{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:18:33Z","timestamp":1761664713227,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["11-2628-E-002-022- & 112-2628-E-002-027"],"award-info":[{"award-number":["11-2628-E-002-022- & 112-2628-E-002-027"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,30]]},"DOI":"10.1145\/3664476.3664492","type":"proceedings-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T12:35:50Z","timestamp":1721910950000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tagging Extension"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5230-5553","authenticated-orcid":false,"given":"Yu-Chang","family":"Chen","sequence":"first","affiliation":[{"name":"National Taiwan University, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6883-5373","authenticated-orcid":false,"given":"Shih-Wei","family":"Li","sequence":"additional","affiliation":[{"name":"National Taiwan University, Taiwan"}]}],"member":"320","published-online":{"date-parts":[[2024,7,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. Stack Safety Analysis \u2014 LLVM 11 documentation. https:\/\/releases.llvm.org\/11.0.0\/docs\/StackSafetyAnalysis.html"},{"key":"e_1_3_2_2_2_1","unstructured":"2022. CVE-2021-3156: Heap-Based Buffer Overflow in Sudo (Baron Samedit) | Qualys Security Blog. https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2021\/01\/26\/cve-2021-3156-heap-based-buffer-overflow-in-sudo-baron-samedit [Online]."},{"key":"e_1_3_2_2_3_1","unstructured":"2022. Towards the next generation of XNU memory safety: kallocMath 1type. https:\/\/security.apple.com\/blog\/towards-the-next-generation-of-xnu-memory-safety [Online]."},{"volume-title":"Arm Memory Tagging Extension. https:\/\/source.android.com\/docs\/security\/test\/memory-safety\/arm-mte [Online","year":"2023","key":"e_1_3_2_2_4_1","unstructured":"2023. Arm Memory Tagging Extension. https:\/\/source.android.com\/docs\/security\/test\/memory-safety\/arm-mte [Online; accessed 25. Aug. 2023]."},{"volume-title":"Attributes in Clang \u2014 Clang 17.0.0git documentation. https:\/\/clang.llvm.org\/docs\/AttributeReference.html#amd-gpu-attributes [Online","year":"2023","key":"e_1_3_2_2_5_1","unstructured":"2023. Attributes in Clang \u2014 Clang 17.0.0git documentation. https:\/\/clang.llvm.org\/docs\/AttributeReference.html#amd-gpu-attributes [Online; accessed 30. Jun. 2023]."},{"key":"e_1_3_2_2_6_1","unstructured":"2023. CWE - 2022 CWE Top 25 Most Dangerous Software Weaknesses. https:\/\/cwe.mitre.org\/top25\/archive\/2022\/2022_cwe_top25.html [Online]."},{"key":"e_1_3_2_2_7_1","unstructured":"2023. Memory safety. https:\/\/www.chromium.org\/Home\/chromium-security\/memory-safety [Online]."},{"key":"e_1_3_2_2_8_1","unstructured":"2023. PartitionAlloc Design. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/master\/base\/allocator\/partition_allocator\/PartitionAlloc.md"},{"key":"e_1_3_2_2_9_1","unstructured":"2023. Ptmalloc2. https:\/\/sourceware.org\/git\/?p=glibc.git%3Ba=blob%3Bf=malloc\/malloc.c%3Bh=bd3c76ed310c4c2cbf8f141eb6b76182926cf24a%3Bhb=refs\/heads\/release\/2.36\/master"},{"key":"e_1_3_2_2_10_1","unstructured":"2023. Scudo. https:\/\/source.android.com\/docs\/security\/test\/scudo"},{"key":"e_1_3_2_2_11_1","unstructured":"2023. The LLVM Compiler Infrastructure Project. https:\/\/llvm.org [Online]."},{"volume-title":"Arm Cortex-X2 Core Software Optimization Guide r2p1. Arm (Jan","year":"2022","key":"e_1_3_2_2_12_1","unstructured":"Arm. 2022. Arm Cortex-X2 Core Software Optimization Guide r2p1. Arm (Jan. 2022). https:\/\/developer.arm.com\/documentation\/PJDOC-466751330-14955\/latest"},{"key":"e_1_3_2_2_13_1","volume-title":"Exploiting an 18 Year Old Bug. Medium (Dec","author":"Baines Jacob","year":"2021","unstructured":"Jacob Baines. 2021. Exploiting an 18 Year Old Bug. Medium (Dec. 2021). https:\/\/medium.com\/tenable-techblog\/exploiting-an-18-year-old-bug-b47afe54172"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WWC.2001.990739"},{"key":"e_1_3_2_2_15_1","unstructured":"Apple Inc.2021. IsoHeap from WebKit. https:\/\/github.com\/WebKit\/WebKit\/blob\/main\/Source\/bmalloc\/bmalloc\/IsoHeap.h"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"e_1_3_2_2_17_1","unstructured":"Hans Liljestrand Carlos Chinea R\u00e9mi Denis-Courmont Jan-Erik Ekberg and N. Asokan. 2022. Color My World: Deterministic Tagging for Memory Safety. arxiv:2204.03781\u00a0[cs.CR]"},{"key":"e_1_3_2_2_18_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos\u00a0Chinea Perez, Jan-Erik Ekberg, and N Asokan. 2019. { PAC} it up: Towards pointer integrity using { ARM} pointer authentication. In 28th USENIX Security Symposium (USENIX Security 19). 177\u2013194."},{"key":"e_1_3_2_2_19_1","unstructured":"Arm Limited. 2024. Arm Memory Tagging Extension Whitepaper."},{"key":"e_1_3_2_2_20_1","unstructured":"Google LLC. 2024. PartitionAlloc Design. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/refs\/heads\/main\/base\/allocator\/partition_allocator\/PartitionAlloc.md"},{"volume-title":"https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit [Online","year":"2023","key":"e_1_3_2_2_21_1","unstructured":"m4drat. 2023. CVE-2013-2028-Exploit. https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit [Online; accessed 16. May 2023]."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24026"},{"key":"e_1_3_2_2_23_1","unstructured":"microsoft. 2023. SSTIC2020 - Pursuing Durably Safe Systems Software. https:\/\/github.com\/microsoft\/MSRC-Security-Research\/blob\/master\/presentations\/2020_06_SSTIC\/SSTIC2020 - Pursuing Durably Safe Systems Software.pdf [Online]."},{"key":"e_1_3_2_2_24_1","unstructured":"Kostya Serebryany. [n. d.]. ARM Memory Tagging Extension and How It Improves C\/C++ Memory Safety."},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the 2012 USENIX Conference on Annual Technical Conference","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference (Boston, MA) (USENIX ATC\u201912). USENIX Association, USA, 28."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00087"},{"key":"e_1_3_2_2_27_1","unstructured":"Robert N.\u00a0M. Watson. 2019. Capability Hardware Enhanced RISC Instructions (CHERI). https:\/\/www.cl.cam.ac.uk\/research\/security\/ctsrd\/cheri\/"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00098"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358288"}],"event":{"name":"ARES 2024: The 19th International Conference on Availability, Reliability and Security","acronym":"ARES 2024","location":"Vienna Austria"},"container-title":["Proceedings of the 19th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664476.3664492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:52:45Z","timestamp":1755881565000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664476.3664492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":29,"alternative-id":["10.1145\/3664476.3664492","10.1145\/3664476"],"URL":"https:\/\/doi.org\/10.1145\/3664476.3664492","relation":{},"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2024-07-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}