{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:50:11Z","timestamp":1730321411617,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,15]],"date-time":"2020-11-15T00:00:00Z","timestamp":1605398400000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N68335-17-C-0700"],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-15-C-0113"],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3338502.3359761","type":"proceedings-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:33Z","timestamp":1573220433000},"page":"39-45","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Inuring"],"prefix":"10.1145","author":[{"given":"Eric","family":"Schulte","sequence":"first","affiliation":[{"name":"GrammaTech, Inc, Ithaca, NY, USA"}]},{"given":"Suan","family":"Yong","sequence":"additional","affiliation":[{"name":"GrammaTech, Inc, Ithaca, NY, USA"}]},{"given":"David","family":"Melski","sequence":"additional","affiliation":[{"name":"GrammaTech, Inc, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"volume-title":"Roberto Sebastiani, and Jochen Hoenicke. The smt-lib standard: Version 2.0 draft. Technical report","year":"2010","author":"Barrett Clark","key":"e_1_3_2_1_1_1","unstructured":"Clark Barrett , Aaron Stump , Cesare Tinelli , Sascha Boehme , David Cok , David D\u00e9harbe , Bruno Dutertre , Pascal Fontaine , Vijay Ganesh , Alberto Griggio , Jim Grundy , Paul Jackson , Albert Oliveras , Sava Krsti , Michal Moskal , Leonardo De Moura , Roberto Sebastiani, and Jochen Hoenicke. The smt-lib standard: Version 2.0 draft. Technical report , 2010 . Clark Barrett, Aaron Stump, Cesare Tinelli, Sascha Boehme, David Cok, David D\u00e9harbe, Bruno Dutertre, Pascal Fontaine, Vijay Ganesh, Alberto Griggio, Jim Grundy, Paul Jackson, Albert Oliveras, Sava Krsti, Michal Moskal, Leonardo De Moura, Roberto Sebastiani, and Jochen Hoenicke. The smt-lib standard: Version 2.0 draft. Technical report, 2010."},{"first-page":"17","volume-title":"Proceedings of the 11th Annual Cyber and Information Security Research Conference","author":"Co Michele","key":"e_1_3_2_1_2_1","unstructured":"Michele Co , Jack W Davidson , Jason D Hiser , John C Knight , Anh Nguyen-Tuong , Westley Weimer , Jonathan Burket , Gregory L Frazier , Tiffany M Frazier , Bruno Dutertre , Double helix and raven: A system for cyber fault tolerance and recovery . In Proceedings of the 11th Annual Cyber and Information Security Research Conference , page 17 . ACM, 2016. Michele Co, Jack W Davidson, Jason D Hiser, John C Knight, Anh Nguyen-Tuong, Westley Weimer, Jonathan Burket, Gregory L Frazier, Tiffany M Frazier, Bruno Dutertre, et al. Double helix and raven: A system for cyber fault tolerance and recovery. In Proceedings of the 11th Annual Cyber and Information Security Research Conference, page 17. ACM, 2016."},{"volume-title":"USENIX Security Symposium","year":"2006","author":"Cox Benjamin","key":"e_1_3_2_1_3_1","unstructured":"Benjamin Cox , David Evans , Adrian Filipi , Jonathan Rowanhill , Wei Hu , Jack Davidson , John Knight , Anh Nguyen-Tuong , and Jason Hiser . N-variant systems: a secretless framework for security through diversity . In USENIX Security Symposium , 2006 . Benjamin Cox, David Evans, Adrian Filipi, Jonathan Rowanhill, Wei Hu, Jack Davidson, John Knight, Anh Nguyen-Tuong, and Jason Hiser. N-variant systems: a secretless framework for security through diversity. In USENIX Security Symposium, 2006."},{"volume-title":"Apache JMeter: A practical beginner's guide to automated testing and performance measurement for your websites","year":"2008","author":"Halili Emily H","key":"e_1_3_2_1_4_1","unstructured":"Emily H Halili . Apache JMeter: A practical beginner's guide to automated testing and performance measurement for your websites . Packt Publishing Ltd , 2008 . Emily H Halili. Apache JMeter: A practical beginner's guide to automated testing and performance measurement for your websites. Packt Publishing Ltd, 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694390"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.46"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594337"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2878234"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/2259016.2259034","volume-title":"Proceedings of the Tenth International Symposium on Code Generation and Optimization (CGO), Proceedings of the Tenth International Symposium on Code Generation and Optimization (CGO)","author":"Niranjan Hasabnis","year":"2012","unstructured":"Hasabnis Niranjan , Misra Ashish , and R. Sekar . Light-weight bounds checking . In Proceedings of the Tenth International Symposium on Code Generation and Optimization (CGO), Proceedings of the Tenth International Symposium on Code Generation and Optimization (CGO) , pages 135 -- 144 , San Jose, California , 2012 . ACM. 2259034. Hasabnis Niranjan, Misra Ashish, and R.Sekar. Light-weight bounds checking. In Proceedings of the Tenth International Symposium on Code Generation and Optimization (CGO), Proceedings of the Tenth International Symposium on Code Generation and Optimization (CGO), pages 135--144, San Jose, California, 2012. ACM. 2259034."},{"issue":"10","key":"e_1_3_2_1_11_1","first-page":"11","article-title":"deploying incompatible stock dynamic analyses in production via multi-version execution","volume":"9","author":"Pina Lu'is","year":"2018","unstructured":"Lu'is Pina , Anastasios Andronidis , and Cristian Cadar . Freeda : deploying incompatible stock dynamic analyses in production via multi-version execution . System , 9 ( 10 ): 11 , 2018 . Lu'is Pina, Anastasios Andronidis, and Cristian Cadar. Freeda: deploying incompatible stock dynamic analyses in production via multi-version execution. System, 9(10):11, 2018.","journal-title":"System"},{"key":"e_1_3_2_1_12_1","first-page":"309","volume-title":"USENIX Annual Technical Conference","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitriy Vyukov. AddressSanitizer : A fast address sanity checker . In USENIX Annual Technical Conference , pages 309 -- 318 , 2012 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. AddressSanitizer: A fast address sanity checker. In USENIX Annual Technical Conference, pages 309--318, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_14_1","first-page":"185","volume-title":"Usenix Security Symposium","author":"Somayaji Anil","year":"2000","unstructured":"Anil Somayaji and Stephanie Forrest . Automated response using system-call delay . In Usenix Security Symposium , pages 185 -- 197 , 2000 . Anil Somayaji and Stephanie Forrest. Automated response using system-call delay. In Usenix Security Symposium, pages 185--197, 2000."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2002.1176279"},{"key":"e_1_3_2_1_16_1","first-page":"271","volume-title":"Bunshin: compositing security mechanisms through diversification. In 2017 $$USENIX$$ Annual Technical Conference (USENIXATC 17)","author":"Xu Meng","year":"2017","unstructured":"Meng Xu , Kangjie Lu , Taesoo Kim , and Wenke Lee . Bunshin: compositing security mechanisms through diversification. In 2017 $$USENIX$$ Annual Technical Conference (USENIXATC 17) , pages 271 -- 283 , 2017 . Meng Xu, Kangjie Lu, Taesoo Kim, and Wenke Lee. Bunshin: compositing security mechanisms through diversification. In 2017 $$USENIX$$ Annual Technical Conference (USENIXATC 17), pages 271--283, 2017."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338502.3359761","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338502.3359761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T23:55:33Z","timestamp":1672962933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338502.3359761"}},"subtitle":["Live Attacker-Guided Repair"],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":16,"alternative-id":["10.1145\/3338502.3359761","10.1145\/3338502"],"URL":"https:\/\/doi.org\/10.1145\/3338502.3359761","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2019-11-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}