{"id":"https://openalex.org/W2404678703","doi":"https://doi.org/10.1145/2897845.2897891","title":"No-Execute-After-Read","display_name":"No-Execute-After-Read","publication_year":2016,"publication_date":"2016-05-27","ids":{"openalex":"https://openalex.org/W2404678703","doi":"https://doi.org/10.1145/2897845.2897891","mag":"2404678703"},"language":"en","primary_location":{"id":"doi:10.1145/2897845.2897891","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2897845.2897891","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2897891&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2897891&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082580481","display_name":"Jan Werner","orcid":null},"institutions":[{"id":"https://openalex.org/I69048370","display_name":"Renaissance Computing Institute","ror":"https://ror.org/01s91ey96","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I170897317","https://openalex.org/I69048370"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jan Werner","raw_affiliation_strings":["RENCI, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"RENCI, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I69048370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028784705","display_name":"George Baltas","orcid":"https://orcid.org/0000-0003-4653-8351"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Baltas","raw_affiliation_strings":["University of North Carolina, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017040012","display_name":"Rob Dallara","orcid":null},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rob Dallara","raw_affiliation_strings":["University of North Carolina, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041764761","display_name":"Nathan Otterness","orcid":"https://orcid.org/0000-0001-6739-4081"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nathan Otterness","raw_affiliation_strings":["University of North Carolina, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019527145","display_name":"Kevin Z. Snow","orcid":"https://orcid.org/0009-0007-3666-9880"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Z. Snow","raw_affiliation_strings":["University of North Carolina, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069862528","display_name":"Fabian Monrose","orcid":"https://orcid.org/0000-0002-9805-2217"},"institutions":[{"id":"https://openalex.org/I114027177","display_name":"University of North Carolina at Chapel Hill","ror":"https://ror.org/0130frc33","country_code":"US","type":"education","lineage":["https://openalex.org/I114027177"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Fabian Monrose","raw_affiliation_strings":["University of North Carolina, Chapel Hill, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina, Chapel Hill, NC, USA","institution_ids":["https://openalex.org/I114027177"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007101727","display_name":"Michalis Polychronakis","orcid":"https://orcid.org/0000-0002-3106-0343"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michalis Polychronakis","raw_affiliation_strings":["Stony Brook University, Stony Brook, NY, USA"],"affiliations":[{"raw_affiliation_string":"Stony Brook University, Stony Brook, NY, USA","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5082580481"],"corresponding_institution_ids":["https://openalex.org/I69048370"],"apc_list":null,"apc_paid":null,"fwci":15.4601,"has_fulltext":true,"cited_by_count":50,"citation_normalized_percentile":{"value":0.9894689,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"35","last_page":"46"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9839000105857849,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8764976263046265},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.7213168144226074},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5472769141197205},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5068982243537903},{"id":"https://openalex.org/keywords/unreachable-code","display_name":"Unreachable code","score":0.4968314468860626},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.49319905042648315},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.4686749577522278},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.46548452973365784},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.437843918800354},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.4332149028778076},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.4218725562095642},{"id":"https://openalex.org/keywords/address-space","display_name":"Address space","score":0.41579532623291016},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.41290000081062317},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4115288257598877},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3243488669395447},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2254427671432495},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.10619720816612244}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8764976263046265},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.7213168144226074},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5472769141197205},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5068982243537903},{"id":"https://openalex.org/C50951305","wikidata":"https://www.wikidata.org/wiki/Q2482534","display_name":"Unreachable code","level":5,"score":0.4968314468860626},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.49319905042648315},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.4686749577522278},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.46548452973365784},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.437843918800354},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.4332149028778076},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.4218725562095642},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.41579532623291016},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.41290000081062317},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4115288257598877},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3243488669395447},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2254427671432495},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.10619720816612244},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2897845.2897891","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2897845.2897891","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2897891&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2897845.2897891","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2897845.2897891","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2897891&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5699999928474426}],"awards":[{"id":"https://openalex.org/G4911320805","display_name":null,"funder_award_id":"N00014-15-1-2378","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G5021806130","display_name":null,"funder_award_id":"1127361, 1421703","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6599608564","display_name":"TWC: TTP Option: Small: Collaborative: Scalable Techniques for Better Situational Awareness: Algorithmic Frameworks and Large-Scale Empirical Analyses","funder_award_id":"1421703","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7447076839","display_name":"SDCI Sec: New Software Platforms for Supporting Network-wide Detection of Code Injection Attacks","funder_award_id":"1127361","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7931865478","display_name":null,"funder_award_id":"4-15-1-","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"},{"id":"https://openalex.org/F4320320970","display_name":"Deakin University","ror":"https://ror.org/02czsnj07"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2404678703.pdf","grobid_xml":"https://content.openalex.org/works/W2404678703.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W22858107","https://openalex.org/W99657086","https://openalex.org/W1412775481","https://openalex.org/W1429241971","https://openalex.org/W1538332098","https://openalex.org/W1605557845","https://openalex.org/W1691322864","https://openalex.org/W1963947298","https://openalex.org/W1969501726","https://openalex.org/W1996931407","https://openalex.org/W2003619630","https://openalex.org/W2009801020","https://openalex.org/W2012559808","https://openalex.org/W2033593513","https://openalex.org/W2036853599","https://openalex.org/W2066852506","https://openalex.org/W2070948236","https://openalex.org/W2072102701","https://openalex.org/W2098010707","https://openalex.org/W2111817346","https://openalex.org/W2111927651","https://openalex.org/W2117798902","https://openalex.org/W2132806808","https://openalex.org/W2135143063","https://openalex.org/W2159059513","https://openalex.org/W2162800072","https://openalex.org/W2168843528","https://openalex.org/W2293825325","https://openalex.org/W2510394756","https://openalex.org/W4226217300","https://openalex.org/W6600933062","https://openalex.org/W6604038689","https://openalex.org/W6628233427"],"related_works":["https://openalex.org/W2161969548","https://openalex.org/W2036000779","https://openalex.org/W116913286","https://openalex.org/W4244016640","https://openalex.org/W2112669344","https://openalex.org/W3008325674","https://openalex.org/W1141223778","https://openalex.org/W1539844444","https://openalex.org/W4382795255","https://openalex.org/W2155772078"],"abstract_inverted_index":{"Memory":[0],"disclosure":[1],"vulnerabilities":[2],"enable":[3],"an":[4],"adversary":[5,38],"to":[6,39,70,114],"successfully":[7],"mount":[8],"arbitrary":[9],"code":[10,18,51,73,113,121,129,139],"execution":[11],"attacks":[12,105],"against":[13,103],"applications":[14,24],"via":[15],"so-called":[16],"just-in-time":[17,72,104,128],"reuse":[19,52,74],"attacks,":[20],"even":[21],"when":[22],"those":[23],"are":[25],"fortified":[26],"with":[27,137],"fine-grained":[28],"address":[29],"space":[30],"layout":[31],"randomization.":[32],"This":[33],"attack":[34],"paradigm":[35],"requires":[36],"the":[37,42,63,79,94,132,154,170,193],"first":[40],"read":[41],"contents":[43],"of":[44,83,96,158],"randomized":[45],"application":[46],"code,":[47],"then":[48],"construct":[49],"a":[50,84,176],"payload":[53],"using":[54],"that":[55,62,92,178,197],"knowledge.":[56],"In":[57,188],"this":[58],"paper,":[59],"we":[60,77,161],"show":[61],"recently":[64],"proposed":[65],"Execute-no-Read":[66],"(XnR)":[67],"technique":[68],"fails":[69],"prevent":[71],"attacks.":[75],"Next,":[76],"introduce":[78],"design":[80],"and":[81,98,140,156,167,184],"implementation":[82],"novel":[85],"memory":[86],"permission":[87],"primitive,":[88],"dubbed":[89],"No-Execute-After-Read":[90],"(near),":[91],"foregoes":[93],"problems":[95],"XnR":[97],"provides":[99],"strong":[100],"security":[101],"guarantees":[102],"in":[106],"commodity":[107,135],"binaries.":[108],"Specifically,":[109],"near":[110],"allows":[111],"all":[112],"be":[115],"disclosed,":[116],"but":[117],"prevents":[118],"any":[119],"disclosed":[120],"from":[122],"subsequently":[123],"being":[124],"executed,":[125],"thus":[126],"thwarting":[127],"reuse.":[130],"At":[131],"same":[133],"time,":[134],"binaries":[136],"mixed":[138],"data":[141,148],"regions":[142],"still":[143,150],"operate":[144],"correctly,":[145],"as":[146,173,175],"legitimate":[147],"is":[149],"readable.":[151],"To":[152],"demonstrate":[153],"practicality":[155],"portability":[157],"our":[159,190,198],"approach":[160],"implemented":[162],"prototypes":[163],"for":[164,207],"both":[165],"Linux":[166],"Android":[168],"on":[169,192],"ARMv8":[171],"architecture,":[172],"well":[174],"prototype":[177,199],"protects":[179],"unmodified":[180],"Microsoft":[181],"Windows":[182],"executables":[183],"dynamically":[185],"linked":[186],"libraries.":[187],"addition,":[189],"evaluation":[191],"SPEC2006":[194],"benchmark":[195],"demonstrates":[196],"has":[200],"negligible":[201],"runtime":[202],"overhead,":[203],"making":[204],"it":[205],"suitable":[206],"practical":[208],"deployment.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":4}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
