{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,8]],"date-time":"2025-07-08T05:16:06Z","timestamp":1751951766456,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1916393,CNS-1916398"],"award-info":[{"award-number":["CNS-1916393,CNS-1916398"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3595797","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"966-979","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["ThreadLock:\u00a0Native\u00a0Principal\u00a0Isolation Through\u00a0Memory\u00a0Protection\u00a0Keys"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5918-2983","authenticated-orcid":false,"given":"William","family":"Blair","sequence":"first","affiliation":[{"name":"Boston University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6968-0273","authenticated-orcid":false,"given":"William","family":"Robertson","sequence":"additional","affiliation":[{"name":"Northeastern University, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5038-2682","authenticated-orcid":false,"given":"Manuel","family":"Egele","sequence":"additional","affiliation":[{"name":"Boston University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"10","volume":"202","author":"Integer","unstructured":"2015. Integer overflow (leading to stack-based buffer overflow) in embedded lua_struct.c. https:\/\/github.com\/redis\/redis\/issues\/2855. Acc. 202 2- 10 - 06 . 2015. Integer overflow (leading to stack-based buffer overflow) in embedded lua_struct.c. https:\/\/github.com\/redis\/redis\/issues\/2855. Acc. 2022-10-06.","journal-title":"Acc."},{"key":"e_1_3_2_1_2_1","first-page":"02","volume":"202","author":"Memory Tagging","unstructured":"2019. Memory Tagging Extension: Enhancing memory safety through architecture. https:\/\/community.arm.com\/arm-community-blogs\/b\/architectures-and-processors-blog\/posts\/enhancing-memory-safety. Acc. 202 2- 02 - 27 . 2019. Memory Tagging Extension: Enhancing memory safety through architecture. https:\/\/community.arm.com\/arm-community-blogs\/b\/architectures-and-processors-blog\/posts\/enhancing-memory-safety. Acc. 2022-02-27.","journal-title":"Acc."},{"key":"e_1_3_2_1_3_1","first-page":"08","volume":"202","author":"Intel\u2019s A Technical Look","unstructured":"2020. A Technical Look at Intel\u2019s Control-flow Enforcement Technology . https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/technical-look-control-flow-enforcement-technology.html. Acc. 202 2- 08 - 28 . 2020. A Technical Look at Intel\u2019s Control-flow Enforcement Technology. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/technical-look-control-flow-enforcement-technology.html. Acc. 2022-08-28.","journal-title":"Acc."},{"key":"e_1_3_2_1_4_1","first-page":"09","volume":"202","author":"Compatibility Binary","unstructured":"2022. Binary Compatibility . https:\/\/gcc.gnu.org\/onlinedocs\/gcc-12.2.0\/gcc\/Compatibility.html. Acc. 202 2- 09 - 21 . 2022. Binary Compatibility. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-12.2.0\/gcc\/Compatibility.html. Acc. 2022-09-21.","journal-title":"Acc."},{"key":"e_1_3_2_1_5_1","first-page":"08","volume":"202","author":"Against Code Reuse Attacks No","unstructured":"2022. Close, but No Cigar: On the Effectiveness of Intel\u2019s CET Against Code Reuse Attacks . https:\/\/grsecurity.net\/effectiveness_of_intel_cet_against_code_reuse_attacks. Acc. 202 2- 08 - 24 . 2022. Close, but No Cigar: On the Effectiveness of Intel\u2019s CET Against Code Reuse Attacks. https:\/\/grsecurity.net\/effectiveness_of_intel_cet_against_code_reuse_attacks. Acc. 2022-08-24.","journal-title":"Acc."},{"key":"e_1_3_2_1_6_1","first-page":"05","volume":"202","unstructured":"2022. CVE-2014-0160. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2014-0160. Acc. 202 2- 05 - 29 . 2022. CVE-2014-0160. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2014-0160. Acc. 2022-05-29.","journal-title":"Acc."},{"key":"e_1_3_2_1_7_1","first-page":"10","volume":"202","unstructured":"2022. CVE-2015-8080. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-8080. Acc. 202 2- 10 - 05 . 2022. CVE-2015-8080. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-8080. Acc. 2022-10-05.","journal-title":"Acc."},{"key":"e_1_3_2_1_8_1","first-page":"05","volume":"202","unstructured":"2022. CVE-2020-14147. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-14147. Acc. 202 2- 05 - 29 . 2022. CVE-2020-14147. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-14147. Acc. 2022-05-29.","journal-title":"Acc."},{"key":"e_1_3_2_1_9_1","first-page":"11","volume":"202","unstructured":"2022. CVE-2022-21617. https:\/\/www.cve.org\/CVERecord?id=CVE-2022-21617. Acc. 202 2- 11 - 22 . 2022. CVE-2022-21617. https:\/\/www.cve.org\/CVERecord?id=CVE-2022-21617. Acc. 2022-11-22.","journal-title":"Acc."},{"key":"e_1_3_2_1_10_1","first-page":"08","volume":"202","author":"Integrity Enforcement How","unstructured":"2022. How to Survive the Hardware-assisted Control-flow Integrity Enforcement . https:\/\/paper.bobylive.com\/Meeting_Papers\/BlackHat\/Asia-2019\/bh-asia-Sun-How-to-Survive-the-Hardware-Assisted-Control-Flow-Integrity-Enforcement.pdf. Acc. 202 2- 08 - 24 . 2022. How to Survive the Hardware-assisted Control-flow Integrity Enforcement. https:\/\/paper.bobylive.com\/Meeting_Papers\/BlackHat\/Asia-2019\/bh-asia-Sun-How-to-Survive-the-Hardware-Assisted-Control-Flow-Integrity-Enforcement.pdf. Acc. 2022-08-24.","journal-title":"Acc."},{"key":"e_1_3_2_1_11_1","first-page":"08","volume":"202","author":"Keys Storage Protect","unstructured":"2022. Storage Protect Keys . https:\/\/www.ibm.com\/docs\/en\/aix\/7.2?topic=concepts-storage-protect-keys. Acc. 202 1- 08 - 16 . 2022. Storage Protect Keys. https:\/\/www.ibm.com\/docs\/en\/aix\/7.2?topic=concepts-storage-protect-keys. Acc. 2021-08-16.","journal-title":"Acc."},{"key":"e_1_3_2_1_12_1","first-page":"05","volume":"202","author":"Apache Usage","unstructured":"2023. Usage statistics of Apache . https:\/\/w3techs.com\/technologies\/details\/ws-apache. Acc. 202 3- 05 - 02 . 2023. Usage statistics of Apache. https:\/\/w3techs.com\/technologies\/details\/ws-apache. Acc. 2023-05-02.","journal-title":"Acc."},{"key":"e_1_3_2_1_13_1","volume-title":"Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and Systems Security","author":"Abadi Mart\u00edn","year":"2009","unstructured":"Mart\u00edn Abadi , Mihai Budiu , Ulfar Erlingsson , and Jay Ligatti . 2009. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and Systems Security ( 2009 ). Mart\u00edn Abadi, Mihai Budiu, Ulfar Erlingsson, and Jay Ligatti. 2009. Control-flow integrity principles, implementations, and applications. ACM Transactions on Information and Systems Security (2009)."},{"key":"e_1_3_2_1_14_1","volume-title":"European Symposium on Programming.","author":"Bauereiss Thomas","year":"2022","unstructured":"Thomas Bauereiss , Brian Campbell , Thomas Sewell , Alasdair Armstrong , Lawrence Esswood , Ian Stark , Graeme Barnes , Robert\u00a0 NM Watson , and Peter Sewell . 2022 . Verified security for the Morello capability-enhanced prototype Arm architecture . In European Symposium on Programming. Thomas Bauereiss, Brian Campbell, Thomas Sewell, Alasdair Armstrong, Lawrence Esswood, Ian Stark, Graeme Barnes, Robert\u00a0NM Watson, and Peter Sewell. 2022. Verified security for the Morello capability-enhanced prototype Arm architecture. In European Symposium on Programming."},{"key":"e_1_3_2_1_15_1","volume-title":"IEEE Symposium on Security and Privacy.","author":"Bittau Andrea","year":"2014","unstructured":"Andrea Bittau , Adam Belay , Ali Mashtizadeh , David Mazieres , and Dan Boneh . 2014 . Hacking blind . In IEEE Symposium on Security and Privacy. Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazieres, and Dan Boneh. 2014. Hacking blind. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_16_1","volume-title":"MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys. In Conference on Detection of Intrusions and Malware, and Vulnerability Assessment.","author":"Blair William","year":"2022","unstructured":"William Blair , William Robertson , and Manuel Egele . 2022 . MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys. In Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. William Blair, William Robertson, and Manuel Egele. 2022. MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys. In Conference on Detection of Intrusions and Malware, and Vulnerability Assessment."},{"key":"e_1_3_2_1_17_1","volume-title":"PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In USENIX Security Symposium.","author":"Connor R\u00a0Joseph","year":"2020","unstructured":"R\u00a0Joseph Connor , Tyler McDaniel , Jared\u00a0 M Smith , and Max Schuchard . 2020 . PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In USENIX Security Symposium. R\u00a0Joseph Connor, Tyler McDaniel, Jared\u00a0M Smith, and Max Schuchard. 2020. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_1_18_1","volume-title":"ACM Conference on Architectural Support for Progamming Languages and Operating Systems.","author":"Dautenhahn Nathan","year":"2015","unstructured":"Nathan Dautenhahn , Theodoros Kasampalis , Will Dietz , John Criswell , and Vikram Adve . 2015 . Nested kernel: An operating system architecture for intra-kernel privilege separation . In ACM Conference on Architectural Support for Progamming Languages and Operating Systems. Nathan Dautenhahn, Theodoros Kasampalis, Will Dietz, John Criswell, and Vikram Adve. 2015. Nested kernel: An operating system architecture for intra-kernel privilege separation. In ACM Conference on Architectural Support for Progamming Languages and Operating Systems."},{"key":"e_1_3_2_1_19_1","volume-title":"FlexFilt: Towards Flexible Instruction Filtering for Security. In Annual Computer Security Applications Conference.","author":"Delshadtehrani Leila","year":"2021","unstructured":"Leila Delshadtehrani , Sadullah Canakci , William Blair , Manuel Egele , and Ajay Joshi . 2021 . FlexFilt: Towards Flexible Instruction Filtering for Security. In Annual Computer Security Applications Conference. Leila Delshadtehrani, Sadullah Canakci, William Blair, Manuel Egele, and Ajay Joshi. 2021. FlexFilt: Towards Flexible Instruction Filtering for Security. In Annual Computer Security Applications Conference."},{"key":"e_1_3_2_1_20_1","volume-title":"Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. In USENIX Security Symposium.","author":"Du Yufei","year":"2022","unstructured":"Yufei Du , Zhuojia Shen , Komail Dharsee , Jie Zhou , Robert\u00a0 J. Walls , and John Criswell . 2022 . Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. In USENIX Security Symposium. Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert\u00a0J. Walls, and John Criswell. 2022. Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. In USENIX Security Symposium."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446728"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium.","author":"Giuffrida Cristiano","year":"2012","unstructured":"Cristiano Giuffrida , Anton Kuijsten , and Andrew\u00a0 S Tanenbaum . 2012 . Enhanced operating system security through efficient and fine-grained address space randomization . In USENIX Security Symposium. Cristiano Giuffrida, Anton Kuijsten, and Andrew\u00a0S Tanenbaum. 2012. Enhanced operating system security through efficient and fine-grained address space randomization. In USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","volume-title":"ASLR on the Line: Practical Cache Attacks on the MMU. In Network and Distributed System Security Symposium.","author":"Gras Ben","year":"2017","unstructured":"Ben Gras , Kaveh Razavi , Erik Bosman , Herbert Bos , and Cristiano Giuffrida . 2017 . ASLR on the Line: Practical Cache Attacks on the MMU. In Network and Distributed System Security Symposium. Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_24_1","volume-title":"EPK: Scalable and Efficient Memory Protection Keys. In USENIX Annual Technical Conference.","author":"Gu Jinyu","year":"2022","unstructured":"Jinyu Gu , Hao Li , Wentai Li , Yubin Xia , and Haibo Chen . 2022 . EPK: Scalable and Efficient Memory Protection Keys. In USENIX Annual Technical Conference. Jinyu Gu, Hao Li, Wentai Li, Yubin Xia, and Haibo Chen. 2022. EPK: Scalable and Efficient Memory Protection Keys. In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security Symposium.","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati , Spyridoula Gravani , Ethan Johnson , John Criswell , Michael\u00a0 L Scott , Kai Shen , and Mike Marty . 2019 . Hodor: Intra-process isolation for high-throughput data plane libraries . In USENIX Security Symposium. Mohammad Hedayati, Spyridoula Gravani, Ethan Johnson, John Criswell, Michael\u00a0L Scott, Kai Shen, and Mike Marty. 2019. Hodor: Intra-process isolation for high-throughput data plane libraries. In USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","volume-title":"ACM Conference on Computer and Communications Security.","author":"Ching-Hsiang Hsu Terry","year":"2016","unstructured":"Terry Ching-Hsiang Hsu , Kevin Hoffman , Patrick Eugster , and Mathias Payer . 2016 . Enforcing least privilege memory views for multithreaded applications . In ACM Conference on Computer and Communications Security. Terry Ching-Hsiang Hsu, Kevin Hoffman, Patrick Eugster, and Mathias Payer. 2016. Enforcing least privilege memory views for multithreaded applications. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_27_1","volume-title":"VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. In ACM Conference on Computer and Communications Security.","author":"Ismail Mohannad","year":"2021","unstructured":"Mohannad Ismail , Jinwoo Yom , Christopher Jelesnianski , Yeongjin Jang , and Changwoo Min . 2021 . VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. In ACM Conference on Computer and Communications Security. Mohannad Ismail, Jinwoo Yom, Christopher Jelesnianski, Yeongjin Jang, and Changwoo Min. 2021. VIP: Safeguard Value Invariant Property for Thwarting Critical Memory Corruption Attacks. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833650"},{"key":"e_1_3_2_1_29_1","volume-title":"European Conference on Computer systems.","author":"Kirth Paul","year":"2022","unstructured":"Paul Kirth , Mitchel Dickerson , Stephen Crane , Per Larsen , Adrian Dabrowski , David Gens , Yeoul Na , Stijn Volckaert , and Michael Franz . 2022 . PKRU-safe: automatically locking down the heap between safe and unsafe languages . In European Conference on Computer systems. Paul Kirth, Mitchel Dickerson, Stephen Crane, Per Larsen, Adrian Dabrowski, David Gens, Yeoul Na, Stijn Volckaert, and Michael Franz. 2022. PKRU-safe: automatically locking down the heap between safe and unsafe languages. In European Conference on Computer systems."},{"key":"e_1_3_2_1_30_1","volume-title":"European Conference on Computer systems.","author":"Koning Koen","year":"2017","unstructured":"Koen Koning , Xi Chen , Herbert Bos , Cristiano Giuffrida , and Elias Athanasopoulos . 2017 . No need to hide: Protecting safe regions on commodity hardware . In European Conference on Computer systems. Koen Koning, Xi Chen, Herbert Bos, Cristiano Giuffrida, and Elias Athanasopoulos. 2017. No need to hide: Protecting safe regions on commodity hardware. In European Conference on Computer systems."},{"key":"e_1_3_2_1_31_1","volume-title":"ACM ASIA Conference on Computer and Communications Security.","author":"Kushwah Shivendra","year":"2021","unstructured":"Shivendra Kushwah , Ankush Desai , Pramod Subramanyan , and Sanjit\u00a0 A Seshia . 2021 . PSec: Programming Secure Distributed Systems using Enclaves . In ACM ASIA Conference on Computer and Communications Security. Shivendra Kushwah, Ankush Desai, Pramod Subramanyan, and Sanjit\u00a0A Seshia. 2021. PSec: Programming Secure Distributed Systems using Enclaves. In ACM ASIA Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_33_1","volume-title":"ACM Conference on Architectural Support for Progamming Languages and Operating Systems.","author":"Lefeuvre Hugo","year":"2022","unstructured":"Hugo Lefeuvre , Vlad-Andrei B\u0103doiu , Alexander Jung , Stefan\u00a0Lucian Teodorescu , Sebastian Rauch , Felipe Huici , Costin Raiciu , and Pierre Olivier . 2022 . FlexOS: towards flexible OS isolation . In ACM Conference on Architectural Support for Progamming Languages and Operating Systems. Hugo Lefeuvre, Vlad-Andrei B\u0103doiu, Alexander Jung, Stefan\u00a0Lucian Teodorescu, Sebastian Rauch, Felipe Huici, Costin Raiciu, and Pierre Olivier. 2022. FlexOS: towards flexible OS isolation. In ACM Conference on Architectural Support for Progamming Languages and Operating Systems."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23173"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954331"},{"key":"e_1_3_2_1_36_1","volume-title":"IEEE Symposium on Security and Privacy.","author":"Nienhuis Kyndylan","year":"2020","unstructured":"Kyndylan Nienhuis , Alexandre Joannou , Thomas Bauereiss , Anthony Fox , Michael Roe , Brian Campbell , Matthew Naylor , Robert\u00a0 M Norton , Simon\u00a0 W Moore , Peter\u00a0 G Neumann , 2020 . Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process . In IEEE Symposium on Security and Privacy. Kyndylan Nienhuis, Alexandre Joannou, Thomas Bauereiss, Anthony Fox, Michael Roe, Brian Campbell, Matthew Naylor, Robert\u00a0M Norton, Simon\u00a0W Moore, Peter\u00a0G Neumann, 2020. Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219662"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Annual Technical Conference.","author":"Park Soyeon","year":"2019","unstructured":"Soyeon Park , Sangho Lee , Wen Xu , HyunGon Moon , and Taesoo Kim . 2019 . libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK) . In USENIX Annual Technical Conference. Soyeon Park, Sangho Lee, Wen Xu, HyunGon Moon, and Taesoo Kim. 2019. libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). In USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_39_1","volume-title":"Network and Distributed System Security Symposium.","author":"Park Taemin","year":"2020","unstructured":"Taemin Park , Karel Dhondt , David Gens , Yeoul Na , Stijn Volckaert , and Michael Franz . 2020 . Nojitsu: Locking down javascript engines . In Network and Distributed System Security Symposium. Taemin Park, Karel Dhondt, David Gens, Yeoul Na, Stijn Volckaert, and Michael Franz. 2020. Nojitsu: Locking down javascript engines. In Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485903"},{"key":"e_1_3_2_1_41_1","volume-title":"Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium.","author":"Schrammel David","year":"2022","unstructured":"David Schrammel , Samuel Weiser , Richard Sadek , and Stefan Mangard . 2022 . Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium. David Schrammel, Samuel Weiser, Richard Sadek, and Stefan Mangard. 2022. Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX Security Symposium.","author":"Schrammel David","year":"2020","unstructured":"David Schrammel , Samuel Weiser , Stefan Steinegger , Martin Schwarzl , Michael Schwarz , Stefan Mangard , and Daniel Gruss . 2020 . Donky: Domain Keys\u2013Efficient In-Process Isolation for RISC-V and x86 . In USENIX Security Symposium. David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain Keys\u2013Efficient In-Process Isolation for RISC-V and x86. In USENIX Security Symposium."},{"key":"e_1_3_2_1_43_1","volume-title":"ACM Conference on Computer and Communications Security.","author":"Shacham Hovav","year":"2004","unstructured":"Hovav Shacham , Matthew Page , Ben Pfaff , Eu-Jin Goh , Nagendra Modadugu , and Dan Boneh . 2004 . On the effectiveness of address-space randomization . In ACM Conference on Computer and Communications Security. Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, and Dan Boneh. 2004. On the effectiveness of address-space randomization. In ACM Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_44_1","volume-title":"International Workshop on Hardware and Architectural Support for Security and Privacy.","author":"Shanbhogue Vedvyas","year":"2019","unstructured":"Vedvyas Shanbhogue , Deepak Gupta , and Ravi Sahita . 2019 . Security analysis of processor instruction set architecture for enforcing control-flow integrity . In International Workshop on Hardware and Architectural Support for Security and Privacy. Vedvyas Shanbhogue, Deepak Gupta, and Ravi Sahita. 2019. Security analysis of processor instruction set architecture for enforcing control-flow integrity. In International Workshop on Hardware and Architectural Support for Security and Privacy."},{"key":"e_1_3_2_1_45_1","first-page":"10","volume":"202","author":"Pax Team","unstructured":"Team Pax . [n. d.]. Address space layout randomization. http:\/\/pax.grsecurity.net\/docs\/aslr.txt. Acc. 202 2- 10 - 11 . Team Pax. [n. d.]. Address space layout randomization. http:\/\/pax.grsecurity.net\/docs\/aslr.txt. Acc. 2022-10-11.","journal-title":"Acc."},{"key":"e_1_3_2_1_46_1","volume-title":"USENIX Security Symposium.","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner , Eslam Elnikety , Nuno\u00a0 O Duarte , Michael Sammler , Peter Druschel , and Deepak Garg . 2019 . ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK) . In USENIX Security Symposium. Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno\u00a0O Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In USENIX Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"European Conference on Computer systems.","author":"Voulimeneas Alexios","year":"2022","unstructured":"Alexios Voulimeneas , Jonas Vinck , Ruben Mechelinck , and Stijn Volckaert . 2022 . You Shall Not (by)Pass! Practical, Secure, and Fast PKU-Based Sandboxing . In European Conference on Computer systems. Alexios Voulimeneas, Jonas Vinck, Ruben Mechelinck, and Stijn Volckaert. 2022. You Shall Not (by)Pass! Practical, Secure, and Fast PKU-Based Sandboxing. In European Conference on Computer systems."},{"key":"e_1_3_2_1_48_1","volume-title":"Making Information Hiding Effective Again","author":"Wang Zhe","year":"2021","unstructured":"Zhe Wang , Chenggang Wu , Yinqian Zhang , Bowen Tang , Pen-Chung Yew , Mengyao Xie , Yuanming Lai , Yan Kang , Yueqiang Cheng , and Zhiping Shi . 2021. Making Information Hiding Effective Again . IEEE Transactions on Dependable and Secure Computing ( 2021 ). Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi. 2021. Making Information Hiding Effective Again. IEEE Transactions on Dependable and Secure Computing (2021)."},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation.","author":"Williams-King David","year":"2016","unstructured":"David Williams-King , Graham Gobieski , Kent Williams-King , James\u00a0 P Blake , Xinhao Yuan , Patrick Colp , Michelle Zheng , Vasileios\u00a0 P Kemerlis , Junfeng Yang , and William Aiello . 2016 . Shuffler: Fast and deployable continuous code re-randomization . In USENIX Symposium on Operating Systems Design and Implementation. David Williams-King, Graham Gobieski, Kent Williams-King, James\u00a0P Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios\u00a0P Kemerlis, Junfeng Yang, and William Aiello. 2016. Shuffler: Fast and deployable continuous code re-randomization. In USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_1_50_1","volume-title":"ACM Conference on Architectural Support for Progamming Languages and Operating Systems.","author":"Williams-King David","year":"2020","unstructured":"David Williams-King , Hidenori Kobayashi , Kent Williams-King , Graham Patterson , Frank Spano , Yu\u00a0Jian Wu , Junfeng Yang , and Vasileios\u00a0 P Kemerlis . 2020 . Egalito: Layout-agnostic binary recompilation . In ACM Conference on Architectural Support for Progamming Languages and Operating Systems. David Williams-King, Hidenori Kobayashi, Kent Williams-King, Graham Patterson, Frank Spano, Yu\u00a0Jian Wu, Junfeng Yang, and Vasileios\u00a0P Kemerlis. 2020. Egalito: Layout-agnostic binary recompilation. In ACM Conference on Architectural Support for Progamming Languages and Operating Systems."},{"key":"e_1_3_2_1_51_1","volume-title":"VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. In ACM Conference on Architectural Support for Progamming Languages and Operating Systems.","author":"Yuan Ziqi","year":"2023","unstructured":"Ziqi Yuan , Siyu Hong , Rui Chang , Yajin Zhou , Wenbo Shen , and Kui Ren . 2023 . VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. In ACM Conference on Architectural Support for Progamming Languages and Operating Systems. Ziqi Yuan, Siyu Hong, Rui Chang, Yajin Zhou, Wenbo Shen, and Kui Ren. 2023. VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. In ACM Conference on Architectural Support for Progamming Languages and Operating Systems."},{"key":"e_1_3_2_1_52_1","volume-title":"Hardware Enforcement of Application Security Policies Using Tagged Memory. In USENIX Symposium on Operating Systems Design and Implementation.","author":"Zeldovich Nickolai","year":"2008","unstructured":"Nickolai Zeldovich , Hari Kannan , Michael Dalton , and Christos Kozyrakis . 2008 . Hardware Enforcement of Application Security Policies Using Tagged Memory. In USENIX Symposium on Operating Systems Design and Implementation. Nickolai Zeldovich, Hari Kannan, Michael Dalton, and Christos Kozyrakis. 2008. Hardware Enforcement of Application Security Policies Using Tagged Memory. In USENIX Symposium on Operating Systems Design and Implementation."}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Melbourne VIC Australia","acronym":"ASIA CCS '23"},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3579856.3595797","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:17Z","timestamp":1750183697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3595797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":52,"alternative-id":["10.1145\/3579856.3595797","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3595797","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}