On run-time exploitation of concurrency door