{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:01:24Z","timestamp":1729666884891,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/cgo.2013.6494997","type":"proceedings-article","created":{"date-parts":[[2013,4,11]],"date-time":"2013-04-11T21:38:10Z","timestamp":1365716290000},"page":"1-11","source":"Crossref","is-referenced-by-count":73,"title":["Profile-guided automated software diversity"],"prefix":"10.1109","author":[{"given":"A.","family":"Homescu","sequence":"first","affiliation":[]},{"given":"S.","family":"Neisius","sequence":"additional","affiliation":[]},{"given":"P.","family":"Larsen","sequence":"additional","affiliation":[]},{"given":"S.","family":"Brunthaler","sequence":"additional","affiliation":[]},{"given":"M.","family":"Franz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Return Oriented Programming for the ARM Architecture","year":"2009","author":"kornau","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259018"},{"key":"17","first-page":"459","article-title":"KGuard: Lightweight kernel protection against return-to-user attacks","author":"kemerlis","year":"2012","journal-title":"Proc 12th Usenix Security Symposium"},{"key":"36","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-642-23644-0_7","article-title":"On the expressiveness of return-into-libc attacks","author":"tran","year":"2011","journal-title":"Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection RAID '11"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/2248418.2248433"},{"key":"33","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1145\/1315245.1315313","article-title":"The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)","author":"shacham","year":"2007","journal-title":"Proceedings of the 14th ACM conference on Computer and communications security CCS '07"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764669"},{"key":"34","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1145\/1030083.1030124","article-title":"On the effectiveness of address-space randomization","author":"shacham","year":"2004","journal-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security CCS '04"},{"journal-title":"Intel 64 and IA-32 architectures software developer's manual","year":"2012","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"14","article-title":"Microgadgets: Size does matter in Turing-complete return-oriented programming","author":"homescu","year":"2012","journal-title":"Proceedings of the 6th USENIX Workshop on Offensive Technologies WOOT '12"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"journal-title":"The Computer Language Benchmarks Game","year":"2012","author":"fulgham","key":"11"},{"key":"12","first-page":"475","article-title":"Enhanced operating system security through efficient and fine-grained address space randomization","author":"giuffrida","year":"2012","journal-title":"Proc 12th Usenix Security Symposium"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"journal-title":"X86-64 Buffer Overflow Exploits and the Borrowed Code Chunks Exploitation Technique[R]","year":"2005","author":"krahmer","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755934"},{"key":"23","first-page":"209","article-title":"Evaluating SFI for a CISC architecture","author":"mccamant","year":"2006","journal-title":"Proceedings of the 15th USENIX Security Symposium"},{"key":"24","article-title":"The advanced return-into-lib(c) exploits: Pax case study","volume":"11","author":"nergal","year":"2001","journal-title":"Phrack Magazine"},{"journal-title":"Efficient Profiling in the LLVM Compiler Infrastructure","year":"2011","author":"neustifter","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"journal-title":"Homepage of the PaX Team","year":"2009","key":"28"},{"journal-title":"Too Much PIE Is Bad for Performance","year":"2012","author":"payer","key":"29"},{"key":"3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/1966913.1966919","article-title":"Jump-oriented programming: A new class of code-reuse attack","author":"bletsch","year":"2011","journal-title":"Proceedings of the 6th ACM Symposium on Information Computer and Communications Security ASIACCS '11"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"journal-title":"GCC Compiler Internals","year":"2012","key":"10"},{"key":"1","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1145\/1102120.1102165","article-title":"Controlflow integrity","author":"abadi","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93550"},{"journal-title":"Returnoriented Programming Without Returns on ARM","year":"2010","author":"davi","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"journal-title":"ROPgadget Tool","year":"2012","author":"salwan","key":"32"},{"key":"5","first-page":"163","article-title":"DROP: Detecting return-oriented programming malicious code","author":"chen","year":"2009","journal-title":"A Prakash and I Sen Gupta Editors Information Systems Security Volume 5905 of Lecture Notes in Computer Science"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.16"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1997.595185"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512542"}],"event":{"name":"2013 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","start":{"date-parts":[[2013,2,23]]},"location":"Shenzhen","end":{"date-parts":[[2013,2,27]]}},"container-title":["Proceedings of the 2013 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6489844\/6494968\/06494997.pdf?arnumber=6494997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T11:14:51Z","timestamp":1498043691000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6494997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/cgo.2013.6494997","relation":{},"subject":[],"published":{"date-parts":[[2013,2]]}}}