{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:20:00Z","timestamp":1761664800303,"version":"3.41.2"},"reference-count":75,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T00:00:00Z","timestamp":1746403200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004955","name":"Austrian Research Promotion Agency (FFG) via the AWARE project (FFG)","doi-asserted-by":"publisher","award":["891092"],"award-info":[{"award-number":["891092"]}],"id":[{"id":"10.13039\/501100004955","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,5]]},"DOI":"10.1109\/host64725.2025.11050045","type":"proceedings-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T17:47:34Z","timestamp":1751910454000},"page":"312-323","source":"Crossref","is-referenced-by-count":1,"title":["Cryptographic Least Privilege Enforcement for Scalable Memory Isolation"],"prefix":"10.1109","author":[{"given":"Martin","family":"Unterguggenberger","sequence":"first","affiliation":[{"name":"Graz University of Technology"}]},{"given":"David","family":"Schrammel","sequence":"additional","affiliation":[{"name":"Graz University of Technology"}]},{"given":"Lukas","family":"Maar","sequence":"additional","affiliation":[{"name":"Graz University of Technology"}]},{"given":"Lukas","family":"Lamster","sequence":"additional","affiliation":[{"name":"Graz University of Technology"}]},{"given":"Vedad","family":"Had\u017ei\u0107","sequence":"additional","affiliation":[{"name":"Graz University of Technology"}]},{"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[{"name":"Graz University of Technology"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.35"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00058"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3290384"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2017.i1.4-44"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.46586\/tosc.v2023.i3.25-73"},{"key":"ref6","article-title":"The SMT-LIB Standard: Version 2.6. Technical report","author":"Barrett","year":"2017","journal-title":"Department of Computer Science, The University of Iowa"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.326-368"},{"volume-title":"Retrofitting Temporal Memory Safety on C++","year":"2022","author":"Bikineev","key":"ref8"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2024716.2024718","volume":"39","author":"Binkert","year":"2011","journal-title":"The gem5 Simulator. SIGARCH Computer Architecture News"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3595797"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560600"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.345"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/195470.195579"},{"key":"ref15","article-title":"PointGuard\u2122: Protecting Pointers from Buffer Overflow Vulnerabilities","author":"Cowan","year":"2003","journal-title":"USENIX Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1353536.1346295"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00035"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00098"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3620665.3640416"},{"key":"ref21","article-title":"IMIX: In-Process Memory Isolation EXtension","author":"Frassetto","year":"2018","journal-title":"USENIX Security"},{"key":"ref22","article-title":"Hodor: IntraProcess Isolation for High-Throughput Data Plane Libraries","author":"Hedayati","year":"2019","journal-title":"USENIX ATC"},{"volume-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual Volume 2A: Instruction Set Reference, A-L","year":"2023","key":"ref23"},{"volume-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual Volume 3A: System Programming Guide, Part 1","year":"2023","key":"ref24"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3533704"},{"key":"ref26","article-title":"Cyclone: A Safe Dialect of C","author":"Jim","year":"2002","journal-title":"USENIX ATC"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179390"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00095"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516713"},{"key":"ref32","article-title":"HashTag: Hash-based Integrity Protection for Tagged Architectures","author":"Lamster","year":"2023","journal-title":"USENIX Security"},{"key":"ref33","article-title":"Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC","author":"Lamster","year":"2024","journal-title":"USENIX Security"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2021.i4.510-545"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3466752.3480076"},{"key":"ref36","article-title":"Meltdown: Reading Kernel Memory from User Space","author":"Lipp","year":"2018","journal-title":"USENIX Security"},{"key":"ref37","article-title":"The gem5 Simulator: Version 20.0+","volume":"abs\/2007.03152","author":"Lowe-Power","year":"2020","journal-title":"CoRR"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO56248.2022.00020"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"volume-title":"Trends, challenges, and strategic shifts in the software vulnerability mitigation landscape","year":"2019","author":"Miller","key":"ref40"},{"volume-title":"Common Weakness Enumeration","year":"2006-2023","key":"ref41"},{"volume-title":"RISC-V Sail Model","year":"2019","author":"Mundkur","key":"ref42"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337181"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542504"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453684"},{"key":"ref47","doi-asserted-by":"crossref","DOI":"10.1145\/503272.503286","article-title":"CCured: TypeSafe Retrofitting of Legacy Code","author":"Necula","year":"2002","journal-title":"POPL"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3292040.3219662"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3250601"},{"volume-title":"Pointer Authentication on ARMv8.3","year":"2017","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3495152"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.5220\/0012050300003555"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP60621.2024.00024"},{"key":"ref55","article-title":"Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86","author":"Schrammel","year":"2020","journal-title":"USENIX Security"},{"key":"ref56","article-title":"AddressSanitizer: A Fast Address Sanity Checker","author":"Serebryany","year":"2012","journal-title":"USENIX ATC"},{"key":"ref57","article-title":"ARM Memory Tagging Extension and How It Improves C\/C++ Memory Safety","author":"Serebryany","year":"2019","journal-title":"login Usenix Magazine"},{"key":"ref58","article-title":"Memory Tagging and how it improves C\/C++ memory safety","author":"Serebryany","year":"2018","journal-title":"Technical report, Google Security Engineering"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00068"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_19"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1561\/3300000013"},{"volume-title":"An update on Memory Safety in Chrome","year":"2021","author":"Taylor","key":"ref63"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2025.240277"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623138"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3590331"},{"key":"ref67","article-title":"ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)","author":"Vahldiek-Oberwagner","year":"2019","journal-title":"USENIX Security"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"volume-title":"Capability Hardware Enhanced RISC Instructions: CHERI InstructionSet Architecture (Version 9)","year":"2023","author":"Watson","key":"ref69"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665740"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358288"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559344"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446761"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00076"}],"event":{"name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","start":{"date-parts":[[2025,5,5]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2025,5,8]]}},"container-title":["2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11050019\/11050011\/11050045.pdf?arnumber=11050045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T04:46:00Z","timestamp":1751949960000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11050045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,5]]},"references-count":75,"URL":"https:\/\/doi.org\/10.1109\/host64725.2025.11050045","relation":{},"subject":[],"published":{"date-parts":[[2025,5,5]]}}}