{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:24:22Z","timestamp":1755998662675,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1657711, CNS-1513783"],"award-info":[{"award-number":["CNS-1657711, CNS-1513783"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196540","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"381-392","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["CUP"],"prefix":"10.1145","author":[{"given":"Nathan","family":"Burow","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Derrick","family":"McKee","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Scott A.","family":"Carr","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"volume-title":"Baggy Bounds Checking: An Efficient and Backwards-compatible Defense Against Outof-bounds Errors. In SEC'09","year":"2009","author":"Akritidis Periklis","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23279"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336769"},{"key":"e_1_3_2_1_7_1","unstructured":"Weihaw Chuang Satish Narayanasamy and Brad Calder. 2007. Accelerating meta data checks for software correctness and security. Journal of Instruction-Level Parallelism (2007). Weihaw Chuang Satish Narayanasamy and Brad Calder. 2007. Accelerating meta data checks for software correctness and security. Journal of Instruction-Level Parallelism (2007)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294295"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353534.1346295"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"volume-title":"Stack Bounds Protection with Low Fat Pointers. In NDSS'17","year":"2017","key":"e_1_3_2_1_12_1"},{"volume-title":"Mudflap: Pointer Use Checking for C\/C+. In GCC Developers Summit.","year":"2003","author":"Eigler Frank Ch","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Chris Evans. Feb 2017. https:\/\/googleprojectzero.blogspot.com\/2015\/06\/ what-is-good-memory-corruption.html. (Feb 2017). Chris Evans. Feb 2017. https:\/\/googleprojectzero.blogspot.com\/2015\/06\/ what-is-good-memory-corruption.html. (Feb 2017)."},{"key":"e_1_3_2_1_15_1","unstructured":"Chris Evans. May 2017. https:\/\/scarybeastsecurity.blogspot.com\/2017\/05\/ further-hardening-glibc-malloc-against.html?m=1. (May 2017). Chris Evans. May 2017. https:\/\/scarybeastsecurity.blogspot.com\/2017\/05\/ further-hardening-glibc-malloc-against.html?m=1. (May 2017)."},{"key":"e_1_3_2_1_16_1","unstructured":"Michael Hicks. 2014. What is memory safety? (2014). http:\/\/www.pl-enthusiast. net\/2014\/07\/21\/memory-safety\/ Michael Hicks. 2014. What is memory safety? (2014). http:\/\/www.pl-enthusiast. net\/2014\/07\/21\/memory-safety\/"},{"key":"e_1_3_2_1_17_1","unstructured":"Intel 2015. Intel Software Development Emulator. https:\/\/software.intel.com\/ en-us\/articles\/intel-software-development-emulator. (2015). Intel 2015. Intel Software Development Emulator. https:\/\/software.intel.com\/ en-us\/articles\/intel-software-development-emulator. (2015)."},{"volume-title":"Cyclone: A Safe Dialect of C. In ATC'02","year":"2002","author":"Jim Trevor","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","unstructured":"juliet 2013. National Institute of Standards and Technology Juliet C\/C++ Test Suite. https:\/\/samate.nist.gov\/SARD\/testsuite.php. (2013). juliet 2013. National Institute of Standards and Technology Juliet C\/C++ Test Suite. https:\/\/samate.nist.gov\/SARD\/testsuite.php. (2013)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23238"},{"key":"e_1_3_2_1_21_1","unstructured":"man7.org. Feb 2017. http:\/\/man7.org\/linux\/man-pages\/man3\/alloca.3.html. (Feb 2017). man7.org. Feb 2017. http:\/\/man7.org\/linux\/man-pages\/man3\/alloca.3.html. (Feb 2017)."},{"key":"e_1_3_2_1_22_1","unstructured":"Mitre. Feb 2017. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2015-0235. (Feb 2017). Mitre. Feb 2017. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2015-0235. (Feb 2017)."},{"key":"e_1_3_2_1_23_1","unstructured":"mpx 2016. AddressSanitizerIntelMemoryProtectionExtensions. https:\/\/github.com\/google\/sanitizers\/wiki\/ AddressSanitizerIntelMemoryProtectionExtensions. (2016). mpx 2016. AddressSanitizerIntelMemoryProtectionExtensions. https:\/\/github.com\/google\/sanitizers\/wiki\/ AddressSanitizerIntelMemoryProtectionExtensions. (2016)."},{"key":"e_1_3_2_1_24_1","unstructured":"musl 2016. musl libc. http:\/\/www.musl-libc.org\/. (2016). musl 2016. musl libc. http:\/\/www.musl-libc.org\/. (2016)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544147"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337159.2337181"},{"volume-title":"SNAPL'15)","year":"2015","author":"Nagarakatte Santosh","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Gene Novark and Emery D. Berger. 2011. DieHarder: Securing the Heap. In WOOT'11. Gene Novark and Emery D. Berger. 2011. DieHarder: Securing the Heap. In WOOT'11.","DOI":"10.1145\/1866307.1866371"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Christian W Otterstad. 2015. A brief evaluation of Intel\u00ae MPX. In SysCon'15. Christian W Otterstad. 2015. A brief evaluation of Intel\u00ae MPX. In SysCon'15.","DOI":"10.1109\/SYSCON.2015.7116720"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"volume-title":"ATC'12","year":"2012","author":"Serebryany Konstantin","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","unstructured":"Fermin J. Serna and Kevin Stadmeyer. Feb 2017. https:\/\/security.googleblog.com\/ 2016\/02\/cve-2015--7547-glibc-getaddrinfo-stack.html. (Feb 2017). Fermin J. Serna and Kevin Stadmeyer. Feb 2017. https:\/\/security.googleblog.com\/ 2016\/02\/cve-2015--7547-glibc-getaddrinfo-stack.html. (Feb 2017)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Alexander Sotirov. 2007. Heap feng shui in javascript. Black Hat Europe (2007). Alexander Sotirov. 2007. Heap feng shui in javascript. Black Hat Europe (2007).","DOI":"10.1215\/00265667-2007-69-7"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_39_1","unstructured":"TrendMicro. Feb 2017. http:\/\/blog.trendmicro.com\/pwn2own-day-1-recap\/. (Feb 2017). TrendMicro. Feb 2017. http:\/\/blog.trendmicro.com\/pwn2own-day-1-recap\/. (Feb 2017)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33338-5_5"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346205"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346205"},{"key":"e_1_3_2_1_43_1","unstructured":"vvdveen. Feb 2017. https:\/\/github.com\/vvdveen\/memory-errors\/. (Feb 2017). vvdveen. Feb 2017. https:\/\/github.com\/vvdveen\/memory-errors\/. (Feb 2017)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Suan Hsi Yong and Susan Horwitz. 2003. Protecting C Programs from Attacks via Invalid Pointer Dereferences. In ESEC\/FSE-11. Suan Hsi Yong and Susan Horwitz. 2003. Protecting C Programs from Attacks via Invalid Pointer Dereferences. In ESEC\/FSE-11.","DOI":"10.1145\/940071.940113"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196540","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T22:25:54Z","timestamp":1751667954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196540"}},"subtitle":["Comprehensive User-Space Protection for C\/C++"],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":44,"alternative-id":["10.1145\/3196494.3196540","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196540","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}