{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T04:19:38Z","timestamp":1729138778763,"version":"3.27.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["CRDPJ 541942-19"],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003816","name":"Huawei Technologies","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003816","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3607199.3607212","type":"proceedings-article","created":{"date-parts":[[2023,10,3]],"date-time":"2023-10-03T22:30:51Z","timestamp":1696372251000},"page":"609-622","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-5189-7610","authenticated-orcid":false,"given":"Shengjie","family":"Xu","sequence":"first","affiliation":[{"name":"University of Toronto, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0009-0001-3980-2364","authenticated-orcid":false,"given":"Eric","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-1231-1394","authenticated-orcid":false,"given":"Wei","family":"Huang","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2000-6827","authenticated-orcid":false,"given":"David","family":"Lie","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"volume-title":"Proceedings of the USENIX security symposium(USENIX Security \u201909)","year":"2009","author":"Akritidis Periklis","key":"e_1_3_2_1_1_1","unstructured":"Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. 2009. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. In Proceedings of the USENIX security symposium(USENIX Security \u201909). Montreal, Canada. https:\/\/www.usenix.org\/legacy\/event\/sec09\/tech\/full_papers\/sec09_memory.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Arm Limited 2019. Arm Architecture Reference Manual Armv8 for Armv8-A architecture profile. Arm Limited. https:\/\/developer.arm.com\/documentation\/ddi0487\/ea. Accessed 2023-06-30."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00122-9"},{"volume-title":"Dependent Types for Low-Level Programming","author":"Condit Jeremy","key":"e_1_3_2_1_4_1","unstructured":"Jeremy Condit, Matthew Harren, Zachary Anderson, David Gay, and George\u00a0C. Necula. 2007. Dependent Types for Low-Level Programming. In Programming Languages and Systems, Rocco De\u00a0Nicola (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 520\u2013535."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316482.3326356"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Archibald\u00a0Samuel Elliott Andrew Ruef Michael Hicks and David Tarditi. 2018. Checked C: Making C Safe by Extension. In 2018 IEEE Cybersecurity Development (SecDev). 53\u201360. https:\/\/doi.org\/10.1109\/SecDev.2018.00015","DOI":"10.1109\/SecDev.2018.00015"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00076"},{"volume-title":"USENIX Annual Technical Conference, General Track. 275\u2013288","year":"2002","author":"Jim Trevor","key":"e_1_3_2_1_10_1","unstructured":"Trevor Jim, J\u00a0Gregory Morrisett, Dan Grossman, Michael\u00a0W Hicks, James Cheney, and Yanling Wang. 2002. Cyclone: a safe dialect of C.. In USENIX Annual Technical Conference, General Track. 275\u2013288."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460434"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00095"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516713"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527322"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544137.2544147"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359799"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/565816.503286"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3224423"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854053"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3495152"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358299"},{"key":"e_1_3_2_1_24_1","unstructured":"Kostya Serebryany Evgenii Stepanov Aleksey Shlyapnikov Vlad Tsyrklevich and Dmitry Vyukov. 2018. Memory Tagging and how it improves C\/C++ memory safety. arxiv:1802.09517\u00a0[cs.CR]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"volume-title":"Partitioned Memory Models for Program Analysis","author":"Wang Wei","key":"e_1_3_2_1_27_1","unstructured":"Wei Wang, Clark Barrett, and Thomas Wies. 2017. Partitioned Memory Models for Program Analysis. In Verification, Model Checking, and Abstract Interpretation, Ahmed Bouajjani and David Monniaux (Eds.). Springer International Publishing, Cham, 539\u2013558."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2914037"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446761"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.20"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2840992"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","unstructured":"Jie Zhou John Criswell and Michael Hicks. 2022. Fat Pointers for Temporal Memory Safety of C. https:\/\/arxiv.org\/abs\/2208.12900. https:\/\/doi.org\/10.48550\/ARXIV.2208.12900","DOI":"10.48550\/ARXIV.2208.12900"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/142181.142200"}],"event":{"name":"RAID 2023: The 26th International Symposium on Research in Attacks, Intrusions and Defenses","acronym":"RAID 2023","location":"Hong Kong China"},"container-title":["Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607199.3607212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T10:34:03Z","timestamp":1729074843000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607199.3607212"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":33,"alternative-id":["10.1145\/3607199.3607212","10.1145\/3607199"],"URL":"https:\/\/doi.org\/10.1145\/3607199.3607212","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}