{"id":"https://openalex.org/W3008607731","doi":"https://doi.org/10.1145/3368826.3377921","title":"Secure automatic bounds checking: prevention is simpler than cure","display_name":"Secure automatic bounds checking: prevention is simpler than cure","publication_year":2020,"publication_date":"2020-02-21","ids":{"openalex":"https://openalex.org/W3008607731","doi":"https://doi.org/10.1145/3368826.3377921","mag":"3008607731"},"language":"en","primary_location":{"id":"doi:10.1145/3368826.3377921","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368826.3377921","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056479347","display_name":"Ejebagom John Ojogbo","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ejebagom John Ojogbo","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069139257","display_name":"Mithuna Thottethodi","orcid":"https://orcid.org/0000-0003-4164-4542"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mithuna Thottethodi","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103145581","display_name":"T. N. Vijaykumar","orcid":"https://orcid.org/0000-0001-6624-4372"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"T. N. Vijaykumar","raw_affiliation_strings":["Purdue University, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056479347"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":0.685,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.75701187,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"43","last_page":"55"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8853180408477783},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.7503307461738586},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.7137042880058289},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.705595850944519},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6785774230957031},{"id":"https://openalex.org/keywords/semantics","display_name":"Semantics (computer science)","score":0.5253880620002747},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.4751593768596649},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.45067691802978516},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4438478350639343},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.38921797275543213},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.3376828730106354},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2562443017959595},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.22504568099975586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16362741589546204}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8853180408477783},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.7503307461738586},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.7137042880058289},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.705595850944519},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6785774230957031},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.5253880620002747},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.4751593768596649},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.45067691802978516},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4438478350639343},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.38921797275543213},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3376828730106354},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2562443017959595},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.22504568099975586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16362741589546204},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3368826.3377921","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3368826.3377921","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1482200560","https://openalex.org/W1488058190","https://openalex.org/W1934458198","https://openalex.org/W2095872092","https://openalex.org/W2104182023","https://openalex.org/W2137296754","https://openalex.org/W2172060328","https://openalex.org/W2187802606","https://openalex.org/W2415551696","https://openalex.org/W2766052299","https://openalex.org/W2803376702","https://openalex.org/W2860564492","https://openalex.org/W2903910116","https://openalex.org/W2905380323","https://openalex.org/W2931030580","https://openalex.org/W2933306136","https://openalex.org/W4289038676"],"related_works":["https://openalex.org/W17155033","https://openalex.org/W3207760230","https://openalex.org/W1496222301","https://openalex.org/W4312814274","https://openalex.org/W1590307681","https://openalex.org/W2536018345","https://openalex.org/W4285370786","https://openalex.org/W2296488620","https://openalex.org/W2358353312","https://openalex.org/W4214838992"],"abstract_inverted_index":{"Recent":[0,101],"Spectre":[1,48],"attacks":[2,12],"exploit":[3],"hardware":[4,102],"speculative":[5],"execution":[6],"to":[7,118,155],"read":[8],"forbidden":[9,15,59,157],"data.":[10,42],"The":[11,36,159],"speculatively":[13],"load":[14],"data":[16,60,77],"in":[17,64,94,167],"misspeculated":[18],"paths":[19],"creating":[20],"a":[21,34,138,149],"side":[22,37,83,106,120,213],"channel":[23,38],"via":[24],"the":[25,41,46,58,76,92,95,193],"microarchitectural":[26],"state":[27],"which":[28,51,71,87,147],"is":[29,98,199],"not":[30],"cleaned":[31],"up":[32],"after":[33],"misspeculation.":[35],"then":[39],"leaks":[40],"We":[43,136],"focus":[44],"on":[45],"most-challenging":[47],"variant":[49],"(Spectre-v1)":[50],"exploits":[52],"sandboxing":[53],"through":[54,81],"bounds":[55],"checking.":[56],"Because":[57],"can":[61,78],"be":[62,79,89],"accessed":[63],"only":[65,68],"three":[66,153],"ways":[67],"one":[69],"of":[70,86,152],"remains":[72],"challenging":[73],"(Spectre-v1),":[74],"whereas":[75],"leaked":[80],"numerous":[82],"channels":[84,107,214],"all":[85,168],"must":[88],"plugged,":[90],"preventing":[91],"access":[93],"first":[96],"place":[97],"more":[99],"practical.":[100],"schemes":[103],"plug":[104],"some":[105],"but":[108],"incur":[109],"significant":[110],"complexity":[111],"and":[112,115,164,170,188,208,211],"performance":[113,129,190,206],"loss":[114],"remain":[116],"susceptible":[117],"other":[119],"channels.":[121],"Most":[122],"current":[123,210],"software":[124],"mitigations":[125],"are":[126,165],"architecture-dependent,":[127],"have":[128,161],"or":[130,134],"semantic":[131],"uncertainty":[132],"problems,":[133],"both.":[135],"propose":[137],"compiler-based":[139],"mitigation,":[140],"called":[141],"Secure":[142],"Automatic":[143],"Bounds":[144],"Checking":[145],"(SABC),":[146],"uses":[148],"simple":[150],"sequence":[151],"instructions":[154,160],"prevent":[156],"access.":[158],"straightforward":[162],"semantics":[163],"found":[166],"32-":[169],"64-bit":[171],"architectures.":[172],"An":[173],"alternative,":[174],"architecture-independent":[175],"technique":[176],"that":[177],"leverages":[178],"process":[179],"boundaries\u2013":[180],"site":[181],"isolation":[182],"\u2013":[183],"incurs":[184,204],"1.8x":[185],"memory":[186],"overhead":[187,191],"30%":[189],"over":[192],"baseline":[194],"with":[195],"no":[196],"isolation.":[197],"SABC":[198],"architecture-independent,":[200],"has":[201],"assured":[202],"semantics,":[203],"little":[205],"overhead,":[207],"renders":[209],"future":[212],"useless":[215],"for":[216],"Spectre-v1.":[217]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2025-10-10T00:00:00"}
