{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:14:26Z","timestamp":1763507666095,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1053143"],"award-info":[{"award-number":["CNS-1053143"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-10-2-4089"],"award-info":[{"award-number":["N66001-10-2-4089"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2517349.2522728","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"260-275","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":102,"title":["Towards optimization-safe systems"],"prefix":"10.1145","author":[{"given":"Xi","family":"Wang","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"M. Frans","family":"Kaashoek","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Armando","family":"Solar-Lezama","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"335","volume-title":"Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Belay A.","year":"2012","unstructured":"A. Belay , A. Bittau , A. Mashtizadeh , D. Terei , D. Mazi\u00e8res , and C. Kozyrakis . Dune: Safe user-level access to privileged CPU features . In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI) , pages 335 -- 348 , Hollywood, CA , Oct. 2012 . A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D. Mazi\u00e8res, and C. Kozyrakis. Dune: Safe user-level access to privileged CPU features. In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI), pages 335--348, Hollywood, CA, Oct. 2012."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065042"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_16"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI) , San Diego, CA , Dec. 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th Symposium on Operating Systems Design and Implementation (OSDI), San Diego, CA, Dec. 2008."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.22"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103805"},{"volume-title":"Issue 12079010: Avoid undefined behavior when checking for pointer wraparound","year":"2013","key":"e_1_3_2_2_7_1","unstructured":"Chromium. Issue 12079010: Avoid undefined behavior when checking for pointer wraparound , 2013 . https:\/\/codereview.chromium.org\/12079010\/. Chromium. Issue 12079010: Avoid undefined behavior when checking for pointer wraparound, 2013. https:\/\/codereview.chromium.org\/12079010\/."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2016945.2016964"},{"volume-title":"Clang Compiler User's Manual: Controlling Code Generation","year":"2013","key":"e_1_3_2_2_9_1","unstructured":"Clang. Clang Compiler User's Manual: Controlling Code Generation , 2013 . http:\/\/clang.llvm.org\/docs\/UsersManual.html#controlling-code-generation. Clang. Clang Compiler User's Manual: Controlling Code Generation, 2013. http:\/\/clang.llvm.org\/docs\/UsersManual.html#controlling-code-generation."},{"key":"e_1_3_2_2_10_1","volume-title":"Fun with NULL pointers, part","author":"Corbet J.","year":"2009","unstructured":"J. Corbet . Fun with NULL pointers, part 1, July 2009 . http:\/\/lwn.net\/Articles\/342330\/. J. Corbet. Fun with NULL pointers, part 1, July 2009. http:\/\/lwn.net\/Articles\/342330\/."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337313"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250784"},{"key":"e_1_3_2_2_13_1","volume-title":"US-CERT","author":"Dougherty C. R.","year":"2008","unstructured":"C. R. Dougherty and R. C. Seacord . C compilers may silently discard some wraparound checks. Vulnerability Note VU#162289 , US-CERT , 2008 . http:\/\/www.kb.cert.org\/vuls\/id\/162289. C. R. Dougherty and R. C. Seacord. C compilers may silently discard some wraparound checks. Vulnerability Note VU#162289, US-CERT, 2008. http:\/\/www.kb.cert.org\/vuls\/id\/162289."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103719"},{"key":"e_1_3_2_2_15_1","volume-title":"Defining the undefinedness of C. Technical report","author":"Ellison C.","year":"2012","unstructured":"C. Ellison and G. Ro\u015fu . Defining the undefinedness of C. Technical report , University of Illinois , Apr. 2012 . http:\/\/hdl.handle.net\/2142\/30780. C. Ellison and G. Ro\u015fu. Defining the undefinedness of C. Technical report, University of Illinois, Apr. 2012. http:\/\/hdl.handle.net\/2142\/30780."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_2_17_1","unstructured":"GCC. Bug 30475 - assert(int+100 &gt; int) optimized away 2007. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=30475.  GCC. Bug 30475 - assert(int+100 &gt; int) optimized away 2007. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=30475."},{"key":"e_1_3_2_2_18_1","unstructured":"GCC. Bug 49820 - explicit check for integer negative after abs optimized away 2011. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=49820.  GCC. Bug 49820 - explicit check for integer negative after abs optimized away 2011. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=49820."},{"key":"e_1_3_2_2_19_1","unstructured":"GCC. Bug 53265 - warn when undefined behavior implies smaller iteration count 2013. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=53265.  GCC. Bug 53265 - warn when undefined behavior implies smaller iteration count 2013. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=53265."},{"key":"e_1_3_2_2_20_1","volume-title":"Nov.","author":"Gohman D.","year":"2011","unstructured":"D. Gohman . The nsw story , Nov. 2011 . http:\/\/lists.cs.uiuc.edu\/pipermail\/llvmdev\/2011-November\/045730.html. D. Gohman. The nsw story, Nov. 2011. http:\/\/lists.cs.uiuc.edu\/pipermail\/llvmdev\/2011-November\/045730.html."},{"key":"e_1_3_2_2_21_1","volume-title":"July","author":"BM.","year":"2010","unstructured":"I BM. Power ISA Version 2.06 Revision B , Book I: Power ISA User Instruction Set Architecture , July 2010 . IBM. Power ISA Version 2.06 Revision B, Book I: Power ISA User Instruction Set Architecture, July 2010."},{"volume-title":"A--Z","year":"2013","key":"e_1_3_2_2_22_1","unstructured":"Intel. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 2: Instruction Set Reference , A--Z , Jan. 2013 . Intel. Intel 64 and IA-32 Architectures Software Developer's Manual, Volume 2: Instruction Set Reference, A--Z, Jan. 2013."},{"key":"e_1_3_2_2_23_1","volume-title":"Apr.","author":"IEC","year":"2003","unstructured":"ISO\/ IEC JTC1\/SC22\/WG14. Rationale for International Standard - Programming Languages - C , Apr. 2003 . ISO\/IEC JTC1\/SC22\/WG14. Rationale for International Standard - Programming Languages - C, Apr. 2003."},{"key":"e_1_3_2_2_24_1","volume-title":"Dec.","author":"IEC","year":"2011","unstructured":"ISO\/ IEC JTC1\/SC22\/WG14. ISO\/IEC 9899:2011 , Programming languages - C , Dec. 2011 . ISO\/IEC JTC1\/SC22\/WG14. ISO\/IEC 9899:2011, Programming languages - C, Dec. 2011."},{"key":"e_1_3_2_2_25_1","volume-title":"Juniper Networks","author":"Jack B.","year":"2007","unstructured":"B. Jack . Vector rewrite attack: Exploitable NULL pointer vulnerabilities on ARM and XScale architectures. White paper , Juniper Networks , May 2007 . B. Jack. Vector rewrite attack: Exploitable NULL pointer vulnerabilities on ARM and XScale architectures. White paper, Juniper Networks, May 2007."},{"key":"e_1_3_2_2_26_1","volume-title":"ISO\/IEC JTC1\/SC22\/WG14","author":"Krebbers R.","year":"2012","unstructured":"R. Krebbers and F. Wiedijk . Subtleties of the ANSI\/ISO C standard. Document N1639 , ISO\/IEC JTC1\/SC22\/WG14 , Sept. 2012 . R. Krebbers and F. Wiedijk. Subtleties of the ANSI\/ISO C standard. Document N1639, ISO\/IEC JTC1\/SC22\/WG14, Sept. 2012."},{"key":"e_1_3_2_2_27_1","volume-title":"Dec.","author":"Lane T.","year":"2005","unstructured":"T. Lane . Anyone for adding -fwrapv to our standard CFLAGS? , Dec. 2005 . http:\/\/www.postgresql.org\/message-id\/1689.1134422394@sss.pgh.pa.us. T. Lane. Anyone for adding -fwrapv to our standard CFLAGS?, Dec. 2005. http:\/\/www.postgresql.org\/message-id\/1689.1134422394@sss.pgh.pa.us."},{"key":"e_1_3_2_2_28_1","volume-title":"Sept.","author":"Lane T.","year":"2009","unstructured":"T. Lane . Re: gcc versus division-by-zero traps , Sept. 2009 . http:\/\/www.postgresql.org\/message-id\/19979.1251998812@sss.pgh.pa.us. T. Lane. Re: gcc versus division-by-zero traps, Sept. 2009. http:\/\/www.postgresql.org\/message-id\/19979.1251998812@sss.pgh.pa.us."},{"key":"e_1_3_2_2_29_1","volume-title":"May","author":"Lattner C.","year":"2011","unstructured":"C. Lattner . What every C programmer should know about undefined behavior , May 2011 . http:\/\/blog.llvm.org\/2011\/05\/what-every-c-programmer-should-know.html. C. Lattner. What every C programmer should know about undefined behavior, May 2011. http:\/\/blog.llvm.org\/2011\/05\/what-every-c-programmer-should-know.html."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"volume-title":"Bug 14287 - ext4: fixpoint divide exception at ext4_fill_super","year":"2009","key":"e_1_3_2_2_31_1","unstructured":"Linux kernel. Bug 14287 - ext4: fixpoint divide exception at ext4_fill_super , 2009 . https:\/\/bugzilla.kernel.org\/show_bug.cgi?id=14287. Linux kernel. Bug 14287 - ext4: fixpoint divide exception at ext4_fill_super, 2009. https:\/\/bugzilla.kernel.org\/show_bug.cgi?id=14287."},{"key":"e_1_3_2_2_32_1","volume-title":"Free Software Foundation","author":"MacKenzie D.","year":"2012","unstructured":"D. MacKenzie , B. Elliston , and A. Demaille . Auto-conf: Creating Automatic Configuration Scripts for version 2.69 . Free Software Foundation , Apr. 2012 . D. MacKenzie, B. Elliston, and A. Demaille. Auto-conf: Creating Automatic Configuration Scripts for version 2.69. Free Software Foundation, Apr. 2012."},{"key":"e_1_3_2_2_33_1","volume-title":"Feb.","author":"Miller W. M.","year":"2012","unstructured":"W. M. Miller . C++ standard core language defect reports and accepted issues , issue 1457: Undefined behavior in left-shift , Feb. 2012 . http:\/\/www.open-std.org\/jtc1\/sc22\/wg21\/docs\/cwg_defects.html#1457. W. M. Miller. C++ standard core language defect reports and accepted issues, issue 1457: Undefined behavior in left-shift, Feb. 2012. http:\/\/www.open-std.org\/jtc1\/sc22\/wg21\/docs\/cwg_defects.html#1457."},{"key":"e_1_3_2_2_34_1","volume-title":"June","author":"Momjian B.","year":"2006","unstructured":"B. Momjian . Re: Fix for Win32 division involving INT_MIN , June 2006 . http:\/\/www.postgresql.org\/message-id\/200606090240.k592eUj23952@candle.pha.pa.us. B. Momjian. Re: Fix for Win32 division involving INT_MIN, June 2006. http:\/\/www.postgresql.org\/message-id\/200606090240.k592eUj23952@candle.pha.pa.us."},{"key":"e_1_3_2_2_35_1","volume-title":"Morgan Kaufmann","author":"Muchnick S. S.","year":"1997","unstructured":"S. S. Muchnick . Advanced Compiler Design and Implementation . Morgan Kaufmann , 1997 . S. S. Muchnick. Advanced Compiler Design and Implementation. Morgan Kaufmann, 1997."},{"key":"e_1_3_2_2_36_1","first-page":"175","volume-title":"Proceedings of the 2005 GCC & GNU Toolchain Developers' Summit","author":"Novillo D.","year":"2005","unstructured":"D. Novillo . A propagation engine for GCC . In Proceedings of the 2005 GCC & GNU Toolchain Developers' Summit , pages 175 -- 184 , Ottawa, Canada , June 2005 . D. Novillo. A propagation engine for GCC. In Proceedings of the 2005 GCC & GNU Toolchain Developers' Summit, pages 175--184, Ottawa, Canada, June 2005."},{"volume-title":"Issue 17016: _sre: avoid relying on pointer overflow","year":"2013","key":"e_1_3_2_2_37_1","unstructured":"Python. Issue 17016: _sre: avoid relying on pointer overflow , 2013 . http:\/\/bugs.python.org\/issue17016. Python. Issue 17016: _sre: avoid relying on pointer overflow, 2013. http:\/\/bugs.python.org\/issue17016."},{"key":"e_1_3_2_2_38_1","volume-title":"QF_BV logic","author":"Ranise S.","year":"2013","unstructured":"S. Ranise , C. Tinelli , and C. Barrett . QF_BV logic , 2013 . http:\/\/smtlib.cs.uiowa.edu\/logics\/QF_BV.smt2. S. Ranise, C. Tinelli, and C. Barrett. QF_BV logic, 2013. http:\/\/smtlib.cs.uiowa.edu\/logics\/QF_BV.smt2."},{"key":"e_1_3_2_2_39_1","volume-title":"July","author":"Regehr J.","year":"2010","unstructured":"J. Regehr . A guide to undefined behavior in C and C++ , July 2010 . http:\/\/blog.regehr.org\/archives\/213. J. Regehr. A guide to undefined behavior in C and C++, July 2010. http:\/\/blog.regehr.org\/archives\/213."},{"key":"e_1_3_2_2_40_1","volume-title":"July","author":"Regehr J.","year":"2012","unstructured":"J. Regehr . Undefined behavior consequences contest winners , July 2012 . http:\/\/blog.regehr.org\/archives\/767. J. Regehr. Undefined behavior consequences contest winners, July 2012. http:\/\/blog.regehr.org\/archives\/767."},{"key":"e_1_3_2_2_41_1","volume-title":"Feb.","author":"Seacord R. C.","year":"2010","unstructured":"R. C. Seacord . Dangerous optimizations and the loss of causality , Feb. 2010 . https:\/\/www.securecoding.cert.org\/confluence\/download\/attachments\/40402999\/Dangerous+Optimizations.pdf. R. C. Seacord. Dangerous optimizations and the loss of causality, Feb. 2010. https:\/\/www.securecoding.cert.org\/confluence\/download\/attachments\/40402999\/Dangerous+Optimizations.pdf."},{"key":"e_1_3_2_2_42_1","volume-title":"Using the GNU Compiler Collection for GCC 4.8.0","author":"Stallman R. M.","year":"2013","unstructured":"R. M. Stallman and the GCC Developer Community . Using the GNU Compiler Collection for GCC 4.8.0 . Free Software Foundation , 2013 . R. M. Stallman and the GCC Developer Community. Using the GNU Compiler Collection for GCC 4.8.0. Free Software Foundation, 2013."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349317"},{"key":"e_1_3_2_2_44_1","unstructured":"E. Teo. {PATCH} add -fno-delete-null-pointer-checks to gcc CFLAGS July 2009. https:\/\/lists.ubuntu.com\/archives\/kernel-team\/2009-July\/006609.html.  E. Teo. {PATCH} add -fno-delete-null-pointer-checks to gcc CFLAGS July 2009. https:\/\/lists.ubuntu.com\/archives\/kernel-team\/2009-July\/006609.html."},{"key":"e_1_3_2_2_45_1","volume-title":"June","author":"Tinnes J.","year":"2009","unstructured":"J. Tinnes . Bypassing Linux NULL pointer dereference exploit prevention (mmap_min_addr) , June 2009 . http:\/\/blog.cr0.org\/2009\/06\/bypassing-linux-null-pointer.html. J. Tinnes. Bypassing Linux NULL pointer dereference exploit prevention (mmap_min_addr), June 2009. http:\/\/blog.cr0.org\/2009\/06\/bypassing-linux-null-pointer.html."},{"key":"e_1_3_2_2_46_1","volume-title":"May","author":"Torvalds L.","year":"2007","unstructured":"L. Torvalds . Re : {patch} CFS scheduler, -v8 , May 2007 . https:\/\/lkml.org\/lkml\/2007\/5\/7\/213. L. Torvalds. Re: {patch} CFS scheduler, -v8, May 2007. https:\/\/lkml.org\/lkml\/2007\/5\/7\/213."},{"key":"e_1_3_2_2_47_1","volume-title":"Feb.","author":"Tourrilhes J.","year":"2003","unstructured":"J. Tourrilhes . Invalid compilation without -fno-strict-aliasing , Feb. 2003 . https:\/\/lkml.org\/lkml\/2003\/2\/25\/270. J. Tourrilhes. Invalid compilation without -fno-strict-aliasing, Feb. 2003. https:\/\/lkml.org\/lkml\/2003\/2\/25\/270."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/224538.224648"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2349896.2349905"},{"key":"e_1_3_2_2_50_1","first-page":"163","volume-title":"Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI)","author":"Wang X.","year":"2012","unstructured":"X. Wang , H. Chen , Z. Jia , N. Zeldovich , and M. F. Kaashoek . Improving integer security for systems with Kint . In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI) , pages 163 -- 177 , Hollywood, CA , Oct. 2012 . X. Wang, H. Chen, Z. Jia, N. Zeldovich, and M. F. Kaashoek. Improving integer security for systems with Kint. In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI), pages 163--177, Hollywood, CA, Oct. 2012."},{"key":"e_1_3_2_2_51_1","first-page":"177","volume-title":"Proceedings of the 2012 USENIX Annual Technical Conference","author":"Winstein K.","year":"2012","unstructured":"K. Winstein and H. Balakrishnan . Mosh: An interactive remote shell for mobile clients . In Proceedings of the 2012 USENIX Annual Technical Conference , pages 177 -- 182 , Boston, MA , June 2012 . K. Winstein and H. Balakrishnan. Mosh: An interactive remote shell for mobile clients. In Proceedings of the 2012 USENIX Annual Technical Conference, pages 177--182, Boston, MA, June 2012."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298481"}],"event":{"name":"SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Farminton Pennsylvania","acronym":"SOSP '13"},"container-title":["Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522728","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517349.2522728","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:53Z","timestamp":1750231733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522728"}},"subtitle":["analyzing the impact of undefined behavior"],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":52,"alternative-id":["10.1145\/2517349.2522728","10.1145\/2517349"],"URL":"https:\/\/doi.org\/10.1145\/2517349.2522728","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}