{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T19:54:30Z","timestamp":1769284470484,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133993","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"907-922","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Generic Semantic Security against a Kleptographic Adversary"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Russell","sequence":"first","affiliation":[{"name":"University of Connecticut, Storrs, CT, USA"}]},{"given":"Qiang","family":"Tang","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, NJ, USA"}]},{"given":"Moti","family":"Yung","sequence":"additional","affiliation":[{"name":"Snap.Inc &amp; Columbia University, New York City, NY, USA"}]},{"given":"Hong-Sheng","family":"Zhou","sequence":"additional","affiliation":[{"name":"Virginia Commonwealth University, Richmand, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813635"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--46803--6_21"},{"key":"e_1_3_2_2_3_1","volume-title":"Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks ACM CCS 15, bibfieldeditor","author":"Bellare Mihir","unstructured":"Mihir Bellare, Joseph Jaeger, and Daniel Kane. 2015. Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks ACM CCS 15, bibfieldeditorIndrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, 1431--1440."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--44371--2_1"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53887--6_31"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--48116--5_28"},{"key":"e_1_3_2_2_7_1","volume-title":"Subliminal-Free Authentication and Signature (Extended Abstract) EUROCRYPT'88 (LNCS), bibfieldeditor","author":"Desmedt Yvo","unstructured":"Yvo Desmedt. 1988. Subliminal-Free Authentication and Signature (Extended Abstract) EUROCRYPT'88 (LNCS), bibfieldeditorC. G. G\u00fcnther (Ed.), Vol. Vol. 330. Springer, Heidelberg, 23--33."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_29"},{"key":"e_1_3_2_2_9_1","volume-title":"shownotehttps:\/\/www.docker.com\/","author":"Docker.Inc. 2013. Docker.","year":"2013","unstructured":"Docker.Inc. 2013. Docker. (2013). shownotehttps:\/\/www.docker.com\/."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--46800--5_5"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53018--4_13"},{"key":"e_1_3_2_2_12_1","unstructured":"Carl M. Ellison Roger A. Golliver Howard C. Herbert Derrick C. Lin Francis X. McKeen Gilbert Neiger Ken Reneris James A. Sutton Shreekant S. Thakkar and Millind Mittal 2000. Controlling access to multiple isolated memories in an isolated execution environment Controlling access to multiple isolated memories in an isolated execution environment. (2000). shownotehttps:\/\/www.google.com\/patents\/US6678825."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_6"},{"key":"e_1_3_2_2_14_1","unstructured":"Immunix 1998. AppArmor. (1998)."},{"key":"e_1_3_2_2_15_1","volume-title":"37th ACM STOC, bibfieldeditor","author":"Lepinski Matt","unstructured":"Matt Lepinski, Silvio Micali, and abhi shelat. 2005. Collusion-free protocols. In 37th ACM STOC, bibfieldeditorHarold N. Gabow and Ronald Fagin (Eds.). ACM Press, 543--552."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--46803--6_22"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016998.1017000"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--53890--6_2"},{"key":"e_1_3_2_2_21_1","volume-title":"The Prisoners' Problem and the Subliminal Channel. CRYPTO'83","author":"Simmons Gustavus J.","year":"1983","unstructured":"Gustavus J. Simmons. 1983. The Prisoners' Problem and the Subliminal Channel. CRYPTO'83, bibfieldeditorDavid Chaum (Ed.). Plenum Press, New York, USA, 51--67."},{"key":"e_1_3_2_2_22_1","volume-title":"CRYPTO'85 (LNCS), bibfieldeditor","author":"Simmons Gustavus J.","unstructured":"Gustavus J. Simmons. 1986. A Secure Subliminal Channel (?). In CRYPTO'85 (LNCS), bibfieldeditorHugh C. Williams (Ed.), Vol. Vol. 218. Springer, Heidelberg, 33--41."},{"key":"e_1_3_2_2_23_1","volume-title":"shownotehttp:\/\/tomoyo.osdn.jp\/","author":"NTT Data Corporation Tomoyo Linux. 2009. Tomoyo.","year":"2009","unstructured":"NTT Data Corporation Tomoyo Linux. 2009. Tomoyo. (2009). shownotehttp:\/\/tomoyo.osdn.jp\/."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414484"},{"key":"e_1_3_2_2_25_1","unstructured":"Wikipedia. 2016. Software Guard Extensions. (2016). shownotehttps:\/\/en.wikipedia.org\/wiki\/Software_Guard_Extensions."},{"key":"e_1_3_2_2_26_1","volume-title":"The Dark Side of \"Black-Box\" Cryptography, or: Should We Trust Capstone? CRYPTO'96 (LNCS), bibfieldeditor","author":"Young Adam","unstructured":"Adam Young and Moti Yung 1996. The Dark Side of \"Black-Box\" Cryptography, or: Should We Trust Capstone? CRYPTO'96 (LNCS), bibfieldeditorNeal Koblitz (Ed.), Vol. Vol. 1109. Springer, Heidelberg, 89--103."},{"key":"e_1_3_2_2_27_1","volume-title":"Kleptography: Using Cryptography Against Cryptography EUROCRYPT'97 (LNCS), bibfieldeditor","author":"Young Adam","unstructured":"Adam Young and Moti Yung 1997. Kleptography: Using Cryptography Against Cryptography EUROCRYPT'97 (LNCS), bibfieldeditorWalter Fumy (Ed.), Vol. Vol. 1233. Springer, Heidelberg, 62--74. endthebibliography"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133993","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133993","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133993"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":25,"alternative-id":["10.1145\/3133956.3133993","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133993","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}