{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T13:01:37Z","timestamp":1761570097874,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","funder":[{"name":"Shenzhen Science and Technology Foundation","award":["General Program, JCYJ20210324093212034"],"award-info":[{"award-number":["General Program, JCYJ20210324093212034"]}]},{"name":"2022 Guangdong Province Undergraduate University Quality Engineering Project","award":["Shenzhen University Academic Affairs [2022] No. 7"],"award-info":[{"award-number":["Shenzhen University Academic Affairs [2022] No. 7"]}]},{"name":"Science and Technology R&D Program of Shenzhen","award":["20220810135520002"],"award-info":[{"award-number":["20220810135520002"]}]},{"name":"Guangdong Province Key Laboratory of Popular High Performance Computers","award":["2017B030314073"],"award-info":[{"award-number":["2017B030314073"]}]},{"name":"Guangdong Province Engineering Center of China-made High Performance Data Computing System","award":["null"],"award-info":[{"award-number":["null"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,20]]},"DOI":"10.1145\/3755881.3755918","type":"proceedings-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:46:17Z","timestamp":1761565577000},"page":"96-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Tech-ASan: Two-stage check for Address Sanitizer"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6241-4251","authenticated-orcid":false,"given":"Yixuan","family":"Cao","sequence":"first","affiliation":[{"name":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7691-5587","authenticated-orcid":false,"given":"Yuhong","family":"Feng","sequence":"additional","affiliation":[{"name":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9490-0449","authenticated-orcid":false,"given":"Huafeng","family":"Li","sequence":"additional","affiliation":[{"name":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-7370-2377","authenticated-orcid":false,"given":"Chongyi","family":"Huang","sequence":"additional","affiliation":[{"name":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4312-157X","authenticated-orcid":false,"given":"Fangcao","family":"Jian","sequence":"additional","affiliation":[{"name":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6789-5573","authenticated-orcid":false,"given":"Haoran","family":"Li","sequence":"additional","affiliation":[{"name":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2948-6468","authenticated-orcid":false,"given":"Xu","family":"Wang","sequence":"additional","affiliation":[{"name":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.TN.1995"},{"key":"e_1_3_3_2_3_2","unstructured":"Derek Bruening and Saman Amarasinghe. 2004. Efficient transparent and comprehensive runtime code manipulation. (2004)."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764689"},{"key":"e_1_3_3_2_5_2","first-page":"815","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Dang Thurston\u00a0H.Y.","year":"2017","unstructured":"Thurston\u00a0H.Y. Dang, Petros Maniatis, and David Wagner. 2017. Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 815\u2013832. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/dang"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Gregory\u00a0J. Duck and Roland H.\u00a0C. Yap. 2018. EffectiveSan: type and memory error detection using dynamically typed C\/C++. SIGPLAN Not. 53 4 (jun 2018) 181\u2013195. 10.1145\/3296979.3192388","DOI":"10.1145\/3296979.3192388"},{"key":"e_1_3_3_2_7_2","first-page":"7195","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"George Rahul","year":"2024","unstructured":"Rahul George, Mingming Chen, Kaiming Huang, Zhiyun Qian, Thomas\u00a0La Porta, and Trent Jaeger. 2024. OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 7195\u20137212. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/george"},{"key":"e_1_3_3_2_8_2","first-page":"805","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Gorter Floris","year":"2023","unstructured":"Floris Gorter, Enrico Barberis, Raphael Isemann, Erik van\u00a0der Kouwe, Cristiano Giuffrida, and Herbert Bos. 2023. FloatZone: Accelerating Memory Error Detection using the Floating Point Unit. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 805\u2013822. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/gorter"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560625"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464835"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"John\u00a0L. Henning. 2006. SPEC CPU2006 benchmark descriptions. SIGARCH Comput. Archit. News 34 4 (Sept. 2006) 1\u201317. 10.1145\/1186736.1186737","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3589250.3596139"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_19"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560598"},{"key":"e_1_3_3_2_16_2","first-page":"4015","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Lin Zhenpeng","year":"2024","unstructured":"Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, and Xinyu Xing. 2024. CAMP: Compiler and Allocator-based Heap Memory Protection. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 4015\u20134032. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/lin-zhenpeng"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640391"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884784"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Santosh Nagarakatte Jianzhou Zhao Milo\u00a0M.K. Martin and Steve Zdancewic. 2009. SoftBound: highly compatible and complete spatial memory safety for c. SIGPLAN Not. 44 6 (June 2009) 245\u2013258. 10.1145\/1543135.1542504","DOI":"10.1145\/1543135.1542504"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Santosh Nagarakatte Jianzhou Zhao Milo\u00a0M.K. Martin and Steve Zdancewic. 2010. CETS: compiler enforced temporal safety for C. SIGPLAN Not. 45 8 (jun 2010) 31\u201340. 10.1145\/1837855.1806657","DOI":"10.1145\/1837855.1806657"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254820"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Nicholas Nethercote and Julian Seward. 2007. Valgrind: a framework for heavyweight dynamic binary instrumentation. SIGPLAN Not. 42 6 (jun 2007) 89\u2013100. 10.1145\/1273442.1250746","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690278"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Manuel Rigger Roland Schatz Ren\u00e9 Mayrhofer Matthias Grimmer and Hanspeter M\u00f6ssenb\u00f6ck. 2018. Sulong and Thanks for All the Bugs: Finding Errors in C Programs by Abstracting from the Native Execution Model. SIGPLAN Not. 53 2 (mar 2018) 377\u2013391. 10.1145\/3296957.3173174","DOI":"10.1145\/3296957.3173174"},{"key":"e_1_3_3_2_25_2","first-page":"309","volume-title":"2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference (USENIX ATC 12). USENIX Association, Boston, MA, 309\u2013318. https:\/\/www.usenix.org\/conference\/atc12\/technical-sessions\/presentation\/serebryany"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3639477.3640328"},{"key":"e_1_3_3_2_27_2","unstructured":"Kostya Serebryany Evgenii Stepanov Aleksey Shlyapnikov Vlad Tsyrklevich and Dmitry Vyukov. 2018. Memory Tagging and how it improves C\/C++ memory safety. CoRR abs\/1802.09517 (2018). arXiv:https:\/\/arXiv.org\/abs\/1802.09517http:\/\/arxiv.org\/abs\/1802.09517"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00088"},{"key":"e_1_3_3_2_30_2","unstructured":"Common Vulnerabilities. 2005. Common vulnerabilities and exposures. The MITRE Corporation [online] Available: https:\/\/cve.mitre.org\/index.html (2005)."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.58"},{"key":"e_1_3_3_2_32_2","first-page":"271","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Xu Meng","year":"2017","unstructured":"Meng Xu, Kangjie Lu, Taesoo Kim, and Wenke Lee. 2017. Bunshin: Compositing Security Mechanisms through Diversification. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, CA, 271\u2013283. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/xu-meng"},{"key":"e_1_3_3_2_33_2","first-page":"479","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Zhang Jiang","year":"2021","unstructured":"Jiang Zhang, Shuai Wang, Manuel Rigger, Pinjia He, and Zhendong Su. 2021. SanRazor: Reducing Redundant Sanitizer Checks in C\/C++ Programs. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). USENIX Association, 479\u2013494. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/zhang"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598098"},{"key":"e_1_3_3_2_35_2","first-page":"4345","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Zhang Yuchen","year":"2022","unstructured":"Yuchen Zhang, Chengbin Pang, Georgios Portokalidis, Nikos Triandopoulos, and Jun Xu. 2022. Debloating Address Sanitizer. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 4345\u20134363. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/zhang-yuchen"}],"event":{"name":"Internetware 2025: the 16th International Conference on Internetware","sponsor":["SIGSOFT ACM Special Interest Group on Artificial Intelligence"],"location":"Trondheim Norway","acronym":"Internetware 2025"},"container-title":["Proceedings of the 16th International Conference on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3755881.3755918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:50:10Z","timestamp":1761565810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3755881.3755918"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":34,"alternative-id":["10.1145\/3755881.3755918","10.1145\/3755881"],"URL":"https:\/\/doi.org\/10.1145\/3755881.3755918","relation":{},"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}