{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:43:35Z","timestamp":1772045015693,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-1850434 CNS-2128703"],"award-info":[{"award-number":["CNS-1850434 CNS-2128703"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cisco Research Grant","award":["RFP- 21-07"],"award-info":[{"award-number":["RFP- 21-07"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507768","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"255-270","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["One size does not fit all: security hardening of MIPS embedded systems via static binary debloating for shared libraries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0844-3730","authenticated-orcid":false,"given":"Haotian","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Texas at Arlington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8548-3299","authenticated-orcid":false,"given":"Mengfei","family":"Ren","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, USA"}]},{"given":"Yu","family":"Lei","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9682-0502","authenticated-orcid":false,"given":"Jiang","family":"Ming","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"e_1_3_2_1_4_1","unstructured":"Onur ALANBEL. 2015. Developing MIPS Exploits to Hack Routers. BGA Information Security Whitepaper."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24016"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"e_1_3_2_1_7_1","unstructured":"Erik Andersen. [online]. uClibc is a small C standard library intended for Linux kernel-based OS on embedded systems and mobile devices. https:\/\/www.uclibc.org\/"},{"key":"e_1_3_2_1_8_1","unstructured":"AspenCore. 2019. 2019 Embedded Markets Study. http:\/\/tiny.cc\/a4mwtz"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919)","author":"Azad Babak Amin","year":"2019","unstructured":"Babak Amin Azad, Pierre Laperdrix, and Nick Nikiforakis. 2019. Less is More: Quantifying the Security Benefits of Debloating Web Applications. In Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Sebastian Banescu and Alexander Pretschner. 2018. Chapter Five - A Tutorial on Software Obfuscation. Elsevier.","DOI":"10.1016\/bs.adcom.2017.09.004"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2005 USENIX Annual Technical Conference (ATC\u201905)","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard. 2005. QEMU, a Fast and Portable Dynamic Translator. In Proceedings of the 2005 USENIX Annual Technical Conference (ATC\u201905)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303989"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409738"},{"key":"e_1_3_2_1_16_1","volume-title":"Control-Flow Integrity: Precision, Security, and Performance. Comput. Surveys, 50, 1","author":"Burow Nathan","year":"2017","unstructured":"Nathan Burow, Scott A. Carr, Joseph Nash, Per Larsen, Michael Franz, Stefan Brunthaler, and Mathias Payer. 2017. Control-Flow Integrity: Precision, Security, and Performance. Comput. Surveys, 50, 1 (2017), Article 16, April, 33 pages."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427280"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 23th USENIX Conference on Security Symposium (USENIX Security\u201914)","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David Wagner. 2014. ROP is Still Dangerous: Breaking Modern Defenses. In Proceedings of the 23th USENIX Conference on Security Symposium (USENIX Security\u201914)."},{"key":"e_1_3_2_1_19_1","unstructured":"Tim Carrington. 2018. Remote Code Execution (CVE-2018-5767) Walkthrough on Tenda AC15 Router. https:\/\/fidusinfosec.com\/remote-code-execution-cve-2018-5767\/"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23415"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Christensen Jake","year":"2020","unstructured":"Jake Christensen, Ionut Mugurel Anghel, Rob Taglang, Mihai Chiroiu, and Radu Sion. 2020. DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Clements Abraham A.","year":"2020","unstructured":"Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, and Mathias Payer. 2020. HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_12"},{"key":"e_1_3_2_1_24_1","volume-title":"Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection","author":"Collberg Christian","year":"2009","unstructured":"Christian Collberg and Jasvir Nagra. 2009. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley Professional, 258\u2013276."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (USENIX Security\u201914)","author":"Costin Andrei","year":"2014","unstructured":"Andrei Costin, Jonas Zaddach, Aur\u00e9lien Francillon, and Davide Balzarotti. 2014. A Large-Scale Analysis of the Security of Embedded Firmwares. In Proceedings of the 23rd USENIX Conference on Security Symposium (USENIX Security\u201914)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535813.2535824"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177157"},{"key":"e_1_3_2_1_28_1","unstructured":"CVE Details. [online]. Security Vulnerabilities (Memory Corruption). https:\/\/www.cvedetails.com\/vulnerability-list\/opmemc-1\/memory-corruption.html"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2968455.2968514"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385972"},{"key":"e_1_3_2_1_31_1","unstructured":"Eta Labs. [online]. Comparison of C\/POSIX Standard Library Implementations for Linux. http:\/\/www.etalabs.net\/compare_libcs.html"},{"key":"e_1_3_2_1_32_1","unstructured":"Rod Evans. 2004. Static Linking - where did it go? https:\/\/blogs.oracle.com\/solaris\/post\/static-linking-where-did-it-go"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Feng Bo","year":"2020","unstructured":"Bo Feng, Alejandro Mera, and Long Lu. 2020. P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978370"},{"key":"e_1_3_2_1_35_1","unstructured":"The Apache Software Foundation. 2018. Apache HTTP Test Project. https:\/\/httpd.apache.org\/test\/"},{"key":"e_1_3_2_1_36_1","unstructured":"GCC Manual. [online]. MIPS Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/MIPS-Options.html"},{"key":"e_1_3_2_1_37_1","volume-title":"Options for Code Generation Conventions. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Code-Gen-Options.html","author":"Manual GCC","unstructured":"GCC Manual. [online]. Options for Code Generation Conventions. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Code-Gen-Options.html"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919)","author":"Ghaffarinia Masoud","unstructured":"Masoud Ghaffarinia and Kevin W. Hamlen. 2019. Binary Control-Flow Trimming. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489311"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_41_1","unstructured":"GrammaTech. 2017. Office of Naval Research awards GrammaTech $9M for Cyber-Hardening Security Research. https:\/\/news.grammatech.com\/onr-awards-grammatech-9m-for-cyber-hardening-research"},{"key":"e_1_3_2_1_42_1","volume-title":"IoT Penetration Testing Cookbook: Identify Vulnerabilities and Secure Your Smart Devices","author":"Guzman Aaron","unstructured":"Aaron Guzman and Aditya Gupta. 2017. IoT Penetration Testing Cookbook: Identify Vulnerabilities and Secure Your Smart Devices. Packt Publishing."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243838"},{"key":"e_1_3_2_1_44_1","unstructured":"Hex-Rays. 2021. The IDA Pro Disassembler and Debugger. https:\/\/www.hexrays.com\/products\/ida\/"},{"key":"e_1_3_2_1_45_1","unstructured":"Patrick Horgan. [online]. Linux Program Start Up\u2014How the heck do we get to main()? http:\/\/dbp-consulting.com\/tutorials\/debugging\/linuxProgramStartup.html"},{"key":"e_1_3_2_1_46_1","unstructured":"Fortune Business Insights. 2019. Internet of Things (IoT) Market Analysis. http:\/\/tiny.cc\/lsj1tz"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397377"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.146"},{"key":"e_1_3_2_1_49_1","volume-title":"Code-Pointer Integrity. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201914)","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song. 2014. Code-Pointer Integrity. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201914)."},{"key":"e_1_3_2_1_50_1","unstructured":"ReFirm Labs. [online]. Binwalk: Firmware Analysis Tool. https:\/\/github.com\/ReFirmLabs\/binwalk"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/161494.161501"},{"key":"e_1_3_2_1_52_1","volume-title":"Recovery of Jump Table Case Statements from Binary Code. Science of Computer Programming, 40","author":"Landi William","year":"2001","unstructured":"William Landi. 2001. Recovery of Jump Table Case Statements from Binary Code. Science of Computer Programming, 40 (2001), February."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2936139"},{"key":"e_1_3_2_1_54_1","unstructured":"LLVM Project. [online]. Architecture & Platform Information for Compiler Writers. https:\/\/llvm.org\/docs\/CompilerWriterInfo.html"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446765"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 25th International Symposium on Software Testing and Analysis (ISSTA\u201916)","author":"Meng Xiaozhu","unstructured":"Xiaozhu Meng and Barton P. Miller. 2016. Binary Code is Not Easy. In Proceedings of the 25th International Symposium on Software Testing and Analysis (ISSTA\u201916)."},{"key":"e_1_3_2_1_57_1","unstructured":"Melissa Michael. 2019. Attack Landscape H1 2019: IoT SMB traffic abound. http:\/\/tiny.cc\/jsj1tz"},{"key":"e_1_3_2_1_58_1","unstructured":"Gianluca Pacchiella. 2020. CVE-2020-8423: Exploiting the TP-LINK TL-WR841N V10 Router. https:\/\/ktln2.org\/2020\/03\/29\/exploiting-mips-router\/"},{"key":"e_1_3_2_1_59_1","volume-title":"Exploiting Routers: Just Another TP-Link 0-Day. https:\/\/www.secsignal.org\/en\/news\/exploiting-routers-just-another-tp-link-0day\/","author":"Parodi Alejandro","year":"2018","unstructured":"Alejandro Parodi. 2018. Exploiting Routers: Just Another TP-Link 0-Day. https:\/\/www.secsignal.org\/en\/news\/exploiting-routers-just-another-tp-link-0day\/"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386017"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919)","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, and Wenke Lee. 2019. RAZOR: A Framework for Post-Deployment Software Debloating. In Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417866"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)","author":"Quach Anh","year":"2018","unstructured":"Anh Quach, Aravind Prakash, and Lok Yan. 2018. Debloating Software through Piece-Wise Compilation and Loading. In Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106271"},{"key":"e_1_3_2_1_66_1","unstructured":"Red Hat Customer Portal. 2019. Static Linking Not Supported in Red Hat Enterprise Linux 8. https:\/\/access.redhat.com\/articles\/rhel8-abi-compatibility"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22038-9_23"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454035"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_70_1","unstructured":"Jonathan Salwan. 2011. ROPgadget - Gadgets finder and auto-roper. http:\/\/shell-storm.org\/project\/ROPgadget"},{"key":"e_1_3_2_1_71_1","unstructured":"Jason Sattler. 2020. Attack Landscape H2 2019: An Unprecedented Year for Cyber Attacks. http:\/\/tiny.cc\/esj1tz"},{"key":"e_1_3_2_1_72_1","unstructured":"Tara Seals. 2021. Critical Cisco Bug in VPN Routers Allows Remote Takeover. https:\/\/threatpost.com\/critical-cisco-bug-vpn-routers\/168449\/"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_76_1","volume-title":"Building the SPEC CPU2017 Toolset. https:\/\/www.spec.org\/cpu2017\/Docs\/tools-build.html","author":"Standard Performance Evaluation Corporation","year":"2017","unstructured":"Standard Performance Evaluation Corporation. 2017. Building the SPEC CPU2017 Toolset. https:\/\/www.spec.org\/cpu2017\/Docs\/tools-build.html"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_79_1","volume-title":"System V Application Binary Interface MIPS RISC Processor Supplement","author":"Cruz Operation The Santa","unstructured":"The Santa Cruz Operation. 1996. System V Application Binary Interface MIPS RISC Processor Supplement, 3rd Edition. https:\/\/refspecs.linuxfoundation.org\/elf\/mipsabi.pdf","edition":"3"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_1_81_1","volume-title":"Reassembleable Disassembling. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable Disassembling. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)."},{"key":"e_1_3_2_1_82_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201916)","author":"Williams-King David","year":"2016","unstructured":"David Williams-King, Graham Gobieski, Kent Williams-King, James P. Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P. Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and Deployable Continuous Code Re-Randomization. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201916)."},{"key":"e_1_3_2_1_83_1","volume-title":"Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201920)","author":"Williams-King David","unstructured":"David Williams-King, Hidenori Kobayashi, Kent Williams-King, Graham Patterson, Frank Spano, Yu Jian Wu, Junfeng Yang, and Vasileios P. Kemerlis. 2020. Egalito: Layout-Agnostic Binary Recompilation. In Proceedings of the 25th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS\u201920)."},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921)","author":"Wu Jianliang","year":"2021","unstructured":"Jianliang Wu, Ruoyu Wu Daniele Antonioli, Mathias Payer, Nils Ole Tippenhauer, Dongyan Xu, Dave (Jing) Tian, and Antonio Bianchi. 2021. LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks. In Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921)."},{"key":"e_1_3_2_1_85_1","volume-title":"Techniques, Tricks, and Traps","author":"Yaghmour Karim","unstructured":"Karim Yaghmour, Jon Masters, Gilad Ben-Yossef, and Philippe Gerum. 2008. Building Embedded Linux Systems: Concepts, Techniques, Tricks, and Traps (second ed.). O\u2019Reilly Media."},{"key":"e_1_3_2_1_86_1","volume-title":"Exploiting Buffer Overflows on MIPS Architectures. Hack In The Box Security Conference 2015 Whitepaper.","author":"Yang Lyon","year":"2015","unstructured":"Lyon Yang. 2015. Exploiting Buffer Overflows on MIPS Architectures. Hack In The Box Security Conference 2015 Whitepaper."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23229"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507768","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:49Z","timestamp":1750188649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":87,"alternative-id":["10.1145\/3503222.3507768","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507768","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}