{"id":"https://openalex.org/W4214575457","doi":"https://doi.org/10.1145/3503222.3507712","title":"MineSweeper: a \u201cclean sweep\u201d for drop-in use-after-free prevention","display_name":"MineSweeper: a \u201cclean sweep\u201d for drop-in use-after-free prevention","publication_year":2022,"publication_date":"2022-02-22","ids":{"openalex":"https://openalex.org/W4214575457","doi":"https://doi.org/10.1145/3503222.3507712"},"language":"en","primary_location":{"id":"doi:10.1145/3503222.3507712","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503222.3507712","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507712","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507712","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019697190","display_name":"M\u00e1rton Erd\u0151s","orcid":"https://orcid.org/0000-0002-5146-4361"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"M\u00e1rton Erd\u0151s","raw_affiliation_strings":["University of Cambridge, UK"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, UK","institution_ids":["https://openalex.org/I241749"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041446247","display_name":"Sam Ainsworth","orcid":"https://orcid.org/0000-0002-3726-0055"},"institutions":[{"id":"https://openalex.org/I98677209","display_name":"University of Edinburgh","ror":"https://ror.org/01nrxwf90","country_code":"GB","type":"education","lineage":["https://openalex.org/I98677209"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sam Ainsworth","raw_affiliation_strings":["University of Edinburgh, UK"],"affiliations":[{"raw_affiliation_string":"University of Edinburgh, UK","institution_ids":["https://openalex.org/I98677209"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047443783","display_name":"Timothy M. Jones","orcid":"https://orcid.org/0000-0002-4114-7661"},"institutions":[{"id":"https://openalex.org/I241749","display_name":"University of Cambridge","ror":"https://ror.org/013meh722","country_code":"GB","type":"education","lineage":["https://openalex.org/I241749"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Timothy M. Jones","raw_affiliation_strings":["University of Cambridge, UK"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, UK","institution_ids":["https://openalex.org/I241749"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019697190"],"corresponding_institution_ids":["https://openalex.org/I241749"],"apc_list":null,"apc_paid":null,"fwci":1.8044,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.86976505,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"212","last_page":"225"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.799041748046875},{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.7644165754318237},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6799638867378235},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.6752233505249023},{"id":"https://openalex.org/keywords/memory-leak","display_name":"Memory leak","score":0.5767384767532349},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.5716507434844971},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5699000954627991},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.48219743371009827},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.4815100133419037},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.40399986505508423},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4005114436149597},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3768094480037689},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.3528997004032135},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2648921012878418},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.2245950996875763},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.14675185084342957},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08760419487953186}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.799041748046875},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.7644165754318237},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6799638867378235},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.6752233505249023},{"id":"https://openalex.org/C156731835","wikidata":"https://www.wikidata.org/wiki/Q751740","display_name":"Memory leak","level":4,"score":0.5767384767532349},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.5716507434844971},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5699000954627991},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.48219743371009827},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.4815100133419037},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.40399986505508423},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4005114436149597},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3768094480037689},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.3528997004032135},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2648921012878418},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.2245950996875763},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.14675185084342957},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08760419487953186}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3503222.3507712","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503222.3507712","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507712","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.ed.ac.uk:publications/5edbbb4d-8e6b-44a2-817b-af1d55d93dde","is_oa":true,"landing_page_url":"https://www.research.ed.ac.uk/en/publications/5edbbb4d-8e6b-44a2-817b-af1d55d93dde","pdf_url":null,"source":{"id":"https://openalex.org/S4306400321","display_name":"Edinburgh Research Explorer (University of Edinburgh)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I98677209","host_organization_name":"University of Edinburgh","host_organization_lineage":["https://openalex.org/I98677209"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.1145/3503222.3507712","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3503222.3507712","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3503222.3507712","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1934935867","display_name":null,"funder_award_id":"Engineering and Physical Sciences R","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G256726586","display_name":null,"funder_award_id":"EP/P020011/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G3661743248","display_name":null,"funder_award_id":"EP/K026399/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G4628939008","display_name":"M3: Managing Many-Cores for the Masses","funder_award_id":"EP/K026399/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6886552787","display_name":"Automatic Binary Parallelisation","funder_award_id":"EP/P020011/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G7278708347","display_name":null,"funder_award_id":"EP/K026399/1,EP/P020011/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G8719353587","display_name":null,"funder_award_id":"EP/P0","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4214575457.pdf","grobid_xml":"https://content.openalex.org/works/W4214575457.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1984471991","https://openalex.org/W2000387981","https://openalex.org/W2036853599","https://openalex.org/W2117798902","https://openalex.org/W2134028114","https://openalex.org/W2154795299","https://openalex.org/W2606752733","https://openalex.org/W2751137623","https://openalex.org/W2796645376","https://openalex.org/W2890363035","https://openalex.org/W2947565728","https://openalex.org/W2956068069","https://openalex.org/W2974932038","https://openalex.org/W3015296434","https://openalex.org/W3025512357","https://openalex.org/W3110588399","https://openalex.org/W3155318746","https://openalex.org/W4238851087","https://openalex.org/W4239035626","https://openalex.org/W4250981365"],"related_works":["https://openalex.org/W2484072889","https://openalex.org/W2055367414","https://openalex.org/W2052673929","https://openalex.org/W2138847","https://openalex.org/W261562921","https://openalex.org/W1584308544","https://openalex.org/W2379457214","https://openalex.org/W2373327185","https://openalex.org/W2047240985","https://openalex.org/W4240600268"],"abstract_inverted_index":{"Low-level":[0],"languages,":[1],"which":[2],"require":[3],"manual":[4],"memory":[5,64],"management":[6],"from":[7],"the":[8,57,63,80],"programmer,":[9],"remain":[10,44],"in":[11,46],"wide":[12],"use":[13],"for":[14],"performance-critical":[15],"applications.":[16],"Memory-safety":[17],"bugs":[18],"are":[19,52],"common,":[20],"and":[21,48,87],"now":[22],"a":[23,30],"major":[24],"source":[25],"of":[26],"exploits.":[27],"In":[28],"particular,":[29],"use-after-free":[31],"bug":[32],"occurs":[33],"when":[34],"an":[35,67],"object":[36],"is":[37],"erroneously":[38,68],"deallocated,":[39],"whilst":[40],"pointers":[41,51],"to":[42,55],"it":[43],"active":[45],"memory,":[47],"those":[49],"(dangling)":[50],"later":[53],"used":[54],"access":[56],"object.":[58],"An":[59],"attacker":[60],"can":[61],"reallocate":[62],"area":[65],"backing":[66],"freed":[69],"object,":[70],"then":[71],"overwrite":[72],"its":[73,85],"contents,":[74],"injecting":[75],"carefully":[76],"chosen":[77],"data":[78],"into":[79],"host":[81],"program,":[82],"thus":[83],"altering":[84],"execution":[86],"achieving":[88],"privilege":[89],"escalation.":[90]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
