{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:19:21Z","timestamp":1730276361022,"version":"3.28.0"},"reference-count":62,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/issre.2014.20","type":"proceedings-article","created":{"date-parts":[[2014,12,30]],"date-time":"2014-12-30T18:44:54Z","timestamp":1419965094000},"page":"88-99","source":"Crossref","is-referenced-by-count":15,"title":["WPBOUND: Enforcing Spatial Memory Safety Efficiently at Runtime with Weakest Preconditions"],"prefix":"10.1109","author":[{"given":"Ding","family":"Ye","sequence":"first","affiliation":[]},{"given":"Yu","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yulei","family":"Sui","sequence":"additional","affiliation":[]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"ref33","first-page":"189","article-title":"and Steve Zdancewic. Watch-dog: Hardware for safe and secure manual memory management and full memory safety. In","author":"santosh","year":"2012","journal-title":"ISCA"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/349214.349222"},{"key":"ref31","first-page":"21","article-title":"analyzer. In","author":"mine","year":"2005","journal-title":"ESOP"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2491894.2466483"},{"journal-title":"National Vulnerability Database","year":"0","key":"ref37"},{"key":"ref36","first-page":"31","article-title":"CETS: Compiler enforced temporal safety for C","author":"santosh","year":"2010","journal-title":"ISMM"},{"key":"ref35","first-page":"245","article-title":"SoftBound: Highly compatible and complete spatial memory safety for C","author":"santosh","year":"2009","journal-title":"PLDI"},{"key":"ref34","first-page":"175","article-title":"and Steve Zdancewic. Watch-dogLite: Hardware-accelerated compiler-based pointer checking. In","author":"santosh","year":"2014","journal-title":"CGO"},{"key":"ref60","first-page":"307","article-title":"Protecting C programs from attacks via invalid pointer dereferences. In","author":"yong","year":"2003","journal-title":"FSE"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772985"},{"first-page":"1988","year":"0","author":"younan","key":"ref61"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882338"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453137"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025160"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"ref1","first-page":"51","article-title":"Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors","author":"akritidis","year":"2009","journal-title":"USENIX Security Symposium"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134319"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764696"},{"key":"ref24","first-page":"275","article-title":"Cyclone: A safe dialect of C","author":"trevor","year":"2002","journal-title":"USENIX Annual Technical Conference General Track"},{"key":"ref23","first-page":"125","article-title":"Purify: Fast detection of memory leaks and access errors","author":"hastings","year":"1991","journal-title":"Winter 1992 USENlX Conference"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462191"},{"key":"ref25","first-page":"13","article-title":"Backwards-compatible bounds checking for arrays and pointers in C programs. In","author":"richard","year":"1997","journal-title":"AADEBUG"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2302311"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25318-8_14"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10936-7_20"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544154"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029913"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/940112.940115"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.01.002"},{"key":"ref54","first-page":"125","article-title":"Array bounds check elimination for the Java HotSpot client compiler. In","author":"thomas","year":"2007","journal-title":"PPPJ"},{"key":"ref53","first-page":"1","article-title":"A first step towards automated detection of buffer overrun vulnerabilities. In","author":"david","year":"2000","journal-title":"NDSS"},{"journal-title":"Robert van Engelen Efficient symbolic analysis for optimizing compilers In CC","first-page":"118","year":"2001","key":"ref52"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_32"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03237-0_11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781149"},{"key":"ref13","first-page":"57","article-title":"Mudflap: Pointer use checking for C\/C++. In","author":"eigler","year":"2003","journal-title":"Proc GCC Developers Summit"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1411732.1411745"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1028"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948155"},{"article-title":"Pointer checker: Easily catch out-of-bounds memory accesses. Intel Corporation","year":"2012","author":"ganesh","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/DATE.2009.5090747"},{"key":"ref19","first-page":"151","article-title":"Automated whitebox fuzz testing","volume":"8","author":"patrice","year":"2008","journal-title":"NDSS"},{"key":"ref4","first-page":"242","article-title":"Chains of recurrences - a method to expedite the evaluation of closed-form functions","author":"olaf","year":"1994","journal-title":"Issac"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368118"},{"key":"ref6","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"cadar","year":"2008","journal-title":"OSDI"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349342"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294295"},{"first-page":"319433","article-title":"Intel Corporation. Intel architecture instruction set extensions programming reference","year":"2013","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336784"},{"key":"ref9","first-page":"103","article-title":"and Steve Zdancewic. Hardbound: Architectural support for spatial safety of the C programming language. In","author":"joe","year":"2008","journal-title":"ASPLOS"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351720"},{"key":"ref45","first-page":"309","article-title":"AddressSanitizer: A fast address sanity checker. In","volume":"2012","author":"serebryany","year":"2012","journal-title":"USENlX ATC"},{"key":"ref48","first-page":"1","article-title":"Query-directed adaptive heap cloning for optimizing compilers. In","author":"sui","year":"2013","journal-title":"CGO"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259050"},{"key":"ref42","first-page":"325","article-title":"A comprehensive approach to array bounds check elimination for Java","author":"feng","year":"2002"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199701)27:1<87::AID-SPE78>3.0.CO;2-P"},{"key":"ref44","first-page":"159","article-title":"A practical dynamic buffer overflow detector. In","author":"ruwase","year":"2004","journal-title":"NDSS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349325"}],"event":{"name":"2014 IEEE 25th International Symposium on Software Reliability Engineering (ISSRE)","start":{"date-parts":[[2014,11,3]]},"location":"Naples, Italy","end":{"date-parts":[[2014,11,6]]}},"container-title":["2014 IEEE 25th International Symposium on Software Reliability Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6982003\/6982338\/06982617.pdf?arnumber=6982617","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T02:13:17Z","timestamp":1490321597000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6982617\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/issre.2014.20","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}