{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T08:43:44Z","timestamp":1774428224815,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,17]]},"DOI":"10.1145\/3579371.3589050","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T20:25:28Z","timestamp":1686947128000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ISA-Grid: Architecture of Fine-grained Privilege Control for Instructions and Registers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-1828-8996","authenticated-orcid":false,"given":"Shulin","family":"Fan","sequence":"first","affiliation":[{"name":"Institute of Parallel and Distributed Systems,Shanghai Jiao Tong University, Shanghai, China"},{"name":"Engineering Research Center for Domain-specific Operating Systems(Ministry of Education), Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2211-9120","authenticated-orcid":false,"given":"Zhichao","family":"Hua","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems,Shanghai Jiao Tong University, Shanghai, China"},{"name":"Engineering Research Center for Domain-specific Operating Systems(Ministry of Education), Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6558-5298","authenticated-orcid":false,"given":"Yubin","family":"Xia","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems,Shanghai Jiao Tong University, Shanghai, China"},{"name":"Shanghai AI Laboratory, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9720-0361","authenticated-orcid":false,"given":"Haibo","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems,Shanghai Jiao Tong University, Shanghai, China"},{"name":"Engineering Research Center for Domain-specific Operating Systems(Ministry of Education), Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1968-7645","authenticated-orcid":false,"given":"Binyu","family":"Zang","sequence":"additional","affiliation":[{"name":"Institute of Parallel and Distributed Systems,Shanghai Jiao Tong University, Shanghai, China"},{"name":"Engineering Research Center for Domain-specific Operating Systems(Ministry of Education), Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Ariane RISC-V CPU. https:\/\/github.com\/pulp-platform\/ariane.  2019. Ariane RISC-V CPU. https:\/\/github.com\/pulp-platform\/ariane."},{"key":"e_1_3_2_1_2_1","unstructured":"2022. seL4 Benchmark Performance. https:\/\/sel4.systems\/About\/Performance\/home.pml  2022. seL4 Benchmark Performance. https:\/\/sel4.systems\/About\/Performance\/home.pml"},{"key":"e_1_3_2_1_3_1","unstructured":"2022. SQLite. https:\/\/www.sqlite.org\/. https:\/\/www.sqlite.org\/  2022. SQLite. https:\/\/www.sqlite.org\/. https:\/\/www.sqlite.org\/"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Vivado Design Suite. https:\/\/www.xilinx.com\/products\/design-tools\/vivado.html. https:\/\/www.xilinx.com\/products\/design-tools\/vivado.html  2022. Vivado Design Suite. https:\/\/www.xilinx.com\/products\/design-tools\/vivado.html. https:\/\/www.xilinx.com\/products\/design-tools\/vivado.html"},{"key":"e_1_3_2_1_5_1","unstructured":"Referenced Feb 2022. Arm Architecture Reference Manual for A-profile architecture. https:\/\/developer.arm.com\/documentation\/ddi0487\/latest.  Referenced Feb 2022. Arm Architecture Reference Manual for A-profile architecture. https:\/\/developer.arm.com\/documentation\/ddi0487\/latest."},{"key":"e_1_3_2_1_6_1","unstructured":"Referenced Feb 2022. Arm Cortex-A53 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0500\/j\/.  Referenced Feb 2022. Arm Cortex-A53 MPCore Processor Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0500\/j\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Referenced Feb 2022. Armv6-M Architecture Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0419\/e\/.  Referenced Feb 2022. Armv6-M Architecture Reference Manual. https:\/\/developer.arm.com\/documentation\/ddi0419\/e\/."},{"key":"e_1_3_2_1_8_1","unstructured":"ARM. 2022. Mbed TLS. https:\/\/tls.mbed.org\/. https:\/\/tls.mbed.org\/  ARM. 2022. Mbed TLS. https:\/\/tls.mbed.org\/. https:\/\/tls.mbed.org\/"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660350"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_12_1","volume-title":"10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Belay Adam","year":"2012","unstructured":"Adam Belay , Andrea Bittau , Ali Mashtizadeh , David Terei , David Mazi\u00e8res , and Christos Kozyrakis . 2012 . Dune: Safe user-level access to privileged CPU features . In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12) . 335--348. Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi\u00e8res, and Christos Kozyrakis. 2012. Dune: Safe user-level access to privileged CPU features. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 335--348."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Nathan Binkert Bradford Beckmann Gabriel Black Steven K Reinhardt Ali Saidi Arkaprava Basu Joel Hestness Derek R Hower Tushar Krishna Somayeh Sardashti etal 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39 2 (2011) 1--7.  Nathan Binkert Bradford Beckmann Gabriel Black Steven K Reinhardt Ali Saidi Arkaprava Basu Joel Hestness Derek R Hower Tushar Krishna Somayeh Sardashti et al. 2011. The gem5 simulator. ACM SIGARCH computer architecture news 39 2 (2011) 1--7.","DOI":"10.1145\/2024716.2024718"},{"key":"e_1_3_2_1_14_1","volume-title":"5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08)","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau , Petr Marchenko , Mark Handley , and Brad Karp . 2008 . Wedge: Splitting Applications into Reduced-Privilege Compartments . In 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08) . USENIX Association, San Francisco, CA. https:\/\/www.usenix.org\/conference\/nsdi-08\/wedge-splitting-applications-reduced-privilege-compartments Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-Privilege Compartments. In 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 08). USENIX Association, San Francisco, CA. https:\/\/www.usenix.org\/conference\/nsdi-08\/wedge-splitting-applications-reduced-privilege-compartments"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420961"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.12"},{"key":"e_1_3_2_1_18_1","volume-title":"PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Connor R Joseph","year":"2020","unstructured":"R Joseph Connor , Tyler McDaniel , Jared M Smith , and Max Schuchard . 2020 . PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20) . 1409--1426. R Joseph Connor, Tyler McDaniel, Jared M Smith, and Max Schuchard. 2020. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20). 1409--1426."},{"key":"e_1_3_2_1_19_1","volume-title":"Intel SGX explained. Cryptology ePrint Archive","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas . 2016. Intel SGX explained. Cryptology ePrint Archive ( 2016 ). Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541986"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694386"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 46th International Symposium on Computer Architecture. 671--684","author":"Du Dong","year":"2019","unstructured":"Dong Du , Zhichao Hua , Yubin Xia , Binyu Zang , and Haibo Chen . 2019 . XPC: Architectural support for secure and efficient cross process call . In Proceedings of the 46th International Symposium on Computer Architecture. 671--684 . Dong Du, Zhichao Hua, Yubin Xia, Binyu Zang, and Haibo Chen. 2019. XPC: Architectural support for secure and efficient cross process call. In Proceedings of the 46th International Symposium on Computer Architecture. 671--684."},{"key":"e_1_3_2_1_23_1","unstructured":"Erhu Feng Xu Lu Dong Du Bicheng Yang Xueqiang Jiang Yubin Xia Binyu Zang and Haibo Chen. 2021. Scalable Memory Protection in the PENGLAI Enclave.. In OSDI. 275--294.  Erhu Feng Xu Lu Dong Du Bicheng Yang Xueqiang Jiang Yubin Xia Binyu Zang and Haibo Chen. 2021. Scalable Memory Protection in the PENGLAI Enclave.. In OSDI. 275--294."},{"key":"e_1_3_2_1_24_1","volume-title":"IMIX:In-Process Memory Isolation EXtension. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Frassetto Tommaso","year":"2018","unstructured":"Tommaso Frassetto , Patrick Jauernig , Christopher Liebchen , and Ahmad-Reza Sadeghi . 2018 . IMIX:In-Process Memory Isolation EXtension. In 27th USENIX Security Symposium (USENIX Security 18) . 83--97. Tommaso Frassetto, Patrick Jauernig, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2018. IMIX:In-Process Memory Isolation EXtension. In 27th USENIX Security Symposium (USENIX Security 18). 83--97."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446728"},{"key":"e_1_3_2_1_26_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Gu Jinyu","year":"2022","unstructured":"Jinyu Gu , Hao Li , Wentai Li , Yubin Xia , and Haibo Chen . 2022 . {EPK}: Scalable and Efficient Memory Protection Keys . In 2022 USENIX Annual Technical Conference (USENIX ATC 22) . 609--624. Jinyu Gu, Hao Li, Wentai Li, Yubin Xia, and Haibo Chen. 2022. {EPK}: Scalable and Efficient Memory Protection Keys. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 609--624."},{"key":"e_1_3_2_1_27_1","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Gu Jinyu","year":"2020","unstructured":"Jinyu Gu , Xinyue Wu , Wentai Li , Nian Liu , Zeyu Mi , Yubin Xia , and Haibo Chen . 2020 . Harmonizing performance and isolation in microkernels with efficient intra-kernel isolation and communication . In 2020 USENIX Annual Technical Conference (USENIX ATC 20) . 401--417. Jinyu Gu, Xinyue Wu, Wentai Li, Nian Liu, Zeyu Mi, Yubin Xia, and Haibo Chen. 2020. Harmonizing performance and isolation in microkernels with efficient intra-kernel isolation and communication. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). 401--417."},{"key":"e_1_3_2_1_28_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Gu Jinyu","year":"2022","unstructured":"Jinyu Gu , Bojun Zhu , Mingyu Li , Wentai Li , Yubin Xia , and Haibo Chen . 2022 . A {Hardware-Software} Co-design for Efficient {Intra-Enclave} Isolation . In 31st USENIX Security Symposium (USENIX Security 22) . 3129--3145. Jinyu Gu, Bojun Zhu, Mingyu Li, Wentai Li, Yubin Xia, and Haibo Chen. 2022. A {Hardware-Software} Co-design for Efficient {Intra-Enclave} Isolation. In 31st USENIX Security Symposium (USENIX Security 22). 3129--3145."},{"key":"e_1_3_2_1_29_1","volume-title":"Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati , Spyridoula Gravani , Ethan Johnson , John Criswell , Michael L Scott , Kai Shen , and Mike Marty . 2019 . Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . 489--504. Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael L Scott, Kai Shen, and Mike Marty. 2019. Hodor: Intra-Process Isolation for High-Throughput Data Plane Libraries. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 489--504."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 393--405","author":"Ching-Hsiang Hsu Terry","year":"2016","unstructured":"Terry Ching-Hsiang Hsu , Kevin Hoffman , Patrick Eugster , and Mathias Payer . 2016 . Enforcing least privilege memory views for multithreaded applications . In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 393--405 . Terry Ching-Hsiang Hsu, Kevin Hoffman, Patrick Eugster, and Mathias Payer. 2016. Enforcing least privilege memory views for multithreaded applications. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 393--405."},{"key":"e_1_3_2_1_31_1","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Hua Zhichao","year":"2018","unstructured":"Zhichao Hua , Dong Du , Yubin Xia , Haibo Chen , and Binyu Zang . 2018 . EPTI: Efficient Defence against Meltdown Attack for Unpatched {VMs} . In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . 255--266. Zhichao Hua, Dong Du, Yubin Xia, Haibo Chen, and Binyu Zang. 2018. EPTI: Efficient Defence against Meltdown Attack for Unpatched {VMs}. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). 255--266."},{"key":"e_1_3_2_1_32_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Hua Zhichao","year":"2017","unstructured":"Zhichao Hua , Jinyu Gu , Yubin Xia , Haibo Chen , Binyu Zang , and Haibing Guan . 2017 . vTZ: Virtualizing ARM TrustZone . In 26th USENIX Security Symposium (USENIX Security 17) . 541--556. Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang, and Haibing Guan. 2017. vTZ: Virtualizing ARM TrustZone. In 26th USENIX Security Symposium (USENIX Security 17). 541--556."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","first-page":"192101","DOI":"10.1007\/s11432-019-2707-6","article-title":"TZ-container: Protecting container from untrusted OS with ARM TrustZone","volume":"64","author":"Hua Zhichao","year":"2021","unstructured":"Zhichao Hua , Yang Yu , Jinyu Gu , Yubin Xia , Haibo Chen , and Binyu Zang . 2021 . TZ-container: Protecting container from untrusted OS with ARM TrustZone . Science China Information Sciences 64 , 9 (2021), 192101 . Zhichao Hua, Yang Yu, Jinyu Gu, Yubin Xia, Haibo Chen, and Binyu Zang. 2021. TZ-container: Protecting container from untrusted OS with ARM TrustZone. Science China Information Sciences 64, 9 (2021), 192101.","journal-title":"Science China Information Sciences"},{"key":"e_1_3_2_1_34_1","volume-title":"Isolation and Beyond: Challenges for System Security. In The Workshop on Hot Topics in Operating Systems (HotOS 19)","author":"Hunt Tyler","year":"2019","unstructured":"Tyler Hunt , Zhipeng Jia , Vance Miller , Hunt Tyler , Jia Zhipeng , Miller Vance , Christopher J. Rossbach , and Emmett Witchel Witchel . 2019 . Isolation and Beyond: Challenges for System Security. In The Workshop on Hot Topics in Operating Systems (HotOS 19) . ACM. Tyler Hunt, Zhipeng Jia, Vance Miller, Hunt Tyler, Jia Zhipeng, Miller Vance, Christopher J. Rossbach, and Emmett Witchel Witchel. 2019. Isolation and Beyond: Challenges for System Security. In The Workshop on Hot Topics in Operating Systems (HotOS 19). ACM."},{"key":"e_1_3_2_1_35_1","unstructured":"Intel. 2022. Intel software developer's manual. https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/download\/intel-64-and-ia-32-architectures-sdm-combined-volumes-3a-3b-3c-and-3d-system-programming-guide.html.  Intel. 2022. Intel software developer's manual. https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/download\/intel-64-and-ia-32-architectures-sdm-combined-volumes-3a-3b-3c-and-3d-system-programming-guide.html."},{"key":"e_1_3_2_1_36_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Kenjar Zijo","year":"2020","unstructured":"Zijo Kenjar , Tommaso Frassetto , David Gens , Michael Franz , and Ahmad-Reza Sadeghi . 2020 . V0LTpwn: Attacking x86 Processor Integrity from Software . In 29th USENIX Security Symposium (USENIX Security 20) . 1445--1461. Zijo Kenjar, Tommaso Frassetto, David Gens, Michael Franz, and Ahmad-Reza Sadeghi. 2020. V0LTpwn: Attacking x86 Processor Integrity from Software. In 29th USENIX Security Symposium (USENIX Security 20). 1445--1461."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the Seventeenth European Conference on Computer Systems. 132--148","author":"Kirth Paul","year":"2022","unstructured":"Paul Kirth , Mitchel Dickerson , Stephen Crane , Per Larsen , Adrian Dabrowski , David Gens , Yeoul Na , Stijn Volckaert , and Michael Franz . 2022 . PKRU-safe: automatically locking down the heap between safe and unsafe languages . In Proceedings of the Seventeenth European Conference on Computer Systems. 132--148 . Paul Kirth, Mitchel Dickerson, Stephen Crane, Per Larsen, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, and Michael Franz. 2022. PKRU-safe: automatically locking down the heap between safe and unsafe languages. In Proceedings of the Seventeenth European Conference on Computer Systems. 132--148."},{"key":"e_1_3_2_1_38_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Kuznetsov Dmitry","year":"2022","unstructured":"Dmitry Kuznetsov and Adam Morrison . 2022 . Privbox: Faster system calls through sandboxed privileged execution . In 2022 USENIX Annual Technical Conference (USENIX ATC 22) . Dmitry Kuznetsov and Adam Morrison. 2022. Privbox: Faster system calls through sandboxed privileged execution. In 2022 USENIX Annual Technical Conference (USENIX ATC 22)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243748"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507759"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483554"},{"key":"e_1_3_2_1_42_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind , Christian Priebe , Divya Muthukumaran , Dan O'Keeffe , Pierre-Louis Aublin , Florian Kelbert , Tobias Reiher , David Goltzsche , David Eyers , R\u00fcdiger Kapitza , 2017 . Glamdring: Automatic application partitioning for intel SGX . In 2017 USENIX Annual Technical Conference (USENIX ATC 17) . 285--298. Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David Eyers, R\u00fcdiger Kapitza, et al. 2017. Glamdring: Automatic application partitioning for intel SGX. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). 285--298."},{"key":"e_1_3_2_1_43_1","volume-title":"Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Litton James","year":"2016","unstructured":"James Litton , Anjo Vahldiek-Oberwagner , Eslam Elnikety , Deepak Garg , Bobby Bhattacharjee , and Peter Druschel . 2016 . Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . 49--64. James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, and Peter Druschel. 2016. Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 49--64."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1607--1619","author":"Liu Yutao","year":"2015","unstructured":"Yutao Liu , Tianyu Zhou , Kexin Chen , Haibo Chen , and Yubin Xia . 2015 . Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation . In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1607--1619 . Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, and Yubin Xia. 2015. Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1607--1619."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043568"},{"key":"e_1_3_2_1_46_1","unstructured":"Larry W McVoy Carl Staelin etal 1996. lmbench: Portable Tools for Performance Analysis.. In USENIX annual technical conference. San Diego CA USA 279--294.  Larry W McVoy Carl Staelin et al. 1996. lmbench: Portable Tools for Performance Analysis.. In USENIX annual technical conference. San Diego CA USA 279--294."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303946"},{"key":"e_1_3_2_1_48_1","volume-title":"2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1466--1482","author":"Murdock Kit","year":"2020","unstructured":"Kit Murdock , David Oswald , Flavio D Garcia , Jo Van Bulck , Daniel Gruss , and Frank Piessens . 2020 . Plundervolt: Software-based fault injection attacks against Intel SGX . In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1466--1482 . Kit Murdock, David Oswald, Flavio D Garcia, Jo Van Bulck, Daniel Gruss, and Frank Piessens. 2020. Plundervolt: Software-based fault injection attacks against Intel SGX. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1466--1482."},{"key":"e_1_3_2_1_49_1","volume-title":"LXDs: Towards Isolation of Kernel Subsystems. In 2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Narayanan Vikram","year":"2019","unstructured":"Vikram Narayanan , Abhiram Balasubramanian , Charlie Jacobsen , Sarah Spall , Scott Bauer , Michael Quigley , Aftab Hussain , Abdullah Younis , Junjie Shen , Moinak Bhattacharyya , 2019 . LXDs: Towards Isolation of Kernel Subsystems. In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . 269--284. Vikram Narayanan, Abhiram Balasubramanian, Charlie Jacobsen, Sarah Spall, Scott Bauer, Michael Quigley, Aftab Hussain, Abdullah Younis, Junjie Shen, Moinak Bhattacharyya, et al. 2019. LXDs: Towards Isolation of Kernel Subsystems. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 269--284."},{"key":"e_1_3_2_1_50_1","volume-title":"Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles. 116--132","author":"Nikolaev Ruslan","year":"2013","unstructured":"Ruslan Nikolaev and Godmar Back . 2013 . VirtuOS: An operating system with kernel virtualization . In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles. 116--132 . Ruslan Nikolaev and Godmar Back. 2013. VirtuOS: An operating system with kernel virtualization. In Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles. 116--132."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00061"},{"key":"e_1_3_2_1_52_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Park Soyeon","year":"2019","unstructured":"Soyeon Park , Sangho Lee , Wen Xu , Hyungon Moon , and Taesoo Kim . 2019 . libmpk: Software abstraction for intel memory protection keys (intel MPK) . In 2019 USENIX Annual Technical Conference (USENIX ATC 19) . 241--254. Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, and Taesoo Kim. 2019. libmpk: Software abstraction for intel memory protection keys (intel MPK). In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 241--254."},{"key":"e_1_3_2_1_53_1","volume-title":"2020 IEEE Symposium on Security and Privacy (SP). IEEE, 563--577","author":"Proskurin Sergej","year":"2020","unstructured":"Sergej Proskurin , Marius Momeu , Seyedhamed Ghavamnia , Vasileios P Kemerlis , and Michalis Polychronakis . 2020 . xmp: Selective memory protection for kernel and user space . In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 563--577 . Sergej Proskurin, Marius Momeu, Seyedhamed Ghavamnia, Vasileios P Kemerlis, and Michalis Polychronakis. 2020. xmp: Selective memory protection for kernel and user space. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 563--577."},{"key":"e_1_3_2_1_54_1","volume-title":"2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1--6.","author":"Qiu Pengfei","year":"2019","unstructured":"Pengfei Qiu , Dongsheng Wang , Yongqiang Lyu , and Gang Qu . 2019 . VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults . In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1--6. Pengfei Qiu, Dongsheng Wang, Yongqiang Lyu, and Gang Qu. 2019. VoltJockey: Breaking SGX by software-controlled voltage-induced hardware faults. In 2019 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 1--6."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186041"},{"key":"e_1_3_2_1_56_1","unstructured":"Philip Reames. 2021. Unintended Instructions on x86. https:\/\/github.com\/preames\/publicnotes\/blob\/master\/unintended-instructions.rst.  Philip Reames. 2021. Unintended Instructions on x86. https:\/\/github.com\/preames\/publicnotes\/blob\/master\/unintended-instructions.rst."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446731"},{"key":"e_1_3_2_1_58_1","volume-title":"Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium.","author":"Schrammel David","year":"2022","unstructured":"David Schrammel , Samuel Weiser , Richard Sadek , and Stefan Mangard . 2022 . Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium. David Schrammel, Samuel Weiser, Richard Sadek, and Stefan Mangard. 2022. Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_1_59_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Schrammel David","year":"2020","unstructured":"David Schrammel , Samuel Weiser , Stefan Steinegger , Martin Schwarzl , Michael Schwarz , Stefan Mangard , and Daniel Gruss . 2020 . Donky: Domain Keys-Efficient In-Process Isolation for RISC-V and x86 . In 29th USENIX Security Symposium (USENIX Security 20) . 1677--1694. David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain Keys-Efficient In-Process Isolation for RISC-V and x86. In 29th USENIX Security Symposium (USENIX Security 20). 1677--1694."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00017"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381052.3381326"},{"key":"e_1_3_2_1_62_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner , Eslam Elnikety , Nuno O Duarte , Michael Sammler , Peter Druschel , and Deepak Garg . 2019 . ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK) . In 28th USENIX Security Symposium (USENIX Security 19) . 1221--1238. Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In 28th USENIX Security Symposium (USENIX Security 19). 1221--1238."},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings fo the 27th USENIX Security Symposium. USENIX Association.","author":"Bulck Jo Van","year":"2018","unstructured":"Jo Van Bulck , Marina Minkin , Ofir Weisse , Daniel Genkin , Baris Kasikci , Frank Piessens , Mark Silberstein , Thomas F Wenisch , Yuval Yarom , and Raoul Strackx . 2018 . Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution . In Proceedings fo the 27th USENIX Security Symposium. USENIX Association. Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In Proceedings fo the 27th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_64_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Bulck Jo Van","year":"2017","unstructured":"Jo Van Bulck , Nico Weichbrodt , R\u00fcdiger Kapitza , Frank Piessens , and Raoul Strackx . 2017 . Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution . In 26th USENIX Security Symposium (USENIX Security 17) . 1041--1056. Jo Van Bulck, Nico Weichbrodt, R\u00fcdiger Kapitza, Frank Piessens, and Raoul Strackx. 2017. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. In 26th USENIX Security Symposium (USENIX Security 17). 1041--1056."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665741"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519560"},{"key":"e_1_3_2_1_67_1","volume-title":"2015 USENIX Annual Technical Conference (USENIX ATC 15)","author":"Wang Jun","year":"2015","unstructured":"Jun Wang , Xi Xiong , and Peng Liu . 2015 . Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications . In 2015 USENIX Annual Technical Conference (USENIX ATC 15) . 361--373. Jun Wang, Xi Xiong, and Peng Liu. 2015. Between mutual trust and mutual distrust: Practical fine-grained privilege separation in multithreaded applications. In 2015 USENIX Annual Technical Conference (USENIX ATC 15). 361--373."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00087"},{"key":"e_1_3_2_1_69_1","volume-title":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 522--536","author":"Wartell Richard","year":"2011","unstructured":"Richard Wartell , Yan Zhou , Kevin W Hamlen , Murat Kantarcioglu , and Bhavani Thuraisingham . 2011 . Differentiating code from data in x86 binaries . In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 522--536 . Richard Wartell, Yan Zhou, Kevin W Hamlen, Murat Kantarcioglu, and Bhavani Thuraisingham. 2011. Differentiating code from data in x86 binaries. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 522--536."},{"key":"e_1_3_2_1_70_1","volume-title":"Privileged architecture Document Version 20211203. CS Division, EECS Department","author":"Waterman Asanovic","year":"2021","unstructured":"Asanovic Waterman and SiFive Inc Hauser . 2021. The RISC-V instruction set manual volume II : Privileged architecture Document Version 20211203. CS Division, EECS Department , University of California , Berkeley ( 2021 ). Asanovic Waterman and SiFive Inc Hauser. 2021. The RISC-V instruction set manual volume II: Privileged architecture Document Version 20211203. CS Division, EECS Department, University of California, Berkeley (2021)."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2016.84"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_2_1_73_1","volume-title":"Proceedings of the twentieth ACM symposium on Operating systems principles. 31--44","author":"Witchel Emmett","year":"2005","unstructured":"Emmett Witchel , Junghwan Rhee , and Krste Asanovi\u0107 . 2005 . Mondrix: Memory isolation for Linux using Mondriaan memory protection . In Proceedings of the twentieth ACM symposium on Operating systems principles. 31--44 . Emmett Witchel, Junghwan Rhee, and Krste Asanovi\u0107. 2005. Mondrix: Memory isolation for Linux using Mondriaan memory protection. In Proceedings of the twentieth ACM symposium on Operating systems principles. 31--44."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_2_1_75_1","first-page":"1","article-title":"Boosting Inter-process Communication with Architectural Support","volume":"39","author":"Xia Yubin","year":"2022","unstructured":"Yubin Xia , Dong Du , Zhichao Hua , Binyu Zang , Haibo Chen , and Haibing Guan . 2022 . Boosting Inter-process Communication with Architectural Support . ACM Transactions on Computer Systems (TOCS) 39 , 1 -- 4 (2022), 1--35. Yubin Xia, Dong Du, Zhichao Hua, Binyu Zang, Haibo Chen, and Haibing Guan. 2022. Boosting Inter-process Communication with Architectural Support. ACM Transactions on Computer Systems (TOCS) 39, 1--4 (2022), 1--35.","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"key":"e_1_3_2_1_76_1","first-page":"479","article-title":"Colony: A privileged trusted execution environment with extensibility","volume":"71","author":"Xia Yubin","year":"2021","unstructured":"Yubin Xia , Zhichao Hua , Yang Yu , Jinyu Gu , Haibo Chen , Binyu Zang , and Haibing Guan . 2021 . Colony: A privileged trusted execution environment with extensibility . IEEE Trans. Comput. 71 , 2 (2021), 479 -- 492 . Yubin Xia, Zhichao Hua, Yang Yu, Jinyu Gu, Haibo Chen, Binyu Zang, and Haibing Guan. 2021. Colony: A privileged trusted execution environment with extensibility. IEEE Trans. Comput. 71, 2 (2021), 479--492.","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043576"},{"key":"e_1_3_2_1_79_1","volume-title":"Super Root: A New Stealthy Rooting Technique on ARM Devices. In International Conference on Applied Cryptography and Network Security. Springer, 344--363","author":"Zhang Zhangkai","year":"2020","unstructured":"Zhangkai Zhang , Yueqiang Cheng , and Zhoujun Li . 2020 . Super Root: A New Stealthy Rooting Technique on ARM Devices. In International Conference on Applied Cryptography and Network Security. Springer, 344--363 . Zhangkai Zhang, Yueqiang Cheng, and Zhoujun Li. 2020. Super Root: A New Stealthy Rooting Technique on ARM Devices. In International Conference on Applied Cryptography and Network Security. Springer, 344--363."}],"event":{"name":"ISCA '23: 50th Annual International Symposium on Computer Architecture","location":"Orlando FL USA","acronym":"ISCA '23","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IEEE"]},"container-title":["Proceedings of the 50th Annual International Symposium on Computer Architecture"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:38Z","timestamp":1750178798000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579371.3589050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":78,"alternative-id":["10.1145\/3579371.3589050","10.1145\/3579371"],"URL":"https:\/\/doi.org\/10.1145\/3579371.3589050","relation":{},"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"2023-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}