{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:24:36Z","timestamp":1725773076418},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872279"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/qrs54544.2021.00080","type":"proceedings-article","created":{"date-parts":[[2022,3,10]],"date-time":"2022-03-10T20:37:01Z","timestamp":1646944621000},"page":"702-713","source":"Crossref","is-referenced-by-count":3,"title":["Sdft: A PDG-based Summarization for Efficient Dynamic Data Flow Tracking"],"prefix":"10.1109","author":[{"given":"Xiao","family":"Kan","sequence":"first","affiliation":[{"name":"Xidian University,Xi'an,China"}]},{"given":"Cong","family":"Sun","sequence":"additional","affiliation":[{"name":"Xidian University,Xi'an,China"}]},{"given":"Shen","family":"Liu","sequence":"additional","affiliation":[{"name":"NVIDIA Santa Clara,CA,USA"}]},{"given":"Yongzhe","family":"Huang","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University,University Park,PA,USA"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University,University Park,PA,USA"}]},{"given":"Siqi","family":"Ma","sequence":"additional","affiliation":[{"name":"The University of Queensland,Brisbane,Australia"}]},{"given":"Yumei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Xidian University,Xi'an,China"}]}],"member":"263","reference":[{"journal-title":"Towards Practical Taint Tracking","year":"2010","author":"ermolinskiy","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.1310735"},{"journal-title":"The GNU C Library Reference Manual","year":"1993","author":"loosemore","key":"ref31"},{"journal-title":"Quantitative privilege separation with pointer supports","year":"2020","author":"liu","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24386"},{"journal-title":"Libdft64","year":"0","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_1"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3373876"},{"key":"ref12","first-page":"622","article-title":"The taint rabbit: Optimizing generic taint analysis with dynamic fast path generation","author":"galea","year":"2020","journal-title":"ASIA CCS ‘14"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16462-5_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274746"},{"key":"ref16","first-page":"451","article-title":"JetStream: cluster-scale parallelization of information flow queries","author":"quinn","year":"2016","journal-title":"OSSDI'16"},{"key":"ref17","first-page":"105","article-title":"Decoupling dynamic infor-mation flow tracking with a dedicated coprocessor","author":"kannan","year":"2009","journal-title":"DSN'09 IEEE Computer Society"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516704"},{"key":"ref19","first-page":"65","article-title":"TaintPipe: pipelined symbolic taint analysis","author":"ming","year":"2015","journal-title":"Usenix Sec '15"},{"journal-title":"Parameter-tree based Program Dependence Graph (PDG)","year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-009-9148-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"journal-title":"NDSS'11","article-title":"DTA++: dynamic taint analysis with targeted control-flow propagation","year":"2011","author":"kang","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354218"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23339"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.56"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.158"},{"journal-title":"NDSSC 12","article-title":"A general approach for efficiently accelerating software-based dynamic data flow tracking on commodity hardware","year":"0","author":"jee","key":"ref9"},{"journal-title":"NDSS'05","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","year":"2005","author":"newsome","key":"ref1"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.33"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970299"},{"journal-title":"Efficient transparent and comprehensive runtime code manipulation","year":"2004","author":"bruening","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1945023.1945039"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2010.9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1356058.1356069"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884816"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03542-0_21"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)81042-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134066"},{"key":"ref43","first-page":"225","article-title":"Hardware enforcement of application security policies using tagged memory","author":"zeldovich","year":"2008","journal-title":"OSDI'08"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"}],"event":{"name":"2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)","start":{"date-parts":[[2021,12,6]]},"location":"Hainan, China","end":{"date-parts":[[2021,12,10]]}},"container-title":["2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9724650\/9724651\/09724893.pdf?arnumber=9724893","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T20:14:36Z","timestamp":1655324076000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9724893\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":47,"URL":"http:\/\/dx.doi.org\/10.1109\/qrs54544.2021.00080","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}