{"id":"https://openalex.org/W2898518680","doi":"https://doi.org/10.1109/tdsc.2018.2878234","title":"Stopping Memory Disclosures via Diversification and Replicated Execution","display_name":"Stopping Memory Disclosures via Diversification and Replicated Execution","publication_year":2018,"publication_date":"2018-10-26","ids":{"openalex":"https://openalex.org/W2898518680","doi":"https://doi.org/10.1109/tdsc.2018.2878234","mag":"2898518680"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2018.2878234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2878234","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043198742","display_name":"Kangjie Lu","orcid":"https://orcid.org/0000-0002-4763-7354"},"institutions":[{"id":"https://openalex.org/I130238516","display_name":"University of Minnesota","ror":"https://ror.org/017zqws13","country_code":"US","type":"education","lineage":["https://openalex.org/I130238516"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kangjie Lu","raw_affiliation_strings":["University of Minnesota, Minneapolis, MN, USA"],"affiliations":[{"raw_affiliation_string":"University of Minnesota, Minneapolis, MN, USA","institution_ids":["https://openalex.org/I130238516"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003470834","display_name":"Meng Xu","orcid":"https://orcid.org/0000-0002-3634-0547"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Meng Xu","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005972298","display_name":"Chengyu Song","orcid":"https://orcid.org/0000-0001-6617-3068"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chengyu Song","raw_affiliation_strings":["University of California, Riverside, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Riverside, CA, USA","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100743709","display_name":"Taesoo Kim","orcid":"https://orcid.org/0000-0002-7440-2067"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Taesoo Kim","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047140382","display_name":"Wenke Lee","orcid":"https://orcid.org/0000-0003-2761-1277"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wenke Lee","raw_affiliation_strings":["Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5043198742"],"corresponding_institution_ids":["https://openalex.org/I130238516"],"apc_list":null,"apc_paid":null,"fwci":1.6288,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.87899741,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"18","issue":"1","first_page":"160","last_page":"173"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9837999939918518,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8765758872032166},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6078052520751953},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.5792170166969299},{"id":"https://openalex.org/keywords/memory-errors","display_name":"Memory errors","score":0.5312022566795349},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5263822078704834},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.4997742176055908},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4624922573566437},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.4590451121330261},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.43313318490982056},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.36271631717681885},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3520812392234802},{"id":"https://openalex.org/keywords/flat-memory-model","display_name":"Flat memory model","score":0.34616953134536743},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.21034052968025208}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8765758872032166},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6078052520751953},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.5792170166969299},{"id":"https://openalex.org/C119907115","wikidata":"https://www.wikidata.org/wiki/Q6815725","display_name":"Memory errors","level":3,"score":0.5312022566795349},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5263822078704834},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.4997742176055908},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4624922573566437},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.4590451121330261},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.43313318490982056},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.36271631717681885},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3520812392234802},{"id":"https://openalex.org/C57863822","wikidata":"https://www.wikidata.org/wiki/Q905488","display_name":"Flat memory model","level":4,"score":0.34616953134536743},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.21034052968025208},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C100660578","wikidata":"https://www.wikidata.org/wiki/Q18733","display_name":"Recall","level":2,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2018.2878234","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2878234","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":68,"referenced_works":["https://openalex.org/W216996474","https://openalex.org/W1538332098","https://openalex.org/W1605557845","https://openalex.org/W1691322864","https://openalex.org/W1878544538","https://openalex.org/W1945100066","https://openalex.org/W1972484642","https://openalex.org/W1977336977","https://openalex.org/W1984554975","https://openalex.org/W1992741024","https://openalex.org/W2001978806","https://openalex.org/W2008332764","https://openalex.org/W2033593513","https://openalex.org/W2035991175","https://openalex.org/W2042856445","https://openalex.org/W2069661885","https://openalex.org/W2072102701","https://openalex.org/W2073524356","https://openalex.org/W2090181646","https://openalex.org/W2106728965","https://openalex.org/W2107135371","https://openalex.org/W2111794592","https://openalex.org/W2111927651","https://openalex.org/W2112736324","https://openalex.org/W2119055825","https://openalex.org/W2122532513","https://openalex.org/W2122757982","https://openalex.org/W2124360577","https://openalex.org/W2132806808","https://openalex.org/W2136286495","https://openalex.org/W2136938453","https://openalex.org/W2137975889","https://openalex.org/W2154555738","https://openalex.org/W2155851497","https://openalex.org/W2158794422","https://openalex.org/W2160725972","https://openalex.org/W2163706363","https://openalex.org/W2168843528","https://openalex.org/W2170961388","https://openalex.org/W2175377689","https://openalex.org/W2293825325","https://openalex.org/W2317668908","https://openalex.org/W2332347785","https://openalex.org/W2408805917","https://openalex.org/W2506852773","https://openalex.org/W2507765405","https://openalex.org/W2512784977","https://openalex.org/W2528894473","https://openalex.org/W2538805569","https://openalex.org/W2574009340","https://openalex.org/W2580529968","https://openalex.org/W2606288313","https://openalex.org/W2914503388","https://openalex.org/W2962917299","https://openalex.org/W4235385348","https://openalex.org/W4250981365","https://openalex.org/W4285719527","https://openalex.org/W6608653658","https://openalex.org/W6637592124","https://openalex.org/W6639560864","https://openalex.org/W6667984497","https://openalex.org/W6675887568","https://openalex.org/W6676817380","https://openalex.org/W6677689127","https://openalex.org/W6678545021","https://openalex.org/W6683921754","https://openalex.org/W6713944283","https://openalex.org/W6759111002"],"related_works":["https://openalex.org/W2362277122","https://openalex.org/W261562921","https://openalex.org/W2115679100","https://openalex.org/W4240600268","https://openalex.org/W2380727809","https://openalex.org/W2363104553","https://openalex.org/W2039686666","https://openalex.org/W2170922286","https://openalex.org/W4210676563","https://openalex.org/W2959540566"],"abstract_inverted_index":{"With":[0],"the":[1,37,43,60,154,162,185],"wide":[2],"deployment":[3],"of":[4,46,62,94,97,121,137,153],"security":[5,44,63],"mechanisms":[6],"such":[7,101,183],"as":[8,36,102,156,184],"Address":[9],"Space":[10],"Layout":[11],"Randomization":[12],"(ASLR),":[13],"memory":[14,31,47,80,85,103,118,151,181],"disclosures":[15,32,48,86,152,182],"have":[16],"become":[17],"a":[18,41,70,76,95,111,138],"prerequisite":[19],"for":[20],"critical":[21],"memory-corruption":[22],"attacks":[23],"(e.g.,":[24],"code-reuse":[25],"attack)-adversaries":[26],"are":[27,49,87],"forced":[28],"to":[29,33,78,115],"exploit":[30],"circumvent":[34],"ASLR":[35],"first":[38],"step.":[39],"As":[40],"result,":[42],"threats":[45],"now":[50],"significantly":[51],"aggravated-they":[52],"break":[53],"not":[54,88],"only":[55,143],"data":[56],"confidentiality":[57],"but":[58,91],"also":[59],"effectiveness":[61],"mechanisms.":[64],"In":[65],"this":[66,126],"paper,":[67],"we":[68],"propose":[69,110],"general":[71],"detection":[72],"methodology":[73,114,127],"and":[74,105,141,176],"develop":[75],"system":[77],"stop":[79],"disclosures.":[81],"We":[82,108,124],"observe":[83],"that":[84,172],"root":[89],"causes":[90],"rather":[92],"consequences":[93],"variety":[96],"hard-to-detect":[98],"program":[99,140],"errors":[100],"corruption":[104],"uninitialized":[106],"read.":[107],"thus":[109],"replicated":[112],"execution-based":[113],"generally":[116],"detect":[117],"disclosures,":[119],"regardless":[120],"their":[122],"causes.":[123],"realize":[125],"with":[128],"Buddy:":[129],"By":[130],"seamlessly":[131],"maintaining":[132],"two":[133,163],"identical":[134],"running":[135],"instances":[136,164],"target":[139,145],"diversifying":[142],"its":[144],"data,":[146,155],"Buddy":[147,173],"can":[148],"accurately":[149],"detects":[150],"doing":[157],"so":[158],"will":[159],"result":[160],"in":[161],"outputting":[165],"different":[166],"values.":[167],"Extensive":[168],"evaluation":[169],"results":[170],"show":[171],"is":[174],"reliable":[175],"efficient":[177],"while":[178],"stopping":[179],"real":[180],"Heartbleed":[186],"leak.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
