| 1 | 
																						 
											  FRANZ M. E unibus pluram: massive-scale software diversity as a defense mechanism[C]//Proceedings of 2010 New Security Paradigms Workshop. New York, USA: ACM Press, 2010: 7-16. 
											 											 | 
										
																													
																						| 2 | 
																						 
											  LARSEN P, HOMESCU A, BRUNTHALER S, et al. SoK: automated software diversity[C]//Proceedings of 2014 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2014: 276-291. 
											 											 | 
										
																													
																						| 3 | 
																						 
											  COHEN F B. Operating system protection through program evolution. Computers & Security, 1993, 12(6): 565- 584. 
											 											 | 
										
																													
																						| 4 | 
																						 
											  蒋楚, 王永杰. 一种基于表达式树的gadget语义分析技术. 计算机工程, 2021, 47(1): 109- 116.  
											 												 
																																					URL    
																																			 											 | 
										
																													
																						 | 
																						 
											  JIANG C, WANG Y J. A technique of gadget semantic analysis based on expression tree. Computer Engineering, 2021, 47(1): 109- 116.  
											 												 
																																					URL    
																																			 											 | 
										
																													
																						| 5 | 
																						 
											  LUO L, SHAO X H, LING Z, et al. fASLR: function-based ASLR via TrustZone-M and MPU for resource-constrained IoT systems. IEEE Internet of Things Journal, 2022, 9(18): 17120- 17135.  
											 												 
																									doi: 10.1109/JIOT.2022.3190374    
																																															 											 | 
										
																													
																						| 6 | 
																						 
											  LU H, JIN C J, HELU X H, et al. Research on intelligent detection of command level stack pollution for binary program analysis. Mobile Networks and Applications, 2021, 26(4): 1723- 1732.  
											 												 
																									doi: 10.1007/s11036-019-01507-0    
																																															 											 | 
										
																													
																						| 7 | 
																						 
											  WARTELL R, MOHAN V, HAMLEN K W, et al. Binary stirring: self-randomizing instruction addresses of legacy x86 binary code[C]//Proceedings of 2012 ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2012: 157-168. 
											 											 | 
										
																													
																						| 8 | 
																						 
											 
											 											 | 
										
																													
																						| 9 | 
																						 
											  COFFMAN J, KELLY D M, WELLONS C C, et al. ROP gadget prevalence and survival under compiler-based binary diversification schemes[C]//Proceedings of 2016 ACM Workshop on Software Protection. New York, USA: ACM Press, 2016: 15-26. 
											 											 | 
										
																													
																						| 10 | 
																						 
											  ROGLIA G F, MARTIGNONI L, PALEARI R, et al. Surgically returning to randomized lib(c)[C]//Proceedings of 2009 Annual Computer Security Applications Conference. Washington D. C., USA: IEEE Press, 2009: 60-69. 
											 											 | 
										
																													
																						| 11 | 
																						 
											  MURPHY M, LARSEN P, BRUNTHALER S, et al. Software profiling options and their effects on security based diversification[C]//Proceedings of the 1st ACM Workshop on Moving Target Defense. New York, USA: ACM Press, 2014: 87-96. 
											 											 | 
										
																													
																						| 12 | 
																						 
											  HOMESCU A, JACKSON T, CRANE S, et al. Large-scale automated software diversity—program evolution redux. IEEE Transactions on Dependable and Secure Computing, 2017, 14(2): 158- 171.  
											 												 
																									doi: 10.1109/TDSC.2015.2433252    
																																															 											 | 
										
																													
																						| 13 | 
																						 
											  HOMESCU A, NEISIUS S, LARSEN P, et al. Profile-guided automated software diversity[C]//Proceedings of 2013 IEEE/ACM International Symposium on Code Generation and Optimization. Washington D. C., USA: IEEE Press, 2013: 1-11. 
											 											 | 
										
																													
																						| 14 | 
																						 
											  XU H, ZHOU Y F, KANG Y, et al. Manufacturing resilient bi-opaque predicates against symbolic execution[C]//Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Washington D. C., USA: IEEE Press, 2018: 666-677. 
											 											 | 
										
																													
																						| 15 | 
																						 
											  PRIYADARSHAN S, NGUYEN H, SEKAR R. Practical fine-grained binary code randomization[C]//Proceedings of the 36th Annual Computer Security Applications Conference. New York, USA: ACM Press, 2020: 401-414. 
											 											 | 
										
																													
																						| 16 | 
																						 
											  ZHAO Y, TANG Z, YE G, et al. Semantics-aware obfuscation scheme prediction for binary. Computers & Security, 2020, 99, 102072. 
											 											 | 
										
																													
																						| 17 | 
																						 
											  CHEN Y, WANG Z, WHALLEY D, et al. Remix: on-demand live randomization[C]//Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. New York, USA: ACM Press, 2016: 50-61. 
											 											 | 
										
																													
																						| 18 | 
																						 
											  PAPPAS V, POLYCHRONAKIS M, KEROMYTIS A D. Smashing the gadgets: hindering return-oriented programming using in-place code randomization[C]//Proceedings of 2012 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2012: 601-615. 
											 											 | 
										
																													
																						| 19 | 
																						 
											  张贵民, 李清宝, 曾光裕, 等. 运行时代码随机化防御代码复用攻击. 软件学报, 2019, 30(9): 2772- 2790. 
											 											 | 
										
																													
																						 | 
																						 
											  ZHANG G M, LI Q B, ZENG G Y, et al. Defensing code reuse attacks using live code randomization. Journal of Software, 2019, 30(9): 2772- 2790. 
											 											 | 
										
																													
																						| 20 | 
																						 
											  HISER J, NGUYEN-TUONG A, CO M, et al. ILR: where'd my gadgets go?[C]//Proceedings of 2012 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2012: 571-585. 
											 											 | 
										
																													
																						| 21 | 
																						 
											  WILLIAMS-KING D, KOBAYASHI H, WILLIAMS-KING K, et al. Egalito: layout-agnostic binary recompilation[C]//Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems. New York, USA: ACM Press, 2020: 133-147. 
											 											 | 
										
																													
																						| 22 | 
																						 
											  AZAB A, LAYTON R, ALAZAB M, et al. Mining malware to detect variants[C]//Proceedings of 2014 Cybercrime and Trustworthy Computing Conference. Washington D. C., USA: IEEE Press, 2014: 44-53. 
											 											 | 
										
																													
																						| 23 | 
																						 
											  肖睿卿, 费金龙, 祝跃飞, 等. 基于社团检测算法的固件二进制比对技术. 计算机研究与发展, 2022, 59(1): 209- 235. 
											 											 | 
										
																													
																						 | 
																						 
											  XIAO R Q, FEI J L, ZHU Y F, et al. Firmware binary comparison technology based on community detection algorithm. Journal of Computer Research and Development, 2022, 59(1): 209- 235. 
											 											 | 
										
																													
																						| 24 | 
																						 
											  GIONTA J, ENCK W, NING P. HideM: protecting the contents of userspace memory in the face of disclosure vulnerabilities[C]//Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. New York, USA: ACM Press, 2015: 325-336. 
											 											 | 
										
																													
																						| 25 | 
																						 
											 
											 											 |