{"id":"https://openalex.org/W2123034525","doi":"https://doi.org/10.1145/1920261.1920268","title":"Fast and practical instruction-set randomization for commodity systems","display_name":"Fast and practical instruction-set randomization for commodity systems","publication_year":2010,"publication_date":"2010-12-06","ids":{"openalex":"https://openalex.org/W2123034525","doi":"https://doi.org/10.1145/1920261.1920268","mag":"2123034525"},"language":"en","primary_location":{"id":"doi:10.1145/1920261.1920268","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1920261.1920268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.7916/d8j10chm","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045292308","display_name":"Georgios Portokalidis","orcid":"https://orcid.org/0000-0002-1665-803X"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Georgios Portokalidis","raw_affiliation_strings":["Columbia University, New York, NY","Columbia University, New York, NY;"],"affiliations":[{"raw_affiliation_string":"Columbia University, New York, NY","institution_ids":["https://openalex.org/I78577930"]},{"raw_affiliation_string":"Columbia University, New York, NY;","institution_ids":["https://openalex.org/I78577930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5023057383","display_name":"Angelos D. Keromytis","orcid":"https://orcid.org/0000-0003-3815-5932"},"institutions":[{"id":"https://openalex.org/I78577930","display_name":"Columbia University","ror":"https://ror.org/00hj8s172","country_code":"US","type":"education","lineage":["https://openalex.org/I78577930"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Angelos D. Keromytis","raw_affiliation_strings":["Columbia University, New York, NY","Columbia University, New York, NY;"],"affiliations":[{"raw_affiliation_string":"Columbia University, New York, NY","institution_ids":["https://openalex.org/I78577930"]},{"raw_affiliation_string":"Columbia University, New York, NY;","institution_ids":["https://openalex.org/I78577930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045292308"],"corresponding_institution_ids":["https://openalex.org/I78577930"],"apc_list":null,"apc_paid":null,"fwci":4.7345,"has_fulltext":false,"cited_by_count":69,"citation_normalized_percentile":{"value":0.9557983,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8381991982460022},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5915285348892212},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5760257244110107},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5414493083953857},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5413778424263},{"id":"https://openalex.org/keywords/instruction-set","display_name":"Instruction set","score":0.4780474305152893},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4508981704711914},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3913303017616272},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36874040961265564},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32594364881515503},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2736049294471741}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8381991982460022},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5915285348892212},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5760257244110107},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5414493083953857},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5413778424263},{"id":"https://openalex.org/C202491316","wikidata":"https://www.wikidata.org/wiki/Q272683","display_name":"Instruction set","level":2,"score":0.4780474305152893},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4508981704711914},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3913303017616272},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36874040961265564},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32594364881515503},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2736049294471741}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/1920261.1920268","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1920261.1920268","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th Annual Computer Security Applications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.188.6170","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.188.6170","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www1.cs.columbia.edu/%7Eangelos/Papers/2010/practical_isr.pdf","raw_type":"text"},{"id":"pmh:oai:academiccommons.columbia.edu:10.7916/D8J10CHM","is_oa":false,"landing_page_url":"https://doi.org/10.7916/D8J10CHM","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Articles"},{"id":"doi:10.7916/d8j10chm","is_oa":true,"landing_page_url":"https://doi.org/10.7916/d8j10chm","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.7916/d8j10chm","is_oa":true,"landing_page_url":"https://doi.org/10.7916/d8j10chm","pdf_url":null,"source":{"id":"https://openalex.org/S4306402601","display_name":"Columbia Academic Commons (Columbia University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78577930","host_organization_name":"Columbia University","host_organization_lineage":["https://openalex.org/I78577930"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G38911360","display_name":null,"funder_award_id":"CNS-09-14845","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G8214008579","display_name":null,"funder_award_id":"FA8650-10-C-7024","funder_id":"https://openalex.org/F4320338294","funder_display_name":"Air Force Research Laboratory"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332467","display_name":"U.S. Air Force","ror":"https://ror.org/006gmme17"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W146660932","https://openalex.org/W1503224444","https://openalex.org/W1504234628","https://openalex.org/W1545927878","https://openalex.org/W1565113942","https://openalex.org/W1579850852","https://openalex.org/W1593678010","https://openalex.org/W1655226010","https://openalex.org/W1978223246","https://openalex.org/W1980065740","https://openalex.org/W1989060313","https://openalex.org/W2006419855","https://openalex.org/W2083477206","https://openalex.org/W2090181646","https://openalex.org/W2094873755","https://openalex.org/W2098010707","https://openalex.org/W2098806455","https://openalex.org/W2101699859","https://openalex.org/W2102902405","https://openalex.org/W2102970979","https://openalex.org/W2112243402","https://openalex.org/W2121579803","https://openalex.org/W2133217855","https://openalex.org/W2134633067","https://openalex.org/W2156375130","https://openalex.org/W2159670077","https://openalex.org/W2165100126","https://openalex.org/W2171264329","https://openalex.org/W2914982603","https://openalex.org/W2978757628","https://openalex.org/W2999304050","https://openalex.org/W4239813889","https://openalex.org/W4254762831","https://openalex.org/W6629915129"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4312814274","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W2353836703"],"abstract_inverted_index":{"Instruction-set":[0],"randomization":[1],"(ISR)":[2],"is":[3,106,113],"a":[4,13,35,61,80,97,102,140],"technique":[5],"based":[6],"on":[7,72,79,167],"randomizing":[8],"the":[9,30,42,48,148,152,155,162],"\"language\"":[10],"understood":[11],"by":[12,25,41,131],"system":[14,143],"to":[15,84,144,164],"protect":[16],"it":[17,38],"from":[18],"code-injection":[19],"attacks.":[20],"Such":[21],"attacks":[22],"were":[23],"used":[24,130,150],"many":[26],"computer":[27],"worms":[28],"in":[29,91,151],"past,":[31],"but":[32],"still":[33],"pose":[34],"threat":[36],"as":[37],"was":[39],"confirmed":[40],"recent":[43],"Conficker":[44],"worm":[45],"outbreak,":[46],"and":[47,63,101,124],"latest":[49],"exploits":[50],"targeting":[51],"some":[52],"of":[53,66,147,157],"Adobe's":[54],"most":[55],"popular":[56],"products.":[57],"This":[58],"paper":[59],"presents":[60],"fast":[62],"practical":[64],"implementation":[65],"ISR":[67,166],"that":[68,105],"can":[69,117,128],"be":[70,118,129],"applied":[71],"currently":[73],"deployed":[74],"software.":[75,92],"Our":[76],"solution":[77],"builds":[78],"binary":[81],"instrumentation":[82],"tool":[83],"provide":[85],"an":[86,111],"ISR-enabled":[87],"execution":[88],"environment":[89],"entirely":[90],"Applications":[93],"are":[94,161],"randomized":[95,120,126],"using":[96,121],"simple":[98],"XOR":[99],"function":[100],"16-bit":[103],"key":[104,141],"randomly":[107],"generated":[108],"every":[109],"time":[110],"application":[112],"launched.":[114],"Shared":[115],"libraries":[116],"also":[119],"separate":[122],"keys,":[123],"their":[125],"versions":[127],"all":[132],"applications":[133],"running":[134],"under":[135],"ISR.":[136],"Moreover,":[137],"we":[138,160],"introduce":[139],"management":[142],"keep":[145],"track":[146],"keys":[149],"system.":[153],"To":[154],"best":[156],"our":[158],"knowledge":[159],"first":[163],"apply":[165],"truly":[168],"shared":[169],"libraries.":[170]},"counts_by_year":[{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":7}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
