555221 Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-Privilege Compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI \u201908). USENIX Association, USA. 309\u2013322. isbn:1119995555221"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 12th USENIX Conference on Cyber Security Experimentation and Test (CSET \u201919)","author":"Michael","unstructured":"Michael D. Brown and Santosh Pande. 2019. Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized through Software Debloating . In Proceedings of the 12th USENIX Conference on Cyber Security Experimentation and Test (CSET \u201919) (CSET\u201919). USENIX, USA. 5. Michael D. Brown and Santosh Pande. 2019. Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized through Software Debloating. In Proceedings of the 12th USENIX Conference on Cyber Security Experimentation and Test (CSET \u201919) (CSET\u201919). USENIX, USA. 5."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_1_14_1","unstructured":"Jonathan Corbet. 2022. Shadow stacks for user space. https:\/\/lwn.net\/Articles\/885220\/ \t\t\t\t  Jonathan Corbet. 2022. Shadow stacks for user space. https:\/\/lwn.net\/Articles\/885220\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_5"},{"key":"e_1_3_2_1_17_1","unstructured":"Tom Garrison. 2020. Intel CET Answers Call to Protect Against Common Malware Threats.  https:\/\/www.intel.com\/content\/www\/us\/en\/newsroom\/opinion\/intel-cet-answers-call-protect-common-malware-threats.html \t\t\t\t  Tom Garrison. 2020. Intel CET Answers Call to Protect Against Common Malware Threats.  https:\/\/www.intel.com\/content\/www\/us\/en\/newsroom\/opinion\/intel-cet-answers-call-protect-common-malware-threats.html"},{"key":"e_1_3_2_1_18_1","volume-title":"Temporal System Call Specialization for Attack Surface Reduction. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Ghavamnia Seyedhamed","year":"2020","unstructured":"Seyedhamed Ghavamnia , Tapti Palit , Shachee Mishra , and Michalis Polychronakis . 2020 . Temporal System Call Specialization for Attack Surface Reduction. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 1749\u20131766. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ghavamnia Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, and Michalis Polychronakis. 2020. Temporal System Call Specialization for Attack Surface Reduction. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1749\u20131766. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ghavamnia"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_1_20_1","unstructured":"Hsuan-Chi Kuo Akshith Gunasekaran Yeongjin Jang Sibin Mohan Rakesh B Bobba David Lie and Jesse Walker. 2019. MultiK: A Framework for Orchestrating Multiple Specialized Kernels. arXiv preprint arXiv:1903.06889. \t\t\t\t  Hsuan-Chi Kuo Akshith Gunasekaran Yeongjin Jang Sibin Mohan Rakesh B Bobba David Lie and Jesse Walker. 2019. MultiK: A Framework for Orchestrating Multiple Specialized Kernels. arXiv preprint arXiv:1903.06889."},{"key":"e_1_3_2_1_21_1","volume-title":"Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Litton James","year":"2016","unstructured":"James Litton , Anjo Vahldiek-Oberwagner , Eslam Elnikety , Deepak Garg , Bobby Bhattacharjee , and Peter Druschel . 2016 . Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX Association, Savannah, GA. 49\u201364. isbn:978-1-93 1971-33-1 https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/litton James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, and Peter Druschel. 2016. Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA. 49\u201364. isbn:978-1-931971-33-1 https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/litton"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274703"},{"key":"e_1_3_2_1_24_1","volume-title":"On-the-fly Code Activation for Attack Surface Reduction. CoRR, abs\/2110.09557","author":"Porter Chris","year":"2021","unstructured":"Chris Porter , Sharjeel Khan , and Santosh Pande . 2021. On-the-fly Code Activation for Attack Surface Reduction. CoRR, abs\/2110.09557 ( 2021 ), Oct., arXiv:2110.09557. arxiv:2110.09557 Chris Porter, Sharjeel Khan, and Santosh Pande. 2021. On-the-fly Code Activation for Attack Surface Reduction. CoRR, abs\/2110.09557 (2021), Oct., arXiv:2110.09557. arxiv:2110.09557"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386017"},{"key":"e_1_3_2_1_26_1","volume-title":"RAZOR: A Framework for Post-deployment Software Debloating. In 28th USENIX Security Symposium, Nadia Heninger and Patrick Traynor (Eds.) (USENIX Security \u201919)","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian , Hong Hu , Mansour Alharthi , Simon Pak Ho Chung , Taesoo Kim , and Wenke Lee . 2019 . RAZOR: A Framework for Post-deployment Software Debloating. In 28th USENIX Security Symposium, Nadia Heninger and Patrick Traynor (Eds.) (USENIX Security \u201919) . USENIX Association, Berkeley, CA, USA. 1733\u20131750. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/qian Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, and Wenke Lee. 2019. RAZOR: A Framework for Post-deployment Software Debloating. In 28th USENIX Security Symposium, Nadia Heninger and Patrick Traynor (Eds.) (USENIX Security \u201919). USENIX Association, Berkeley, CA, USA. 1733\u20131750. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/qian"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417866"},{"key":"e_1_3_2_1_28_1","volume-title":"27th USENIX Security Symposium (USENIX Security \u201918)","author":"Quach Anh","year":"2018","unstructured":"Anh Quach , Aravind Prakash , and Lok Yan . 2018 . Debloating software through piece-wise compilation and loading . In 27th USENIX Security Symposium (USENIX Security \u201918) . 869\u2013886. Anh Quach, Aravind Prakash, and Lok Yan. 2018. Debloating software through piece-wise compilation and loading. In 27th USENIX Security Symposium (USENIX Security \u201918). 869\u2013886."},{"key":"e_1_3_2_1_29_1","unstructured":"Qualcomm Technologies Inc.. 2017. Pointer Authentication on ARMv8.3: Design and Analysis of the New Software Security Instructions. San Diego CA USA. \t\t\t\t  Qualcomm Technologies Inc.. 2017. Pointer Authentication on ARMv8.3: Design and Analysis of the New Software Security Instructions. San Diego CA USA."},{"key":"e_1_3_2_1_30_1","volume-title":"Site Isolation: Process Separation for Web Sites within the Browser. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Reis Charles","year":"2019","unstructured":"Charles Reis , Alexander Moshchuk , and Nasko Oskov . 2019 . Site Isolation: Process Separation for Web Sites within the Browser. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA. 1661\u20131678. isbn:978-1-939133-06-9 https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/reis Charles Reis, Alexander Moshchuk, and Nasko Oskov. 2019. Site Isolation: Process Separation for Web Sites within the Browser. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA. 1661\u20131678. isbn:978-1-939133-06-9 https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/reis"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_32_1","volume-title":"14th Symposium on Operating System Design and Implementation (OSDI \u201920)","author":"Rommel Florian","year":"2020","unstructured":"Florian Rommel , Christian Dietrich , Daniel Friesel , Marcel K\u00f6ppen , Christoph Borchert , Michael M\u00fcller , Olaf Spinczyk , and Daniel Lohmann . 2020 . From Global to Local Quiescence: Wait-Free Code Patching of Multi-Threaded Processes . In 14th Symposium on Operating System Design and Implementation (OSDI \u201920) . 651\u2013666. Florian Rommel, Christian Dietrich, Daniel Friesel, Marcel K\u00f6ppen, Christoph Borchert, Michael M\u00fcller, Olaf Spinczyk, and Daniel Lohmann. 2020. From Global to Local Quiescence: Wait-Free Code Patching of Multi-Threaded Processes. In 14th Symposium on Operating System Design and Implementation (OSDI \u201920). 651\u2013666."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7939291"},{"key":"e_1_3_2_1_34_1","unstructured":"Jonathan Salwan. [n. d.]. ROPgadget: Gadgets finder and auto-roper.  http:\/\/shell-storm.org\/project\/ROPgadget\/ \t\t\t\t  Jonathan Salwan. [n. d.]. ROPgadget: Gadgets finder and auto-roper.  http:\/\/shell-storm.org\/project\/ROPgadget\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_1_37_1","volume-title":"Recent Advances in Intrusion Detection","author":"Tran Minh","unstructured":"Minh Tran , Mark Etheridge , Tyler Bletsch , Xuxian Jiang , Vincent Freeh , and Peng Ning . 2011. On the Expressiveness of Return-into-libc Attacks . In Recent Advances in Intrusion Detection . Springer, Berlin , Heidelberg . 121\u2013141. isbn:978-3-642-23644-0 Minh Tran, Mark Etheridge, Tyler Bletsch, Xuxian Jiang, Vincent Freeh, and Peng Ning. 2011. On the Expressiveness of Return-into-libc Attacks. In Recent Advances in Intrusion Detection. Springer, Berlin, Heidelberg. 121\u2013141. isbn:978-3-642-23644-0"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358222"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3556977"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3494516"}],"event":{"name":"LCTES '23: 24th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems","location":"Orlando FL USA","acronym":"LCTES '23","sponsor":["SIGBED ACM Special Interest Group on Embedded Systems","SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 24th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589610.3596281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589610.3596281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:45Z","timestamp":1750291425000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589610.3596281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,13]]},"references-count":41,"alternative-id":["10.1145\/3589610.3596281","10.1145\/3589610"],"URL":"https:\/\/doi.org\/10.1145\/3589610.3596281","relation":{},"subject":[],"published":{"date-parts":[[2023,6,13]]},"assertion":[{"value":"2023-06-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}