{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:17:35Z","timestamp":1755926255341,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1617513, 1513783"],"award-info":[{"award-number":["1617513, 1513783"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-17-1-2513"],"award-info":[{"award-number":["N00014-17-1-2513"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243772","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1455-1469","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Milkomeda"],"prefix":"10.1145","author":[{"given":"Zhihao","family":"Yao","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Saeed","family":"Mirzamohammadi","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Ardalan","family":"Amiri Sani","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL &amp; Purdue University, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_2_1_1","DOI":"10.1145\/1102120.1102165"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_2_1","DOI":"10.1145\/3081333.3081346"},{"key":"e_1_3_2_2_3_1","volume-title":"Glider: A GPU Library Driver for Improved System Security. Technical Report 2014--11--14","author":"Amiri Sani A.","year":"2014","unstructured":"A. Amiri Sani , L. Zhong , and D. S. Wallach . 2014 . Glider: A GPU Library Driver for Improved System Security. Technical Report 2014--11--14 , Rice University ( 2014). A. Amiri Sani, L. Zhong, and D. S. Wallach. 2014. Glider: A GPU Library Driver for Improved System Security. Technical Report 2014--11--14, Rice University (2014)."},{"unstructured":"ARM. 2007. Architecture Reference Manual ARMv7-A and ARMv7-R edition. ARM DDI Vol. 0406A (2007).  ARM. 2007. Architecture Reference Manual ARMv7-A and ARMv7-R edition. ARM DDI Vol. 0406A (2007).","key":"e_1_3_2_2_4_1"},{"unstructured":"ARM. 2013. Architecture Reference Manual ARMv8 for ARMv8-A architecture profile. ARM DDI Vol. 0487A.a (ID090413) (2013).  ARM. 2013. Architecture Reference Manual ARMv8 for ARMv8-A architecture profile. ARM DDI Vol. 0487A.a (ID090413) (2013).","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_6_1","volume-title":"Boxify: Full-fledged App Sandboxing for Stock Android Proc. USENIX Security Symposium.","author":"Backes M.","year":"2015","unstructured":"M. Backes , S. Bugiel , C. Hammer , O. Schranz , and P. von Styp-Rekowsky . 2015 . Boxify: Full-fledged App Sandboxing for Stock Android Proc. USENIX Security Symposium. M. Backes, S. Bugiel, C. Hammer, O. Schranz, and P. von Styp-Rekowsky. 2015. Boxify: Full-fledged App Sandboxing for Stock Android Proc. USENIX Security Symposium."},{"key":"e_1_3_2_2_7_1","volume-title":"Dune: Safe User-level Access to Privileged CPU Features Proc. USENIX OSDI.","author":"Belay A.","year":"2012","unstructured":"A. Belay , A. Bittau , A. Mashtizadeh , D. Terei , D. Mazieres , and C. Kozyrakis . 2012 . Dune: Safe User-level Access to Privileged CPU Features Proc. USENIX OSDI. A. Belay, A. Bittau, A. Mashtizadeh, D. Terei, D. Mazieres, and C. Kozyrakis. 2012. Dune: Safe User-level Access to Privileged CPU Features Proc. USENIX OSDI."},{"key":"e_1_3_2_2_8_1","volume-title":"Wedge: Splitting Applications into Reduced-Privilege Compartments Proc. USENIX NSDI.","author":"Bittau A.","year":"2008","unstructured":"A. Bittau , P. Marchenko , M. Handley , and B. Karp . 2008 . Wedge: Splitting Applications into Reduced-Privilege Compartments Proc. USENIX NSDI. A. Bittau, P. Marchenko, M. Handley, and B. Karp. 2008. Wedge: Splitting Applications into Reduced-Privilege Compartments Proc. USENIX NSDI."},{"volume-title":"Privtrans: Automatically Partitioning Programs for Privilege Separation Proc. USENIX Security Symposium.","author":"Brumley D.","unstructured":"D. Brumley and D. Song . 2004 . Privtrans: Automatically Partitioning Programs for Privilege Separation Proc. USENIX Security Symposium. D. Brumley and D. Song. 2004. Privtrans: Automatically Partitioning Programs for Privilege Separation Proc. USENIX Security Symposium.","key":"e_1_3_2_2_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_10_1","DOI":"10.1145\/3054924"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_11_1","DOI":"10.1145\/502034.502042"},{"volume-title":"Efficient Protection of Path-Sensitive Control Security Proc. USENIX Security Symposium.","author":"Qian R.","unstructured":"Ding, R. and Qian , C . and Song, C. and Harris, B. and Kim, T. and Lee, W.. 2017 . Efficient Protection of Path-Sensitive Control Security Proc. USENIX Security Symposium. Ding, R. and Qian, C. and Song, C. and Harris, B. and Kim, T. and Lee, W.. 2017. Efficient Protection of Path-Sensitive Control Security Proc. USENIX Security Symposium.","key":"e_1_3_2_2_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1145\/2517349.2522720"},{"volume-title":"Proc. USENIX Security Symposium.","author":"Frassetto T.","unstructured":"T. Frassetto , P. Jauernig , C. Liebchen , and A. Sadeghi . 2018. IMIX: In-Process Memory Isolation EXtension . In Proc. USENIX Security Symposium. T. Frassetto, P. Jauernig, C. Liebchen, and A. Sadeghi. 2018. IMIX: In-Process Memory Isolation EXtension. In Proc. USENIX Security Symposium.","key":"e_1_3_2_2_14_1"},{"volume-title":"Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU Proc. IEEE Security and Privacy (S&P). bibtex: frigo2018","author":"Frigo P.","unstructured":"P. Frigo , C. Giuffrida , H. Bos , and K. Razavi . 2018 . Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU Proc. IEEE Security and Privacy (S&P). bibtex: frigo2018 . P. Frigo, C. Giuffrida, H. Bos, and K. Razavi. 2018. Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU Proc. IEEE Security and Privacy (S&P). bibtex: frigo2018.","key":"e_1_3_2_2_15_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_16_1","DOI":"10.1145\/1346281.1346303"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_17_1","DOI":"10.1145\/2557547.2557563"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1145\/2976749.2978327"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_19_1","DOI":"10.1145\/3210240.3210330"},{"volume-title":"Light-Weight Contexts: An OS Abstraction for Safety and Performance Proc. USENIX OSDI.","author":"Litton J.","unstructured":"J. Litton , A. Vahldiek-Oberwagner , E. Elnikety , D. Garg , B. Bhattacharjee , and P. Druschel . 2016 . Light-Weight Contexts: An OS Abstraction for Safety and Performance Proc. USENIX OSDI. J. Litton, A. Vahldiek-Oberwagner, E. Elnikety, D. Garg, B. Bhattacharjee, and P. Druschel. 2016. Light-Weight Contexts: An OS Abstraction for Safety and Performance Proc. USENIX OSDI.","key":"e_1_3_2_2_20_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1109\/SP.2010.17"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1145\/1352592.1352625"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1145\/1950365.1950401"},{"volume-title":"Proc. USENIX ATC.","author":"Payer M.","unstructured":"M. Payer , E. Kravina , and T. R. Gross . 2013. Lightweight Memory Tracing . In Proc. USENIX ATC. M. Payer, E. Kravina, and T. R. Gross. 2013. Lightweight Memory Tracing. In Proc. USENIX ATC.","key":"e_1_3_2_2_24_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1145\/2414456.2414498"},{"key":"e_1_3_2_2_26_1","volume-title":"Improving Host Security with System Call Policies Proc. USENIX Security Symposium.","author":"Provos N.","year":"2003","unstructured":"N. Provos . 2003 . Improving Host Security with System Call Policies Proc. USENIX Security Symposium. N. Provos. 2003. Improving Host Security with System Call Policies Proc. USENIX Security Symposium."},{"volume-title":"Proc. USENIX Security Symposium.","author":"Provos N.","unstructured":"N. Provos , M. Friedl , and P. Honeyman . 2003. Preventing Privilege Escalation . In Proc. USENIX Security Symposium. N. Provos, M. Friedl, and P. Honeyman. 2003. Preventing Privilege Escalation. In Proc. USENIX Security Symposium.","key":"e_1_3_2_2_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_28_1","DOI":"10.1145\/3210240.3210321"},{"volume-title":"Securing Embedded User Interfaces: Android and Beyond Proc. USENIX Security Symposium.","author":"Roesner F.","unstructured":"F. Roesner and T. Kohno . 2013 . Securing Embedded User Interfaces: Android and Beyond Proc. USENIX Security Symposium. F. Roesner and T. Kohno. 2013. Securing Embedded User Interfaces: Android and Beyond Proc. USENIX Security Symposium.","key":"e_1_3_2_2_29_1"},{"volume-title":"USENIX Security Symposium.","author":"Shekhar S.","unstructured":"S. Shekhar , M. Dietz , and D. S. Wallach . 2012. AdSplit: Separating Smartphone Advertising from Applications Proc . USENIX Security Symposium. S. Shekhar, M. Dietz, and D. S. Wallach. 2012. AdSplit: Separating Smartphone Advertising from Applications Proc. USENIX Security Symposium.","key":"e_1_3_2_2_30_1"},{"key":"e_1_3_2_2_31_1","volume-title":"Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Transactions on Security and Safety","author":"Strackx R.","year":"2015","unstructured":"R. Strackx , P. Agten , N. Avonds , and F. Piessens . 2015 . Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Transactions on Security and Safety (2015). R. Strackx, P. Agten, N. Avonds, and F. Piessens. 2015. Salus: Kernel Support for Secure Process Compartments. EAI Endorsed Transactions on Security and Safety (2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1145\/945445.945466"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1145\/2810103.2813673"},{"volume-title":"CODOMs: Protecting Software with Code-centric Memory Domains Proc. ACM\/IEEE ISCA.","author":"Vilanova L.","unstructured":"L. Vilanova , M. Ben-Yehuda , N. Navarro , Y. Etsion , and M. Valero . 2014 . CODOMs: Protecting Software with Code-centric Memory Domains Proc. ACM\/IEEE ISCA. L. Vilanova, M. Ben-Yehuda, N. Navarro, Y. Etsion, and M. Valero. 2014. CODOMs: Protecting Software with Code-centric Memory Domains Proc. ACM\/IEEE ISCA.","key":"e_1_3_2_2_34_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1145\/168619.168635"},{"volume-title":"Proc. USENIX ATC.","author":"Wang J.","unstructured":"J. Wang , X. Xiong , and P. Liu . 2015. Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications . In Proc. USENIX ATC. J. Wang, X. Xiong, and P. Liu. 2015. Between Mutual Trust and Mutual Distrust: Practical Fine-grained Privilege Separation in Multithreaded Applications. In Proc. USENIX ATC.","key":"e_1_3_2_2_36_1"},{"volume-title":"Proc. USENIX Security Symposium.","author":"Watson R. N. M.","unstructured":"R. N. M. Watson , J. Anderson , B. Laurie , and K. Kennaway . 2010. Capsicum: Practical Capabilities for UNIX . In Proc. USENIX Security Symposium. R. N. M. Watson, J. Anderson, B. Laurie, and K. Kennaway. 2010. Capsicum: Practical Capabilities for UNIX. In Proc. USENIX Security Symposium.","key":"e_1_3_2_2_37_1"},{"doi-asserted-by":"crossref","unstructured":"J. Woodruff R. N. M. Watson D. Chisnall S. W. Moore J. Anderson B. Davis B. Laurie P. G. Neumann R. Norton and M. Roe. 2014. The CHERI Capability Model: Revisiting RISC in an Age of Risk Proc. ACM\/IEEE ISCA.   J. Woodruff R. N. M. Watson D. Chisnall S. W. Moore J. Anderson B. Davis B. Laurie P. G. Neumann R. Norton and M. Roe. 2014. The CHERI Capability Model: Revisiting RISC in an Age of Risk Proc. ACM\/IEEE ISCA.","key":"e_1_3_2_2_38_1","DOI":"10.1109\/ISCA.2014.6853201"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_39_1","DOI":"10.1145\/3173162.3173186"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_40_1","DOI":"10.1109\/SP.2009.25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_41_1","DOI":"10.1145\/3210240.3210338"},{"volume-title":"Hardware Enforcement of Application Security Policies Using Tagged Memory Proc. USENIX OSDI.","author":"Zeldovich N.","unstructured":"N. Zeldovich , H. Kannan , M. Dalton , and C. Kozyrakis . 2008 . Hardware Enforcement of Application Security Policies Using Tagged Memory Proc. USENIX OSDI. N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. 2008. Hardware Enforcement of Application Security Policies Using Tagged Memory Proc. USENIX OSDI.","key":"e_1_3_2_2_42_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_43_1","DOI":"10.1145\/2810103.2813714"},{"volume-title":"SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques Proc. USENIX OSDI.","author":"Zhou F.","unstructured":"F. Zhou , J. Condit , Z. Anderson , I. Bagrak , R. Ennals , M. Harren , G. Necula , and E. Brewer . 2006 . SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques Proc. USENIX OSDI. F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. 2006. SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques Proc. USENIX OSDI.","key":"e_1_3_2_2_44_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_45_1","DOI":"10.1145\/2906388.2906413"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '18","name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada"},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243772","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243772","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243772","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:08:18Z","timestamp":1750212498000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243772"}},"subtitle":["Safeguarding the Mobile GPU Interface Using WebGL Security Checks"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":45,"alternative-id":["10.1145\/3243734.3243772","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243772","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}