{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:24Z","timestamp":1772039484020,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640391","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"433-449","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["GIANTSAN: Efficient Memory Sanitization with Segment Folding"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5093-8262","authenticated-orcid":false,"given":"Hao","family":"Ling","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5328-3994","authenticated-orcid":false,"given":"Heqing","family":"Huang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0617-5322","authenticated-orcid":false,"given":"Chengpeng","family":"Wang","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6340-1416","authenticated-orcid":false,"given":"Yuandao","family":"Cai","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6417-1034","authenticated-orcid":false,"given":"Charles","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00058"},{"key":"e_1_3_2_1_2_1","first-page":"51","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09","author":"Akritidis Periklis","year":"2009","unstructured":"Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. Baggy Bounds Checking: An efficient and backwards-compatible defense against out-of-bounds errors. In Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09, page 51--66, USA, 2009. USENIX Association. https:\/\/www.usenix.org\/legacy\/events\/sec09\/tech\/full_papers\/akritidis.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"Android. Hwasan asan and kasan. https:\/\/source.android.com\/docs\/security\/test\/memory-safety\/hwasan-asan-kasan."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196540"},{"key":"e_1_3_2_1_5_1","volume-title":"How to use pageheap.exe in windows xp, windows","author":"Microsoft Corporation","year":"2000","unstructured":"Microsoft Corporation. How to use pageheap.exe in windows xp, windows 2000, and windows server 2003. 2000. https:\/\/mskb.pkisolutions.com\/kb\/286470."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1176994"},{"key":"e_1_3_2_1_7_1","first-page":"815","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Dang Thurston H.Y.","year":"2017","unstructured":"Thurston H.Y. Dang, Petros Maniatis, and David Wagner. Oscar: A practical Page-Permissions-Based scheme for thwarting dangling pointers. In 26th USENIX Security Symposium (USENIX Security 17), pages 815--832, Vancouver, BC, August 2017. USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/dang."},{"key":"e_1_3_2_1_8_1","volume-title":"Linux flaw project. https:\/\/github.com\/mudongliang\/LinuxFlaw","author":"Mu Dongliang","year":"2017","unstructured":"Dongliang Mu. Linux flaw project. https:\/\/github.com\/mudongliang\/LinuxFlaw, 2017."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192388"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23287"},{"key":"e_1_3_2_1_12_1","first-page":"1037","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Reza Mirzazade","year":"2021","unstructured":"Reza Mirzazade farkhani, Mansour Ahmadi, and Long Lu. PTAuth: Temporal memory safety via robust points-to authentication. In 30th USENIX Security Symposium (USENIX Security 21), pages 1037--1054. USENIX Association, August 2021. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/mirzazade."},{"key":"e_1_3_2_1_13_1","unstructured":"GCC. The gnu compiler collection. https:\/\/gcc.gnu.org\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Google. Addresssanitizier wiki. https:\/\/github.com\/google\/sanitizers\/wiki\/AddressSanitizerFlags."},{"key":"e_1_3_2_1_15_1","first-page":"535","volume-title":"17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23)","author":"Shankaranarayana Gopal Amogha Udupa","year":"2023","unstructured":"Amogha Udupa Shankaranarayana Gopal, Raveendra Soori, Michael Ferdman, and Dongyoon Lee. TAILCHECK: A lightweight heap over-flow detection mechanism with page protection and tagged pointers. In 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23), pages 535--552, Boston, MA, July 2023. USENIX Association. https:\/\/www.usenix.org\/conference\/osdi23\/presentation\/gopal."},{"key":"e_1_3_2_1_16_1","first-page":"805","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Gorter Floris","year":"2023","unstructured":"Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van der Kouwe, Cristiano Giuffrida, and Herbert Bos. FloatZone: Accelerating memory error detection using the floating point unit. In 32nd USENIX Security Symposium (USENIX Security 23), pages 805--822, Anaheim, CA, August 2023. USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/gorter."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23312"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259034"},{"key":"e_1_3_2_1_19_1","first-page":"125","volume-title":"Proc. 1992 Winter USENIX Conference","author":"Hastings Reed","year":"1992","unstructured":"Reed Hastings. Purify: Fast detection of memory leaks and access errors. In Proc. 1992 Winter USENIX Conference, pages 125--136, 1992. https:\/\/web.stanford.edu\/class\/cs343\/resources\/purify.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_1_21_1","volume-title":"Automated and Algorithmic Debugging","author":"Richard W.","year":"1997","unstructured":"Richard W. M. Jones and Paul H. J. Kelly. Backwards-compatible bounds checking for arrays and pointers in c programs. In Automated and Algorithmic Debugging, 1997. https:\/\/www.doc.ic.ac.uk\/~phjk\/Publications\/BoundsCheckingForC.pdf."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190553"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_24_1","volume-title":"LLVM: An infrastructure for multi-stage optimization","author":"Lattner Chris Arthur","year":"2002","unstructured":"Chris Arthur Lattner. LLVM: An infrastructure for multi-stage optimization. 2002. http:\/\/llvm.org."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560598"},{"key":"e_1_3_2_1_26_1","unstructured":"Linux Kernel. The kernel address sanitizer. https:\/\/www.kernel.org\/doc\/html\/v4.14\/dev-tools\/kasan.html."},{"key":"e_1_3_2_1_27_1","volume-title":"Next Generation Security Software","author":"Litchfield David","year":"2005","unstructured":"David Litchfield. Buffer underruns, dep, aslr and improving the exploitation prevention mechanisms (xpms) on the windows platform. Next Generation Security Software, 2005. https:\/\/research.nccgroup.com\/wp-content\/uploads\/episerver-images\/assets\/854f87540884465e8c6930b1b2fabf9b\/854f87540884465e8c6930b1b2fabf9b.pdf."},{"key":"e_1_3_2_1_28_1","unstructured":"LLVM. Scalar evolution and loop optimization. https:\/\/llvm.org\/devmtg\/2009-10\/ScalarEvolutionAndLoopOptimization.pdf."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837855.1806657"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_32_1","volume-title":"https:\/\/samate.nist.gov\/SARD\/test-suites","author":"NIST.","year":"2017","unstructured":"NIST. Software assurance reference dataset. https:\/\/samate.nist.gov\/SARD\/test-suites, 2017."},{"key":"e_1_3_2_1_33_1","volume-title":"Network and Distributed System Security Symposium, 2004","author":"Ruwase Olatunji","year":"2004","unstructured":"Olatunji Ruwase and Monica S. Lam. A practical dynamic buffer over-flow detector. In Network and Distributed System Security Symposium, 2004. https:\/\/www.ndss-symposium.org\/ndss2004\/practical-dynamic-buffer-overflow-detector\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342821.2342849"},{"key":"e_1_3_2_1_35_1","volume-title":"Memory tagging and how it improves c\/c++ memory safety. arXiv preprint arXiv:1802.09517","author":"Serebryany Kostya","year":"2018","unstructured":"Kostya Serebryany, Evgenii Stepanov, Aleksey Shlyapnikov, Vlad Tsyrklevich, and Dmitry Vyukov. Memory tagging and how it improves c\/c++ memory safety. arXiv preprint arXiv:1802.09517, 2018. https:\/\/arxiv.org\/abs\/1802.09517."},{"key":"e_1_3_2_1_36_1","volume-title":"2005 USENIX Annual Technical Conference (USENIX ATC 05)","author":"Seward Julian","year":"2005","unstructured":"Julian Seward and Nicholas Nethercote. Using valgrind to detect undefined value errors with Bit-Precision. In 2005 USENIX Annual Technical Conference (USENIX ATC 05), Anaheim, CA, April 2005. USENIX Association. https:\/\/www.usenix.org\/conference\/2005-usenix-annual-technical-conference\/using-valgrind-detect-undefined-value-errors-bit."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00010"},{"key":"e_1_3_2_1_38_1","volume-title":"Spec cpu\u00ae","author":"Standard Performance Evaluation Corporation","year":"2017","unstructured":"Standard Performance Evaluation Corporation. Spec cpu\u00ae 2017. https:\/\/www.spec.org\/cpu2017\/, 2022."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_40_1","volume-title":"2022 CWE Top 25 Most Dangerous Software Weaknesses. https:\/\/cwe.mitre.org\/top25\/archive\/2022\/2022_cwe_top25.html","author":"Team The","year":"2022","unstructured":"The 2022 CWE Top 25 Team. 2022 CWE Top 25 Most Dangerous Software Weaknesses. https:\/\/cwe.mitre.org\/top25\/archive\/2022\/2022_cwe_top25.html, 2022."},{"key":"e_1_3_2_1_41_1","first-page":"479","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Zhang Jiang","year":"2021","unstructured":"Jiang Zhang, Shuai Wang, Manuel Rigger, Pinjia He, and Zhendong Su. SANRAZOR: Reducing redundant sanitizer checks in C\/C++ programs. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21), pages 479--494. USENIX Association, July 2021. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/zhang."},{"key":"e_1_3_2_1_42_1","first-page":"4345","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Zhang Yuchen","year":"2022","unstructured":"Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Trian-dopoulos, and Jun Xu. Debloating address sanitizer. In 31st USENIX Security Symposium (USENIX Security 22), pages 4345--4363, Boston, MA, August 2022. USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/zhang-yuchen."}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640391","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:42Z","timestamp":1750291422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640391"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":42,"alternative-id":["10.1145\/3620665.3640391","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640391","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}