{"id":"https://openalex.org/W1992221070","doi":"https://doi.org/10.1109/cgo.2013.6494997","title":"Profile-guided automated software diversity","display_name":"Profile-guided automated software diversity","publication_year":2013,"publication_date":"2013-02-01","ids":{"openalex":"https://openalex.org/W1992221070","doi":"https://doi.org/10.1109/cgo.2013.6494997","mag":"1992221070"},"language":"en","primary_location":{"id":"doi:10.1109/cgo.2013.6494997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cgo.2013.6494997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090145129","display_name":"Andrei Homescu","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"A. Homescu","raw_affiliation_strings":["University of California, Irvine, USA","University of California Irvine, IRVINE, CA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]},{"raw_affiliation_string":"University of California Irvine, IRVINE, CA, USA#TAB#","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5097531818","display_name":"S. Neisius","orcid":null},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Neisius","raw_affiliation_strings":["University of California, Irvine, USA","University of California Irvine, IRVINE, CA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]},{"raw_affiliation_string":"University of California Irvine, IRVINE, CA, USA#TAB#","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029451644","display_name":"Per Larsen","orcid":"https://orcid.org/0009-0000-2928-4121"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P. Larsen","raw_affiliation_strings":["University of California, Irvine, USA","University of California Irvine, IRVINE, CA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]},{"raw_affiliation_string":"University of California Irvine, IRVINE, CA, USA#TAB#","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058365944","display_name":"Stefan Brunthaler","orcid":"https://orcid.org/0000-0001-9766-4871"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Brunthaler","raw_affiliation_strings":["University of California, Irvine, USA","University of California Irvine, IRVINE, CA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]},{"raw_affiliation_string":"University of California Irvine, IRVINE, CA, USA#TAB#","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107250730","display_name":"Michael Franz","orcid":"https://orcid.org/0000-0003-0112-709X"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Franz","raw_affiliation_strings":["University of California, Irvine, USA","University of California Irvine, IRVINE, CA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"University of California, Irvine, USA","institution_ids":["https://openalex.org/I204250578"]},{"raw_affiliation_string":"University of California Irvine, IRVINE, CA, USA#TAB#","institution_ids":["https://openalex.org/I204250578"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5090145129"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":22.7352,"has_fulltext":false,"cited_by_count":109,"citation_normalized_percentile":{"value":0.99451356,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9819999933242798,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7823327779769897},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.6727061867713928},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.6108266711235046},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5331273674964905},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.504069447517395},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4985663890838623},{"id":"https://openalex.org/keywords/program-optimization","display_name":"Program optimization","score":0.4747462868690491},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.4349876642227173},{"id":"https://openalex.org/keywords/spec#","display_name":"Spec#","score":0.4153830409049988},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4139414131641388},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38557708263397217},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3007720708847046},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14909625053405762},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11847221851348877},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.10435804724693298}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7823327779769897},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.6727061867713928},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.6108266711235046},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5331273674964905},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.504069447517395},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4985663890838623},{"id":"https://openalex.org/C139571649","wikidata":"https://www.wikidata.org/wiki/Q1156793","display_name":"Program optimization","level":3,"score":0.4747462868690491},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.4349876642227173},{"id":"https://openalex.org/C2778565505","wikidata":"https://www.wikidata.org/wiki/Q2207566","display_name":"Spec#","level":2,"score":0.4153830409049988},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4139414131641388},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38557708263397217},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3007720708847046},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14909625053405762},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11847221851348877},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.10435804724693298},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cgo.2013.6494997","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cgo.2013.6494997","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.365.1292","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.365.1292","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.ics.uci.edu/~ahomescu/multicompiler_cgo13.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4300000071525574,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G7487525863","display_name":null,"funder_award_id":"D11PC20024","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"}],"funders":[{"id":"https://openalex.org/F4320306116","display_name":"U.S. Department of the Interior","ror":"https://ror.org/03v0pmy70"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"},{"id":"https://openalex.org/F4320332815","display_name":"Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W53119127","https://openalex.org/W1495630617","https://openalex.org/W1515653707","https://openalex.org/W1535810264","https://openalex.org/W1563300346","https://openalex.org/W1969501726","https://openalex.org/W1998143201","https://openalex.org/W2009801020","https://openalex.org/W2022832305","https://openalex.org/W2027963645","https://openalex.org/W2062340141","https://openalex.org/W2086277109","https://openalex.org/W2098010707","https://openalex.org/W2099382052","https://openalex.org/W2109219878","https://openalex.org/W2111817346","https://openalex.org/W2111927651","https://openalex.org/W2116672403","https://openalex.org/W2119177527","https://openalex.org/W2120209286","https://openalex.org/W2121468041","https://openalex.org/W2132806808","https://openalex.org/W2136938453","https://openalex.org/W2153185479","https://openalex.org/W2162800072","https://openalex.org/W2171143790","https://openalex.org/W2300305891","https://openalex.org/W2785216240","https://openalex.org/W3150476285","https://openalex.org/W4246166885","https://openalex.org/W4248045917","https://openalex.org/W4250981365","https://openalex.org/W6602098182","https://openalex.org/W6630861182","https://openalex.org/W6632249059","https://openalex.org/W6633875382","https://openalex.org/W6676817380"],"related_works":["https://openalex.org/W4320560513","https://openalex.org/W2146865435","https://openalex.org/W4225492247","https://openalex.org/W2113798250","https://openalex.org/W2956382393","https://openalex.org/W2147623728","https://openalex.org/W2069117531","https://openalex.org/W2577630842","https://openalex.org/W1488300410","https://openalex.org/W1877657449"],"abstract_inverted_index":{"Code-reuse":[0],"attacks":[1,28],"are":[2,114],"notoriously":[3],"hard":[4],"to":[5,11,100,116,161],"defeat,":[6],"and":[7,147],"most":[8,75],"current":[9],"solutions":[10],"the":[12,29,102,131,167,171],"problem":[13],"focus":[14,92],"on":[15,67,93,135],"automated":[16],"software":[17,35,106],"diversity.":[18,107],"This":[19],"is":[20,111],"a":[21,72,156,162,184],"promising":[22],"area":[23,41],"of":[24,76,105,133,158,170],"research,":[25],"as":[26],"diversity":[27],"common":[30],"denominator":[31],"enabling":[32],"code-reuse":[33],"attacksthe":[34],"monoculture.":[36],"Recent":[37],"research":[38],"in":[39,125],"this":[40,94],"provides":[42],"security,":[43],"but":[44,120],"at":[45],"an":[46,136],"unfortunate":[47],"price:":[48],"performance":[49,103,186],"overhead.":[50],"Leveraging":[51],"previously":[52],"collected":[53],"profiling":[54,134],"information,":[55],"compilers":[56],"can":[57],"substantially":[58],"improve":[59],"subsequent":[60],"code":[61,83],"generation.":[62],"Traditionally,":[63],"profile-guided":[64,98,177],"optimization":[65,99],"focuses":[66],"hot":[68,126,145],"program":[69,73],"code,":[70,119,149],"where":[71],"spends":[74],"its":[77],"execution":[78],"time.":[79],"Optimizing":[80],"rarely":[81],"executed":[82],"does":[84],"not":[85],"significantly":[86],"impact":[87,132],"performance,":[88],"so":[89],"few":[90],"optimizations":[91],"code.":[95,127],"We":[96],"use":[97],"reduce":[101],"overhead":[104,187],"The":[108],"primary":[109],"insight":[110],"that":[112],"we":[113,150],"free":[115],"diversify":[117],"cold":[118,146,148],"restrict":[121],"our":[122,176],"diversification":[123,138,178],"efforts":[124],"Our":[128],"work":[129],"investigates":[130],"expensive":[137],"technique:":[139],"NOP":[140,152],"insertion.":[141],"By":[142],"differentiating":[143],"between":[144],"optimize":[151],"insertion":[153],"overheads":[154],"from":[155],"maximum":[157],"25%":[159],"down":[160],"negligible":[163],"1%,":[164],"while":[165],"preserving":[166],"security":[168],"properties":[169],"original":[172],"defense.":[173],"Consequently,":[174],"using":[175],"technique,":[179],"even":[180],"randomization":[181],"techniques":[182],"having":[183],"high":[185],"become":[188],"practical.":[189]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":24},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":3}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
