{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:45Z","timestamp":1740123525157,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T00:00:00Z","timestamp":1658275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11227-022-04694-y","type":"journal-article","created":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T17:02:58Z","timestamp":1658336578000},"page":"1032-1064","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring effective uses of the tagged memory for reducing bounds checking overheads"],"prefix":"10.1007","volume":"79","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1848-750X","authenticated-orcid":false,"given":"Jiwon","family":"Seo","sequence":"first","affiliation":[]},{"given":"Inyoung","family":"Bang","sequence":"additional","affiliation":[]},{"given":"Yungi","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Jangseop","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Dongil","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Donghyun","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Yeongpil","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Yunheung","family":"Paek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,20]]},"reference":[{"key":"4694_CR1","unstructured":"Akritidis P, Costa M, Castro M, Hand S (2009) Baggy bounds checking: an efficient and backwards-compatible defense against out-of-bounds errors. In: USENIX Security Symposium, pp 51\u201366"},{"key":"4694_CR2","doi-asserted-by":"crossref","unstructured":"Nagarakatte S, Zhao J, Martin MM, Zdancewic S (2009) Softbound: highly compatible and complete spatial memory safety for c. In: Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp 245\u2013258","DOI":"10.1145\/1543135.1542504"},{"key":"4694_CR3","doi-asserted-by":"crossref","unstructured":"Kwon A, Dhawan U, Smith JM, Knight Jr TF, DeHon A (2013) Low-fat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp 721\u2013732","DOI":"10.1145\/2508859.2516713"},{"key":"4694_CR4","first-page":"159","volume":"2004","author":"O Ruwase","year":"2004","unstructured":"Ruwase O, Lam MS (2004) A practical dynamic buffer overflow detector. NDSS 2004:159\u2013169","journal-title":"NDSS"},{"issue":"1","key":"4694_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1002\/spe.2105","volume":"43","author":"MS Simpson","year":"2013","unstructured":"Simpson MS, Barua RK (2013) Memsafe: ensuring the spatial and temporal memory safety of c at runtime. Softw Pract Exp 43(1):93\u2013128","journal-title":"Softw Pract Exp"},{"key":"4694_CR6","doi-asserted-by":"crossref","unstructured":"Duck GJ, Yap RH (2016) Heap bounds protection with low fat pointers. In: Proceedings of the 25th International Conference on Compiler Construction, pp 132\u2013142","DOI":"10.1145\/2892208.2892212"},{"key":"4694_CR7","first-page":"1","volume":"17","author":"GJ Duck","year":"2017","unstructured":"Duck GJ, Yap RH, Cavallaro L (2017) Stack bounds protection with low fat pointers. NDSS 17:1\u201315","journal-title":"NDSS"},{"key":"4694_CR8","doi-asserted-by":"crossref","unstructured":"Kroes T, Koning K, van der Kouwe E, Bos H, Giuffrida C (2018) Delta pointers: Buffer overflow checks without the checks. In: Proceedings of the Thirteenth EuroSys Conference, pp 1\u201314","DOI":"10.1145\/3190508.3190553"},{"key":"4694_CR9","unstructured":"SPARC International, Inc. (2020) (accessed April 21, 2020). http:\/\/sparc.org"},{"key":"4694_CR10","unstructured":"A. Holdings, \u201cArm architecture reference manual, armv8, for armv8-a\narchitecture profile,\u201d 2021"},{"key":"4694_CR11","unstructured":"Serebryany K, Stepanov E, Shlyapnikov A, Tsyrklevich V, Vyukov D (2018) Memory tagging and how it improves c\/c++ memory safety. arXiv preprint arXiv:1802.09517"},{"key":"4694_CR12","doi-asserted-by":"crossref","unstructured":"Kc GS, Keromytis AD, Prevelakis V (2003) Countering code-injection attacks with instruction-set randomization. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 272\u2013280","DOI":"10.1145\/948109.948146"},{"key":"4694_CR13","doi-asserted-by":"crossref","unstructured":"Francillon A, Castelluccia C (2008) Code injection attacks on harvard-architecture devices. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp 15\u201326","DOI":"10.1145\/1455770.1455775"},{"key":"4694_CR14","unstructured":"Carlini N, Wagner D (2014) Rop is still dangerous: breaking modern defenses. In: 23rd USENIX Security Symposium (USENIX Security 14), pp 385\u2013399"},{"key":"4694_CR15","doi-asserted-by":"crossref","unstructured":"Lee B, Song C, Jang Y, Wang T, Kim T, Lu L, Lee W (2015) Preventing use-after-free with dangling pointers nullification. In: NDSS","DOI":"10.14722\/ndss.2015.23238"},{"key":"4694_CR16","doi-asserted-by":"crossref","unstructured":"Shin J, Kwon D, Seo J, Cho Y, Paek Y (2019) Crcount: pointer invalidation with reference counting to mitigate use-after-free in legacy c\/c++. In: NDSS","DOI":"10.14722\/ndss.2019.23541"},{"key":"4694_CR17","doi-asserted-by":"crossref","unstructured":"Van Der Kouwe E, Nigade V, Giuffrida C (2017) Dangsan: scalable use-after-free detection. In: Proceedings of the Twelfth European Conference on Computer Systems, pp 405\u2013419","DOI":"10.1145\/3064176.3064211"},{"key":"4694_CR18","doi-asserted-by":"crossref","unstructured":"Zhang T, Lee D, Jung C (2019) Bogo: buy spatial memory safety, get temporal memory safety (almost) free. In: Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, pp 631\u2013644","DOI":"10.1145\/3297858.3304017"},{"key":"4694_CR19","doi-asserted-by":"crossref","unstructured":"Nagarakatte S, Zhao J, Martin MM, Zdancewic S (2010) Cets: compiler enforced temporal safety for c. In: Proceedings of the 2010 International Symposium on Memory Management, pp 31\u201340","DOI":"10.1145\/1837855.1806657"},{"key":"4694_CR20","unstructured":"Yarom Y, Falkner K (2014) Flush+ reload: a high resolution, low noise, l3 cache side-channel attack. In: 23rd USENIX Security Symposium (USENIX Security 14), pp 719\u2013732"},{"key":"4694_CR21","doi-asserted-by":"crossref","unstructured":"Liu F, Yarom Y, Ge Q, Heiser G, Lee RB (2015) Last-level cache side-channel attacks are practical. In: 2015 IEEE Symposium on Security and Privacy, pp 605\u2013622","DOI":"10.1109\/SP.2015.43"},{"key":"4694_CR22","doi-asserted-by":"crossref","unstructured":"Kocher P, Horn J, Fogh A, Genkin D, Gruss D, Haas W, Hamburg M, Lipp M, Mangard S, Prescher T, et al (2019) Spectre attacks: Exploiting speculative execution. In: 2019 IEEE Symposium on Security and Privacy (SP), pp 1\u201319","DOI":"10.1109\/SP.2019.00002"},{"key":"4694_CR23","unstructured":"Lipp M, Schwarz M, Gruss D, Prescher T, Haas W, Fogh A, Horn J, Mangard S, Kocher P, Genkin D, et al (2018) Meltdown: reading kernel memory from user space. In: 27th USENIX Security Symposium (USENIX Security 18), pp 973\u2013990"},{"key":"4694_CR24","unstructured":"LLVM Block Frequency Terminology. (2014) (accessed April 21, 2020). https:\/\/llvm.org\/docs\/BlockFrequencyTerminology.html"},{"issue":"6","key":"4694_CR25","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/1064978.1065027","volume":"40","author":"C Lattner","year":"2005","unstructured":"Lattner C, Adve V (2005) Automatic pool allocation: improving performance by controlling data structure layout in the heap. ACM Sigplan Not 40(6):129\u2013142","journal-title":"ACM Sigplan Not"},{"key":"4694_CR26","unstructured":"SoftBoundCETS for LLVM+Clang Version 34. (2014) (accessed April 21, 2020). https:\/\/github.com\/santoshn\/softboundcets-34\/"},{"key":"4694_CR27","doi-asserted-by":"crossref","unstructured":"Kuvaiskii D, Oleksenko O, Arnautov S, Trach B, Bhatotia P, Felber P, Fetzer C (2017) Sgxbounds: memory safety for shielded execution. In: Proceedings of the Twelfth European Conference on Computer Systems, pp 205\u2013221","DOI":"10.1145\/3064176.3064192"},{"key":"4694_CR28","unstructured":"LLVM 3.4 Release Notes. (2020) (accessed April 21, 2020). https:\/\/releases.llvm.org\/3.4\/docs\/ReleaseNotes.html"},{"key":"4694_CR29","unstructured":"ZC706 Evaluation Board for the Zynq-7000 XC7Z045 SoC. (2019 (accessed April 21, 2020)). https:\/\/www.xilinx.com\/support\/documentation\/boards_and_kits\/zc706\/ug954-zc706-eval-board-xc7z045-ap-soc.pdf"},{"key":"4694_CR30","volume-title":"Tagged memory and minion cores in the lowrisc soc","author":"A Bradbury","year":"2014","unstructured":"Bradbury A, Ferris G, Mullins R (2014) Tagged memory and minion cores in the lowrisc soc. University of Cambridge, Memo"},{"key":"4694_CR31","unstructured":"Tagged Memory Support. (2014) (accessed April 21, 2020). https:\/\/www.lowrisc.org\/docs\/tagged-memory-v0.1\/tags\/"},{"key":"4694_CR32","unstructured":"SPEC CPU2000 Benchmarks. (2001) (accessed April 21, 2020). https:\/\/www.spec.org\/cpu2000\/docs\/readme1st.html"},{"issue":"4","key":"4694_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1186736.1186737","volume":"34","author":"JL Henning","year":"2006","unstructured":"Henning JL (2006) Spec cpu2006 benchmark descriptions. ACM SIGARCH Comput Arch News 34(4):1\u201317","journal-title":"ACM SIGARCH Comput Arch News"},{"key":"4694_CR34","unstructured":"A Port of the RIPE Suite to RISC-V. (2018) (accessed April 21, 2020). https:\/\/github.com\/draperlaboratory\/hope-RIPE"},{"key":"4694_CR35","doi-asserted-by":"crossref","unstructured":"Wilander J, Nikiforakis N, Younan Y, Kamkar M, Joosen W (2011) RIPE: runtime intrusion prevention evaluator. In: In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC. ACM,","DOI":"10.1145\/2076732.2076739"},{"key":"4694_CR36","unstructured":"The 4th lowRISC Release: Tagged Memory and Minion Cores. (2017) (accessed April 21, 2020). https:\/\/riscv.org\/wp-content\/uploads\/2017\/05\/Wed0930riscv201705_ppt.pdf"},{"key":"4694_CR37","doi-asserted-by":"crossref","unstructured":"Austin TM, Breach SE, Sohi GS (1994) Efficient detection of all pointer and array access errors. In: Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation, pp 290\u2013301","DOI":"10.1145\/773473.178446"},{"key":"4694_CR38","unstructured":"Jim T, Morrisett JG, Grossman D, Hicks MW, Cheney J, Wang Y (2002) Cyclone: a safe dialect of c. In: USENIX Annual Technical Conference, General Track, pp 275\u2013288"},{"issue":"3","key":"4694_CR39","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1145\/1065887.1065892","volume":"27","author":"GC Necula","year":"2005","unstructured":"Necula GC, Condit J, Harren M, McPeak S, Weimer W (2005) Ccured: Type-safe retrofitting of legacy software. ACM Trans Program Lang Sys (TOPLAS) 27(3):477\u2013526","journal-title":"ACM Trans Program Lang Sys (TOPLAS)"},{"issue":"10","key":"4694_CR40","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1109\/TC.2019.2914037","volume":"68","author":"J Woodruff","year":"2019","unstructured":"Woodruff J, Joannou A, Xia H, Fox A, Norton RM, Chisnall D, Davis B, Gudka K, Filardo NW, Markettos AT et al (2019) Cheri concentrate: practical compressed capabilities. IEEE Trans Comput 68(10):1455\u20131469","journal-title":"IEEE Trans Comput"},{"key":"4694_CR41","doi-asserted-by":"crossref","unstructured":"Younan Y, Philippaerts P, Cavallaro L, Sekar R, Piessens F, Joosen W (2010) Paricheck: an efficient pointer arithmetic checker for c programs. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp 145\u2013156","DOI":"10.1145\/1755688.1755707"},{"key":"4694_CR42","unstructured":"Eigler FC (2003) Mudflap: pointer use checking for c\/c+. In: GCC Developers Summit, pp 57. Citeseer"},{"key":"4694_CR43","unstructured":"Serebryany K, Bruening D, Potapenko A, Vyukov D (2012) Addresssanitizer: a fast address sanity checker. In: Presented as Part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12), pp 309\u2013318"},{"key":"4694_CR44","doi-asserted-by":"crossref","unstructured":"Hasabnis N, Misra A, Sekar R (2012) Light-weight bounds checking. In: Proceedings of the Tenth International Symposium on Code Generation and Optimization, pp 135\u2013144","DOI":"10.1145\/2259016.2259034"},{"key":"4694_CR45","doi-asserted-by":"crossref","unstructured":"Sasaki H, Arroyo MA, Ziad MTI, Bhat K, Sinha K, Sethumadhavan S (2019) Practical byte-granular memory blacklisting using califorms. In: Proceedings of the 52nd Annual IEEE\/ACM International Symposium on Microarchitecture, pp 558\u2013571","DOI":"10.1145\/3352460.3358299"},{"key":"4694_CR46","unstructured":"Haller I, Slowinska A, Neugschwandtner M, Bos H (2013) Dowsing for overflows: a guided fuzzer to find buffer boundary violations. In: Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13), pp 49\u201364"},{"issue":"12","key":"4694_CR47","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3241625.2976017","volume":"51","author":"G Grieco","year":"2016","unstructured":"Grieco G, Ceresa M, Buiras P (2016) Quickfuzz: an automatic random fuzzer for common file formats. ACM SIGPLAN Not 51(12):13\u201320","journal-title":"ACM SIGPLAN Not"},{"key":"4694_CR48","first-page":"225","volume":"8","author":"N Zeldovich","year":"2008","unstructured":"Zeldovich N, Kannan H, Dalton M, Kozyrakis C (2008) Hardware enforcement of application security policies using tagged memory. OSDI 8:225\u2013240","journal-title":"OSDI"},{"key":"4694_CR49","doi-asserted-by":"crossref","unstructured":"Dhawan U, Hritcu C, Rubin R, Vasilakis N, Chiricescu S, Smith JM, Knight Jr TF, Pierce BC, DeHon A (2015) Architectural support for software-defined metadata processing. In: Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, pp 487\u2013502","DOI":"10.1145\/2775054.2694383"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04694-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04694-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04694-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T14:41:30Z","timestamp":1672843290000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04694-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,20]]},"references-count":49,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["4694"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04694-y","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2022,7,20]]},"assertion":[{"value":"23 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}