{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T22:17:43Z","timestamp":1778365063288,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,15]],"date-time":"2009-06-15T00:00:00Z","timestamp":1245024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,15]]},"DOI":"10.1145\/1542476.1542504","type":"proceedings-article","created":{"date-parts":[[2009,6,16]],"date-time":"2009-06-16T09:34:36Z","timestamp":1245144876000},"page":"245-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":327,"title":["SoftBound"],"prefix":"10.1145","author":[{"given":"Santosh","family":"Nagarakatte","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Jianzhou","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Milo M.K.","family":"Martin","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Steve","family":"Zdancewic","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adobe Reader vulnerability exploited in-the-wild 2008. http:\/\/www.trustedsource.org\/blog\/118\/Recent-Adobe-Reader-vulnerability-exploited-in-the-wild.  Adobe Reader vulnerability exploited in-the-wild 2008. http:\/\/www.trustedsource.org\/blog\/118\/Recent-Adobe-Reader-vulnerability-exploited-in-the-wild."},{"key":"e_1_3_2_1_2_1","volume-title":"Nov.","author":"Advisories Adobe Security","year":"2008","unstructured":"Adobe Security Advisories : APSB08-19 , Nov. 2008 . http:\/\/www.adobe.com\/support\/security\/bulletins\/apsb08-19.html. Adobe Security Advisories: APSB08-19, Nov. 2008. http:\/\/www.adobe.com\/support\/security\/bulletins\/apsb08-19.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781153"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349342"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/155090.155109"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation","author":"Castro M.","year":"2006","unstructured":"M. Castro , M. Costa , and T. Harris . Securing Software by Enforcing Data-Flow Integrity . In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation , Nov. 2006 . M. Castro, M. Costa, and T. Harris. Securing Software by Enforcing Data-Flow Integrity. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, Nov. 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762174.1762221"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/0096-0551(93)90005-L"},{"key":"e_1_3_2_1_13_1","volume-title":"The Coq Proof Assistant Reference Manual (Version 8.2beta4)","author":"Development Team The Coq","year":"2008","unstructured":"The Coq Development Team . The Coq Proof Assistant Reference Manual (Version 8.2beta4) , 2008 . The Coq Development Team. The Coq Proof Assistant Reference Manual (Version 8.2beta4), 2008."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264935"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294295"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1133999"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/780732.780743"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781149"},{"key":"e_1_3_2_1_21_1","volume-title":"GCC Developer's Summit","author":"Eigler F. C.","year":"2003","unstructured":"F. C. Eigler . Mudflap: Pointer Use Checking for C\/C++ . In GCC Developer's Summit , 2003 . F. C. Eigler. Mudflap: Pointer Use Checking for C\/C++. In GCC Developer's Summit, 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948155"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/277650.277748"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512563"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134319"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Winter Usenix Conference","author":"Hastings R.","year":"1992","unstructured":"R. Hastings and B. Joyce . Purify: Fast Detection of Memory Leaks and Access Errors . In Proceedings of the Winter Usenix Conference , 1992 . R. Hastings and B. Joyce. Purify: Fast Detection of Memory Leaks and Access Errors. In Proceedings of the Winter Usenix Conference, 1992."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 2002 USENIX Annual Technical Conference","author":"Jim T.","year":"2002","unstructured":"T. Jim , G. Morrisett , D. Grossman , M. Hicks , J. Cheney , and Y. Wang . Cyclone: A Safe Dialect of C . In Proceedings of the 2002 USENIX Annual Technical Conference , June 2002 . T. Jim, G. Morrisett, D. Grossman, M. Hicks, J. Cheney, and Y. Wang. Cyclone: A Safe Dialect of C. In Proceedings of the 2002 USENIX Annual Technical Conference, June 2002."},{"key":"e_1_3_2_1_29_1","volume-title":"Jones and P. H. J. Kelly. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs. In Third International Workshop on Automated Debugging","author":"R. W.","year":"1997","unstructured":"R. W. M. Jones and P. H. J. Kelly. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs. In Third International Workshop on Automated Debugging , Nov. 1997 .\\newpage R. W. M. Jones and P. H. J. Kelly. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs. In Third International Workshop on Automated Debugging, Nov. 1997.\\newpage"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_31_1","volume-title":"Beautiful Code: Leading Programmers Explain How They Think","author":"Kroah-Hartman G.","year":"2007","unstructured":"G. Kroah-Hartman . The Linux Kernel Driver Model: The Benefits of Working Together . In A. Oram and G. Wilson, editors, Beautiful Code: Leading Programmers Explain How They Think . O'Reilly Media, Inc. , June 2007 . G. Kroah-Hartman. The Linux Kernel Driver Model: The Benefits of Working Together. In A. Oram and G. Wilson, editors, Beautiful Code: Leading Programmers Explain How They Think. O'Reilly Media, Inc., June 2007."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_34_1","volume-title":"In PLDI Workshop on the Evaluation of Software Defect Detection Tools","author":"Lu S.","year":"2005","unstructured":"S. Lu , Z. Li , F. Qin , L. Tan , P. Zhou , and Y. Zhou . Bugbench: Benchmarks for Evaluating Bug Detection tools . In In PLDI Workshop on the Evaluation of Software Defect Detection Tools , June 2005 . S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou. Bugbench: Benchmarks for Evaluating Bug Detection tools. In In PLDI Workshop on the Evaluation of Software Defect Detection Tools, June 2005."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the Second Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management","author":"Nethercote N.","year":"2004","unstructured":"N. Nethercote and J. Fitzhardinge . Bounds-Checking Entire Programs Without Recompiling . In Proceedings of the Second Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management , 2004 . N. Nethercote and J. Fitzhardinge. Bounds-Checking Entire Programs Without Recompiling. In Proceedings of the Second Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management, 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199701)27:1%3C87::AID-SPE78%3E3.0.CO;2-P"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.36"},{"key":"e_1_3_2_1_39_1","volume-title":"SRI International","author":"Porras P.","year":"2009","unstructured":"P. Porras , H. Saidi , and V. Yegneswaran . An Analysis of Conficker's Logic and Rendezvous Points. Technical report , SRI International , Feb. 2009 . P. Porras, H. Saidi, and V. Yegneswaran. An Analysis of Conficker's Logic and Rendezvous Points. Technical report, SRI International, Feb. 2009."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/201059.201065"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. S. Lam . A Practical Dynamic Buffer Overflow Detector . In Proceedings of the Network and Distributed Systems Security Symposium , Feb. 2004 . O. Ruwase and M. S. Lam. A Practical Dynamic Buffer Overflow Detector. In Proceedings of the Network and Distributed Systems Security Symposium, Feb. 2004."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 2005 USENIX Annual Technical Conference","author":"Seward J.","year":"2005","unstructured":"J. Seward and N. Nethercote . Using Valgrind to Detect Undefined Value Errors with Bit-Precision . In Proceedings of the 2005 USENIX Annual Technical Conference , Apr. 2005 . J. Seward and N. Nethercote. Using Valgrind to Detect Undefined Value Errors with Bit-Precision. In Proceedings of the 2005 USENIX Annual Technical Conference, Apr. 2005."},{"key":"e_1_3_2_1_43_1","unstructured":"SoftBound website. http:\/\/www.cis.upenn.edu\/acg\/softbound\/.  SoftBound website. http:\/\/www.cis.upenn.edu\/acg\/softbound\/."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"Wagner D.","year":"2000","unstructured":"D. Wagner , J. S. Foster , E. A. Brewer , and A. Aiken . A First Step towards Automated Detection of Buffer Overrun Vulnerabilities . In Proceedings of the Network and Distributed Systems Security Symposium , 2000 . D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. In Proceedings of the Network and Distributed Systems Security Symposium, 2000."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the Network and Distributed Systems Security Symposium","author":"Wilander J.","year":"2003","unstructured":"J. Wilander and M. Kamkar . A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention . In Proceedings of the Network and Distributed Systems Security Symposium , 2003 . J. Wilander and M. Kamkar. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention. In Proceedings of the Network and Distributed Systems Security Symposium, 2003."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294325.1294343"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029913"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940113"}],"event":{"name":"PLDI '09: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Dublin Ireland","acronym":"PLDI '09","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542476.1542504","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1542476.1542504","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:29:49Z","timestamp":1750238989000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542476.1542504"}},"subtitle":["highly compatible and complete spatial memory safety for c"],"short-title":[],"issued":{"date-parts":[[2009,6,15]]},"references-count":47,"alternative-id":["10.1145\/1542476.1542504","10.1145\/1542476"],"URL":"https:\/\/doi.org\/10.1145\/1542476.1542504","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1543135.1542504","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,6,15]]},"assertion":[{"value":"2009-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}