{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:46:57Z","timestamp":1773193617573,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/V012134\/1,EP\/V000225\/1"],"award-info":[{"award-number":["EP\/V012134\/1,EP\/V000225\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EU H2020","award":["825377,871793,758815"],"award-info":[{"award-number":["825377,871793,758815"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507759","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"467-482","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["FlexOS: towards flexible OS isolation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9547-7458","authenticated-orcid":false,"given":"Hugo","family":"Lefeuvre","sequence":"first","affiliation":[{"name":"University of Manchester, UK"}]},{"given":"Vlad-Andrei","family":"B\u0103doiu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8139-2864","authenticated-orcid":false,"given":"Alexander","family":"Jung","sequence":"additional","affiliation":[{"name":"Lancaster University, UK \/ unikraft.io, Germany"}]},{"given":"Stefan Lucian","family":"Teodorescu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Romania"}]},{"given":"Sebastian","family":"Rauch","sequence":"additional","affiliation":[{"name":"KIT, Germany"}]},{"given":"Felipe","family":"Huici","sequence":"additional","affiliation":[{"name":"NEC Laboratories, Germany \/ unikraft.io, Germany"}]},{"given":"Costin","family":"Raiciu","sequence":"additional","affiliation":[{"name":"University Politehnica of Bucharest, Romania \/ Correct Networks, Romania"}]},{"given":"Pierre","family":"Olivier","sequence":"additional","affiliation":[{"name":"University of Manchester, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"J. Alves-Foss P. Oman C. Taylor and S. Harrison. 2006. The MILS architecture for high-assurance embedded systems. Int. J. Embed. Syst. 2 (2006).","DOI":"10.1504\/IJES.2006.014859"},{"key":"e_1_3_2_1_3_1","volume-title":"Building a Secure System using TrustZone Technology. https:\/\/developer.arm.com\/documentation\/genc009492\/c. Online","author":"Ltd ARM","year":"2021","unstructured":"ARM Ltd. 2009. Building a Secure System using TrustZone Technology. https:\/\/developer.arm.com\/documentation\/genc009492\/c. Online; accessed Jan 24, 2021."},{"key":"e_1_3_2_1_4_1","volume-title":"ARM Morello Program. https:\/\/developer.arm.com\/architectures\/cpu-architecture\/a-profile\/morello. Online","author":"Ltd ARM","year":"2020","unstructured":"ARM Ltd. 2019. ARM Morello Program. https:\/\/developer.arm.com\/architectures\/cpu-architecture\/a-profile\/morello. Online; accessed June 25, 2020."},{"key":"e_1_3_2_1_5_1","volume-title":"Memory Tagging Extension: Enhancing memory safety through architecture. https:\/\/community.arm.com\/developer\/ip-products\/processors\/b\/processors-ip-blog\/posts\/enhancing-memory-safety. Online","author":"Bannister Steve","year":"2020","unstructured":"Steve Bannister. 2019. Memory Tagging Extension: Enhancing memory safety through architecture. https:\/\/community.arm.com\/developer\/ip-products\/processors\/b\/processors-ip-blog\/posts\/enhancing-memory-safety. Online; accessed October 27, 2020."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453111"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920)","author":"Boos Kevin","year":"2020","unstructured":"Kevin Boos, Namitha Liyanage, Ramla Ijaz, and Lin Zhong. 2020. Theseus: an Experiment in Operating System Structure and State Management. In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920). USENIX Association. isbn:978-1-939133-19-9 https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/boos"},{"key":"e_1_3_2_1_8_1","volume-title":"Understanding the Linux Kernel: from I\/O ports to process management. O\u2019Reilly Media","author":"Bovet Daniel P","unstructured":"Daniel P Bovet and Marco Cesati. 2005. Understanding the Linux Kernel: from I\/O ports to process management. O\u2019Reilly Media, Inc."},{"key":"e_1_3_2_1_9_1","volume-title":"Tolerating Malicious Device Drivers in Linux. In 2010 USENIX Annual Technical Conference (ATC\u201910)","author":"Boyd-Wickizer Silas","year":"2010","unstructured":"Silas Boyd-Wickizer and Nickolai Zeldovich. 2010. Tolerating Malicious Device Drivers in Linux. In 2010 USENIX Annual Technical Conference (ATC\u201910). USENIX Association."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Embedded Systems Workshop (WOES\u201999)","author":"Bruno John","year":"1999","unstructured":"John Bruno, Jos\u00e9 Brustoloni, Eran Gabber, Avi Silberschatz, and Christopher Small. 1999. Pebble: A Component-Based Operating System for Embedded Applications. In Proceedings of the Embedded Systems Workshop (WOES\u201999). USENIX Association."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/195792.195795"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451145"},{"key":"e_1_3_2_1_14_1","unstructured":"The CScope contributors. [n. d.]. CScope: developer\u2019s tool for browsing source code. http:\/\/cscope.sourceforge.net\/. Online; accessed December 22 2021."},{"key":"e_1_3_2_1_15_1","volume-title":"Memory protection keys. Linux Weekly News","author":"Corbet Jonathan","year":"2015","unstructured":"Jonathan Corbet. 2015. Memory protection keys. Linux Weekly News (2015). https:\/\/lwn.net\/Articles\/643797\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_1_18_1","volume-title":"IACR Cryptol. ePrint Arch","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX Explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016). https:\/\/eprint.iacr.org\/2016\/086.pdf"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918)","author":"Cutler Cody","year":"2018","unstructured":"Cody Cutler, M. Frans Kaashoek, and Robert T Morris. 2018. The benefits and costs of writing a POSIX kernel in a high-level language. In Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201918). USENIX Association."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694386"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304042"},{"key":"e_1_3_2_1_22_1","volume-title":"Rust for Linux redux. Linux Weekly News","author":"Edge Jack","year":"2021","unstructured":"Jack Edge. 2021. Rust for Linux redux. Linux Weekly News (2021). https:\/\/lwn.net\/Articles\/862018\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Rust heads into the kernel? Linux Weekly News","author":"Edge Jack","year":"2021","unstructured":"Jack Edge. 2021. Rust heads into the kernel? Linux Weekly News (2021). https:\/\/lwn.net\/Articles\/853423\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224076"},{"key":"e_1_3_2_1_25_1","unstructured":"Norman Feske. 2021. Genode Foundations. https:\/\/genode.org\/documentation\/genode-foundations-21-05.pdf."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266642"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566751"},{"key":"e_1_3_2_1_28_1","volume-title":"In Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures.","author":"Golub David B","year":"1992","unstructured":"David B Golub, Daniel P Julin, Richard F Rashid, Richard P Draves, Randall W Dean, Alessandro Forin, Joseph Barrera, Hideyuki Tokuda, Gerald Malan, and David Bohman. 1992. Microkernel operating system architecture and Mach. In In Proceedings of the USENIX Workshop on Micro-Kernels and Other Kernel Architectures."},{"key":"e_1_3_2_1_29_1","volume-title":"Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication. In 2020 USENIX Annual Technical Conference (ATC\u201920)","author":"Gu Jinyu","year":"2020","unstructured":"Jinyu Gu, Xinyue Wu, Wentai Li, Nian Liu, Zeyu Mi, Yubin Xia, and Haibo Chen. 2020. Harmonizing Performance and Isolation in Microkernels with Efficient Intra-kernel Isolation and Communication. In 2020 USENIX Annual Technical Conference (ATC\u201920). USENIX Association. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/gu"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813611"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266660"},{"key":"e_1_3_2_1_32_1","volume-title":"Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (ATC\u201919)","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael L. Scott, Kai Shen, and Mike Marty. 2019. Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (ATC\u201919). USENIX Association. isbn:978-1-939133-03-8 https:\/\/www.usenix.org\/conference\/atc19\/presentation\/hedayati-hodor"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(19980725)28:9%3C901::AID-SPE181%3E3.0.CO;2-7"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151374.1151391"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00071"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_3_2_1_37_1","volume-title":"Intel 64 and IA-32 Architectures Software Developer\u2019s Manual. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html","author":"Intel Corporation","unstructured":"Intel Corporation. 2021. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/intel-sdm.html. Volume 3A, Section 4.6.2."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476886.3477506"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266644"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037736"},{"key":"e_1_3_2_1_41_1","volume-title":"Flexible Operating System Internals: The Design and Implementation of the Anykernel and Rump Kernels","author":"Kantee Antti","unstructured":"Antti Kantee. 2012. Flexible Operating System Internals: The Design and Implementation of the Anykernel and Rump Kernels. http:\/\/urn.fi\/URN:ISBN:978-952-60-4917-5. isbn:978-952-60-4917-5"},{"key":"e_1_3_2_1_42_1","volume-title":"Privman: A Library for Partitioning Applications. In USENIX Annual Technical Conference, FREENIX Track (ATC\u201903)","author":"Kilpatrick Douglas","year":"2003","unstructured":"Douglas Kilpatrick. 2003. Privman: A Library for Partitioning Applications. In USENIX Annual Technical Conference, FREENIX Track (ATC\u201903). https:\/\/www.usenix.org\/legacy\/events\/usenix03\/tech\/freenix03\/kilpatrick.html"},{"key":"e_1_3_2_1_43_1","volume-title":"OSv Optimizing the Operating System for Virtual Machines. In 2014 USENIX Annual Technical Conference (ATC\u201914)","author":"Kivity Avi","year":"2014","unstructured":"Avi Kivity, Dor Laor, Glauber Costa, Pekka Enberg, Nadav HarEl, Don Marti, and Vlad Zolotarov. 2014. OSv Optimizing the Operating System for Virtual Machines. In 2014 USENIX Annual Technical Conference (ATC\u201914). USENIX Association. https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/kivity"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404397.3404443"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456248"},{"key":"e_1_3_2_1_48_1","volume-title":"2018 USENIX Annual Technical Conference (ATC\u201918)","author":"Lawall Julia","year":"2018","unstructured":"Julia Lawall and Gilles Muller. 2018. Coccinelle: 10 years of automated evolution in the Linux kernel. In 2018 USENIX Annual Technical Conference (ATC\u201918)."},{"key":"e_1_3_2_1_49_1","unstructured":"Doug Lea. 1996. A Memory Allocator. http:\/\/gee.cs.oswego.edu\/dl\/html\/malloc.html."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465292"},{"key":"e_1_3_2_1_51_1","volume-title":"Dafny: An automatic program verifier for functional correctness. In International Conference on Logic for Programming Artificial Intelligence and Reasoning","author":"Leino K","year":"2010","unstructured":"K Leino and Rustan M. 2010. Dafny: An automatic program verifier for functional correctness. In International Conference on Logic for Programming Artificial Intelligence and Reasoning. Springer. https:\/\/link.springer.com\/chapter\/10.1007"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.536480"},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201904)","author":"LeVasseur Joshua","year":"2004","unstructured":"Joshua LeVasseur, Volkmar Uhlig, Jan Stoess, and Stefan G\u00f6tz. 2004. Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201904). USENIX Association."},{"key":"e_1_3_2_1_54_1","volume-title":"Iso-UniK: lightweight multi-process unikernel through memory protection keys. Cybersecurity 3, 1","author":"Li Guanyu","year":"2020","unstructured":"Guanyu Li, Dong Du, and Yubin Xia. 2020. Iso-UniK: lightweight multi-process unikernel through memory protection keys. Cybersecurity 3, 1 (2020)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465277"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, et al. 2018. Meltdown: Reading kernel memory from user space. In Proceedings of the 27th USENIX Security Symposium (USENIX Security\u201918). https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/lipp"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134066"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451167"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40965-6_2"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626311"},{"key":"e_1_3_2_1_62_1","volume-title":"Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201914)","author":"Martins Joao","year":"2014","unstructured":"Joao Martins, Mohamed Ahmed, Costin Raiciu, Vladimir Olteanu, Michio Honda, Roberto Bifulco, and Felipe Huici. 2014. ClickOS and the Art of Network Function Virtualization. In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201914). USENIX Association. isbn:978-1-931971-09-6 https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/martins"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMRTS.2004.1311009"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303946"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489252"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920)","author":"Narayanan Vikram","year":"2020","unstructured":"Vikram Narayanan, Tianjiao Huang, David Detweiler, Dan Appel, Zhaofeng Li, Gerd Zellweger, and Anton Burtsev. 2020. RedLeaf: Isolation and Communication in a Safe Operating System. In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201920). USENIX Association. https:\/\/www.usenix.org\/conference\/osdi20\/presentation\/narayanan-vikram"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522719"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381052.3381316"},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the 10th Workshop on Systems for Post-Moore Architectures","author":"Olivier Pierre","year":"2020","unstructured":"Pierre Olivier, Antonio Barbalace, and Binoy Ravindran. 2020. The Case for Intra-Unikernel Isolation. Proceedings of the 10th Workshop on Systems for Post-Moore Architectures (2020). https:\/\/www.ssrg.ece.vt.edu\/papers\/spma20.pdf"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313808.3313817"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352618"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2007.27"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806586"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446731"},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Schrammel David","year":"2020","unstructured":"David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain Keys Efficient In-Process Isolation for RISC-V and x86. In Proceedings of the 29th USENIX Security Symposium (USENIX Security\u201920). USENIX Association. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/schrammel"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381052.3381326"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133393"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","unstructured":"A. S. Tanenbaum J. N. Herder and H. Bos. 2006. Can we make operating systems reliable and secure? Computer 39 5 (2006). 10.1109\/MC.2006.156","DOI":"10.1109\/MC.2006.156"},{"key":"e_1_3_2_1_79_1","volume-title":"The Kernel Address Sanitizer (KASAN). https:\/\/www.kernel.org\/doc\/html\/v5.10\/dev-tools\/kasan.html. Online","author":"Kernel Development Community The Linux","year":"2021","unstructured":"The Linux Kernel Development Community. 2020. The Kernel Address Sanitizer (KASAN). https:\/\/www.kernel.org\/doc\/html\/v5.10\/dev-tools\/kasan.html. Online; accessed Jan, 25 2021."},{"key":"e_1_3_2_1_80_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In Proceedings of the 28th USENIX Security Symposium (USENIX Security\u201919). USENIX Association. isbn:978-1-939133-06-9 https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vahldiek-oberwagner"},{"key":"e_1_3_2_1_81_1","volume-title":"Richard Grisenthwaite, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, Simon W Moore, Steven J. Murdoch, Kyndylan Nienhuis","author":"Watson Robert NM","year":"2021","unstructured":"Robert NM Watson, Peter G Neumann, Jonathan Woodruff, Michael Roe, Hesham Almatary, Jonathan Anderson, John Baldwin, David Chisnall, Jessica Clarke, Brooks Davis, Lee Eisen, Nathaniel Wesley Filardo, Richard Grisenthwaite, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, Simon W Moore, Steven J. Murdoch, Kyndylan Nienhuis, Robert Norton, Alex Richardson, Peter Rugg, Peter Sewell, Stacey Son, and Hongyan Xia. 2021. Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture (Version 8). Technical Report. University of Cambridge. https:\/\/www.cl.cam.ac.uk\/techreports\/UCAM-CL-TR-951.pdf"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_2_1_84_1","volume-title":"KylinX: A Dynamic Library Operating System for Simplified and Efficient Cloud Virtualization. In 2018 USENIX Annual Technical Conference (ATC\u201918)","author":"Zhang Yiming","year":"2018","unstructured":"Yiming Zhang, Jon Crowcroft, Dongsheng Li, Chengfen Zhang, Huiba Li, Yaozheng Wang, Kai Yu, Yongqiang Xiong, and Guihai Chen. 2018. KylinX: A Dynamic Library Operating System for Simplified and Efficient Cloud Virtualization. In 2018 USENIX Annual Technical Conference (ATC\u201918). USENIX Association. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/zhang-yiming"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Lausanne Switzerland","acronym":"ASPLOS '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507759","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:40Z","timestamp":1750191100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":83,"alternative-id":["10.1145\/3503222.3507759","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507759","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}