{"id":"https://openalex.org/W4415332835","doi":"https://doi.org/10.1145/3755881.3755918","title":"Tech-ASan: Two-stage check for Address Sanitizer","display_name":"Tech-ASan: Two-stage check for Address Sanitizer","publication_year":2025,"publication_date":"2025-06-20","ids":{"openalex":"https://openalex.org/W4415332835","doi":"https://doi.org/10.1145/3755881.3755918"},"language":"en","primary_location":{"id":"doi:10.1145/3755881.3755918","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3755881.3755918","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Internetware","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3755881.3755918","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068733869","display_name":"Yixuan Cao","orcid":"https://orcid.org/0009-0006-6241-4251"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yixuan Cao","raw_affiliation_strings":["The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuhong Feng","orcid":"https://orcid.org/0000-0002-7691-5587"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuhong Feng","raw_affiliation_strings":["The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Huafeng Li","orcid":"https://orcid.org/0009-0006-9490-0449"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huafeng Li","raw_affiliation_strings":["The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chongyi Huang","orcid":"https://orcid.org/0009-0004-7370-2377"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chongyi Huang","raw_affiliation_strings":["The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120056968","display_name":"Fangcao Jian","orcid":"https://orcid.org/0009-0001-4312-157X"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fangcao Jian","raw_affiliation_strings":["The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haoran Li","orcid":"https://orcid.org/0009-0007-6789-5573"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoran Li","raw_affiliation_strings":["The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]},{"author_position":"last","author":{"id":null,"display_name":"Xu Wang","orcid":"https://orcid.org/0000-0002-2948-6468"},"institutions":[{"id":"https://openalex.org/I180726961","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70","country_code":"CN","type":"education","lineage":["https://openalex.org/I180726961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Wang","raw_affiliation_strings":["The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China"],"affiliations":[{"raw_affiliation_string":"The College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I180726961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5068733869"],"corresponding_institution_ids":["https://openalex.org/I180726961"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15058913,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"96","last_page":"107"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9925000071525574,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spec#","display_name":"Spec#","score":0.779699981212616},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5611000061035156},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.47279998660087585},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.38280001282691956},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.328900009393692}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8306999802589417},{"id":"https://openalex.org/C2778565505","wikidata":"https://www.wikidata.org/wiki/Q2207566","display_name":"Spec#","level":2,"score":0.779699981212616},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5611000061035156},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.49320000410079956},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.47279998660087585},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.38280001282691956},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3465999960899353},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3386000096797943},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.328900009393692},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.2903999984264374},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C143432726","wikidata":"https://www.wikidata.org/wiki/Q520181","display_name":"Hand sanitizer","level":2,"score":0.271699994802475}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3755881.3755918","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3755881.3755918","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Internetware","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2506.05022","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2506.05022","pdf_url":"https://arxiv.org/pdf/2506.05022","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1145/3755881.3755918","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3755881.3755918","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th International Conference on Internetware","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7247962969","display_name":null,"funder_award_id":"2017B030314073","funder_id":"https://openalex.org/F4320329236","funder_display_name":"Key Laboratory of Popular Type of High-performance Computer of Guangdong Province"}],"funders":[{"id":"https://openalex.org/F4320325571","display_name":"Shenzhen University","ror":"https://ror.org/01vy4gh70"},{"id":"https://openalex.org/F4320329236","display_name":"Key Laboratory of Popular Type of High-performance Computer of Guangdong Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Address":[0],"Sanitizer":[1],"(ASan)":[2],"is":[3],"a":[4,93,107,140,153],"sharp":[5],"weapon":[6],"for":[7,112,143],"detecting":[8],"memory":[9,51,126,154],"safety":[10,102,155],"violations,":[11],"including":[12],"temporal":[13],"and":[14,48,68,179,186,199],"spatial":[15],"errors":[16],"hidden":[17],"in":[18,33,146],"C/C++":[19],"programs":[20],"during":[21],"execution.":[22],"However,":[23],"ASan":[24,65,100,185,198],"incurs":[25],"significant":[26],"runtime":[27,182],"overhead,":[28],"which":[29,114,138],"limits":[30],"its":[31],"efficiency":[32],"testing":[34,202],"large":[35],"software.":[36],"The":[37],"overhead":[38,183],"mainly":[39],"comes":[40],"from":[41],"sanitizer":[42,70],"checks":[43,80,145],"due":[44],"to":[45,62,76,98,119,134],"the":[46,54,123,159,166,174,204,209],"frequent":[47],"expensive":[49],"shadow":[50,125],"access.":[52],"Over":[53],"past":[55],"decade,":[56],"many":[57],"methods":[58,176],"have":[59],"been":[60],"developed":[61],"speed":[63],"up":[64],"by":[66],"eliminating":[67],"accelerating":[69],"checks,":[71,137],"however,":[72],"they":[73],"either":[74],"fail":[75],"adequately":[77],"eliminate":[78,135],"redundant":[79,136],"or":[81],"compromise":[82],"detection":[83],"capabilities.":[84],"To":[85],"address":[86],"this":[87,89],"issue,":[88],"paper":[90],"presents":[91],"Tech-ASan,":[92],"two-stage":[94,109],"check":[95,110],"based":[96,157],"technique":[97],"accelerate":[99],"with":[101,177],"assurance.":[103],"First,":[104],"we":[105,129,149],"propose":[106],"novel":[108,141],"algorithm":[111,142],"ASan,":[113],"leverages":[115],"magic":[116],"value":[117],"comparison":[118],"reduce":[120],"most":[121],"of":[122],"costly":[124],"accesses.":[127],"Second,":[128],"design":[130],"an":[131],"efficient":[132],"optimizer":[133],"integrates":[139],"removing":[144],"loops.":[147],"Third,":[148],"implement":[150],"Tech-ASan":[151,172,190],"as":[152],"tool":[156],"on":[158,203],"LLVM":[160],"compiler":[161],"infrastructure.":[162],"Our":[163],"evaluation":[164],"using":[165],"SPEC":[167],"CPU2006":[168],"benchmark":[169],"shows":[170],"that":[171],"outperforms":[173],"state-of-the-art":[175],"33.70%":[178],"17.89%":[180],"less":[181],"than":[184,197],"ASan--,":[187],"respectively.":[188],"Moreover,":[189],"detects":[191],"56":[192],"fewer":[193],"false":[194],"negative":[195],"cases":[196],"ASan--":[200],"when":[201],"Juliet":[205],"Test":[206],"Suite":[207],"under":[208],"same":[210],"redzone":[211],"setting.":[212]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-19T00:00:00"}
