{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:59:17Z","timestamp":1755838757265,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274705","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"17-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Type-After-Type"],"prefix":"10.1145","author":[{"given":"Erik","family":"van der Kouwe","sequence":"first","affiliation":[{"name":"Leiden University"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Taddeus","family":"Kroes","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chris","family":"Ouwehand","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. The Go Programming Language. https:\/\/www.golang.org.  {n. d.}. The Go Programming Language. https:\/\/www.golang.org."},{"volume-title":"Cling: A Memory Allocator to Mitigate Dangling Pointers.. In USENIX Security.","year":"2010","author":"Akritidis Periklis","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178446"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_5_1","unstructured":"Hans Boehm. {n. d.}. A garbage collector for C and C++. http:\/\/www.hboehm.info\/gc\/.  Hans Boehm. {n. d.}. A garbage collector for C and C++. http:\/\/www.hboehm.info\/gc\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Xi Chen Asia Slowinska Dennis Andriesse Herbert Bos and Cristiano Giuffrida. 2015. StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.. In NDSS.  Xi Chen Asia Slowinska Dennis Andriesse Herbert Bos and Cristiano Giuffrida. 2015. StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.. In NDSS.","DOI":"10.14722\/ndss.2015.23248"},{"key":"e_1_3_2_1_7_1","unstructured":"The MITRE Corporation. {n. d.}. Common Vulnerabilities and Exposures. http:\/\/cve.mitre.org\/.  The MITRE Corporation. {n. d.}. Common Vulnerabilities and Exposures. http:\/\/cve.mitre.org\/."},{"volume-title":"Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. In USENIX Security.","year":"2017","author":"Dang Thurston HY","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053271.1053275"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_11_1","unstructured":"The Mozilla Foundation. {n. d.}. DROMAEO JavaScript Performance Testing. https:\/\/www.webkit.org\/perf\/sunspider\/sunspider.html.  The Mozilla Foundation. {n. d.}. DROMAEO JavaScript Performance Testing. https:\/\/www.webkit.org\/perf\/sunspider\/sunspider.html."},{"key":"e_1_3_2_1_12_1","unstructured":"S. Ghemawat and P. Menage. {n. d.}. Thread-caching Malloc. http:\/\/goog-perftools.sourceforge.net\/doc\/tcmalloc.html.  S. Ghemawat and P. Menage. {n. d.}. Thread-caching Malloc. http:\/\/goog-perftools.sourceforge.net\/doc\/tcmalloc.html."},{"key":"e_1_3_2_1_13_1","unstructured":"Google. {n. d.}. Blink GC API reference. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/master\/third_party\/WebKit\/Source\/platform\/heap\/BlinkGCAPIReference.md.  Google. {n. d.}. Blink GC API reference. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/master\/third_party\/WebKit\/Source\/platform\/heap\/BlinkGCAPIReference.md."},{"key":"e_1_3_2_1_14_1","unstructured":"Google. {n. d.}. Chrome. https:\/\/www.google.com\/chrome\/.  Google. {n. d.}. Chrome. https:\/\/www.google.com\/chrome\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Google. {n. d.}. Octane Benchmark. https:\/\/code.google.com\/p\/octane-benchmark.  Google. {n. d.}. Octane Benchmark. https:\/\/code.google.com\/p\/octane-benchmark."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. {n. d.}. SunSpider Benchmark. https:\/\/www.webkit.org\/perf\/sunspider\/sunspider.html.  Google. {n. d.}. SunSpider Benchmark. https:\/\/www.webkit.org\/perf\/sunspider\/sunspider.html."},{"key":"e_1_3_2_1_17_1","unstructured":"Abdul-Aziz Hariri Brian Gorenc and Simon Zuckerbraun. 2015. Abusing Silent Mitigations: Understanding weaknesses within Internet Explorer's Isolated Heap and Memory Protection. In Black Hat USA.  Abdul-Aziz Hariri Brian Gorenc and Simon Zuckerbraun. 2015. Abusing Silent Mitigations: Understanding weaknesses within Internet Explorer's Isolated Heap and Memory Protection. In Black Hat USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"volume-title":"Cyclone: A Safe Dialect of C. In USENIX ATC.","year":"2002","author":"Jim Trevor","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190553"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_22_1","unstructured":"Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2014. Code-pointer Integrity. In OSDI.   Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2014. Code-pointer Integrity. In OSDI."},{"volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In CGO.","year":"2004","author":"Lattner Chris","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"Byoungyoung Lee Chengyu Song Yeongjin Jang Tielei Wang Taesoo Kim Long Lu and Wenke Lee. 2015. Preventing Use-after-free with Dangling Pointers Nullification.. In NDSS.  Byoungyoung Lee Chengyu Song Yeongjin Jang Tielei Wang Taesoo Kim Long Lu and Wenke Lee. 2015. Preventing Use-after-free with Dangling Pointers Nullification.. In NDSS."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978366"},{"key":"e_1_3_2_1_26_1","unstructured":"Kangjie Lu Marie-Therese Walter David Pfaff Stefan N\u00fcrnberger Wenke Lee and Michael Backes. 2017. Unleashing use-before-initialization vulnerabilities in the Linux kernel using targeted stack spraying. In NDSS.  Kangjie Lu Marie-Therese Walter David Pfaff Stefan N\u00fcrnberger Wenke Lee and Michael Backes. 2017. Unleashing use-before-initialization vulnerabilities in the Linux kernel using targeted stack spraying. In NDSS."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Alyssa Milburn Herbert Bos and Cristiano Giuffrida. 2017. SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. In NDSS.  Alyssa Milburn Herbert Bos and Cristiano Giuffrida. 2017. SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities. In NDSS.","DOI":"10.14722\/ndss.2017.23183"},{"key":"e_1_3_2_1_28_1","unstructured":"Matt Miller. 2017. Uninitialized use by the containing memory region type (stack heap other). http:\/\/pic.twitter.com\/Buj5xJaPD0.  Matt Miller. 2017. Uninitialized use by the containing memory region type (stack heap other). http:\/\/pic.twitter.com\/Buj5xJaPD0."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508275"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866371"},{"key":"e_1_3_2_1_33_1","unstructured":"Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking Holes in Information Hiding. In USENIX Security.   Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking Holes in Information Hiding. In USENIX Security."},{"key":"e_1_3_2_1_34_1","unstructured":"Oracle. {n. d.}. Java. https:\/\/www.java.com\/.  Oracle. {n. d.}. Java. https:\/\/www.java.com\/."},{"volume-title":"Proceedings of the 24th Annual Symposium on Network and Distributed System Security (NDSS'17)","author":"Pawlowski Andre","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542431.1542438"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991121"},{"volume-title":"Address Sanitizer: A Fast Address Sanity Checker. In USENIX ATC.","year":"2012","author":"Serebryany Konstantin","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","unstructured":"Jack Tang. 2014. Mitigating UAF Exploits with Delay Free for Internet Explorer. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/mitigating-uaf-exploits-with-delay-free-for-internet-explorer\/.  Jack Tang. 2014. Mitigating UAF Exploits with Delay Free for Internet Explorer. http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/mitigating-uaf-exploits-with-delay-free-for-internet-explorer\/."},{"volume-title":"Microsoft Edge: Building a safer browser. https:\/\/blogs.windows.com\/msedgedev\/2015\/05\/11\/microsoft-edge-building-a-safer-browser\/.","year":"2015","author":"Team Microsoft Edge","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","unstructured":"The Mozilla Foundation. {n. d.}. Mozilla Firefox. https:\/\/www.mozilla.org\/firefox.  The Mozilla Foundation. {n. d.}. Mozilla Firefox. https:\/\/www.mozilla.org\/firefox."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064211"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1041685.1029913"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940113"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Yves Younan. 2015. FreeSentry: Protecting against Use-after-free Vulnerabilities due to Dangling Pointers. In NDSS.  Yves Younan. 2015. FreeSentry: Protecting against Use-after-free Vulnerabilities due to Dangling Pointers. In NDSS.","DOI":"10.14722\/ndss.2015.23190"}],"event":{"name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"San Juan PR USA","acronym":"ACSAC '18"},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274705"}},"subtitle":["Practical and Complete Type-Safe Memory Reuse"],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":45,"alternative-id":["10.1145\/3274694.3274705","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274705","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}