{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:37:52Z","timestamp":1773247072428,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Defense Advanced Research Projects Agency (DARPA)","award":["N66001-13-2-4040"],"award-info":[{"award-number":["N66001-13-2-4040"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1408880"],"award-info":[{"award-number":["CNS-1408880"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1624126"],"award-info":[{"award-number":["CNS-1624126"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1624124"],"award-info":[{"award-number":["CCF-1624124"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134066","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"2359-2371","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":56,"title":["PtrSplit"],"prefix":"10.1145","author":[{"given":"Shen","family":"Liu","sequence":"first","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Gang","family":"Tan","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_2_1","unstructured":"David M. Beazley. 1997. SWIG Users Manual: Version 1.1."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. 309--322","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: splitting applications into reduced-privilege compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. 309--322."},{"key":"e_1_3_2_2_4_1","unstructured":"Don Box. 1997. Essential COM. Addison-Wesley Professional."},{"key":"e_1_3_2_2_5_1","volume-title":"Privtrans: Automatically Partitioning Programs for Privilege Separation. In 13th Usenix Security Symposium. 57--72","author":"Brumley David","year":"2004","unstructured":"David Brumley and Dawn Song. 2004. Privtrans: Automatically Partitioning Programs for Privilege Separation. In 13th Usenix Security Symposium. 57--72."},{"key":"e_1_3_2_2_6_1","volume-title":"CUP: Comprehensive User-Space Protection for C\/C++.","author":"Burow Nathan","year":"2017","unstructured":"Nathan Burow, Derrick McKee, Scott A. Carr, and Mathias Payer. 2017. CUP: Comprehensive User-Space Protection for C\/C++. (2017). https:\/\/arxiv.org\/abs\/ 1704.05004v1."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294295"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134309"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_2_12_1","volume-title":"GRPC: A high performance, open-source universal RPC framework","author":"Google Inc.","unstructured":"Google Inc. GRPC: A high performance, open-source universal RPC framework. Google Inc. http:\/\/www.grpc.io."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2883591.2883601"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","unstructured":"Gregory J.Duck Roland H. C. Yap and Lorenzo Cavallaro. 2017. Stack Bounds Protection with Low Fat Pointers. In NDSS. 10.14722\/ndss.2017.23287","DOI":"10.14722\/ndss.2017.23287"},{"key":"e_1_3_2_2_16_1","volume-title":"USENIX Annual Technical Conference, FREENIX track. 273--284","author":"Kilpatrick Douglas","year":"2003","unstructured":"Douglas Kilpatrick. 2003. Privman: A library for partitioning applications. In USENIX Annual Technical Conference, FREENIX track. 273--284."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250766"},{"key":"e_1_3_2_2_19_1","unstructured":"D. Liang and M. J. Harrold. 1998. Slicing objects using system dependence graphs. In ICSM. 358--367."},{"key":"e_1_3_2_2_20_1","volume-title":"Glamdring: Automatic Application Partitioning for Intel SGX. In USENIX Annual Technical Conference (ATC). 285--298","author":"Lind Joshua","unstructured":"Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David M. Eyers, R\u00fcdiger Kapitza, Christof Fetzer, and Peter R. Pietzuch. 2017. Glamdring: Automatic Application Partitioning for Intel SGX. In USENIX Annual Technical Conference (ATC). 285--298."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_20"},{"key":"e_1_3_2_2_23_1","volume-title":"Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering Methodology 9 (Oct","author":"Myers Andrew","year":"2000","unstructured":"Andrew Myers and Barbara Liskov. 2000. Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering Methodology 9 (Oct. 2000), 410--442. Issue 4."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Santosh Nagarakatte Jianzhou Zhao Milo M. K. Martin and Steve Zdancewic. 2009. SoftBound: highly compatible and complete spatial memory safety for C. In PLDI. 245--258.","DOI":"10.1145\/1543135.1542504"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_2_26_1","volume-title":"Modular Control Flow Integrity. In ACM Conference on Programming Language Design and Implementation (PLDI). 577--587","author":"Niu Ben","year":"2014","unstructured":"Ben Niu and Gang Tan. 2014. Modular Control Flow Integrity. In ACM Conference on Programming Language Design and Implementation (PLDI). 577--587."},{"key":"e_1_3_2_2_27_1","unstructured":"Oracle. Introduction to TI-RPC. Oracle. https:\/\/docs.oracle.com\/cd\/E18752_01\/ html\/816--1435\/rpcintro-46812.html."},{"key":"e_1_3_2_2_28_1","volume-title":"12th Usenix Security Symposium. 231--242","author":"Provos Niels","year":"2003","unstructured":"Niels Provos, Markus Friedl, and Peter Honeyman. 2003. Preventing privilege escalation. In 12th Usenix Security Symposium. 231--242."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519090"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884817"},{"key":"e_1_3_2_2_31_1","volume-title":"Capsicum: Practical Capabilities for UNIX. In 19th Usenix Security Symposium. 29--46","author":"Watson Robert","year":"2010","unstructured":"Robert Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway. 2010. Capsicum: Practical Capabilities for UNIX. In 19th Usenix Security Symposium. 29--46."},{"key":"e_1_3_2_2_32_1","volume-title":"Jun Sun and Jin Song Dong","author":"Yongzheng Wu Yang Liu","year":"2013","unstructured":"Yang Liu Yongzheng Wu, Jun Sun and Jin Song Dong. 2013. Automatically partition software into least privilege components using dynamic data dependency analysis. In ASE. 323--333."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"},{"key":"e_1_3_2_2_34_1","volume-title":"Making Information Flow Explicit in HiStar. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 263--278","author":"Zeldovich Nickolai","year":"2006","unstructured":"Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazi\u00e8res. 2006. Making Information Flow Explicit in HiStar. In USENIX Symposium on Operating Systems Design and Implementation (OSDI). 263--278."},{"key":"e_1_3_2_2_35_1","volume-title":"IEEE Symposium on Security and Privacy (S&P). 236--250","author":"Zheng Lantian","year":"2003","unstructured":"Lantian Zheng, Stephen Chong, Andrew Myers, and Steve Zdancewic. 2003. Using Replication and Partitioning to Build Secure Distributed Systems. In IEEE Symposium on Security and Privacy (S&P). 236--250."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134066","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134066","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134066","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134066"}},"subtitle":["Supporting General Pointers in Automatic Program Partitioning"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":34,"alternative-id":["10.1145\/3133956.3134066","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134066","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}