{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:07:22Z","timestamp":1750306042423,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,7]],"date-time":"2017-06-07T00:00:00Z","timestamp":1496793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1413920, CNS-1413996"],"award-info":[{"award-number":["CNS-1413920, CNS-1413996"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,7]]},"DOI":"10.1145\/3078861.3078882","type":"proceedings-article","created":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T19:31:40Z","timestamp":1496259100000},"page":"133-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Leveraging Hardware Isolation for Process Level Access Control &amp; Authentication"],"prefix":"10.1145","author":[{"given":"Syed Kamran","family":"Haider","sequence":"first","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Hamza","family":"Omar","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Ilia","family":"Lebedev","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Srinivas","family":"Devadas","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Marten","family":"van Dijk","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,7]]},"reference":[{"volume-title":"USENIX Security Symposium.","author":"Akritidis Periklis","key":"e_1_3_2_1_1_1","unstructured":"Periklis Akritidis , Manuel Costa , Miguel Castro , and Steven Hand . Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors .. In USENIX Security Symposium. Periklis Akritidis, Manuel Costa, Miguel Castro, and Steven Hand. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.. In USENIX Security Symposium."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11379-1_3"},{"volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation.","author":"Castro Miguel","key":"e_1_3_2_1_3_1","unstructured":"Miguel Castro , Manuel Costa , and Tim Harris . Securing software by enforcing data-flow integrity . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation. Miguel Castro, Manuel Costa, and Tim Harris. Securing software by enforcing data-flow integrity. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation."},{"volume-title":"High Performance Computer Architecture (HPCA), 2010 IEEE 16th International Symposium on. IEEE, 1--12","author":"Champagne David","key":"e_1_3_2_1_4_1","unstructured":"David Champagne and Ruby B. Lee . 2010. Scalable architectural support for trusted software . In High Performance Computer Architecture (HPCA), 2010 IEEE 16th International Symposium on. IEEE, 1--12 . David Champagne and Ruby B. Lee. 2010. Scalable architectural support for trusted software. In High Performance Computer Architecture (HPCA), 2010 IEEE 16th International Symposium on. IEEE, 1--12."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394608.1382153"},{"key":"e_1_3_2_1_6_1","volume-title":"Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Costan Victor","year":"2016","unstructured":"Victor Costan , Ilia Lebedev , and Srinivas Devadas . 2016 . Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan Victor Costan, Ilia Lebedev, and Srinivas Devadas. 2016. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 857--874. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/costan"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353534.1346295"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382536.2382540"},{"volume-title":"Defense and Security","author":"Gamboa Hugo","key":"e_1_3_2_1_11_1","unstructured":"Hugo Gamboa and Ana Fred . 2004. A behavioral biometric system based on human-computer interaction . In Defense and Security . International Society for Optics and Photonics , 381--392. Hugo Gamboa and Ana Fred. 2004. A behavioral biometric system based on human-computer interaction. In Defense and Security. International Society for Optics and Photonics, 381--392."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2013.2271537"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy.","author":"Lie D.","key":"e_1_3_2_1_13_1","unstructured":"D. Lie , J. Mitchell , C. Thekkath , and M. Horwitz . 2003. Specifying and Verifying Hardware for Tamper-Resistant Software . In Proceedings of the IEEE Symposium on Security and Privacy. D. Lie, J. Mitchell, C. Thekkath, and M. Horwitz. 2003. Specifying and Verifying Hardware for Tamper-Resistant Software. In Proceedings of the IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945463"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379237"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516692"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"volume-title":"Proceedings of the 39th International Symposium on Computer Architecture.","author":"Nagarakatte Santosh","key":"e_1_3_2_1_18_1","unstructured":"Santosh Nagarakatte , Milo Martin , and Stephan A. Zdancewic . 2012. Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety . In Proceedings of the 39th International Symposium on Computer Architecture. Santosh Nagarakatte, Milo Martin, and Stephan A. Zdancewic. 2012. Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety. In Proceedings of the 39th International Symposium on Computer Architecture."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065892"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Information Security. Springer, 99--113","author":"Shi Elaine","year":"2010","unstructured":"Elaine Shi , Yuan Niu , Markus Jakobsson , and Richard Chow . 2010 . Implicit authentication through learning user behavior . In International Conference on Information Security. Springer, 99--113 . Elaine Shi, Yuan Niu, Markus Jakobsson, and Richard Chow. 2010. Implicit authentication through learning user behavior. In International Conference on Information Security. Springer, 99--113."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/782814.782838"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.22"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665740"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Larry Zhu Sam Hartman and Karthik Jaganathan. 2005. The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2. (2005).  Larry Zhu Sam Hartman and Karthik Jaganathan. 2005. The Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Mechanism: Version 2. (2005).","DOI":"10.17487\/rfc4121"}],"event":{"name":"SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT'17"},"container-title":["Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078882","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078882","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3078861.3078882","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:09Z","timestamp":1750215789000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3078861.3078882"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,7]]},"references-count":26,"alternative-id":["10.1145\/3078861.3078882","10.1145\/3078861"],"URL":"https:\/\/doi.org\/10.1145\/3078861.3078882","relation":{},"subject":[],"published":{"date-parts":[[2017,6,7]]},"assertion":[{"value":"2017-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}