{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:55:39Z","timestamp":1763499339944,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2022"],"award-info":[{"award-number":["N00014-18-1-2022"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485376","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"1612-1626","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks"],"prefix":"10.1145","author":[{"given":"Mohannad","family":"Ismail","sequence":"first","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"}]},{"given":"Jinwoo","family":"Yom","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"}]},{"given":"Christopher","family":"Jelesnianski","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"}]},{"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Changwoo","family":"Min","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.30"},{"volume-title":"Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)","author":"Emery","key":"e_1_3_2_1_3_1","unstructured":"Emery D. Berger and Benjamin G. Zorn. 2006. DieHard: Probabilistic Memory Safety for Unsafe Languages. In Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). Ottawa, Canada."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054924"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23279"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 24th USENIX Security Symposium (Security)","author":"Carlini Nicholas","year":"2015","unstructured":"Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proceedings of the 24th USENIX Security Symposium (Security). Washington, DC."},{"volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 193--204","author":"Scott","key":"e_1_3_2_1_10_1","unstructured":"Scott A. Carr and Mathias Payer. 2017. DataShield: Configurable Data Confidentiality and Integrity. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 193--204."},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Castro Miguel","year":"2006","unstructured":"Miguel Castro, Manuel Costa, and Tim Harris. 2006. Securing Software by Enforcing Data-flow Integrity. In Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Seattle, WA, 147--160."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23156"},{"key":"e_1_3_2_1_13_1","unstructured":"Catalin Cimpanu. 2019. Microsoft: 70 percent of all security bugs are memory safety issues. https:\/\/www.zdnet.com\/article\/microsoft-70-percent-of-all-security-bugs-are-memory-safety-issues\/."},{"key":"e_1_3_2_1_14_1","volume-title":"PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Connor R. Joseph","year":"2020","unstructured":"R. Joseph Connor, Tyler McDaniel, Jared M. Smith, and Max Schuchard. 2020. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1409--1426. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/connor"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Dang Thurston H.Y.","year":"2017","unstructured":"Thurston H.Y. Dang, Petros Maniatis, and David Wagner. 2017. Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers. In Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC, Canada."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (Security)","author":"Davi Lucas","year":"2014","unstructured":"Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, and Fabian Monrose. 2014. Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.. In Proceedings of the 23rd USENIX Security Symposium (Security). San Diego, CA."},{"key":"e_1_3_2_1_17_1","unstructured":"Dhaval Kapil. 2019. Unlink Exploit. https:\/\/heap-exploitation.dhavalkapil.com\/attacks\/unlink_exploit.html."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Ding Ren","year":"2017","unstructured":"Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. 2017. Efficient protection of path-sensitive control security. In Proceedings of the 26th USENIX Security Symposium (Security). Vancouver, BC, Canada, 131--148."},{"key":"e_1_3_2_1_19_1","unstructured":"Dongliang Mu. 2018. CVE-2015--8668. cve-2015--8668-exploit."},{"key":"e_1_3_2_1_20_1","unstructured":"Doug Lea. 2000. A Memory Allocator. http:\/\/gee.cs.oswego.edu\/dl\/html\/malloc.html."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security)","author":"Eckert Moritz","year":"2018","unstructured":"Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2018. HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. In Proceedings of the 27th USENIX Security Symposium (Security). Baltimore, MD."},{"key":"e_1_3_2_1_22_1","volume-title":"The poisoned NUL byte","author":"Evans Chris","year":"2014","unstructured":"Chris Evans. 2014. The poisoned NUL byte, 2014 edition. https:\/\/googleprojectzero.blogspot.com\/2014\/08\/the-poisoned-nul-byte-2014-edition.html."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.53"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813646"},{"key":"e_1_3_2_1_25_1","unstructured":"Forum of Incident Response and Security Teams Inc. 2020 a. Common Vulnerability Scoring System version 3.1 Examples Revision 1. https:\/\/www.first.org\/cvss\/v3--1\/cvss-v31-examples_r1.pdf."},{"key":"e_1_3_2_1_26_1","unstructured":"Forum of Incident Response and Security Teams Inc. 2020 b. Common Vulnerability Scoring System version 3.1 Specification Document Revision 1. https:\/\/www.first.org\/cvss\/v3--1\/cvss-v31-specification_r1.pdf."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 83--97","author":"Frassetto Tommaso","year":"2018","unstructured":"Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2018. IMIX: in-process memory isolation extension. In Proceedings of the 27th USENIX Conference on Security Symposium. USENIX Association, 83--97."},{"key":"e_1_3_2_1_28_1","unstructured":"Free Software Foundation. 2019. MallocInternals - glibc wiki. https:\/\/sourceware.org\/glibc\/wiki\/MallocInternals."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037716"},{"key":"e_1_3_2_1_30_1","unstructured":"Will Glozer. 2019. a HTTP benchmarking tool. https:\/\/github.com\/wg\/wrk."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 25th USENIX Security Symposium (Security)","author":"G\u00f6ktacs Enes","year":"2016","unstructured":"Enes G\u00f6ktacs, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, and Herbert Bos. 2016. Undermining Information Hiding (and What to Do about It). In Proceedings of the 25th USENIX Security Symposium (Security). Austin, TX."},{"key":"e_1_3_2_1_33_1","unstructured":"Google. [n.d.]. TCMalloc. https:\/\/google.github.io\/tcmalloc\/."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Heraklion","author":"Grossklags Jens","year":"2018","unstructured":"Jens Grossklags and Claudia Eckert. 2018. \u03c4CFI: Type-Assisted Control Flow Integrity for x86--64 Binaries. In Proceedings of the 21th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Heraklion, Crete, Greece."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029830"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243797"},{"key":"e_1_3_2_1_37_1","unstructured":"Intel. 2020. Intel CET Answers Call to Protect Against Common Malware Threats. https:\/\/newsroom.intel.com\/editorials\/intel-cet-answers-call-protect-common-malware-threats."},{"key":"e_1_3_2_1_38_1","unstructured":"Intel Corporation. 2019 a. Control-flow Enforcement Technology Specification Revision 3.0. https:\/\/software.intel.com\/sites\/default\/files\/managed\/4d\/2a\/control-flow-enforcement-technology-preview.pdf."},{"key":"e_1_3_2_1_39_1","unstructured":"Intel Corporation. 2019 b. Intel 64 and IA-32 Architectures Software Developer's Manual. https:\/\/software.intel.com\/en-us\/articles\/intel-sdm."},{"key":"e_1_3_2_1_40_1","unstructured":"Jonathan Corbet. 2004. x86 NX support. https:\/\/lwn.net\/Articles\/87814\/."},{"key":"e_1_3_2_1_41_1","volume-title":"Adaptive Call-site Sensitive Control Flow Integrity. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 95--110","author":"Khandaker Mustakimur","year":"2019","unstructured":"Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, and Yueqiang Cheng. 2019 b. Adaptive Call-site Sensitive Control Flow Integrity. In 2019 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 95--110."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security)","author":"Khandaker Mustakimur Rahman","year":"2019","unstructured":"Mustakimur Rahman Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, and Jie Yang. 2019 a. Origin-sensitive Control Flow Integrity. In Proceedings of the 28th USENIX Security Symposium (Security). Santa Clara, CA."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_45_1","volume-title":"Code-Pointer Integrity. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov, L\u00e1szl\u00f3 Szekeres, Mathias Payer, George Candea, R Sekar, and Dawn Song. 2014. Code-Pointer Integrity. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). Broomfield, Colorado."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417867"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2017.18"},{"key":"e_1_3_2_1_48_1","volume-title":"Windows XP Tablet PC Edition","author":"Support Microsoft","year":"2005","unstructured":"Microsoft Support. 2017. A detailed description of the Data Execution Prevention (DEP) feature in Windows XP Service Pack 2, Windows XP Tablet PC Edition 2005, and Windows Server 2003. https:\/\/support.microsoft.com\/en-us\/help\/875352\/a-detailed-description-of-the-data-execution-prevention-dep-feature-in."},{"key":"e_1_3_2_1_49_1","volume-title":"Milo MK Martin, and Steve Zdancewic","author":"Nagarakatte Santosh","year":"2015","unstructured":"Santosh Nagarakatte, Milo MK Martin, and Steve Zdancewic. 2015. Everything you want to know about pointer-based checking. In 1st Summit on Advances in Programming Languages (SNAPL 2015). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_52_1","unstructured":"Nandy Narwhals CTF Team. 2017. CVE-2016--10190 Detailed Writeup. https:\/\/nandynarwhals.org\/cve-2016--10190\/."},{"key":"e_1_3_2_1_53_1","unstructured":"Nathan Burow. 2018. CFIXX C+ test suite. https:\/\/github.com\/HexHive\/CFIXX\/tree\/master\/CFIXX-Suite."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_1_56_1","first-page":"573","article-title":"DieHarder: Securing the Heap. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS)","author":"Novark Gene","year":"2010","unstructured":"Gene Novark and Emery D. Berger. 2010. DieHarder: Securing the Heap. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS). Chicago, IL, 573--584.","journal-title":"Chicago"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241105"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219662"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the 22th USENIX Security Symposium (Security)","author":"Pappas Vasilis","year":"2013","unstructured":"Vasilis Pappas, Michalis Polychronakis, and Angelos D Keromytis. 2013. Transparent ROP Exploit Mitigation Using Indirect Branch Tracing. In Proceedings of the 22th USENIX Security Symposium (Security). Washington, DC."},{"key":"e_1_3_2_1_60_1","volume-title":"Proceedings of the 2019 USENIX Annual Technical Conference (ATC)","author":"Park Soyeon","year":"2019","unstructured":"Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, and Taesoo Kim. 2019. Libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). In Proceedings of the 2019 USENIX Annual Technical Conference (ATC). Renton, WA, 241--254."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23297"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00041"},{"key":"e_1_3_2_1_63_1","unstructured":"Qualcomm. 2017. Pointer Authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8--3.pdf."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_65_1","volume-title":"Proceedings of the 2012 USENIX Annual Technical Conference (ATC)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanity checker. In Proceedings of the 2012 USENIX Annual Technical Conference (ATC). Boston, MA, 309--318."},{"key":"e_1_3_2_1_66_1","unstructured":"@sha0coder. 2014. Python - 'socket.recvfrom_into()' Remote Buffer Overflow. https:\/\/www.exploit-db.com\/exploits\/31875"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_68_1","unstructured":"SHELLPHISH. 2020. Educational Heap Exploitation. https:\/\/github.com\/shellphish\/how2heap."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133957"},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security)","author":"Silvestro Sam","year":"2018","unstructured":"Sam Silvestro, Hongyu Liu, Tianyi Liu, Zhiqiang Lin, and Tongping Liu. 2018. Guarder: A Tunable Secure Allocator. In Proceedings of the 27th USENIX Security Symposium (Security). Baltimore, MD."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.45"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23218"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.9"},{"key":"e_1_3_2_1_74_1","unstructured":"The Clang Team. 2019 a. Clang 10 documentation: CONTROL FLOW INTEGRITY. https:\/\/clang.llvm.org\/docs\/ControlFlowIntegrity.html."},{"key":"e_1_3_2_1_75_1","unstructured":"The Clang Team. 2019 b. Clang 10 documentation: SAFESTACK. https:\/\/clang.llvm.org\/docs\/SafeStack.html."},{"key":"e_1_3_2_1_76_1","unstructured":"The PostgreSQL Global Development Group. 2020. pgbench: PostgreSQL Client Applications. https:\/\/www.postgresql.org\/docs\/current\/pgbench.html."},{"key":"e_1_3_2_1_77_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium (Security)","author":"Tice Caroline","year":"2014","unstructured":"Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. In Proceedings of the 23rd USENIX Security Symposium (Security). San Diego, CA."},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In Proceedings of the 28th USENIX Security Symposium (Security). Santa Clara, CA, 1221--1238."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813673"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.60"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489275"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23099"},{"key":"e_1_3_2_1_83_1","volume-title":"Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland)","author":"Zhang Chao","year":"2013","unstructured":"Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical control flow integrity and randomization for binary executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy (Oakland). San Francisco, CA."},{"key":"e_1_3_2_1_84_1","volume-title":"Proceedings of the 22th USENIX Security Symposium (Security)","author":"Zhang Mingwei","year":"2013","unstructured":"Mingwei Zhang and R Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the 22th USENIX Security Symposium (Security). Washington, DC."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304017"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196531"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485376","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485376","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485376","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:12Z","timestamp":1763499012000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485376"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":86,"alternative-id":["10.1145\/3460120.3485376","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485376","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}