{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:19:01Z","timestamp":1761664741028,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T00:00:00Z","timestamp":1725408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62090022,62172388"],"award-info":[{"award-number":["62090022,62172388"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,4]]},"DOI":"10.1145\/3678015.3680476","type":"proceedings-article","created":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T12:19:32Z","timestamp":1724933972000},"page":"23-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Chaos: Function Granularity Runtime Address Layout Space Randomization for Kernel Module"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-6723-7948","authenticated-orcid":false,"given":"Zihao","family":"Chang","sequence":"first","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences and Zhongguancun Laboratory"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5248-4847","authenticated-orcid":false,"given":"Jihan","family":"Lin","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences and Zhongguancun Laboratory"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9358-8808","authenticated-orcid":false,"given":"Haifeng","family":"Sun","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-4414-2309","authenticated-orcid":false,"given":"Runkuang","family":"Li","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences and Zhongguancun Laboratory"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3374-4403","authenticated-orcid":false,"given":"Ying","family":"Wang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9610-823X","authenticated-orcid":false,"given":"Bin","family":"Hu","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS and Zhongguancun Laboratory"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1898-1359","authenticated-orcid":false,"given":"Xiaofang","family":"Zhao","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Nanjing, Zhongguancun Laboratory and Institute of Intelligent Computing Technology, Suzhou, CAS"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0041-5957","authenticated-orcid":false,"given":"Dejun","family":"Jiang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences and Zhongguancun Laboratory"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1953-1392","authenticated-orcid":false,"given":"Ninghui","family":"Sun","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences and Zhongguancun Laboratory"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9629-0860","authenticated-orcid":false,"given":"Sa","family":"Wang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences and Zhongguancun Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2024,9,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","unstructured":"Android. 2024. Security Enhancements. https:\/\/source.android.com\/docs\/security\/enhancements#android-4-and-lower"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813691"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"volume-title":"Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Carlini Nicholas","key":"e_1_3_2_1_5_1","unstructured":"Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 161--176. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/carlini"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","unstructured":"Stephen Crane Andrei Homescu Stefan Brunthaler Per Larsen and Michael Franz. 2015. Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. https:\/\/doi.org\/10.14722\/ndss.2015.23264","DOI":"10.14722\/ndss.2015.23264"},{"key":"e_1_3_2_1_7_1","volume-title":"Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.. In NDSS.","author":"Davi Lucas","year":"2015","unstructured":"Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z Snow, and Fabian Monrose. 2015. Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.. In NDSS."},{"key":"e_1_3_2_1_8_1","unstructured":"Jake Edge. 2013. Kernel address space layout randomization. https:\/\/lwn.net\/Articles\/569635\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.24"},{"volume-title":"Enhanced Operating System Security Through Efficient and Finegrained Address Space Randomization. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Giuffrida Cristiano","key":"e_1_3_2_1_10_1","unstructured":"Cristiano Giuffrida, Anton Kuijsten, and Andrew S. Tanenbaum. 2012. Enhanced Operating System Security Through Efficient and Finegrained Address Space Randomization. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 475--490. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/giuffrida"},{"volume-title":"Enhanced Operating System Security Through Efficient and Finegrained Address Space Randomization. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Giuffrida Cristiano","key":"e_1_3_2_1_11_1","unstructured":"Cristiano Giuffrida, Anton Kuijsten, and Andrew S. Tanenbaum. 2012. Enhanced Operating System Security Through Efficient and Finegrained Address Space Randomization. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA, 475--490. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/giuffrida"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978356"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11859802_8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"e_1_3_2_1_15_1","volume-title":"Automatic Generation of Data-Oriented Exploits. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Hu Hong","year":"2015","unstructured":"Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, and Zhenkai Liang. 2015. Automatic Generation of Data-Oriented Exploits. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 177--192. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/hu"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.23"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978321"},{"key":"e_1_3_2_1_18_1","unstructured":"The kernel development community. 2024. Virtio on Linux. https:\/\/docs.kernel.org\/driver-api\/virtio\/virtio.html"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.9"},{"key":"e_1_3_2_1_20_1","unstructured":"Kangjie Lu Wenke Lee Stefan N\u00fcrnberger and Michael Backes. 2016. How to Make ASLR Win the Clone Wars: Runtime Re-Randomization.. In NDSS."},{"key":"e_1_3_2_1_21_1","volume-title":"Matt Miller and Matt Thomlinson","author":"Michael Howard John Lambert","year":"2010","unstructured":"John Lambert Michael Howard, Matt Miller and Matt Thomlinson. 2010. Windows ISV Software Security Defenses. https:\/\/learn.microsoft.com\/en-us\/previous-versions\/bb430720(v=msdn.10)?redirectedfrom=MSDN"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507779"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_26_1","volume-title":"Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. 2013 IEEE Symposium on Security and Privacy (2013","author":"Snow Kevin Z.","year":"2013","unstructured":"Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2013. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. 2013 IEEE Symposium on Security and Privacy (2013), 574--588. https:\/\/api.semanticscholar.org\/CorpusID:2026441"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519145"},{"key":"e_1_3_2_1_28_1","unstructured":"PaX Team. 2003. Adress Space Layout Randomization. https:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050752"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_3_2_1_31_1","unstructured":"Wikipedia. 2024. Executable-space protection. https:\/\/en.wikipedia.org\/wiki\/Executable-space_protection"},{"key":"e_1_3_2_1_32_1","unstructured":"Wikipedia. 2024. Fisher-Yates shuffle. https:\/\/en.wikipedia.org\/wiki\/Fisher-Yates_shuffle"},{"key":"e_1_3_2_1_33_1","unstructured":"Wikipedia. 2024. Return-oriented programming. https:\/\/en.wikipedia.org\/wiki\/Return-oriented_programming"},{"key":"e_1_3_2_1_34_1","volume-title":"Shuffler: Fast and Deployable Continuous Code Re-Randomization. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Williams-King David","year":"2016","unstructured":"David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 367--382. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/williams-king"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"volume-title":"Control Flow Integrity for COTS Binaries. In 22nd USENIX Security Symposium (USENIX Security 13)","author":"Zhang Mingwei","key":"e_1_3_2_1_36_1","unstructured":"Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In 22nd USENIX Security Symposium (USENIX Security 13). USENIX Association, Washington, D.C., 337--352."}],"event":{"name":"APSys '24: 15th ACM SIGOPS Asia-Pacific Workshop on Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Kyoto Japan","acronym":"APSys '24"},"container-title":["Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678015.3680476","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678015.3680476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:13:57Z","timestamp":1755915237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678015.3680476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,4]]},"references-count":36,"alternative-id":["10.1145\/3678015.3680476","10.1145\/3678015"],"URL":"https:\/\/doi.org\/10.1145\/3678015.3680476","relation":{},"subject":[],"published":{"date-parts":[[2024,9,4]]},"assertion":[{"value":"2024-09-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}