{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T21:04:40Z","timestamp":1772053480740,"version":"3.50.1"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tpds.2025.3556861","type":"journal-article","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T17:52:03Z","timestamp":1743616323000},"page":"1220-1236","source":"Crossref","is-referenced-by-count":2,"title":["IRHunter: Universal Detection of Instruction Reordering Vulnerabilities for Enhanced Concurrency in Distributed and Parallel Systems"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9525-0728","authenticated-orcid":false,"given":"GuoHua","family":"Xin","sequence":"first","affiliation":[{"name":"School of Cyber Security, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8701-3944","authenticated-orcid":false,"given":"Guangquan","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7375-9152","authenticated-orcid":false,"given":"Yao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Tianjin University, Tianjin, China"}]},{"given":"Cheng","family":"Wen","sequence":"additional","affiliation":[{"name":"Guangzhou Institute of Technology, Xidian University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5603-1322","authenticated-orcid":false,"given":"Cen","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1288-6502","authenticated-orcid":false,"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Northeastern State University, Tahlequah, OK, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5944-2714","authenticated-orcid":false,"given":"Shaoying","family":"Liu","sequence":"additional","affiliation":[{"name":"Software Engineering Institute, East China Normal University, Shanghai, China"}]},{"given":"Pan","family":"Gao","sequence":"additional","affiliation":[{"name":"College of Information Science and Technology, Shihezi University, Shihezi, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/325096.325102"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065042"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2023.3342573"},{"key":"ref4","article-title":"Cve-2020\u201325603","year":"2020"},{"key":"ref5","article-title":"Why does this java program terminate despite that apparently it shouldn\u2019t (and didn\u2019t)?","year":"2013"},{"key":"ref6","article-title":"Await termination violation bug fix in DPDK","author":"Behrens","year":"2020"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3498538"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3276515"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-016-0275-0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3158107"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314624"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3158105"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54862-8_26"},{"key":"ref14","article-title":"A tutorial introduction to the arm and power relaxed memory models","author":"Maranget","year":"2012"},{"key":"ref15","volume-title":"Optimizing compilers for modern architectures: a dependence-based approach","author":"Kennedy","year":"2001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3097283"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2022.3196192"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2976057"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2024.3391058"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314609"},{"key":"ref21","article-title":"REMS: Rigorous engineering of mainstream systems","author":"Sewell","year":"2017"},{"key":"ref22","article-title":"as-if rule","year":"2013"},{"key":"ref23","article-title":"Make IRQ compiler barriers","year":"2019"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24461"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3140587.3062374"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3371085"},{"key":"ref28","article-title":"locking\/qspinlock: Ensure node is initialised before updating prev->next","author":"Deacon","year":"2018"},{"key":"ref29","article-title":"Add memory barriers on lock\/unlock of spinlock","year":"2023"},{"key":"ref30","article-title":"fix(arm\/spinlock): Add compiler memory barrier to inline asm","year":"2023"},{"key":"ref31","article-title":"Random MPI_init() failure on arm64 CPU","year":"2020"},{"key":"ref32","article-title":"Add memory barrier before load\/store nlock","year":"2020"},{"key":"ref33","article-title":"raw exit while posting method exit event","author":"Holmes","year":"2016"},{"key":"ref34","article-title":"Add missing WMB and remove unnecessary RMB","year":"2015"},{"key":"ref35","article-title":"Mysql deadlock and bugcheck on aarch64 under stress test","author":"Yibo","year":"2019"},{"key":"ref36","article-title":"CVE-2020\u201325603","author":"Grall","year":"2020"},{"key":"ref37","article-title":"Race condition in memory.c while running dgemm many timgithubes from OMP parallel region","year":"2020"},{"key":"ref38","article-title":"CVE-2020\u201311739","author":"Grall","year":"2020"},{"key":"ref39","article-title":"Add missing orderaccess operations to classloaderdata lock-free data structure","author":"Holmes","year":"2016"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3133926"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180225"},{"key":"ref43","article-title":"Rapid: A framework for dynamic data race detection","year":"2023"},{"key":"ref44","first-page":"3655","article-title":"Silent bugs matter: A study of compiler-introduced security bugs","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Xu"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978366"},{"key":"ref46","first-page":"1025","article-title":"Dead store elimination (still) considered harmful","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Yang"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3434317"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/71\/10969501\/10947640.pdf?arnumber=10947640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T17:42:15Z","timestamp":1745602935000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10947640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":47,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2025.3556861","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"value":"1045-9219","type":"print"},{"value":"1558-2183","type":"electronic"},{"value":"2161-9883","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}