{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T23:09:51Z","timestamp":1774307391951,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,3,14]],"date-time":"2015-03-14T00:00:00Z","timestamp":1426291200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA CRASH through ARFL","award":["FA8650-10-C-7090"],"award-info":[{"award-number":["FA8650-10-C-7090"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,3,14]]},"DOI":"10.1145\/2694344.2694383","type":"proceedings-article","created":{"date-parts":[[2015,3,3]],"date-time":"2015-03-03T09:15:23Z","timestamp":1425374123000},"page":"487-502","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Architectural Support for Software-Defined Metadata Processing"],"prefix":"10.1145","author":[{"given":"Udit","family":"Dhawan","sequence":"first","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Catalin","family":"Hritcu","sequence":"additional","affiliation":[{"name":"INRIA, Paris, France"}]},{"given":"Raphael","family":"Rubin","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Nikos","family":"Vasilakis","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Silviu","family":"Chiricescu","sequence":"additional","affiliation":[{"name":"BAE Systems, Burlington, MA, USA"}]},{"given":"Jonathan M.","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"suffix":"Jr.","given":"Thomas F.","family":"Knight","sequence":"additional","affiliation":[{"name":"Ginkgo Bioworks, Boston, MA, USA"}]},{"given":"Benjamin C.","family":"Pierce","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Andre","family":"DeHon","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Digital Equipment Corporation","author":"Handbook Alpha Architecture","year":"1992","unstructured":"Alpha Architecture Handbook . Digital Equipment Corporation , 1992 . Alpha Architecture Handbook. Digital Equipment Corporation, 1992."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_4_1","first-page":"107","volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium","author":"Abadi M.","year":"2003","unstructured":"M. Abadi and C. Fournet . Access control based on execution history . In Proceedings of the 10th Annual Network and Distributed System Security Symposium , pages 107 -- 121 . The Internet Society , 2003 . M. Abadi and C. Fournet. Access control based on execution history. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 107--121. The Internet Society, 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.896913"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the Workshop on Graph Reduction","author":"Nikhil R. S.","year":"1986","unstructured":"Arvind, R. S. Nikhil , and K. K. Pingali . I-structures: Data structures for parallel computing . In Proceedings of the Workshop on Graph Reduction ( Springer-Verlag Lecture Notes in Computer Science 279), Sept. 1986 . Arvind, R. S. Nikhil, and K. K. Pingali. I-structures: Data structures for parallel computing. In Proceedings of the Workshop on Graph Reduction (Springer-Verlag Lecture Notes in Computer Science 279), Sept. 1986."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1554339.1554353"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54792-8_9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2013.6522302"},{"key":"e_1_3_2_1_12_1","series-title":"Wadsworth Statistics\/Probability Series","volume-title":"Graphical Methods for Data Analysis","author":"Chambers J. M.","year":"1983","unstructured":"J. M. Chambers , W. S. Cleveland , B. Kleiner , and P. A. Tukey . Graphical Methods for Data Analysis . Wadsworth Statistics\/Probability Series . Duxbury Press , 1983 . J. M. Chambers, W. S. Cleveland, B. Kleiner, and P. A. Tukey. Graphical Methods for Data Analysis. Wadsworth Statistics\/Probability Series. Duxbury Press, 1983."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181319"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.20"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.36"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382201"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321673"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/871656.859660"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1187976.1187977"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.26"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.224"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_23_1","first-page":"401","volume-title":"23rd USENIX Security Symposium","author":"Davi L.","year":"2014","unstructured":"L. Davi , A. Sadeghi , D. Lehmann , and F. Monrose . Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection . In 23rd USENIX Security Symposium , pages 401 -- 416 , 2014 . L. Davi, A. Sadeghi, D. Lehmann, and F. Monrose. Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection. In 23rd USENIX Security Symposium, pages 401--416, 2014."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354410.2355153"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346295"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435264.2435298"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694383"},{"key":"e_1_3_2_1_28_1","first-page":"75","volume-title":"7th Symposium on Operating Systems Design and Implementation","author":"Abadi M.","year":"2006","unstructured":"\u00da. Erlingsson, M. Abadi , M. Vrable , M. Budiu , and G. C. Necula . XFI: Software guards for system address spaces . In 7th Symposium on Operating Systems Design and Implementation , pages 75 -- 88 . USENIX Association , 2006 . \u00da. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In 7th Symposium on Operating Systems Design and Implementation, pages 75--88. USENIX Association, 2006."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1973.5009130"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835922"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.19"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1186736.1186737"},{"key":"e_1_3_2_1_34_1","first-page":"341","volume-title":"Proceedings of the Eighth Annual Symposium on Computer Architecture","author":"Houdek M. E.","year":"1981","unstructured":"M. E. Houdek , F. G. Soltis , and R. L. Hoffman . IBM System\/38 Support for Capability-based Addressing . In Proceedings of the Eighth Annual Symposium on Computer Architecture , pages 341 -- 348 , 1981 . M. E. Houdek, F. G. Soltis, and R. L. Hoffman. IBM System\/38 Support for Capability-based Addressing. In Proceedings of the Eighth Annual Symposium on Computer Architecture, pages 341--348, 1981."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.10"},{"key":"e_1_3_2_1_36_1","unstructured":"Introduction to Intel Memory Protection extensions. http:\/\/software.intel.com\/en-us\/articles\/introduction-to-intel-memory-protection-extensions. Accessed: 2014-05-24.  Introduction to Intel Memory Protection extensions. http:\/\/software.intel.com\/en-us\/articles\/introduction-to-intel-memory-protection-extensions. Accessed: 2014-05-24."},{"key":"e_1_3_2_1_37_1","volume-title":"Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Kang M. G.","year":"2011","unstructured":"M. G. Kang , S. McCamant , P. Poosankam , and D. Song . DTA++: Dynamic taint analysis with targeted control-flow propagation . In Network and Distributed System Security Symposium (NDSS). The Internet Society , 2011 . M. G. Kang, S. McCamant, P. Poosankam, and D. Song. DTA++: Dynamic taint analysis with targeted control-flow propagation. In Network and Distributed System Security Symposium (NDSS). The Internet Society, 2011."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669161"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_4"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516713"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2004.837992"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_43_1","volume-title":"Capability myths demolished. Version submitted to Usenix Security","author":"Miller M. S.","year":"2003","unstructured":"M. S. Miller , K.-P. Yee , and J. Shapiro . Capability myths demolished. Version submitted to Usenix Security 2003 ., 2003. M. S. Miller, K.-P. Yee, and J. Shapiro. Capability myths demolished. Version submitted to Usenix Security 2003., 2003."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/327010.327133"},{"key":"e_1_3_2_1_45_1","volume-title":"HPL 2009-85","author":"Muralimanohar N.","year":"2009","unstructured":"N. Muralimanohar , R. Balasubramonian , and N. P. Jouppi . CACTI 6.0: A tool to model large caches . HPL 2009-85 , HP Labs, Palo Alto, CA , April 2009 . Latest code release for CACTI 6 is 6.5. N. Muralimanohar, R. Balasubramonian, and N. P. Jouppi. CACTI 6.0: A tool to model large caches. HPL 2009-85, HP Labs, Palo Alto, CA, April 2009. Latest code release for CACTI 6 is 6.5."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2013.26"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544147"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_49_1","volume-title":"the Network and Distributed System Security Symposium (NDSS). The Internet Society","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. X. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In the Network and Distributed System Security Symposium (NDSS). The Internet Society , 2005 . J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In the Network and Distributed System Security Symposium (NDSS). The Internet Society, 2005."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_51_1","volume-title":"The B5700\/B6700 Series","author":"E. I. Organick. Computer System Organization","year":"1973","unstructured":"E. I. Organick. Computer System Organization : The B5700\/B6700 Series . Academic Press , 1973 . E. I. Organick. Computer System Organization: The B5700\/B6700 Series. Academic Press, 1973."},{"key":"e_1_3_2_1_52_1","first-page":"443","volume-title":"Proceedings of the 8th Annual Symposium on Computer Architecture, ISCA '81","author":"Patterson D. A.","year":"1981","unstructured":"D. A. Patterson and C. H. Sequin . RISC I: A Reduced Instruction Set VLSI Computer . In Proceedings of the 8th Annual Symposium on Computer Architecture, ISCA '81 , pages 443 -- 457 , 1981 . D. A. Patterson and C. H. Sequin. RISC I: A Reduced Instruction Set VLSI Computer. In Proceedings of the 8th Annual Symposium on Computer Architecture, ISCA '81, pages 443--457, 1981."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI)","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and W. S. Beebee , Jr . Enhancing Server Availability and Security Through Failure-Oblivious Computing . In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI) , December 2004 . M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee, Jr. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In Proceedings of the Symposium on Operating Systems Design and Implementation (OSDI), December 2004."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1978.tb02136.x"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2010.20"},{"key":"e_1_3_2_1_57_1","first-page":"159","volume-title":"Proc. NDSS","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. S. Lam . A Practical Dynamic Buffer Overflow Detector . In Proc. NDSS , pages 159 -- 169 , 2004 . O. Ruwase and M. S. Lam. A Practical Dynamic Buffer Overflow Detector. In Proc. NDSS, pages 159--169, 2004."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2009.30"},{"key":"e_1_3_2_1_61_1","first-page":"6","volume-title":"Proc. ICPP","author":"Smith B. J.","year":"1978","unstructured":"B. J. Smith . A pipelined, shared-resource MIMD computer. In Proc. ICPP , pages 6 -- 8 , 1978 . B. J. Smith. A pipelined, shared-resource MIMD computer. In Proc. ICPP, pages 6--8, 1978."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034675.2034688"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/17407.17379"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2008.4771782"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658637"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605429"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665740"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855757"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.44"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346191"}],"event":{"name":"ASPLOS '15: Architectural Support for Programming Languages and Operating Systems","location":"Istanbul Turkey","acronym":"ASPLOS '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2694344.2694383","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2694344.2694383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:12:20Z","timestamp":1750212740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2694344.2694383"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,14]]},"references-count":72,"alternative-id":["10.1145\/2694344.2694383","10.1145\/2694344"],"URL":"https:\/\/doi.org\/10.1145\/2694344.2694383","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2775054.2694383","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2786763.2694383","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,3,14]]},"assertion":[{"value":"2015-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}