{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:29Z","timestamp":1750307189457,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T00:00:00Z","timestamp":1328572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,2,7]]},"DOI":"10.1145\/2133601.2133638","type":"proceedings-article","created":{"date-parts":[[2012,2,7]],"date-time":"2012-02-07T15:39:28Z","timestamp":1328629168000},"page":"295-306","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["SWIPE"],"prefix":"10.1145","author":[{"given":"Kalpana","family":"Gondi","sequence":"first","affiliation":[{"name":"University of Illinois, Chicago, IL, USA"}]},{"given":"Prithvi","family":"Bisht","sequence":"additional","affiliation":[{"name":"University of Illinois, Chicago, IL, USA"}]},{"given":"Praveen","family":"Venkatachari","sequence":"additional","affiliation":[{"name":"Universiry of Illinois, Chicago, IL, USA"}]},{"given":"A. Prasad","family":"Sistla","sequence":"additional","affiliation":[{"name":"University of Illinois, Chicago, IL, USA"}]},{"given":"V. N.","family":"Venkatakrishnan","sequence":"additional","affiliation":[{"name":"University of Illinois, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Resouce Standard Metrics. http:\/\/msquaredtechnologies.com.  Resouce Standard Metrics. http:\/\/msquaredtechnologies.com."},{"key":"e_1_3_2_1_2_1","unstructured":"StackOverflow. http:\/\/stackoverflow.com\/questions.  StackOverflow. http:\/\/stackoverflow.com\/questions."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251543"},{"volume-title":"USENIX Security Symposium","year":"2010","author":"Akritidis P.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"Andersenm L. O. Program Analysis and Specialization for the C Programming Language. Tech. rep. 1994.  Andersenm L. O. Program Analysis and Specialization for the C Programming Language. Tech. rep. 1994."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062520"},{"key":"e_1_3_2_1_8_1","unstructured":"Boehm H.-J. A Garbage Collector for C and C  Boehm H.-J. A Garbage Collector for C and C"},{"key":"e_1_3_2_1_9_1","unstructured":". http:\/\/www.hpl.hp.com\/personal\/Hans\\_Boehm\/gc 2002.  . http:\/\/www.hpl.hp.com\/personal\/Hans\\_Boehm\/gc 2002."},{"volume-title":"Scrash: A System for Generating Secure Crash Information. In USENIX Security Symposium","year":"2003","author":"Broadwell P.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296923"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2005.19"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2008.12"},{"volume-title":"USENIX Security Symposium","year":"2004","author":"Chow J.","key":"e_1_3_2_1_14_1"},{"volume-title":"USENIX Security Symposium","year":"2005","author":"Chow J.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781149"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948155"},{"volume-title":"USENIX Security Symposium","year":"1996","author":"Gutmann P.","key":"e_1_3_2_1_18_1"},{"volume-title":"P. Data Remanence in Semiconductor Devices. In USENIX Security Symposium","year":"2001","author":"Gutmann","key":"e_1_3_2_1_19_1"},{"volume-title":"Security Focus Vuln Dev Mailing List","year":"2002","author":"Guttman P.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134024"},{"volume-title":"Lest We Remember: Cold Boot Attacks on Encryption Keys. In Usenix Security Symposium","year":"2008","author":"Halderman J. A.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.22"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"volume-title":"Statically Detecting Likely Buffer Overflow Vulnerabilities. In USENIX Security Symposium (Washington, D.C.","year":"2001","author":"Larochelle D.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065027"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"volume-title":"CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs. In Conference on Compiler Construction","year":"2002","author":"Necula G. C.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"volume-title":"Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis. In Static Analysis Symposium","year":"2004","author":"Nystrom E. M.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349325"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292552"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940115"},{"volume-title":"Making Information Flow Explicit in HiStar. In Symposium on Operating Systems Design and Implementation","year":"2006","author":"Zeldovich N.","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328464"}],"event":{"name":"CODASPY'12: Second ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"San Antonio Texas USA","acronym":"CODASPY'12"},"container-title":["Proceedings of the second ACM conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2133601.2133638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:05:52Z","timestamp":1750241152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2133601.2133638"}},"subtitle":["eager erasure of sensitive data in large scale systems software"],"short-title":[],"issued":{"date-parts":[[2012,2,7]]},"references-count":36,"alternative-id":["10.1145\/2133601.2133638","10.1145\/2133601"],"URL":"https:\/\/doi.org\/10.1145\/2133601.2133638","relation":{},"subject":[],"published":{"date-parts":[[2012,2,7]]},"assertion":[{"value":"2012-02-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}