{"id":"https://openalex.org/W2765838743","doi":"https://doi.org/10.1145/3196494.3196508","title":"Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features","display_name":"Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features","publication_year":2018,"publication_date":"2018-05-29","ids":{"openalex":"https://openalex.org/W2765838743","doi":"https://doi.org/10.1145/3196494.3196508","mag":"2765838743"},"language":"en","primary_location":{"id":"doi:10.1145/3196494.3196508","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1711.01254","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5070469078","display_name":"Michael Schwarz","orcid":"https://orcid.org/0000-0001-6744-3410"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":true,"raw_author_name":"Michael Schwarz","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066874310","display_name":"Daniel Gruss","orcid":"https://orcid.org/0000-0002-7977-3246"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Daniel Gruss","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056935116","display_name":"Moritz Lipp","orcid":null},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Moritz Lipp","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013155428","display_name":"Cl\u00e9mentine Maurice","orcid":"https://orcid.org/0000-0002-8896-9494"},"institutions":[{"id":"https://openalex.org/I2802519937","display_name":"Institut de Recherche en Informatique et Syst\u00e8mes Al\u00e9atoires","ror":"https://ror.org/00myn0z94","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I205703379","https://openalex.org/I2802204017","https://openalex.org/I2802519937","https://openalex.org/I28221208","https://openalex.org/I4210127572","https://openalex.org/I4210159245","https://openalex.org/I56067802"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Cl\u00e9mentine Maurice","raw_affiliation_strings":["CNRS, IRISA, Rennes, France","CNRS / IRISA, Rennes, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"CNRS, IRISA, Rennes, France","institution_ids":["https://openalex.org/I2802519937","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"CNRS / IRISA, Rennes, France","institution_ids":["https://openalex.org/I2802519937","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022783625","display_name":"Thomas Schuster","orcid":"https://orcid.org/0000-0002-9539-1627"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Thomas Schuster","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041121396","display_name":"Anders Fogh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Anders Fogh","raw_affiliation_strings":["G DATA Advanced Analytics, Bochum, Germany"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"G DATA Advanced Analytics, Bochum, Germany","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015437576","display_name":"Stefan Mangard","orcid":"https://orcid.org/0000-0001-9650-8041"},"institutions":[{"id":"https://openalex.org/I4092182","display_name":"Graz University of Technology","ror":"https://ror.org/00d7xrm67","country_code":"AT","type":"education","lineage":["https://openalex.org/I4092182"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Stefan Mangard","raw_affiliation_strings":["Graz University of Technology, Graz, Austria"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graz University of Technology, Graz, Austria","institution_ids":["https://openalex.org/I4092182"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5070469078"],"corresponding_institution_ids":["https://openalex.org/I4092182"],"apc_list":null,"apc_paid":null,"fwci":0.8459,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.79530527,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"587","last_page":"600"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8387027978897095},{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.7332401871681213},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6145699620246887},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5599749088287354},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.5560088157653809},{"id":"https://openalex.org/keywords/fetch","display_name":"Fetch","score":0.5488980412483215},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.5006787776947021},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.4455907940864563},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.44225066900253296},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.42028263211250305},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4171687662601471},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.39058321714401245},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3860708773136139},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.23697859048843384},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21674582362174988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12137919664382935}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8387027978897095},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.7332401871681213},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6145699620246887},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5599749088287354},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.5560088157653809},{"id":"https://openalex.org/C131918245","wikidata":"https://www.wikidata.org/wiki/Q1409090","display_name":"Fetch","level":2,"score":0.5488980412483215},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.5006787776947021},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.4455907940864563},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.44225066900253296},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.42028263211250305},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4171687662601471},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.39058321714401245},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3860708773136139},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.23697859048843384},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21674582362174988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12137919664382935},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3196494.3196508","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3196494.3196508","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 on Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1711.01254","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1711.01254","pdf_url":"https://arxiv.org/pdf/1711.01254","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"mag:2765838743","is_oa":true,"landing_page_url":"http://export.arxiv.org/pdf/1711.01254","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"pmh:oai:HAL:hal-01872558v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01872558","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Asia Conference on Computer and Communications Security, AsiaCCS 2018, Jun 2018, Incheon, South Korea. &#x27E8;10.1145/3196494.3196508&#x27E9;","raw_type":"Conference papers"},{"id":"doi:10.48550/arxiv.1711.01254","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1711.01254","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1711.01254","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1711.01254","pdf_url":"https://arxiv.org/pdf/1711.01254","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[{"id":"https://openalex.org/G523495190","display_name":"Securing Software against Physical Attacks","funder_award_id":"681402","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5879261213","display_name":null,"funder_award_id":"862235","funder_id":"https://openalex.org/F4320323031","funder_display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft"},{"id":"https://openalex.org/G7842005466","display_name":null,"funder_award_id":"Horizon 2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320323031","display_name":"\u00d6sterreichische Forschungsf\u00f6rderungsgesellschaft","ror":"https://ror.org/028jc0449"},{"id":"https://openalex.org/F4320323947","display_name":"K\u00e4rntner Wirtschaftsf\u00f6rderungsfonds","ror":"https://ror.org/050f4mc80"},{"id":"https://openalex.org/F4320324794","display_name":"Steirische Wirtschaftsf\u00f6rderungsgesellschaft","ror":"https://ror.org/05x217f96"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W1247015877","https://openalex.org/W1488058190","https://openalex.org/W1553586369","https://openalex.org/W1972544179","https://openalex.org/W1979330015","https://openalex.org/W2002934700","https://openalex.org/W2011367000","https://openalex.org/W2036329595","https://openalex.org/W2036894992","https://openalex.org/W2042033151","https://openalex.org/W2053597677","https://openalex.org/W2056742491","https://openalex.org/W2065948900","https://openalex.org/W2072419942","https://openalex.org/W2075827176","https://openalex.org/W2088063715","https://openalex.org/W2089237839","https://openalex.org/W2096449544","https://openalex.org/W2104413677","https://openalex.org/W2105357036","https://openalex.org/W2105391037","https://openalex.org/W2114354140","https://openalex.org/W2116818527","https://openalex.org/W2123016006","https://openalex.org/W2124837944","https://openalex.org/W2128985333","https://openalex.org/W2134716394","https://openalex.org/W2135401114","https://openalex.org/W2139249028","https://openalex.org/W2141758526","https://openalex.org/W2150620897","https://openalex.org/W2157822940","https://openalex.org/W2158152382","https://openalex.org/W2161782580","https://openalex.org/W2161958410","https://openalex.org/W2162469911","https://openalex.org/W2169294765","https://openalex.org/W2172060328","https://openalex.org/W2198565857","https://openalex.org/W2262344352","https://openalex.org/W2336984031","https://openalex.org/W2337480911","https://openalex.org/W2519006453","https://openalex.org/W2574017551","https://openalex.org/W2594560662","https://openalex.org/W2599829375","https://openalex.org/W2606774910","https://openalex.org/W2612997195","https://openalex.org/W2744175342","https://openalex.org/W2751613360","https://openalex.org/W2950775255","https://openalex.org/W2951343197","https://openalex.org/W3004104485","https://openalex.org/W3160978791","https://openalex.org/W4232884709","https://openalex.org/W4248655060","https://openalex.org/W4249518802"],"related_works":["https://openalex.org/W2963237187","https://openalex.org/W2469896418","https://openalex.org/W1878544538","https://openalex.org/W2149972046","https://openalex.org/W2153484975","https://openalex.org/W2464760071","https://openalex.org/W2188998287","https://openalex.org/W2131623415","https://openalex.org/W3151648723","https://openalex.org/W3183296364","https://openalex.org/W2763467770","https://openalex.org/W2532499458","https://openalex.org/W3100243191","https://openalex.org/W1504976174","https://openalex.org/W2805909769","https://openalex.org/W2925685215","https://openalex.org/W3034140077","https://openalex.org/W1968002620","https://openalex.org/W2235158524","https://openalex.org/W2792304802"],"abstract_inverted_index":{"Double-fetch":[0],"bugs":[1,67,169,188],"are":[2],"a":[3,18,27,49,190,220],"special":[4],"type":[5],"of":[6,26,58,97,109,122,149],"race":[7],"condition,":[8],"where":[9],"an":[10,32,56,145],"unprivileged":[11,33],"execution":[12,29,212],"thread":[13],"is":[14],"able":[15],"to":[16,48,84,104,144,151,170,185],"change":[17,50],"memory":[19],"location":[20],"between":[21],"the":[22,36,39,42,61,72,77,94,114,171,176],"time-of-check":[23],"and":[24,54,88,120,160,193],"time-of-use":[25],"privileged":[28,43],"thread.":[30],"If":[31],"attacker":[34],"changes":[35],"value":[37],"at":[38],"right":[40],"time,":[41],"operation":[44],"becomes":[45],"inconsistent,":[46],"leading":[47,143],"in":[51,129,189,210,217],"control":[52],"flow,":[53],"thus":[55],"escalation":[57],"privileges":[59],"for":[60,167],"attacker.":[62],"More":[63],"severely,":[64],"such":[65],"double-fetch":[66,90,123,168,187,207],"can":[68],"be":[69],"introduced":[70],"by":[71,201],"compiler,":[73],"entirely":[74],"invisible":[75],"on":[76,181],"source-code":[78],"level.":[79],"We":[80,92,112,133,174,196],"propose":[81],"novel":[82],"techniques":[83,103,141,200],"efficiently":[85],"detect,":[86],"exploit,":[87],"eliminate":[89,186],"bugs.":[91],"demonstrate":[93,113],"first":[95,115,177],"combination":[96],"state-of-the-art":[98,139],"cache":[99],"attacks":[100],"with":[101,205,219],"kernel-fuzzing":[102],"allow":[105],"fully":[106,116,191],"automated":[107,117,192,206],"identification":[108],"double":[110,158],"fetches.":[111],"reliable":[118],"detection":[119],"exploitation":[121,140,146],"bugs,":[124],"making":[125],"manual":[126],"analysis":[127],"as":[128,214,216],"previous":[130],"work":[131],"superfluous.":[132],"show":[134],"that":[135],"cache-based":[136],"triggers":[137],"outperform":[138],"significantly,":[142],"success":[147],"rate":[148],"up":[150],"97%.":[152],"Our":[153],"modified":[154],"fuzzer":[155],"automatically":[156,161],"detects":[157],"fetches":[159],"narrows":[162],"down":[163],"this":[164],"candidate":[165],"set":[166],"exploitable":[172],"ones.":[173],"present":[175],"generic":[178],"technique":[179],"based":[180],"hardware":[182],"transactional":[183],"memory,":[184],"transparent":[194],"manner.":[195],"extend":[197],"defensive":[198],"programming":[199],"retrofitting":[202],"arbitrary":[203],"code":[204],"prevention,":[208],"both":[209],"trusted":[211],"environments":[213],"well":[215],"syscalls,":[218],"performance":[221],"overhead":[222],"below":[223],"1%.":[224]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2}],"updated_date":"2026-05-19T08:33:51.333923","created_date":"2025-10-10T00:00:00"}
