{"id":"https://openalex.org/W2890363035","doi":"https://doi.org/10.1145/3243734.3243826","title":"A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping","display_name":"A Robust and Efficient Defense against Use-after-Free Exploits via Concurrent Pointer Sweeping","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2890363035","doi":"https://doi.org/10.1145/3243734.3243826","mag":"2890363035"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243826","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243826","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243826","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243826","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053996887","display_name":"Daiping Liu","orcid":"https://orcid.org/0000-0002-9660-4444"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Daiping Liu","raw_affiliation_strings":["University of Delaware, Newark, DE, USA"],"affiliations":[{"raw_affiliation_string":"University of Delaware, Newark, DE, USA","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100778616","display_name":"Mingwei Zhang","orcid":"https://orcid.org/0009-0006-7017-215X"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mingwei Zhang","raw_affiliation_strings":["Intel Labs, Hillsboro, OR, USA"],"affiliations":[{"raw_affiliation_string":"Intel Labs, Hillsboro, OR, USA","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100664241","display_name":"Haining Wang","orcid":"https://orcid.org/0000-0002-9665-7511"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haining Wang","raw_affiliation_strings":["University of Delaware, Newark, DE, USA"],"affiliations":[{"raw_affiliation_string":"University of Delaware, Newark, DE, USA","institution_ids":["https://openalex.org/I86501945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053996887"],"corresponding_institution_ids":["https://openalex.org/I86501945"],"apc_list":null,"apc_paid":null,"fwci":2.5386,"has_fulltext":true,"cited_by_count":32,"citation_normalized_percentile":{"value":0.91886878,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1635","last_page":"1648"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.8328610062599182},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.782772421836853},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7517255544662476},{"id":"https://openalex.org/keywords/call-stack","display_name":"Call stack","score":0.4676223397254944},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.439044713973999},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.432531476020813},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.4317507743835449},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.4053717255592346},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3934924602508545},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.37386399507522583},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36120477318763733},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3264274299144745},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.16803449392318726},{"id":"https://openalex.org/keywords/stack","display_name":"Stack (abstract data type)","score":0.1486436128616333}],"concepts":[{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.8328610062599182},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.782772421836853},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7517255544662476},{"id":"https://openalex.org/C119024030","wikidata":"https://www.wikidata.org/wiki/Q759899","display_name":"Call stack","level":3,"score":0.4676223397254944},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.439044713973999},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.432531476020813},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.4317507743835449},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.4053717255592346},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3934924602508545},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.37386399507522583},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36120477318763733},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3264274299144745},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.16803449392318726},{"id":"https://openalex.org/C9395851","wikidata":"https://www.wikidata.org/wiki/Q177929","display_name":"Stack (abstract data type)","level":2,"score":0.1486436128616333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3243826","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243826","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243826","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3243734.3243826","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3243734.3243826","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3243734.3243826","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8199999928474426,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G345752194","display_name":null,"funder_award_id":"N00014-17-1-2485","funder_id":"https://openalex.org/F4320338298","funder_display_name":"Office of Naval Research Global"},{"id":"https://openalex.org/G4504108201","display_name":null,"funder_award_id":"N00014-17-1","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4751570384","display_name":null,"funder_award_id":"4-17-1-","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G8876996369","display_name":null,"funder_award_id":"N00014","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"}],"funders":[{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320338298","display_name":"Office of Naval Research Global","ror":"https://ror.org/00rk2pe57"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2890363035.pdf","grobid_xml":"https://content.openalex.org/works/W2890363035.grobid-xml"},"referenced_works_count":55,"referenced_works":["https://openalex.org/W1537077670","https://openalex.org/W1543830735","https://openalex.org/W1655226010","https://openalex.org/W1825457006","https://openalex.org/W1826158585","https://openalex.org/W1878544538","https://openalex.org/W1973326708","https://openalex.org/W1981962444","https://openalex.org/W1984471991","https://openalex.org/W1997394198","https://openalex.org/W2005907808","https://openalex.org/W2010990718","https://openalex.org/W2019641142","https://openalex.org/W2022102318","https://openalex.org/W2030519387","https://openalex.org/W2059278087","https://openalex.org/W2065540707","https://openalex.org/W2096267728","https://openalex.org/W2097990218","https://openalex.org/W2106412703","https://openalex.org/W2117703831","https://openalex.org/W2118315969","https://openalex.org/W2121562991","https://openalex.org/W2122757982","https://openalex.org/W2123511529","https://openalex.org/W2124360577","https://openalex.org/W2130745898","https://openalex.org/W2134028114","https://openalex.org/W2136938453","https://openalex.org/W2140611647","https://openalex.org/W2141365240","https://openalex.org/W2149263382","https://openalex.org/W2153185479","https://openalex.org/W2154795299","https://openalex.org/W2155479707","https://openalex.org/W2155851497","https://openalex.org/W2156399316","https://openalex.org/W2156858199","https://openalex.org/W2160725972","https://openalex.org/W2162376048","https://openalex.org/W2165266180","https://openalex.org/W2169875292","https://openalex.org/W2188942574","https://openalex.org/W2242837385","https://openalex.org/W2399284314","https://openalex.org/W2606752733","https://openalex.org/W2735704859","https://openalex.org/W2752929869","https://openalex.org/W4232822984","https://openalex.org/W4233319527","https://openalex.org/W4233793161","https://openalex.org/W4234020632","https://openalex.org/W4242383889","https://openalex.org/W4246840565","https://openalex.org/W4250981365"],"related_works":["https://openalex.org/W1555908053","https://openalex.org/W2141365240","https://openalex.org/W2622138879","https://openalex.org/W2165874960","https://openalex.org/W4245736681","https://openalex.org/W4239042909","https://openalex.org/W4242254025","https://openalex.org/W2050572856","https://openalex.org/W2152043747","https://openalex.org/W2362192177"],"abstract_inverted_index":{"Applications":[0],"in":[1,52,57,124,174,244,255,264],"C/C++":[2],"are":[3,33],"notoriously":[4],"prone":[5],"to":[6,14,60,72,99,158,178,192,197,209],"memory":[7,62],"corruptions.":[8],"With":[9],"significant":[10],"research":[11],"efforts":[12],"devoted":[13],"this":[15,90],"area":[16],"of":[17,46,78,112,121,213,218,238],"study,":[18],"the":[19,43,86,110,143,152,211,227],"security":[20,154],"threats":[21],"posed":[22],"by":[23,215],"previously":[24],"popular":[25],"vulnerabilities,":[26],"such":[27],"as":[28,35,37],"stack":[29],"and":[30,83,108,128,136,150,156,204,232,240,260],"heap":[31],"overflows,":[32],"not":[34],"serious":[36],"before.":[38],"Instead,":[39],"we":[40,92],"have":[41,69],"seen":[42],"meteoric":[44],"rise":[45],"attacks":[47],"exploiting":[48],"use-after-free":[49],"(UaF)":[50],"vulnerabilities":[51,114],"recent":[53],"years,":[54],"which":[55],"root":[56],"pointers":[58,173,203],"pointing":[59],"freed":[61],"(i.e.,":[63],"dangling":[64,180,221],"pointers).":[65],"Although":[66],"various":[67],"approaches":[68],"been":[70],"proposed":[71],"harden":[73],"software":[74],"against":[75,102],"UaF,":[76],"none":[77],"them":[79],"can":[80,162,207],"achieve":[81],"robustness":[82],"efficiency":[84],"at":[85],"same":[87],"time.":[88],"In":[89],"paper,":[91],"present":[93],"a":[94,175,220,236],"novel":[95],"defense":[96],"called":[97],"pSweeper":[98,122,239,252],"robustly":[100],"protect":[101],"UaF":[103,113,214,258],"exploits":[104,142,259],"with":[105,115],"low":[106],"overhead,":[107],"pinpoint":[109,210],"root-causes":[111,212],"one":[116],"safe":[117],"crash.":[118],"The":[119],"success":[120],"lies":[123],"its":[125,242],"two":[126],"unique":[127],"innovative":[129],"design":[130,183],"ideas,":[131],"concurrent":[132,176],"pointer":[133,195,222],"sweeping":[134],"(CPW)":[135],"object":[137,229],"origin":[138],"tracking":[139],"(OOT).":[140],"CPW":[141,168],"increasingly":[144],"available":[145],"multi-cores":[146],"on":[147,164],"modern":[148],"PCs":[149],"outsources":[151],"heavyweight":[153],"checks":[155],"enforcement":[157],"dedicated":[159],"threads":[160],"that":[161,190,251],"run":[163],"spare":[165],"cores.":[166],"Specifically,":[167],"iteratively":[169],"sweeps":[170],"all":[171],"live":[172],"thread":[177],"find":[179],"pointers.":[181],"This":[182],"is":[184,223,230,253],"quite":[185],"different":[186],"from":[187],"previous":[188],"work":[189],"requires":[191],"track":[193],"every":[194],"propagation":[196],"maintain":[198],"accurate":[199],"point-to":[200],"relationship":[201],"between":[202],"objects.":[205],"OOT":[206],"help":[208],"informing":[216],"developers":[217],"how":[219,226],"created,":[224],"i.e.,":[225],"problematic":[228],"allocated":[231],"freed.":[233],"We":[234],"implement":[235],"prototype":[237],"validate":[241],"efficacy":[243],"real":[245],"scenarios.":[246],"Our":[247],"experimental":[248],"results":[249],"show":[250],"effective":[254],"defeating":[256],"real-world":[257],"efficient":[261],"when":[262],"deployed":[263],"production":[265],"runs.":[266]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
