{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:09:51Z","timestamp":1755997791567,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T00:00:00Z","timestamp":1645488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1763743, 1908488, 2028851, 2119069"],"award-info":[{"award-number":["1763743, 1908488, 2028851, 2119069"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,28]]},"DOI":"10.1145\/3503222.3507771","type":"proceedings-article","created":{"date-parts":[[2022,2,22]],"date-time":"2022-02-22T20:49:01Z","timestamp":1645562941000},"page":"98-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["CARAT CAKE: replacing paging via compiler\/kernel cooperation"],"prefix":"10.1145","author":[{"given":"Brian","family":"Suchy","sequence":"first","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Souradip","family":"Ghosh","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Drew","family":"Kersnar","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Siyuan","family":"Chai","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Zhen","family":"Huang","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Aaron","family":"Nelson","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Michael","family":"Cuevas","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Alex","family":"Bernat","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Gaurav","family":"Chaudhary","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Nikos","family":"Hardavellas","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Simone","family":"Campanoni","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]},{"given":"Peter","family":"Dinda","sequence":"additional","affiliation":[{"name":"Northwestern University, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. What is eBPF? an introduction and deep dive into the EBPF technology. https:\/\/ebpf.io\/what-is-ebpf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178597.1178599"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080209"},{"key":"e_1_3_2_1_4_1","volume-title":"Optimizing the TLB Shootdown Algorithm with Page Access Tracking. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Amit Nadav","year":"2017","unstructured":"Nadav Amit. 2017. Optimizing the TLB Shootdown Algorithm with Page Access Tracking. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). USENIX Association, Santa Clara, CA. 27\u201339. isbn:978-1-931971-38-6 https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/amit"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386028"},{"key":"e_1_3_2_1_6_1","unstructured":"Apple Corporation. 1985. Inside Macintosh. Addison-Wesley."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2017.38"},{"key":"e_1_3_2_1_8_1","unstructured":"D. Bailey E. Barszcz J. Barton D. Browning R. Carter L. Dagum R. Fatoohi S. Fineberg P. Frederickson T. Lasinksi R. Schreiber H. Simon V. Venkatakrishnan and S. Weeratunga. 1994. The NAS Parallel Benchmarks (NAS 1). NASA."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485943"},{"volume-title":"Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA \u201912)","author":"Basu Arkaprava","key":"e_1_3_2_1_10_1","unstructured":"Arkaprava Basu, Mark D. Hill, and Michael M. Swift. 2012. Reducing Memory Reference Energy with Opportunistic Virtual Caching. In Proceedings of the 39th Annual International Symposium on Computer Architecture (ISCA \u201912). 297\u2013308."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337194"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.3711640"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2018.032271063"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2011.5749717"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2009.26"},{"volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Bittman Daniel","key":"e_1_3_2_1_17_1","unstructured":"Daniel Bittman, Peter Alvaro, Pankaj Mehra, Darrell D. E. Long, and Ethan L. Miller. 2020. Twizzler: a Data-Centric OS for Non-Volatile Memory. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). USENIX Association, 65\u201380. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/bittman"},{"key":"e_1_3_2_1_18_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 1\u201319","author":"Boos Kevin","year":"2020","unstructured":"Kevin Boos, Namitha Liyanage, Ramla Ijaz, and Lin Zhong. 2020. Theseus: an Experiment in Operating System Structure and State Management. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 1\u201319."},{"volume-title":"The Descriptor\u2013A definition of the B5000 Information Processing System","author":"Burroughs Corporation","key":"e_1_3_2_1_19_1","unstructured":"Burroughs Corporation. 1961. The Descriptor\u2013A definition of the B5000 Information Processing System. Burroughs Corporation, Detroit, MI. USA."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665705"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093337.3037725"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694367"},{"key":"e_1_3_2_1_24_1","unstructured":"KDE Open Source Community. 1998. The WebKit Open Source Project. https:\/\/webkit.org\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Efficient Address Translation for Architectures with Multiple Page Sizes. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS).","author":"Cox Guilherme","year":"2017","unstructured":"Guilherme Cox and Abhishek Bhattacharjee. 2017. Efficient Address Translation for Architectures with Multiple Page Sizes. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2654822.2541986"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304042"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI","author":"Gregory","year":"2018","unstructured":"Gregory J. Duck and Roland H. C. Yap. 2018. EffectiveSan: Type and Memory Error Detection Using Dynamically Typed C\/C++. In Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2018)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/566408.566471"},{"volume-title":"Proceedings of the 2005 International Symposium on Low Power Electronics and Design (ISLPED \u201905)","author":"Fan Dongrui","key":"e_1_3_2_1_30_1","unstructured":"Dongrui Fan, Zhimin Tang, Hailin Huang, and Guang R. Gao. 2005. An Energy Efficient TLB Design Methodology. In Proceedings of the 2005 International Symposium on Low Power Electronics and Design (ISLPED \u201905). 351\u2013356."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00098"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.10"},{"key":"e_1_3_2_1_33_1","unstructured":"[n.d.]. Native Client. https:\/\/developer.chrome.com\/native-client"},{"key":"e_1_3_2_1_34_1","unstructured":"Andrei Gorine and Alexander Krivolapov. [n.d.]. A Kernel Mode Database System for High Performance Applications."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749264"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892242.2892255"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2018.00041"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173194"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273032"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_3_2_1_42_1","unstructured":"SRI International Ian A. Mason. 2018. https:\/\/github.com\/SRI-CSL\/gllvm"},{"key":"e_1_3_2_1_43_1","unstructured":"H. Jin M. Frumkin and J. Yan. 1999. The Open MP Implementation of NAS Parallel Benchmarks and Its Performance (NAS 3). NASA."},{"volume-title":"Proceedings of the 2017 International Symposium on Code Generation and Optimization (CGO \u201917)","author":"Johnson Nick P.","key":"e_1_3_2_1_44_1","unstructured":"Nick P. Johnson, Jordan Fix, Stephen R. Beard, Taewook Oh, Thomas B. Jablin, and David I. August. 2017. A Collaborative Dependence Analysis Framework. In Proceedings of the 2017 International Symposium on Code Generation and Optimization (CGO \u201917). IEEE Press, Piscataway, NJ, USA. 148\u2013159. isbn:978-1-5090-4931-8 http:\/\/dl.acm.org\/citation.cfm?id=3049832.3049849"},{"volume-title":"Proceedings of the 1997 International Symposium on Low Power Electronics and Design (ISLPED \u201997)","author":"Juan Toni","key":"e_1_3_2_1_45_1","unstructured":"Toni Juan, Tomas Lang, and Juan J. Navarro. 1997. Reducing TLB Power Requirements. In Proceedings of the 1997 International Symposium on Low Power Electronics and Design (ISLPED \u201997). 196\u2013201."},{"volume-title":"Proceedings of the 35th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 185\u2013196","author":"Kadayif I.","key":"e_1_3_2_1_46_1","unstructured":"I. Kadayif, A. Sivasubramaniam, M. Kandemir, G. Kandiraju, and G. Chen. 2002. Generating physical addresses directly for saving instruction TLB energy. In Proceedings of the 35th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO). 185\u2013196."},{"volume-title":"Proceedings of the 35th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 35)","author":"Kadayif I.","key":"e_1_3_2_1_47_1","unstructured":"I. Kadayif, A. Sivasubramaniam, M. Kandemir, G. Kandiraju, and G. Chen. 2002. Generating Physical Addresses Directly for Saving Instruction TLB Energy. In Proceedings of the 35th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 35). 185\u2013196."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446100"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178372.3179519"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"T. Kilburn D. B. G. Edwards M. J. Lanigan and F. H. Sumner. 1962. One-Level Storage System. April.","DOI":"10.1109\/TEC.1962.5219356"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/365628.365655"},{"key":"e_1_3_2_1_52_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P\u201919)","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In 40th IEEE Symposium on Security and Privacy (S&P\u201919)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168811"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"volume-title":"Capability-Based Computer Systems","author":"Levy Hank","key":"e_1_3_2_1_56_1","unstructured":"Hank Levy. 1984. Capability-Based Computer Systems. Digital Press."},{"key":"e_1_3_2_1_57_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Lipp Moritz","year":"2018","unstructured":"Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. 2018. Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458817.3476183"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451167"},{"key":"e_1_3_2_1_60_1","volume-title":"Position Paper: Defending Direct Memory Access with CHERI Capabilities.","author":"Markettos A Theodore","year":"2020","unstructured":"A Theodore Markettos, John Baldwin, Ruslan Bukin, Peter G Neumann, Simon W Moore, and Robert NM Watson. 2020. Position Paper: Defending Direct Memory Access with CHERI Capabilities."},{"key":"e_1_3_2_1_61_1","volume-title":"NOELLE Offers Empowering LLVM Extensions. In International Symposium on Code Generation and Optimization, 2022. CGO 2022..","author":"Matni Angelo","year":"2022","unstructured":"Angelo Matni, Enrico Armenio Deiana, Yian Su, Lukas Gross, Souradip Ghosh, Sotiris Apostolakis, Ziyang Xu, Zujun Tan, Ishita Chaturvedi, David I. August, and Simone Campanoni. 2022. NOELLE Offers Empowering LLVM Extensions. In International Symposium on Code Generation and Optimization, 2022. CGO 2022.."},{"key":"e_1_3_2_1_62_1","volume-title":"10th $USENIX$ Workshop on the Theory and Practice of Provenance (TaPP","author":"Mazzinghi Alfredo","year":"2018","unstructured":"Alfredo Mazzinghi, Ripduman Sohan, and Robert NM Watson. 2018. Pointer provenance in a capability architecture. In 10th $USENIX$ Workshop on the Theory and Practice of Provenance (TaPP 2018)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290380"},{"key":"e_1_3_2_1_64_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 21\u201339","author":"Narayanan Vikram","year":"2020","unstructured":"Vikram Narayanan, Tianjiao Huang, David Detweiler, Dan Appel, Zhaofeng Li, Gerd Zellweger, and Anton Burtsev. 2020. RedLeaf: Isolation and Communication in a Safe Operating System. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 21\u201339."},{"key":"e_1_3_2_1_65_1","volume-title":"Proof-carrying Code. In Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages (POPL","author":"Necula George","year":"1997","unstructured":"George Necula. 1997. Proof-carrying Code. In Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages (POPL 1997)."},{"volume-title":"School of Computer Science","author":"Necula George","key":"e_1_3_2_1_66_1","unstructured":"George Necula and Peter Lee. 1996. Proof-Carrying Code. School of Computer Science, Carnegie Mellon University."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238781"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Peter G Neumann. 2018. Fundamental trustworthiness principles. New Solutions for Cybersecurity.","DOI":"10.7551\/mitpress\/11636.003.0009"},{"key":"e_1_3_2_1_69_1","volume-title":"University of Versailles Saint Quentin en Yvlines","author":"Omni OpenMP Compiler Group","year":"2014","unstructured":"Omni OpenMP Compiler Group, University of Versailles Saint Quentin en Yvlines. 2014. NAS Parallel Benchmarks 3.0\u2014Unofficial OpenMP C Version. https:\/\/github.com\/benchmark-subsetting\/NPB3.0-omp-C"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2015.30"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00026"},{"volume-title":"Programming Windows","author":"Petzold Charles","key":"e_1_3_2_1_72_1","unstructured":"Charles Petzold. 1988. Programming Windows. Microsoft Press."},{"volume-title":"Proceedings of the 16th ACM Great Lakes Symposium on VLSI (GLSVLSI \u201906)","author":"Puttaswamy Kiran","key":"e_1_3_2_1_73_1","unstructured":"Kiran Puttaswamy and Gabriel H. Loh. 2006. Thermal Analysis of a 3D Die-stacked High-performance Microprocessor. In Proceedings of the 16th ACM Great Lakes Symposium on VLSI (GLSVLSI \u201906). 19\u201324."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.273.0237"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3460969"},{"key":"e_1_3_2_1_76_1","unstructured":"Tristan Ravitch. 2016. https:\/\/github.com\/travitch\/whole-program-llvm"},{"key":"e_1_3_2_1_77_1","unstructured":"David Sehr Robert Muth Cliff L Biffle Victor Khimenko Egor Pasko Bennet Yee Karl Schimpf and Brad Chen. 2010. Adapting software fault isolation to contemporary CPU architectures."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2018.00025"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3828.3835"},{"volume-title":"Keynote at the 44th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO 44).","author":"Sodani Avinash","key":"e_1_3_2_1_80_1","unstructured":"Avinash Sodani. 2011. Race to Exascale: Opportunities and Challenges. In Keynote at the 44th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO 44)."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385987"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337300"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53413-7_24"},{"key":"e_1_3_2_1_86_1","unstructured":"Hajime Tazaki. [n.d.]. An introduction of library operating system for Linux (LibOS)."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2011.65"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.84"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358288"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307650.3322223"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079856.3080211"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446066"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772985"},{"key":"e_1_3_2_1_96_1","volume-title":"Myers","author":"Zagieboylo Drew","year":"2020","unstructured":"Drew Zagieboylo, G. Edward Suh, and Andrew C. Myers. 2020. The Cost of Software-Based Memory Management Without Virtual Memory. CoRR, abs\/2009.06789 (2020), arxiv:2009.06789. arxiv:2009.06789"}],"event":{"name":"ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Lausanne Switzerland","acronym":"ASPLOS '22"},"container-title":["Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507771","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507771","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503222.3507771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:49Z","timestamp":1750188649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503222.3507771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,22]]},"references-count":94,"alternative-id":["10.1145\/3503222.3507771","10.1145\/3503222"],"URL":"https:\/\/doi.org\/10.1145\/3503222.3507771","relation":{},"subject":[],"published":{"date-parts":[[2022,2,22]]},"assertion":[{"value":"2022-02-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}