{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T17:29:50Z","timestamp":1777138190720,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T00:00:00Z","timestamp":1648425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100015591","name":"Rose Hills Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015591","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["W912CG-21-C-0020, W31P4Q-20-C-0052"],"award-info":[{"award-number":["W912CG-21-C-0020, W31P4Q-20-C-0052"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,3,28]]},"DOI":"10.1145\/3492321.3519582","type":"proceedings-article","created":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T14:28:18Z","timestamp":1648477698000},"page":"132-148","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["PKRU-safe"],"prefix":"10.1145","author":[{"given":"Paul","family":"Kirth","sequence":"first","affiliation":[{"name":"University of California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mitchel","family":"Dickerson","sequence":"additional","affiliation":[{"name":"University of California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephen","family":"Crane","sequence":"additional","affiliation":[{"name":"Immunant"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Per","family":"Larsen","sequence":"additional","affiliation":[{"name":"Immunant"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[{"name":"University of California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Gens","sequence":"additional","affiliation":[{"name":"University of California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yeoul","family":"Na","sequence":"additional","affiliation":[{"name":"University of California"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stijn","family":"Volckaert","sequence":"additional","affiliation":[{"name":"KU Leuven, Belgium"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Franz","sequence":"additional","affiliation":[{"name":"University of California"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,3,28]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2021. Dromaeo: JavaScript performance testing. https:\/\/wiki.mozilla.org\/Dromaeo.  2021. Dromaeo: JavaScript performance testing. https:\/\/wiki.mozilla.org\/Dromaeo."},{"key":"e_1_3_2_2_2_1","unstructured":"2021. JetStream 2. https:\/\/browserbench.org\/JetStream.  2021. JetStream 2. https:\/\/browserbench.org\/JetStream."},{"key":"e_1_3_2_2_3_1","unstructured":"2021. Kraken Benchmarks. http:\/\/krakenbenchmark.mozilla.org\/.  2021. Kraken Benchmarks. http:\/\/krakenbenchmark.mozilla.org\/."},{"key":"e_1_3_2_2_4_1","unstructured":"2021. Octane Benchmarks. https:\/\/developers.google.com\/octane\/.  2021. Octane Benchmarks. https:\/\/developers.google.com\/octane\/."},{"key":"e_1_3_2_2_5_1","volume-title":"Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS).","author":"Abadi Mart\u00edn","year":"2005","unstructured":"Mart\u00edn Abadi , Mihai Budiu , Ulfar Erlingsson , and Jay Ligatti . 2005 . Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS). Mart\u00edn Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti. 2005. Control-Flow Integrity. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176330"},{"key":"e_1_3_2_2_7_1","volume-title":"Locasto","author":"Bangert Julian","year":"2016","unstructured":"Julian Bangert , Sergey Bratus , Rebecca Shapiro , Jason Reeves , Sean W. Smith , Anna Shubina , Maxwell Koo , and Michael E . Locasto . 2016 . Sections are Types, Linking is Policy : Using the Loader Format for Expressing Programmer Intent. In BlackHat USA. https:\/\/www.blackhat.com\/us-16\/briefings.html#sergey-bratus Julian Bangert, Sergey Bratus, Rebecca Shapiro, Jason Reeves, Sean W. Smith, Anna Shubina, Maxwell Koo, and Michael E. Locasto. 2016. Sections are Types, Linking is Policy: Using the Loader Format for Expressing Programmer Intent. In BlackHat USA. https:\/\/www.blackhat.com\/us-16\/briefings.html#sergey-bratus"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453111"},{"key":"e_1_3_2_2_9_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Belay Adam","year":"2012","unstructured":"Adam Belay , Andrea Bittau , Ali Mashtizadeh , David Terei , David Mazi\u00e8res , and Christos Kozyrakis . 2012 . Dune: Safe User-level Access to Privileged CPU Features . In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12) . USENIX Association, Hollywood, CA, 335--348. https:\/\/www.usenix.org\/conference\/osdi12\/technical-sessions\/presentation\/belay Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi\u00e8res, and Christos Kozyrakis. 2012. Dune: Safe User-level Access to Privileged CPU Features. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). USENIX Association, Hollywood, CA, 335--348. https:\/\/www.usenix.org\/conference\/osdi12\/technical-sessions\/presentation\/belay"},{"key":"e_1_3_2_2_10_1","unstructured":"bi0s. 2019. Writeup for CVE-2019-11707. https:\/\/blog.bi0s.in\/2019\/08\/18\/Pwn\/Browser-Exploitation\/cve-2019-11707-writeup\/.  bi0s. 2019. Writeup for CVE-2019-11707. https:\/\/blog.bi0s.in\/2019\/08\/18\/Pwn\/Browser-Exploitation\/cve-2019-11707-writeup\/."},{"key":"e_1_3_2_2_11_1","volume-title":"5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08)","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau , Petr Marchenko , Mark Handley , and Brad Karp . 2008 . Wedge: Splitting Applications into Reduced-Privilege Compartments . In 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08) . USENIX Association, San Francisco, CA. https:\/\/www.usenix.org\/conference\/nsdi-08\/wedge-splitting-applications-reduced-privilege-compartments Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-Privilege Compartments. In 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08). USENIX Association, San Francisco, CA. https:\/\/www.usenix.org\/conference\/nsdi-08\/wedge-splitting-applications-reduced-privilege-compartments"},{"key":"e_1_3_2_2_12_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Brasser Ferdinand","year":"2017","unstructured":"Ferdinand Brasser , Lucas Davi , David Gens , Christopher Liebchen , and Ahmad-Reza Sadeghi . 2017 . CAn't touch this: Software-only mitigation against Rowhammer attacks targeting kernel memory . In 26th USENIX Security Symposium (USENIX Security 17) . 117--130. Ferdinand Brasser, Lucas Davi, David Gens, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2017. CAn't touch this: Software-only mitigation against Rowhammer attacks targeting kernel memory. In 26th USENIX Security Symposium (USENIX Security 17). 117--130."},{"key":"e_1_3_2_2_13_1","volume-title":"Privtrans: Automatically Partitioning Programs for Privilege Separation. In 13th USENIX Security Symposium (USENIX Security 04)","author":"Brumley David","year":"2004","unstructured":"David Brumley and Dawn Song . 2004 . Privtrans: Automatically Partitioning Programs for Privilege Separation. In 13th USENIX Security Symposium (USENIX Security 04) . USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/privtrans-automatically-partitioning-programs-privilege David Brumley and Dawn Song. 2004. Privtrans: Automatically Partitioning Programs for Privilege Separation. In 13th USENIX Security Symposium (USENIX Security 04). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/privtrans-automatically-partitioning-programs-privilege"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_2_15_1","volume-title":"Non-Control-Data Attacks Are Realistic Threats. In USENIX Security Symposium.","author":"Chen Shuo","year":"2005","unstructured":"Shuo Chen , Jun Xu , Emre Can Sezer , Prachi Gauriar , and Ravishankar K Iyer . 2005 . Non-Control-Data Attacks Are Realistic Threats. In USENIX Security Symposium. Shuo Chen, Jun Xu, Emre Can Sezer, Prachi Gauriar, and Ravishankar K Iyer. 2005. Non-Control-Data Attacks Are Realistic Threats. In USENIX Security Symposium."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.12"},{"key":"e_1_3_2_2_17_1","unstructured":"Chromium. 2019. Chromium Site Isolation. https:\/\/www.chromium.org\/Home\/chromium-security\/site-isolation.  Chromium. 2019. Chromium Site Isolation. https:\/\/www.chromium.org\/Home\/chromium-security\/site-isolation."},{"key":"e_1_3_2_2_18_1","unstructured":"The GNU Compiler Collection. 2021. x86 Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/x86-Options.html.  The GNU Compiler Collection. 2021. x86 Options. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/x86-Options.html."},{"key":"e_1_3_2_2_19_1","volume-title":"PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Connor R. Joseph","year":"2020","unstructured":"R. Joseph Connor , Tyler McDaniel , Jared M. Smith , and Max Schuchard . 2020 . PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 1409--1426. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/connor R. Joseph Connor, Tyler McDaniel, Jared M. Smith, and Max Schuchard. 2020. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1409--1426. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/connor"},{"key":"e_1_3_2_2_20_1","unstructured":"Jonathan Corbet. 2015. Intel Memory Protection Keys. https:\/\/lwn.net\/Articles\/643797\/.  Jonathan Corbet. 2015. Intel Memory Protection Keys. https:\/\/lwn.net\/Articles\/643797\/."},{"key":"e_1_3_2_2_21_1","unstructured":"Webkit Developers. 2021. JetStream2 in depth analysis. https:\/\/browserbench.org\/JetStream\/in-depth.html.  Webkit Developers. 2021. JetStream2 in depth analysis. https:\/\/browserbench.org\/JetStream\/in-depth.html."},{"key":"e_1_3_2_2_22_1","unstructured":"Firefox. 2019. Telemetry\/Experiments - Mozilla Wiki. https:\/\/wiki.mozilla.org\/Telemetry\/Experiments.  Firefox. 2019. Telemetry\/Experiments - Mozilla Wiki. https:\/\/wiki.mozilla.org\/Telemetry\/Experiments."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_11"},{"key":"e_1_3_2_2_25_1","volume-title":"Enclosure: Language-Based Restriction of Untrusted Libraries. Technical Report.","author":"Ghosn Adrien","year":"2021","unstructured":"Adrien Ghosn , Marios Kogias , Mathias Payer , James R Larus , and Edouard Bugnion . 2021 . Enclosure: Language-Based Restriction of Untrusted Libraries. Technical Report. Adrien Ghosn, Marios Kogias, Mathias Payer, James R Larus, and Edouard Bugnion. 2021. Enclosure: Language-Based Restriction of Untrusted Libraries. Technical Report."},{"key":"e_1_3_2_2_26_1","unstructured":"Google Inc. 2021. Sandboxed API. https:\/\/github.com\/google\/sandboxed-api.  Google Inc. 2021. Sandboxed API. https:\/\/github.com\/google\/sandboxed-api."},{"key":"e_1_3_2_2_27_1","volume-title":"Fast Intra-kernel Isolation and Security with IskiOS. In 24th Intl. Symp. on Research in Attacks, Intrusions and Defenses (RAID).","author":"Gravani Sypridoula","year":"2021","unstructured":"Sypridoula Gravani , Mohammad Hedayati , John Criswell , and Michael L Scott . 2021 . Fast Intra-kernel Isolation and Security with IskiOS. In 24th Intl. Symp. on Research in Attacks, Intrusions and Defenses (RAID). Sypridoula Gravani, Mohammad Hedayati, John Criswell, and Michael L Scott. 2021. Fast Intra-kernel Isolation and Security with IskiOS. In 24th Intl. Symp. on Research in Attacks, Intrusions and Defenses (RAID)."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813611"},{"key":"e_1_3_2_2_29_1","volume-title":"Navas","author":"Gurfinkel Arie","year":"2017","unstructured":"Arie Gurfinkel and Jorge A . Navas . 2017 . A Context-Sensitive Memory Model for Verification of C\/C++ Programs. In Static Analysis, Francesco Ranzato (Ed.). Springer International Publishing , Cham, 148--168. Arie Gurfinkel and Jorge A. Navas. 2017. A Context-Sensitive Memory Model for Verification of C\/C++ Programs. In Static Analysis, Francesco Ranzato (Ed.). Springer International Publishing, Cham, 148--168."},{"key":"e_1_3_2_2_30_1","volume-title":"Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati , Spyridoula Gravani , Ethan Johnson , John Criswell , Michael L. Scott , Kai Shen , and Mike Marty . 2019 . Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 489--504. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/hedayati-hodor Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael L. Scott, Kai Shen, and Mike Marty. 2019. Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 489--504. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/hedayati-hodor"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978327"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134064"},{"key":"e_1_3_2_2_35_1","volume-title":"The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization. arXiv e-prints","author":"Im Bumjin","year":"2021","unstructured":"Bumjin Im , Fangfei Yang , Chia-Che Tsai , Michael LeMay , Anjo Vahldiek-Oberwagner , and Nathan Dautenhahn . 2021 . The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization. arXiv e-prints (2021), arXiv-2108. Bumjin Im, Fangfei Yang, Chia-Che Tsai, Michael LeMay, Anjo Vahldiek-Oberwagner, and Nathan Dautenhahn. 2021. The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization. arXiv e-prints (2021), arXiv-2108."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243739"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158154"},{"key":"e_1_3_2_2_38_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Kenjar Zijo","year":"2020","unstructured":"Zijo Kenjar , Tommaso Frassetto , David Gens , Michael Franz , and Ahmad-Reza Sadeghi . 2020 . V0ltpwn: Attacking x86 processor integrity from software . In 29th USENIX Security Symposium (USENIX Security 20) . 1445--1461. Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, and Ahmad-Reza Sadeghi. 2020. V0ltpwn: Attacking x86 processor integrity from software. In 29th USENIX Security Symposium (USENIX Security 20). 1445--1461."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Volodymyr Kuznetzov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2018. Code-pointer integrity. In The Continuing Arms Race: Code-Reuse Attacks and Defenses. 81--116.  Volodymyr Kuznetzov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2018. Code-pointer integrity. In The Continuing Arms Race: Code-Reuse Attacks and Defenses. 81--116.","DOI":"10.1145\/3129743.3129748"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144555.3144562"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276495"},{"key":"e_1_3_2_2_43_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp , Michael Schwarz , Daniel Gruss , Thomas Prescher , Werner Haas , Anders Fogh , Jann Horn , Stefan Mangard , Paul Kocher , Daniel Genkin , 2018 . Meltdown: Reading kernel memory from user space . In 27th USENIX Security Symposium (USENIX Security 18) . 973--990. Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, et al. 2018. Meltdown: Reading kernel memory from user space. In 27th USENIX Security Symposium (USENIX Security 18). 973--990."},{"key":"e_1_3_2_2_44_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Litton James","year":"2016","unstructured":"James Litton , Anjo Vahldiek-Oberwagner , Eslam Elnikety , Deepak Garg , Bobby Bhattacharjee , and Peter Druschel . 2016 . Light-weight contexts: An OS abstraction for safety and performance . In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . 49--64. James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, and Peter Druschel. 2016. Light-weight contexts: An OS abstraction for safety and performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 49--64."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380325"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134066"},{"key":"e_1_3_2_2_47_1","unstructured":"Microsoft. 2006. Data Execution Prevention (DEP). http:\/\/support.microsoft.com\/kb\/875352\/EN-US.  Microsoft. 2006. Data Execution Prevention (DEP). http:\/\/support.microsoft.com\/kb\/875352\/EN-US."},{"key":"e_1_3_2_2_48_1","unstructured":"Matt Miller. 2019. Trends challenges and strategic shifts in the software vulnerability mitigation landscape. https:\/\/github.com\/microsoft\/MSRC-Security-Research\/blob\/master\/presentations\/2019_02_BlueHatIL\/2019_01-BlueHatIL-Trends challenge andshifsinsoftwarevulnerabilitymitigation.pdf.  Matt Miller. 2019. Trends challenges and strategic shifts in the software vulnerability mitigation landscape. https:\/\/github.com\/microsoft\/MSRC-Security-Research\/blob\/master\/presentations\/2019_02_BlueHatIL\/2019_01-BlueHatIL-Trends challenge andshifsinsoftwarevulnerabilitymitigation.pdf."},{"key":"e_1_3_2_2_49_1","unstructured":"Mozilla. 2019. Oxidation. https:\/\/wiki.mozilla.org\/Oxidation.  Mozilla. 2019. Oxidation. https:\/\/wiki.mozilla.org\/Oxidation."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508275"},{"key":"e_1_3_2_2_51_1","volume-title":"Retrofitting Fine Grain Isolation in the Firefox Renderer. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Narayan Shravan","year":"2020","unstructured":"Shravan Narayan , Craig Disselkoen , Tal Garfinkel , Nathan Froyd , Eric Rahm , Sorin Lerner , Hovav Shacham , and Deian Stefan . 2020 . Retrofitting Fine Grain Isolation in the Firefox Renderer. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 699--716. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/narayan Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, and Deian Stefan. 2020. Retrofitting Fine Grain Isolation in the Firefox Renderer. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 699--716. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/narayan"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660281"},{"key":"e_1_3_2_2_53_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Park Soyeon","year":"2019","unstructured":"Soyeon Park , Sangho Lee , Wen Xu , HyunGon Moon , and Taesoo Kim . 2019 . libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK) . In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . USENIX Association, Renton, WA, 241--254. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/park-soyeon Soyeon Park, Sangho Lee, Wen Xu, HyunGon Moon, and Taesoo Kim. 2019. libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). In 2019 USENIX Annual Technical Conference (USENIX ATC 19). USENIX Association, Renton, WA, 241--254. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/park-soyeon"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24262"},{"key":"e_1_3_2_2_55_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Reis Charles","year":"2019","unstructured":"Charles Reis , Alexander Moshchuk , and Nasko Oskov . 2019 . Site isolation: Process separation for web sites within the browser . In 28th USENIX Security Symposium (USENIX Security 19) . 1661--1678. Charles Reis, Alexander Moshchuk, and Nasko Oskov. 2019. Site isolation: Process separation for web sites within the browser. In 28th USENIX Security Symposium (USENIX Security 19). 1661--1678."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17465-1_22"},{"key":"e_1_3_2_2_57_1","unstructured":"Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. In BlackHat USA.  Mark Seaborn and Thomas Dullien. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. In BlackHat USA."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290361"},{"key":"e_1_3_2_2_59_1","unstructured":"Jeff Vander Stoep and Chong Zhang. 2019. Queue the Hardening Enhancements. https:\/\/android-developers.googleblog.com\/2019\/05\/queue-hardening-enhancements.html.  Jeff Vander Stoep and Chong Zhang. 2019. Queue the Hardening Enhancements. https:\/\/android-developers.googleblog.com\/2019\/05\/queue-hardening-enhancements.html."},{"key":"e_1_3_2_2_60_1","volume-title":"Efficient Intra-Process Privilege Enforcement of Memory Regions. arXiv preprint arXiv:2004.04846","author":"Tarkhani Zahra","year":"2020","unstructured":"Zahra Tarkhani and Anil Madhavapeddy . 2020. &mu;Tiles : Efficient Intra-Process Privilege Enforcement of Memory Regions. arXiv preprint arXiv:2004.04846 ( 2020 ). Zahra Tarkhani and Anil Madhavapeddy. 2020. &mu;Tiles: Efficient Intra-Process Privilege Enforcement of Memory Regions. arXiv preprint arXiv:2004.04846 (2020)."},{"key":"e_1_3_2_2_61_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner , Eslam Elnikety , Nuno O. Duarte , Michael Sammler , Peter Druschel , and Deepak Garg . 2019 . ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK) . In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, Santa Clara, CA, 1221--1238. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vahldiek-oberwagner Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1221--1238. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vahldiek-oberwagner"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"crossref","unstructured":"Nikos Vasilakis Ben Karel Nick Roessler Nathan Dautenhahn Andr\u00e9 DeHon and Jonathan M Smith. 2018. BreakApp: Automated Flexible Application Compartmentalization.. In NDSS.  Nikos Vasilakis Ben Karel Nick Roessler Nathan Dautenhahn Andr\u00e9 DeHon and Jonathan M Smith. 2018. BreakApp: Automated Flexible Application Compartmentalization.. In NDSS.","DOI":"10.14722\/ndss.2018.23131"},{"key":"e_1_3_2_2_64_1","volume-title":"European Conference on Computer Systems (EuroSys).","author":"Voulimeneas Alexios","year":"2022","unstructured":"Alexios Voulimeneas , Jonas Vinck , Ruben Mechelinck , and Stijn Volckaert . 2022 . You Shall Not (by)Pass! Practical, Secure, and Fast PKU-based Sandboxing . In European Conference on Computer Systems (EuroSys). Alexios Voulimeneas, Jonas Vinck, Ruben Mechelinck, and Stijn Volckaert. 2022. You Shall Not (by)Pass! Practical, Secure, and Fast PKU-based Sandboxing. In European Conference on Computer Systems (EuroSys)."},{"key":"e_1_3_2_2_65_1","volume-title":"Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA) (USENIX ATC '15). USENIX Association, USA, 361--373","author":"Wang Jun","year":"2015","unstructured":"Jun Wang , Xi Xiong , and Peng Liu . 2015 . Between Mutual Trust and Mutual Distrust: Practical Fine-Grained Privilege Separation in Multithreaded Applications . In Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA) (USENIX ATC '15). USENIX Association, USA, 361--373 . Jun Wang, Xi Xiong, and Peng Liu. 2015. Between Mutual Trust and Mutual Distrust: Practical Fine-Grained Privilege Separation in Multithreaded Applications. In Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA) (USENIX ATC '15). USENIX Association, USA, 361--373."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693091"}],"event":{"name":"EuroSys '22: Seventeenth European Conference on Computer Systems","location":"Rennes France","acronym":"EuroSys '22","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Seventeenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492321.3519582","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492321.3519582","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3492321.3519582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:08Z","timestamp":1750188668000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3492321.3519582"}},"subtitle":["automatically locking down the heap between safe and unsafe languages"],"short-title":[],"issued":{"date-parts":[[2022,3,28]]},"references-count":66,"alternative-id":["10.1145\/3492321.3519582","10.1145\/3492321"],"URL":"https:\/\/doi.org\/10.1145\/3492321.3519582","relation":{},"subject":[],"published":{"date-parts":[[2022,3,28]]},"assertion":[{"value":"2022-03-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}