{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:14Z","timestamp":1772039474737,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,30]],"date-time":"2024-05-30T00:00:00Z","timestamp":1717027200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2334628, 2154973"],"award-info":[{"award-number":["2334628, 2154973"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,30]]},"DOI":"10.1145\/3650200.3656606","type":"proceedings-article","created":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T14:11:54Z","timestamp":1717423914000},"page":"376-387","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["RTT-UAF: Reuse Time Tracking for Use-After-Free Detection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9153-7318","authenticated-orcid":false,"given":"Yubo","family":"Du","sequence":"first","affiliation":[{"name":"University of Pittsburgh, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0034-0358","authenticated-orcid":false,"given":"Yanan","family":"Guo","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8425-8743","authenticated-orcid":false,"given":"Youtao","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8372-6541","authenticated-orcid":false,"given":"Jun","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00058"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507780"},{"key":"e_1_3_2_1_4_1","volume-title":"Oscar: A Practical { Page-Permissions-Based} Scheme for Thwarting Dangling Pointers. In 26th USENIX security symposium (USENIX security 17). 815\u2013832.","author":"Dang HY","year":"2017","unstructured":"Thurston\u00a0HY Dang, Petros Maniatis, and David Wagner. 2017. Oscar: A Practical { Page-Permissions-Based} Scheme for Thwarting Dangling Pointers. In 26th USENIX security symposium (USENIX security 17). 815\u2013832."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507712"},{"key":"e_1_3_2_1_8_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Farkhani Reza\u00a0Mirzazade","year":"2021","unstructured":"Reza\u00a0Mirzazade Farkhani, Mansour Ahmadi, and Long Lu. 2021. { PTAuth} : Temporal Memory Safety via Robust Points-to Authentication. In 30th USENIX Security Symposium (USENIX Security 21). 1037\u20131054."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560625"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464835"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00095"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516713"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34175-6_13"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480076"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560598"},{"key":"e_1_3_2_1_16_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos\u00a0Chinea Perez, Jan-Erik Ekberg, and N Asokan. 2019. { PAC} it up: Towards pointer integrity using { ARM} pointer authentication. In 28th USENIX Security Symposium (USENIX Security 19). 177\u2013194."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337181"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/250900.250910"},{"key":"e_1_3_2_1_21_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. { AddressSanitizer} : A fast address sanity checker. In 2012 USENIX annual technical conference (USENIX ATC 12). 309\u2013318."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791203"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00068"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00056"},{"key":"e_1_3_2_1_25_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Wickman Brian","year":"2021","unstructured":"Brian Wickman, Hong Hu, Insu Yun, Daehee Jang, JungWon Lim, Sanidhya Kashyap, and Taesoo Kim. 2021. Preventing { Use-After-Free} Attacks with Fast Forward Allocation. In 30th USENIX Security Symposium (USENIX Security 21). 2453\u20132470."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358288"},{"key":"e_1_3_2_1_27_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yagemann Carter","year":"2023","unstructured":"Carter Yagemann, Simon\u00a0P Chung, Brendan Saltaformaggio, and Wenke Lee. 2023. { PUMM} : Preventing { Use-After-Free} Using Execution Unit Partitioning. In 32nd USENIX Security Symposium (USENIX Security 23). 823\u2013840."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940113"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00076"},{"key":"e_1_3_2_1_30_1","volume-title":"2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE, 999\u20131012","author":"Tarek\u00a0Ibn Ziad Mohamed","year":"2021","unstructured":"Mohamed Tarek\u00a0Ibn Ziad, Miguel\u00a0A Arroyo, Evgeny Manzhosov, and Simha Sethumadhavan. 2021. ZeR\u00d8: Zero-overhead resilient operation under pointer integrity attacks. In 2021 ACM\/IEEE 48th Annual International Symposium on Computer Architecture (ISCA). IEEE, 999\u20131012."}],"event":{"name":"ICS '24: 2024 International Conference on Supercomputing","location":"Kyoto Japan","acronym":"ICS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 38th ACM International Conference on Supercomputing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650200.3656606","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650200.3656606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:23:22Z","timestamp":1755876202000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650200.3656606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,30]]},"references-count":30,"alternative-id":["10.1145\/3650200.3656606","10.1145\/3650200"],"URL":"https:\/\/doi.org\/10.1145\/3650200.3656606","relation":{},"subject":[],"published":{"date-parts":[[2024,5,30]]},"assertion":[{"value":"2024-06-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}