{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:23:54Z","timestamp":1761582234650,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560625","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1307-1322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["DangZero"],"prefix":"10.1145","author":[{"given":"Floris","family":"Gorter","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Koen","family":"Koning","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CVE-2015-2787. PHP 5.5.14 Use-After-Free Vulnerability. https:\/\/bugs.php.net\/ bug.php?id=68976  CVE-2015-2787. PHP 5.5.14 Use-After-Free Vulnerability. https:\/\/bugs.php.net\/ bug.php?id=68976"},{"key":"e_1_3_2_1_2_1","unstructured":"CVE-2015-6835. PHP 5.4.44 Use-After-Free Vulnerability. https:\/\/www.exploit- db.com\/exploits\/38123  CVE-2015-6835. PHP 5.4.44 Use-After-Free Vulnerability. https:\/\/www.exploit- db.com\/exploits\/38123"},{"key":"e_1_3_2_1_3_1","unstructured":"CVE-2016-5773. PHP 7.0.7 Use-After-Free Vulnerability. https:\/\/bugs.php.net\/ bug.php?id=72434  CVE-2016-5773. PHP 7.0.7 Use-After-Free Vulnerability. https:\/\/bugs.php.net\/ bug.php?id=72434"},{"key":"e_1_3_2_1_4_1","volume-title":"Jones","author":"Ainsworth Sam","year":"2021","unstructured":"Sam Ainsworth and Timothy M . Jones . 2021 . MarkUs: Drop-in use-after-free prevention for low-level languages. In USENIX Security . Sam Ainsworth and Timothy M. Jones. 2021. MarkUs: Drop-in use-after-free prevention for low-level languages. In USENIX Security."},{"key":"e_1_3_2_1_5_1","volume-title":"Cling: A memory allocator to mitigate dangling pointers. In USENIX Security.","author":"Akritidis Periklis","year":"2010","unstructured":"Periklis Akritidis . 2010 . Cling: A memory allocator to mitigate dangling pointers. In USENIX Security. Periklis Akritidis. 2010. Cling: A memory allocator to mitigate dangling pointers. In USENIX Security."},{"key":"e_1_3_2_1_6_1","volume-title":"Dune: Safe User-level Access to Privileged CPU Features. In OSDI.","author":"Belay Adam","year":"2012","unstructured":"Adam Belay , Andrea Bittau , Ali Mashtizadeh , David Terei , David Mazieres , and Christos Kozyrakis . 2012 . Dune: Safe User-level Access to Privileged CPU Features. In OSDI. Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazieres, and Christos Kozyrakis. 2012. Dune: Safe User-level Access to Privileged CPU Features. In OSDI."},{"key":"e_1_3_2_1_7_1","volume-title":"Zorn","author":"Berger Emery D.","year":"2006","unstructured":"Emery D. Berger and Benjamin G . Zorn . 2006 . DieHard: Probabilistic Memory Safety for Unsafe Languages. In PLDI. Emery D. Berger and Benjamin G. Zorn. 2006. DieHard: Probabilistic Memory Safety for Unsafe Languages. In PLDI."},{"key":"e_1_3_2_1_8_1","volume-title":"McKinley","author":"Berger Emery D.","year":"2002","unstructured":"Emery D. Berger , Benjamin G. Zorn , and Kathryn S . McKinley . 2002 . Reconsidering custom memory allocation. In OOPSLA 9] Lukas Bernhard, Michael Rodler, Thorsten Holz, and Lucas Davi. 2022. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. In IEEE EuroS &P. Emery D. Berger, Benjamin G. Zorn, and Kathryn S. McKinley. 2002. Reconsidering custom memory allocation. In OOPSLA 9] Lukas Bernhard, Michael Rodler, Thorsten Holz, and Lucas Davi. 2022. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. In IEEE EuroS&P."},{"volume-title":"xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64","author":"Bernhard Lukas","key":"e_1_3_2_1_9_1","unstructured":"Lukas Bernhard , Michael Rodler , Thorsten Holz , and Lucas Davi . 2022. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64 . In IEEE EuroS &P. Lukas Bernhard, Michael Rodler, Thorsten Holz, and Lucas Davi. 2022. xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64. In IEEE EuroS&P."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Hans-J Boehm Alan J. Demers and Scott Shenker. 1991. Mostly parallel garbage collection. In PLDI.  Hans-J Boehm Alan J. Demers and Scott Shenker. 1991. Mostly parallel garbage collection. In PLDI.","DOI":"10.1145\/113445.113459"},{"key":"e_1_3_2_1_11_1","unstructured":"Jeff Bonwick et al. 1994. The slab allocator: An object-caching kernel memory allocator. In USENIX ATC.  Jeff Bonwick et al. 1994. The slab allocator: An object-caching kernel memory allocator. In USENIX ATC."},{"key":"e_1_3_2_1_12_1","unstructured":"Jeremy Brown. CVE-2015-3205. Libmimedir VCF Memory Corruption Proof Of Concept. https:\/\/packetstormsecurity.com\/files\/132257\/Libmimedir-VCF- Memory-Corruption-Proof-Of-Concept.html  Jeremy Brown. CVE-2015-3205. Libmimedir VCF Memory Corruption Proof Of Concept. https:\/\/packetstormsecurity.com\/files\/132257\/Libmimedir-VCF- Memory-Corruption-Proof-Of-Concept.html"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196540"},{"key":"e_1_3_2_1_14_1","unstructured":"Zixian Cai Stephen Blackburn Michael Bond and Martin Maas. 2022. Distilling the Real Cost of Production Garbage Collectors. In ISPASS.  Zixian Cai Stephen Blackburn Michael Bond and Martin Maas. 2022. Distilling the Real Cost of Production Garbage Collectors. In ISPASS."},{"key":"e_1_3_2_1_15_1","unstructured":"Haehyun Cho Jinbum Park Adam Oest Tiffany Bao Ruoyu Wang Yan Shoshitaishvili Adam Doup\u00e9 and Gail-Joon Ahn. 2022. ViK: practical mitigation of temporal memory safety violations through object ID inspection. In ASPLOS.  Haehyun Cho Jinbum Park Adam Oest Tiffany Bao Ruoyu Wang Yan Shoshitaishvili Adam Doup\u00e9 and Gail-Joon Ahn. 2022. ViK: practical mitigation of temporal memory safety violations through object ID inspection. In ASPLOS."},{"key":"e_1_3_2_1_16_1","unstructured":"Jonathan Corbet. 2017. Five-level page tables. https:\/\/lwn.net\/Articles\/717293.  Jonathan Corbet. 2017. Five-level page tables. https:\/\/lwn.net\/Articles\/717293."},{"key":"e_1_3_2_1_17_1","volume-title":"Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. In USENIX Security.","author":"Dang Thurston H.Y.","year":"2017","unstructured":"Thurston H.Y. Dang , Petros Maniatis , and David Wagner . 2017 . Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. In USENIX Security. Thurston H.Y. Dang, Petros Maniatis, and David Wagner. 2017. Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. In USENIX Security."},{"key":"e_1_3_2_1_18_1","unstructured":"Dinakar Dhurjati and Vikram Adve. 2006. Efficiently detecting all dangling pointer uses in production servers. In DSN.  Dinakar Dhurjati and Vikram Adve. 2006. Efficiently detecting all dangling pointer uses in production servers. In DSN."},{"key":"e_1_3_2_1_19_1","volume-title":"Jones","author":"Erd's M\u00e1rton","year":"2022","unstructured":"M\u00e1rton Erd's , Sam Ainsworth , and Timothy M . Jones . 2022 . MineSweeper: A Clean Sweep for Drop-In Use-after-Free Prevention. In ASPLOS. M\u00e1rton Erd's, Sam Ainsworth, and Timothy M. Jones. 2022. MineSweeper: A Clean Sweep for Drop-In Use-after-Free Prevention. In ASPLOS."},{"key":"e_1_3_2_1_20_1","unstructured":"Daniel Micay et al. 2019. Hardened malloc. https:\/\/github.com\/GrapheneOS\/ hardened_malloc.  Daniel Micay et al. 2019. Hardened malloc. https:\/\/github.com\/GrapheneOS\/ hardened_malloc."},{"key":"e_1_3_2_1_21_1","volume-title":"A scalable concurrent malloc (3) implementation for FreeBSD. BSDCan","author":"Evans Jason","year":"2006","unstructured":"Jason Evans . 2006. A scalable concurrent malloc (3) implementation for FreeBSD. BSDCan ( 2006 ). Jason Evans. 2006. A scalable concurrent malloc (3) implementation for FreeBSD. BSDCan (2006)."},{"key":"e_1_3_2_1_22_1","unstructured":"Reza Mirzazade Farkhani Mansour Ahmadi and Long Lu. 2021. PTAuth: Tempo- ral Memory Safety via Robust Points-to Authentication. In USENIX Security.  Reza Mirzazade Farkhani Mansour Ahmadi and Long Lu. 2021. PTAuth: Tempo- ral Memory Safety via Robust Points-to Authentication. In USENIX Security."},{"key":"e_1_3_2_1_23_1","volume-title":"Alexander Richardson, John Baldwin, et al.","author":"Filardo Nathaniel Wesley","year":"2020","unstructured":"Nathaniel Wesley Filardo , Brett F Gutstein , Jonathan Woodruff , Sam Ainsworth , Lucian Paul-Trifu , Brooks Davis , Hongyan Xia , Edward Tomasz Napierala , Alexander Richardson, John Baldwin, et al. 2020 . Cornucopia : Temporal safety for CHERI heaps. In IEEE S &P. Nathaniel Wesley Filardo, Brett F Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, et al. 2020. Cornucopia: Temporal safety for CHERI heaps. In IEEE S&P."},{"key":"e_1_3_2_1_24_1","unstructured":"Dinko Galetic and Denis Kasak. 2017. Use-After-Free Leading to An Invalid Pointer Dereference. https:\/\/hackerone.com\/reports\/213261  Dinko Galetic and Denis Kasak. 2017. Use-After-Free Leading to An Invalid Pointer Dereference. https:\/\/hackerone.com\/reports\/213261"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Binfa Gui Wei Song and Jeff Huang. 2021. UAFSan: an object-identifier-based dynamic approach for detecting use-after-free vulnerabilities. In ISSTA.  Binfa Gui Wei Song and Jeff Huang. 2021. UAFSan: an object-identifier-based dynamic approach for detecting use-after-free vulnerabilities. In ISSTA.","DOI":"10.1145\/3460319.3464835"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.345"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Koen Koning Herbert Bos and Cristiano Giuffrida. 2016. Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. In DSN.  Koen Koning Herbert Bos and Cristiano Giuffrida. 2016. Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. In DSN.","DOI":"10.1109\/DSN.2016.46"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Koen Koning Xi Chen Herbert Bos Cristiano Giuffrida and Elias Athanasopou- los. 2017. No need to hide: Protecting safe regions on commodity hardware. In EuroSys.  Koen Koning Xi Chen Herbert Bos Cristiano Giuffrida and Elias Athanasopou- los. 2017. No need to hide: Protecting safe regions on commodity hardware. In EuroSys.","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_29_1","unstructured":"Hsuan-Chi Kuo Dan Williams Ricardo Koller and Sibin Mohan. 2020. A Linux in Unikernel Clothing. In EuroSys.  Hsuan-Chi Kuo Dan Williams Ricardo Koller and Sibin Mohan. 2020. A Linux in Unikernel Clothing. In EuroSys."},{"key":"e_1_3_2_1_30_1","unstructured":"Byoungyoung Lee Chengyu Song Yeongjin Jang Tielei Wang Taesoo Kim Long Lu and Wenke Lee. 2015. Preventing Use-after-free with Dangling Pointers Nullification. In NDSS.  Byoungyoung Lee Chengyu Song Yeongjin Jang Tielei Wang Taesoo Kim Long Lu and Wenke Lee. 2015. Preventing Use-after-free with Dangling Pointers Nullification. In NDSS."},{"key":"e_1_3_2_1_31_1","unstructured":"Daan Leijen. 2020. Mimalloc. https:\/\/github.com\/microsoft\/mimalloc.  Daan Leijen. 2020. Mimalloc. https:\/\/github.com\/microsoft\/mimalloc."},{"key":"e_1_3_2_1_32_1","unstructured":"John Leitch. Issue 24613. array.fromstring use after free. https:\/\/bugs.python. org\/issue24613  John Leitch. Issue 24613. array.fromstring use after free. https:\/\/bugs.python. org\/issue24613"},{"key":"e_1_3_2_1_33_1","unstructured":"Beichen Liu Pierre Olivier and Binoy Ravindran. 2019. SlimGuard: A Secure and Memory-Efficient Heap Allocator. In Middleware.  Beichen Liu Pierre Olivier and Binoy Ravindran. 2019. SlimGuard: A Secure and Memory-Efficient Heap Allocator. In Middleware."},{"key":"e_1_3_2_1_34_1","unstructured":"Daiping Liu Mingwei Zhang and Haining Wang. 2018. A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping. In CCS.  Daiping Liu Mingwei Zhang and Haining Wang. 2018. A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping. In CCS."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Yutao Liu Tianyu Zhou Kexin Chen Haibo Chen and Yubin Xia. 2015. Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation. In CCS.  Yutao Liu Tianyu Zhou Kexin Chen Haibo Chen and Yubin Xia. 2015. Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation. In CCS.","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Toshiyuki Maeda and Akinori Yonezawa. 2003. Kernel Mode Linux: Toward an operating system protected by a type theory. In ASIAN.  Toshiyuki Maeda and Akinori Yonezawa. 2003. Kernel Mode Linux: Toward an operating system protected by a type theory. In ASIAN.","DOI":"10.1007\/978-3-540-40965-6_2"},{"volume-title":"TrustVisor: Efficient TCB reduction and attestation","author":"McCune Jonathan M.","key":"e_1_3_2_1_37_1","unstructured":"Jonathan M. McCune , Yanlin Li , Ning Qu , Zongwei Zhou , Anupam Datta , Virgil Gligor , and Adrian Perrig . 2010. TrustVisor: Efficient TCB reduction and attestation . In IEEE S &P. Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil Gligor, and Adrian Perrig. 2010. TrustVisor: Efficient TCB reduction and attestation. In IEEE S&P."},{"key":"e_1_3_2_1_38_1","unstructured":"Microsoft. 2022. GFlags and PageHeap. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/gflags-and-pageheap  Microsoft. 2022. GFlags and PageHeap. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/gflags-and-pageheap"},{"key":"e_1_3_2_1_39_1","unstructured":"Matt Miller. 2019. Trends and Challenges in the Vulnerability Mitigation Land- scape. https:\/\/www.usenix.org\/conference\/woot19\/presentation\/miller  Matt Miller. 2019. Trends and Challenges in the Vulnerability Mitigation Land- scape. https:\/\/www.usenix.org\/conference\/woot19\/presentation\/miller"},{"key":"e_1_3_2_1_40_1","unstructured":"MITRE. 2021. 2021 CWE Top 25 Most Dangerous Software Weaknesses. https: \/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25.html  MITRE. 2021. 2021 CWE Top 25 Most Dangerous Software Weaknesses. https: \/\/cwe.mitre.org\/top25\/archive\/2021\/2021_cwe_top25.html"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Nicholas Nethercote and Julian Seward. 2007. Valgrind: a framework for heavy- weight dynamic binary instrumentation. In PLDI.  Nicholas Nethercote and Julian Seward. 2007. Valgrind: a framework for heavy- weight dynamic binary instrumentation. In PLDI.","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_43_1","unstructured":"Nginx. 2022. Run nginx with \"daemon off\" or \"master_process off\" settings in a production environment. http:\/\/nginx.org\/en\/docs\/faq\/daemon_master_ process_off.html  Nginx. 2022. Run nginx with \"daemon off\" or \"master_process off\" settings in a production environment. http:\/\/nginx.org\/en\/docs\/faq\/daemon_master_ process_off.html"},{"key":"e_1_3_2_1_44_1","volume-title":"Berger","author":"Novark Gene","year":"2010","unstructured":"Gene Novark and Emery D . Berger . 2010 . DieHarder: Securing the Heap. In CCS. Gene Novark and Emery D. Berger. 2010. DieHarder: Securing the Heap. In CCS."},{"key":"e_1_3_2_1_45_1","unstructured":"Bruce Perens. 1987. Electric Fence. https:\/\/elinux.org\/Electric_Fence  Bruce Perens. 1987. Electric Fence. https:\/\/elinux.org\/Electric_Fence"},{"volume-title":"xMP: Selective memory protection for kernel and user space","author":"Proskurin Sergej","key":"e_1_3_2_1_46_1","unstructured":"Sergej Proskurin , Marius Momeu , Seyedhamed Ghavamnia , Vasileios P. Kemerlis , and Michalis Polychronakis . 2020. xMP: Selective memory protection for kernel and user space . In IEEE S &P. Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P. Kemerlis, and Michalis Polychronakis. 2020. xMP: Selective memory protection for kernel and user space. In IEEE S&P."},{"key":"e_1_3_2_1_47_1","volume-title":"Address Sanitizer: A Fast Address Sanity Checker. In USENIX ATC.","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitry Vyukov . 2012 . Address Sanitizer: A Fast Address Sanity Checker. In USENIX ATC. Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. Address Sanitizer: A Fast Address Sanity Checker. In USENIX ATC."},{"key":"e_1_3_2_1_48_1","unstructured":"Kostya Serebryany and Dmitry Vyukov. -. Scudo Hardened Allocator. https: \/\/llvm.org\/docs\/ScudoHardenedAllocator.html.  Kostya Serebryany and Dmitry Vyukov. -. Scudo Hardened Allocator. https: \/\/llvm.org\/docs\/ScudoHardenedAllocator.html."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Zekun Shen and Brendan Dolan-Gavitt. 2020. HeapExpo: Pinpointing promoted pointers to prevent use-after-free vulnerabilities. In ACSAC.  Zekun Shen and Brendan Dolan-Gavitt. 2020. HeapExpo: Pinpointing promoted pointers to prevent use-after-free vulnerabilities. In ACSAC.","DOI":"10.1145\/3427228.3427645"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Jangseop Shin Donghyun Kwon Jiwon Seo Yeongpil Cho and Yunheung Paek. 2019. CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C\/C. In NDSS.  Jangseop Shin Donghyun Kwon Jiwon Seo Yeongpil Cho and Yunheung Paek. 2019. CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C\/C. In NDSS.","DOI":"10.14722\/ndss.2019.23541"},{"key":"e_1_3_2_1_51_1","unstructured":"Vlad Tsyrklevich. 2019. GWP-ASan: Sampling heap memory error detection in-the-wild. https:\/\/sites.google.com\/a\/chromium.org\/dev\/Home\/chromium-security\/articles\/gwp-asan  Vlad Tsyrklevich. 2019. GWP-ASan: Sampling heap memory error detection in-the-wild. https:\/\/sites.google.com\/a\/chromium.org\/dev\/Home\/chromium-security\/articles\/gwp-asan"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Erik Van Der Kouwe Taddeus Kroes Chris Ouwehand Herbert Bos and Cristiano Giuffrida. 2018. Type-After-Type: Practical and complete type-safe memory reuse. In ACSAC.  Erik Van Der Kouwe Taddeus Kroes Chris Ouwehand Herbert Bos and Cristiano Giuffrida. 2018. Type-After-Type: Practical and complete type-safe memory reuse. In ACSAC.","DOI":"10.1145\/3274694.3274705"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Erik Van Der Kouwe Vinod Nigade and Cristiano Giuffrida. 2017. DangSan: Scalable use-after-free detection. In EuroSys.  Erik Van Der Kouwe Vinod Nigade and Cristiano Giuffrida. 2017. DangSan: Scalable use-after-free detection. In EuroSys.","DOI":"10.1145\/3064176.3064211"},{"key":"e_1_3_2_1_54_1","unstructured":"Brian Wickman Hong Hu Insu Yun Daehee Jang JungWon Lim Sanidhya Kashyap and Taesoo Kim. 2021. Preventing Use-After-Free Attacks with Fast Forward Allocation. In USENIX Security.  Brian Wickman Hong Hu Insu Yun Daehee Jang JungWon Lim Sanidhya Kashyap and Taesoo Kim. 2021. Preventing Use-After-Free Attacks with Fast Forward Allocation. In USENIX Security."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Yves Younan. 2015. FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers. In NDSS.  Yves Younan. 2015. FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers. In NDSS.","DOI":"10.14722\/ndss.2015.23190"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"crossref","unstructured":"Insu Yun Woosun Song Seunggi Min and Taesoo Kim. 2021. HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators. In CCS.  Insu Yun Woosun Song Seunggi Min and Taesoo Kim. 2021. HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators. In CCS.","DOI":"10.1145\/3460120.3484740"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304017"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560625","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:58Z","timestamp":1750182538000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560625"}},"subtitle":["Efficient Use-After-Free Detection via Direct Page Table Access"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":57,"alternative-id":["10.1145\/3548606.3560625","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560625","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}