{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:06:26Z","timestamp":1756512386614,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 2127491"],"award-info":[{"award-number":["CNS 2127491"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-19-1-2493 and N00014-22-1-2672"],"award-info":[{"award-number":["N00014-19-1-2493 and N00014-22-1-2672"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3629121","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"275-287","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["DynaCut"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0567-8877","authenticated-orcid":false,"given":"Abhijit","family":"Mahurkar","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, USA and Virginia Tech"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5055-4552","authenticated-orcid":false,"given":"Xiaoguang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago, Chicago, USA and Virginia Tech"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6089-1079","authenticated-orcid":false,"given":"Hang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, USA and Georgia Tech"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8663-739X","authenticated-orcid":false,"given":"Binoy","family":"Ravindran","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Abubakar Muhammad","year":"2021","unstructured":"Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, and Dongyan Xu. 2021. SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"e_1_3_2_1_4_1","unstructured":"Julian Bangert Sergey Bratus Rebecca Shapiro Michael E Locasto Jason Reeves Sean W Smith and Anna Shubina. 2013. ELFbac: using the loader format for intent-level semantics and fine-grained protection. Dartmouth College Computer Science Technical Report (2013)."},{"key":"e_1_3_2_1_5_1","unstructured":"Ned Batchelder. 2021. Coverage.py. https:\/\/coverage.readthedocs.io\/en\/coverage-5.5."},{"key":"e_1_3_2_1_6_1","unstructured":"Eli Bendersky. 2022. pyelftools. https:\/\/github.com\/eliben\/pyelftools."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_8_1","unstructured":"Andrea Bittau. 2009. Toward least-privilege isolation for software. Ph.D. Dissertation. University College London UK. http:\/\/discovery.ucl.ac.uk\/18902\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_10_1","volume-title":"Wedge: Splitting Applications into Reduced-Privilege Compartments. In 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-Privilege Compartments. In 5th USENIX Symposium on Networked Systems Design & Implementation, NSDI 2008, April 16-18, 2008, San Francisco, CA, USA, Proceedings, Jon Crowcroft and Michael Dahlin (Eds.). USENIX Association, 309--322. http:\/\/www.usenix.org\/events\/nsdi08\/tech\/full_papers\/bittau\/bittau.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"Derek Bruening. 2004. Efficient Transparent and Comprehensive Runtime Code Manipulation. Ph. D. Dissertation. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3141235.3141243"},{"key":"e_1_3_2_1_13_1","unstructured":"Mike Cohn. 2015. Are 64% of Features Really Rarely or Never Used? https:\/\/www.mountaingoatsoftware.com\/blog\/are-64-of-features-really-rarely-or-never-used."},{"key":"e_1_3_2_1_14_1","unstructured":"MITRE Corporation. 2022. Redislabs Security Vulnerabilities. https:\/\/www.cvedetails.com\/vulnerability-list\/vendor_id-18560\/product_id-47087\/Redislabs-Redis.html."},{"key":"e_1_3_2_1_15_1","unstructured":"CRIU. 2021. Checkpoint Restore in Userspace. https:\/\/criu.org\/Main_Page."},{"key":"e_1_3_2_1_16_1","volume-title":"CRIT: CRiu Image Tool. https:\/\/criu.org\/CRIT.","author":"CRIU.","year":"2021","unstructured":"CRIU. 2021. CRIT: CRiu Image Tool. https:\/\/criu.org\/CRIT."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694386"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2013.56"},{"key":"e_1_3_2_1_19_1","unstructured":"DynamoRIO. 2021. DynamoRIO: Code Coverage Tool. https:\/\/dynamorio.org\/page_drcov.html."},{"key":"e_1_3_2_1_20_1","unstructured":"DynamoRIO. 2021. Tool Event Model and API. https:\/\/dynamorio.org\/using.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227109"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183929"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345665"},{"key":"e_1_3_2_1_24_1","volume-title":"Temporal System Call Specialization for Attack Surface Reduction. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Ghavamnia Seyedhamed","year":"2020","unstructured":"Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, and Michalis Polychronakis. 2020. Temporal System Call Specialization for Attack Surface Reduction. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 1749--1766. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/ghavamnia"},{"key":"e_1_3_2_1_25_1","unstructured":"GNU. 2021. Using the GNU Compiler Collection (GCC): Gcov. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html."},{"key":"e_1_3_2_1_26_1","unstructured":"Google. 2021. Protocol Buffers. https:\/\/developers.google.com\/protocol-buffers."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318162"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.52"},{"volume-title":"Search engine society","author":"Halavais Alexander","key":"e_1_3_2_1_29_1","unstructured":"Alexander Halavais. 2017. Search engine society. John Wiley & Sons."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_1_31_1","unstructured":"Intel 2018. Intel 64 and IA-32 Architectures Software Developer\u015b Manual. Intel."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340459"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.27"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178256"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972557"},{"key":"e_1_3_2_1_36_1","unstructured":"John R. Levine. 1999. Linkers and Loaders. Morgan Kaufmann San Francisco CA."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00067"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_12"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133991"},{"key":"e_1_3_2_1_41_1","unstructured":"Soyeon Park Sangho Lee Wen Xu Hyungon Moon and Taesoo Kim. 2019. libmpk: Software Abstraction for Intel Memory Protection Keys (Intel {MPK}). In 2019 {USENIX} Annual Technical Conference ({USENIX} {ATC} 19). 241--254."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304063"},{"key":"e_1_3_2_1_43_1","unstructured":"Josh Poimboeuf. 2014. Introducing kpatch: Dynamic Kernel Patching. https:\/\/www.redhat.com\/en\/blog\/introducing-kpatch-dynamic-kernel-patching"},{"key":"e_1_3_2_1_44_1","volume-title":"RAZOR: A Framework for Post-deployment Software Debloating. In 28th USENIX Security Symposium, USENIX Security 2019","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian, Hong Hu, Mansour Alharthi, Simon Pak Ho Chung, Taesoo Kim, and Wenke Lee. 2019. RAZOR: A Framework for Post-deployment Software Debloating. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 1733--1750. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/qian"},{"key":"e_1_3_2_1_45_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Quach Anh","year":"2018","unstructured":"Anh Quach, Aravind Prakash, and Lok-Kwong Yan. 2018. Debloating Software through Piece-Wise Compilation and Loading. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018, William Enck and Adrienne Porter Felt (Eds.). USENIX Association, 869--886. https:\/\/www.usenix.org\/conference\/usenixsecuritty18\/presentation\/quach"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_23"},{"key":"e_1_3_2_1_47_1","unstructured":"Christoph Rohland. 2020. Tmpfs. https:\/\/www.kernel.org\/doc\/html\/latest\/filesystems\/tmpfs.html"},{"key":"e_1_3_2_1_48_1","unstructured":"Will Ryan. 2021. Buffer Overflows: ret2libc ret2plt and rop. https:\/\/medium.com\/cyber-unbound\/buffer-overflows-ret2libc-ret2plt-and-rop-e2695c103c4c."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_52_1","unstructured":"Tom Taulli. 2019. Are Most Of Your Product's Features...Useless? https:\/\/www.forbes.com\/sites\/tomtaulli\/2019\/02\/24\/are-most-of-your-products-features-useless."},{"key":"e_1_3_2_1_53_1","volume-title":"Debug Break: Break into the debugger programmatically. https:\/\/github.com\/scottt\/debugbreak\/blob\/master\/debugbreak.h.","author":"Tsai Scott","year":"2021","unstructured":"Scott Tsai. 2021. Debug Break: Break into the debugger programmatically. https:\/\/github.com\/scottt\/debugbreak\/blob\/master\/debugbreak.h."},{"key":"e_1_3_2_1_54_1","volume-title":"28th USENIX Security Symposium, USENIX Security 2019","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019, Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 1221--1238. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vahldiek-oberwagner"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872408"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_57_1","volume-title":"Ramblr: Making Reassembly Great Again. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Wang Ruoyu","year":"2017","unstructured":"Ruoyu Wang, Yan Shoshitaishvili, Antonio Bianchi, Aravind Machiry, John Grosen, Paul Grosen, Christopher Kruegel, and Giovanni Vigna. 2017. Ramblr: Making Reassembly Great Again. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/ramblr-making-reassembly-great-again\/"},{"key":"e_1_3_2_1_58_1","volume-title":"Reassembleable Disassembling. In 24th USENIX Security Symposium, USENIX Security 15","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable Disassembling. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, Jaeyeon Jung and Thorsten Holz (Eds.). USENIX Association, 627--642. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/wang-shuai"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2675991"},{"key":"e_1_3_2_1_60_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Wang Xiaoguang","year":"2020","unstructured":"Xiaoguang Wang, SengMing Yeoh, Robert Lyerly, Pierre Olivier, Sang-Hoon Kim, and Binoy Ravindran. 2020. A Framework for Software Diversification with {ISA} Heterogeneity. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 427--442."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380786.3391398"},{"key":"e_1_3_2_1_62_1","unstructured":"Jim Whitehead. 2021. WebDAV Resources: Web-based Distributed Authoring and Versioning. http:\/\/www.webdav.org\/."},{"key":"e_1_3_2_1_63_1","unstructured":"Wikipedia. Accessed: 2023-01-31. Zero-day (computing). https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)."},{"key":"e_1_3_2_1_64_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization.. In OSDI. 367--382.","author":"Williams-King David","year":"2016","unstructured":"David Williams-King, Graham Gobieski, Kent Williams-King, James P Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization.. In OSDI. 367--382."},{"volume-title":"Egalito: Layout-Agnostic Binary Recompilation. In 25th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS '20)","author":"Williams-King David","key":"e_1_3_2_1_65_1","unstructured":"David Williams-King, Hidenori Kobayashi, Kent Williams-King, Graham Patterson, Frank Spano, Yu Jian Wu, Junfeng Yang, and Vasileios P. Kemerlis. 2020. Egalito: Layout-Agnostic Binary Recompilation. In 25th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS '20)."},{"key":"e_1_3_2_1_66_1","unstructured":"Micha\u0142 Zalewski. 2021. american fuzzy lop (2.52b). https:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660344"}],"event":{"name":"Middleware '23: 24th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"],"location":"Bologna Italy","acronym":"Middleware '23"},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629121","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3629121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:52:15Z","timestamp":1756486335000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629121"}},"subtitle":["A Framework for Dynamic and Adaptive Program Customization"],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":67,"alternative-id":["10.1145\/3590140.3629121","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3629121","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}