{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T16:29:04Z","timestamp":1756571344871,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"R\u00e9gion Occitanie","award":["Pr\u00e9maturation-2020"],"award-info":[{"award-number":["Pr\u00e9maturation-2020"]}]},{"DOI":"10.13039\/501100001665","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-20-CE25-0005"],"award-info":[{"award-number":["ANR-20-CE25-0005"]}],"id":[{"id":"10.13039\/501100001665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,21]]},"DOI":"10.1145\/3447786.3456235","type":"proceedings-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T06:18:11Z","timestamp":1619072291000},"page":"162-177","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Mitigating vulnerability windows with hypervisor transplant"],"prefix":"10.1145","author":[{"given":"Tu Dinh","family":"Ngoc","sequence":"first","affiliation":[{"name":"University of Toulouse, France"}]},{"given":"Boris","family":"Teabe","sequence":"additional","affiliation":[{"name":"University of Toulouse, France"}]},{"given":"Alain","family":"Tchana","sequence":"additional","affiliation":[{"name":"ENS Lyon and Inria, France"}]},{"given":"Gilles","family":"Muller","sequence":"additional","affiliation":[{"name":"Inria, France"}]},{"given":"Daniel","family":"Hagimont","sequence":"additional","affiliation":[{"name":"University of Toulouse, France"}]}],"member":"320","published-online":{"date-parts":[[2021,4,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Information leak using speculative execution. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1272.  2017. Information leak using speculative execution. https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1272."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Keeping Spectre Secret. https:\/\/www.theverge.com\/2018\/1\/11\/16878670\/meltdown-spectre-disclosure-embargo-google-microsoft-linux.  2018. Keeping Spectre Secret. https:\/\/www.theverge.com\/2018\/1\/11\/16878670\/meltdown-spectre-disclosure-embargo-google-microsoft-linux."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Advisories publicly released or pre-released. https:\/\/xenbits.xen.org\/xsa\/.  2021. Advisories publicly released or pre-released. https:\/\/xenbits.xen.org\/xsa\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. CVE-2016-6258 description. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-6258.  2021. CVE-2016-6258 description. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2016-6258."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Red Hat Bugzilla. https:\/\/bugzilla.redhat.com\/.  2021. Red Hat Bugzilla. https:\/\/bugzilla.redhat.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Amazon Web Services Inc. [n.d.]. Migrating to latest generation instance types. https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/virtualization_types.html.  Amazon Web Services Inc. [n.d.]. Migrating to latest generation instance types. https:\/\/docs.aws.amazon.com\/AWSEC2\/latest\/UserGuide\/virtualization_types.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519085"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"volume-title":"Fast Local VM Migration Against Hypervisor Corruption. In 2019 15th European Dependable Computing Conference (EDCC). 97--102","author":"Cerveira F.","key":"e_1_3_2_1_9_1","unstructured":"F. Cerveira , R. Barbosa , and H. Madeira . 2019 . Fast Local VM Migration Against Hypervisor Corruption. In 2019 15th European Dependable Computing Conference (EDCC). 97--102 . F. Cerveira, R. Barbosa, and H. Madeira. 2019. Fast Local VM Migration Against Hypervisor Corruption. In 2019 15th European Dependable Computing Conference (EDCC). 97--102."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241287"},{"key":"e_1_3_2_1_11_1","volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN","author":"Tan Cheng","year":"2012","unstructured":"Cheng Tan , Yubin Xia , Haibo Chen , and Binyu Zang . 2012 . Tiny-Checker: Transparent protection of VMs against hypervisor failures with nested virtualization . In IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012). 1--6. Cheng Tan, Yubin Xia, Haibo Chen, and Binyu Zang. 2012. Tiny-Checker: Transparent protection of VMs against hypervisor failures with nested virtualization. In IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012). 1--6."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation -","volume":"2","author":"Clark Christopher","year":"2005","unstructured":"Christopher Clark , Keir Fraser , Steven Hand , Jacob Gorm Hansen , Eric Jul , Christian Limpach , Ian Pratt , and Andrew Warfield . 2005 . Live Migration of Virtual Machines . In Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation - Volume 2 (NSDI'05). USENIX Association, USA, 273--286. Christopher Clark, Keir Fraser, Steven Hand, Jacob Gorm Hansen, Eric Jul, Christian Limpach, Ian Pratt, and Andrew Warfield. 2005. Live Migration of Virtual Machines. In Proceedings of the 2nd Conference on Symposium on Networked Systems Design and Implementation - Volume 2 (NSDI'05). USENIX Association, USA, 273--286."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132772"},{"key":"e_1_3_2_1_14_1","unstructured":"Vladimir Davydov. 2013. pram: persistent over-kexec memory file system. https:\/\/lists.openvz.org\/pipermail\/criu\/2013-July\/009877.html.  Vladimir Davydov. 2013. pram: persistent over-kexec memory file system. https:\/\/lists.openvz.org\/pipermail\/criu\/2013-July\/009877.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Christina Delimitrou. [n.d.]. The Increasing Heterogeneity of Cloud Hardware and What It Means for Systems. https:\/\/www.sigops.org\/2020\/the-increasing-heterogeneity-of-cloud-hardware-and-what-it-means-for-systems\/.  Christina Delimitrou. [n.d.]. The Increasing Heterogeneity of Cloud Hardware and What It Means for Systems. https:\/\/www.sigops.org\/2020\/the-increasing-heterogeneity-of-cloud-hardware-and-what-it-means-for-systems\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755933"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2287056.2287062"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313808.3313821"},{"volume-title":"An Empirical Analysis of Vulnerabilities in Virtualization Technologies. In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 533--538","author":"Gkortzis A.","key":"e_1_3_2_1_19_1","unstructured":"A. Gkortzis , S. Rizou , and D. Spinellis . 2016 . An Empirical Analysis of Vulnerabilities in Virtualization Technologies. In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 533--538 . A. Gkortzis, S. Rizou, and D. Spinellis. 2016. An Empirical Analysis of Vulnerabilities in Virtualization Technologies. In 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 533--538."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.5"},{"volume-title":"Fine Grain Cross-VM Attacks on Xen and VMware. In 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. 737--744","author":"Irazoqui G.","key":"e_1_3_2_1_21_1","unstructured":"G. Irazoqui , M. S. Inci , T. Eisenbarth , and B. Sunar . 2014 . Fine Grain Cross-VM Attacks on Xen and VMware. In 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. 737--744 . G. Irazoqui, M. S. Inci, T. Eisenbarth, and B. Sunar. 2014. Fine Grain Cross-VM Attacks on Xen and VMware. In 2014 IEEE Fourth International Conference on Big Data and Cloud Computing. 737--744."},{"volume-title":"2009 IEEE International Conference on Cluster Computing and Workshops.","author":"Jin H.","key":"e_1_3_2_1_22_1","unstructured":"H. Jin , L. Deng , S. Wu , X. Shi , and X. Pan . 2009. Live virtual machine migration with adaptive, memory compression . In 2009 IEEE International Conference on Cluster Computing and Workshops. H. Jin, L. Deng, S. Wu, X. Shi, and X. Pan. 2009. Live virtual machine migration with adaptive, memory compression. In 2009 IEEE International Conference on Cluster Computing and Workshops."},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 2016 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '16). USENIX Association, USA, 605--619","author":"Kashyap Sanidhya","year":"2016","unstructured":"Sanidhya Kashyap , Changwoo Min , Byoungyoung Lee , Taesoo Kim , and Pavel Emelyanov . 2016 . Instant OS Updates via Userspace Checkpoint-and-Restart . In Proceedings of the 2016 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '16). USENIX Association, USA, 605--619 . Sanidhya Kashyap, Changwoo Min, Byoungyoung Lee, Taesoo Kim, and Pavel Emelyanov. 2016. Instant OS Updates via Userspace Checkpoint-and-Restart. In Proceedings of the 2016 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '16). USENIX Association, USA, 605--619."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_25_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher , Jann Horn , Anders Fogh , Daniel Genkin , Daniel Gruss , Werner Haas , Mike Hamburg , Moritz Lipp , Stefan Mangard , Thomas Prescher , Michael Schwarz , and Yuval Yarom . 2019 . Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19) . Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P'19)."},{"key":"e_1_3_2_1_26_1","unstructured":"Alexey Kopytov. [n.d.]. Sysbench: a system performance benchmark. https:\/\/github.com\/akopytov\/sysbench.  Alexey Kopytov. [n.d.]. Sysbench: a system performance benchmark. https:\/\/github.com\/akopytov\/sysbench."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.20"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2797022.2797026"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952692"},{"volume-title":"2012 IEEE Sixth International Conference on Software Security and Reliability. 11--20","author":"Le M.","key":"e_1_3_2_1_30_1","unstructured":"M. Le and Y. Tamir . 2012. Applying Microreboot to System Software . In 2012 IEEE Sixth International Conference on Software Security and Reliability. 11--20 . M. Le and Y. Tamir. 2012. Applying Microreboot to System Software. In 2012 IEEE Sixth International Conference on Software Security and Reliability. 11--20."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523649.2523680"},{"key":"e_1_3_2_1_32_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , Yuval Yarom , and Mike Hamburg . 2018 . Meltdown: Reading Kernel Memory from User Space . In 27th USENIX Security Symposium (USENIX Security 18) . Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_33_1","volume-title":"In International Workshop on Virtualization Technology (IWVT'08","author":"Liu Pengcheng","year":"2008","unstructured":"Pengcheng Liu , Ziye Yang , Xiang Song , Yixun Zhou , Haibo Chen , and Binyu Zang . 2008 . Heterogeneous live migration of virtual machines . In In International Workshop on Virtualization Technology (IWVT'08 . Pengcheng Liu, Ziye Yang, Xiang Song, Yixun Zhou, Haibo Chen, and Binyu Zang. 2008. Heterogeneous live migration of virtual machines. In In International Workshop on Virtualization Technology (IWVT'08."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2012.09.003"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"e_1_3_2_1_36_1","unstructured":"Microsoft Corp. [n.d.]. Maintenance for virtual machines in Azure. https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-machines\/maintenance-and-updates.  Microsoft Corp. [n.d.]. Maintenance for virtual machines in Azure. https:\/\/docs.microsoft.com\/en-us\/azure\/virtual-machines\/maintenance-and-updates."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346278"},{"key":"e_1_3_2_1_38_1","unstructured":"MySQL [n.d.]. MySQL. https:\/\/www.mysql.com.  MySQL [n.d.]. MySQL. https:\/\/www.mysql.com."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050758"},{"key":"e_1_3_2_1_40_1","unstructured":"V Pavl\u00edk. 2014. kgraft-live patching of the linux kernel. Technical report Technical report SUSE Maxfeldstrasse.  V Pavl\u00edk. 2014. kgraft-live patching of the linux kernel. Technical report Technical report SUSE Maxfeldstrasse."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484402.2484406"},{"key":"e_1_3_2_1_42_1","unstructured":"Steven Poitras. 2021. The Nutanix Bible. https:\/\/nutanixbible.com\/.  Steven Poitras. 2021. The Nutanix Bible. https:\/\/nutanixbible.com\/."},{"key":"e_1_3_2_1_43_1","unstructured":"redis [n.d.]. Redis. https:\/\/redis.io\/.  redis [n.d.]. Redis. https:\/\/redis.io\/."},{"key":"e_1_3_2_1_44_1","unstructured":"Joseph Redmon. 2013--2016. Darknet: Open Source Neural Networks in C. http:\/\/pjreddie.com\/darknet\/.  Joseph Redmon. 2013--2016. Darknet: Open Source Neural Networks in C. http:\/\/pjreddie.com\/darknet\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653720"},{"key":"e_1_3_2_1_46_1","volume-title":"Deconstructing Xen. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Shi Le","year":"2017","unstructured":"Le Shi , Yuming Wu , Yubin Xia , Nathan Dautenhahn , Haibo Chen , Binyu Zang , and Jinming Li . 2017 . Deconstructing Xen. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017 , San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/deconstructing-xen\/ Le Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, and Jinming Li. 2017. Deconstructing Xen. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/deconstructing-xen\/"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212908.2212920"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755935"},{"volume-title":"XDR: External Data Representation Standard. https:\/\/tools.ietf.org\/html\/rfc1014.","author":"Microsystems Sun","key":"e_1_3_2_1_49_1","unstructured":"Sun Microsystems , Inc . [n.d.]. XDR: External Data Representation Standard. https:\/\/tools.ietf.org\/html\/rfc1014. Sun Microsystems, Inc. [n.d.]. XDR: External Data Representation Standard. https:\/\/tools.ietf.org\/html\/rfc1014."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046754"},{"volume-title":"Assessment of Hypervisor Vulnerabilities. In 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). 71--77","author":"Thongthua A.","key":"e_1_3_2_1_51_1","unstructured":"A. Thongthua and S. Ngamsuriyaroj . 2016 . Assessment of Hypervisor Vulnerabilities. In 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). 71--77 . A. Thongthua and S. Ngamsuriyaroj. 2016. Assessment of Hypervisor Vulnerabilities. In 2016 International Conference on Cloud Computing Research and Innovations (ICCCRI). 71--77."},{"key":"e_1_3_2_1_52_1","unstructured":"David Vrabel Andrew Cooper Wen Congyang and Yang Hongyang. [n.d.]. libxenctrl (libxc) Domain Image Format. https:\/\/xenbits.xen.org\/docs\/unstable\/specs\/libxc-migration-stream.html.  David Vrabel Andrew Cooper Wen Congyang and Yang Hongyang. [n.d.]. libxenctrl (libxc) Domain Image Format. https:\/\/xenbits.xen.org\/docs\/unstable\/specs\/libxc-migration-stream.html."},{"key":"e_1_3_2_1_53_1","unstructured":"Vulnerability Metrics [n.d.]. Vulnerability Metrics. https:\/\/nvd.nist.gov\/vuln-metrics\/cvss.  Vulnerability Metrics [n.d.]. Vulnerability Metrics. https:\/\/nvd.nist.gov\/vuln-metrics\/cvss."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_2"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168849"},{"volume-title":"DualVisor: Redundant Hypervisor Execution for Achieving Hardware Error Resilience in Datacenters. In 2015 15th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing. 485--494","author":"Xu X.","key":"e_1_3_2_1_56_1","unstructured":"X. Xu and H. H. Huang . 2015 . DualVisor: Redundant Hypervisor Execution for Achieving Hardware Error Resilience in Datacenters. In 2015 15th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing. 485--494 . X. Xu and H. H. Huang. 2015. DualVisor: Redundant Hypervisor Execution for Achieving Hardware Error Resilience in Datacenters. In 2015 15th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing. 485--494."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451512.2451536"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304034"},{"volume-title":"Fast Hypervisor Recovery Without Reboot. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 115--126","author":"Zhou D.","key":"e_1_3_2_1_60_1","unstructured":"D. Zhou and Y. Tamir . 2018 . Fast Hypervisor Recovery Without Reboot. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 115--126 . D. Zhou and Y. Tamir. 2018. Fast Hypervisor Recovery Without Reboot. In 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 115--126."}],"event":{"name":"EuroSys '21: Sixteenth European Conference on Computer Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Online Event United Kingdom","acronym":"EuroSys '21"},"container-title":["Proceedings of the Sixteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447786.3456235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447786.3456235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:10Z","timestamp":1750200070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447786.3456235"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":60,"alternative-id":["10.1145\/3447786.3456235","10.1145\/3447786"],"URL":"https:\/\/doi.org\/10.1145\/3447786.3456235","relation":{},"subject":[],"published":{"date-parts":[[2021,4,21]]},"assertion":[{"value":"2021-04-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}