{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:11:43Z","timestamp":1760033503296,"version":"build-2065373602"},"reference-count":95,"publisher":"Association for Computing Machinery (ACM)","issue":"OOPSLA2","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Program. Lang."],"published-print":{"date-parts":[[2025,10,9]]},"abstract":"<jats:p>In untrusted execution environments such as web browsers, code from remote sources is regularly executed. To harden these environments against attacks, constituent programming languages and their implementations must uphold certain safety properties, such as memory safety. These properties must be maintained across the entire compilation stack, which may include intermediate languages that do not provide the same safety guarantees. Any case where properties are not preserved could lead to a serious security vulnerability.<\/jats:p>\n          <jats:p>\n            In this work, we identify a\n            <jats:italic toggle=\"yes\">specification vulnerability<\/jats:italic>\n            in the WebGPU Shading Language (WGSL) where code with data races can be compiled to intermediate representations in which an optimizing compiler could legitimately remove memory safety guardrails. To address this, we present SafeRace, a collection of threat assessments and specification proposals across the WGSL execution stack. While our threat assessment showed that this vulnerability does not appear to be exploitable on current systems, it creates a \u201dticking time bomb\u201d, especially as compilers in this area are rapidly evolving. Given this, we introduce the SafeRace Memory Safety Guarantee (SMSG), two components that preserve memory safety in the WGSL execution stack even in the presence of data races. The first component specifies that program slices contributing to memory indexing must be race free and is implemented via a compiler pass for WGSL programs. The second component is a requirement on intermediate representations that limits the effects of data races so that they cannot impact race-free program slices. While the first component is not guaranteed to apply to all possible WGSL programs due to limitations on how some data types can be accessed, we show that existing language constructs are sufficient to implement this component with minimal performance overhead on many existing important WebGPU applications. We test the second component by performing a fuzzing campaign of 81 hours across 21 compilation stacks; our results show violations on only one (likely buggy) machine, thus providing evidence that lower-level GPU frameworks could relatively straightforwardly support this constraint. Finally, our assessments discovered GPU memory isolation vulnerabilities in Apple and AMD GPUs, as well as a security-critical miscompilation of WGSL in a pre-release version of Firefox.\n          <\/jats:p>","DOI":"10.1145\/3763075","type":"journal-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T08:49:50Z","timestamp":1759999790000},"page":"697-725","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["SafeRace: Assessing and Addressing WebGPU Memory Safety in the Presence of Data Races"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1324-0738","authenticated-orcid":false,"given":"Reese","family":"Levine","sequence":"first","affiliation":[{"name":"University of California at Santa Cruz, Santa Cruz, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-4724-8992","authenticated-orcid":false,"given":"Ashley","family":"Lee","sequence":"additional","affiliation":[{"name":"University of California at Santa Cruz, Santa Cruz, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6130-5092","authenticated-orcid":false,"given":"Neha","family":"Abbas","sequence":"additional","affiliation":[{"name":"University of California at Santa Cruz, Santa Cruz, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1511-3839","authenticated-orcid":false,"given":"Kyle","family":"Little","sequence":"additional","affiliation":[{"name":"University of California at Santa Cruz, Santa Cruz, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1646-7935","authenticated-orcid":false,"given":"Tyler","family":"Sorensen","sequence":"additional","affiliation":[{"name":"Microsoft, Seattle, USA"},{"name":"University of California at Santa Cruz, Santa Cruz, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,10,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2024. Dawn: A WebGPU implementation. https:\/\/dawn.googlesource.com\/dawn"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"R. Abbott J. Chin Jed Donnelley W. Konigsford S. Tokubo and D. Webb. 1976. Security analysis and enhancements of computer operating systems. https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/IR\/nbsir76-1041.pdf","DOI":"10.6028\/NBS.IR.76-1041"},{"key":"e_1_2_1_3_1","unstructured":"Apple Inc. 2025. Metal. https:\/\/developer.apple.com\/documentation\/metal\/"},{"key":"e_1_2_1_4_1","unstructured":"Babylon.js Team. 2025. Babylon.js FFT ocean demo. https:\/\/playground.babylonjs.com\/?webgpu##YX6IB8##758"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926394"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384625"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276514"},{"key":"e_1_2_1_8_1","unstructured":"Google Security Blog. 2019. Queue hardening enhancements. https:\/\/security.googleblog.com\/2019\/05\/queue-hardening-enhancements.html"},{"key":"e_1_2_1_9_1","volume-title":"3rd USENIX Workshop on Hot Topics in Parallelism. https:\/\/dl.acm.org\/doi\/10","author":"Boehm J.","year":"2011","unstructured":"Hans-J. Boehm. 2011. How to miscompile programs with \"benign\" data races. In 3rd USENIX Workshop on Hot Topics in Parallelism. https:\/\/dl.acm.org\/doi\/10.5555\/2001252.2001255"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC63097.2024.00034"},{"key":"e_1_2_1_11_1","unstructured":"Microsoft Security Response Center. 2019. We need a safer systems programming language. https:\/\/msrc.microsoft.com\/blog\/2019\/07\/we-need-a-safer-systems-programming-language\/"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Tsong Yueh Chen Shing-Chi Cheung and Siu-Ming Yiu. 1998. Metamorphic testing: a new approach for generating next test cases. https:\/\/doi.org\/10.48550\/arXiv.2002.12543 10.48550\/arXiv.2002.12543","DOI":"10.48550\/arXiv.2002.12543"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81685-8_19"},{"key":"e_1_2_1_14_1","unstructured":"NVIDIA Corporation. 2024. CUDA Ada GPU architecture tuning guide. https:\/\/docs.nvidia.com\/cuda\/ada-tuning-guide\/index.html"},{"key":"e_1_2_1_15_1","unstructured":"cppreference.com. 2024. Multithreading - C++ Language Documentation. https:\/\/en.cppreference.com\/w\/cpp\/language\/multithread"},{"key":"e_1_2_1_16_1","unstructured":"cppreference.com. 2025. std::atomic - C++ Reference. https:\/\/en.cppreference.com\/w\/cpp\/atomic\/atomic"},{"key":"e_1_2_1_17_1","unstructured":"NIST National Vulnerability Database. 2002. CVE-2002-0649. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2002-0649"},{"key":"e_1_2_1_18_1","unstructured":"NIST National Vulnerability Database. 2014. CVE-2014-0160 (Heartbleed). https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2014-0160"},{"key":"e_1_2_1_19_1","unstructured":"NIST National Vulnerability Database. 2016. CVE-2016-4655. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-4655"},{"key":"e_1_2_1_20_1","unstructured":"NIST National Vulnerability Database. 2022. CVE-2022-32947. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-32947"},{"key":"e_1_2_1_21_1","unstructured":"NIST National Vulnerability Database. 2025. CVE-2024-36353 (AMD Leftover Global Memory). https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-36353"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","unstructured":"R.A. DeMillo R.J. Lipton and F.G. Sayward. 1978. Hints on test data selection: help for the practicing programmer. Computer https:\/\/doi.org\/10.1109\/C-M.1978.218136 10.1109\/C-M.1978.218136","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_2_1_23_1","volume-title":"webgpu-msm-bls12-377: WebGPU MSM implementation for BLS12\u2011377 curve (ZPrize","author":"Derei Tal","year":"2023","unstructured":"Tal Derei and Koh Wei Jie. 2023. webgpu-msm-bls12-377: WebGPU MSM implementation for BLS12\u2011377 curve (ZPrize 2023). https:\/\/github.com\/td-kwj-zp2023\/webgpu-msm-bls12-377"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2208.07339"},{"key":"e_1_2_1_25_1","unstructured":"ONNX Runtime developers. 2025. Using WebGPU with ONNX Runtime. https:\/\/onnxruntime.ai\/docs\/tutorials\/web\/ep-webgpu.html"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192421"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133917"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454092"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379687"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806625"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837615"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009839"},{"key":"e_1_2_1_34_1","unstructured":"Apache Software Foundation. [n. d.]. Apache TVM: Open Deep Learning Compiler Stack. https:\/\/github.com\/apache\/tvm"},{"key":"e_1_2_1_35_1","unstructured":"gfx-rs Developers. 2025. wgpu Issue #4972: support for buffer mapping in chrome WebGPU. https:\/\/github.com\/gfx-rs\/wgpu\/issues\/4972 Accessed: 2025-03-12"},{"key":"e_1_2_1_36_1","unstructured":"Google MediaPipe Studio. 2025. MediaPipe Studio: LLM inference demo. https:\/\/mediapipe-studio.webapps.google.com\/studio\/demo\/llm_inference"},{"key":"e_1_2_1_37_1","unstructured":"Khronos Group. [n. d.]. Vulkan 1.3 Specification. https:\/\/registry.khronos.org\/vulkan\/specs\/1.3-extensions\/html\/vkspec.html"},{"key":"e_1_2_1_38_1","unstructured":"Khronos Group. 2024. SPIR-V Unified Specification. https:\/\/registry.khronos.org\/SPIR-V\/specs\/unified1\/SPIRV.html#_memory_instructions Accessed: 2024-10-07"},{"key":"e_1_2_1_39_1","unstructured":"Khronos Group. 2024. Vulkan Guide - Robustness. https:\/\/docs.vulkan.org\/guide\/latest\/robustness.html"},{"key":"e_1_2_1_40_1","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Guo Yanan","year":"2024","unstructured":"Yanan Guo, Zhenkai Zhang, and Jun Yang. 2024. GPU memory exploitation for fun and profit. In 33rd USENIX Security Symposium (USENIX Security 24). https:\/\/www.usenix.org\/system\/files\/usenixsecurity24-guo-yanan.pdf"},{"key":"e_1_2_1_41_1","unstructured":"Hugging Face. 2025. Transformers.js documentation. https:\/\/huggingface.co\/docs\/transformers.js\/en\/index"},{"key":"e_1_2_1_42_1","unstructured":"Apple Inc. [n. d.]. Metal shading language specification. https:\/\/developer.apple.com\/metal\/Metal-Shading-Language-Specification.pdf"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483545"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3656411"},{"key":"e_1_2_1_46_1","unstructured":"Chris Lattner. 2012. LLVM memory use markers. https:\/\/www.nondot.org\/sabre\/LLVMNotes\/MemoryUseMarkers.txt"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591294"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.9"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598095"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575750"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","unstructured":"Reese Levine Ashley Lee Neha Abbas Kyle Little and Tyler Sorensen. 2025. Artifact for SafeRace: assessing and addressing WebGPU memory safety in the presence of data races. https:\/\/doi.org\/10.5281\/zenodo.16915241 10.5281\/zenodo.16915241","DOI":"10.5281\/zenodo.16915241"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882320"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3689797"},{"key":"e_1_2_1_54_1","unstructured":"LLVM Project. 2025. LLVM Language Reference Manual. https:\/\/llvm.org\/docs\/LangRef.html"},{"key":"e_1_2_1_55_1","unstructured":"Rust Graphics Mages. [n. d.]. wgpu. https:\/\/github.com\/gfx-rs\/wgpu"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040336"},{"key":"e_1_2_1_57_1","article-title":"Differential testing for software","author":"McKeeman William M.","year":"1998","unstructured":"William M. McKeeman. 1998. Differential testing for software. Digit. Tech. J., https:\/\/api.semanticscholar.org\/CorpusID:14018070","journal-title":"Digit. Tech. J., https:\/\/api.semanticscholar.org\/CorpusID:14018070"},{"key":"e_1_2_1_58_1","unstructured":"Microsoft. 2024. Direct3D 11 Advanced Stages - Compute Shader Access. https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/direct3d11\/direct3d-11-advanced-stages-cs-access"},{"key":"e_1_2_1_59_1","unstructured":"Microsoft. 2024. ld_raw (sm5 - asm). https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/direct3dhlsl\/ld-raw\u2013sm5\u2014asm-"},{"key":"e_1_2_1_60_1","unstructured":"Microsoft. 2025. DirectX specifications. https:\/\/microsoft.github.io\/DirectX-Specs\/"},{"key":"e_1_2_1_61_1","volume-title":"guidelines for the use of C++ in critical systems. https:\/\/www.misra.org.uk\/misra-c-plus-plus\/ Originally published June\u00a05,\u00a02008","author":"MISRA Consortium","year":"2023","unstructured":"MISRA Consortium. 2023. MISRA C++: guidelines for the use of C++ in critical systems. https:\/\/www.misra.org.uk\/misra-c-plus-plus\/ Originally published June\u00a05,\u00a02008; latest edition released\u00a0October\u00a02023. Accessed\u00a02025\u201107\u201124"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASEW.2019.00023"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250738"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03359-9_27"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2801153"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1889997.1890000"},{"key":"e_1_2_1_67_1","unstructured":"Chromium Project. 2023. WebGPU technical report. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/main\/docs\/security\/research\/graphics\/webgpu_technical_report.md"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2401.08881"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_2_1_70_1","unstructured":"Charlie F. Ruan Yucheng Qin Xun Zhou Ruihang Lai Hongyi Jin Yixin Dong Bohan Hou Meng-Shiun Yu Yiyan Zhai Sudeep Agarwal Hangrui Cao Siyuan Feng and Tianqi Chen. 2024. WebLLM: a high-performance in-browser LLM inference engine. arxiv:2412.15803. arxiv:2412.15803"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","unstructured":"Andrew Ruef Leonidas Lampropoulos Ian Sweet David Tarditi and Michael Hicks. 2019. Achieving Safety Incrementally with Checked C. In Principles of security and trust. https:\/\/doi.org\/10.1007\/978-3-030-17138-4_4 10.1007\/978-3-030-17138-4_4","DOI":"10.1007\/978-3-030-17138-4_4"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3188720"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2015.24"},{"key":"e_1_2_1_75_1","volume-title":"USENIX ATC","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. AddressSanitizer: a fast address sanity checker. In USENIX ATC 2012. https:\/\/www.usenix.org\/conference\/usenixfederatedconferencesweek\/addresssanitizer-fast-address-sanity-checker"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791203"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","unstructured":"Ying Sheng Lianmin Zheng Binhang Yuan Zhuohan Li Max Ryabinin Daniel Y. Fu Zhiqiang Xie Beidi Chen Clark Barrett Joseph E. Gonzalez Percy Liang Christopher R\u00e9 Ion Stoica and Ce Zhang. 2023. FlexGen: high-throughput generative inference of large language models with a single GPU. https:\/\/doi.org\/10.48550\/arXiv.2303.06865 10.48550\/arXiv.2303.06865","DOI":"10.48550\/arXiv.2303.06865"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080206"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","unstructured":"Tyler Sorensen and Heidy Khlaaf. 2024. LeftoverLocals: listening to LLM responses through leaked GPU local memory. https:\/\/doi.org\/10.48550\/arXiv.2401.16603 10.48550\/arXiv.2401.16603","DOI":"10.48550\/arXiv.2401.16603"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485508"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676995"},{"key":"e_1_2_1_82_1","unstructured":"W3C. [n. d.]. WebGPU. https:\/\/www.w3.org\/TR\/webgpu\/"},{"key":"e_1_2_1_83_1","unstructured":"W3C. 2024. WebGPU Shading Language (WGSL). https:\/\/www.w3.org\/TR\/WGSL\/ Accessed: 2024-10-08"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385973"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360559"},{"key":"e_1_2_1_86_1","unstructured":"WebGPU Samples. 2025. WebGPU Samples. https:\/\/webgpu.github.io\/webgpu-samples\/"},{"key":"e_1_2_1_87_1","unstructured":"WebKit Contributors. 2025. WebGPU Source in WebKit. https:\/\/github.com\/WebKit\/WebKit\/tree\/main\/Source\/WebGPU"},{"key":"e_1_2_1_88_1","unstructured":"webml-community. 2025. Whisper Large V3 Turbo WebGPU. https:\/\/huggingface.co\/spaces\/webml-community\/whisper-large-v3-turbo-webgpu"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_2_1_90_1","unstructured":"wgpu contributors. 2024. Add support for restricting indexing to avoid OOB accesses. https:\/\/github.com\/gfx-rs\/wgpu\/pull\/6431"},{"key":"e_1_2_1_91_1","unstructured":"Xenova. 2025. Experimental Phi-3 WebGPU. https:\/\/huggingface.co\/spaces\/Xenova\/experimental-phi3-webgpu"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2211.10438"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_2_1_95_1","unstructured":"ZPrize Initiative. 2025. ZPrize: accelerating the future of zero\u2011knowledge cryptography. https:\/\/www.zprize.io\/ Accessed on 2025\u201107\u201124"}],"container-title":["Proceedings of the ACM on Programming Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3763075","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:48:23Z","timestamp":1760032103000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3763075"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,9]]},"references-count":95,"journal-issue":{"issue":"OOPSLA2","published-print":{"date-parts":[[2025,10,9]]}},"alternative-id":["10.1145\/3763075"],"URL":"https:\/\/doi.org\/10.1145\/3763075","relation":{},"ISSN":["2475-1421"],"issn-type":[{"value":"2475-1421","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,9]]},"assertion":[{"value":"2025-03-25","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-08-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}