{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T10:15:21Z","timestamp":1769076921988,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSFC","award":["62232016"],"award-info":[{"award-number":["62232016"]}]},{"name":"NSFC","award":["61972224"],"award-info":[{"award-number":["61972224"]}]},{"name":"NSFC","award":["61932012"],"award-info":[{"award-number":["61932012"]}]},{"name":"SPRPCAS","award":["XDC02020300"],"award-info":[{"award-number":["XDC02020300"]}]},{"name":"NKRDPC","award":["2021YFB2701000"],"award-info":[{"award-number":["2021YFB2701000"]}]},{"name":"KRPFSCAS","award":["ZDBS-LY-7006"],"award-info":[{"award-number":["ZDBS-LY-7006"]}]},{"name":"YICAS","award":["Y2021041"],"award-info":[{"award-number":["Y2021041"]}]},{"name":"BRPISCAS","award":["ISCAS-JCZD-202301"],"award-info":[{"award-number":["ISCAS-JCZD-202301"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1145\/3600006.3613162","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T14:44:17Z","timestamp":1696344257000},"page":"52-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["One Simple API Can Cause Hundreds of Bugs An Analysis of Refcounting Bugs in All Modern Linux Kernels"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6627-4691","authenticated-orcid":false,"given":"Liang","family":"He","sequence":"first","affiliation":[{"name":"TCA, Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6701-0383","authenticated-orcid":false,"given":"Purui","family":"Su","sequence":"additional","affiliation":[{"name":"TCA \/ SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Cyber Security, Universtiy of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7894-8828","authenticated-orcid":false,"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"},{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4768-0272","authenticated-orcid":false,"given":"Yan","family":"Cai","sequence":"additional","affiliation":[{"name":"SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China"},{"name":"School of Computer Science and Technology, Universtiy of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2598-3149","authenticated-orcid":false,"given":"Jinxin","family":"Ma","sequence":"additional","affiliation":[{"name":"CNITSEC, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2023,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Commit-0a96fa64: Fix improper handling of refcount in uss720_probe. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2-rc8&id=0a96fa640dc928da9eaa46a22c46521b037b78ad  [n. d.]. Commit-0a96fa64: Fix improper handling of refcount in uss720_probe. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2-rc8&id=0a96fa640dc928da9eaa46a22c46521b037b78ad"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Commit-1085f508: Fix refcount leak and iomem leak bugs. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2-rc8&id=1085f5080647f0c9f357c270a537869191f7f2a1  [n. d.]. Commit-1085f508: Fix refcount leak and iomem leak bugs. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2-rc8&id=1085f5080647f0c9f357c270a537869191f7f2a1"},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Commit-258ad2fe: Fix possible memory leak. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2&id=258ad2fe5ede773625adfda88b173f4123e59f45  [n. d.]. Commit-258ad2fe: Fix possible memory leak. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2&id=258ad2fe5ede773625adfda88b173f4123e59f45"},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. Commit-3e7d18b9:fix reference count leak. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.5-rc5&id=3e7d18b9dca388940a19cae30bfc1f76dccd8c28  [n. d.]. Commit-3e7d18b9:fix reference count leak. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.5-rc5&id=3e7d18b9dca388940a19cae30bfc1f76dccd8c28"},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. Commit-87710394: Fix PM usage reference leak. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2&id=8771039482d965bdc8cefd972bcabac2b76944a8  [n. d.]. Commit-87710394: Fix PM usage reference leak. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2&id=8771039482d965bdc8cefd972bcabac2b76944a8"},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. Commit-bf4a9b24: Fix refcount leak in aries_audio_probe. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/sound\/soc\/samsung\/aries_wm8994.c?h=v6.5-rc5&id=bf4a9b2467b775717d0e9034ad916888e19713a3  [n. d.]. Commit-bf4a9b24: Fix refcount leak in aries_audio_probe. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/sound\/soc\/samsung\/aries_wm8994.c?h=v6.5-rc5&id=bf4a9b2467b775717d0e9034ad916888e19713a3"},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. Commit-dcb4b8ad: Fix memory leak in uss720_probe. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2&id=8771039482d965bdc8cefd972bcabac2b76944a8  [n. d.]. Commit-dcb4b8ad: Fix memory leak in uss720_probe. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?h=v6.2&id=8771039482d965bdc8cefd972bcabac2b76944a8"},{"key":"e_1_3_2_1_8_1","unstructured":"[n. d.]. CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization. https:\/\/cwe.mitre.org\/data\/definitions\/362.html  [n. d.]. CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization. https:\/\/cwe.mitre.org\/data\/definitions\/362.html"},{"key":"e_1_3_2_1_9_1","unstructured":"[n. d.]. CWE-401: Missing Release of Memory after Effective Lifetime. https:\/\/cwe.mitre.org\/data\/definitions\/401.html  [n. d.]. CWE-401: Missing Release of Memory after Effective Lifetime. https:\/\/cwe.mitre.org\/data\/definitions\/401.html"},{"key":"e_1_3_2_1_10_1","unstructured":"[n. d.]. CWE-416: Use After Free. https:\/\/cwe.mitre.org\/data\/definitions\/416.html  [n. d.]. CWE-416: Use After Free. https:\/\/cwe.mitre.org\/data\/definitions\/416.html"},{"key":"e_1_3_2_1_11_1","unstructured":"[n. d.]. CWE-911: Improper Update of Reference Count. https:\/\/cwe.mitre.org\/data\/definitions\/911  [n. d.]. CWE-911: Improper Update of Reference Count. https:\/\/cwe.mitre.org\/data\/definitions\/911"},{"key":"e_1_3_2_1_12_1","unstructured":"[n. d.]. Kernel Boot Problem. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=0711f0d7050b9e07c44bc159bbc64ac0a1022c7f.  [n. d.]. Kernel Boot Problem. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/commit\/?id=0711f0d7050b9e07c44bc159bbc64ac0a1022c7f."},{"key":"e_1_3_2_1_13_1","unstructured":"[n. d.]. Linux Kernel Source Tree. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/  [n. d.]. Linux Kernel Source Tree. https:\/\/git.kernel.org\/pub\/scm\/linux\/kernel\/git\/torvalds\/linux.git\/"},{"key":"e_1_3_2_1_14_1","unstructured":"[n. d.]. NUMA Memory Policy. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/mm\/numa_memory_policy.html  [n. d.]. NUMA Memory Policy. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/mm\/numa_memory_policy.html"},{"key":"e_1_3_2_1_15_1","unstructured":"[n. d.]. Rules For Managing Reference Counts. https:\/\/docs.microsoft.com\/zh-cn\/windows\/desktop\/com\/rules-for-managing-reference-counts  [n. d.]. Rules For Managing Reference Counts. https:\/\/docs.microsoft.com\/zh-cn\/windows\/desktop\/com\/rules-for-managing-reference-counts"},{"key":"e_1_3_2_1_16_1","unstructured":"[n. d.]. Submitting patches: the essential guide to getting your code into the kernel. https:\/\/www.kernel.org\/doc\/html\/latest\/process\/submitting-patches.html  [n. d.]. Submitting patches: the essential guide to getting your code into the kernel. https:\/\/www.kernel.org\/doc\/html\/latest\/process\/submitting-patches.html"},{"key":"e_1_3_2_1_17_1","unstructured":"[n. d.]. USB serial. https:\/\/www.kernel.org\/doc\/html\/latest\/usb\/usb-serial.html  [n. d.]. USB serial. https:\/\/www.kernel.org\/doc\/html\/latest\/usb\/usb-serial.html"},{"key":"e_1_3_2_1_18_1","unstructured":"[n. d.]. Word2vec embeddings. https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html.  [n. d.]. Word2vec embeddings. https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html."},{"key":"e_1_3_2_1_19_1","volume-title":"Semantic Computation. In Proceedings of the First International Symposium on Category Theory Applied to Computation and Control.","author":"Goguen J. A.","year":"1974","unstructured":"J. A. Goguen . 1974 . Semantic Computation. In Proceedings of the First International Symposium on Category Theory Applied to Computation and Control. J. A. Goguen. 1974. Semantic Computation. In Proceedings of the First International Symposium on Category Theory Applied to Computation and Control."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1480881.1480897"},{"key":"e_1_3_2_1_21_1","volume-title":"Fuzzing the Linux Kernel. In 2017 Computing Conference.","author":"Carabas Costin","year":"2017","unstructured":"Costin Carabas and Mihai Carabs . 2017 . Fuzzing the Linux Kernel. In 2017 Computing Conference. Costin Carabas and Mihai Carabs. 2017. Fuzzing the Linux Kernel. In 2017 Computing Conference."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502042"},{"key":"e_1_3_2_1_23_1","unstructured":"Coccinelle 2019. Coccinelle: A Program Matching and Transformation Too l for Systems Code.  Coccinelle 2019. Coccinelle: A Program Matching and Transformation Too l for Systems Code."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/367487.367501"},{"key":"e_1_3_2_1_25_1","unstructured":"Paul E. McKenney. [n. d.]. Overview of Linux-Kernel Reference Counting. https:\/\/www.open-std.org\/jtc1\/sc22\/wg21\/docs\/papers\/2007\/n2167.pdf  Paul E. McKenney. [n. d.]. Overview of Linux-Kernel Reference Counting. https:\/\/www.open-std.org\/jtc1\/sc22\/wg21\/docs\/papers\/2007\/n2167.pdf"},{"key":"e_1_3_2_1_26_1","volume-title":"Verifying Reference Counting Implementations. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems.","author":"Emmi Michael","year":"2009","unstructured":"Michael Emmi , Ranjit Jhala , Eddie Kohler , and Rupak Majumdar . 2009 . Verifying Reference Counting Implementations. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems. Michael Emmi, Ranjit Jhala, Eddie Kohler, and Rupak Majumdar. 2009. Verifying Reference Counting Implementations. In International Conference on Tools and Algorithms for the Construction and Analysis of Systems."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 31th USENIX Security Symposium.","author":"He Liang","year":"2022","unstructured":"Liang He , Hong Hu , Purui Su , and Yan Cai . 2022 . FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting on Binaries . In Proceedings of the 31th USENIX Security Symposium. Liang He, Hong Hu, Purui Su, and Yan Cai. 2022. FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting on Binaries. In Proceedings of the 31th USENIX Security Symposium."},{"key":"e_1_3_2_1_28_1","unstructured":"Rafael J. Wysocki and Alan Stern. [n. d.]. Runtime Power Management Framework. https:\/\/www.kernel.org\/doc\/html\/latest\/power\/runtime_pm.html  Rafael J. Wysocki and Alan Stern. [n. d.]. Runtime Power Management Framework. https:\/\/www.kernel.org\/doc\/html\/latest\/power\/runtime_pm.html"},{"key":"e_1_3_2_1_29_1","unstructured":"JOERN [n. d.]. JOERN: The Bug Hunter's Workbench. https:\/\/joern.io\/  JOERN [n. d.]. JOERN: The Bug Hunter's Workbench. https:\/\/joern.io\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Srinivas Kandagatla. [n. d.]. NVMEM Subsystem. https:\/\/www.kernel.org\/doc\/html\/latest\/driver-api\/nvmem.html  Srinivas Kandagatla. [n. d.]. NVMEM Subsystem. https:\/\/www.kernel.org\/doc\/html\/latest\/driver-api\/nvmem.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24018"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359662"},{"key":"e_1_3_2_1_33_1","unstructured":"Greg Kroah-Hartman. [n. d.]. Everything you never wanted to know about kobjects ksets and ktypes. https:\/\/www.kernel.org\/doc\/html\/latest\/core-api\/kobject.html  Greg Kroah-Hartman. [n. d.]. Everything you never wanted to know about kobjects ksets and ktypes. https:\/\/www.kernel.org\/doc\/html\/latest\/core-api\/kobject.html"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 31th USENIX Security Symposium.","author":"Liu Jian","year":"2022","unstructured":"Jian Liu , Lin Yi , Weiteng Chen , Chenyu Song , Zhiyun Qian , and Qiuping Yi . 2022 . LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution . In Proceedings of the 31th USENIX Security Symposium. Jian Liu, Lin Yi, Weiteng Chen, Chenyu Song, Zhiyun Qian, and Qiuping Yi. 2022. LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic Execution. In Proceedings of the 31th USENIX Security Symposium."},{"key":"e_1_3_2_1_36_1","volume-title":"The Linux Kernel Mailing Lists. Retrieved","author":"LKML","year":"2023","unstructured":"LKML 2023. The Linux Kernel Mailing Lists. Retrieved Feb 8, 2023 from https:\/\/lore.kernel.org LKML 2023. The Linux Kernel Mailing Lists. Retrieved Feb 8, 2023 from https:\/\/lore.kernel.org"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation.","author":"Lou Chang","year":"2022","unstructured":"Chang Lou , Yuzhuo Jing , and Peng Huang . 2022 . Demystifying and Checking Silent Semantic Violations in Large Distributed Systems . In Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation. Chang Lou, Yuzhuo Jing, and Peng Huang. 2022. Demystifying and Checking Silent Semantic Violations in Large Distributed Systems. In Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361461"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872389"},{"key":"e_1_3_2_1_40_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. [n. d.]. Efficient Estimation of Word Representations in Vector Space. https:\/\/arxiv.org\/pdf\/1301.3781.pdf.  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. [n. d.]. Efficient Estimation of Word Representations in Vector Space. https:\/\/arxiv.org\/pdf\/1301.3781.pdf."},{"key":"e_1_3_2_1_41_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. arXiv:1301.3781  Tomas Mikolov Kai Chen Greg Corrado and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. arXiv:1301.3781"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815422"},{"key":"e_1_3_2_1_43_1","unstructured":"PLY [n. d.]. PLY: Python Lex-Yacc. https:\/\/ply.readthedocs.io\/  PLY [n. d.]. PLY: Python Lex-Yacc. https:\/\/ply.readthedocs.io\/"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of 11th European Dependable Computing Conference.","author":"Luis","unstructured":"Luis R. Rodrigue and Julia Lawall. 2015. Increasing Automation in the Backporting of Linux Drivers Using Coccinelle . In Proceedings of 11th European Dependable Computing Conference. Luis R. Rodrigue and Julia Lawall. 2015. Increasing Automation in the Backporting of Linux Drivers Using Coccinelle. In Proceedings of 11th European Dependable Computing Conference."},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of European Conference on Object-Oriented Programming.","author":"Siliang Li","year":"2014","unstructured":"Li Siliang and Tan Gang . 2014 . Finding Reference-counting Errors in Python\/C Programs with Affine Analysis . In Proceedings of European Conference on Object-Oriented Programming. Li Siliang and Tan Gang. 2014. Finding Reference-counting Errors in Python\/C Programs with Affine Analysis. In Proceedings of European Conference on Object-Oriented Programming."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483547"},{"key":"e_1_3_2_1_47_1","volume-title":"Retrieved","author":"Syzkaller","year":"2023","unstructured":"Syzkaller 2023 . Syzaller - Kernel Fuzzer . Retrieved Feb 16, 2023 from https:\/\/github.com\/google\/syzkaller Syzkaller 2023. Syzaller - Kernel Fuzzer. Retrieved Feb 16, 2023 from https:\/\/github.com\/google\/syzkaller"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9258-8"},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 30th USENIX Security Symposium.","author":"Tan Xin","year":"2021","unstructured":"Xin Tan , Yuan Zhang , Xiyu Yang , Kangjie Lu , and Min Yang . 2021 . Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking . In Proceedings of the 30th USENIX Security Symposium. Xin Tan, Yuan Zhang, Xiyu Yang, Kangjie Lu, and Min Yang. 2021. Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking. In Proceedings of the 30th USENIX Security Symposium."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering.","author":"Yin Zuoning","year":"2011","unstructured":"Zuoning Yin , Ding Yuan , Yuanyuan Zhou , Shankar Pasupathy , and Lakshmi Bairavasundaram . 2011 . How Do Fixes Become Bugs? A Comprhensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating System . In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. Zuoning Yin, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy, and Lakshmi Bairavasundaram. 2011. How Do Fixes Become Bugs? A Comprhensive Characteristic Study on Incorrect Fixes in Commercial and Open Source Operating System. In Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering."},{"key":"e_1_3_2_1_52_1","volume-title":"Conference on Partial Evaluation and Program Manipulation.","author":"Gil Park Young","year":"1991","unstructured":"Park Young Gil and Goldberg Benjamin . 1991 . Reference Escaple Analysis: Optimizing Reference Counting based on the Lifetime of References . In Conference on Partial Evaluation and Program Manipulation. Park Young Gil and Goldberg Benjamin. 1991. Reference Escaple Analysis: Optimizing Reference Counting based on the Lifetime of References. In Conference on Partial Evaluation and Program Manipulation."}],"event":{"name":"SOSP '23: 29th Symposium on Operating Systems Principles","location":"Koblenz Germany","acronym":"SOSP '23","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"]},"container-title":["Proceedings of the 29th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613162","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:49Z","timestamp":1750178209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600006.3613162"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":52,"alternative-id":["10.1145\/3600006.3613162","10.1145\/3600006"],"URL":"https:\/\/doi.org\/10.1145\/3600006.3613162","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]},"assertion":[{"value":"2023-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}