{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:07:26Z","timestamp":1725894446611},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368295"},{"type":"electronic","value":"9783642368301"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36830-1_9","type":"book-chapter","created":{"date-parts":[[2013,2,18]],"date-time":"2013-02-18T14:35:47Z","timestamp":1361198147000},"page":"167-185","source":"Crossref","is-referenced-by-count":3,"title":["On Layout Randomization for Arrays and Functions"],"prefix":"10.1007","author":[{"given":"Mart\u00edn","family":"Abadi","sequence":"first","affiliation":[]},{"given":"J\u00e9r\u00e9my","family":"Planul","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/BFb0055109","volume-title":"Automata, Languages and Programming","author":"M. Abadi","year":"1998","unstructured":"Abadi, M.: Protection in Programming-Language Translations. In: Larsen, K.G., Skyum, S., Winskel, G. (eds.) ICALP 1998. LNCS, vol.\u00a01443, pp. 868\u2013883. Springer, Heidelberg (1998)"},{"key":"9_CR2","unstructured":"Abadi, M., Planul, J.: On layout randomization for arrays and functions (2013), Long version of this paper, at \n \n http:\/\/www.msr-inria.inria.fr\/~jplanul\/libraries-long.pdf"},{"issue":"2","key":"9_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2240276.2240279","volume":"15","author":"M. Abadi","year":"2012","unstructured":"Abadi, M., Plotkin, G.D.: On protection by layout randomization. ACM Transactions on Information and System Security\u00a015(2), 8:1\u20138:29 (2012)","journal-title":"ACM Transactions on Information and System Security"},{"key":"9_CR4","unstructured":"Chen, S., Sezer, E.C., Xu, J., Gauriar, P., Iyer, R.K.: Non-control-data attacks are realistic threats. In: Proceedings of the Usenix Security Symposium, pp. 177\u2013192 (2005)"},{"key":"9_CR5","unstructured":"Druschel, P., Peterson, L.L.: High-performance cross-domain data transfer. Technical Report TR 92-11, Department of Computer Science, The University of Arizona (March 1992)"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-540-74810-6_4","volume-title":"Foundations of Security Analysis and Design IV","author":"\u00da. Erlingsson","year":"2007","unstructured":"Erlingsson, \u00da.: Low-Level Software Security: Attacks and Defenses. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol.\u00a04677, pp. 92\u2013134. Springer, Heidelberg (2007)"},{"key":"9_CR7","unstructured":"Felleisen, M., Friedman, D.P.: Control operators, the secd-machine, and the lambda-calculus. In: 3rd Working Conference on the Formal Description of Programming Concepts, pp. 193\u2013219 (1986)"},{"key":"9_CR8","unstructured":"Forrest, S., Somayaji, A., Ackley, D.H.: Building diverse computer systems. In: 6th Workshop on Hot Topics in Operating Systems, pp. 67\u201372 (1997)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Jagadeesan, R., Pitcher, C., Rathke, J., Riely, J.: Local memory via layout randomization. In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp. 161\u2013174 (2011)","DOI":"10.1109\/CSF.2011.18"},{"key":"9_CR10","unstructured":"McCamant, S., Morrisett, G.: Evaluating SFI for a CISC architecture. In: Proceedings of the 15th USENIX Security Symposium, pp. 209\u2013224 (2006)"},{"key":"9_CR11","unstructured":"Mitchell, J.: Foundations for Programming Languages. MIT Press (1996)"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Pappas, V., Polychronakis, M., Keromytis, A.D.: Smashing the gadgets: Hindering return-oriented programming using in-place code randomization. In: IEEE Symposium on Security and Privacy, pp. 601\u2013615 (2012)","DOI":"10.1109\/SP.2012.41"},{"key":"9_CR13","unstructured":"PaX Project. The PaX project (2004), \n \n http:\/\/pax.grsecurity.net\/"},{"key":"9_CR14","unstructured":"Pierce, B.: Types and Programming Languages. MIT Press (2002)"},{"issue":"5","key":"9_CR15","doi-asserted-by":"crossref","first-page":"701","DOI":"10.3233\/JCS-2009-0379","volume":"18","author":"R. Pucella","year":"2010","unstructured":"Pucella, R., Schneider, F.B.: Independence from obfuscation: A semantic framework for diversity. Journal of Computer Security\u00a018(5), 701\u2013749 (2010)","journal-title":"Journal of Computer Security"},{"key":"9_CR16","unstructured":"Sotirov, A., Dowd, M.: Bypassing browser memory protections: Setting back browser security by 10 years (2008), \n \n https:\/\/www.blackhat.com\/presentations\/bh-usa-08\/Sotirov_Dowd\/bh08-sotirov-dowd.pdf"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L.: Efficient software-based fault isolation. In: Proceedings of the Fourteenth ACM Symposium on Operating Systems Principles, pp. 203\u2013216 (1993)","DOI":"10.1145\/173668.168635"}],"container-title":["Lecture Notes in Computer Science","Principles of Security and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36830-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T21:19:00Z","timestamp":1558300740000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36830-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368295","9783642368301"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36830-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}