{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:28:11Z","timestamp":1755998891448,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598137","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"1307-1318","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["CGuard: Scalable and Precise Object Bounds Protection for C"],"prefix":"10.1145","author":[{"given":"Piyus","family":"Kedia","sequence":"first","affiliation":[{"name":"IIIT Delhi, India"}]},{"given":"Rahul","family":"Purandare","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, USA"}]},{"given":"Udit","family":"Agarwal","sequence":"additional","affiliation":[{"name":"University of British Columbia, Canada"}]},{"family":"Rishabh","sequence":"additional","affiliation":[{"name":"GGSIPU, India"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cguard. https:\/\/github.com\/piyus\/CGuard_proj. \t\t\t\t  Cguard. https:\/\/github.com\/piyus\/CGuard_proj."},{"key":"e_1_3_2_1_2_1","volume-title":"0 stack bufer overflow and x64 exploitation (cve-2013-2028 ). https:\/\/www.vnsecurity.net\/research\/2013\/05\/21\/analysis-of-nginx-cve2013-2028.html","author":"Analysis","year":"2013","unstructured":"Analysis of nginx 1.3.9\/1.4. 0 stack bufer overflow and x64 exploitation (cve-2013-2028 ). https:\/\/www.vnsecurity.net\/research\/2013\/05\/21\/analysis-of-nginx-cve2013-2028.html , 2013 (accessed Dec 2, 2021 ). Analysis of nginx 1.3.9\/1.4. 0 stack bufer overflow and x64 exploitation (cve-2013-2028 ). https:\/\/www.vnsecurity.net\/research\/2013\/05\/21\/analysis-of-nginx-cve2013-2028.html, 2013 (accessed Dec 2, 2021 )."},{"key":"e_1_3_2_1_3_1","volume-title":"Cve-2011-4971. https:\/\/www.cvedetails.com\/cve\/cve-2011-4971","author":"Vulnerability","year":"2013","unstructured":"Vulnerability details : Cve-2011-4971. https:\/\/www.cvedetails.com\/cve\/cve-2011-4971 , 2013 (accessed Dec 2, 2021 ). Vulnerability details : Cve-2011-4971. https:\/\/www.cvedetails.com\/cve\/cve-2011-4971, 2013 (accessed Dec 2, 2021 )."},{"key":"e_1_3_2_1_4_1","volume-title":"1. https: \/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/64-ia-32-architectures-software-developer-vol-1-manual.html","author":"Vol Intel","year":"2016","unstructured":"Intel 64 and ia-32 architectures developer's manual : Vol . 1. https: \/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/64-ia-32-architectures-software-developer-vol-1-manual.html , 2016 (accessed Dec 2, 2021 ). Intel 64 and ia-32 architectures developer's manual : Vol. 1. https: \/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/64-ia-32-architectures-software-developer-vol-1-manual.html, 2016 (accessed Dec 2, 2021 )."},{"key":"e_1_3_2_1_5_1","volume-title":"3d. https:\/\/www.intel.in\/content\/www\/in\/en\/architecture-and-technology\/ 64-ia32-architectures-software-developer-vol-3d-part-4-manual.html","author":"Intel","year":"2016","unstructured":"Intel 64 and ia-32 architectures software developer's manual : 3d. https:\/\/www.intel.in\/content\/www\/in\/en\/architecture-and-technology\/ 64-ia32-architectures-software-developer-vol-3d-part-4-manual.html , 2016 (accessed Dec 2, 2021 ). Intel 64 and ia-32 architectures software developer's manual: 3d. https:\/\/www.intel.in\/content\/www\/in\/en\/architecture-and-technology\/ 64-ia32-architectures-software-developer-vol-3d-part-4-manual.html, 2016 (accessed Dec 2, 2021 )."},{"volume-title":"https:\/\/github.com\/google\/sanitizers\/wiki\/ AddressSanitizerFoundBugs#Spec_CPU_2006","year":"2018","key":"e_1_3_2_1_6_1","unstructured":"Addresssanitizerfoundbugs. https:\/\/github.com\/google\/sanitizers\/wiki\/ AddressSanitizerFoundBugs#Spec_CPU_2006 , 2018 (accessed Dec 2, 2021 ). Addresssanitizerfoundbugs. https:\/\/github.com\/google\/sanitizers\/wiki\/ AddressSanitizerFoundBugs#Spec_CPU_2006, 2018 (accessed Dec 2, 2021 )."},{"key":"e_1_3_2_1_7_1","volume-title":"Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC), 13 ( 1 ): 1-40","author":"Abadi Mart\u00edn","year":"2009","unstructured":"Mart\u00edn Abadi , Mihai Budiu , Ulfar Erlingsson , and Jay Ligatti . Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC), 13 ( 1 ): 1-40 , 2009 . Mart\u00edn Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and System Security (TISSEC), 13 ( 1 ): 1-40, 2009."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Security Symposium","volume":"10","author":"Akritidis Periklis","year":"2009","unstructured":"Periklis Akritidis , Manuel Costa , Miguel Castro , and Steven Hand . Baggy bounds checking: An eficient and backwards-compatible defense against out-of-bounds errors . In USENIX Security Symposium , volume 10 , 2009 . Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. Baggy bounds checking: An eficient and backwards-compatible defense against out-of-bounds errors. In USENIX Security Symposium, volume 10, 2009."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178446"},{"key":"e_1_3_2_1_10_1","first-page":"1213","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18)","author":"Biondo Andrea","year":"2018","unstructured":"Andrea Biondo , Mauro Conti , Lucas Davi , Tommaso Frassetto , and Ahmad-Reza Sadeghi . The guard's dilemma: Eficient code-reuse attacks against intel {SGX} . In 27th {USENIX} Security Symposium ({USENIX} Security 18) , pages 1213 - 1227 , 2018 . Andrea Biondo, Mauro Conti, Lucas Davi, Tommaso Frassetto, and Ahmad-Reza Sadeghi. The guard's dilemma: Eficient code-reuse attacks against intel {SGX}. In 27th {USENIX} Security Symposium ({USENIX} Security 18), pages 1213-1227, 2018."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_12_1","volume-title":"Garbage collection in an uncooperative environment. Software: Practice and Experience, 18 ( 9 ): 807-820","author":"Boehm Hans-Juergen","year":"1988","unstructured":"Hans-Juergen Boehm and Mark Weiser . Garbage collection in an uncooperative environment. Software: Practice and Experience, 18 ( 9 ): 807-820 , 1988 . Hans-Juergen Boehm and Mark Weiser. Garbage collection in an uncooperative environment. Software: Practice and Experience, 18 ( 9 ): 807-820, 1988."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/3185768.3185771","volume-title":"Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering","author":"Bucek James","year":"2018","unstructured":"James Bucek , Klaus-Dieter Lange , and J\u00f3akim v. Kistowski . Spec cpu2017 : Nextgeneration compute benchmark . In Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering , pages 41 - 42 , 2018 . James Bucek, Klaus-Dieter Lange, and J\u00f3akim v. Kistowski. Spec cpu2017: Nextgeneration compute benchmark. In Companion of the 2018 ACM\/SPEC International Conference on Performance Engineering, pages 41-42, 2018."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1145\/3196494.3196540","volume-title":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","author":"Burow Nathan","year":"2018","unstructured":"Nathan Burow , Derrick McKee , Scott A Carr , and Mathias Payer . Cup : Comprehensive user-space protection for c\/c++ . In Proceedings of the 2018 on Asia Conference on Computer and Communications Security , pages 381 - 392 , 2018 . Nathan Burow, Derrick McKee, Scott A Carr, and Mathias Payer. Cup: Comprehensive user-space protection for c\/c++. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security, pages 381-392, 2018."},{"key":"e_1_3_2_1_15_1","first-page":"2009","article-title":"Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage","author":"Checkoway Stephen","year":"2009","unstructured":"Stephen Checkoway , Ariel J Feldman , Brian Kantor , J Alex Halderman , Edward W Felten , and Hovav Shacham . Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage . EVT\/WOTE , 2009 , 2009 . Stephen Checkoway, Ariel J Feldman, Brian Kantor, J Alex Halderman, Edward W Felten, and Hovav Shacham. Can dres provide long-lasting security? the case of return-oriented programming and the avc advantage. EVT\/WOTE, 2009, 2009.","journal-title":"EVT\/WOTE"},{"key":"e_1_3_2_1_16_1","volume-title":"Ccured in the real world. ACM SIGPLAN Notices, 38 ( 5 ): 232-244","author":"Condit Jeremy","year":"2003","unstructured":"Jeremy Condit , Matthew Harren , Scott McPeak , George C Necula , and Westley Weimer . Ccured in the real world. ACM SIGPLAN Notices, 38 ( 5 ): 232-244 , 2003 . Jeremy Condit, Matthew Harren, Scott McPeak, George C Necula, and Westley Weimer. Ccured in the real world. ACM SIGPLAN Notices, 38 ( 5 ): 232-244, 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813671"},{"key":"e_1_3_2_1_18_1","volume-title":"Milo MK Martin, and Steve Zdancewic. Hardbound: Architectural support for spatial safety of the c programming language. ACM SIGOPS Operating Systems Review, 42 ( 2 ): 103-114","author":"Devietti Joe","year":"2008","unstructured":"Joe Devietti , Colin Blundell , Milo MK Martin, and Steve Zdancewic. Hardbound: Architectural support for spatial safety of the c programming language. ACM SIGOPS Operating Systems Review, 42 ( 2 ): 103-114 , 2008 . Joe Devietti, Colin Blundell, Milo MK Martin, and Steve Zdancewic. Hardbound: Architectural support for spatial safety of the c programming language. ACM SIGOPS Operating Systems Review, 42 ( 2 ): 103-114, 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_21_1","first-page":"1","volume-title":"NDSS","volume":"17","author":"Duck Gregory J","year":"2017","unstructured":"Gregory J Duck , Roland HC Yap , and Lorenzo Cavallaro . Stack bounds protection with low fat pointers . In NDSS , volume 17 , pages 1 - 15 , 2017 . Gregory J Duck, Roland HC Yap, and Lorenzo Cavallaro. Stack bounds protection with low fat pointers. In NDSS, volume 17, pages 1-15, 2017."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_3_2_1_23_1","first-page":"275","volume-title":"USENIX Annual Technical Conference, General Track","author":"Jim Trevor","year":"2002","unstructured":"Trevor Jim , J Gregory Morrisett , Dan Grossman , Michael W Hicks , James Cheney , and Yanling Wang . Cyclone : a safe dialect of c . In USENIX Annual Technical Conference, General Track , pages 275 - 288 , 2002 . Trevor Jim, J Gregory Morrisett, Dan Grossman, Michael W Hicks, James Cheney, and Yanling Wang. Cyclone: a safe dialect of c. In USENIX Annual Technical Conference, General Track, pages 275-288, 2002."},{"key":"e_1_3_2_1_24_1","first-page":"13","volume-title":"AADEBUG","volume":"97","author":"Jones Richard WM","year":"1997","unstructured":"Richard WM Jones and Paul HJ Kelly . Backwards-compatible bounds checking for arrays and pointers in c programs . In AADEBUG , volume 97 , pages 13 - 26 . Citeseer , 1997 . Richard WM Jones and Paul HJ Kelly. Backwards-compatible bounds checking for arrays and pointers in c programs. In AADEBUG, volume 97, pages 13-26. Citeseer, 1997."},{"key":"e_1_3_2_1_25_1","first-page":"1","volume-title":"Proceedings of the Thirteenth EuroSys Conference","author":"Kroes Taddeus","year":"2018","unstructured":"Taddeus Kroes , Koen Koning , Erik van der Kouwe, Herbert Bos, and Cristiano Giufrida. Delta pointers: Bufer overflow checks without the checks . In Proceedings of the Thirteenth EuroSys Conference , pages 1 - 14 , 2018 . Taddeus Kroes, Koen Koning, Erik van der Kouwe, Herbert Bos, and Cristiano Giufrida. Delta pointers: Bufer overflow checks without the checks. In Proceedings of the Thirteenth EuroSys Conference, pages 1-14, 2018."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_27_1","volume-title":"Workshop on the evaluation of software defect detection tools","volume":"5","author":"Lu Shan","year":"2005","unstructured":"Shan Lu , Zhenmin Li , Feng Qin , Lin Tan , Pin Zhou , and Yuanyuan Zhou . Bugbench : Benchmarks for evaluating bug detection tools . In Workshop on the evaluation of software defect detection tools , volume 5 , 2005 . Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. Bugbench: Benchmarks for evaluating bug detection tools. In Workshop on the evaluation of software defect detection tools, volume 5, 2005."},{"key":"e_1_3_2_1_28_1","volume-title":"Innovative instructions and software model for isolated execution. Hasp@ isca, 10 ( 1 )","author":"McKeen Frank","year":"2013","unstructured":"Frank McKeen , Ilya Alexandrovich , Alex Berenzon , Carlos V Rozas , Hisham Shafi , Vedvyas Shanbhogue , and Uday R Savagaonkar . Innovative instructions and software model for isolated execution. Hasp@ isca, 10 ( 1 ) , 2013 . Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V Rozas, Hisham Shafi, Vedvyas Shanbhogue, and Uday R Savagaonkar. Innovative instructions and software model for isolated execution. Hasp@ isca, 10 ( 1 ), 2013."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1145\/503272.503286","volume-title":"Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages","author":"Necula George C","year":"2002","unstructured":"George C Necula , Scott McPeak , and Westley Weimer . Ccured : Type-safe retrofitting of legacy code . In Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , pages 128 - 139 , 2002 . George C Necula, Scott McPeak, and Westley Weimer. Ccured: Type-safe retrofitting of legacy code. In Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 128-139, 2002."},{"issue":"0","key":"e_1_3_2_1_31_1","first-page":"x58","article-title":"The advanced return-into-lib(c) exploits: Pax case study","volume":"11","author":"Nergal","year":"2001","unstructured":"Nergal . The advanced return-into-lib(c) exploits: Pax case study . In Phrack Magazine , Volume 11 , Issue 0 x58 , 2001 . Nergal. The advanced return-into-lib(c) exploits: Pax case study. In Phrack Magazine, Volume 11, Issue 0x58, 2001.","journal-title":"Phrack Magazine"},{"key":"e_1_3_2_1_32_1","volume-title":"Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM Sigplan notices, 42 ( 6 ): 89-100","author":"Nethercote Nicholas","year":"2007","unstructured":"Nicholas Nethercote and Julian Seward . Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM Sigplan notices, 42 ( 6 ): 89-100 , 2007 . Nicholas Nethercote and Julian Seward. Valgrind: a framework for heavyweight dynamic binary instrumentation. ACM Sigplan notices, 42 ( 6 ): 89-100, 2007."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2 ( 2 ): 1-30","author":"Oleksenko Oleksii","year":"2018","unstructured":"Oleksii Oleksenko , Dmitrii Kuvaiskii , Pramod Bhatotia , Pascal Felber , and Christof Fetzer . Intel mpx explained: A cross-layer analysis of the intel mpx system stack . Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2 ( 2 ): 1-30 , 2018 . Oleksii Oleksenko, Dmitrii Kuvaiskii, Pramod Bhatotia, Pascal Felber, and Christof Fetzer. Intel mpx explained: A cross-layer analysis of the intel mpx system stack. Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2 ( 2 ): 1-30, 2018."},{"key":"e_1_3_2_1_34_1","volume-title":"Smashing the stack for fun and profit. Phrack magazine, 7 ( 49 ): 14-16","author":"One Aleph","year":"1996","unstructured":"Aleph One . Smashing the stack for fun and profit. Phrack magazine, 7 ( 49 ): 14-16 , 1996 . Aleph One. Smashing the stack for fun and profit. Phrack magazine, 7 ( 49 ): 14-16, 1996."},{"key":"e_1_3_2_1_35_1","volume-title":"In Proc. of the","author":"Reed Hastings Bob Joyce","year":"1992","unstructured":"Bob Joyce Reed Hastings . Purify : Fast detection of memory leaks and access errors . In In Proc. of the Winter 1992 USENIX Conference. Citeseer , 1991. Bob Joyce Reed Hastings. Purify: Fast detection of memory leaks and access errors. In In Proc. of the Winter 1992 USENIX Conference. Citeseer, 1991."},{"key":"e_1_3_2_1_36_1","first-page":"159","volume-title":"NDSS","volume":"2004","author":"Ruwase Olatunji","year":"2004","unstructured":"Olatunji Ruwase and Monica S Lam . A practical dynamic bufer overflow detector . In NDSS , volume 2004 , pages 159 - 169 , 2004 . Olatunji Ruwase and Monica S Lam. A practical dynamic bufer overflow detector. In NDSS, volume 2004, pages 159-169, 2004."},{"key":"e_1_3_2_1_37_1","first-page":"309","volume-title":"Addresssanitizer: A fast address sanity checker. In 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitriy Vyukov . Addresssanitizer: A fast address sanity checker. In 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12) , pages 309 - 318 , 2012 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. Addresssanitizer: A fast address sanity checker. In 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12), pages 309-318, 2012."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519145"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029913"},{"key":"e_1_3_2_1_41_1","first-page":"198","volume-title":"2009 IEEE International Symposium on Workload Characterization (IISWC)","author":"Yoo Richard M","year":"2009","unstructured":"Richard M Yoo , Anthony Romano , and Christos Kozyrakis . Phoenix rebirth : Scalable mapreduce on a large-scale shared-memory system . In 2009 IEEE International Symposium on Workload Characterization (IISWC) , pages 198 - 207 . IEEE, 2009 . Richard M Yoo, Anthony Romano, and Christos Kozyrakis. Phoenix rebirth: Scalable mapreduce on a large-scale shared-memory system. In 2009 IEEE International Symposium on Workload Characterization (IISWC), pages 198-207. IEEE, 2009."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1145\/1755688.1755707","volume-title":"Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security","author":"Younan Yves","year":"2010","unstructured":"Yves Younan , Pieter Philippaerts , Lorenzo Cavallaro , R Sekar , Frank Piessens , and Wouter Joosen . Paricheck : an eficient pointer arithmetic checker for c programs . In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security , pages 145 - 156 , 2010 . Yves Younan, Pieter Philippaerts, Lorenzo Cavallaro, R Sekar, Frank Piessens, and Wouter Joosen. Paricheck: an eficient pointer arithmetic checker for c programs. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 145-156, 2010."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046713"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"],"location":"Seattle WA USA","acronym":"ISSTA '23"},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598137","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:43Z","timestamp":1750182523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":43,"alternative-id":["10.1145\/3597926.3598137","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598137","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}