{"id":"https://openalex.org/W3094250247","doi":"https://doi.org/10.1145/3382494.3422165","title":"On the use of C# Unsafe Code Context","display_name":"On the use of C# Unsafe Code Context","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3094250247","doi":"https://doi.org/10.1145/3382494.3422165","mag":"3094250247"},"language":"en","primary_location":{"id":"doi:10.1145/3382494.3422165","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3382494.3422165","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031213161","display_name":"Ehsan Firouzi","orcid":"https://orcid.org/0009-0000-7563-4196"},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Ehsan Firouzi","raw_affiliation_strings":["Shiraz University, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Shiraz, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056466838","display_name":"Ashkan Sami","orcid":"https://orcid.org/0000-0002-0023-9543"},"institutions":[{"id":"https://openalex.org/I166459259","display_name":"Shiraz University","ror":"https://ror.org/028qtbk54","country_code":"IR","type":"education","lineage":["https://openalex.org/I166459259"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Ashkan Sami","raw_affiliation_strings":["Shiraz University, Shiraz, Iran"],"affiliations":[{"raw_affiliation_string":"Shiraz University, Shiraz, Iran","institution_ids":["https://openalex.org/I166459259"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071052367","display_name":"Foutse Khomh","orcid":"https://orcid.org/0000-0002-5704-4173"},"institutions":[{"id":"https://openalex.org/I45683168","display_name":"Polytechnique Montr\u00e9al","ror":"https://ror.org/05f8d4e86","country_code":"CA","type":"education","lineage":["https://openalex.org/I45683168"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Foutse Khomh","raw_affiliation_strings":["Polytechnique Montr\u00e9al, Montr\u00e9al, Canada"],"affiliations":[{"raw_affiliation_string":"Polytechnique Montr\u00e9al, Montr\u00e9al, Canada","institution_ids":["https://openalex.org/I45683168"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103129010","display_name":"Gias Uddin","orcid":"https://orcid.org/0000-0002-2351-0885"},"institutions":[{"id":"https://openalex.org/I168635309","display_name":"University of Calgary","ror":"https://ror.org/03yjb2x39","country_code":"CA","type":"education","lineage":["https://openalex.org/I168635309"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gias Uddin","raw_affiliation_strings":["University of Calgary, Calgary, Canada"],"affiliations":[{"raw_affiliation_string":"University of Calgary, Calgary, Canada","institution_ids":["https://openalex.org/I168635309"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5031213161"],"corresponding_institution_ids":["https://openalex.org/I166459259"],"apc_list":null,"apc_paid":null,"fwci":0.2743,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.65113938,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7833384871482849},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5450461506843567},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.4721280038356781},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.46582314372062683},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.4623279571533203},{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.44621166586875916},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.43979528546333313},{"id":"https://openalex.org/keywords/unreachable-code","display_name":"Unreachable code","score":0.4327693283557892},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.42033326625823975},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.41323548555374146},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.40288689732551575},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3494085371494293},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3203203082084656},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.285203754901886},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.2306593954563141},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.1706615686416626},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.11559084057807922},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.09396958351135254}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7833384871482849},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5450461506843567},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.4721280038356781},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.46582314372062683},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.4623279571533203},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.44621166586875916},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.43979528546333313},{"id":"https://openalex.org/C50951305","wikidata":"https://www.wikidata.org/wiki/Q2482534","display_name":"Unreachable code","level":5,"score":0.4327693283557892},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.42033326625823975},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.41323548555374146},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.40288689732551575},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3494085371494293},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3203203082084656},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.285203754901886},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.2306593954563141},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.1706615686416626},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.11559084057807922},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.09396958351135254},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3382494.3422165","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3382494.3422165","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 14th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","raw_type":"proceedings-article"},{"id":"pmh:oai:publications.polymtl.ca:46808","is_oa":false,"landing_page_url":"https://publications.polymtl.ca/46808/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401013","display_name":"PolyPublie (\u00c9cole Polytechnique de Montr\u00e9al)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I45683168","host_organization_name":"Polytechnique Montr\u00e9al","host_organization_lineage":["https://openalex.org/I45683168"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Communication de conf\u00e9rence"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W2137952932","https://openalex.org/W2158126684","https://openalex.org/W2518952049","https://openalex.org/W2759023773","https://openalex.org/W2774816643","https://openalex.org/W2894351723","https://openalex.org/W2907964905","https://openalex.org/W2920903407","https://openalex.org/W2954553057","https://openalex.org/W2955552127","https://openalex.org/W2978835257","https://openalex.org/W2985320478","https://openalex.org/W4237993802","https://openalex.org/W4254067921"],"related_works":["https://openalex.org/W2161969548","https://openalex.org/W2036000779","https://openalex.org/W2112669344","https://openalex.org/W116913286","https://openalex.org/W4244016640","https://openalex.org/W3008325674","https://openalex.org/W1141223778","https://openalex.org/W1539844444","https://openalex.org/W2045218056","https://openalex.org/W2155772078"],"abstract_inverted_index":{"Background.":[0],"C#":[1,32,94,111,132,160,212,243],"maintains":[2],"type":[3],"safety":[4],"and":[5,104,127,139,215,305],"security":[6],"by":[7,86,190],"not":[8,74,269],"allowing":[9],"direct":[10],"dangerous":[11,262],"pointer":[12,20,43],"arithmetic.":[13,44],"To":[14],"improve":[15],"performance":[16,183],"for":[17,182,200],"special":[18],"cases,":[19],"arithmetic":[21],"is":[22,53,73,84,198,204,206,221,290],"provided":[23],"via":[24],"an":[25],"unsafe":[26,33,51,95,112,133,164,177,228,251],"context.":[27,96],"Programmers":[28],"can":[29,41,265],"use":[30,42,92],"the":[31,46,62,65,69,91,102,149,163,193,196,222,240,309],"keyword":[34,113],"to":[35,55,67,100,208,293,301],"encapsulate":[36],"a":[37,235],"code":[38,52,71,108,118,134,229,259],"block,":[39],"which":[40,289],"In":[45,148],"Common":[47],"Language":[48],"Runtime":[49],"(CLR),":[50],"referred":[54],"as":[56],"unverifiable":[57],"code.":[58],"It":[59],"then":[60],"becomes":[61],"responsibility":[63],"of":[64,93,106,154,170,192,227,237,278,311],"programmer":[66],"ensure":[68],"encapsulated":[70],"snippet":[72],"dangerous.":[75],"Naturally,":[76],"this":[77,314],"raises":[78],"concern":[79],"on":[80,239],"whether":[81],"such":[82],"trust":[83],"misused":[85],"programmers":[87],"when":[88],"they":[89],"promote":[90],"Aim.":[97],"We":[98],"aim":[99],"analyze":[101],"prevalence":[103],"vulnerabilities":[105],"share":[107],"examples":[109],"using":[110,123,248,313],"in":[114,195,250,291],"Stack":[115],"Overflow":[116],"(SO)":[117],"sharing":[119],"platform.":[120],"Method.":[121],"By":[122],"some":[124,143],"regular":[125],"expressions":[126],"manual":[128],"checks,":[129],"we":[130,157],"extracted":[131],"relevant":[135],"posts":[136,171,197,280],"from":[137],"SO":[138,151],"categorized":[140],"them":[141],"into":[142],"software":[144],"development":[145],"scenarios.":[146],"Results.":[147],"entire":[150],"data":[152],"dump":[153],"September":[155],"2018,":[156],"find":[158],"2,283":[159],"snippets":[161,260],"with":[162,225,261,271],"keyword.":[165],"Among":[166],"those":[167],"posts,":[168],"27%":[169],"are":[172,179],"about":[173],"Image":[174],"processing,":[175],"where":[176],"codes":[178,194,214],"mainly":[180],"used":[181,199,207,270,285],"reasons.":[184,202],"The":[185,218,231],"second":[186],"most":[187],"popular":[188],"category":[189,224],"21%":[191],"'Interoperability'":[201,210,279],"That":[203],"'unsafe'":[205],"enable":[209],"between":[211],"managed":[213],"unmanaged":[216],"codes.":[217],"'stackalloc'":[219,249],"operator":[220,233],"third":[223],"9%":[226],"posts.":[230],"stackalloc":[232],"allocates":[234],"block":[236],"memory":[238],"stack.":[241],"Since":[242],"7.2,":[244],"Microsoft":[245,294],"recommends":[246],"against":[247],"context":[252],"whenever":[253],"possible.":[254],"Manual":[255],"inspection":[256],"shows":[257],"67":[258],"functions":[263],"that":[264],"introduce":[266],"vulnerability":[267],"if":[268],"caution":[272],"(e.g.,":[273],"buffer":[274],"overflow).":[275],"Finally,":[276],"35%":[277],"have":[281],"'P/Invoke'":[282],"tag":[283],"were":[284],"outside":[286],"NativeMethods":[287],"class,":[288],"contrast":[292],"design":[295],"suggestion.":[296],"Conclusion.":[297],"Our":[298],"study":[299],"leads":[300],"7":[302],"main":[303],"findings,":[304],"these":[306],"findings":[307],"show":[308],"importance":[310],"cautiously":[312],"feature.":[315]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2020-10-29T00:00:00"}
