{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T17:42:51Z","timestamp":1764783771114,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,7,4]],"date-time":"2015-07-04T00:00:00Z","timestamp":1435968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,7,4]]},"DOI":"10.1145\/2786558.2786565","type":"proceedings-article","created":{"date-parts":[[2015,7,10]],"date-time":"2015-07-10T14:10:55Z","timestamp":1436537455000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Memory-safe Execution of C on a Java VM"],"prefix":"10.1145","author":[{"given":"Matthias","family":"Grimmer","sequence":"first","affiliation":[{"name":"Johannes Kepler University Linz, Austria"}]},{"given":"Roland","family":"Schatz","sequence":"additional","affiliation":[{"name":"Oracle Labs, Austria"}]},{"given":"Chris","family":"Seaton","sequence":"additional","affiliation":[{"name":"Oracle Labs, United Kingdom"}]},{"given":"Thomas","family":"W\u00fcrthinger","sequence":"additional","affiliation":[{"name":"Oracle Labs, Switzerland"}]},{"given":"Hanspeter","family":"M\u00f6ssenb\u00f6ck","sequence":"additional","affiliation":[{"name":"Johannes Kepler University Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2015,7,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/5666.5673"},{"volume-title":"ISO\/IEX 9899:TC3. www.open-std.org\/jtc1\/sc22\/wg14\/www\/docs\/n1256.pdf","year":"2007","key":"e_1_3_2_1_2_1","unstructured":"C99 Standard : ISO\/IEX 9899:TC3. www.open-std.org\/jtc1\/sc22\/wg14\/www\/docs\/n1256.pdf , 2007 . C99 Standard: ISO\/IEX 9899:TC3. www.open-std.org\/jtc1\/sc22\/wg14\/www\/docs\/n1256.pdf, 2007."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/clang.llvm.org\/","author":"LLVM.","year":"2014","unstructured":"Clang\/ LLVM. http:\/\/clang.llvm.org\/ , 2014 . Clang\/LLVM. http:\/\/clang.llvm.org\/, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/gcc.gnu.org\/","author":"GCC","year":"2014","unstructured":"GCC (GNU C Compiler). http:\/\/gcc.gnu.org\/ , 2014 . GCC (GNU C Compiler). http:\/\/gcc.gnu.org\/, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178446"},{"key":"e_1_3_2_1_6_1","author":"Chuang W.","year":"2007","unstructured":"W. Chuang , S. Narayanasamy , and B. Calder . Accelerating Meta Data Checks for Software Correctness and Security. Journal of Instruction-Level Parallelism , 2007 . W. Chuang, S. Narayanasamy, and B. Calder. Accelerating Meta Data Checks for Software Correctness and Security. Journal of Instruction-Level Parallelism, 2007.","journal-title":"Journal of Instruction-Level Parallelism"},{"key":"e_1_3_2_1_7_1","volume-title":"Usenix Security","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , J. Walpole , P. Bakke , S. Beattie , A. Grier , P. Wagle , Q. Zhang , and H. Hinton . StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks . In Usenix Security , 1998 . C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In Usenix Security, 1998."},{"key":"e_1_3_2_1_8_1","volume-title":"DARPA Information Survivability Conference and Exposition.","author":"Cowan C.","year":"2000","unstructured":"C. Cowan , P. Wagle , C. Pu , S. Beattie , and J. Walpole . Buffer overflows: attacks and defenses for the vulnerability of the decade . In DARPA Information Survivability Conference and Exposition. , 2000 . C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: attacks and defenses for the vulnerability of the decade. In DARPA Information Survivability Conference and Exposition., 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294295"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542142.2542143"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647508.2647521"},{"key":"e_1_3_2_1_14_1","volume-title":"GCC Developers Summit. Citeseer","author":"Eigler F. C.","year":"2003","unstructured":"F. C. Eigler . Mudflap : Pointer Use Checking for C\/C+ . In GCC Developers Summit. Citeseer , 2003 . F. C. Eigler. Mudflap: Pointer Use Checking for C\/C+. In GCC Developers Summit. Citeseer, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660252.2660256"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647508.2647528"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2633301.2633302"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724525.2728790"},{"key":"e_1_3_2_1_19_1","unstructured":"Hans-J. Boehm. A garbage collector for C and C++. http:\/\/www.hboehm.info\/gc\/ 2015.  Hans-J. Boehm. A garbage collector for C and C++. http:\/\/www.hboehm.info\/gc\/ 2015."},{"key":"e_1_3_2_1_20_1","volume-title":"In Proc. of the","author":"Hastings R.","year":"1992","unstructured":"R. Hastings and B. Joyce . Purify: Fast detection of memory leaks and access errors . In In Proc. of the Winter 1992 USENIX Conference. Citeseer , 1991. R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In In Proc. of the Winter 1992 USENIX Conference. Citeseer, 1991."},{"key":"e_1_3_2_1_21_1","unstructured":"U. H\u00f6lzle C. Chambers and D. Ungar. Debugging Optimized Code with Dynamic Deoptimization. SIGPLAN Not. URL http:\/\/doi.acm.org\/10.1145\/143103.143114.  U. H\u00f6lzle C. Chambers and D. Ungar. Debugging Optimized Code with Dynamic Deoptimization. SIGPLAN Not. URL http:\/\/doi.acm.org\/10.1145\/143103.143114."},{"key":"e_1_3_2_1_22_1","volume-title":"ECOOP'91","author":"H\u00f6lzle U.","year":"1991","unstructured":"U. H\u00f6lzle , C. Chambers , and D. Ungar . Optimizing dynamically-typed object-oriented languages with polymorphic inline caches . In ECOOP'91 . Springer , 1991 . URL http:\/\/dx.doi.org\/10.1007\/BFb0057013. 10.1007\/BFb0057013 U. H\u00f6lzle, C. Chambers, and D. Ungar. Optimizing dynamically-typed object-oriented languages with polymorphic inline caches. In ECOOP'91. Springer, 1991. URL http:\/\/dx.doi.org\/10.1007\/BFb0057013."},{"key":"e_1_3_2_1_23_1","volume-title":"AADEBUG. Citeseer","author":"Jones R. W.","year":"1997","unstructured":"R. W. Jones and P. H. Kelly . Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs . In AADEBUG. Citeseer , 1997 . R. W. Jones and P. H. Kelly. Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs. In AADEBUG. Citeseer, 1997."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337159.2337181"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544147"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254820"},{"key":"e_1_3_2_1_31_1","unstructured":"Oracle. OpenJDK: Graal project. http:\/\/openjdk.java.net\/projects\/graal\/ 2013.  Oracle. OpenJDK: Graal project. http:\/\/openjdk.java.net\/projects\/graal\/ 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_33_1","volume-title":"NDSS","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. S. Lam . A Practical Dynamic Buffer Overflow Detector . In NDSS , 2004 . O. Ruwase and M. S. Lam. A Practical Dynamic Buffer Overflow Detector. In NDSS, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2617548.2617550"},{"key":"e_1_3_2_1_35_1","volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference","author":"Serebryany K.","year":"2012","unstructured":"K. Serebryany , D. Bruening , A. Potapenko , and D. Vyukov . AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference , 2012 . K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov. AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference, 2012."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247362"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2105"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2489837.2489846"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544157"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346205"},{"key":"e_1_3_2_1_42_1","volume-title":"NDSS","author":"Wagner D.","year":"2000","unstructured":"D. Wagner , J. S. Foster , E. A. Brewer , and A. Aiken . A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities . In NDSS , 2000 . D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities. In NDSS, 2000."},{"key":"e_1_3_2_1_43_1","volume-title":"An Object Storage Model for the Truffle Language Implementation Framework. PPPJ '14","author":"W\u00f6\u00df A.","year":"2014","unstructured":"A. W\u00f6\u00df , C. Wirth , D. Bonetta , C. Seaton , C. Humer , and H. M\u00f6ssenb\u00f6ck . An Object Storage Model for the Truffle Language Implementation Framework. PPPJ '14 , 2014 . URL http:\/\/dx.doi.org\/10.1145\/2647508.2647517. 10.1145\/2647508.2647517 A. W\u00f6\u00df, C. Wirth, D. Bonetta, C. Seaton, C. Humer, and H. M\u00f6ssenb\u00f6ck. An Object Storage Model for the Truffle Language Implementation Framework. PPPJ '14, 2014. URL http:\/\/dx.doi.org\/10.1145\/2647508.2647517."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294325.1294343"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384577.2384587"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509578.2509581"}],"event":{"name":"ECOOP '15: European Conference on Object-Oriented Programming ECOOP 2015","sponsor":["CTU Czech Technical University in Prague","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","AITO Assoc Internationale por les Technologies Objects"],"location":"Prague Czech Republic","acronym":"ECOOP '15"},"container-title":["Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786558.2786565","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786558.2786565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:41Z","timestamp":1750223261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786558.2786565"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,4]]},"references-count":46,"alternative-id":["10.1145\/2786558.2786565","10.1145\/2786558"],"URL":"https:\/\/doi.org\/10.1145\/2786558.2786565","relation":{},"subject":[],"published":{"date-parts":[[2015,7,4]]},"assertion":[{"value":"2015-07-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}