{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:33Z","timestamp":1750221273823,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,28]],"date-time":"2017-10-28T00:00:00Z","timestamp":1509148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Natural Science Foundation of China","award":["61772308"],"award-info":[{"award-number":["61772308"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,28]]},"DOI":"10.1145\/3152701.3152703","type":"proceedings-article","created":{"date-parts":[[2017,11,27]],"date-time":"2017-11-27T18:38:25Z","timestamp":1511807905000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["vCFI"],"prefix":"10.1145","author":[{"given":"Yuan","family":"Li","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2017,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978358"},{"key":"e_1_3_2_1_3_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Victor Costan","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016 . Intel SGX Explained . IACR Cryptology ePrint Archive 2016 (2016), 86 . Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptology ePrint Archive 2016 (2016), 86.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_4_1","volume-title":"Intel\u00ae SGX for Dummies (Intel\u00ae SGX Design Objectives). retrieved Sep 3","author":"Matthew Hoekstra","year":"2014","unstructured":"Matthew Hoekstra . 2014. Intel\u00ae SGX for Dummies (Intel\u00ae SGX Design Objectives). retrieved Sep 3 ( 2014 ), 4. Matthew Hoekstra. 2014. Intel\u00ae SGX for Dummies (Intel\u00ae SGX Design Objectives). retrieved Sep 3 (2014), 4."},{"key":"e_1_3_2_1_5_1","first-page":"00000","article-title":"Code-Pointer Integrity","volume":"14","author":"Kuznetsov","year":"2014","unstructured":"Kuznetsov , Volodymyr. 2014 . Code-Pointer Integrity . In OSDI , Vol. 14. 00000 . et al. Kuznetsov, Volodymyr. 2014. Code-Pointer Integrity. In OSDI, Vol. 14. 00000.","journal-title":"OSDI"},{"key":"e_1_3_2_1_6_1","volume-title":"Exploring control flow guard in windows 10.","author":"Jack Tang","year":"2015","unstructured":"Jack Tang and Trend Micro Threat Solution Team. 2015. Exploring control flow guard in windows 10. Available at http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/exploring-control-flow-guard-in-windows-10 ( 2015 ). Jack Tang and Trend Micro Threat Solution Team. 2015. Exploring control flow guard in windows 10. Available at http:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/exploring-control-flow-guard-in-windows-10 (2015)."}],"event":{"name":"SOSP '17: ACM SIGOPS 26th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"],"location":"Shanghai China","acronym":"SOSP '17"},"container-title":["Proceedings of the 2nd Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152703","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152701.3152703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:09Z","timestamp":1750212669000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152701.3152703"}},"subtitle":["Visible Control Flow Integrity for Cloud Tenants"],"short-title":[],"issued":{"date-parts":[[2017,10,28]]},"references-count":6,"alternative-id":["10.1145\/3152701.3152703","10.1145\/3152701"],"URL":"https:\/\/doi.org\/10.1145\/3152701.3152703","relation":{},"subject":[],"published":{"date-parts":[[2017,10,28]]},"assertion":[{"value":"2017-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}