{"id":"https://openalex.org/W2035991175","doi":"https://doi.org/10.1145/2810103.2813691","title":"Timely Rerandomization for Mitigating Memory Disclosures","display_name":"Timely Rerandomization for Mitigating Memory Disclosures","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2035991175","doi":"https://doi.org/10.1145/2810103.2813691","mag":"2035991175"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813691","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034735303","display_name":"David Bigelow","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Bigelow","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087042566","display_name":"Thomas Hobson","orcid":"https://orcid.org/0000-0002-2456-5052"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thomas Hobson","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003721654","display_name":"Robert Rudd","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert Rudd","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053812687","display_name":"William Streilein","orcid":"https://orcid.org/0000-0003-2796-1744"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Streilein","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033661137","display_name":"Hamed Okhravi","orcid":"https://orcid.org/0000-0003-1450-3744"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamed Okhravi","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, MA, USA"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, MA, USA","institution_ids":["https://openalex.org/I4210122954"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5034735303"],"corresponding_institution_ids":["https://openalex.org/I4210122954"],"apc_list":null,"apc_paid":null,"fwci":25.455,"has_fulltext":false,"cited_by_count":148,"citation_normalized_percentile":{"value":0.99571901,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"268","last_page":"279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8664631843566895},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.6476800441741943},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6020289063453674},{"id":"https://openalex.org/keywords/x86","display_name":"x86","score":0.5513277053833008},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.5432577729225159},{"id":"https://openalex.org/keywords/spec#","display_name":"Spec#","score":0.4544352889060974},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.43287304043769836},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3576032519340515},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.2783206105232239},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2678038775920868},{"id":"https://openalex.org/keywords/extended-memory","display_name":"Extended memory","score":0.20284661650657654},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.18681371212005615},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.14403241872787476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8664631843566895},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.6476800441741943},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6020289063453674},{"id":"https://openalex.org/C170723468","wikidata":"https://www.wikidata.org/wiki/Q182933","display_name":"x86","level":3,"score":0.5513277053833008},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.5432577729225159},{"id":"https://openalex.org/C2778565505","wikidata":"https://www.wikidata.org/wiki/Q2207566","display_name":"Spec#","level":2,"score":0.4544352889060974},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.43287304043769836},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3576032519340515},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.2783206105232239},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2678038775920868},{"id":"https://openalex.org/C171675096","wikidata":"https://www.wikidata.org/wiki/Q1143380","display_name":"Extended memory","level":4,"score":0.20284661650657654},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.18681371212005615},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.14403241872787476},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813691","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G257323898","display_name":null,"funder_award_id":"Air Force Contract #FA8721-05-C-0002","funder_id":"https://openalex.org/F4320306078","funder_display_name":"U.S. Department of Defense"}],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W164984320","https://openalex.org/W191839766","https://openalex.org/W1538332098","https://openalex.org/W1591211019","https://openalex.org/W1605557845","https://openalex.org/W1691322864","https://openalex.org/W1816130922","https://openalex.org/W1816718056","https://openalex.org/W1823377586","https://openalex.org/W1825457006","https://openalex.org/W1826158585","https://openalex.org/W1878544538","https://openalex.org/W1963947298","https://openalex.org/W1982778414","https://openalex.org/W2003619630","https://openalex.org/W2022292029","https://openalex.org/W2027137911","https://openalex.org/W2033593513","https://openalex.org/W2037051353","https://openalex.org/W2059969702","https://openalex.org/W2098010707","https://openalex.org/W2101699859","https://openalex.org/W2109219878","https://openalex.org/W2111927651","https://openalex.org/W2114030344","https://openalex.org/W2117798902","https://openalex.org/W2122757982","https://openalex.org/W2124360577","https://openalex.org/W2132806808","https://openalex.org/W2138517425","https://openalex.org/W2146244799","https://openalex.org/W2149327697","https://openalex.org/W2154555738","https://openalex.org/W2155810272","https://openalex.org/W2155851497","https://openalex.org/W2162800072","https://openalex.org/W2165134790","https://openalex.org/W2168843528","https://openalex.org/W2171264329","https://openalex.org/W2293825325","https://openalex.org/W2978757628"],"related_works":["https://openalex.org/W2538455664","https://openalex.org/W4404099728","https://openalex.org/W2253672926","https://openalex.org/W3208181362","https://openalex.org/W1497145137","https://openalex.org/W2178043964","https://openalex.org/W3033191713","https://openalex.org/W2065540707","https://openalex.org/W2359338737","https://openalex.org/W2361336628"],"abstract_inverted_index":{"Address":[0],"Space":[1],"Layout":[2],"Randomization":[3],"(ASLR)":[4],"can":[5,91],"increase":[6],"the":[7,23,33,70,88,113,118,166],"cost":[8],"of":[9,17,25,35,42,73,135],"exploiting":[10],"memory":[11,26,36,50,71],"corruption":[12],"vulnerabilities.":[13,38],"One":[14],"major":[15],"weakness":[16],"ASLR":[18,43],"is":[19,29],"that":[20,59,175],"it":[21,78],"assumes":[22],"secrecy":[24],"addresses":[27],"and":[28,117,129,143,156],"thus":[30],"ineffective":[31,48],"in":[32],"face":[34],"disclosure":[37],"Even":[39],"fine-grained":[40],"variants":[41],"are":[44],"shown":[45],"to":[46,69,96,139],"be":[47,92],"against":[49],"disclosures.":[51],"In":[52],"this":[53,148],"paper":[54],"we":[55,151],"present":[56],"an":[57,80],"approach":[58,83],"synchronizes":[60],"randomization":[61],"with":[62,132,171],"potential":[63],"runtime":[64,145],"disclosure.":[65],"By":[66],"applying":[67],"rerandomization":[68],"layout":[72],"a":[74,103,133,179],"process":[75],"every":[76],"time":[77,89],"generates":[79],"output,":[81],"our":[82,176],"renders":[84],"disclosures":[85],"stale":[86],"by":[87,94,111],"they":[90],"used":[93],"attackers":[95],"hijack":[97],"control":[98],"flow.":[99],"We":[100],"have":[101],"developed":[102],"fully":[104],"functioning":[105],"prototype":[106,123],"for":[107],"x86_64":[108],"C":[109,126],"programs":[110,131],"extending":[112],"Linux":[114],"kernel,":[115],"GCC,":[116],"libc":[119],"dynamic":[120],"linker.":[121],"The":[122],"operates":[124],"on":[125,165,185],"source":[127],"code":[128,154,158],"recompiles":[130],"set":[134],"augmented":[136,149],"information":[137,150],"required":[138],"track":[140],"pointer":[141,159],"locations":[142],"support":[144],"rerandomization.":[146],"Using":[147],"dynamically":[152],"relocate":[153],"segments":[155],"update":[157],"values":[160],"during":[161],"runtime.":[162],"Our":[163],"evaluation":[164],"SPEC":[167],"CPU2006":[168],"benchmark,":[169],"along":[170],"other":[172],"applications,":[173],"show":[174],"technique":[177],"incurs":[178],"very":[180],"low":[181],"performance":[182],"overhead":[183],"(2.1%":[184],"average).":[186]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":24},{"year":2019,"cited_by_count":27},{"year":2018,"cited_by_count":17},{"year":2017,"cited_by_count":28},{"year":2016,"cited_by_count":12},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
