{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:30:09Z","timestamp":1742387409029},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/hpca.2015.7056071","type":"proceedings-article","created":{"date-parts":[[2015,3,10]],"date-time":"2015-03-10T18:13:51Z","timestamp":1426011231000},"page":"662-674","source":"Crossref","is-referenced-by-count":5,"title":["Run-time monitoring with adjustable overhead using dataflow-guided filtering"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Lo","sequence":"first","affiliation":[]},{"given":"Tao","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Ismail","sequence":"additional","affiliation":[]},{"given":"G. Edward","family":"Suh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2014.6926003"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1007\/s10009-010-0184-4","article-title":"Software Monitoring with Controllable Overhead","author":"huang","year":"2012","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669172"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449776"},{"key":"ref10","article-title":"Low-overhead Memory Leak Detection Using Adaptive Statistical Profiling","author":"chilimbi","year":"2004","journal-title":"Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764695"},{"key":"ref12","article-title":"Flexi-Taint: A Programmable Accelerator for Dynamic Taint Propagation","author":"venkataramani","year":"2008","journal-title":"Proceedings of the International Symposium on High-Performance Computer Architecture"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263925"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835922"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.20"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181319"},{"key":"ref18","article-title":"Dynamic Information Flow Tracking on Multicores","author":"nagarajan","year":"2008","journal-title":"Proceedings of the Workshop on Interaction between Compilers and Computer Architectures"},{"key":"ref19","article-title":"LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks","author":"qin","year":"2006","journal-title":"Proceedings of the 39th International Symposium on Microarchitecture"},{"journal-title":"SPEC CPU&#x2122;","year":"2006","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1145\/2024716.2024718","article-title":"The gem5 Simulator","author":"binkert","year":"2011","journal-title":"ACM SIGARCH Computer Architecture News"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/605426.605429"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.18"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/ISCA.1995.524546","article-title":"The SPLASH-2 programs: characterization and methodological considerations","author":"woo","year":"1995","journal-title":"Proceedings 22nd Annual International Symposium on Computer Architecture ISCA"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771784"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2006.1598132"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2012.6237018"},{"journal-title":"Introduction to Intel Memory Protection Extensions","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1145\/1346281.1346295","article-title":"Hard-bound: Architectural Support for Spatial Safety of the C Programming Language","author":"devietti","year":"2008","journal-title":"Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems"},{"key":"ref20","article-title":"Purify: Fast Detection of Memory Leaks and Access Errors","author":"hastings","year":"1991","journal-title":"Proceedings of the Winter 1992 USENIX Conference"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485970"},{"key":"ref21","article-title":"Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software","author":"newsome","year":"2005","journal-title":"Proceedings of the Symposium on Network and Distributed System Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-11379-1_6","article-title":"Unsupervised Anomaly-based Malware Detection using Hardware Features","author":"tang","year":"2014","journal-title":"Proceedings of the 17th International Symposium on Research in Attacks Intrusions and Defenses"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806626"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542491"}],"event":{"name":"2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA)","start":{"date-parts":[[2015,2,7]]},"location":"Burlingame, CA, USA","end":{"date-parts":[[2015,2,11]]}},"container-title":["2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7048058\/7056013\/07056071.pdf?arnumber=7056071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T13:31:58Z","timestamp":1691501518000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7056071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/hpca.2015.7056071","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}