{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:36:28Z","timestamp":1769722588405,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Research Program of Frontier Sciences, Chinese Academy of Sciences","award":["QYZDJ-SSW-JSC036"],"award-info":[{"award-number":["QYZDJ-SSW-JSC036"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1736209, U1836209"],"award-info":[{"award-number":["U1736209, U1836209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences (YICAS)","award":["2017151"],"award-info":[{"award-number":["2017151"]}]},{"name":"Blockchain Technology and Application Joint Laboratory, Guiyang Academy of Information Technology (Institute of Software Chinese Academy of Sciences Guiyang Branch)"},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["2017QNRC001"],"award-info":[{"award-number":["2017QNRC001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338927","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"706-717","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Detecting concurrency memory corruption vulnerabilities"],"prefix":"10.1145","author":[{"given":"Yan","family":"Cai","sequence":"first","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]},{"given":"Biyun","family":"Zhu","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Ruijie","family":"Meng","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Hao","family":"Yun","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Liang","family":"He","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]},{"given":"Purui","family":"Su","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China \/ University of Chinese Academy of Sciences, China"}]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Feb. 2019 (last accessed). Common Vulnerabilities and Exposures. https:\/\/cve. mitre.org\/.  Feb. 2019 (last accessed). Common Vulnerabilities and Exposures. https:\/\/cve. mitre.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Feb. 2019 (last accessed). Dirty Cow (CVE-2016-5195). https:\/\/dirtycow.ninja\/.  Feb. 2019 (last accessed). Dirty Cow (CVE-2016-5195). https:\/\/dirtycow.ninja\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Feb. 2019 (last accessed). Helgrind: a thread error detector. http:\/\/valgrind.org\/ docs\/manual\/hg-manual.html.  Feb. 2019 (last accessed). Helgrind: a thread error detector. http:\/\/valgrind.org\/ docs\/manual\/hg-manual.html."},{"key":"e_1_3_2_1_4_1","volume-title":"August 26\u201330","year":"2019"},{"key":"e_1_3_2_1_5_1","unstructured":"Feb. 2019 (last accessed). OpenSSL NULL Pointer Dereference Vulnerabilities. http:\/\/www.securiteam.com\/securitynews\/5FP3B00HQE.html.  Feb. 2019 (last accessed). OpenSSL NULL Pointer Dereference Vulnerabilities. http:\/\/www.securiteam.com\/securitynews\/5FP3B00HQE.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Feb. 2019 (last accessed).. PeachTech. https:\/\/www.peach.tech.  Feb. 2019 (last accessed).. PeachTech. https:\/\/www.peach.tech."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806626"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736040"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336769"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786839"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2537335"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568312"},{"key":"e_1_3_2_1_13_1","unstructured":"2568312  2568312"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950310"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_16_1","volume-title":"Workshop. Springer-Verlag","author":"Clarke Edmund M."},{"key":"e_1_3_2_1_17_1","volume-title":"Model checking","author":"Clarke Edmund M"},{"key":"e_1_3_2_1_18_1","unstructured":"Matthew Conover. Feb. 2019 (last accessed). Double Free Vulnerabilities. https: \/\/www.symantec.com\/connect\/blogs\/double-free-vulnerabilities-part-1.  Matthew Conover. Feb. 2019 (last accessed). Double Free Vulnerabilities. https: \/\/www.symantec.com\/connect\/blogs\/double-free-vulnerabilities-part-1."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924954"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393651"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106242"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180225"},{"key":"e_1_3_2_1_25_1","volume-title":"Razzer: Finding Kernel Race Bugs through Fuzzing. In Razzer: Finding Kernel Race Bugs through Fuzzing","author":"Jeong Dae R","year":"2018"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770351.1770386"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062374"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"e_1_3_2_1_30_1","volume-title":"Preventing Use-After-Free with Dangling Pointers Nullification. In Network and Distributed System Security Symposium (NDSS).","author":"Lee Dyoungyoung","year":"2015"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669181"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542491"},{"key":"e_1_3_2_1_34_1","unstructured":"1542491  1542491"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276515"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250785"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855760"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.32"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250738"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453121"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/781498.781529"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134019"},{"key":"e_1_3_2_1_45_1","unstructured":"K. Qiu Z. Zheng K. S. Trivedi and B. Yin. 2019. Stress Testing With Influencing Factors to Accelerate Data Race Software Failures. IEEE Transactions on Reliability (2019) 1\u201319.  K. Qiu Z. Zheng K. S. Trivedi and B. Yin. 2019. Stress Testing With Influencing Factors to Accelerate Data Race Software Failures. IEEE Transactions on Reliability (2019) 1\u201319."},{"key":"e_1_3_2_1_46_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In Network and Distributed System Security Symposium (NDSS).","author":"Rawat Snajay","year":"2017"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the third International Conference on Runtime Verification (RV\u201912)","volume":"7687","author":"Serbanuta Traian Florin","year":"2012"},{"key":"e_1_3_2_1_50_1","volume-title":"Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Serebryany Konstantin"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791203"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103702"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103702"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287654"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064037"},{"key":"e_1_3_2_1_57_1","volume-title":"Concurrency Attack. In 4th USENIX Workshop on Hot Topoics in Parallelism (HOTPAR).","author":"Yang Junfeng","year":"2012"},{"key":"e_1_3_2_1_58_1","volume-title":"Concurrency Attacks. In Proceedings of the 4th USENIX Conference on Hot Topics in Parallelism (HotPar\u201912)","author":"Yang Junfeng","year":"2012"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384651"},{"key":"e_1_3_2_1_60_1","unstructured":"Michal Zalewski. Feb. 2019 (last accessed). American Fuzzy Lop. http:\/\/lcamtuf. coredump.cx\/afl\/.  Michal Zalewski. Feb. 2019 (last accessed). American Fuzzy Lop. http:\/\/lcamtuf. coredump.cx\/afl\/."}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338927","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:20Z","timestamp":1750206380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338927"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":60,"alternative-id":["10.1145\/3338906.3338927","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338927","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}