{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:14:51Z","timestamp":1770282891892,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"US National Science Foundation","award":["1117065,1421910,1464155"],"award-info":[{"award-number":["1117065,1421910,1464155"]}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["FP7-617805"],"award-info":[{"award-number":["FP7-617805"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,24]]},"DOI":"10.1145\/2976749.2978327","type":"proceedings-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T12:46:35Z","timestamp":1477399595000},"page":"393-405","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Enforcing Least Privilege Memory Views for Multithreaded Applications"],"prefix":"10.1145","author":[{"given":"Terry Ching-Hsiang","family":"Hsu","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Kevin","family":"Hoffman","sequence":"additional","affiliation":[{"name":"eFolder Inc., Atlanta, GA, USA"}]},{"given":"Patrick","family":"Eugster","sequence":"additional","affiliation":[{"name":"Purdue University and TU Darmstadt, West Lafayette, IN, USA"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP '13","author":"Anati I.","year":"2013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993540"},{"key":"e_1_3_2_1_4_1","unstructured":"AppArmor. https:\/\/wiki.ubuntu.com\/AppArmor.  AppArmor. https:\/\/wiki.ubuntu.com\/AppArmor."},{"key":"e_1_3_2_1_5_1","first-page":"335","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12","author":"Belay A.","year":"2012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379232"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_8_1","first-page":"309","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08","author":"Bittau A.","year":"2008"},{"key":"e_1_3_2_1_9_1","first-page":"5","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Brumley D.","year":"2004"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353196"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342821.2342833"},{"key":"e_1_3_2_1_12_1","unstructured":"Cherokee Web Server. http:\/\/cherokee-project.com\/.  Cherokee Web Server. http:\/\/cherokee-project.com\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694386"},{"key":"e_1_3_2_1_14_1","unstructured":"Multiprocess Firefox. https:\/\/developer.mozilla.org\/en-US\/Firefox\/Multiprocess_Firefox.  Multiprocess Firefox. https:\/\/developer.mozilla.org\/en-US\/Firefox\/Multiprocess_Firefox."},{"key":"e_1_3_2_1_15_1","unstructured":"GDB\n  : The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/.  GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362833"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488370"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048091"},{"key":"e_1_3_2_1_19_1","unstructured":"Interesting stats based on Alexa Top 1 000 000 Sites. http:\/\/httparchive.org\/interesting.php.  Interesting stats based on Alexa Top 1 000 000 Sites. http:\/\/httparchive.org\/interesting.php."},{"key":"e_1_3_2_1_20_1","first-page":"177","volume-title":"Automatic Generation of Data-Oriented Exploits. In 24th USENIX Security Symposium (USENIX Security 15)","author":"Hu H.","year":"2015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254812"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665726"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660331"},{"key":"e_1_3_2_1_25_1","unstructured":"Linux Test Project. http:\/\/sourceforge.net\/projects\/ltp\/.  Linux Test Project. http:\/\/sourceforge.net\/projects\/ltp\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium -","volume":"15","author":"McCamant S.","year":"2006"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_30_1","volume-title":"Joe-E: A Security-Oriented Subset of Java. In Network and Distributed Systems Symposium, NDSS 2010","author":"Mettler A.","year":"2010"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_32_1","first-page":"190","volume-title":"1st Summit on Advances in Programming Languages (SNAPL 2015), volume 32 of Leibniz International Proceedings in Informatics (LIPIcs)","author":"Nagarakatte S.","year":"2015"},{"key":"e_1_3_2_1_33_1","first-page":"16","volume-title":"Proceedings of the 12th Conference on USENIX Security Symposium -","volume":"12","author":"Provos N.","year":"2003"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542484"},{"issue":"9","key":"e_1_3_2_1_35_1","first-page":"1278","volume":"63","author":"Saltzer J.","year":"1975","journal-title":"The protection of information in computer systems. Proceedings of the IEEE"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"key":"e_1_3_2_1_37_1","unstructured":"Same-origin Policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy.  Same-origin Policy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy."},{"key":"e_1_3_2_1_38_1","unstructured":"SECure COMPuting with filters. https:\/\/www.kernel.org\/doc\/Documentation\/prctl\/seccomp_filter.txt.  SECure COMPuting with filters. https:\/\/www.kernel.org\/doc\/Documentation\/prctl\/seccomp_filter.txt."},{"key":"e_1_3_2_1_39_1","unstructured":"SELinux. https:\/\/wiki.centos.org\/HowTos\/SELinux.  SELinux. https:\/\/wiki.centos.org\/HowTos\/SELinux."},{"issue":"3","key":"e_1_3_2_1_40_1","first-page":"1","volume":"15","author":"Strackx R.","year":"2015","journal-title":"Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Transactions on Security and Safety"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382200"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_43_1","unstructured":"Valgrind. http:\/\/valgrind.org\/.  Valgrind. http:\/\/valgrind.org\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665741"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993478.1993496"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_47_1","first-page":"361","volume-title":"Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. In 2015 USENIX Annual Technical Conference (USENIX ATC 15)","author":"Wang J.","year":"2015"},{"key":"e_1_3_2_1_48_1","first-page":"29","volume":"2010","author":"Watson R. N.","year":"2010","journal-title":"Capsicum: Practical Capabilities for UNIX. In USENIX Security"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665740"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_51_1","first-page":"19","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation -","volume":"7","author":"Zeldovich N.","year":"2006"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855757"}],"event":{"name":"CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security","location":"Vienna Austria","acronym":"CCS'16","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978327","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2976749.2978327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:17Z","timestamp":1750222577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2976749.2978327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":52,"alternative-id":["10.1145\/2976749.2978327","10.1145\/2976749"],"URL":"https:\/\/doi.org\/10.1145\/2976749.2978327","relation":{},"subject":[],"published":{"date-parts":[[2016,10,24]]},"assertion":[{"value":"2016-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}