{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T11:13:43Z","timestamp":1723634023787},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3445814.3446765","type":"proceedings-article","created":{"date-parts":[[2021,4,11]],"date-time":"2021-04-11T17:06:26Z","timestamp":1618160786000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Incremental CFG patching for binary rewriting"],"prefix":"10.1145","author":[{"given":"Xiaozhu","family":"Meng","sequence":"first","affiliation":[{"name":"Rice University, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3054-766X","authenticated-orcid":false,"given":"Weijie","family":"Liu","sequence":"additional","affiliation":[{"name":"Indiana University at Bloomington, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. JetStream 2-BrowserBench https:\/\/browserbench.org\/JetStream\/. [n.d.]. JetStream 2-BrowserBench https:\/\/browserbench.org\/JetStream\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Web Latency Benchmark https:\/\/google.github.io\/latency-benchmark\/. [n.d.]. Web Latency Benchmark https:\/\/google.github.io\/latency-benchmark\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Asia Slowinska, and Herbert Bos.","author":"Andriesse Dennis","year":"2016","unstructured":"Dennis Andriesse , Xi Chen , Victor Van Der Veen , Asia Slowinska, and Herbert Bos. 2016 . An in-depth analysis of disassembly on full-scale x86\/x64 binaries. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 583-600. Dennis Andriesse, Xi Chen, Victor Van Der Veen, Asia Slowinska, and Herbert Bos. 2016. An in-depth analysis of disassembly on full-scale x86\/x64 binaries. In 25th {USENIX} Security Symposium ({USENIX} Security 16). 583-600."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360572"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23300"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409694"},{"key":"e_1_3_2_1_7_1","volume-title":"2012 19th Working Conference on Reverse Engineering (WCRE). Kingston, ON, Canada, 9-18","author":"Andrew","unstructured":"Andrew R. Bernat and Barton P. Miller. 2012. Structured Binary Editing with a CFG Transformation Algebra . In 2012 19th Working Conference on Reverse Engineering (WCRE). Kingston, ON, Canada, 9-18 . Andrew R. Bernat and Barton P. Miller. 2012. Structured Binary Editing with a CFG Transformation Algebra. In 2012 19th Working Conference on Reverse Engineering (WCRE). Kingston, ON, Canada, 9-18."},{"key":"e_1_3_2_1_8_1","volume-title":"Sensitivity Resistant Binary Instrumentation. In The International Symposium on Software Testing and Analysis (ISSTA)","author":"Bernat Andrew R.","unstructured":"Andrew R. Bernat , Kevin A. Roundy , and Barton P. Miller . 2011. Eficient , Sensitivity Resistant Binary Instrumentation. In The International Symposium on Software Testing and Analysis (ISSTA) . Toronto, Canada. Andrew R. Bernat, Kevin A. Roundy, and Barton P. Miller. 2011. Eficient, Sensitivity Resistant Binary Instrumentation. In The International Symposium on Software Testing and Analysis (ISSTA). Toronto, Canada."},{"key":"e_1_3_2_1_9_1","unstructured":"BOLT. [n.d.]. Fix C+ + exceptions for shared objects https:\/\/github.com\/faceboo kincubator\/BOLT\/commit\/57e6864676195b7d883ebde59437e3de19d6181b. BOLT. [n.d.]. Fix C+ + exceptions for shared objects https:\/\/github.com\/faceboo kincubator\/BOLT\/commit\/57e6864676195b7d883ebde59437e3de19d6181b."},{"key":"e_1_3_2_1_10_1","volume-title":"An Infrastructure for Adaptive Dynamic Optimization. In International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization (CGO)","author":"Bruening Derek","year":"2003","unstructured":"Derek Bruening , Timothy Garnett , and Saman Amarasinghe . 2003 . An Infrastructure for Adaptive Dynamic Optimization. In International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization (CGO) . San Francisco, California, USA. Derek Bruening, Timothy Garnett, and Saman Amarasinghe. 2003. An Infrastructure for Adaptive Dynamic Optimization. In International Symposium on Code Generation and Optimization: Feedback-directed and Runtime Optimization (CGO). San Francisco, California, USA."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062344"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714635"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_14_1","volume-title":"RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In 41st IEEE Symposium on Security and Privacy (Oakland).","author":"Dinesh Sushant","year":"2020","unstructured":"Sushant Dinesh , Nathan Burow , Dongyan Xu , and Mathias Payer . 2020 . RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In 41st IEEE Symposium on Security and Privacy (Oakland). Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. 2020. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In 41st IEEE Symposium on Security and Privacy (Oakland)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385972"},{"key":"e_1_3_2_1_16_1","volume-title":"Dynamic Data Race Detection for OpenMP Programs. In International Conference for High Performance Computing, Networking, Storage, and Analysis (SC)","author":"Gu Yizi","year":"2018","unstructured":"Yizi Gu and John Mellor-Crummey . 2018 . Dynamic Data Race Detection for OpenMP Programs. In International Conference for High Performance Computing, Networking, Storage, and Analysis (SC) . Dallas, Texas. Yizi Gu and John Mellor-Crummey. 2018. Dynamic Data Race Detection for OpenMP Programs. In International Conference for High Performance Computing, Networking, Storage, and Analysis (SC). Dallas, Texas."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386020"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_19_1","volume-title":"Parallel Binary Code Analysis. arXiv","author":"Meng Xiaozhu","year":"2001","unstructured":"Xiaozhu Meng , Jonathon M. Anderson , John Mellor-Crummey , Mark W. Krentel , Barton P. Miller , and Sr?an Milakovi?. 2020. Parallel Binary Code Analysis. arXiv : 2001 . 10621 [cs.PF] Xiaozhu Meng, Jonathon M. Anderson, John Mellor-Crummey, Mark W. Krentel, Barton P. Miller, and Sr?an Milakovi?. 2020. Parallel Binary Code Analysis. arXiv: 2001. 10621 [cs.PF]"},{"key":"e_1_3_2_1_20_1","volume-title":"Binary Code Is Not Easy. In The International Symposium on Software Testing and Analysis (ISSTA)","author":"Meng Xiaozhu","unstructured":"Xiaozhu Meng and Barton P. Miller . 2016 . Binary Code Is Not Easy. In The International Symposium on Software Testing and Analysis (ISSTA) . Saarbr\u00fccken, Germany. Xiaozhu Meng and Barton P. Miller. 2016. Binary Code Is Not Easy. In The International Symposium on Software Testing and Analysis (ISSTA). Saarbr\u00fccken, Germany."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661201"},{"key":"e_1_3_2_1_22_1","unstructured":"Paradyn Project. [n.d.]. Dyninst: Putting the Performance in High Performance Computing http:\/\/www.dyninst.org. Paradyn Project. [n.d.]. Dyninst: Putting the Performance in High Performance Computing http:\/\/www.dyninst.org."},{"key":"e_1_3_2_1_23_1","volume-title":"accessed","author":"Hat Red","year":"2020","unstructured":"Red Hat . accessed Aug. 12, 2020 . Product Life Cycles . https:\/\/access.redhat.com \/product-life-cycles. Red Hat. accessed Aug. 12, 2020. Product Life Cycles. https:\/\/access.redhat.com \/product-life-cycles."},{"key":"e_1_3_2_1_24_1","volume-title":"2016 IEEE Symposium on Security and Privacy (SP)","author":"Shoshitaishvili Y.","unstructured":"Y. Shoshitaishvili , R. Wang , C. Salls , N. Stephens , M. Polino , A. Dutcher , J. Grosen , S. Feng , C. Hauser , C. Kruegel , and G. Vigna . 2016. SOK: (State of) The Art of War: Ofensive Techniques in Binary Analysis . In 2016 IEEE Symposium on Security and Privacy (SP) . San Jose, CA, USA. Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen, S. Feng, C. Hauser, C. Kruegel, and G. Vigna. 2016. SOK: (State of) The Art of War: Ofensive Techniques in Binary Analysis. In 2016 IEEE Symposium on Security and Privacy (SP). San Jose, CA, USA."},{"key":"e_1_3_2_1_25_1","volume-title":"2016 IEEE Symposium on Security and Privacy (SP)","author":"Veen V. v. d.","unstructured":"V. v. d. Veen , E. G\u00f6ktas , M. Contag , A. Pawoloski , X. Chen , S. Rawat , H. Bos , T. Holz , E. Athanasopoulos , and C. Giufrida . 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level . In 2016 IEEE Symposium on Security and Privacy (SP) . San Jose, CA, USA. V. v. d. Veen, E. G\u00f6ktas, M. Contag, A. Pawoloski, X. Chen, S. Rawat, H. Bos, T. Holz, E. Athanasopoulos, and C. Giufrida. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. In 2016 IEEE Symposium on Security and Privacy (SP). San Jose, CA, USA."},{"key":"e_1_3_2_1_26_1","volume-title":"Practical ContextSensitive CFI. In 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS)","author":"van der Veen Victor","year":"2015","unstructured":"Victor van der Veen , Dennis Andriesse , Enes G\u00f6kta\u00fe , Ben Gras , Lionel Sambuc , Asia Slowinska , Herbert Bos , and Cristiano Giufrida . 2015 . Practical ContextSensitive CFI. In 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS) . Denver, Colorado, USA. Victor van der Veen, Dennis Andriesse, Enes G\u00f6kta\u00fe, Ben Gras, Lionel Sambuc, Asia Slowinska, Herbert Bos, and Cristiano Giufrida. 2015. Practical ContextSensitive CFI. In 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). Denver, Colorado, USA."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis","author":"Welton Benjamin","unstructured":"Benjamin Welton and Barton P. Miller . 2019. Diogenes: Looking for an Honest CPU\/GPU Performance Measurement Tool . In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis ( Denver, Colorado) ( SC'19). Benjamin Welton and Barton P. Miller. 2019. Diogenes: Looking for an Honest CPU\/GPU Performance Measurement Tool. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis (Denver, Colorado) ( SC'19)."},{"key":"e_1_3_2_1_29_1","volume-title":"Identifying and (Automatically) Remedying Performance Problems in CPU\/GPU Applications. In 34th ACM International Conference on Supercomputing (ICS)","author":"Welton Benjamin","unstructured":"Benjamin Welton and Barton P. Miller . 2020 . Identifying and (Automatically) Remedying Performance Problems in CPU\/GPU Applications. In 34th ACM International Conference on Supercomputing (ICS) . Barcelona, Spain, Article 27, 13 pages. Benjamin Welton and Barton P. Miller. 2020. Identifying and (Automatically) Remedying Performance Problems in CPU\/GPU Applications. In 34th ACM International Conference on Supercomputing (ICS). Barcelona, Spain, Article 27, 13 pages."},{"key":"e_1_3_2_1_30_1","volume-title":"Egalito: Layout-Agnostic Binary Recompilation. In Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Williams-King David","unstructured":"David Williams-King , Hidenori Kobayashi , Kent Williams-King , Graham Patterson , Frank Spano , Yu Jian Wu , Junfeng Yang , and Vasileios P. Kemerlis . 2020 . Egalito: Layout-Agnostic Binary Recompilation. In Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) . Lausanne, Switzerland. David Williams-King, Hidenori Kobayashi, Kent Williams-King, Graham Patterson, Frank Spano, Yu Jian Wu, Junfeng Yang, and Vasileios P. Kemerlis. 2020. Egalito: Layout-Agnostic Binary Recompilation. In Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS). Lausanne, Switzerland."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338502.3359763"},{"key":"e_1_3_2_1_32_1","unstructured":"Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13 ) (Washington D.C.). Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13 ) (Washington D.C.)."}],"event":{"name":"ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Virtual USA","acronym":"ASPLOS '21","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445814.3446765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T04:30:09Z","timestamp":1683001809000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445814.3446765"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,17]]},"references-count":32,"alternative-id":["10.1145\/3445814.3446765","10.1145\/3445814"],"URL":"https:\/\/doi.org\/10.1145\/3445814.3446765","relation":{},"subject":[],"published":{"date-parts":[[2021,4,17]]},"assertion":[{"value":"2021-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}