{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:42Z","timestamp":1772163942206,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1145\/1346281.1346322","type":"proceedings-article","created":{"date-parts":[[2008,3,12]],"date-time":"2008-03-12T18:35:48Z","timestamp":1205346948000},"page":"319-328","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["Better bug reporting with better privacy"],"prefix":"10.1145","author":[{"given":"Miguel","family":"Castro","sequence":"first","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Manuel","family":"Costa","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Jean-Philippe","family":"Martin","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2008,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"GHttpd Log() Function Buffer Overflow Vulnerability (Bugtraq ID: 5960). http:\/\/www.securityfocus.com\/bid\/5960.  GHttpd Log() Function Buffer Overflow Vulnerability (Bugtraq ID: 5960). http:\/\/www.securityfocus.com\/bid\/5960."},{"key":"e_1_3_2_2_2_1","unstructured":"Null HTTPd Remote Heap Overflow Vulnerability (Bugtraq ID: 5774). http:\/\/www.securityfocus.com\/bid\/5774.  Null HTTPd Remote Heap Overflow Vulnerability (Bugtraq ID: 5774). http:\/\/www.securityfocus.com\/bid\/5774."},{"key":"e_1_3_2_2_3_1","unstructured":"Portable network graphics (png) specification and extensions. http:\/\/www.libpng.org\/pub\/png\/spec\/.  Portable network graphics (png) specification and extensions. http:\/\/www.libpng.org\/pub\/png\/spec\/."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"e_1_3_2_2_6_1","unstructured":"BROADWELL P. HARREN M. AND SASTRY N. Scrash: a system for generating secure crash information.  BROADWELL P. HARREN M. AND SASTRY N. Scrash: a system for generating secure crash information."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_2_9_1","volume-title":"OSDI (Nov.","author":"CASTRO M.","year":"2006","unstructured":"CASTRO , M. , COSTA , M. , AND HARRIS , T. Securing software by enforcing data-flow integrity . In OSDI (Nov. 2006 ). CASTRO, M., COSTA, M., AND HARRIS, T. Securing software by enforcing data-flow integrity. In OSDI (Nov. 2006)."},{"key":"e_1_3_2_2_10_1","volume-title":"USENIX Security Symposium (July","author":"CHEN S.","year":"2005","unstructured":"CHEN , S. , XU , J. , SEZER , E. C. , GAURIAR , P. , AND IYER , R. K. Non-control-data attacks are realistic threats . In USENIX Security Symposium (July 2005 ). CHEN, S., XU, J., SEZER, E. C., GAURIAR, P., AND IYER, R. K. Non-control-data attacks are realistic threats. In USENIX Security Symposium (July 2005)."},{"key":"e_1_3_2_2_11_1","first-page":"16","volume-title":"Workshop on Descriptional Complexity of Formal Systems (June","author":"CHIRAYATH V.","year":"2006","unstructured":"CHIRAYATH , V. , LONGPRE , L. , AND KREINOVICH , V. Measuring privacy loss in statistical databases . In Workshop on Descriptional Complexity of Formal Systems (June 2006 ), pp. 16 -- 25 . CHIRAYATH, V., LONGPRE, L., AND KREINOVICH, V. Measuring privacy loss in statistical databases. In Workshop on Descriptional Complexity of Formal Systems (June 2006), pp. 16--25."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_2_14_1","volume-title":"USENIX Security Symposium (Jan.","author":"COWAN C.","year":"1998","unstructured":"COWAN , C. , PU , C. , MAIER , D. , HINTON , H. , WADPOLE , J. , BAKKE , P. , BEATTIE , S. , GRIER , A. , WAGLE , P. , AND ZHANG , Q. Stackguard : Automatic detection and prevention of buffer-overrun attacks . In USENIX Security Symposium (Jan. 1998 ). COWAN, C., PU, C., MAIER, D., HINTON, H., WADPOLE, J., BAKKE, P., BEATTIE, S., GRIER, A., WAGLE, P., AND ZHANG, Q. Stackguard: Automatic detection and prevention of buffer-overrun attacks. In USENIX Security Symposium (Jan. 1998)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102152"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_17_1","unstructured":"DUTERTRE B. AND DE MOURA L. The YICES SMT Solver. http:\/\/yices.csl.sri.com.  DUTERTRE B. AND DE MOURA L. The YICES SMT Solver. http:\/\/yices.csl.sri.com."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_11"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/568522.568525"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_2_22_1","first-page":"2293","volume-title":"IJCAI","author":"GOMES C. P.","year":"2007","unstructured":"GOMES , C. P. , HOFFMANN , J. , SABHARWAL , A. , AND SELMAN , B. From sampling to model counting . In IJCAI ( 2007 ), pp. 2293 -- 2299 . GOMES, C. P., HOFFMANN, J., SABHARWAL, A., AND SELMAN, B. From sampling to model counting. In IJCAI (2007), pp. 2293--2299."},{"key":"e_1_3_2_2_23_1","volume-title":"AAAI","author":"GOMES C. P.","year":"2006","unstructured":"GOMES , C. P. , SABHARWAL , A. , AND SELMAN , B. Model counting: A new strategy for obtaining good bounds . In AAAI ( 2006 ). GOMES, C. P., SABHARWAL, A., AND SELMAN, B. Model counting: A new strategy for obtaining good bounds. In AAAI (2006)."},{"key":"e_1_3_2_2_25_1","unstructured":"MICROSOFT CORPORATION. Msn messenger. http:\/\/messenger.msn.com.  MICROSOFT CORPORATION. Msn messenger. http:\/\/messenger.msn.com."},{"key":"e_1_3_2_2_26_1","volume-title":"Oct.","author":"MICROSOFT CORPORATION","year":"2005","unstructured":"MICROSOFT CORPORATION . Privacy statement for the microsoft error reporting service , Oct. 2005 . http:\/\/oca.microsoft.com\/en\/dcp20.asp. MICROSOFT CORPORATION. Privacy statement for the microsoft error reporting service, Oct. 2005. http:\/\/oca.microsoft.com\/en\/dcp20.asp."},{"key":"e_1_3_2_2_27_1","volume-title":"Jan.","author":"MICROSOFT CORPORATION","year":"2007","unstructured":"MICROSOFT CORPORATION . Description of the end user privacy policy in application error reporting when you are using office. Microsoft Knowledge Base Q283768 , Jan. 2007 . http:\/\/support.microsoft.com\/kb\/283768. MICROSOFT CORPORATION. Description of the end user privacy policy in application error reporting when you are using office. Microsoft Knowledge Base Q283768, Jan. 2007. http:\/\/support.microsoft.com\/kb\/283768."},{"key":"e_1_3_2_2_28_1","volume-title":"Jan.","author":"MICROSOFT CORPORATION","year":"2007","unstructured":"MICROSOFT CORPORATION . Dr. watson overview , Jan. 2007 . http:\/\/www.microsoft.com\/resources\/documentation\/windows\/xp\/all\/proddocs\/en-us\/drwatson overview.mspx?mfr=true. MICROSOFT CORPORATION. Dr. watson overview, Jan. 2007. http:\/\/www.microsoft.com\/resources\/documentation\/windows\/xp\/all\/proddocs\/en-us\/drwatson overview.mspx?mfr=true."},{"key":"e_1_3_2_2_29_1","volume-title":"June","author":"MITRE CORPORATION","year":"2004","unstructured":"MITRE CORPORATION . Multiple buffer overflows in libpng 1.2.5. CVE-2004-0597 , June 2004 . http:\/\/cve.mitre.org\/cgibin\/cvename.cgi?name=CAN-2004-0597. MITRE CORPORATION. Multiple buffer overflows in libpng 1.2.5. CVE-2004-0597, June 2004. http:\/\/cve.mitre.org\/cgibin\/cvename.cgi?name=CAN-2004-0597."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1219056"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_2_32_1","volume-title":"NDSS (Feb.","author":"RUWASE O.","year":"2004","unstructured":"RUWASE , O. , AND LAM , M. A practical dynamic buffer overflow detector . In NDSS (Feb. 2004 ). RUWASE, O., AND LAM, M. A practical dynamic buffer overflow detector. In NDSS (Feb. 2004)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275508"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11499107_17"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294275"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"event":{"name":"ASPLOS08: Architectural Support for Programming Languages and Operating Systems","location":"Seattle WA USA","acronym":"ASPLOS08","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 13th international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1346281.1346322","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1346281.1346322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:38:57Z","timestamp":1750239537000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1346281.1346322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":37,"alternative-id":["10.1145\/1346281.1346322","10.1145\/1346281"],"URL":"https:\/\/doi.org\/10.1145\/1346281.1346322","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1353535.1346322","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1353536.1346322","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1353534.1346322","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,3]]},"assertion":[{"value":"2008-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}