{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:47:43Z","timestamp":1773654463298,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T00:00:00Z","timestamp":1097107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,7]]},"DOI":"10.1145\/1024393.1024404","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"85-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":401,"title":["Secure program execution via dynamic information flow tracking"],"prefix":"10.1145","author":[{"given":"G. Edward","family":"Suh","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA"}]},{"given":"Jae W.","family":"Lee","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA"}]},{"given":"David","family":"Zhang","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA"}]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2004,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267724.1267745"},{"key":"e_1_3_2_1_2_1","volume-title":"Version 2.0. Technical report","author":"Burger D.","year":"1997","unstructured":"D. Burger and T. M. Austin . The SimpleScalar Tool Set , Version 2.0. Technical report , University of Wisconsin-Madison Computer Science Department , 1997 .]] D. Burger and T. M. Austin. The SimpleScalar Tool Set, Version 2.0. Technical report, University of Wisconsin-Madison Computer Science Department, 1997.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"10th USENIX Security Symposium, Washington, D.C.","author":"Cowan C.","year":"2001","unstructured":"C. Cowan , M. Barringer , S. Beattie , and G. Kroah-Hartman . FormatGuard: Automatic protection from printf format string vulnerabilities, 2001 . In 10th USENIX Security Symposium, Washington, D.C. , August 2001 .]] C. Cowan, M. Barringer, S. Beattie, and G. Kroah-Hartman. FormatGuard: Automatic protection from printf format string vulnerabilities, 2001. In 10th USENIX Security Symposium, Washington, D.C., August 2001.]]"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 12th USENIX Security Symposium","author":"Cowan C.","year":"2003","unstructured":"C. Cowan , S. Beattie , J. Johansen , and P. Wagle . PointGuard: Protecting pointers from buffer overflow vulnerabilities . In Proceedings of the 12th USENIX Security Symposium , 2003 .]] C. Cowan, S. Beattie, J. Johansen, and P. Wagle. PointGuard: Protecting pointers from buffer overflow vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, 2003.]]"},{"key":"e_1_3_2_1_5_1","first-page":"63","volume-title":"Proc. 7th USENIX Security Symposium","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , J. Walpole , P. Bakke , S. Beattie , A. Grier , P. Wagle , Q. Zhang , and H. Hinton . StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks . In Proc. 7th USENIX Security Symposium , pages 63 -- 78 , San Antonio, Texas , Jan. 1998 .]] C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proc. 7th USENIX Security Symposium, pages 63--78, San Antonio, Texas, Jan. 1998.]]"},{"key":"e_1_3_2_1_6_1","unstructured":"S. Designer. Non-executable user stack. http:\/\/www.openwall.com\/linux\/.]]  S. Designer. Non-executable user stack. http:\/\/www.openwall.com\/linux\/.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948155"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.869367"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","author":"Jim T.","year":"2002","unstructured":"T. Jim , G. Morrisett , D. Grossman , M. Hicks , J. Cheney , and Y. Wang . Cyclone: A safe dialect of c . In Proceedings of the USENIX Annual Technical Conference , 2002 .]] T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of c. In Proceedings of the USENIX Annual Technical Conference, 2002.]]"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 3rd International Workshop on Automatic Debugging","author":"Jones R.","year":"1997","unstructured":"R. Jones and P. Kelly . Backwards-compatible bounds checking for arrays and pointers in C programs . In Proceedings of the 3rd International Workshop on Automatic Debugging , 1997 .]] R. Jones and P. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. In Proceedings of the 3rd International Workshop on Automatic Debugging, 1997.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_12_1","unstructured":"K. Lawton B. Denney N. D. Guarneri V. Ruppert and C. Bothamy. Bochs user manual. http:\/\/bochs.sourceforge.net\/.]]  K. Lawton B. Denney N. D. Guarneri V. Ruppert and C. Bothamy. Bochs user manual. http:\/\/bochs.sourceforge.net\/.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2003 International Conference on Security in Pervasive Computing","author":"Lee R. B.","year":"2003","unstructured":"R. B. Lee , D. K. Karig , J. P. McGregor , and Z. Shi . Enlisting hardware architecture to thwart malicious code injection . In Proceedings of the 2003 International Conference on Security in Pervasive Computing , 2003 .]] R. B. Lee, D. K. Karig, J. P. McGregor, and Z. Shi. Enlisting hardware architecture to thwart malicious code injection. In Proceedings of the 2003 International Conference on Security in Pervasive Computing, 2003.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_15_1","author":"T.","year":"2000","unstructured":"T. Newsham. Format string attacks. Guardent, Inc. , September 2000 . http:\/\/www.securityfocus.com\/guest\/3342.]] T. Newsham. Format string attacks. Guardent, Inc., September 2000. http:\/\/www.securityfocus.com\/guest\/3342.]]","journal-title":"Newsham. Format string attacks. Guardent, Inc."},{"key":"e_1_3_2_1_16_1","volume-title":"Nov.","author":"One A.","year":"1996","unstructured":"A. One . Smashing the stack for fun and profit. Phrack, 7(49) , Nov. 1996 .]] A. One. Smashing the stack for fun and profit. Phrack, 7(49), Nov. 1996.]]"},{"key":"e_1_3_2_1_17_1","unstructured":"PaX Team. Non executable data pages. http:\/\/pageexec.virtualave.net\/pageexec.txt.]]  PaX Team. Non executable data pages. http:\/\/pageexec.virtualave.net\/pageexec.txt.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 11th Annual Network and Distributed System Security Symposium","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. S. Lam . A practical dynamic buffer overflow detector . In Proceedings of the 11th Annual Network and Distributed System Security Symposium , 2004 .]] O. Ruwase and M. S. Lam. A practical dynamic buffer overflow detector. In Proceedings of the 11th Annual Network and Distributed System Security Symposium, 2004.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/800094.803030"},{"key":"e_1_3_2_1_20_1","volume-title":"Exploiting format string vulnerabilities","year":"2001","unstructured":"Scut. Exploiting format string vulnerabilities . TESO Security Group , September 2001 . http:\/\/www.team-teso.net\/articles\/formatstring.]] Scut. Exploiting format string vulnerabilities. TESO Security Group, September 2001. http:\/\/www.team-teso.net\/articles\/formatstring.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 10th USENIX Security Symposium","author":"Shankar U.","year":"2001","unstructured":"U. Shankar , K. Talwar , J. S. Foster , and D. Wagner . Automated detection of format-string vulnerabilities using type qualifiers . In Proceedings of the 10th USENIX Security Symposium , 2001 .]] U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Automated detection of format-string vulnerabilities using type qualifiers. In Proceedings of the 10th USENIX Security Symposium, 2001.]]"},{"key":"e_1_3_2_1_22_1","volume-title":"WRL Research Report","author":"Shivakumar P.","year":"2001","unstructured":"P. Shivakumar and N. J. Jouppi . CACTI 3.0: An integrated cache timing, power, and area model. Technical report , WRL Research Report , Feb. 2001 .]] P. Shivakumar and N. J. Jouppi. CACTI 3.0: An integrated cache timing, power, and area model. Technical report, WRL Research Report, Feb. 2001.]]"},{"key":"e_1_3_2_1_23_1","unstructured":"Vendicator. Stackshield: A \"stack smashing\" technique protection tool for linux. http:\/\/www.angelfire.com\/sk\/stackshield\/.]]  Vendicator. Stackshield: A \"stack smashing\" technique protection tool for linux. http:\/\/www.angelfire.com\/sk\/stackshield\/.]]"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium","author":"Wilander J.","year":"2003","unstructured":"J. Wilander and M. Kamkar . A comparison of publicly available tools for dynamic buffer overflow prevention . In Proceedings of the 10th Annual Network and Distributed System Security Symposium , 2003 .]] J. Wilander and M. Kamkar. A comparison of publicly available tools for dynamic buffer overflow prevention. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, 2003.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605429"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2nd Workshop on Evaluating and Architecting System dependability (EASY)","author":"Xu J.","year":"2002","unstructured":"J. Xu , Z. Kalbarczjk , S. Patel , and R. K. Iyer . Architecture support for defending against buffer overflow attacks . In Proceedings of the 2nd Workshop on Evaluating and Architecting System dependability (EASY) , 2002 .]] J. Xu, Z. Kalbarczjk, S. Patel, and R. K. Iyer. Architecture support for defending against buffer overflow attacks. In Proceedings of the 2nd Workshop on Evaluating and Architecting System dependability (EASY), 2002.]]"}],"event":{"name":"ASPLOS04: Architectural Support for Programming Languages and Operating Systems","location":"Boston MA USA","acronym":"ASPLOS04","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 11th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024393.1024404","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1024393.1024404","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:31:34Z","timestamp":1750249894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1024393.1024404"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,7]]},"references-count":26,"alternative-id":["10.1145\/1024393.1024404","10.1145\/1024393"],"URL":"https:\/\/doi.org\/10.1145\/1024393.1024404","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1037949.1024404","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1037187.1024404","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1037947.1024404","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,10,7]]},"assertion":[{"value":"2004-10-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}