{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:14Z","timestamp":1772164094032,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T00:00:00Z","timestamp":1521417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1617513"],"award-info":[{"award-number":["1617513"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,19]]},"DOI":"10.1145\/3173162.3173186","type":"proceedings-article","created":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T11:15:40Z","timestamp":1521717340000},"page":"519-534","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Sugar"],"prefix":"10.1145","author":[{"given":"Zhihao","family":"Yao","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Zongheng","family":"Ma","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Yingtong","family":"Liu","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Ardalan","family":"Amiri Sani","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Aparna","family":"Chandramowlishwaran","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081333.3081346"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541943"},{"key":"e_1_3_2_1_3_1","volume-title":"Glider: A GPU Library Driver for Improved System Security. Technical Report 2014--11--14","author":"Sani A. Amiri","year":"2014"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"e_1_3_2_1_5_1","volume-title":"Dune: Safe User-level Access to Privileged CPU Features Proc. USENIX OSDI.","author":"Belay A.","year":"2012"},{"key":"e_1_3_2_1_6_1","volume-title":"IX: A Protected Dataplane Operating System for High Throughput and Low Latency Proc. USENIX OSDI.","author":"Belay A."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500727.2500737"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2013.41"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. USENIX ATC.","author":"Boyd-Wickizer S."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.4"},{"key":"e_1_3_2_1_11_1","volume-title":"Modeling and Kinematic Analysis of Industrial Robots in WebGL Interface IEEE International Conference on Technology for Education.","author":"Dey U."},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. USENIX OSDI.","author":"Douceur J. R."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522720"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224076"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. USENIX Mach Symposium.","author":"Forin A."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346303"},{"key":"e_1_3_2_1_17_1","volume-title":"An Architecture for Device Drivers Executing As User-Level Tasks Proc. USENIX MACH III Symposium.","author":"Golub David B."},{"key":"e_1_3_2_1_18_1","volume":"201","author":"Howell J.","journal-title":"J. Douceur."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"B. Leslie P. Chubb N. Fitzroy-Dale S. G\u00f6tz C. Gray L. Macpherson D. Potts Y. Shen K. Elphinstone and G. Heiser. 2005. User-Level Device Drivers: Achieved Performance. Journal of Computer Science and Technology Vol. 20 5 (2005).  B. Leslie P. Chubb N. Fitzroy-Dale S. G\u00f6tz C. Gray L. Macpherson D. Potts Y. Shen K. Elphinstone and G. Heiser. 2005. User-Level Device Drivers: Achieved Performance. Journal of Computer Science and Technology Vol. 20 5 (2005).","DOI":"10.1007\/s11390-005-0654-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037710"},{"key":"e_1_3_2_1_21_1","unstructured":"J. LeVasseur V. Uhlig J. Stoess and S. G\u00f6tz. 2004. Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines Proc. USENIX OSDI.   J. LeVasseur V. Uhlig J. Stoess and S. G\u00f6tz. 2004. Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines Proc. USENIX OSDI."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043577"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_1_24_1","volume-title":"Arrakis: The Operating System is the Control Plane Proc. USENIX OSDI.","author":"Peter S.","year":"2014"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950399"},{"key":"e_1_3_2_1_26_1","volume-title":"User Level IPC and Device Management in the Raven Kernel USENIX Microkernels and Other Kernel Architectures Symposium.","author":"Ritchie D. S."},{"key":"e_1_3_2_1_27_1","volume-title":"Securing Embedded User Interfaces: Android and Beyond Proc. USENIX Security Symposium.","author":"Roesner F."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"A. S. Rose and P. W. Hildebrand. 2015. NGL Viewer: a web application for molecular visualization. Nucleic Acids Res (2015).  A. S. Rose and P. W. Hildebrand. 2015. NGL Viewer: a web application for molecular visualization. Nucleic Acids Res (2015).","DOI":"10.1093\/nar\/gkv402"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium.","author":"Shekhar S."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945466"},{"key":"e_1_3_2_1_31_1","volume-title":"Trust and Protection in the Illinois Browser Operating System Proc. USENIX OSDI.","author":"Tang S."},{"key":"e_1_3_2_1_32_1","unstructured":"K. Tian Y. Dong and D. Cowperthwaite. 2014. A Full GPU Virtualization Solution with Mediated Pass-Through Proc. USENIX ATC.   K. Tian Y. Dong and D. Cowperthwaite. 2014. A Full GPU Virtualization Solution with Mediated Pass-Through Proc. USENIX ATC."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_34_1","volume-title":"SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques Proc. USENIX OSDI.","author":"Zhou F."}],"event":{"name":"ASPLOS '18: Architectural Support for Programming Languages and Operating Systems","location":"Williamsburg VA USA","acronym":"ASPLOS '18","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173162.3173186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173162.3173186","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173162.3173186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:02:50Z","timestamp":1750201370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173162.3173186"}},"subtitle":["Secure GPU Acceleration in Web Browsers"],"short-title":[],"issued":{"date-parts":[[2018,3,19]]},"references-count":34,"alternative-id":["10.1145\/3173162.3173186","10.1145\/3173162"],"URL":"https:\/\/doi.org\/10.1145\/3173162.3173186","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3296957.3173186","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2018,3,19]]},"assertion":[{"value":"2018-03-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}