{"id":"https://openalex.org/W2301588800","doi":"https://doi.org/10.1145/2857705.2857726","title":"Remix","display_name":"Remix","publication_year":2016,"publication_date":"2016-03-04","ids":{"openalex":"https://openalex.org/W2301588800","doi":"https://doi.org/10.1145/2857705.2857726","mag":"2301588800"},"language":"en","primary_location":{"id":"doi:10.1145/2857705.2857726","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2857705.2857726","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2857726&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2857726&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100454811","display_name":"Yue Chen","orcid":"https://orcid.org/0000-0002-1264-3287"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yue Chen","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100376417","display_name":"Zhi Wang","orcid":"https://orcid.org/0000-0003-0891-5005"},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhi Wang","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108249713","display_name":"David Whalley","orcid":null},"institutions":[{"id":"https://openalex.org/I103163165","display_name":"Florida State University","ror":"https://ror.org/05g3dte14","country_code":"US","type":"education","lineage":["https://openalex.org/I103163165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Whalley","raw_affiliation_strings":["Florida State University, Tallahassee, FL, USA"],"affiliations":[{"raw_affiliation_string":"Florida State University, Tallahassee, FL, USA","institution_ids":["https://openalex.org/I103163165"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013217302","display_name":"Long Lu","orcid":"https://orcid.org/0000-0003-1550-479X"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Long Lu","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100454811"],"corresponding_institution_ids":["https://openalex.org/I103163165"],"apc_list":null,"apc_paid":null,"fwci":16.4648,"has_fulltext":false,"cited_by_count":62,"citation_normalized_percentile":{"value":0.9903321,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"50","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9749000072479248,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7533776760101318},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.677274763584137},{"id":"https://openalex.org/keywords/randomization","display_name":"Randomization","score":0.6512136459350586},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6279752850532532},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.6128032803535461},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.5218700170516968},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4662441611289978},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.4480224847793579},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3452184498310089},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3229057788848877},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30609947443008423},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.12621116638183594},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08410272002220154},{"id":"https://openalex.org/keywords/randomized-controlled-trial","display_name":"Randomized controlled trial","score":0.05564531683921814}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7533776760101318},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.677274763584137},{"id":"https://openalex.org/C204243189","wikidata":"https://www.wikidata.org/wiki/Q1363085","display_name":"Randomization","level":3,"score":0.6512136459350586},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6279752850532532},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.6128032803535461},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.5218700170516968},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4662441611289978},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.4480224847793579},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3452184498310089},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3229057788848877},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30609947443008423},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.12621116638183594},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08410272002220154},{"id":"https://openalex.org/C168563851","wikidata":"https://www.wikidata.org/wiki/Q1436668","display_name":"Randomized controlled trial","level":2,"score":0.05564531683921814},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C141071460","wikidata":"https://www.wikidata.org/wiki/Q40821","display_name":"Surgery","level":1,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2857705.2857726","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2857705.2857726","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2857726&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2857705.2857726","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2857705.2857726","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2857726&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5346255892","display_name":null,"funder_award_id":"1453020","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2301588800.pdf","grobid_xml":"https://content.openalex.org/works/W2301588800.grobid-xml"},"referenced_works_count":46,"referenced_works":["https://openalex.org/W70478248","https://openalex.org/W170643029","https://openalex.org/W1544471297","https://openalex.org/W1575709006","https://openalex.org/W1605557845","https://openalex.org/W1631846088","https://openalex.org/W1691322864","https://openalex.org/W1823377586","https://openalex.org/W1941166084","https://openalex.org/W1963947298","https://openalex.org/W1966699401","https://openalex.org/W1968002620","https://openalex.org/W1969501726","https://openalex.org/W1984248430","https://openalex.org/W1990465482","https://openalex.org/W1996931407","https://openalex.org/W2003619630","https://openalex.org/W2009801020","https://openalex.org/W2012559808","https://openalex.org/W2022292029","https://openalex.org/W2027963645","https://openalex.org/W2033593513","https://openalex.org/W2059969702","https://openalex.org/W2062340141","https://openalex.org/W2081105932","https://openalex.org/W2081768685","https://openalex.org/W2090181646","https://openalex.org/W2098010707","https://openalex.org/W2099382052","https://openalex.org/W2101699859","https://openalex.org/W2109219878","https://openalex.org/W2111927651","https://openalex.org/W2119971343","https://openalex.org/W2121468041","https://openalex.org/W2132806808","https://openalex.org/W2138517425","https://openalex.org/W2154555738","https://openalex.org/W2156375130","https://openalex.org/W2159216827","https://openalex.org/W2160510992","https://openalex.org/W2162800072","https://openalex.org/W2168843528","https://openalex.org/W2293825325","https://openalex.org/W2549548403","https://openalex.org/W4231040899","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2353179089","https://openalex.org/W2923538289","https://openalex.org/W2182697532","https://openalex.org/W1517387344","https://openalex.org/W1544062218","https://openalex.org/W1964111631","https://openalex.org/W185550498","https://openalex.org/W2348203156","https://openalex.org/W2226868092","https://openalex.org/W2164928043"],"abstract_inverted_index":{"Code":[0],"randomization":[1,28,42,51],"is":[2,29,39,52],"an":[3],"effective":[4],"defense":[5],"against":[6],"code":[7,13,27],"reuse":[8],"attacks.":[9],"It":[10],"scrambles":[11],"program":[12],"to":[14,25,36,61],"prevent":[15],"attackers":[16],"from":[17],"locating":[18],"useful":[19],"functions":[20],"or":[21],"gadgets.":[22],"The":[23],"key":[24],"secure":[26],"achieving":[30],"high":[31],"entropy.":[32],"A":[33],"practical":[34],"approach":[35],"boost":[37],"entropy":[38],"on-demand":[40],"live":[41,50],"that":[43,55],"works":[44],"on":[45],"running":[46],"processes.":[47],"However,":[48],"enabling":[49],"challenging":[53],"in":[54,64],"it":[56],"often":[57],"requires":[58],"manual":[59],"efforts":[60],"solve":[62],"ambiguity":[63],"identifying":[65],"function":[66],"pointers.":[67]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
