{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:46:42Z","timestamp":1725698802003},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,29]]},"DOI":"10.1145\/3475738.3480939","type":"proceedings-article","created":{"date-parts":[[2021,9,25]],"date-time":"2021-09-25T16:12:45Z","timestamp":1632586365000},"page":"70-87","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Low-overhead multi-language dynamic taint analysis on managed runtimes through speculative optimization"],"prefix":"10.1145","author":[{"given":"Jacob","family":"Kreindl","sequence":"first","affiliation":[{"name":"JKU Linz, Austria"}]},{"given":"Daniele","family":"Bonetta","sequence":"additional","affiliation":[{"name":"Oracle Labs, Netherlands"}]},{"given":"Lukas","family":"Stadler","sequence":"additional","affiliation":[{"name":"Oracle Labs, Austria"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9361-6431","authenticated-orcid":false,"given":"David","family":"Leopoldseder","sequence":"additional","affiliation":[{"name":"Oracle Labs, Austria"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7706-7308","authenticated-orcid":false,"given":"Hanspeter","family":"M\u00f6ssenb\u00f6ck","sequence":"additional","affiliation":[{"name":"JKU Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2021. The Computer Language Benchmarks Game. https:\/\/benchmarksgame-team.pages.debian.net\/benchmarksgame\/index.html Accessed: 2021-05-09. 2021. The Computer Language Benchmarks Game. https:\/\/benchmarksgame-team.pages.debian.net\/benchmarksgame\/index.html Accessed: 2021-05-09."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. GeeksforGeeks: Check if n is divisible by power of 2 without using arithmetic operators. https:\/\/www.geeksforgeeks.org\/check-n-divisible-power-2-without-using-arithmetic-operators\/ Accessed: 2021-05-22. 2021. GeeksforGeeks: Check if n is divisible by power of 2 without using arithmetic operators. https:\/\/www.geeksforgeeks.org\/check-n-divisible-power-2-without-using-arithmetic-operators\/ Accessed: 2021-05-22."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. GraalVM JavaScript Runtime. https:\/\/www.graalvm.org\/reference-manual\/js\/ Accessed: 2021-05-09. 2021. GraalVM JavaScript Runtime. https:\/\/www.graalvm.org\/reference-manual\/js\/ Accessed: 2021-05-09."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. GraalVM LLVM Runtime. https:\/\/www.graalvm.org\/reference-manual\/llvm\/ Accessed: 2021-05-09. 2021. GraalVM LLVM Runtime. https:\/\/www.graalvm.org\/reference-manual\/llvm\/ Accessed: 2021-05-09."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. The LLHTTP parser for HTTP headers. https:\/\/github.com\/nodejs\/llhttp Accessed: 2021-05-18. 2021. The LLHTTP parser for HTTP headers. https:\/\/github.com\/nodejs\/llhttp Accessed: 2021-05-18."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. LLVM Data-Flow Sanitizer. https:\/\/clang.llvm.org\/docs\/DataFlowSanitizer.html Accessed: 2021-05-17. 2021. LLVM Data-Flow Sanitizer. https:\/\/clang.llvm.org\/docs\/DataFlowSanitizer.html Accessed: 2021-05-17."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. Node.js. http:\/\/www.nodejs.org\/ Accessed: 2021-05-09. 2021. Node.js. http:\/\/www.nodejs.org\/ Accessed: 2021-05-09."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Safe and Sandboxed Execution of Native Code. https:\/\/medium.com\/graalvm\/safe-and-sandboxed-execution-of-native-code-f6096b35c360 Accessed: 2021-05-09. 2021. Safe and Sandboxed Execution of Native Code. https:\/\/medium.com\/graalvm\/safe-and-sandboxed-execution-of-native-code-f6096b35c360 Accessed: 2021-05-09."},{"volume-title":"SPEC CPU 2017 Benchmark Suite. https:\/\/www.spec.org\/cpu2017\/ Accessed: 2021-05-13","key":"e_1_3_2_1_9_1","unstructured":"2021. SPEC CPU 2017 Benchmark Suite. https:\/\/www.spec.org\/cpu2017\/ Accessed: 2021-05-13 . 2021. SPEC CPU 2017 Benchmark Suite. https:\/\/www.spec.org\/cpu2017\/ Accessed: 2021-05-13."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. Truffle Compiler Flags Including \u2013engine.IterativePartialEscape. https:\/\/www.graalvm.org\/graalvm-as-a-platform\/language-implementation-framework\/Options Accessed: 2021-06-04. 2021. Truffle Compiler Flags Including \u2013engine.IterativePartialEscape. https:\/\/www.graalvm.org\/graalvm-as-a-platform\/language-implementation-framework\/Options Accessed: 2021-06-04."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. The Truffle Framework. https:\/\/www.graalvm.org\/graalvm-as-a-platform\/language-implementation-framework\/ Accessed: 2021-05-15. 2021. The Truffle Framework. https:\/\/www.graalvm.org\/graalvm-as-a-platform\/language-implementation-framework\/ Accessed: 2021-05-15."},{"key":"e_1_3_2_1_12_1","volume-title":"Dynamic Secret-Redaction of Legacy Processes for Attacker Deception. In 24th USENIX Security Symposium, USENIX Security 15","author":"Araujo F.","year":"2015","unstructured":"F. Araujo and K. W. Hamlen . 2015. Compiler-instrumented , Dynamic Secret-Redaction of Legacy Processes for Attacker Deception. In 24th USENIX Security Symposium, USENIX Security 15 , Washington, D.C., USA , August 12-14, 2015 , J. Jung and T. Holz (Eds.). USENIX Association, 145\u2013159. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/araujo F. Araujo and K. W. Hamlen. 2015. Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception. In 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015, J. Jung and T. Holz (Eds.). USENIX Association, 145\u2013159. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/araujo"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660212"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-016-1133-1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2015.7339160"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.02.003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655121.1655125"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572301"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"e_1_3_2_1_22_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019","author":"Davanian A.","year":"2019","unstructured":"A. Davanian , Z. Qi , Y. Qu , and H. Yin . 2019. DECAF++: Elastic Whole-System Dynamic Taint Analysis . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019 , Chaoyang District, Beijing, China , September 23-25, 2019 . USENIX Association, 31\u201345. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/davanian A. Davanian, Z. Qi, Y. Qu, and H. Yin. 2019. DECAF++: Elastic Whole-System Dynamic Taint Analysis. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019. USENIX Association, 31\u201345. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/davanian"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.22152\/programming-journal.org\/2018\/2\/14"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384764"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132190.3132202"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554909"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_29_1","volume-title":"19th Annual Network and Distributed System Security Symposium, NDSS 2012","author":"Jee K.","year":"2012","unstructured":"K. Jee , G. Portokalidis , V. P. Kemerlis , S. Ghosh , D. I. August , and A. D. Keromytis . 2012. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware . In 19th Annual Network and Distributed System Security Symposium, NDSS 2012 , San Diego, California, USA , February 5-8, 2012 . The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2012\/general-approach-efficiently-accelerating-software-based-dynamic-data-flow-tracking-commodity K. Jee, G. Portokalidis, V. P. Kemerlis, S. Ghosh, D. I. August, and A. D. Keromytis. 2012. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. In 19th Annual Network and Distributed System Security Symposium, NDSS 2012, San Diego, California, USA, February 5-8, 2012. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2012\/general-approach-efficiently-accelerating-software-based-dynamic-data-flow-tracking-commodity"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2011","author":"Gyung Kang M.","year":"2011","unstructured":"M. Gyung Kang , S. McCamant , P. Poosankam , and D. Song . 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011 , San Diego, California, USA, 6th February - 9th February 2011 . The Internet Society. M. Gyung Kang, S. McCamant, P. Poosankam, and D. Song. 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2878020"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541228.2555295"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3426182.3426184"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.6"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3237009.3237013"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168811"},{"key":"e_1_3_2_1_39_1","unstructured":"B. Livshits. 2012. Dynamic Taint Tracking in Managed Runtimes. Microsoft Research. B. Livshits. 2012. Dynamic Taint Tracking in Managed Runtimes. Microsoft Research."},{"volume-title":"Advanced compiler design and implementation","author":"Muchnick S.","key":"e_1_3_2_1_40_1","unstructured":"S. Muchnick . 1997. Advanced compiler design and implementation . Morgan Kaufmann Publishers , San Francisco , Calif. isbn:9781558603202 S. Muchnick. 1997. Advanced compiler design and implementation. Morgan Kaufmann Publishers, San Francisco, Calif. isbn:9781558603202"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45099-3_18"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2005","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. X. Song . 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2005 , San Diego, California, USA. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss 2005 \/dynamic-taint-analysis-automatic-detection-analysis-and-signaturegeneration-exploits-commodity\/ J. Newsome and D. X. Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2005\/dynamic-taint-analysis-automatic-detection-analysis-and-signaturegeneration-exploits-commodity\/"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661171"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173174"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_47_1","volume-title":"Partial Escape Analysis and Scalar Replacement for Java. In 12th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2014","author":"Stadler L.","year":"2014","unstructured":"L. Stadler , T. W\u00fcrthinger , and H. M\u00f6ssenb\u00f6ck . 2014 . Partial Escape Analysis and Scalar Replacement for Java. In 12th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2014 , Orlando, FL, USA , February 15-19, 2014 , D. R. Kaeli and T. Moseley (Eds.). ACM, 165. https:\/\/dl.acm.org\/citation.cfm?id=2544157 L. Stadler, T. W\u00fcrthinger, and H. M\u00f6ssenb\u00f6ck. 2014. Partial Escape Analysis and Scalar Replacement for Java. In 12th Annual IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2014, Orlando, FL, USA, February 15-19, 2014, D. R. Kaeli and T. Moseley (Eds.). ACM, 165. https:\/\/dl.acm.org\/citation.cfm?id=2544157"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2008","author":"Wondracek G.","year":"2008","unstructured":"G. Wondracek , P. M. Comparetti , C. Kr\u00fcgel , and E. Kirda . 2008. Automatic Network Protocol Analysis . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008 , San Diego, California, USA, 10th February - 13th February 2008 . The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2008\/automatic-network-protocol-analysis\/ G. Wondracek, P. M. Comparetti, C. Kr\u00fcgel, and E. Kirda. 2008. Automatic Network Protocol Analysis. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2008\/automatic-network-protocol-analysis\/"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647508.2647517"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062381"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509578.2509581"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2011.76"}],"event":{"name":"MPLR '21: 18th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"M\u00fcnster Germany","acronym":"MPLR '21"},"container-title":["Proceedings of the 18th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3475738.3480939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T05:45:06Z","timestamp":1672983906000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475738.3480939"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,29]]},"references-count":52,"alternative-id":["10.1145\/3475738.3480939","10.1145\/3475738"],"URL":"https:\/\/doi.org\/10.1145\/3475738.3480939","relation":{},"subject":[],"published":{"date-parts":[[2021,9,29]]},"assertion":[{"value":"2021-09-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}