{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T15:14:39Z","timestamp":1761664479528,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62272442","U1736208","61902374"],"award-info":[{"award-number":["62272442","U1736208","61902374"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3559344","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"2989-3002","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["CETIS"],"prefix":"10.1145","author":[{"given":"Mengyao","family":"Xie","sequence":"first","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Chenggang","family":"Wu","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences, Zhongguancun Laboratory, Beijing, China"}]},{"given":"Yinqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, SUSTech, Research Institute of Trustworthy Autonomous Systems, SUSTech, Shenzhen, China"}]},{"given":"Jiali","family":"Xu","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yuanming","family":"Lai","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yan","family":"Kang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, Beijing, China"}]},{"given":"Zhe","family":"Wang","sequence":"additional","affiliation":[{"name":"SKLP, Institute of Computing Technology, CAS, Zhongguancun Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Symposium on Network and Distributed System Security (NDSS).","author":"Burow Nathan","year":"2018","unstructured":"Nathan Burow , Derrick McKee , Scott A Carr , and Mathias Payer . 2018 . Cfixx: Object type integrity for c virtual dispatch . In Symposium on Network and Distributed System Security (NDSS). Nathan Burow, Derrick McKee, Scott A Carr, and Mathias Payer. 2018. Cfixx: Object type integrity for c virtual dispatch. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00076"},{"key":"e_1_3_2_2_3_1","unstructured":"Chapter 23.1 Introduction to virtual machine extensions. 2019. Intel 64 and IA-32 Architectures Software Developer's Manual.  Chapter 23.1 Introduction to virtual machine extensions. 2019. Intel 64 and IA-32 Architectures Software Developer's Manual."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866370"},{"key":"e_1_3_2_2_5_1","volume-title":"PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Connor R Joseph","year":"2020","unstructured":"R Joseph Connor , Tyler McDaniel , Jared M Smith , and Max Schuchard . 2020 . PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20) . 1409--1426. R Joseph Connor, Tyler McDaniel, Jared M Smith, and Max Schuchard. 2020. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20). 1409--1426."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455775"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134037"},{"key":"e_1_3_2_2_8_1","volume-title":"IMIX: In-Process Memory Isolation EXtension. In USENIX Security.","author":"Frassetto Tommaso","year":"2018","unstructured":"Tommaso Frassetto , Patrick Jauernig , Christopher Liebchen , and Ahmad-Reza Sadeghi . 2018 . IMIX: In-Process Memory Isolation EXtension. In USENIX Security. Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2018. IMIX: In-Process Memory Isolation EXtension. In USENIX Security."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany and Thorsten Holz. 2016. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding. In NDSS.  Robert Gawlik Benjamin Kollenda Philipp Koppe Behrad Garmany and Thorsten Holz. 2016. Enabling Client-Side Crash-Resistance to Overcome Diversification and Information Hiding. In NDSS.","DOI":"10.14722\/ndss.2016.23262"},{"key":"e_1_3_2_2_10_1","unstructured":"Google. 2017. The JavaScript Benchmark Suite for the modern web. http:\/\/chromium.github.io\/octane\/.  Google. 2017. The JavaScript Benchmark Suite for the modern web. http:\/\/chromium.github.io\/octane\/."},{"key":"e_1_3_2_2_11_1","volume-title":"IskiOS: Lightweight defense against kernel-level code-reuse attacks. arXiv preprint arXiv:1903.04654","author":"Gravani Spyridoula","year":"2019","unstructured":"Spyridoula Gravani , Mohammad Hedayati , John Criswell , and Michael L Scott . 2019. IskiOS: Lightweight defense against kernel-level code-reuse attacks. arXiv preprint arXiv:1903.04654 ( 2019 ). Spyridoula Gravani, Mohammad Hedayati, John Criswell, and Michael L Scott. 2019. IskiOS: Lightweight defense against kernel-level code-reuse attacks. arXiv preprint arXiv:1903.04654 (2019)."},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the IEEE international symposium on secure software engineering","volume":"1","author":"Halfond William G","year":"2006","unstructured":"William G Halfond , Jeremy Viegas , Alessandro Orso , 2006 . A classification of SQL-injection attacks and countermeasures . In Proceedings of the IEEE international symposium on secure software engineering , Vol. 1 . IEEE, 13--15. William G Halfond, Jeremy Viegas, Alessandro Orso, et al. 2006. A classification of SQL-injection attacks and countermeasures. In Proceedings of the IEEE international symposium on secure software engineering, Vol. 1. IEEE, 13--15."},{"key":"e_1_3_2_2_13_1","volume-title":"Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In USENIX ATC.","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati , Spyridoula Gravani , Ethan Johnson , John Criswell , Michael L. Scott , Kai Shen , and Mike Marty . 2019 . Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In USENIX ATC. Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael L. Scott, Kai Shen, and Mike Marty. 2019. Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In USENIX ATC."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.62"},{"key":"e_1_3_2_2_15_1","unstructured":"Intel. 2020. Intel 64 and IA-32 Architectures Software Developer's Manual.  Intel. 2020. Intel 64 and IA-32 Architectures Software Developer's Manual."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243739"},{"key":"#cr-split#-e_1_3_2_2_17_1.1","doi-asserted-by":"crossref","unstructured":"Koen Koning Xi Chen Herbert Bos Cristiano Giuffrida and Elias Athanasopoulos. 2017. No Need to Hide: Protecting Safe Regions on Commodity Hardware. In EuroSys (Belgrade Serbia). 16 pages. https:\/\/doi.org\/10.1145\/3064176.3064217 10.1145\/3064176.3064217","DOI":"10.1145\/3064176.3064217"},{"key":"#cr-split#-e_1_3_2_2_17_1.2","doi-asserted-by":"crossref","unstructured":"Koen Koning Xi Chen Herbert Bos Cristiano Giuffrida and Elias Athanasopoulos. 2017. No Need to Hide: Protecting Safe Regions on Commodity Hardware. In EuroSys (Belgrade Serbia). 16 pages. https:\/\/doi.org\/10.1145\/3064176.3064217","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_2_18_1","unstructured":"Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R. Sekar and Dawn Song. 2014. Code-pointer Integrity. In OSDI.  Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R. Sekar and Dawn Song. 2014. Code-pointer Integrity. In OSDI."},{"key":"#cr-split#-e_1_3_2_2_19_1.1","doi-asserted-by":"crossref","unstructured":"Yutao Liu Tianyu Zhou Kexin Chen Haibo Chen and Yubin Xia. 2015. Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation. In CCS (Denver Colorado USA). ACM 1607--1619. https:\/\/doi.org\/10.1145\/2810103.2813690 10.1145\/2810103.2813690","DOI":"10.1145\/2810103.2813690"},{"key":"#cr-split#-e_1_3_2_2_19_1.2","doi-asserted-by":"crossref","unstructured":"Yutao Liu Tianyu Zhou Kexin Chen Haibo Chen and Yubin Xia. 2015. Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation. In CCS (Denver Colorado USA). ACM 1607--1619. https:\/\/doi.org\/10.1145\/2810103.2813690","DOI":"10.1145\/2810103.2813690"},{"key":"e_1_3_2_2_20_1","volume-title":"Stefan N\u00fc rnberger, and Michael Backes","author":"Lu Kangjie","year":"2016","unstructured":"Kangjie Lu , Wenke Lee , Stefan N\u00fc rnberger, and Michael Backes . 2016 . How to Make ASLR Win the Clone Wars : Runtime Re-Randomization. In NDSS. Kangjie Lu, Wenke Lee, Stefan N\u00fc rnberger, and Michael Backes. 2016. How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. In NDSS."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Lucian Mogosanu Ashay Rane and Nathan Dautenhahn. 2018. MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation. In RAID.  Lucian Mogosanu Ashay Rane and Nathan Dautenhahn. 2018. MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation. In RAID.","DOI":"10.1007\/978-3-030-00470-5_17"},{"key":"e_1_3_2_2_22_1","unstructured":"Joao Moreira. 2021. FineIBT. https:\/\/lssna2021.sched.com\/event\/ljR8?iframe=no.  Joao Moreira. 2021. FineIBT. https:\/\/lssna2021.sched.com\/event\/ljR8?iframe=no."},{"key":"e_1_3_2_2_23_1","volume-title":"30th USENIX Security Symposium (USENIX) Security 21)","author":"Narayan Shravan","year":"2021","unstructured":"Shravan Narayan , Craig Disselkoen , Daniel Moghimi , Sunjay Cauligi , Evan Johnson , Zhao Gang , Anjo Vahldiek-Oberwagner , Ravi Sahita , Hovav Shacham , Dean Tullsen , 2021 . Swivel: Hardening WebAssembly against Spectre . In 30th USENIX Security Symposium (USENIX) Security 21) . Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean Tullsen, et al. 2021. Swivel: Hardening WebAssembly against Spectre. In 30th USENIX Security Symposium (USENIX) Security 21)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813644"},{"key":"e_1_3_2_2_26_1","unstructured":"Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking Holes in Information Hiding. In USENIX Security.  Angelos Oikonomopoulos Elias Athanasopoulos Herbert Bos and Cristiano Giuffrida. 2016. Poking Holes in Information Hiding. In USENIX Security."},{"key":"e_1_3_2_2_27_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC). 241--254","author":"Park Soyeon","year":"2019","unstructured":"Soyeon Park , Sangho Lee , Wen Xu , Hyungon Moon , and Taesoo Kim . 2019 . libmpk: Software abstraction for intel memory protection keys (intel MPK) . In 2019 USENIX Annual Technical Conference (USENIX ATC). 241--254 . Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, and Taesoo Kim. 2019. libmpk: Software abstraction for intel memory protection keys (intel MPK). In 2019 USENIX Annual Technical Conference (USENIX ATC). 241--254."},{"key":"e_1_3_2_2_28_1","volume-title":"NoJITsu: Locking Down JavaScript Engines. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020","author":"Park Taemin","year":"2020","unstructured":"Taemin Park , Karel Dhondt , David Gens , Yeoul Na , Stijn Volckaert , and Michael Franz . 2020 . NoJITsu: Locking Down JavaScript Engines. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020 , San Diego, California, USA , February 23-26, 2020. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/nojitsu-locking-down-javascript-engines\/ Taemin Park, Karel Dhondt, David Gens, Yeoul Na, Stijn Volckaert, and Michael Franz. 2020. NoJITsu: Locking Down JavaScript Engines. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/nojitsu-locking-down-javascript-engines\/"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.152"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00041"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.39"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_2_33_1","volume-title":"HDFI: Hardware-Assisted Data-Flow Isolation. In 2016 IEEE Symposium on Security and Privacy (SP). 1--17","author":"Song C.","year":"2016","unstructured":"C. Song , H. Moon , M. Alam , I. Yun , B. Lee , T. Kim , W. Lee , and Y. Paek . 2016 . HDFI: Hardware-Assisted Data-Flow Isolation. In 2016 IEEE Symposium on Security and Privacy (SP). 1--17 . https:\/\/doi.org\/10.1109\/SP. 2016 .9 10.1109\/SP.2016.9 C. Song, H. Moon, M. Alam, I. Yun, B. Lee, T. Kim, W. Lee, and Y. Paek. 2016. HDFI: Hardware-Assisted Data-Flow Isolation. In 2016 IEEE Symposium on Security and Privacy (SP). 1--17. https:\/\/doi.org\/10.1109\/SP.2016.9"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111320.1111070"},{"key":"e_1_3_2_2_35_1","unstructured":"Theori. 2016. Chakra JIT CFG Bypass. http:\/\/theori.io\/research\/chakra-jit-cfg- bypass.  Theori. 2016. Chakra JIT CFG Bypass. http:\/\/theori.io\/research\/chakra-jit-cfg- bypass."},{"volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14). 941--955.","author":"Tice Caroline","key":"e_1_3_2_2_36_1","unstructured":"Caroline Tice , Tom Roeder , Peter Collingbourne , Stephen Checkoway , \u00dalfar Erlingsson , Luis Lozano , and Geoff Pike . 2014. Enforcing forward-edge control-flow integrity in {GCC} & {LLVM} . In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 941--955. Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, \u00dalfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing forward-edge control-flow integrity in {GCC} & {LLVM}. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 941--955."},{"key":"e_1_3_2_2_37_1","volume-title":"ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In USENIX Security.","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner , Eslam Elnikety , Nuno O. Duarte , Michael Sammler , Peter Druschel , and Deepak Garg . 2019 . ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In USENIX Security. Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In USENIX Security."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00087"},{"key":"e_1_3_2_2_40_1","volume-title":"5555. Making Information Hiding Effective Again","author":"Wang Z.","year":"2021","unstructured":"Z. Wang , C. Wu , Y. Zhang , B. Tang , P. Yew , M. Xie , Y. Lai , Y. Kang , Y. Cheng , and Z. Shi . 5555. Making Information Hiding Effective Again . IEEE Transactions on Dependable and Secure Computing 01 (mar 5555), 1--1. https:\/\/doi.org\/10.1109\/TDSC. 2021 .3064086 10.1109\/TDSC.2021.3064086 Z. Wang, C. Wu, Y. Zhang, B. Tang, P. Yew, M. Xie, Y. Lai, Y. Kang, Y. Cheng, and Z. Shi. 5555. Making Information Hiding Effective Again. IEEE Transactions on Dependable and Secure Computing 01 (mar 5555), 1--1. https:\/\/doi.org\/10.1109\/TDSC.2021.3064086"},{"key":"e_1_3_2_2_41_1","volume-title":"SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Wang Zhe","year":"2019","unstructured":"Zhe Wang , Chenggang Wu , Yinqian Zhang , Bowen Tang , Pen-Chung Yew , Mengyao Xie , Yuanming Lai , Yan Kang , Yueqiang Cheng , and Zhiping Shi . 2019 . SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. In 28th USENIX Security Symposium (USENIX Security 19) . USENIX Association, 1239--1256. Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi. 2019. SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, 1239--1256."},{"key":"e_1_3_2_2_42_1","volume-title":"Making Information Hiding Effective Again","author":"Wang Zhe","year":"2021","unstructured":"Zhe Wang , Chenggang Wu , Yinqian Zhang , Bowen Tang , Pen-Chung Yew , Mengyao Xie , Yuanming Lai , Yan Kang , Yueqiang Cheng , and Zhiping Shi . 2021. Making Information Hiding Effective Again . IEEE Transactions on Dependable and Secure Computing ( 2021 ). Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi. 2021. Making Information Hiding Effective Again. IEEE Transactions on Dependable and Secure Computing (2021)."},{"key":"e_1_3_2_2_43_1","volume-title":"Zhaofeng Chen, and Dawn Song.","author":"Zhang Chao","year":"2015","unstructured":"Chao Zhang , Chengyu Song , Kevin Zhijie Chen , Zhaofeng Chen, and Dawn Song. 2015 . VTint: Protecting Virtual Function Tables' Integrity.. In NDSS. Chao Zhang, Chengyu Song, Kevin Zhijie Chen, Zhaofeng Chen, and Dawn Song. 2015. VTint: Protecting Virtual Function Tables' Integrity.. In NDSS."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Chao Zhang Dawn Song Scott A Carr Mathias Payer Tongxin Li Yu Ding and Chengyu Song. 2016. VTrust: Regaining Trust on Virtual Calls.. In NDSS.  Chao Zhang Dawn Song Scott A Carr Mathias Payer Tongxin Li Yu Ding and Chengyu Song. 2016. VTrust: Regaining Trust on Virtual Calls.. In NDSS.","DOI":"10.14722\/ndss.2016.23164"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559344","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3559344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:56Z","timestamp":1750182656000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559344"}},"subtitle":["Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":46,"alternative-id":["10.1145\/3548606.3559344","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3559344","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}