{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:47:06Z","timestamp":1750747626120,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507760","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"740-752","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Creating concise and efficient dynamic analyses with ALDA"],"prefix":"10.1145","author":[{"given":"Xiang","family":"Cheng","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, USA"}]},{"given":"David","family":"Devecsery","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2951913.2951948"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Annual Technical Conference, General Track. 251\u2013262","author":"Baratloo Arash","year":"2000","unstructured":"Arash Baratloo, Navjot Singh, and Timothy K Tsai. 2000. Transparent run-time defense against stack-smashing attacks.. In USENIX Annual Technical Conference, General Track. 251\u2013262."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73589-2_25"},{"key":"e_1_3_2_1_7_1","volume-title":"ASM: a code manipulation tool to implement adaptable systems. Adaptable and extensible component systems, 30, 19","author":"Bruneton Eric","year":"2002","unstructured":"Eric Bruneton, Romain Lenglet, and Thierry Coupaye. 2002. ASM: a code manipulation tool to implement adaptable systems. Adaptable and extensible component systems, 30, 19 (2002)."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Annual Technical Conference, General Track. 15\u201328","author":"Cantrill Bryan","year":"2004","unstructured":"Bryan Cantrill, Michael W Shapiro, and Adam H Leventhal. 2004. Dynamic Instrumentation of Production Systems.. In USENIX Annual Technical Conference, General Track. 15\u201328."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455778"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HiPC.2013.6799106"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.02.002"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297069"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of OOPSLA. 93","author":"Chiba Shigeru","year":"1993","unstructured":"Shigeru Chiba and Takashi Masuda. 1993. Open C++ and its optimization. In Proceedings of OOPSLA. 93."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.195"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177153"},{"volume-title":"11th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 14). 525\u2013540.","author":"Devecsery David","key":"e_1_3_2_1_17_1","unstructured":"David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M Chen. 2014. Eidetic systems. In 11th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 14). 525\u2013540."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542490"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.1997.644016"},{"key":"e_1_3_2_1_20_1","unstructured":"Jean-loup Gailly Mark Adler. 2017. ZLib Compression Library. Jan https:\/\/zlib.net\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28652-0_12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.49"},{"volume-title":"Presented as part of the 10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 193\u2013206.","author":"Kim Taesoo","key":"e_1_3_2_1_24_1","unstructured":"Taesoo Kim, Ramesh Chandra, and Nickolai Zeldovich. 2012. Efficient patch-based auditing for web application vulnerabilities. In Presented as part of the 10th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 12). 193\u2013206."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/778559.778562"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"volume-title":"tharanga","year":"2019","key":"e_1_3_2_1_27_1","unstructured":"dormando LINKIWI, tharanga. 2019. Memory Leak with TLS Termination Enabled \u00b7 Issue ##538 \u00b7 Memcached\/Memcached. https:\/\/github.com\/memcached\/memcached\/issues\/538"},{"key":"e_1_3_2_1_28_1","volume-title":"Vijay Janapa Reddi, and Kim Hazelwood","author":"Luk Chi-Keung","year":"2005","unstructured":"Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. Acm sigplan notices, 40, 6 (2005), 190\u2013200."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908096"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISORC.2002.1003713"},{"key":"e_1_3_2_1_31_1","unstructured":"mdounin. 2020. Nginx-SSL: fixed shutdown handling. Aug https:\/\/github.com\/nginx\/nginx\/commit\/e01cdfbd8c1b757eaadad059cb7c9b9313e715a6"},{"key":"e_1_3_2_1_32_1","unstructured":"mkver. 2020. Remove unused z_stream. Sep https:\/\/github.com\/FFmpeg\/FFmpeg\/commit\/d1487659ee584d3b0521a894e9ea0f182edbd676"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45937-5_16"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254820"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_39_1","volume-title":"Back to the future: Omniscient debugging","author":"Pothier Guillaume","year":"2009","unstructured":"Guillaume Pothier and \u00c9ric Tanter. 2009. Back to the future: Omniscient debugging. IEEE software, 26, 6 (2009), 78\u201385."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2088456.1863539"},{"key":"e_1_3_2_1_41_1","unstructured":"RedisLabs. 2020. NoSQL Redis and Memcache traffic generation and benchmarking tool.. Dec https:\/\/github.com\/RedisLabs\/memtier_benchmark"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451131"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154502"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791203"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the Fortieth International Conference on Tools Pacific: Objects for internet, mobile and embedded applications. 53\u201360","author":"Spinczyk Olaf","year":"2002","unstructured":"Olaf Spinczyk, Andreas Gal, and Wolfgang Schr\u00f6der-Preikschat. 2002. AspectC++ an aspect-oriented extension to the C++ programming language. In Proceedings of the Fortieth International Conference on Tools Pacific: Objects for internet, mobile and embedded applications. 53\u201360."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2015.7054186"},{"volume-title":"dormando","year":"2019","key":"e_1_3_2_1_49_1","unstructured":"tharanga, dormando. 2019. Mecached TLS Shutdown. Apr, https:\/\/github.com\/memcached\/memcached\/blob\/ee1cfe3bf9384d1a93545fc942e25bed6437d910\/thread.c##L558"},{"key":"e_1_3_2_1_50_1","unstructured":"The OpenSSL Project. 2003. OpenSSL: The Open Source toolkit for SSL\/TLS. April www.openssl.org"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294275"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_8"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the Aspect-Oriented Programming Workshop at ECOOP\u201999","author":"Willink Edward D","year":"1999","unstructured":"Edward D Willink and Vyacheslav B Muchnick. 1999. Weaving a way past the C++ one definition rule. In Proceedings of the Aspect-Oriented Programming Workshop at ECOOP\u201999."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/329366.301109"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999454"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772960"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132778"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Lausanne Switzerland","acronym":"ASPLOS '22"},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507760","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:49Z","timestamp":1750188649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507760"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":56,"alternative-id":["10.1145\/3503222.3507760","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507760","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}