{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:55:11Z","timestamp":1763499311504,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS-1749711"],"award-info":[{"award-number":["CNS-1749711"]}]},{"name":"ONR","award":["N00014-18-1-2662"],"award-info":[{"award-number":["N00014-18-1-2662"]}]},{"name":"DARPA","award":["PA1903-02-AIMEE-FP-017"],"award-info":[{"award-number":["PA1903-02-AIMEE-FP-017"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3482788","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"4-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Are we done yet? Our Journey to Fight against Memory-safety Bugs"],"prefix":"10.1145","author":[{"given":"Taesoo","family":"Kim","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology &amp; Samsung Research, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"MSRC Microsoft A proactive approach to more secure code https:\/\/msrc-blog.microsoft.com\/2019\/07\/16\/a-proactive-approach-to-more-secure-code\/"},{"key":"e_1_3_2_1_2_1","unstructured":"The Chromium Projects Google Memory safety https:\/\/www.chromium.org\/Home\/chromium-security\/memory-safety"},{"key":"e_1_3_2_1_3_1","volume-title":"Jungwon Lim and Taesoo Kim. In Proceedings of the 28th ACM Symposium on Operating Systems Principles (SOSP 2021","author":"Rudra","year":"2021","unstructured":"Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale,Yechan Bae, Youngsuk Kim, Ammar Askar, Jungwon Lim and Taesoo Kim. In Proceedings of the 28th ACM Symposium on Operating Systems Principles (SOSP 2021), Virtual, October 2021"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3482788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3482788","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3482788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:48:17Z","timestamp":1763498897000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3482788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":3,"alternative-id":["10.1145\/3460120.3482788","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3482788","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}