{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:16:06Z","timestamp":1777338966519,"version":"3.51.4"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/sp.2014.22","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T09:57:47Z","timestamp":1416995867000},"page":"227-242","source":"Crossref","is-referenced-by-count":215,"title":["Hacking Blind"],"prefix":"10.1109","author":[{"given":"Andrea","family":"Bittau","sequence":"first","affiliation":[]},{"given":"Adam","family":"Belay","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Mashtizadeh","sequence":"additional","affiliation":[]},{"given":"David","family":"Mazieres","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"40","article-title":"Enhanced operating system security through efficient and fine-grained address space randomization","author":"giuffrida","year":"2012","journal-title":"Proceedings of the 21st USENIX Conference on Security Symposium"},{"key":"17","year":"0","journal-title":"Peach Fuzzer"},{"key":"35","author":"labes","year":"0","journal-title":"Mwr Labs pwn2own 2013 Write-up - Webkit Exploit"},{"key":"18","year":"0"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.16"},{"key":"33","author":"zabrocki","year":"0","journal-title":"Scraps of Notes on Remote Stack Overflow Exploitation"},{"key":"16","year":"0","journal-title":"Ubuntu Security Features"},{"key":"34","year":"0","journal-title":"Nginx 1 3 9\/1 4 0 x86 Brute Force Remote Exploit"},{"key":"13","article-title":"Bypassing stackguard and stackshield","year":"2000","journal-title":"Phrack Magazine"},{"key":"14","year":"0","journal-title":"About A Generic Way to Exploit Linux Targets"},{"key":"11","first-page":"5","article-title":"Stackguard: Automatic adaptive detection and prevention of buffer-overflow attacks","volume":"7","author":"cowan","year":"1998","journal-title":"Proceedings of the 7th Conference on USENIX Security Symposium"},{"key":"12","author":"etoh","year":"2003","journal-title":"GCC Extension for Protecting Applications from Stacksmashing Attacks (ProPolice)"},{"key":"21","year":"0","journal-title":"Deter Exploit Bruteforcing"},{"key":"20","author":"efrat","year":"0","journal-title":"Segvguard"},{"key":"22","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1145\/1102120.1102165","article-title":"Controlflow integrity","author":"abadi","year":"2005","journal-title":"Proceedings of the 12th ACM conference on Computer and communications security"},{"key":"23","first-page":"447","article-title":"Transparent ROP exploit mitigation using indirect branch tracing","author":"pappas","year":"2013","journal-title":"Proceedings of the 22nd USENIX Conference on Security"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382216"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.39"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.41"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920269"},{"key":"28","year":"0","journal-title":"Addresssanitizer - Clang 3 4 Documentation"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133999"},{"key":"3","year":"0","journal-title":"Mitre Cve-2013-2028"},{"key":"2","year":"0","journal-title":"Mitre Cve-2013-2028"},{"key":"10","year":"0","journal-title":"Advances in Format String Exploitation"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"7","year":"0","journal-title":"PaX address space layout randomization (ASLR)"},{"key":"30","year":"0","journal-title":"Introduction to Intel Memory Protection Extensions"},{"key":"6","author":"designer","year":"0","journal-title":"Getting Around Non-executable Stack (And Fix)"},{"key":"5","author":"kaempf","year":"0","journal-title":"Vudo Malloc Tricks by Maxx"},{"key":"32","article-title":"Where's the feeb?: The effectiveness of instruction set randomization","author":"sovarel","year":"2005","journal-title":"Usenix Security"},{"key":"4","article-title":"Smashing the stack for fun and profit","volume":"7","author":"one","year":"1996","journal-title":"Phrack"},{"key":"31","article-title":"Half-blind attacks: Mask ROM bootloaders are dangerous","author":"goodspeed","year":"2009","journal-title":"WOOT"},{"key":"9","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1145\/1030083.1030124","article-title":"On the effectiveness of address-space randomization","author":"shacham","year":"2004","journal-title":"Proceedings of the 11th ACM Conference on Computer and Communications Security"},{"key":"8","first-page":"8","article-title":"Address obfuscation: An efficient approach to combat a board range of memory error exploits","volume":"12","author":"bhatkar","year":"2003","journal-title":"Proceedings of the 12th conference on USENIX Security Symposium"}],"event":{"name":"2014 IEEE Symposium on Security and Privacy (SP)","location":"San Jose, CA","start":{"date-parts":[[2014,5,18]]},"end":{"date-parts":[[2014,5,21]]}},"container-title":["2014 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/6954656\/6956545\/06956567.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6954656\/6956545\/06956567.pdf?arnumber=6956567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,23]],"date-time":"2022-04-23T05:53:08Z","timestamp":1650693188000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6956567\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/sp.2014.22","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}