{"id":"https://openalex.org/W3203928692","doi":"https://doi.org/10.1145/3475738.3480939","title":"Low-overhead multi-language dynamic taint analysis on managed runtimes through speculative optimization","display_name":"Low-overhead multi-language dynamic taint analysis on managed runtimes through speculative optimization","publication_year":2021,"publication_date":"2021-09-25","ids":{"openalex":"https://openalex.org/W3203928692","doi":"https://doi.org/10.1145/3475738.3480939","mag":"3203928692"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3475738.3480939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002542821","display_name":"Jacob Kreindl","orcid":"https://orcid.org/0000-0001-5112-3981"},"institutions":[],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Jacob Kreindl","raw_affiliation_strings":["JKU Linz, Austria"],"affiliations":[{"raw_affiliation_string":"JKU Linz, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025674223","display_name":"Daniele Bonetta","orcid":"https://orcid.org/0000-0001-7633-4224"},"institutions":[],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Daniele Bonetta","raw_affiliation_strings":["Oracle Labs, Netherlands"],"affiliations":[{"raw_affiliation_string":"Oracle Labs, Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110976927","display_name":"Lukas Stadler","orcid":null},"institutions":[],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Lukas Stadler","raw_affiliation_strings":["Oracle Labs, Austria"],"affiliations":[{"raw_affiliation_string":"Oracle Labs, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069165515","display_name":"David Leopoldseder","orcid":"https://orcid.org/0000-0002-9361-6431"},"institutions":[],"countries":["AT"],"is_corresponding":false,"raw_author_name":"David Leopoldseder","raw_affiliation_strings":["Oracle Labs, Austria"],"affiliations":[{"raw_affiliation_string":"Oracle Labs, Austria","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011678778","display_name":"Hanspeter M\u00f6ssenb\u00f6ck","orcid":"https://orcid.org/0000-0001-7706-7308"},"institutions":[],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Hanspeter M\u00f6ssenb\u00f6ck","raw_affiliation_strings":["JKU Linz, Austria"],"affiliations":[{"raw_affiliation_string":"JKU Linz, Austria","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.111,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.404238,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":56,"max":66},"biblio":{"volume":null,"issue":null,"first_page":"70","last_page":"87"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9984,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.901564},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.52433544},{"id":"https://openalex.org/keywords/dynamic-data","display_name":"Dynamic data","score":0.5168048},{"id":"https://openalex.org/keywords/dynamic-program-analysis","display_name":"Dynamic program analysis","score":0.43009478}],"concepts":[{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.901564},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83481157},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.7236517},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.52433544},{"id":"https://openalex.org/C197298091","wikidata":"https://www.wikidata.org/wiki/Q5318963","display_name":"Dynamic data","level":2,"score":0.5168048},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.51602364},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49750617},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.43911895},{"id":"https://openalex.org/C140006998","wikidata":"https://www.wikidata.org/wiki/Q2499307","display_name":"Dynamic program analysis","level":3,"score":0.43009478},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.3415364},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.20939848}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/3475738.3480939","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":42,"referenced_works":["https://openalex.org/W1604252617","https://openalex.org/W1821004526","https://openalex.org/W1966973702","https://openalex.org/W1989790414","https://openalex.org/W1991074244","https://openalex.org/W2006419855","https://openalex.org/W2007831853","https://openalex.org/W2011146531","https://openalex.org/W2012286850","https://openalex.org/W2075675735","https://openalex.org/W2089745089","https://openalex.org/W2094269821","https://openalex.org/W2101152030","https://openalex.org/W2102970979","https://openalex.org/W2108747667","https://openalex.org/W2114067856","https://openalex.org/W2116774218","https://openalex.org/W2130235146","https://openalex.org/W2138788987","https://openalex.org/W2140839850","https://openalex.org/W2144789413","https://openalex.org/W2146717998","https://openalex.org/W2148334213","https://openalex.org/W2172163424","https://openalex.org/W2179304688","https://openalex.org/W2199584834","https://openalex.org/W2394543764","https://openalex.org/W2394695306","https://openalex.org/W2401617229","https://openalex.org/W2464350869","https://openalex.org/W2731881248","https://openalex.org/W2755512550","https://openalex.org/W2789289170","https://openalex.org/W2793681106","https://openalex.org/W2794883415","https://openalex.org/W2889110163","https://openalex.org/W2898614297","https://openalex.org/W2922037604","https://openalex.org/W3092498976","https://openalex.org/W3095615032","https://openalex.org/W3099921615","https://openalex.org/W4241029635"],"related_works":["https://openalex.org/W3120011499","https://openalex.org/W3111646971","https://openalex.org/W2741981662","https://openalex.org/W2596150641","https://openalex.org/W2486032082","https://openalex.org/W2301530215","https://openalex.org/W2249628242","https://openalex.org/W2127761335","https://openalex.org/W2022689150","https://openalex.org/W2005010039"],"abstract_inverted_index":{"Dynamic":[0],"taint":[1,56,81],"analysis":[2,8,47,62],"(DTA)":[3],"is":[4],"a":[5,59,109],"popular":[6],"program":[7],"technique":[9],"with":[10],"applications":[11],"to":[12,76,96],"diverse":[13],"fields":[14],"such":[15],"as":[16,29],"software":[17],"vulnerability":[18],"detection":[19],"and":[20,31],"reverse":[21],"engineering.":[22],"It":[23],"consists":[24],"of":[25,44,103,113],"marking":[26],"sensitive":[27],"data":[28],"tainted":[30,70,89],"tracking":[32],"its":[33],"propagation":[34,82],"at":[35,72],"runtime.":[36],"While":[37],"DTA":[38,107],"has":[39],"been":[40],"implemented":[41],"on":[42,69,99,108],"top":[43],"many":[45],"different":[46],"platforms,":[48],"these":[49],"implementations":[50],"generally":[51],"incur":[52],"significant":[53],"slowdown":[54,98],"from":[55],"propagation.":[57],"Since":[58],"purely":[60],"dynamic":[61,114],"cannot":[63],"predict":[64],"which":[65],"instructions":[66],"will":[67],"operate":[68],"values":[71],"runtime,":[73],"programs":[74,104],"have":[75],"be":[77],"fully":[78],"instrumented":[79,105],"for":[80,106],"even":[83],"when":[84],"they":[85],"never":[86],"actually":[87],"observe":[88],"values.":[90],"We":[91],"propose":[92],"leveraging":[93],"speculative":[94],"optimizations":[95],"reduce":[97],"the":[100],"peak":[101],"performance":[102],"managed":[110],"runtime":[111],"capable":[112],"compilation.":[115]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3203928692","counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-04-04T21:07:41.847130","created_date":"2021-10-11"}