{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:59:57Z","timestamp":1740131997753,"version":"3.37.3"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Program of China","award":["2016YFB1000903"],"award-info":[{"award-number":["2016YFB1000903"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61632015","61772408","U1766215","U1736205","61721002","61472318","61532015"],"award-info":[{"award-number":["61632015","61772408","U1766215","U1736205","61721002","61472318","61532015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004806","name":"Fok Ying Tung Education Foundation","doi-asserted-by":"publisher","award":["151067"],"award-info":[{"award-number":["151067"]}],"id":[{"id":"10.13039\/501100004806","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education Innovation Research Team","award":["IRT_17R86"],"award-info":[{"award-number":["IRT_17R86"]}]},{"name":"Project of China Knowledge Centre for Engineering Science and Technology"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2020,9,1]]},"DOI":"10.1109\/tse.2018.2871666","type":"journal-article","created":{"date-parts":[[2018,9,26]],"date-time":"2018-09-26T19:28:13Z","timestamp":1537990093000},"page":"916-931","source":"Crossref","is-referenced-by-count":1,"title":["Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8380-1019","authenticated-orcid":false,"given":"Xiaodong","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zijiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Qinghua","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Hao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7600-0934","authenticated-orcid":false,"given":"Pei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Beyond instruction level taint propagation","author":"ng","year":"2013","journal-title":"Proc 6th European Workshop on Systems Security"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/ACSAC.2006.6"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/MICRO.2006.29"},{"key":"ref32","first-page":"18","article-title":"Twalker: An efficient taint analysis tool","author":"ma","year":"2014","journal-title":"Proc 10th Int Conf Inf Assurance Security"},{"key":"ref31","first-page":"175","article-title":"Explicit untainting to reduce shadow memory usage and access frequency in taint analysis","author":"min","year":"2013","journal-title":"Computational Science and Its Applications"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/ISCC.2006.158"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/1455770.1455778"},{"year":"2004","author":"bruening","article-title":"Efficient, transparent, and comprehensive runtime code manipulation","key":"ref36"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/1250734.1250746"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/1065010.1065034"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1145\/1250734.1250785"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1145\/1837853.1693458"},{"key":"ref61","first-page":"267","article-title":"Finding and reproducing heisenbugs in concurrent programs","author":"musuvathi","year":"2008","journal-title":"Proc of the 8th USENIX Symp on Operating Systems Design and Implementation"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/1882291.1882302"},{"year":"0","article-title":"pcopy","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/1985793.1985839"},{"key":"ref2","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proc Symp Network and Distributed System Security"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/1945023.1945039"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/SATE.2016.20"},{"key":"ref22","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proc 8th USENIX Conf Operating Syst Des Implementation"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/CGO.2004.1281665"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1145\/1713254.1713257"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","article-title":"Z3: An efficient smt solver","author":"de moura","year":"2008","journal-title":"Proc Theory Practice Softw 14th Int Conf Tools Algorithms Construction Anal Syst"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/ISCA.1995.524546"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/1454115.1454128"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/2666356.2594315"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1145\/2771783.2771798"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1145\/1985793.1985824"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1109\/TIFS.2017.2687880"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1145\/1555754.1555796"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1145\/2384616.2384651"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1145\/2338965.2336779"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1109\/TSE.2016.2584063"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1145\/2786805.2786840"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/TSE.2015.2477820"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSE.2017.2688383"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/1273463.1273490"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/1378533.1378538"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICSE.2009.5070546"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-540-89862-7_1"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/2393596.2393650"},{"key":"ref15","article-title":"Dta++: Dynamic taint analysis with targeted control-flow propagation","author":"kang","year":"2011","journal-title":"Proc Symp Network and Distributed System Security"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/1831708.1831711"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICSTW.2010.28"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/1669112.1669182"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/HPCA.2011.5749743"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/1629575.1629604"},{"key":"ref3","first-page":"121","article-title":"Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks","author":"xu","year":"2006","journal-title":"Proc 15th Conf USENIX Security Symp"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1315245.1315261"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/MICRO.2004.31"},{"year":"0","article-title":"Cve-2011-0990","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TIFS.2018.2806891"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1145\/2499370.2462167"},{"key":"ref9","article-title":"Concurrency attacks","author":"yang","year":"2012","journal-title":"Proceedings of the USENIX Workshop on Hot Topics in Parallelism"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1007\/978-3-642-12002-2_27"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1007\/978-3-642-05089-3_17"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1145\/2001420.2001438"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1145\/2393596.2393651"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1007\/978-3-642-34026-0_27"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/SP.2010.26"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/1394608.1382153"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/1735970.1736050"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9199135\/08472790.pdf?arnumber=8472790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T14:34:38Z","timestamp":1651070078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8472790\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,1]]},"references-count":62,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tse.2018.2871666","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2020,9,1]]}}}