{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:10Z","timestamp":1725562390493},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/cgo.2013.6494985","type":"proceedings-article","created":{"date-parts":[[2013,4,11]],"date-time":"2013-04-11T17:38:10Z","timestamp":1365701890000},"page":"1-12","source":"Crossref","is-referenced-by-count":0,"title":["Skadu: Efficient vector shadow memories for poly-scopic program analysis"],"prefix":"10.1109","author":[{"family":"Donghwan Jeon","sequence":"first","affiliation":[]},{"given":"S.","family":"Garcia","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Bedford Taylor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Using valgrind to detect undefined value errors with bit-precision","author":"seward","year":"2005","journal-title":"USENIX ATC"},{"key":"17","article-title":"Lift: A low-overhead practical information flow tracking system for detecting security attacks","author":"qin","year":"2006","journal-title":"Micro"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"16","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"NDSS"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1016\/S1571-0661(04)81047-8","article-title":"Redux: A dynamic dataflow tracer","author":"nethercote","year":"2003","journal-title":"Electronic Notes Theoret Comput Sci"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254820"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1508293.1508295"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140303"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346205"},{"journal-title":"Modern Operating Systems","year":"2007","author":"tanenbaum","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542523"},{"key":"23","article-title":"Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks","author":"xu","year":"2006","journal-title":"Usenix Security"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806667"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772960"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952688"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346191"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1177\/109434209100500306"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2001.903253"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1229428.1229457"},{"journal-title":"LZO Data Compression Library","year":"0","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2012.52"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993553"},{"key":"5","article-title":"Tainttrace: Efficient flow tracing with dynamic binary rewriting","author":"cheng","year":"2006","journal-title":"Computers and Communications"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764689"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048108"}],"event":{"name":"2013 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","start":{"date-parts":[[2013,2,23]]},"location":"Shenzhen","end":{"date-parts":[[2013,2,27]]}},"container-title":["Proceedings of the 2013 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6489844\/6494968\/06494985.pdf?arnumber=6494985","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T07:14:50Z","timestamp":1498029290000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6494985\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cgo.2013.6494985","relation":{},"subject":[],"published":{"date-parts":[[2013,2]]}}}