{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:26:38Z","timestamp":1752981998637,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Chinese National Natural Science Foundation","award":["61272078,61073027"],"award-info":[{"award-number":["61272078,61073027"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3274694.3274719","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T13:07:01Z","timestamp":1543928821000},"page":"518-528","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Mapping to Bits"],"prefix":"10.1145","author":[{"given":"Chengbin","family":"Pang","sequence":"first","affiliation":[{"name":"National Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, China"}]},{"given":"Yunlan","family":"Du","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, China"}]},{"given":"Bing","family":"Mao","sequence":"additional","affiliation":[{"name":"National Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, China"}]},{"given":"Shanqing","family":"Guo","sequence":"additional","affiliation":[{"name":"Key Laboratory of Cryptologie Technology and Information Security, Ministry of Education Shandong University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"volume-title":"Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/.Online","year":"2018","unstructured":"2018. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/.Online ; accessed on June 14, 2018 . 2018. Common Vulnerabilities and Exposures. https:\/\/cve.mitre.org\/.Online; accessed on June 14, 2018.","key":"e_1_3_2_1_1_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_3_1","volume-title":"The LLVM Compiler Infrastructure. https:\/\/llvm.org\/. Online","author":"LLVM","year":"2018","unstructured":"LLVM admin team. 2018. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/. Online ; accessed June 3, 2018 . LLVM admin team. 2018. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/. Online; accessed June 3, 2018."},{"key":"e_1_3_2_1_4_1","volume-title":"Rami G\u00f6khan Kici, and Sorin Lerner","author":"Bounov Dimitar","year":"2016","unstructured":"Dimitar Bounov , Rami G\u00f6khan Kici, and Sorin Lerner . 2016 . Protecting C++ Dynamic Dispatch Through VTable Interleaving.. In NDSS. Dimitar Bounov, Rami G\u00f6khan Kici, and Sorin Lerner. 2016. Protecting C++ Dynamic Dispatch Through VTable Interleaving.. In NDSS."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/3054924"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.14722\/ndss.2018.23279"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/3052973.3052983"},{"key":"e_1_3_2_1_8_1","volume-title":"SPEC CPU2006","author":"Standard Performance Evaluation Corporation","year":"2018","unstructured":"Standard Performance Evaluation Corporation . 2018 . SPEC CPU2006 . http:\/\/www.spec.org\/cpu2006. Online; accessed June 3, 2018. Standard Performance Evaluation Corporation. 2018. SPEC CPU2006. http:\/\/www.spec.org\/cpu2006. Online; accessed June 3, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/SP.2014.26"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1323293.1294295"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.14722\/ndss.2017.23287"},{"key":"e_1_3_2_1_12_1","volume-title":"Jemalloc: General Purpose Memory Allocation Functions","author":"Evans Jason","year":"2018","unstructured":"Jason Evans . 2018 . Jemalloc: General Purpose Memory Allocation Functions . http:\/\/jemalloc.net\/. Online; accessed on June 3, 2018. Jason Evans. 2018. Jemalloc: General Purpose Memory Allocation Functions. http:\/\/jemalloc.net\/. Online; accessed on June 3, 2018."},{"unstructured":"The Mozilla Foundation. 2018. DROMEAO JavaScript Performance Testing. http:\/\/dromaeo.com\/. Online; accessed June 3 2018.  The Mozilla Foundation. 2018. DROMEAO JavaScript Performance Testing. http:\/\/dromaeo.com\/. Online; accessed June 3 2018.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/www.mozilla.org\/en-US\/firefox\/53.0.3\/releasenotes\/. Online","author":"Foundation The Mozilla","year":"2018","unstructured":"The Mozilla Foundation . 2018. Mozilla Firefox . https:\/\/www.mozilla.org\/en-US\/firefox\/53.0.3\/releasenotes\/. Online ; accessed June 3, 2018 . The Mozilla Foundation. 2018. Mozilla Firefox. https:\/\/www.mozilla.org\/en-US\/firefox\/53.0.3\/releasenotes\/. Online; accessed June 3, 2018."},{"key":"e_1_3_2_1_15_1","volume-title":"2016 IEEE European Symposium on. IEEE, 179--194","author":"Ge Xinyang","year":"2016","unstructured":"Xinyang Ge , Nirupama Talele , Mathias Payer , and Trent Jaeger . 2016 . Fine-grained control-flow integrity for kernel software. In Security and Privacy (EuroS&P) , 2016 IEEE European Symposium on. IEEE, 179--194 . Xinyang Ge, Nirupama Talele, Mathias Payer, and Trent Jaeger. 2016. Fine-grained control-flow integrity for kernel software. In Security and Privacy (EuroS&P), 2016 IEEE European Symposium on. IEEE, 179--194."},{"unstructured":"Wolfram Gloger. 2018. Ptmalloc3: A Multi-Thread Malloc Implementation. http:\/\/www.malloc.de\/malloc\/ptmalloc3.tar.gz. Online; accessed on June 3 2018.  Wolfram Gloger. 2018. Ptmalloc3: A Multi-Thread Malloc Implementation. http:\/\/www.malloc.de\/malloc\/ptmalloc3.tar.gz. Online; accessed on June 3 2018.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/chromium.github.io\/octane\/. Online","author":"Benchmark Octane","year":"2018","unstructured":"Google. 2018. Octane Benchmark . https:\/\/chromium.github.io\/octane\/. Online ; accessed June 3, 2018 . Google. 2018. Octane Benchmark. https:\/\/chromium.github.io\/octane\/. Online; accessed June 3, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/2818000.2818025"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2976749.2978405"},{"key":"e_1_3_2_1_20_1","volume-title":"In Proc. of the","author":"Hastings Reed","year":"1991","unstructured":"Reed Hastings and Bob Joyce . 1991 . Purify: Fast detection of memory leaks and access errors . In In Proc. of the Winter 1992 USENIX Conference. Citeseer. Reed Hastings and Bob Joyce. 1991. Purify: Fast detection of memory leaks and access errors. In In Proc. of the Winter 1992 USENIX Conference. Citeseer."},{"doi-asserted-by":"crossref","unstructured":"Dongseok Jang Zachary Tatlock and Sorin Lerner. 2014. SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. In NDSS.  Dongseok Jang Zachary Tatlock and Sorin Lerner. 2014. SafeDispatch: Securing C++ Virtual Calls from Memory Corruption Attacks. In NDSS.","key":"e_1_3_2_1_21_1","DOI":"10.14722\/ndss.2014.23287"},{"doi-asserted-by":"crossref","unstructured":"Yuseok Jeon Priyam Biswas Scott Carr Byoungyoung Lee and Mathias Payer. 2017. HexType: Efficient Detection of Type Confusion Errors for C++. (2017).  Yuseok Jeon Priyam Biswas Scott Carr Byoungyoung Lee and Mathias Payer. 2017. HexType: Efficient Detection of Type Confusion Errors for C++. (2017).","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3133956.3134062"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Annual Technical Conference, General Track. 275--288","author":"Jim Trevor","year":"2002","unstructured":"Trevor Jim , J Gregory Morrisett , Dan Grossman , Michael W Hicks , James Cheney , and Yanling Wang . 2002 . Cyclone: A Safe Dialect of C .. In USENIX Annual Technical Conference, General Track. 275--288 . Trevor Jim, J Gregory Morrisett, Dan Grossman, Michael W Hicks, James Cheney, and Yanling Wang. 2002. Cyclone: A Safe Dialect of C.. In USENIX Annual Technical Conference, General Track. 275--288."},{"key":"e_1_3_2_1_24_1","first-page":"00000","article-title":"Code-Pointer Integrity","volume":"14","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov , L\u00e1szl\u00f3 Szekeres , Mathias Payer , George Candea , R Sekar , and Dawn Song . 2014 . Code-Pointer Integrity . In OSDI , Vol. 14. 00000 . Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, R Sekar, and Dawn Song. 2014. Code-Pointer Integrity. In OSDI, Vol. 14. 00000.","journal-title":"OSDI"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium. 81--96","author":"Lee Byoungyoung","year":"2015","unstructured":"Byoungyoung Lee , Chengyu Song , Taesoo Kim , and Wenke Lee . 2015 . Type Casting Verification: Stopping an Emerging Attack Vector . In USENIX Security Symposium. 81--96 . Byoungyoung Lee, Chengyu Song, Taesoo Kim, and Wenke Lee. 2015. Type Casting Verification: Stopping an Emerging Attack Vector. In USENIX Security Symposium. 81--96."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/1543135.1542504"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/1065887.1065892"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_29_1","volume-title":"Undefined Behavior Sanitizer. https:\/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html. Online","author":"Project Google Chromium","year":"2018","unstructured":"Google Chromium Project . 2018. Undefined Behavior Sanitizer. https:\/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html. Online ; accessed June 3, 2018 . Google Chromium Project. 2018. Undefined Behavior Sanitizer. https:\/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html. Online; accessed June 3, 2018."},{"key":"e_1_3_2_1_30_1","volume-title":"compiler-rt runtime libraries. https:\/\/compiler-rt.llvm.org\/. Online","author":"Project LLVM","year":"2018","unstructured":"LLVM Project . 2018. compiler-rt runtime libraries. https:\/\/compiler-rt.llvm.org\/. Online ; accessed June 3, 2018 . LLVM Project. 2018. compiler-rt runtime libraries. https:\/\/compiler-rt.llvm.org\/. Online; accessed June 3, 2018."},{"unstructured":"LLVM Project. 2018. Writing an LLVM Pass. http:\/\/llvm.org\/docs\/WritingAnLLVMPass.html. Online; accessed June 3 2018.  LLVM Project. 2018. Writing an LLVM Pass. http:\/\/llvm.org\/docs\/WritingAnLLVMPass.html. Online; accessed June 3 2018.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","volume-title":"Quala: Type Qualifiers for LLVM\/Clang. https:\/\/github.com\/sampsyo\/quala. Online","author":"Sampson Adrian","year":"2018","unstructured":"Adrian Sampson . 2018 . Quala: Type Qualifiers for LLVM\/Clang. https:\/\/github.com\/sampsyo\/quala. Online ; accessed on June 3, 2018. Adrian Sampson. 2018. Quala: Type Qualifiers for LLVM\/Clang. https:\/\/github.com\/sampsyo\/quala. Online; accessed on June 3, 2018."},{"unstructured":"Paul Menage Sanjay Ghemawat. 2018. TCMalloc: Thread-Caching Malloc. http:\/\/goog-perftools.sourceforge.net\/doc\/tcmalloc.html. Online; accessed on June 3 2018.  Paul Menage Sanjay Ghemawat. 2018. TCMalloc: Thread-Caching Malloc. http:\/\/goog-perftools.sourceforge.net\/doc\/tcmalloc.html. Online; accessed on June 3 2018.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1145\/2991079.2991121"},{"key":"e_1_3_2_1_35_1","volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference. 309--318","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitriy Vyukov . 2012 . AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference. 309--318 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference. 309--318."},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/clang.llvm.org\/docs\/ReleaseNotes.html. Online","author":"Team Clang","year":"2018","unstructured":"Clang Team . 2018. Clang 7.0 documentation. https:\/\/clang.llvm.org\/docs\/ReleaseNotes.html. Online ; accessed June 3, 2018 . Clang Team. 2018. Clang 7.0 documentation. https:\/\/clang.llvm.org\/docs\/ReleaseNotes.html. Online; accessed June 3, 2018."},{"key":"e_1_3_2_1_37_1","volume-title":"Clang Tool documentation. https:\/\/clang.llvm.org\/docs\/ClangTools.html. Online","author":"Team Clang","year":"2018","unstructured":"Clang Team . 2018. Clang Tool documentation. https:\/\/clang.llvm.org\/docs\/ClangTools.html. Online ; accessed June 3, 2018 . Clang Team. 2018. Clang Tool documentation. https:\/\/clang.llvm.org\/docs\/ClangTools.html. Online; accessed June 3, 2018."},{"key":"e_1_3_2_1_38_1","volume-title":"Control Flow Integrity. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html. Online","author":"Clang","year":"2018","unstructured":"Clang team. 2018. Control Flow Integrity. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html. Online ; accessed June 3, 2018 . Clang team. 2018. Control Flow Integrity. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html. Online; accessed June 3, 2018."},{"key":"e_1_3_2_1_39_1","volume-title":"Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium. 941--955","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014 . Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium. 941--955 . Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In USENIX Security Symposium. 941--955."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1145\/2810103.2813673"},{"unstructured":"M. Zalewski. 2018. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/. Online; accessed on June 14 2018.  M. Zalewski. 2018. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/. Online; accessed on June 14 2018.","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","volume-title":"Zhaofeng Chen, and Dawn Song.","author":"Zhang Chao","year":"2015","unstructured":"Chao Zhang , Chengyu Song , Kevin Zhijie Chen , Zhaofeng Chen, and Dawn Song. 2015 . VTint: Protecting Virtual Function Tables' Integrity. In NDSS. Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, and Dawn Song. 2015. VTint: Protecting Virtual Function Tables' Integrity. In NDSS."},{"doi-asserted-by":"crossref","unstructured":"Chao Zhang Dawn Song Scott A Carr Mathias Payer Tongxin Li Yu Ding and Chengyu Song. 2016. VTrust: Regaining Trust on Virtual Calls. In NDSS.  Chao Zhang Dawn Song Scott A Carr Mathias Payer Tongxin Li Yu Ding and Chengyu Song. 2016. VTrust: Regaining Trust on Virtual Calls. In NDSS.","key":"e_1_3_2_1_43_1","DOI":"10.14722\/ndss.2016.23164"},{"key":"e_1_3_2_1_44_1","volume-title":"Control Flow Integrity for COTS Binaries. In USENIX Security Symposium. 337--352","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar . 2013 . Control Flow Integrity for COTS Binaries. In USENIX Security Symposium. 337--352 . Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries. In USENIX Security Symposium. 337--352."}],"event":{"sponsor":["ACSA Applied Computing Security Assoc"],"acronym":"ACSAC '18","name":"ACSAC '18: 2018 Annual Computer Security Applications Conference","location":"San Juan PR USA"},"container-title":["Proceedings of the 34th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274719","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3274694.3274719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:56Z","timestamp":1750208276000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3274694.3274719"}},"subtitle":["Efficiently Detecting Type Confusion Errors"],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":44,"alternative-id":["10.1145\/3274694.3274719","10.1145\/3274694"],"URL":"https:\/\/doi.org\/10.1145\/3274694.3274719","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}