{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T09:04:42Z","timestamp":1768727082752,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T00:00:00Z","timestamp":1524441600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Cisco Systems, Inc.","award":["1138109"],"award-info":[{"award-number":["1138109"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,23]]},"DOI":"10.1145\/3190508.3190553","type":"proceedings-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T17:23:36Z","timestamp":1524072216000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Delta pointers"],"prefix":"10.1145","author":[{"given":"Taddeus","family":"Kroes","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Koen","family":"Koning","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Erik","family":"van der Kouwe","sequence":"additional","affiliation":[{"name":"Leiden University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Periklis Akritidis Manuel Costa Miguel Castro and Steven Hand. 2009. Baggy Bounds Checking: An Efficient and Backwards-compatible Defense Against Out-of-bounds Errors. In USENIX Security.   Periklis Akritidis Manuel Costa Miguel Castro and Steven Hand. 2009. Baggy Bounds Checking: An Efficient and Backwards-compatible Defense Against Out-of-bounds Errors. In USENIX Security."},{"key":"e_1_3_2_1_2_1","unstructured":"ARM. 2015. ARM Cortex-A Series - Programmer's Guide for ARMv8-A.  ARM. 2015. ARM Cortex-A Series - Programmer's Guide for ARMv8-A."},{"key":"e_1_3_2_1_3_1","first-page":"2013","volume":"201","journal-title":"Mike Ash."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Erik Bosman Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. In S&P.  Erik Bosman Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2016. Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. In S&P.","DOI":"10.1109\/SP.2016.63"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958203"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694367"},{"key":"e_1_3_2_1_8_1","unstructured":"The MITRE Corporation. 2018. Common Vulnerabilities and Exposures. http:\/\/cve.mitre.org\/. (2018).  The MITRE Corporation. 2018. Common Vulnerabilities and Exposures. http:\/\/cve.mitre.org\/. (2018)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/277650.277670"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_12_1","unstructured":"Gregory J. Duck Roland H. C. Yap and Lorenzo Cavallaro. 2017. Stack Bounds Protection with Low Fat Pointers. In NDSS.  Gregory J. Duck Roland H. C. Yap and Lorenzo Cavallaro. 2017. Stack Bounds Protection with Low Fat Pointers. In NDSS."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Robert van Engelen. 2001. Efficient Symbolic Analysis for Optimizing Compilers. In CC.   Robert van Engelen. 2001. Efficient Symbolic Analysis for Optimizing Compilers. In CC.","DOI":"10.1007\/3-540-45306-7_9"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1973.5009130"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany and Thorsten Holz. 2016. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding. In NDSS.  Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany and Thorsten Holz. 2016. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding. In NDSS.","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_1_16_1","unstructured":"Enes G\u00f6kta\u015f Robert Gawlik Benjamin Kollenda Elias Athanasopoulos Georgios Portokalidis Cristiano Giuffrida and Herbert Bos. 2016. Undermining Entropy-based Information Hiding (And What to do About it). In USENIX Security.  Enes G\u00f6kta\u015f Robert Gawlik Benjamin Kollenda Elias Athanasopoulos Georgios Portokalidis Cristiano Giuffrida and Herbert Bos. 2016. Undermining Entropy-based Information Hiding (And What to do About it). In USENIX Security."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Ben Gras Kaveh Razavi Erik Bosman Herbert Bos and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU. In NDSS.  Ben Gras Kaveh Razavi Erik Bosman Herbert Bos and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU. In NDSS.","DOI":"10.14722\/ndss.2017.23271"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259034"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_20_1","unstructured":"Intel Corporation. 2017. Intel 64 and IA-32 Architectures Software Developer's Manual.  Intel Corporation. 2017. Intel 64 and IA-32 Architectures Software Developer's Manual."},{"key":"e_1_3_2_1_21_1","unstructured":"ISO\/IEC. 1999. International Standard ISO\/IEC 9899:1999 (E) - Programming Language C. (1999).  ISO\/IEC. 1999. International Standard ISO\/IEC 9899:1999 (E) - Programming Language C. (1999)."},{"key":"e_1_3_2_1_22_1","volume-title":"Cyclone: A Safe Dialect of C. In USENIX ATC.","author":"Jim Trevor","year":"2002"},{"key":"e_1_3_2_1_23_1","unstructured":"Richard WM Jones and Paul HJ Kelly. 1997. Backwards-compatible bounds checking for arrays and pointers in C programs. In AADEBUG.  Richard WM Jones and Paul HJ Kelly. 1997. Backwards-compatible bounds checking for arrays and pointers in C programs. In AADEBUG."},{"key":"e_1_3_2_1_24_1","first-page":"2009","volume":"200","journal-title":"Tobias Klein."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065920"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_27_1","volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In CGO.","author":"Lattner Chris","year":"2004"},{"key":"e_1_3_2_1_29_1","unstructured":"Matt Miller. 2017. Heap corruption issues reported to Microsoft. (2017). https:\/\/twitter.com\/epakskape\/status\/851479629873332224  Matt Miller. 2017. Heap corruption issues reported to Microsoft. (2017). https:\/\/twitter.com\/epakskape\/status\/851479629873332224"},{"key":"e_1_3_2_1_30_1","unstructured":"Steven S. Muchnick. 1997. Advanced Compiler Design and Implementation.   Steven S. Muchnick. 1997. Advanced Compiler Design and Implementation."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_33_1","unstructured":"Angelos Oikonomopoulos Cristiano Giuffrida Elias Athanasopoulos and Herbert Bos. 2016. Poking Holes into Information Hiding. In USENIX Security.  Angelos Oikonomopoulos Cristiano Giuffrida Elias Athanasopoulos and Herbert Bos. 2016. Poking Holes into Information Hiding. In USENIX Security."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Oleksii Oleksenko Dmitrii Kuvaiskii Pramod Bhatotia Pascal Felber and Christof Fetzer. 2017. Intel MPX Explained: An Empirical Study of Intel MPX and Software-based Bounds Checking Approaches. arXiv (2017).  Oleksii Oleksenko Dmitrii Kuvaiskii Pramod Bhatotia Pascal Felber and Christof Fetzer. 2017. Intel MPX Explained: An Empirical Study of Intel MPX and Software-based Bounds Checking Approaches. arXiv (2017).","DOI":"10.1145\/3219617.3219662"},{"key":"e_1_3_2_1_35_1","unstructured":"Oracle. 2014. M7: Next Generation SPARC. (2014).  Oracle. 2014. M7: Next Generation SPARC. (2014)."},{"key":"e_1_3_2_1_36_1","unstructured":"Olatunji Ruwase and Monica S. Lam. 2004. A Practical Dynamic Buffer Overflow Detector. In NDSS.  Olatunji Ruwase and Monica S. Lam. 2004. A Practical Dynamic Buffer Overflow Detector. In NDSS."},{"key":"e_1_3_2_1_37_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX ATC.   Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX ATC."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755707"}],"event":{"name":"EuroSys '18: Thirteenth EuroSys Conference 2018","location":"Porto Portugal","acronym":"EuroSys '18","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Thirteenth EuroSys Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3190508.3190553","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T01:54:25Z","timestamp":1673488465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3190508.3190553"}},"subtitle":["buffer overflow checks without the checks"],"short-title":[],"issued":{"date-parts":[[2018,4,23]]},"references-count":37,"alternative-id":["10.1145\/3190508.3190553","10.1145\/3190508"],"URL":"https:\/\/doi.org\/10.1145\/3190508.3190553","relation":{},"subject":[],"published":{"date-parts":[[2018,4,23]]},"assertion":[{"value":"2018-04-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}