{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:29:00Z","timestamp":1766449740373,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,13]],"date-time":"2018-03-13T00:00:00Z","timestamp":1520899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1422332"],"award-info":[{"award-number":["1422332"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,13]]},"DOI":"10.1145\/3176258.3176330","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"248-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Fidelius Charm"],"prefix":"10.1145","author":[{"given":"Hussain M. J.","family":"Almohri","sequence":"first","affiliation":[{"name":"Kuwait University &amp; University of Virginia, Kuwait, Kuwait"}]},{"given":"David","family":"Evans","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.29"},{"key":"e_1_3_2_1_2_1","first-page":"45","volume-title":"Proceedings of the Third Symposium on Operating Systems Design and Implementation","author":"Banga G.","year":"1999","unstructured":"G. Banga , P. Druschel , and J. C. Mogul . Resource containers: A new facility for resource management in server systems . In Proceedings of the Third Symposium on Operating Systems Design and Implementation , pages 45 -- 58 , 1999 . G. Banga, P. Druschel, and J. C. Mogul. Resource containers: A new facility for resource management in server systems. In Proceedings of the Third Symposium on Operating Systems Design and Implementation, pages 45--58, 1999."},{"key":"e_1_3_2_1_3_1","first-page":"309","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08","author":"Bittau A.","year":"2008","unstructured":"A. Bittau , P. Marchenko , M. Handley , and B. Karp . Wedge: Splitting applications into reduced-privilege compartments . In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08 , pages 309 -- 322 , 2008 . A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: Splitting applications into reduced-privilege compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI'08, pages 309--322, 2008."},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Security Symposium","author":"Brumley D.","year":"2004","unstructured":"D. Brumley and D. X. Song . Privtrans: Automatically partitioning programs for privilege separation . In USENIX Security Symposium , 2004 . D. Brumley and D. X. Song. Privtrans: Automatically partitioning programs for privilege separation. In USENIX Security Symposium, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052983"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/195792.195795"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.12"},{"key":"e_1_3_2_1_8_1","first-page":"293","volume-title":"USENIX 2008 Annual Technical Conference, ATC'08","author":"Ford B.","year":"2008","unstructured":"B. Ford and R. Cox . Vx32: Lightweight user-level sandboxing on the x86 . In USENIX 2008 Annual Technical Conference, ATC'08 , pages 293 -- 306 , Berkeley, CA, USA , 2008 . USENIX Association. B. Ford and R. Cox. Vx32: Lightweight user-level sandboxing on the x86. In USENIX 2008 Annual Technical Conference, ATC'08, pages 293--306, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699107"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813611"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872366"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_1_14_1","first-page":"49","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI'16","author":"Litton J.","year":"2016","unstructured":"J. Litton , A. Vahldiek-Oberwagner , E. Elnikety , D. Garg , B. Bhattacharjee , and P. Druschel . Light-weight contexts: An os abstraction for safety and performance . In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI'16 , pages 49 -- 64 , Berkeley, CA, USA , 2016 . USENIX Association. J. Litton, A. Vahldiek-Oberwagner, E. Elnikety, D. Garg, B. Bhattacharjee, and P. Druschel. Light-weight contexts: An os abstraction for safety and performance. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI'16, pages 49--64, Berkeley, CA, USA, 2016. USENIX Association."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45719-2_20"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043568"},{"key":"e_1_3_2_1_18_1","volume-title":"USENIX Security Symposium","author":"Pattuk E.","year":"2014","unstructured":"E. Pattuk , M. Kantarcioglu , Z. Lin , and H. Ulusoy . Preventing cryptographic key leakage in cloud virtual machines . In USENIX Security Symposium , 2014 . E. Pattuk, M. Kantarcioglu, Z. Lin, and H. Ulusoy. Preventing cryptographic key leakage in cloud virtual machines. In USENIX Security Symposium, 2014."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720286"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium","author":"Provos N.","year":"2003","unstructured":"N. Provos , M. Friedl , and P. Honeyman . Preventing privilege escalation . In USENIX Security Symposium , 2003 . N. Provos, M. Friedl, and P. Honeyman. Preventing privilege escalation. In USENIX Security Symposium, 2003."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 45th ACM SIGPLAN Symposium on Principles of Programming Languages, POPL 2018","author":"Ralf Jung R. K. D. D.","year":"2018","unstructured":"R. K. D. D. Ralf Jung , Jacques-Henri Jourdan . RustBelt : Securing the foundations of the rust programming language . In Proceedings of the 45th ACM SIGPLAN Symposium on Principles of Programming Languages, POPL 2018 , New York, NY, USA , 2018 . ACM. R. K. D. D. Ralf Jung, Jacques-Henri Jourdan. RustBelt: Securing the foundations of the rust programming language. In Proceedings of the 45th ACM SIGPLAN Symposium on Principles of Programming Languages, POPL 2018, New York, NY, USA, 2018. ACM."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSIT.1975.6498831"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908113"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX Annual Technical Conference","author":"Wang J.","year":"2015","unstructured":"J. Wang , X. Xiong , and P. Liu . Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications . In USENIX Annual Technical Conference , 2015 . J. Wang, X. Xiong, and P. Liu. Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications. In USENIX Annual Technical Conference, 2015."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_49"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"}],"event":{"name":"CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Tempe AZ USA","acronym":"CODASPY '18"},"container-title":["Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176330","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176330","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3176258.3176330","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176258.3176330"}},"subtitle":["Isolating Unsafe Rust Code"],"short-title":[],"issued":{"date-parts":[[2018,3,13]]},"references-count":30,"alternative-id":["10.1145\/3176258.3176330","10.1145\/3176258"],"URL":"https:\/\/doi.org\/10.1145\/3176258.3176330","relation":{},"subject":[],"published":{"date-parts":[[2018,3,13]]},"assertion":[{"value":"2018-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}