{"id":"https://openalex.org/W3195605733","doi":"https://doi.org/10.1145/3468264.3468572","title":"Detecting concurrency vulnerabilities based on partial orders of memory and thread events","display_name":"Detecting concurrency vulnerabilities based on partial orders of memory and thread events","publication_year":2021,"publication_date":"2021-08-18","ids":{"openalex":"https://openalex.org/W3195605733","doi":"https://doi.org/10.1145/3468264.3468572","mag":"3195605733"},"language":"en","primary_location":{"id":"doi:10.1145/3468264.3468572","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3468264.3468572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101780593","display_name":"Kunpeng Yu","orcid":"https://orcid.org/0000-0002-1232-8973"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kunpeng Yu","raw_affiliation_strings":["Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455037","display_name":"Chenxu Wang","orcid":"https://orcid.org/0000-0001-7039-033X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenxu Wang","raw_affiliation_strings":["Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019924930","display_name":"Yan Cai","orcid":"https://orcid.org/0000-0002-4768-0272"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210128818","display_name":"Institute of Software","ror":"https://ror.org/033dfsn42","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210128818"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Cai","raw_affiliation_strings":["Institute of Software at Chinese Academy of Sciences, China / University of Chinese Academy of Sciences, China"],"affiliations":[{"raw_affiliation_string":"Institute of Software at Chinese Academy of Sciences, China / University of Chinese Academy of Sciences, China","institution_ids":["https://openalex.org/I4210128818","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Hong Kong Polytechnic University, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong Polytechnic University, China","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101995389","display_name":"Zijiang Yang","orcid":"https://orcid.org/0000-0001-7647-3718"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zijiang Yang","raw_affiliation_strings":["Xi'an Jiaotong University, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Jiaotong University, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101780593"],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.9518,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.80198966,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"280","last_page":"291"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8808614611625671},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.7492139339447021},{"id":"https://openalex.org/keywords/thread","display_name":"Thread (computing)","score":0.7349581718444824},{"id":"https://openalex.org/keywords/interleaving","display_name":"Interleaving","score":0.5797749757766724},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5105865597724915},{"id":"https://openalex.org/keywords/partial-order-reduction","display_name":"Partial order reduction","score":0.49928855895996094},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.44361406564712524},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.4135909676551819},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.29749786853790283},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.22916540503501892},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21271762251853943},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17503175139427185},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16160520911216736}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8808614611625671},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.7492139339447021},{"id":"https://openalex.org/C138101251","wikidata":"https://www.wikidata.org/wiki/Q213092","display_name":"Thread (computing)","level":2,"score":0.7349581718444824},{"id":"https://openalex.org/C28034677","wikidata":"https://www.wikidata.org/wiki/Q17092530","display_name":"Interleaving","level":2,"score":0.5797749757766724},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5105865597724915},{"id":"https://openalex.org/C94633896","wikidata":"https://www.wikidata.org/wiki/Q7140378","display_name":"Partial order reduction","level":3,"score":0.49928855895996094},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.44361406564712524},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.4135909676551819},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29749786853790283},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.22916540503501892},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21271762251853943},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17503175139427185},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16160520911216736}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3468264.3468572","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3468264.3468572","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W2025819261","https://openalex.org/W2046368282","https://openalex.org/W2054739713","https://openalex.org/W2059278087","https://openalex.org/W2072419942","https://openalex.org/W2078197548","https://openalex.org/W2104070839","https://openalex.org/W2112521545","https://openalex.org/W2117798902","https://openalex.org/W2134747058","https://openalex.org/W2135948849","https://openalex.org/W2138788987","https://openalex.org/W2167744164","https://openalex.org/W2606910946","https://openalex.org/W2794682558","https://openalex.org/W2799137521","https://openalex.org/W2903402038","https://openalex.org/W2927543040","https://openalex.org/W2968450123","https://openalex.org/W2979357014","https://openalex.org/W2984119759","https://openalex.org/W2995880861","https://openalex.org/W3016185124","https://openalex.org/W3137220996","https://openalex.org/W4236306709","https://openalex.org/W4239813889","https://openalex.org/W4240590466","https://openalex.org/W4248655060"],"related_works":["https://openalex.org/W4253571630","https://openalex.org/W2133697637","https://openalex.org/W2837991191","https://openalex.org/W1873898332","https://openalex.org/W2741423451","https://openalex.org/W2172078515","https://openalex.org/W2574965914","https://openalex.org/W147489498","https://openalex.org/W2462966030","https://openalex.org/W1525816981"],"abstract_inverted_index":{"Memory":[0],"vulnerabilities":[1,12,20,49,66,95],"are":[2,40,171],"the":[3,52,82,98,107,149,174],"main":[4],"causes":[5],"of":[6,34,71,79,86,101,110,130,181],"software":[7],"security":[8],"problems.":[9],"However,":[10],"detecting":[11],"in":[13,202],"multi-threaded":[14,36],"programs":[15],"is":[16,27],"challenging":[17],"because":[18],"many":[19],"occur":[21],"under":[22],"specific":[23,94],"executions,":[24],"and":[25,113,184,205],"it":[26],"hard":[28],"to":[29,46,51,62,122,139,187],"explore":[30],"all":[31],"possible":[32,111],"executions":[33,112],"a":[35,59,77,136,141,154,179],"program.":[37],"Existing":[38],"approaches":[39,161],"either":[41],"computationally":[42],"intensive":[43],"or":[44],"likely":[45],"miss":[47],"some":[48],"due":[50],"complex":[53],"thread":[54],"interleaving.":[55],"This":[56],"paper":[57],"introduces":[58],"novel":[60,137],"approach":[61,183],"detect":[63],"concurrency":[64],"memory":[65,131],"based":[67],"on":[68,76],"partial":[69,74],"orders":[70,85,100],"events.":[72,87,103],"A":[73],"order":[75],"set":[78],"events":[80,151,170],"represents":[81],"definite":[83],"execution":[84,99],"It":[88,104],"allows":[89],"constructing":[90],"feasible":[91,145,155],"traces":[92],"exposing":[93],"by":[96,153,166,173],"exchanging":[97],"vulnerability-potential":[102,124],"also":[105,134],"reduces":[106],"search":[108],"space":[109],"thus":[114],"improves":[115],"computational":[116],"efficiency.":[117,206],"We":[118,133,177],"propose":[119],"new":[120],"algorithms":[121,201],"extract":[123],"event":[125,143],"pairs":[126],"for":[127,162],"three":[128],"kinds":[129],"vulnerabilities.":[132],"design":[135],"algorithm":[138],"compute":[140],"potential":[142],"pair's":[144],"set,":[146],"which":[147],"contains":[148],"relevant":[150],"required":[152],"trace.":[156],"Our":[157],"method":[158],"extends":[159],"existing":[160],"data":[163],"race":[164],"detection":[165],"considering":[167],"that":[168,194],"two":[169],"protected":[172],"same":[175],"lock.":[176],"implement":[178],"prototype":[180],"our":[182,195],"conduct":[185],"experiments":[186],"evaluate":[188],"its":[189],"performance.":[190],"Experimental":[191],"results":[192],"show":[193],"tool":[196],"exhibits":[197],"superiority":[198],"over":[199],"state-of-the-art":[200],"both":[203],"effectiveness":[204]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
