{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:11:08Z","timestamp":1776399068621,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP)","award":["2022-0-00688"],"award-info":[{"award-number":["2022-0-00688"]}]},{"name":"Korea Internet & Security Agency (KISA)","award":["1781000009"],"award-info":[{"award-number":["1781000009"]}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF- 2022R1C1C1010494"],"award-info":[{"award-number":["NRF- 2022R1C1C1010494"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP)","award":["2022-0-01199"],"award-info":[{"award-number":["2022-0-01199"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623079","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"874-888","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6285-3506","authenticated-orcid":false,"given":"Kha","family":"Dinh Duy","sequence":"first","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1082-3030","authenticated-orcid":false,"given":"Kyuwon","family":"Cho","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0018-0411","authenticated-orcid":false,"given":"Taehyun","family":"Noh","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5344-6266","authenticated-orcid":false,"given":"Hojoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Apple Platform Security. https:\/\/manuals.info.apple.com\/MANUALS\/1000\/MA1902\/en_US\/apple-platform-security-guide.pdf. Last accessed","year":"2021","unstructured":"Apple. 2021. Apple Platform Security. https:\/\/manuals.info.apple.com\/MANUALS\/1000\/MA1902\/en_US\/apple-platform-security-guide.pdf. Last accessed May 05, 2021,."},{"key":"e_1_3_2_1_2_1","volume-title":"Arm Architecture Reference Manual Armv8, for Armv8-A architecture profile. https:\/\/developer.arm.com\/documentation\/ddi0487\/ga. Last accessed","author":"Ltd ARM","year":"2021","unstructured":"ARM Ltd. 2021. Arm Architecture Reference Manual Armv8, for Armv8-A architecture profile. https:\/\/developer.arm.com\/documentation\/ddi0487\/ga. Last accessed Nov 18, 2021,."},{"key":"e_1_3_2_1_3_1","volume-title":"Armv8-M Architecture Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0553\/bs. Last accessed","author":"Ltd ARM","year":"2022","unstructured":"ARM Ltd. 2022. Armv8-M Architecture Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0553\/bs. Last accessed May 15, 2022,."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/developer.arm.com\/-\/media\/Arm Developer Community\/PDF\/Arm_Memory_Tagging_Extension_Whitepaper.pdf. Last accessed","author":"Ltd ARM","year":"2022","unstructured":"ARM Ltd. 2023. ARMv8.5-A Memory Tagging Extension. https:\/\/developer.arm.com\/-\/media\/Arm Developer Community\/PDF\/Arm_Memory_Tagging_Extension_Whitepaper.pdf. Last accessed March 10, 2022,."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.22"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-privilege Compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (San Francisco, California) (NSDI'08). USENIX Association, Berkeley, CA, USA, 309--322."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Brumley David","year":"2004","unstructured":"David Brumley and Dawn Song. 2004. Privtrans: Automatically Partitioning Programs for Privilege Separation. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (San Diego, CA) (SSYM'04). USENIX Association, Berkeley, CA, USA, 5--5."},{"key":"e_1_3_2_1_8_1","volume-title":"Shreds: Fine-Grained Execution Units with Private Memory. In 2016 IEEE Symposium on Security and Privacy (SP). 56--71","author":"Chen Yaohui","year":"2016","unstructured":"Yaohui Chen, Sebassujeen Reymondjohnson, Zhichuang Sun, and Long Lu. 2016. Shreds: Fine-Grained Execution Units with Private Memory. In 2016 IEEE Symposium on Security and Privacy (SP). 56--71."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093337.3037725"},{"key":"e_1_3_2_1_10_1","volume-title":"ACES: Automatic Compartments for Embedded Systems. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Clements Abraham A","year":"2018","unstructured":"Abraham A Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, and Mathias Payer. 2018. ACES: Automatic Compartments for Embedded Systems. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 65--82."},{"key":"e_1_3_2_1_11_1","volume-title":"PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium, USENIX Security 2020","author":"Connor R. Joseph","year":"2020","unstructured":"R. Joseph Connor, Tyler McDaniel, Jared M. Smith, and Max Schuchard. 2020. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 1409--1426."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/365230.365252"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892212"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2309.11151"},{"key":"e_1_3_2_1_16_1","volume-title":"kasan: add hardware tag-based mode for arm64. https:\/\/lwn.net\/Articles\/831624\/. Last accessed","year":"2022","unstructured":"Eklektix. 2022. kasan: add hardware tag-based mode for arm64. https:\/\/lwn.net\/Articles\/831624\/. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_17_1","volume-title":"F5 Networks","author":"Inc.","year":"2023","unstructured":"Inc. F5 Networks. 2023. Advanced Load Balancer, Web Server, & Reverse Proxy. https:\/\/www.nginx.com. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361070"},{"key":"e_1_3_2_1_19_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Reza Mirzazade","year":"2021","unstructured":"Reza Mirzazade farkhani, Mansour Ahmadi, and Long Lu. 2021. PTAuth: Temporal Memory Safety via Robust Points-to Authentication. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association."},{"key":"e_1_3_2_1_20_1","unstructured":"Rich Felker. 2022. musl libc. https:\/\/musl.libc.org."},{"key":"e_1_3_2_1_21_1","volume-title":"2023 a. GNU Wget. https:\/\/www.gnu.org\/software\/wget. Last accessed","author":"Foundation Free Software","year":"2022","unstructured":"Free Software Foundation. 2023 a. GNU Wget. https:\/\/www.gnu.org\/software\/wget. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_22_1","volume-title":"2023 b. OpenSSH. https:\/\/www.openssh.com. Last accessed","author":"Foundation BSD","year":"2022","unstructured":"OpenBSD Foundation. 2023 b. OpenSSH. https:\/\/www.openssh.com. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_23_1","volume-title":"ab - Apache HTTP server benchmarking tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html. Last accessed","author":"Software Foundation The Apache","year":"2022","unstructured":"The Apache Software Foundation. 2022. ab - Apache HTTP server benchmarking tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_24_1","volume-title":"Memory Tagging Extension (MTE) in AArch64 Linux. https:\/\/www.kernel.org\/doc\/html\/latest\/arm64\/memory-tagging-extension.html. Last accessed","author":"Frascino Vincenzo","year":"2022","unstructured":"Vincenzo Frascino. 2020. Memory Tagging Extension (MTE) in AArch64 Linux. https:\/\/www.kernel.org\/doc\/html\/latest\/arm64\/memory-tagging-extension.html. Last accessed March 10, 2022,."},{"key":"e_1_3_2_1_25_1","volume-title":"2019 USENIX Annual Technical Conference (USENIXATC 19)","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael L Scott, Kai Shen, and Mike Marty. 2019. Hodor: Intra-process isolation for high-throughput data plane libraries. In 2019 USENIX Annual Technical Conference (USENIXATC 19). 489--504."},{"key":"e_1_3_2_1_26_1","unstructured":"Intel Corporation. 2021. Intel\u00ae 64 and IA-32 Architectures Software Developer's Manual. Number 325462-075US."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","unstructured":"Mohannad Ismail Andrew Quach Christopher Jelesnianski Yeongjin Jang and Changwoo Min. 2022. Tightly Seal Your Sensitive Pointers with PACTight. https:\/\/doi.org\/10.48550\/ARXIV.2203.15121","DOI":"10.48550\/ARXIV.2203.15121"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.00028"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track (2003-09-03)","author":"Kilpatrick Douglas","year":"2003","unstructured":"Douglas Kilpatrick. 2003. Privman: A Library for Partitioning Applications.. In USENIX Annual Technical Conference, FREENIX Track (2003-09-03). USENIX, 273--284."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519582"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_32_1","volume-title":"Code-Pointer Integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song. 2014. Code-Pointer Integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). USENIX Association, Broomfield, CO, 147--163."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516713"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243748"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24117"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Yuan Li Wende Tan Zhizheng Lv Songtao Yang Mathias Payer Ying Liu and Chao Zhang. 2022. PACSan: Enforcing Memory Safety Based on ARM PA. https:\/\/doi.org\/10.48550\/ARXIV.2202.03950","DOI":"10.48550\/ARXIV.2202.03950"},{"key":"e_1_3_2_1_37_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Liljestrand Hans","unstructured":"Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, and N. Asokan. 2021. PACStack: an Authenticated Call Stack. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association."},{"key":"e_1_3_2_1_38_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Liljestrand Hans","unstructured":"Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, and N. Asokan. 2019. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 177--194."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134066"},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/developer.arm.com\/documentation\/100067\/0612\/armclang-Command-line-Options\/-mmemtag-stack-mno-memtag-stack. Last accessed","author":"Ltd Arm","year":"2022","unstructured":"Arm Ltd. 2022. -mmemtag-stack, -mno-memtag-stack. https:\/\/developer.arm.com\/documentation\/100067\/0612\/armclang-Command-line-Options\/-mmemtag-stack-mno-memtag-stack. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_41_1","volume-title":"https:\/\/asahilinux.org. Last accessed","author":"Martin Hector","year":"2022","unstructured":"Hector Martin, Alyssa Rosenzweig, Asahi Lina, Dougall Johnson, Sven Peter, Mark Kettenis, Martin Povi\"er, and Janne Grunau. 2022. Asahi Linux. https:\/\/asahilinux.org. Last accessed March 08, 2022,."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813676"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24026"},{"key":"e_1_3_2_1_44_1","volume-title":"Caja: Safe active content in sanitized JavaScript. (June 7","author":"Miller Mark S.","year":"2008","unstructured":"Mark S. Miller, Mike Samuel, Ben Laurie, Ihab Awad, and Mike Stay. 2008. Caja: Safe active content in sanitized JavaScript. (June 7 2008)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359799"},{"key":"e_1_3_2_1_46_1","volume-title":"Using Application Data Integrity (ADI). https:\/\/docs.oracle.com\/cd\/E37838_01\/html\/E61059\/gqajs.html. Last accessed","year":"2022","unstructured":"Oracle. 2022. Using Application Data Integrity (ADI). https:\/\/docs.oracle.com\/cd\/E37838_01\/html\/E61059\/gqajs.html. Last accessed March 02, 2022,."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00082"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179284"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/330249.330250"},{"key":"e_1_3_2_1_50_1","unstructured":"FreeBSD Project. 2023. FreeBSD Manual Pages. https:\/\/www.freebsd.org\/cgi\/man.cgi?capsicum(4)."},{"key":"e_1_3_2_1_51_1","volume-title":"https:\/\/reviews.llvm.org\/D49793. Last accessed","author":"Project LLVM","year":"2022","unstructured":"LLVM Project. 2022a. [AArch64] - return address signing. https:\/\/reviews.llvm.org\/D49793. Last accessed May 05, 2022,."},{"key":"e_1_3_2_1_52_1","volume-title":"The LLVM Compiler Infrastructure. https:\/\/llvm.org. Last accessed","author":"Project LLVM","year":"2022","unstructured":"LLVM Project. 2022b. The LLVM Compiler Infrastructure. https:\/\/llvm.org. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_53_1","volume-title":"https:\/\/www.libressl.org. Last accessed","author":"Project BSD","year":"2022","unstructured":"OpenBSD Project. 2022c. LibreSSL. https:\/\/www.libressl.org. Last accessed Jan 14, 2022,."},{"key":"e_1_3_2_1_54_1","volume-title":"QEMU: A generic and open source machine emulator and virtualizer. https:\/\/www.qemu.org. Last accessed","author":"QEMU.","year":"2022","unstructured":"QEMU. 2022. QEMU: A generic and open source machine emulator and virtualizer. https:\/\/www.qemu.org. Last accessed March 08, 2022,."},{"key":"e_1_3_2_1_55_1","volume-title":"Pointer authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf. Last accessed","author":"QUALCOMM TECHNOLOGIES, INC.","year":"2021","unstructured":"QUALCOMM TECHNOLOGIES, INC. 2017. Pointer authentication on ARMv8.3. https:\/\/www.qualcomm.com\/media\/documents\/files\/whitepaper-pointer-authentication-on-armv8-3.pdf. Last accessed Nov 15, 2021,."},{"key":"e_1_3_2_1_56_1","volume-title":"What is SELinux. https:\/\/www.redhat.com\/en\/topics\/linux\/what-is-selinux. Last accessed","author":"Hat Red","year":"2021","unstructured":"Red Hat. 2021. What is SELinux. https:\/\/www.redhat.com\/en\/topics\/linux\/what-is-selinux. Last accessed Apr 28, 2021,."},{"key":"e_1_3_2_1_57_1","volume-title":"24th International Symposium on Research in Attacks, Intrusions and Defenses. 296--311","author":"Roessler Nick","year":"2021","unstructured":"Nick Roessler, Lucas Atayde, Imani Palmer, Derrick McKee, Jai Pandey, Vasileios P Kemerlis, Mathias Payer, Adam Bates, Jonathan M Smith, Andre DeHon, et al. 2021. \u03bcSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. In 24th International Symposium on Research in Attacks, Intrusions and Defenses. 296--311."},{"key":"e_1_3_2_1_58_1","volume-title":"Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Schrammel David","year":"2022","unstructured":"David Schrammel, Samuel Weiser, Richard Sadek, and Stefan Mangard. 2022. Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 936--952. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/schrammel"},{"key":"e_1_3_2_1_59_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Schrammel David","year":"2020","unstructured":"David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain Keys textendash Efficient In-Process Isolation for RISC-V and x86. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1677--1694."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","unstructured":"Kostya Serebryany Evgenii Stepanov Aleksey Shlyapnikov Vlad Tsyrklevich and Dmitry Vyukov. 2018. Memory Tagging and how it improves C\/C memory safety. https:\/\/doi.org\/10.48550\/ARXIV.1802.09517","DOI":"10.48550\/ARXIV.1802.09517"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles","author":"Shapiro Jonathan S.","unstructured":"Jonathan S. Shapiro, Jonathan M. Smith, and David J. Farber. 1999. EROS: A Fast Capability System. In Proceedings of the Seventeenth ACM Symposium on Operating Systems Principles (Charleston, South Carolina, USA) (SOSP '99). Association for Computing Machinery, New York, NY, USA, 170--185."},{"key":"e_1_3_2_1_62_1","volume-title":"https:\/\/www.math.utah.edu\/ mayer\/linux\/bmark.html. Last accessed","author":"Mayer Uwe F.","year":"2022","unstructured":"Uwe F. Mayer. 2017. Linux\/Unix nbench. https:\/\/www.math.utah.edu\/ mayer\/linux\/bmark.html. Last accessed March 08, 2022,."},{"key":"e_1_3_2_1_63_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, efficient in-process isolation with protection keys ( MPK). In 28th USENIX Security Symposium (USENIX Security 19). 1221--1238."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274705"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48749-2_17"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519560"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380786.3391398"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00087"},{"key":"e_1_3_2_1_69_1","volume-title":"Capsicum: Practical Capabilities for UNIX. In 19th USENIX Security Symposium","author":"Watson Robert N. M.","year":"2010","unstructured":"Robert N. M. Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway. 2010. Capsicum: Practical Capabilities for UNIX. In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings. USENIX Association, 29--46."},{"key":"e_1_3_2_1_70_1","volume-title":"CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In 2015 IEEE Symposium on Security and Privacy, SP 2015","author":"Watson Robert N. M.","year":"2015","unstructured":"Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, and Munraj Vadera. 2015. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015. IEEE Computer Society, 20--37."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23068"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","unstructured":"Sungbae Yoo Jinbum Park Seolheui Kim Yeji Kim and Taesoo Kim. 2021. In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. https:\/\/doi.org\/10.48550\/ARXIV.2112.07213","DOI":"10.48550\/ARXIV.2112.07213"},{"key":"e_1_3_2_1_74_1","volume-title":"Capstone: A Capability-based Foundation for Trustless Secure Memory Access. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Yu Jason Zhijingcheng","year":"2023","unstructured":"Jason Zhijingcheng Yu, Conrad Watt, Aditya Badole, Trevor E. Carlson, and Prateek Saxena. 2023. Capstone: A Capability-based Foundation for Trustless Secure Memory Access. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 787--804. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/yu-jason"},{"key":"e_1_3_2_1_75_1","volume-title":"8th USENIX Symposium on Operating Systems Design and Implementation, OSDI","author":"Zeldovich Nickolai","year":"2008","unstructured":"Nickolai Zeldovich, Hari Kannan, Michael Dalton, and Christos Kozyrakis. 2008. Hardware Enforcement of Application Security Policies Using Tagged Memory. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, Richard Draves and Robbert van Renesse (Eds.). USENIX Association, 225--240."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623079","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:44:37Z","timestamp":1755740677000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623079"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":75,"alternative-id":["10.1145\/3576915.3623079","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623079","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}