{"id":"https://openalex.org/W2132806808","doi":"https://doi.org/10.1109/sp.2012.39","title":"ILR: Where'd My Gadgets Go?","display_name":"ILR: Where'd My Gadgets Go?","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2132806808","doi":"https://doi.org/10.1109/sp.2012.39","mag":"2132806808"},"language":"en","primary_location":{"id":"doi:10.1109/sp.2012.39","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp.2012.39","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Symposium on Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086514103","display_name":"Jason D. Hiser","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jason Hiser","raw_affiliation_strings":["Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","Department of Computer Science, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067640908","display_name":"Anh Nguyen\u2010Tuong","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anh Nguyen-Tuong","raw_affiliation_strings":["Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","Department of Computer Science, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003389724","display_name":"Michele Co","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michele Co","raw_affiliation_strings":["Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","Department of Computer Science, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103886626","display_name":"Matthew Hall","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew Hall","raw_affiliation_strings":["Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","Department of Computer Science, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103461225","display_name":"Jack W. Davidson","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jack W. Davidson","raw_affiliation_strings":["Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","Department of Computer Science, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Dept. of Comput. Sci., Univ. of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]},{"raw_affiliation_string":"Department of Computer Science, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5086514103"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":39.8157,"has_fulltext":false,"cited_by_count":254,"citation_normalized_percentile":{"value":0.9984708,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"571","last_page":"585"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8221845626831055},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6282334327697754},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5760294198989868},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.5758815407752991},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5255871415138245},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.520618200302124},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5065869092941284},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.321169912815094},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2719040811061859},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2651090621948242}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8221845626831055},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6282334327697754},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5760294198989868},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.5758815407752991},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5255871415138245},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.520618200302124},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5065869092941284},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.321169912815094},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2719040811061859},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2651090621948242}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp.2012.39","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp.2012.39","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 IEEE Symposium on Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"},{"id":"https://openalex.org/F4320333591","display_name":"Multidisciplinary University Research Initiative","ror":null},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W164984320","https://openalex.org/W1515653707","https://openalex.org/W1564075167","https://openalex.org/W1565779629","https://openalex.org/W1593678010","https://openalex.org/W1982829328","https://openalex.org/W1989060313","https://openalex.org/W1996931407","https://openalex.org/W2027963645","https://openalex.org/W2046793608","https://openalex.org/W2056864112","https://openalex.org/W2072737419","https://openalex.org/W2098010707","https://openalex.org/W2099382052","https://openalex.org/W2101699859","https://openalex.org/W2102039064","https://openalex.org/W2102970979","https://openalex.org/W2105904466","https://openalex.org/W2109219878","https://openalex.org/W2112243402","https://openalex.org/W2113181828","https://openalex.org/W2121468041","https://openalex.org/W2123022206","https://openalex.org/W2123436168","https://openalex.org/W2134633067","https://openalex.org/W2154555738","https://openalex.org/W2156375130","https://openalex.org/W2162800072","https://openalex.org/W2170992734","https://openalex.org/W2171143790","https://openalex.org/W2296616300","https://openalex.org/W4231002400","https://openalex.org/W4239813889","https://openalex.org/W4243006798","https://openalex.org/W6633665954","https://openalex.org/W6678302136","https://openalex.org/W6685201509","https://openalex.org/W6696929981"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W2110615297","https://openalex.org/W2357088637","https://openalex.org/W2759596553","https://openalex.org/W2527376031","https://openalex.org/W2030906223","https://openalex.org/W1016402482","https://openalex.org/W1487950530","https://openalex.org/W4302013158"],"abstract_inverted_index":{"Through":[0],"randomization":[1],"of":[2,9,22,58,120,140,143,185,191,198,214],"the":[3,7,56,141,182,206],"memory":[4],"space":[5],"and":[6,75,89,103,222],"confinement":[8],"code":[10,144],"to":[11,33,68,189],"non-data":[12],"pages,":[13],"computer":[14],"security":[15],"researchers":[16],"have":[17,31],"made":[18],"a":[19,45,62,117,128,137,220],"wide":[20],"range":[21],"attacks":[23,30,74,133,157],"against":[24,158],"program":[25,70],"binaries":[26],"more":[27,203],"difficult.":[28],"However,":[29],"evolved":[32],"exploit":[34],"weaknesses":[35],"in":[36,61],"these":[37,41],"defenses.":[38],"To":[39],"thwart":[40],"attacks,":[42],"we":[43,180],"introduce":[44],"novel":[46],"technique":[47],"called":[48],"Instruction":[49],"Location":[50],"Randomization":[51],"(ILR).":[52],"Conceptually,":[53],"ILR":[54,79,199,218],"randomizes":[55],"location":[57,142],"every":[59],"instruction":[60],"program,":[63],"thwarting":[64],"an":[65,169,174],"attacker's":[66],"ability":[67],"re-use":[69],"functionality":[71],"(e.g.,":[72],"arc-injection":[73],"return-oriented":[76],"programming":[77],"attacks).":[78],"operates":[80],"on":[81,110,136],"arbitrary":[82],"executable":[83],"programs,":[84],"requires":[85,90],"no":[86,91,210],"compiler":[87],"support,":[88],"user":[92],"interaction.":[93],"Thus,":[94,132],"it":[95],"can":[96],"be":[97],"automatically":[98],"applied":[99],"post-deployment,":[100],"allowing":[101],"easy":[102],"frequent":[104],"re-randomization.":[105],"Our":[106],"preliminary":[107],"prototype,":[108],"working":[109],"32-bit":[111],"x86":[112],"Linux":[113],"ELF":[114],"binaries,":[115],"provides":[116],"high":[118],"degree":[119],"entropy.":[121],"Individual":[122],"instructions":[123],"are":[124,147],"randomly":[125],"placed":[126],"within":[127],"31-bit":[129],"address":[130],"space.":[131],"that":[134,190,217],"rely":[135],"priori":[138],"knowledge":[139],"or":[145],"derandomization":[146],"not":[148],"feasible.":[149],"We":[150],"demonstrated":[151],"ILR's":[152],"defensive":[153],"capabilities":[154],"by":[155],"defeating":[156],"programs":[159,207],"with":[160,202],"vulnerabilities,":[161],"including":[162],"Adobe's":[163],"PDF":[164],"viewer,":[165],"acroread,":[166],"which":[167],"had":[168],"in-the-wild":[170],"vulnerability.":[171],"Additionally,":[172],"using":[173],"industry-standard":[175],"CPU":[176],"performance":[177],"benchmark":[178],"suite,":[179],"compared":[181],"run":[183],"time":[184],"prototype":[186],"ILR-protected":[187],"executables":[188],"native":[192],"executables.":[193],"The":[194],"average":[195],"run-time":[196],"overhead":[197,211],"was":[200],"13%":[201],"than":[204],"half":[205],"having":[208],"effectively":[209],"(15":[212],"out":[213],"29),":[215],"indicating":[216],"is":[219],"realistic":[221],"cost-effective":[223],"mitigation":[224],"technique.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":16},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":25},{"year":2018,"cited_by_count":24},{"year":2017,"cited_by_count":27},{"year":2016,"cited_by_count":33},{"year":2015,"cited_by_count":45},{"year":2014,"cited_by_count":28},{"year":2013,"cited_by_count":15},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
