{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:16Z","timestamp":1772164036858,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,3]],"date-time":"2012-03-03T00:00:00Z","timestamp":1330732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,3]]},"DOI":"10.1145\/2150976.2150994","type":"proceedings-article","created":{"date-parts":[[2012,3,6]],"date-time":"2012-03-06T08:18:26Z","timestamp":1331021906000},"page":"159-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["A case for unlimited watchpoints"],"prefix":"10.1145","author":[{"given":"Joseph L.","family":"Greathouse","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Hongyi","family":"Xin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Yixin","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Michigan &amp; Shanghai Jiao Tong University, Ann Arbor, MI, USA"}]},{"given":"Todd","family":"Austin","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/53990.53992"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/106972.106984"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.34"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1006147.1006185"},{"key":"e_1_3_2_1_5_1","volume-title":"the Workshop on Determinism and Correctness in Parallel Programming (WoDet)","author":"Bergan T.","year":"2011"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2009.34"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555814"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.36"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/362790.362798"},{"key":"e_1_3_2_1_14_1","volume-title":"Fast Bounds Checking Using Debug Registers. In the Proc. of the International Conference on High Performance Embedded Architectures & Compilers (HiPEAC)","author":"Chiueh T.","year":"2008"},{"key":"e_1_3_2_1_15_1","volume-title":"Spring COMPCON","author":"Ditzel D. R.","year":"1980"},{"key":"e_1_3_2_1_16_1","volume-title":"Effective Data-Race Detection for the Kernel. In the Proc. of the Symposium on Operating Systems Design and Implementation (OSDI)","author":"Erickson J.","year":"2010"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/363269.363280"},{"key":"e_1_3_2_1_18_1","volume-title":"Highly Scalable Distributed Dataflow Analysis. In the Proc. of the Symposium on Code Generation and Optimization (CGO)","author":"Greathouse J. L.","year":"2011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000084"},{"key":"e_1_3_2_1_20_1","volume-title":"University of Wisconsin-Madison","author":"Hill M. D.","year":"2007"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/800050.801837"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2009.18"},{"key":"e_1_3_2_1_24_1","volume-title":"High Coverage Detection of Input-Related Security Faults. In the Proc. of the USENIX Security Symposium","author":"Larson E.","year":"2003"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_26_1","volume-title":"the Proc. of the International Conference on Dependable Systems and Networks (DSN)","author":"Lyu J.","year":"2001"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/800050.801833"},{"key":"e_1_3_2_1_28_1","volume-title":"the Proc. of the USENIX Annual Technical Conference","author":"McVoy L.","year":"1996"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346308"},{"key":"e_1_3_2_1_30_1","unstructured":"N. Neelakantam and C. Zilles. UFO: A General-Purpose User-Mode Memory Protection Technique for Application Use. Technical report University of Illinois at Urbana-Champaign 2007.  N. Neelakantam and C. Zilles. UFO: A General-Purpose User-Mode Memory Protection Technique for Application Use. Technical report University of Illinois at Urbana-Champaign 2007."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/130616.130623"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346181"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/195473.195575"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/73141.74844"},{"key":"e_1_3_2_1_36_1","unstructured":"E. Schrock. Watchpoints 101. http:\/\/blogs.oracle.com\/eschrock\/entry\/watchpoints_101 July 2004.  E. Schrock. Watchpoints 101. http:\/\/blogs.oracle.com\/eschrock\/entry\/watchpoints_101 July 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247362"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1816016"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2002.1028477"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771782"},{"key":"e_1_3_2_1_41_1","volume-title":"FlexiTaint: A Programmable Accelerator for Dynamic Taint Propagation. In the Proc. of the International Symposium on High-Performance Computer Architecture (HPCA)","author":"Venkataramani G.","year":"2008"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346205"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/143365.143518"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653728"},{"key":"e_1_3_2_1_45_1","volume-title":"Considerations for Mondriaan-like Systems. In the Workshop on Duplicating, Deconstructing, and Debunking (WDDD)","author":"Witchel E.","year":"2009"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605429"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2007.363733"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/369028.369059"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772960"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/998680.1006720"}],"event":{"name":"ASPLOS'12: Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems","location":"London England, UK","acronym":"ASPLOS'12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2150994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2150976.2150994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:54:44Z","timestamp":1750226084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2150994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,3]]},"references-count":50,"alternative-id":["10.1145\/2150976.2150994","10.1145\/2150976"],"URL":"https:\/\/doi.org\/10.1145\/2150976.2150994","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2248487.2150994","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2189750.2150994","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,3,3]]},"assertion":[{"value":"2012-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}