{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T05:53:58Z","timestamp":1769838838537,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2022"],"award-info":[{"award-number":["N00014-18-1-2022"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-19-1-2493"],"award-info":[{"award-number":["N00014-19-1-2493"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-22-1-2672"],"award-info":[{"award-number":["N00014-22-1-2672"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS 2127491"],"award-info":[{"award-number":["CNS 2127491"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3654794","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"62-73","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["sMVX: Multi-Variant Execution on Selected Code Paths"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-2707-1641","authenticated-orcid":false,"given":"Sengming","family":"Yeoh","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5055-4552","authenticated-orcid":false,"given":"Xiaoguang","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Illinois Chicago, Chicago, Illinois, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1117-3689","authenticated-orcid":false,"given":"Jae-Won","family":"Jang","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8663-739X","authenticated-orcid":false,"given":"Binoy","family":"Ravindran","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660378"},{"key":"e_1_3_2_1_2_1","unstructured":"Steve Bannister. 2019. Memory Tagging Extension: Enhancing memory safety through architecture. Retrieved 06\/23\/2022 from https:\/\/community.arm.com\/arm-community-blogs\/b\/architectures-and-processors-blog\/posts\/enhancing-memory-safety"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security Symposium","volume":"10","author":"Bhatkar Sandeep","year":"2005","unstructured":"Sandeep Bhatkar, Daniel C DuVarney, and R Sekar. 2005. Efficient Techniques for Comprehensive Protection from Memory Error Exploits.. In USENIX Security Symposium, Vol. 10. 1251398--1251415."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_5_1","unstructured":"BYTEmark benchmark. Accessed: 2024-03-20. Linux\/Unix nbench. http:\/\/www.math.utah.edu\/~mayer\/linux\/bmark.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345654"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCSH.1995.532621"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3129743.3129752"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 15th USENIX Security Symposium","author":"Cox Benjamin","year":"2006","unstructured":"Benjamin Cox and David Evans. 2006. N-Variant Systems: A Secretless Framework for Security through Diversity. In Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006, Angelos D. Keromytis (Ed.). USENIX Association."},{"key":"e_1_3_2_1_10_1","unstructured":"David Mulnix. Accessed: 2024-03-23. Intel\u00ae Xeon\u00ae Processor Scalable Family Technical Overview. https:\/\/software.intel.com\/en-us\/articles\/intel-xeon-processor-scalable-family-technical-overview."},{"key":"e_1_3_2_1_11_1","unstructured":"Jake Edge. 2013. Linux Kernel Address Space Layout Randomization. http:\/\/lwn.net\/Articles\/569635\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Temporal System Call Specialization for Attack Surface Reduction. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Ghavamnia Seyedhamed","year":"2020","unstructured":"Seyedhamed Ghavamnia, Tapti Palit, Shachee Mishra, and Michalis Polychronakis. 2020. Temporal System Call Specialization for Attack Surface Reduction. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 1749--1766."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00024"},{"key":"e_1_3_2_1_14_1","unstructured":"Brendan Gregg. 2021. CPU Flame Graphs. Retrieved 06\/23\/2022 from https:\/\/www.brendangregg.com\/FlameGraphs\/cpuflamegraphs.html"},{"key":"e_1_3_2_1_15_1","volume-title":"Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael L. Scott, Kai Shen, and Mike Marty. 2019. Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 489--504."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606607"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694390"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_1_19_1","unstructured":"Intel 2019. Intel 64 and IA-32 Architectures Software Developer\u015b Manual. Intel."},{"key":"e_1_3_2_1_20_1","volume-title":"VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. In ACM SIGSAC Conference on Computer and Communications Security (CCS'21)","author":"Ismail Mohannad","year":"2021","unstructured":"Mohannad Ismail, Jinwoo Yom, Christopher Jelesnianski, Yeongjin Jang, and Changwoo Min. 2021. VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. In ACM SIGSAC Conference on Computer and Communications Security (CCS'21). Association for Computing Machinery."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2017.112"},{"key":"e_1_3_2_1_22_1","unstructured":"JonathanSalwan. 2020. Ropgadget Github webpage. https:\/\/github.com\/JonathanSalwan\/ROPgadget Online accessed 2024-03-23."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_24_1","unstructured":"kernel.org. 2020. perf: Linux profiling with performance counters. Retrieved 06\/23\/2022 from https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.46"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243748"},{"key":"e_1_3_2_1_27_1","volume-title":"Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory","author":"Li Congwu","year":"2019","unstructured":"Congwu Li, Le Guan, Jingqiang Lin, Bo Luo, Quanwei Cai, Jiwu Jing, and Jing Wang. 2019. Mimosa: Protecting Private Keys against Memory Disclosure Attacks using Hardware Transactional Memory. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_1_28_1","unstructured":"Linux. 2020. pkeys(7) --- Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man7\/pkeys.7.html."},{"key":"e_1_3_2_1_29_1","volume-title":"Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Litton James","year":"2016","unstructured":"James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, and Peter Druschel. 2016. Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 49--64."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23173"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2878234"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590140.3629121"},{"key":"e_1_3_2_1_34_1","unstructured":"Michael Matz Jan Hubicka Andreas Jaeger and Mark Mitchell. 2013. System v application binary interface. (2013)."},{"key":"e_1_3_2_1_35_1","volume-title":"DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection. In 42nd IEEE Symposium on Security and Privacy, SP 2021","author":"Palit Tapti","year":"2021","unstructured":"Tapti Palit, Jarin Firose Moon, Fabian Monrose, and Michalis Polychronakis. 2021. DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24--27 May 2021. IEEE, 1919--1937."},{"key":"e_1_3_2_1_36_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Park Soyeon","year":"2019","unstructured":"Soyeon Park, Sangho Lee, Wen Xu, HyunGon Moon, and Taesoo Kim. 2019. libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 241--254."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304063"},{"key":"e_1_3_2_1_38_1","unstructured":"Radare Org. 2024. R2pipe Github webpage. https:\/\/github.com\/radareorg\/radare2-r2pipe Online accessed 2024-01-23."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_1_40_1","volume-title":"Workshop on Compiler and Architectural Techniques for Application Reliability and Security. 1--7.","author":"Gal Babak","year":"2008","unstructured":"Salamat, Babak and Gal, Andreas and Franz, Michael. 2008. Reverse stack execution in a multi-variant execution environment. In Workshop on Compiler and Architectural Techniques for Application Reliability and Security. 1--7."},{"key":"e_1_3_2_1_41_1","unstructured":"Sascha Schirra. 2024. Ropper Github webpage. https:\/\/github.com\/sashs\/Ropper Online accessed 2024-03-23."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_44_1","unstructured":"Michael Sutton Adam Greene and Pedram Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium (SEC'19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient in-Process Isolation with Protection Keys (MPK). In Proceedings of the 28th USENIX Conference on Security Symposium (SEC'19). USENIX Association, USA, 1221--1238."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519558"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2411254"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064178"},{"key":"e_1_3_2_1_49_1","volume-title":"Secure and Efficient Application Monitoring and Replication. In 2016 USENIX Annual Technical Conference (USENIX ATC 16)","author":"Volckaert Stijn","year":"2016","unstructured":"Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter, and Michael Franz. 2016. Secure and Efficient Application Monitoring and Replication. In 2016 USENIX Annual Technical Conference (USENIX ATC 16). USENIX Association, Denver, CO, 167--179."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458714"},{"key":"e_1_3_2_1_51_1","volume-title":"DIMVA 2020, Lisbon, Portugal, June 24--26, 2020, Proceedings, Cl\u00e9mentine Maurice, Leyla Bilge, Gianluca Stringhini, and Nuno Neves (Eds.)","volume":"12223","author":"Voulimeneas Alexios","year":"2020","unstructured":"Alexios Voulimeneas, Dokyung Song, Fabian Parzefall, Yeoul Na, Per Larsen, Michael Franz, and Stijn Volckaert. 2020. Distributed Heterogeneous N-Variant Execution. In Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24--26, 2020, Proceedings, Cl\u00e9mentine Maurice, Leyla Bilge, Gianluca Stringhini, and Nuno Neves (Eds.), Vol. 12223. Springer, 217--237."},{"key":"e_1_3_2_1_52_1","unstructured":"w00d. 2013. Analysis of nginx 1.3.9\/1.4.0 stack buffer overflow and x64 exploitation (CVE-2013-2028)). https:\/\/www.vnsecurity.net\/research\/2013\/05\/21\/analysis-of-nginx-cve-2013-2028.html."},{"key":"e_1_3_2_1_53_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020","author":"Wang Xiaoguang","year":"2020","unstructured":"Xiaoguang Wang, SengMing Yeoh, Robert Lyerly, Pierre Olivier, Sang-Hoon Kim, and Binoy Ravindran. 2020. A Framework for Software Diversification with ISA Heterogeneity. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2020, San Sebastian, Spain, October 14--15, 2020, Manuel Egele and Leyla Bilge (Eds.). USENIX Association, 427--442."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380786.3391398"},{"key":"e_1_3_2_1_55_1","unstructured":"Wikipedia. Accessed: 2024-03-20. Resident set size. https:\/\/en.wikipedia.org\/wiki\/Resident_set_size."},{"key":"e_1_3_2_1_56_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization.. In OSDI. 367--382.","author":"Williams-King David","year":"2016","unstructured":"David Williams-King, Graham Gobieski, Kent Williams-King, James P Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization.. In OSDI. 367--382."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304034"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660344"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Sebastian \u00d6sterlund Koen Koning Pierre Olivier Antonio Barbalace Herbert Bos and Cristiano Giuffrida. 2019. kMVX: Detecting Kernel Information Leaks with Multi-variant Execution. In ASPLOS.","DOI":"10.1145\/3297858.3304054"}],"event":{"name":"Middleware '24: 25th International Middleware Conference","location":"Hong Kong Hong Kong","acronym":"Middleware '24","sponsor":["IFIP","Usenix"]},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3654794","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3654794","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3654794","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3654794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":59,"alternative-id":["10.1145\/3652892.3654794","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3654794","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}