{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T22:24:44Z","timestamp":1773786284293,"version":"3.50.1"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2022,2,8]],"date-time":"2022-02-08T00:00:00Z","timestamp":1644278400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"crossref","award":["EP\/R012598\/1, EP\/S030867\/1, EP\/V000454\/1"],"award-info":[{"award-number":["EP\/R012598\/1, EP\/S030867\/1, EP\/V000454\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]},{"name":"European Union\u2019s Horizon 2020 research and innovation programme","award":["779391"],"award-info":[{"award-number":["779391"]}]},{"name":"Research Fund KU Leuven"},{"name":"Flemish Research Programme Cybersecurity"},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research Foundation \u2013 Flanders"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Digital Threats"],"published-print":{"date-parts":[[2022,6,30]]},"abstract":"<jats:p>This article analyzes a previously overlooked attack surface that allows unprivileged adversaries to impact floating-point computations in enclaves through the Application Binary Interface (ABI). In a comprehensive study across 7 industry-standard and research enclave shielding runtimes for Intel Software Guard Extensions (SGX), we show that control and state registers of the x87 Floating-Point Unit (FPU) and Intel Streaming SIMD Extensions are not always properly sanitized on enclave entry. We furthermore show that this attack goes beyond the x86 architecture and can also affect RISC-V enclaves. Focusing on SGX, we abuse the adversary\u2019s control over precision and rounding modes as an ABI fault injection primitive to corrupt enclaved floating-point operations. Our analysis reveals that this is especially relevant for applications that use the older x87 FPU, which is still under certain conditions used by modern compilers. We exemplify the potential impact of ABI quality-degradation attacks for enclaved machine learning and for the SPEC benchmarks. We then explore the impact on confidentiality, showing that control over exception masks can be abused as a controlled channel to recover enclaved multiplication operands. Our findings, affecting 5 of 7 studied SGX runtimes and one RISC-V runtime, demonstrate the challenges of implementing high-assurance trusted execution across computing architectures.<\/jats:p>","DOI":"10.1145\/3491264","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T18:44:36Z","timestamp":1634323476000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments"],"prefix":"10.1145","volume":"3","author":[{"given":"Fritz","family":"Alder","sequence":"first","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"given":"Jo","family":"Van Bulck","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]},{"given":"Jesse","family":"Spielman","sequence":"additional","affiliation":[{"name":"University of Birmingham, Edgbaston"}]},{"given":"David","family":"Oswald","sequence":"additional","affiliation":[{"name":"University of Birmingham, Edgbaston"}]},{"given":"Frank","family":"Piessens","sequence":"additional","affiliation":[{"name":"imec-DistriNet, KU Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2022,2,8]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358916"},{"key":"e_1_3_3_3_2","doi-asserted-by":"crossref","unstructured":"Pedro Antonino Wojciech Aleksander Wo\u0142oszyn and AW Roscoe. 2021. Guardian: Symbolic validation of orderliness in SGX enclaves. In Proceedings of the 2021 on Cloud Computing Security Workshop . Association for Computing Machinery 111\u2013123. DOI:10.1145\/3474123.3486755","DOI":"10.1145\/3474123.3486755"},{"key":"e_1_3_3_4_2","volume-title":"Arm Architecture Reference Manual Armv8","year":"2021","unstructured":"ARM. 2021. Arm Architecture Reference Manual Armv8. ARM DDI 0487G.a. Retrieved November 15, 2021 from https:\/\/developer.arm.com\/documentation\/ddi0487\/gb\/ ARM DDI: 0487G.a."},{"key":"e_1_3_3_5_2","volume-title":"FPSCR, the Floating-point Status and Control Register","year":"2021","unstructured":"ARM. 2021. FPSCR, the Floating-point Status and Control Register. Retrieved from https:\/\/developer.arm.com\/documentation\/dui0068\/b\/Vector-Floating-point-Programming\/VFP-system-registers\/FPSCR--the-floating-point-status-and-control-register."},{"key":"e_1_3_3_6_2","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security 21)","author":"Bahmani Raad","year":"2021","unstructured":"Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, and Emmanuel Stapf. 2021. CURE: A security architecture with customizable and resilient enclaves. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21). USENIX Association. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/bahmani."},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685070"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277294"},{"key":"e_1_3_3_9_2","unstructured":"Mike Bursell. 2019. Trust No One Run Everywhere\u2014Introducing Enarx. Retrieved November 15 2021 from https:\/\/next.redhat.com\/2019\/08\/16\/trust-no-one-run-everywhere-introducing-enarx\/."},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451145"},{"key":"e_1_3_3_11_2","volume-title":"Proceedings of the 4th IEEE European Symposium on Security and Privacy (Euro S&P)","author":"Chen Guoxing","year":"2019","unstructured":"Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, and Ten H Lai. 2019. SgxPectre attacks: Stealing intel secrets from SGX enclaves via speculative execution. In Proceedings of the 4th IEEE European Symposium on Security and Privacy (Euro S&P). IEEE."},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103805"},{"key":"e_1_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489260"},{"key":"e_1_3_3_14_2","volume-title":"Intel Software Guard Extensions SDK for Linux OS: Developer Reference","author":"Corporation Intel","year":"2017","unstructured":"Intel Corporation. 2017. Intel Software Guard Extensions SDK for Linux OS: Developer Reference. Retrieved November 15, 2021 from https:\/\/download.01.org\/intel-sgx\/sgx-linux\/2.15\/docs\/."},{"issue":"086","key":"e_1_3_3_15_2","first-page":"1","article-title":"Intel SGX explained.","volume":"2016","author":"Costan V.","year":"2016","unstructured":"V. Costan and S. Devadas. 2016. Intel SGX explained. IACR Cryptology ePrint Archive 2016, 086 (2016), 1\u2013118.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_3_16_2","unstructured":"Dheeru Dua and Casey Graff. 2017. UCI Machine Learning Repository. Retrieved November 15 2021 from http:\/\/archive.ics.uci.edu\/ml."},{"key":"e_1_3_3_17_2","article-title":"CVE-2008-1367: Kernel doesn\u2019t clear DF for signal handlers","author":"Edge J.","year":"2008","unstructured":"J. Edge. 2008. CVE-2008-1367: Kernel doesn\u2019t clear DF for signal handlers. https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=437312 Retrieved fromhttps:\/\/bugzilla.redhat.com\/show_bug.cgi?id=437312.","journal-title":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=437312"},{"key":"e_1_3_3_18_2","article-title":"Calling conventions for different C++ compilers and operating systems","author":"Fog A.","year":"2018","unstructured":"A. Fog. 2018. Calling conventions for different C++ compilers and operating systems. Retrieved November 15, 2021 from http:\/\/www.agner.org\/optimize\/calling_conventions.pdfhttp:\/\/www.agner.org\/optimize\/calling_conventions.pdf.","journal-title":"http:\/\/www.agner.org\/optimize\/calling_conventions.pdf"},{"key":"e_1_3_3_19_2","article-title":"Fortanix Enclave Development Platform \u2014 Rust EDP","year":"2019","unstructured":"Fortanix. 2019. Fortanix Enclave Development Platform \u2014 Rust EDP. Retrieved November 15, 2021 from https:\/\/edp.fortanix.com\/.","journal-title":"https:\/\/edp.fortanix.com\/"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813677"},{"key":"e_1_3_3_21_2","article-title":"GCC, the GNU Compiler Collection","author":"Foundation Free Software","year":"2020","unstructured":"Free Software Foundation. 2020. GCC, the GNU Compiler Collection. Retrieved November 15, 2021 from https:\/\/gcc.gnu.org\/.","journal-title":"https:\/\/gcc.gnu.org\/"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.5555\/3358807.3358855"},{"key":"e_1_3_3_23_2","article-title":"Asylo: An open and flexible framework for enclave applications","year":"2019","unstructured":"Google. 2019. Asylo: An open and flexible framework for enclave applications. Retrieved November 15, 2021 from https:\/\/asylo.dev\/.","journal-title":"https:\/\/asylo.dev\/"},{"key":"e_1_3_3_24_2","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/978-3-319-94496-8_4","volume-title":"Proceedings of the International Symposium on Engineering Secure Software and Systems","author":"Gyselinck Jago","year":"2018","unstructured":"Jago Gyselinck, Jo Van Bulck, Frank Piessens, and Raoul Strackx. 2018. Off-limits: Abusing legacy x86 memory segmentation to spy on enclaved execution. In Proceedings of the International Symposium on Engineering Secure Software and Systems. Springer, 44\u201360."},{"key":"e_1_3_3_25_2","article-title":"Data-in-use protection on IBM cloud","unstructured":"IBM. [n.d.]. Data-in-use protection on IBM cloud. Retrieved November 15, 2021 from https:\/\/www.ibm.com\/blogs\/bluemix\/2017\/12\/data-use-protection-ibm-cloud-ibm-intel-fortanix-partner-keep-enterprises-secure-core\/.","journal-title":"https:\/\/www.ibm.com\/blogs\/bluemix\/2017\/12\/data-use-protection-ibm-cloud-ibm-intel-fortanix-partner-keep-enterprises-secure-core\/"},{"key":"e_1_3_3_26_2","article-title":"Intel Software Guard Extensions \u2013 Get Started with the SDK","author":"Corporation Intel","year":"2019","unstructured":"Intel Corporation. 2019. Intel Software Guard Extensions \u2013 Get Started with the SDK. Retrieved November 15, 2021 from https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html.","journal-title":"https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html"},{"key":"e_1_3_3_27_2","volume-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual \u2013 Combined Volumes","author":"Corporation Intel","year":"2020","unstructured":"Intel Corporation. 2020. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual \u2013 Combined Volumes. Reference no. 325462-062US. Retrieved November 15, 2021 from https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/software-guard-extensions\/get-started.html."},{"key":"e_1_3_3_28_2","unstructured":"Andrej Karpathy. 2014. Convnetjs: Deep learning in your browser (2014). Retrieved November 15 2021 from http:\/\/cs.stanford.edu\/people\/karpathy\/convnetjs."},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378486"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241231"},{"key":"e_1_3_3_32_2","article-title":"Leaking uninitialized secure enclave memory via structure padding","author":"Lee S.","year":"2017","unstructured":"S. Lee and T. Kim. 2017. Leaking uninitialized secure enclave memory via structure padding. arXiv preprint arXiv:1710.09061. Retrieved from https:\/\/arxiv.org\/abs\/1710.09061.","journal-title":"arXiv preprint arXiv:1710.09061"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241233"},{"key":"e_1_3_3_34_2","first-page":"30","volume-title":"Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","author":"Liu Jingbin","year":"2020","unstructured":"Jingbin Liu, Yu Qin, and Dengguo Feng. 2020. SeRoT: A secure runtime system on trusted execution environments. In Proceedings of the 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 30\u201337."},{"key":"e_1_3_3_35_2","article-title":"System v application binary interface","author":"Lu H. J.","year":"2015","unstructured":"H. J. Lu, David L Kreitzer, Milind Girkar, and Zia Ansari. 2015. System v application binary interface. Intel386 Architecture Processor Supplement, Version 1.1 (7 December 2015).","journal-title":"Intel386 Architecture Processor Supplement, Version 1.1"},{"key":"e_1_3_3_36_2","volume-title":"Proceedings of the NDSS 2017","author":"Machiry A.","year":"2017","unstructured":"A. Machiry, E. Gustafson, C. Spensky, C. Salls, N. Stephens, R. Wang, A. Bianchi, Y. Ryn Choe, C. Kruegel, and G. Vigna. 2017. BOOMERANG: Exploiting the semantic gap in trusted execution environments. In Proceedings of the NDSS 2017."},{"key":"e_1_3_3_37_2","doi-asserted-by":"crossref","unstructured":"P. Maene J. G\u00f6tzfried R. de Clercq T. M\u00fcller F. Freiling and I. Verbauwhede. 2018. Hardware-based trusted computing architectures for isolation and attestation. IEEE Transactions on Computers 67 3 (2018) 361\u2013374. DOI:10.1109\/TC.2017.2647955","DOI":"10.1109\/TC.2017.2647955"},{"key":"e_1_3_3_38_2","unstructured":"Microsoft. 2017. Retrieved November 15 2021 from https:\/\/azure.microsoft.com\/en-us\/blog\/introducing-azure-confidential-computing\/."},{"key":"e_1_3_3_39_2","article-title":"Open Enclave SDK","year":"2019","unstructured":"Microsoft. 2019. Open Enclave SDK. Retrieved November 15, 2021 from https:\/\/openenclave.io\/sdk\/.","journal-title":"https:\/\/openenclave.io\/sdk\/"},{"key":"e_1_3_3_40_2","article-title":"Microsoft Visual C++","author":"Corporation Microsoft","year":"2020","unstructured":"Microsoft Corporation. 2020. Microsoft Visual C++. Retrieved November 15, 2021 from https:\/\/docs.microsoft.com\/en-us\/cpp\/.","journal-title":"https:\/\/docs.microsoft.com\/en-us\/cpp\/"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489239"},{"key":"e_1_3_3_42_2","volume-title":"Proceedings of the 41th IEEE Symposium on Security and Privacy","author":"Murdock Kit","year":"2020","unstructured":"Kit Murdock, David Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. 2020. Plundervolt: Software-based fault injection attacks against Intel SGX. In Proceedings of the 41th IEEE Symposium on Security and Privacy."},{"key":"e_1_3_3_43_2","article-title":"Open Portable Trusted Execution Environment","author":"Linaro OP-TEE c\/o","year":"2019","unstructured":"OP-TEE c\/o Linaro. 2019. Open Portable Trusted Execution Environment. Retrieved November 15, 2021 from https:\/\/www.op-tee.org\/.","journal-title":"https:\/\/www.op-tee.org\/"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3291047"},{"key":"e_1_3_3_45_2","article-title":"SGX-LKL: Securing the host OS interface for trusted execution","author":"Priebe Christian","year":"2019","unstructured":"Christian Priebe, Divya Muthukumaran, Joshua Lind, Huanzhou Zhu, Shujie Cui, Vasily A Sartakov, and Peter Pietzuch. 2019. SGX-LKL: Securing the host OS interface for trusted execution. arXiv:1908.11143. Retrieved from https:\/\/arxiv.org\/abs\/1908.11143.","journal-title":"arXiv:1908.11143"},{"key":"e_1_3_3_46_2","article-title":"Apache Teaclave (Incubating)","author":"Foundation The Apache Software","year":"2020","unstructured":"The Apache Software Foundation. 2020. Apache Teaclave (Incubating). Retrieved from https:\/\/teaclave.incubator.apache.org\/.","journal-title":"https:\/\/teaclave.incubator.apache.org\/"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241142"},{"key":"e_1_3_3_48_2","volume-title":"Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P)","author":"Tramer Florian","year":"2017","unstructured":"Florian Tramer, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, and Elaine Shi. 2017. Sealed-glass proofs: Using transparent enclaves to prove and sell knowledge. In Proceedings of the 2nd IEEE European Symposium on Security and Privacy (Euro S&P). IEEE."},{"key":"e_1_3_3_49_2","article-title":"Graphene-SGX library OS \u2014 A library OS for Linux multi-process applications with Intel SGX support","author":"Tsai Chia-Che","year":"2017","unstructured":"Chia-Che Tsai, Donald Porter, et\u00a0al. 2017. Graphene-SGX library OS \u2014 A library OS for Linux multi-process applications with Intel SGX support. Retrieved November 15, 2021 from https:\/\/github.com\/oscarlab\/graphene.","journal-title":"https:\/\/github.com\/oscarlab\/graphene"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.5555\/3154690.3154752"},{"key":"e_1_3_3_51_2","unstructured":"Sami Vaarala. 2020. Duktape embeddable javascript engine. Retrieved from URL https:\/\/duktape.org\/. (2020)."},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.5555\/3277203.3277277"},{"key":"e_1_3_3_53_2","volume-title":"Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P\u201920)","author":"Bulck Jo Van","year":"2020","unstructured":"Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yarom Yuval, Berk Sunar, Daniel Gruss, and Frank Piessens. 2020. LVI: Hijacking transient execution through microarchitectural load value injection. In Proceedings of the 41st IEEE Symposium on Security and Privacy (S&P\u201920)."},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363206"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_3_56_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-319-71237-6_6","volume-title":"Proceedings of the Asian Symposium on Programming Languages and Systems","author":"Ginkel N. van","year":"2017","unstructured":"N. van Ginkel, R. Strackx, and F. Piessens. 2017. Automatically generating secure wrappers for SGX enclaves from separation logic specifications. In Proceedings of the Asian Symposium on Programming Languages and Systems. 105\u2013123."},{"key":"e_1_3_3_57_2","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/SP.2018.00038","volume-title":"Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP)","author":"Wang Binghui","year":"2018","unstructured":"Binghui Wang and Neil Zhenqiang Gong. 2018. Stealing hyperparameters in machine learning. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 36\u201352."},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354241"},{"key":"e_1_3_3_59_2","article-title":"The RISC-V instruction set manual, volume I: Unprivileged ISA, document version 20191213","author":"Waterman Andrew","year":"2019","unstructured":"Andrew Waterman and Krste Asanovic. 2019. The RISC-V instruction set manual, volume I: Unprivileged ISA, document version 20191213. RISC-V Foundation (December 2019).","journal-title":"RISC-V Foundation"},{"key":"e_1_3_3_60_2","volume-title":"NDSS 2019","author":"Weiser S.","year":"2019","unstructured":"S. Weiser, M. Werner, F. Brasser, M. Malenko, S. Mangard, and A.-Reza Sadeghi. 2019. TIMBER-V: Tag-isolated memory bringing fine-grained enclaves to RISC-V. In NDSS 2019."},{"key":"e_1_3_3_61_2","unstructured":"Wikipedia contributors. 2020. Double-precision floating-point format \u2014 Wikipedia The Free Encyclopedia. Retrieved November 15 2021 from https:\/\/en.wikipedia.org\/w\/index.php?title=Double-precision_floating-point_format&oldid=960696001[Online; accessed 16-June-2020]."},{"key":"e_1_3_3_62_2","unstructured":"Lewis Van Winkle. [n.d.]. Genann Neural Networks Library. Retrieved November 15 2021 from https:\/\/github.com\/codeplea\/genann."},{"key":"e_1_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_3_64_2","first-page":"2003","volume-title":"Proceedings of the 29th  \\lbrace USENIX\\rbrace  Security Symposium ( \\lbrace USENIX\\rbrace  Security 20)","author":"Yan Mengjia","year":"2020","unstructured":"Mengjia Yan, Christopher W Fletcher, and Josep Torrellas. 2020. Cache telepathy: Leveraging shared resource attacks to learn \\lbrace DNN\\rbrace architectures. In Proceedings of the 29th \\lbrace USENIX\\rbrace Security Symposium ( \\lbrace USENIX\\rbrace Security 20). 2003\u20132020."}],"container-title":["Digital Threats: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:20Z","timestamp":1750183760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491264"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,8]]},"references-count":63,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,6,30]]}},"alternative-id":["10.1145\/3491264"],"URL":"https:\/\/doi.org\/10.1145\/3491264","relation":{},"ISSN":["2692-1626","2576-5337"],"issn-type":[{"value":"2692-1626","type":"print"},{"value":"2576-5337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,8]]},"assertion":[{"value":"2021-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}