{"id":"https://openalex.org/W4408707866","doi":"https://doi.org/10.1109/tdsc.2025.3553516","title":"Efficient Use-After-Free Prevention With Pooling, OS-Assisted, and Opportunistic Page-Level Sweeping","display_name":"Efficient Use-After-Free Prevention With Pooling, OS-Assisted, and Opportunistic Page-Level Sweeping","publication_year":2025,"publication_date":"2025-03-21","ids":{"openalex":"https://openalex.org/W4408707866","doi":"https://doi.org/10.1109/tdsc.2025.3553516"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3553516","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3553516","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tdsc.2025.3553516","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chanyoung Park","orcid":"https://orcid.org/0009-0006-0832-321X"},"institutions":[{"id":"https://openalex.org/I48566637","display_name":"Ulsan National Institute of Science and Technology","ror":"https://ror.org/017cjz748","country_code":"KR","type":"education","lineage":["https://openalex.org/I48566637"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Chanyoung Park","raw_affiliation_strings":["Ulsan National Institute of Science and Technology (UNIST), Ulsan, South Korea","Ulsan National Institute of Science and Technology (UNIST), South Korea"],"raw_orcid":"https://orcid.org/0009-0006-0832-321X","affiliations":[{"raw_affiliation_string":"Ulsan National Institute of Science and Technology (UNIST), Ulsan, South Korea","institution_ids":["https://openalex.org/I48566637"]},{"raw_affiliation_string":"Ulsan National Institute of Science and Technology (UNIST), South Korea","institution_ids":["https://openalex.org/I48566637"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yeongjun Kwak","orcid":"https://orcid.org/0009-0000-6670-1553"},"institutions":[{"id":"https://openalex.org/I48566637","display_name":"Ulsan National Institute of Science and Technology","ror":"https://ror.org/017cjz748","country_code":"KR","type":"education","lineage":["https://openalex.org/I48566637"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Yeongjun Kwak","raw_affiliation_strings":["Ulsan National Institute of Science and Technology (UNIST), Ulsan, South Korea","Ulsan National Institute of Science and Technology (UNIST), South Korea"],"raw_orcid":"https://orcid.org/0009-0000-6670-1553","affiliations":[{"raw_affiliation_string":"Ulsan National Institute of Science and Technology (UNIST), Ulsan, South Korea","institution_ids":["https://openalex.org/I48566637"]},{"raw_affiliation_string":"Ulsan National Institute of Science and Technology (UNIST), South Korea","institution_ids":["https://openalex.org/I48566637"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5042587361","display_name":"Hyungon Moon","orcid":"https://orcid.org/0000-0002-4513-1034"},"institutions":[{"id":"https://openalex.org/I48566637","display_name":"Ulsan National Institute of Science and Technology","ror":"https://ror.org/017cjz748","country_code":"KR","type":"education","lineage":["https://openalex.org/I48566637"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyungon Moon","raw_affiliation_strings":["Ulsan National Institute of Science and Technology (UNIST), Ulsan, South Korea","Ulsan National Institute of Science and Technology (UNIST), South Korea"],"raw_orcid":"https://orcid.org/0000-0002-4513-1034","affiliations":[{"raw_affiliation_string":"Ulsan National Institute of Science and Technology (UNIST), Ulsan, South Korea","institution_ids":["https://openalex.org/I48566637"]},{"raw_affiliation_string":"Ulsan National Institute of Science and Technology (UNIST), South Korea","institution_ids":["https://openalex.org/I48566637"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I48566637"],"apc_list":null,"apc_paid":null,"fwci":1.3517,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.79576956,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"22","issue":"5","first_page":"4768","last_page":"4782"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9731000065803528,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7143142223358154},{"id":"https://openalex.org/keywords/pooling","display_name":"Pooling","score":0.5291250944137573},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3431078791618347},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3202683925628662},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12334388494491577}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7143142223358154},{"id":"https://openalex.org/C70437156","wikidata":"https://www.wikidata.org/wiki/Q7228652","display_name":"Pooling","level":2,"score":0.5291250944137573},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3431078791618347},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3202683925628662},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12334388494491577}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3553516","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3553516","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tdsc.2025.3553516","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3553516","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1984471991","https://openalex.org/W1997394198","https://openalex.org/W2055175181","https://openalex.org/W2136938453","https://openalex.org/W2154795299","https://openalex.org/W2606752733","https://openalex.org/W2749562936","https://openalex.org/W2751137623","https://openalex.org/W2890363035","https://openalex.org/W2947565728","https://openalex.org/W3011606857","https://openalex.org/W3015296434","https://openalex.org/W3110989686","https://openalex.org/W3212754663","https://openalex.org/W4214575457","https://openalex.org/W4214768370","https://openalex.org/W4230177578","https://openalex.org/W4236944756","https://openalex.org/W4308391524","https://openalex.org/W4391724740"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2953234277","https://openalex.org/W2626256601","https://openalex.org/W147410782","https://openalex.org/W2900413183","https://openalex.org/W3022252430","https://openalex.org/W4390975304","https://openalex.org/W4287804464"],"abstract_inverted_index":{"Defeating":[0],"use-after-free":[1,21],"exploits":[2,22],"presents":[3],"a":[4,10,76,120,166,206],"challenging":[5],"problem,":[6],"one":[7,49],"for":[8,124],"which":[9],"universal":[11],"solution":[12],"remains":[13],"elusive.":[14],"Recent":[15],"efforts":[16,42],"towards":[17],"efficient":[18,37],"prevention":[19],"of":[20,29,62,93,140,149,171,185,220,230,242,261,282],"have":[23],"found":[24],"that":[25,72,107,160,168,225,241],"delaying":[26],"the":[27,55,60,67,81,105,109,112,115,130,138,144,147,169,186,196,199,216,226,243,252,259,266,276],"reuse":[28,51,110,163],"freed":[30,68,77,191],"memory":[31],"can":[32,57],"both":[33],"be":[34],"effective":[35],"and":[36,70,97,146,202,248,286],"in":[38,129,143,164],"many":[39],"cases.":[40],"Such":[41],"are":[43],"again":[44],"classified":[45],"into":[46],"two":[47,95],"categories:":[48],"where":[50],"is":[52,135,203],"postponed":[53],"until":[54,80,111],"allocator":[56,159],"confidently":[58],"ascertain":[59],"absence":[61],"any":[63],"dangling":[64],"pointers":[65],"to":[66,104,177,210,215,237],"memory,":[69],"another":[71],"refrains":[73],"from":[74,89,119],"reusing":[75,189],"heap":[78,133,172,192],"chunk":[79,134],"program\u2019s":[82],"termination.":[83],"We":[84],"make":[85],"an":[86,158,280],"intriguing":[87],"observation":[88],"our":[90],"in-depth":[91],"analysis":[92],"these":[94],"approaches":[96],"their":[98],"reported":[99],"performance":[100,122,148,228],"impacts.":[101],"When":[102],"compared":[103],"design":[106],"delays":[108],"program":[113],"terminates,":[114],"other":[116],"strategy":[117],"suffers":[118],"significant":[121],"overhead":[123,229,260,281],"some":[125,150],"workloads.":[126,179],"The":[127],"change":[128],"way":[131,167],"each":[132],"reused":[136],"affects":[137],"distribution":[139,170],"allocated":[141],"chunks":[142,173,197],"heap,":[145],"benchmarks.":[151],"This":[152],"study":[153],"proposes":[154],"<sc":[155,180,221,231,262],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[156,181,222,232,263,270],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">HushVac+</small>,":[157],"performs":[161],"delayed":[162],"such":[165,178],"becomes":[174],"more":[175],"friendly":[176],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">HushVac+</small>":[182,223,233,264],"takes":[183],"care":[184],"locality":[187],"when":[188,250],"previously":[190],"chunks,":[193],"adaptively":[194],"pools":[195],"considering":[198],"expected":[200],"lifespan,":[201],"assisted":[204],"by":[205],"tailored":[207],"OS":[208],"service":[209],"quickly":[211],"return":[212],"physical":[213],"pages":[214],"system.":[217],"An":[218],"evaluation":[219],"showed":[224],"average":[227],"(1.5%)":[234],"was":[235,272],"similar":[236],"or":[238],"lower":[239],"than":[240],"state-of-the-art":[244],"(11.4%,":[245],"4.7%,":[246],"0.0%,":[247],"2.1%)":[249],"running":[251],"SPEC":[253],"CPU":[254],"2006":[255],"benchmark":[256],"suite.":[257],"Specifically,":[258],"on":[265],"distribution-sensitive":[267],"benchmark,":[268],"<monospace":[269],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">xalancbmk</monospace>,":[271],"about":[273],"4.8%":[274],"while":[275],"prior":[277],"work":[278],"has":[279],"110%,":[283],"35.2%,":[284],"34.5%,":[285],"27.1%.":[287]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
