{"id":"https://openalex.org/W3184615335","doi":"https://doi.org/10.1145/3474558","title":"Securely Sharing Randomized Code That Flies","display_name":"Securely Sharing Randomized Code That Flies","publication_year":2021,"publication_date":"2021-07-16","ids":{"openalex":"https://openalex.org/W3184615335","doi":"https://doi.org/10.1145/3474558","mag":"3184615335"},"language":"en","primary_location":{"id":"doi:10.1145/3474558","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3474558","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3474558","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3474558","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071066271","display_name":"Christopher Jelesnianski","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Christopher Jelesnianski","raw_affiliation_strings":["Virginia Tech"],"raw_orcid":"https://orcid.org/0000-0002-8067-2151","affiliations":[{"raw_affiliation_string":"Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082004597","display_name":"Jinwoo Yom","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jinwoo Yom","raw_affiliation_strings":["Virginia Tech"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001805471","display_name":"Changwoo Min","orcid":"https://orcid.org/0000-0001-6225-5357"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Changwoo Min","raw_affiliation_strings":["Virginia Tech"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081925472","display_name":"Yeongjin Jang","orcid":"https://orcid.org/0000-0003-4368-9736"},"institutions":[{"id":"https://openalex.org/I131249849","display_name":"Oregon State University","ror":"https://ror.org/00ysfqy60","country_code":"US","type":"education","lineage":["https://openalex.org/I131249849"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yeongjin Jang","raw_affiliation_strings":["Oregon State University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Oregon State University","institution_ids":["https://openalex.org/I131249849"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071066271"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09775913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"3","issue":"3","first_page":"1","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9902999997138977,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.813106894493103},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7262004017829895},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.7004283666610718},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5372841954231262},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.464832067489624},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4517847001552582},{"id":"https://openalex.org/keywords/safer","display_name":"SAFER","score":0.44313228130340576},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4096720814704895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.295623779296875},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16939690709114075},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16276785731315613},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.09623527526855469},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08001360297203064}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.813106894493103},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7262004017829895},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.7004283666610718},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5372841954231262},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.464832067489624},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4517847001552582},{"id":"https://openalex.org/C2776654903","wikidata":"https://www.wikidata.org/wiki/Q2601463","display_name":"SAFER","level":2,"score":0.44313228130340576},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4096720814704895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.295623779296875},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16939690709114075},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16276785731315613},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.09623527526855469},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08001360297203064},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3474558","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3474558","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3474558","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},{"id":"pmh:oai:vtechworks.lib.vt.edu:10919/113917","is_oa":true,"landing_page_url":"http://hdl.handle.net/10919/113917","pdf_url":"https://vtechworks.lib.vt.edu/bitstreams/2c425d35-87b2-4795-ab84-6eb6dc8640d0/download","source":{"id":"https://openalex.org/S4306400248","display_name":"VTechWorks (Virginia Tech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I859038795","host_organization_name":"Virginia Tech","host_organization_lineage":["https://openalex.org/I859038795"],"host_organization_lineage_names":[],"type":"repository"},"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1145/3474558","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3474558","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3474558","source":{"id":"https://openalex.org/S4210235901","display_name":"Digital Threats Research and Practice","issn_l":"2576-5337","issn":["2576-5337","2692-1626"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Digital Threats: Research and Practice","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G6991968366","display_name":null,"funder_award_id":"N00014-18-1-2022","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3184615335.pdf","grobid_xml":"https://content.openalex.org/works/W3184615335.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1605557845","https://openalex.org/W1968002620","https://openalex.org/W1993682390","https://openalex.org/W2006790656","https://openalex.org/W2035991175","https://openalex.org/W2080313875","https://openalex.org/W2109219878","https://openalex.org/W2162800072","https://openalex.org/W2252814878","https://openalex.org/W2293825325","https://openalex.org/W2499909786","https://openalex.org/W2585924936","https://openalex.org/W2805909769","https://openalex.org/W2899759798","https://openalex.org/W2963311060","https://openalex.org/W2972949355","https://openalex.org/W3012221736","https://openalex.org/W3015291177","https://openalex.org/W3101740510","https://openalex.org/W4232172926","https://openalex.org/W4232485878","https://openalex.org/W4238567305","https://openalex.org/W4239277337","https://openalex.org/W6751987604"],"related_works":["https://openalex.org/W2953205341","https://openalex.org/W2092643327","https://openalex.org/W235065745","https://openalex.org/W2182697532","https://openalex.org/W1544062218","https://openalex.org/W185550498","https://openalex.org/W2348203156","https://openalex.org/W2226868092","https://openalex.org/W2164928043","https://openalex.org/W1991166235"],"abstract_inverted_index":{"Address":[0],"space":[1,25],"layout":[2,26],"randomization":[3,27,165],"was":[4,28],"a":[5,10,35,77,180],"great":[6],"role":[7],"model,":[8],"being":[9],"light-weight":[11],"defense":[12,38],"technique":[13,112],"that":[14,125],"could":[15],"prevent":[16],"early":[17],"return-oriented":[18],"programming":[19],"attacks.":[20],"Simple":[21],"yet":[22],"effective,":[23],"address":[24],"quickly":[29],"widely":[30],"adopted.":[31],"Conversely,":[32],"today":[33],"only":[34,76,210],"trickle":[36],"of":[37,79,94,97,114,117,184,191],"techniques":[39],"arebeing":[40],"integrated":[41],"or":[42,74,144],"adopted":[43],"mainstream.":[44],"As":[45],"code":[46,124,132,148,172],"reuse":[47],"attacks":[48],"have":[49,54,64,128],"evolved":[50],"in":[51,193],"complexity,":[52],"defenses":[53,127],"strived":[55],"to":[56,60,66,90,198,216,218],"keep":[57],"up.":[58],"However,":[59],"do":[61],"so,":[62],"many":[63],"had":[65],"take":[67],"unfavorable":[68],"tradeoffs":[69,85],"like":[70,154],"using":[71],"background":[72],"threads":[73],"protecting":[75],"subset":[78],"sensitive":[80],"code.":[81],"In":[82,100,167],"reality,":[83],"these":[84],"were":[86],"unavoidable":[87],"steps":[88],"necessary":[89],"improve":[91],"the":[92,95,98,171],"strength":[93],"state":[96],"art.":[99],"this":[101],"article,":[102],"we":[103],"present":[104],"Mardu":[105,176,209],",":[106],"an":[107],"on-demand":[108],"system-wide":[109],"runtime":[110],"re-randomization":[111],"capable":[113],"scalable":[115,140,202],"protection":[116],"application":[118,222],"as":[119,121],"well":[120],"shared":[122],"library":[123],"most":[126],"forgone.":[129],"We":[130],"achieve":[131],"sharing":[133,149],"with":[134,159],"diversification":[135],"by":[136,163],"implementing":[137],"reactive":[138],"and":[139,156,188,201,224],"rather":[141],"than":[142,214],"continuous":[143],"one-time":[145],"diversification.":[146],"Enabling":[147],"further":[150],"removes":[151],"redundant":[152],"computation":[153],"tracking":[155],"patching,":[157],"along":[158],"memory":[160],"overheads":[161],"required":[162],"prior":[164],"techniques.":[166],"its":[168,196],"baseline":[169],"state,":[170],"transformations":[173],"needed":[174],"for":[175],"security":[177],"hardening":[178],"incur":[179],"reasonable":[181],"performance":[182],"overhead":[183],"5.5%":[185],"on":[186,221],"SPEC":[187],"minimal":[189],"degradation":[190],"4.4%":[192],"NGINX,":[194],"demonstrating":[195],"applicability":[197],"both":[199],"compute-intensive":[200],"real-world":[203],"applications.":[204],"Even":[205],"when":[206],"under":[207],"attack,":[208],"adds":[211],"from":[212],"less":[213],"1%":[215],"up":[217],"15%":[219],"depending":[220],"size":[223],"complexity.":[225]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
