{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,28]],"date-time":"2025-08-28T12:21:37Z","timestamp":1756383697380,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":123,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:00:00Z","timestamp":1687046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1617513","1718923","1846230","1953932"],"award-info":[{"award-number":["1617513","1718923","1846230","1953932"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,6,18]]},"DOI":"10.1145\/3581791.3596864","type":"proceedings-article","created":{"date-parts":[[2023,6,16]],"date-time":"2023-06-16T17:52:21Z","timestamp":1686937941000},"page":"233-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9842-0713","authenticated-orcid":false,"given":"Zhihao","family":"Yao","sequence":"first","affiliation":[{"name":"University of California, Irvine, Irvine, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4255-0776","authenticated-orcid":false,"given":"Seyed Mohammadjavad","family":"Seyed Talebi","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0339-5215","authenticated-orcid":false,"given":"Mingyi","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0130-587X","authenticated-orcid":false,"given":"Ardalan","family":"Amiri Sani","sequence":"additional","affiliation":[{"name":"University of California, Irvine, Irvine, CA, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2951-0343","authenticated-orcid":false,"given":"Thomas","family":"Anderson","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2023,6,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"State of mobile banking in 2020: top apps, features, statistics and market trends. https:\/\/www.businessinsider.com\/mobile-banking-market-trends","author":"Phaneuf A.","year":"2019","unstructured":"A. Phaneuf . State of mobile banking in 2020: top apps, features, statistics and market trends. https:\/\/www.businessinsider.com\/mobile-banking-market-trends , 2019 . A. Phaneuf. State of mobile banking in 2020: top apps, features, statistics and market trends. https:\/\/www.businessinsider.com\/mobile-banking-market-trends, 2019."},{"key":"e_1_3_2_1_2_1","volume-title":"NEWS: OmniPod Tubeless Insulin Pump to Offer Smart-phone Control Soon. https:\/\/www.healthline.com\/diabetesmine\/omnipod-smartphone-control-diabetes","author":"Team DiabetesMine","year":"2019","unstructured":"DiabetesMine Team . NEWS: OmniPod Tubeless Insulin Pump to Offer Smart-phone Control Soon. https:\/\/www.healthline.com\/diabetesmine\/omnipod-smartphone-control-diabetes , 2019 . DiabetesMine Team. NEWS: OmniPod Tubeless Insulin Pump to Offer Smart-phone Control Soon. https:\/\/www.healthline.com\/diabetesmine\/omnipod-smartphone-control-diabetes, 2019."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2742647.2742674"},{"key":"e_1_3_2_1_4_1","volume-title":"Linux Security Summit (LSS)","author":"Stoep J. Vander","year":"2016","unstructured":"J. Vander Stoep . Android : Protecting the Kernel . In Linux Security Summit (LSS) , 2016 . J. Vander Stoep. Android: Protecting the Kernel. In Linux Security Summit (LSS), 2016."},{"key":"e_1_3_2_1_5_1","volume-title":"Linux Kernel: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/47\/Linux-Linux-Kernel.html","author":"Details CVE","year":"2022","unstructured":"CVE Details . Linux Kernel: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/47\/Linux-Linux-Kernel.html , 2022 . CVE Details. Linux Kernel: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/47\/Linux-Linux-Kernel.html, 2022."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/found_bugs.md","author":"Vulnerabilities Bugs","year":"2018","unstructured":"Bugs and Vulnerabilities Founds by Syzkaller in Linux Kernel . https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/found_bugs.md , 2018 . Bugs and Vulnerabilities Founds by Syzkaller in Linux Kernel. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/found_bugs.md, 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Windows 10: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/32238\/Microsoft-Windows-10.html","author":"Details CVE","year":"2021","unstructured":"CVE Details . Windows 10: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/32238\/Microsoft-Windows-10.html , 2021 . CVE Details. Windows 10: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/32238\/Microsoft-Windows-10.html, 2021."},{"key":"e_1_3_2_1_8_1","volume-title":"XEN: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/23463\/XEN-XEN.html","author":"Details CVE","year":"2021","unstructured":"CVE Details . XEN: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/23463\/XEN-XEN.html , 2021 . CVE Details. XEN: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/23463\/XEN-XEN.html, 2021."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813714"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950401"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217943"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. USENIX Security Symposium","author":"Lipp M.","year":"2018","unstructured":"M. Lipp , M. Schwarz , D. Gruss , T. Prescher , W. Haas , A. Fogh , J. Horn , S. Mangard , P. Kocher , D. Genkin , Y. Yarom , and M. Hamburg . Meltdown: Reading Kernel Memory from User Space . In Proc. USENIX Security Symposium , 2018 . M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, A. Fogh, J. Horn, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, and M. Hamburg. Meltdown: Reading Kernel Memory from User Space. In Proc. USENIX Security Symposium, 2018."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. USENIX Security Symposium","author":"Bulck J. Van","year":"2018","unstructured":"J. Van Bulck , M. Minkin , O. Weisse , D. Genkin , Baris Kasikci , F. Piessens , M. Silberstein , T. F. Wenisch , Y. Yarom , and R. Strackx . Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution . In Proc. USENIX Security Symposium , 2018 . J. Van Bulck, M. Minkin, O. Weisse, D. Genkin, Baris Kasikci, F. Piessens, M. Silberstein, T. F. Wenisch, Y. Yarom, and R. Strackx. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proc. USENIX Security Symposium, 2018."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. USENIX Security Symposium","author":"Paccagnella R.","year":"2021","unstructured":"R. Paccagnella , L. Luo , and C. W. Fletcher . Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical . In Proc. USENIX Security Symposium , 2021 . R. Paccagnella, L. Luo, and C. W. Fletcher. Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. In Proc. USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. USENIX Security Symposium","author":"Weber D.","year":"2021","unstructured":"D. Weber , A. Ibrahim , H. Nemati , M. Schwarz , and C. Rossow . Osiris: Automated Discovery of Microarchitectural Side Channels . In Proc. USENIX Security Symposium , 2021 . D. Weber, A. Ibrahim, H. Nemati, M. Schwarz, and C. Rossow. Osiris: Automated Discovery of Microarchitectural Side Channels. In Proc. USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_19_1","unstructured":"National Vulnerability Database. CVE-2021-0200: Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-0200.  National Vulnerability Database. CVE-2021-0200: Out-of-bounds write in the firmware for Intel(R) Ethernet 700 Series Controllers before version 8.2 may allow a privileged user to potentially enable an escalation of privilege via local access. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-0200."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. USENIX Workshop on Offensive Technologies (WOOT)","author":"Brasser F.","year":"2017","unstructured":"F. Brasser , U. M\u00fcller , A. Dmitrienko , K. Kostiainen , S. Capkun , and A. Sadeghi . Software Grand Exposure: SGX Cache Attacks Are Practical . In Proc. USENIX Workshop on Offensive Technologies (WOOT) , 2017 . F. Brasser, U. M\u00fcller, A. Dmitrienko, K. Kostiainen, S. Capkun, and A. Sadeghi. Software Grand Exposure: SGX Cache Attacks Are Practical. In Proc. USENIX Workshop on Offensive Technologies (WOOT), 2017."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00020"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. USENIX Security Symposium","author":"Moghimi D.","year":"2020","unstructured":"D. Moghimi , J. Van Bulck , N. Heninger , F. Piessens , and B. Sunar . CopyCat: Controlled Instruction-Level Attacks on Enclaves . In Proc. USENIX Security Symposium , 2020 . D. Moghimi, J. Van Bulck, N. Heninger, F. Piessens, and B. Sunar. CopyCat: Controlled Instruction-Level Attacks on Enclaves. In Proc. USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_1"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. USENIX Security Symposium","author":"Lipp M.","year":"2016","unstructured":"M. Lipp , D. Gruss , R. Spreitzer , C. Maurice , and S. Mangard . ARMageddon: Cache Attacks on Mobile Devices . In Proc. USENIX Security Symposium , 2016 . M. Lipp, D. Gruss, R. Spreitzer, C. Maurice, and S. Mangard. ARMageddon: Cache Attacks on Mobile Devices. In Proc. USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_27_1","first-page":"980","volume":"2016","author":"Zhang N.","year":"2016","unstructured":"N. Zhang , K. Sun , D. Shands , W. Lou , and Y. T. Hou . TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices. IACR Cryptology ePrint Archive , 2016 : 980 , 2016 . N. Zhang, K. Sun, D. Shands, W. Lou, and Y. T. Hou. TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices. IACR Cryptology ePrint Archive, 2016:980, 2016.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. USENIX Security Symposium","author":"Li M.","year":"2021","unstructured":"M. Li , Y. Zhang , H. Wang , K. Li , and Y. Cheng . CipherLeaks: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel . In Proc. USENIX Security Symposium , 2021 . M. Li, Y. Zhang, H. Wang, K. Li, and Y. Cheng. CipherLeaks: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. In Proc. USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00061"},{"key":"e_1_3_2_1_30_1","unstructured":"CVE Details. Op-tee: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/56969\/Linaro-Op-tee.html https:\/\/www.cvedetails.com\/product\/42749\/Linaro-Op-tee.html https:\/\/www.cvedetails.com\/product\/36161\/Op-tee-Op-tee-Os.html 2021.  CVE Details. Op-tee: Vulnerability Statistics. https:\/\/www.cvedetails.com\/product\/56969\/Linaro-Op-tee.html https:\/\/www.cvedetails.com\/product\/42749\/Linaro-Op-tee.html https:\/\/www.cvedetails.com\/product\/36161\/Op-tee-Op-tee-Os.html 2021."},{"volume-title":"BREAKING SAMSUNG'S ARM TRUSTZONE. https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf","year":"2019","key":"e_1_3_2_1_31_1","unstructured":"Quarklab. BREAKING SAMSUNG'S ARM TRUSTZONE. https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf , 2019 . Quarklab. BREAKING SAMSUNG'S ARM TRUSTZONE. https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Peterlin-Breaking-Samsungs-ARM-TrustZone.pdf, 2019."},{"key":"e_1_3_2_1_32_1","unstructured":"National Vulnerability Database. Vulnerability summary for cve-2015-6639.  National Vulnerability Database. Vulnerability summary for cve-2015-6639."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050748.3050763"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. USENIX Security Symposium","author":"Li M.","year":"2019","unstructured":"M. Li , Y. Zhang , Z. Lin , and Y. Solihin . Exploiting Unprotected I\/O Operations in AMD's Secure Encrypted Virtualization . In Proc. USENIX Security Symposium , 2019 . M. Li, Y. Zhang, Z. Lin, and Y. Solihin. Exploiting Unprotected I\/O Operations in AMD's Secure Encrypted Virtualization. In Proc. USENIX Security Symposium, 2019."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00080"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485253"},{"key":"e_1_3_2_1_37_1","volume-title":"https:\/\/support.apple.com\/guide\/security\/secure-enclave-sec59b0b31ff\/web","author":"Secure Enclave Apple Platform","year":"2021","unstructured":"Apple Platform Security - Secure Enclave . https:\/\/support.apple.com\/guide\/security\/secure-enclave-sec59b0b31ff\/web , 2021 . Apple Platform Security - Secure Enclave. https:\/\/support.apple.com\/guide\/security\/secure-enclave-sec59b0b31ff\/web, 2021."},{"key":"e_1_3_2_1_38_1","volume-title":"https:\/\/support.apple.com\/guide\/security\/touch-id-and-face-id-security-sec067eb0c9e\/web","author":"Apple Platform","year":"2021","unstructured":"Apple Platform Security - Touch ID and Face ID security. https:\/\/support.apple.com\/guide\/security\/touch-id-and-face-id-security-sec067eb0c9e\/web , 2021 . Apple Platform Security - Touch ID and Face ID security. https:\/\/support.apple.com\/guide\/security\/touch-id-and-face-id-security-sec067eb0c9e\/web, 2021."},{"key":"e_1_3_2_1_39_1","volume-title":"Pixel 6: Setting a new standard for mobile security. https:\/\/security.googleblog.com\/2021\/10\/pixel-6-setting-new-standard-for-mobile.html","author":"Kleidermacher D.","year":"2021","unstructured":"D. Kleidermacher , J. Seed , B. Barbello , S. Somogyi , and Pixel & Tensor security teams Android . Pixel 6: Setting a new standard for mobile security. https:\/\/security.googleblog.com\/2021\/10\/pixel-6-setting-new-standard-for-mobile.html , 2021 . D. Kleidermacher, J. Seed, B. Barbello, S. Somogyi, and Pixel & Tensor security teams Android. Pixel 6: Setting a new standard for mobile security. https:\/\/security.googleblog.com\/2021\/10\/pixel-6-setting-new-standard-for-mobile.html, 2021."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103799.2103805"},{"key":"e_1_3_2_1_41_1","volume-title":"Proc.","author":"Accetta M.","year":"1986","unstructured":"M. Accetta , R. Baron , W. Bolosky , D. Golub , R. Rashid , A. Tevanian , and M. Young . Mach: A New Kernel Foundation For UNIX Development . In Proc. Summer 1986 USENIX Conference , 1986. M. Accetta, R. Baron, W. Bolosky, D. Golub, R. Rashid, A. Tevanian, and M. Young. Mach: A New Kernel Foundation For UNIX Development. In Proc. Summer 1986 USENIX Conference, 1986."},{"key":"e_1_3_2_1_42_1","volume-title":"ACM SIGOPS Operating Systems Review","author":"Liedtke J.","year":"1993","unstructured":"J. Liedtke . Improving IPC by Kernel Design . ACM SIGOPS Operating Systems Review , 1993 . J. Liedtke. Improving IPC by Kernel Design. ACM SIGOPS Operating Systems Review, 1993."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/566726.566751"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522720"},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. ACM SOSP","author":"Engler D. R.","year":"1995","unstructured":"D. R. Engler , M. F. Kaashoek , and J. O'Toole Jr. Exokernel : an Operating System Architecture for Application-Level Resource Management . In Proc. ACM SOSP , 1995 . D. R. Engler, M. F. Kaashoek, and J. O'Toole Jr. Exokernel: an Operating System Architecture for Application-Level Resource Management. In Proc. ACM SOSP, 1995."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266644"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950399"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. USENIX OSDI","author":"Baumann A.","year":"2014","unstructured":"A. Baumann , M. Peinado , and G. Hunt . Shielding Applications from an Un-trusted Cloud with Haven . Proc. USENIX OSDI , 2014 . A. Baumann, M. Peinado, and G. Hunt. Shielding Applications from an Un-trusted Cloud with Haven. Proc. USENIX OSDI, 2014."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676975"},{"key":"e_1_3_2_1_51_1","volume-title":"Proc. USENIX OSDI","author":"Gu R.","year":"2016","unstructured":"R. Gu , Z. Shao , H. Chen , X. N. Wu , J. Kim , V. Sj\u00f6berg , and D. Costanzo . CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels . In Proc. USENIX OSDI , 2016 . R. Gu, Z. Shao, H. Chen, X. N. Wu, J. Kim, V. Sj\u00f6berg, and D. Costanzo. CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. In Proc. USENIX OSDI, 2016."},{"key":"e_1_3_2_1_52_1","volume-title":"Proc. USENIX Security Symposium","author":"Vasudevan A.","year":"2016","unstructured":"A. Vasudevan , S. Chaki , P. Maniatis , L. Jia , and A. Datta . \u00fcberSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor . In Proc. USENIX Security Symposium , 2016 . A. Vasudevan, S. Chaki, P. Maniatis, L. Jia, and A. Datta. \u00fcberSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. In Proc. USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132748"},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. USENIX OSDI","author":"Sigurbjarnarson H.","year":"2018","unstructured":"H. Sigurbjarnarson , L. Nelson , B. Castro-Karney , J. Bornholt , E. Torlak , and X. Wang . Nickel: A framework for Design and Verification of Information Flow Control Systems . In Proc. USENIX OSDI , 2018 . H. Sigurbjarnarson, L. Nelson, B. Castro-Karney, J. Bornholt, E. Torlak, and X. Wang. Nickel: A framework for Design and Verification of Information Flow Control Systems. In Proc. USENIX OSDI, 2018."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/AAI28545544"},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. USENIX Security Symposium","author":"Li S.","year":"2021","unstructured":"S. Li , X. Li , R. Gu , J. Nieh , and J. Z. Hui . Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor . In Proc. USENIX Security Symposium , 2021 . S. Li, X. Li, R. Gu, J. Nieh, and J. Z. Hui. Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor. In Proc. USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483560"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217953"},{"key":"e_1_3_2_1_59_1","author":"Hunt G. C.","year":"2007","unstructured":"G. C. Hunt and J. R. Larus . Singularity: Rethinking the Software Stack. ACM SIGOPS Operating Systems Review , 2007 . G. C. Hunt and J. R. Larus. Singularity: Rethinking the Software Stack. ACM SIGOPS Operating Systems Review, 2007.","journal-title":"Singularity: Rethinking the Software Stack. ACM SIGOPS Operating Systems Review"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_61_1","volume-title":"Proc. USENIX OSDI","author":"Narayanan V.","year":"2020","unstructured":"V. Narayanan , T. Huang , D. Detweiler , D. Appel , Z. Li , G. Zellweger , and A. Burtsev . RedLeaf: Isolation and Communication in a Safe Operating System . In Proc. USENIX OSDI , 2020 . V. Narayanan, T. Huang, D. Detweiler, D. Appel, Z. Li, G. Zellweger, and A. Burtsev. RedLeaf: Isolation and Communication in a Safe Operating System. In Proc. USENIX OSDI, 2020."},{"key":"e_1_3_2_1_62_1","volume-title":"Proc. ACM ASPLOS","author":"Chen X.","year":"2008","unstructured":"X. Chen , T. Garfinkel , E. C. Lewis , P. Subrahmanyam , C. A. Waldspurger , D. Boneh , J. Dwoskin , and D. R. K. Ports . Overshadow : a Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems . In Proc. ACM ASPLOS , 2008 . X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. K. Ports. Overshadow: a Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems. In Proc. ACM ASPLOS, 2008."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451146"},{"key":"e_1_3_2_1_64_1","volume-title":"Arm CCA will put confidential compute in the hands of every developer. https:\/\/www.arm.com\/company\/news\/2021\/06\/arm-cca-will-put-confidential-compute-in-the-hands-of-every-developer","author":"Grisenthwaite R.","year":"2021","unstructured":"R. Grisenthwaite . Arm CCA will put confidential compute in the hands of every developer. https:\/\/www.arm.com\/company\/news\/2021\/06\/arm-cca-will-put-confidential-compute-in-the-hands-of-every-developer , 2021 . R. Grisenthwaite. Arm CCA will put confidential compute in the hands of every developer. https:\/\/www.arm.com\/company\/news\/2021\/06\/arm-cca-will-put-confidential-compute-in-the-hands-of-every-developer, 2021."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23009"},{"key":"e_1_3_2_1_67_1","volume-title":"Proc. USENIX Security Symposium","author":"Razavi K.","year":"2016","unstructured":"K. Razavi , B. Gras , E. Bosman , B. Preneel , C. Giuffrida , and H. Bos . Flip Feng Shui: Hammering a Needle in the Software Stack . In Proc. USENIX Security Symposium , 2016 . K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giuffrida, and H. Bos. Flip Feng Shui: Hammering a Needle in the Software Stack. In Proc. USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978406"},{"key":"e_1_3_2_1_69_1","volume-title":"One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In Proc. USENIX Security Symposium","author":"Xiao Y.","year":"2016","unstructured":"Y. Xiao , X. Zhang , Y. Zhang , and R. Teodorescu . One Bit Flips , One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In Proc. USENIX Security Symposium , 2016 . Y. Xiao, X. Zhang, Y. Zhang, and R. Teodorescu. One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. In Proc. USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00031"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465295"},{"key":"e_1_3_2_1_72_1","volume-title":"Proc. USENIX Security","author":"Chen Q. A.","year":"2014","unstructured":"Q. A. Chen , Z. Qian , and Z. M. Mao . Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks . In Proc. USENIX Security , 2014 . Q. A. Chen, Z. Qian, and Z. M. Mao. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks. In Proc. USENIX Security, 2014."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307334.3326094"},{"key":"e_1_3_2_1_74_1","volume-title":"https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification\/","author":"Trusted Computing Group (TCG). TPM 2.0 Library.","year":"2019","unstructured":"Trusted Computing Group (TCG). TPM 2.0 Library. https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification\/ , 2019 . Trusted Computing Group (TCG). TPM 2.0 Library. https:\/\/trustedcomputinggroup.org\/resource\/tpm-library-specification\/, 2019."},{"volume-title":"Xilinx Standalone Library Documentation. OS and Libraries Document Collection. UG643 (v2021.1)","year":"2021","key":"e_1_3_2_1_75_1","unstructured":"Xilinx. Xilinx Standalone Library Documentation. OS and Libraries Document Collection. UG643 (v2021.1) June 16, 2021 . Xilinx. Xilinx Standalone Library Documentation. OS and Libraries Document Collection. UG643 (v2021.1) June 16, 2021."},{"key":"e_1_3_2_1_76_1","volume-title":"http:\/\/ibmswtpm.sourceforge.net\/ibmswtpm2.html","author":"Introduction IBM.","year":"2021","unstructured":"IBM. Software TPM Introduction . http:\/\/ibmswtpm.sourceforge.net\/ibmswtpm2.html , 2021 . IBM. Software TPM Introduction. http:\/\/ibmswtpm.sourceforge.net\/ibmswtpm2.html, 2021."},{"key":"e_1_3_2_1_77_1","volume-title":"https:\/\/digilent.com\/blog\/add-a-microsd-slot-with-the-pmod-microsd\/","author":"Franz K.","year":"2021","unstructured":"K. Franz . Add a microSD Slot with the Pmod Micro SD. https:\/\/digilent.com\/blog\/add-a-microsd-slot-with-the-pmod-microsd\/ , 2021 . K. Franz. Add a microSD Slot with the Pmod MicroSD. https:\/\/digilent.com\/blog\/add-a-microsd-slot-with-the-pmod-microsd\/, 2021."},{"key":"e_1_3_2_1_78_1","volume-title":"https:\/\/symbiyosys.readthedocs.io\/en\/latest\/index.html","author":"Documentation HQ","year":"2021","unstructured":"Yosys HQ GmbH. SymbiYosys (sby) Documentation . https:\/\/symbiyosys.readthedocs.io\/en\/latest\/index.html , 2021 . YosysHQ GmbH. SymbiYosys (sby) Documentation. https:\/\/symbiyosys.readthedocs.io\/en\/latest\/index.html, 2021."},{"key":"e_1_3_2_1_79_1","volume-title":"https:\/\/labs.k7computing.com\/index.php\/goatrat-attacks-automated-payment-systems","author":"Attacks Automated Payment Systems RAT","year":"2023","unstructured":"Goat RAT Attacks Automated Payment Systems . https:\/\/labs.k7computing.com\/index.php\/goatrat-attacks-automated-payment-systems , 2023 . GoatRAT Attacks Automated Payment Systems. https:\/\/labs.k7computing.com\/index.php\/goatrat-attacks-automated-payment-systems, 2023."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134016"},{"key":"e_1_3_2_1_81_1","volume-title":"http:\/\/wiki.aaps.app\/en\/latest\/","author":"APS","year":"2022","unstructured":"Android APS app documentation. http:\/\/wiki.aaps.app\/en\/latest\/ , 2022 . AndroidAPS app documentation. http:\/\/wiki.aaps.app\/en\/latest\/, 2022."},{"key":"e_1_3_2_1_82_1","volume-title":"https:\/\/developer.arm.com\/documentation\/100336\/0106\/operation\/security","author":"Generic Interrupt Controller Technical Arm","year":"2019","unstructured":"Arm CoreLink GIC-600 Generic Interrupt Controller Technical Reference Manual . https:\/\/developer.arm.com\/documentation\/100336\/0106\/operation\/security , 2019 . Arm CoreLink GIC-600 Generic Interrupt Controller Technical Reference Manual. https:\/\/developer.arm.com\/documentation\/100336\/0106\/operation\/security, 2019."},{"key":"e_1_3_2_1_83_1","volume-title":"OSLO: Improving the Security of Trusted Computing. In Proc. USENIX Security Symposium","author":"Kauer B.","year":"2007","unstructured":"B. Kauer . OSLO: Improving the Security of Trusted Computing. In Proc. USENIX Security Symposium , 2007 . B. Kauer. OSLO: Improving the Security of Trusted Computing. In Proc. USENIX Security Symposium, 2007."},{"key":"e_1_3_2_1_84_1","first-page":"53","year":"2007","unstructured":"E. R. Sparks. A Security Assessment of Trusted Platform Modules. Dartmouth College Undergraduate Theses. 53 , 2007 . E. R. Sparks. A Security Assessment of Trusted Platform Modules. Dartmouth College Undergraduate Theses. 53, 2007.","journal-title":"E. R. Sparks. A Security Assessment of Trusted Platform Modules. Dartmouth College Undergraduate Theses."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516714"},{"key":"e_1_3_2_1_86_1","volume-title":"Proc. USENIX Security Symposium","author":"Han S.","year":"2018","unstructured":"S. Han , W. Shin , J. Park , and H. Kim . A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping . In Proc. USENIX Security Symposium , 2018 . S. Han, W. Shin, J. Park, and H. Kim. A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping. In Proc. USENIX Security Symposium, 2018."},{"key":"e_1_3_2_1_87_1","volume-title":"Proc. USENIX Security Symposium","author":"Moghimi D.","year":"2020","unstructured":"D. Moghimi , B. Sunar , T. Eisenbarth , and N. Heninger . TPM-Fail: TPM meets Timing and Lattice Attacks . In Proc. USENIX Security Symposium , 2020 . D. Moghimi, B. Sunar, T. Eisenbarth, and N. Heninger. TPM-Fail: TPM meets Timing and Lattice Attacks. In Proc. USENIX Security Symposium, 2020."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516729"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714610"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3372197"},{"key":"e_1_3_2_1_91_1","volume-title":"Proc. USENIX Security Symposium","author":"Tang A.","year":"2017","unstructured":"A. Tang , S. Sethumadhavan , and S. Stolfo . CLKscrew: Exposing the Perils of Security-Oblivious Energy Management . In Proc. USENIX Security Symposium , 2017 . A. Tang, S. Sethumadhavan, and S. Stolfo. CLKscrew: Exposing the Perils of Security-Oblivious Energy Management. In Proc. USENIX Security Symposium, 2017."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354201"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00057"},{"key":"e_1_3_2_1_94_1","volume-title":"Proc. USENIX Security Symposium","author":"Wang Y.","year":"2022","unstructured":"Y. Wang , R. Paccagnella , E. T. He , H. Shacham , C. W. Fletcher , and D. Kohlbrenner . Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 . In Proc. USENIX Security Symposium , 2022 . Y. Wang, R. Paccagnella, E. T. He, H. Shacham, C. W. Fletcher, and D. Kohlbrenner. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. In Proc. USENIX Security Symposium, 2022."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694380"},{"key":"e_1_3_2_1_96_1","volume-title":"ePrint Arch","author":"Gueron S.","year":"2016","unstructured":"S. Gueron . A Memory Encryption Engine Suitable for General Purpose Processors . IACR Cryptol . ePrint Arch ., 2016 . S. Gueron. A Memory Encryption Engine Suitable for General Purpose Processors. IACR Cryptol. ePrint Arch., 2016."},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23327"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA52012.2021.00014"},{"key":"e_1_3_2_1_99_1","unstructured":"M. Posner. How many ASIC Gates does it take to fill an FPGA? https:\/\/blogs.synopsys.com\/breakingthethreelaws\/2015\/02\/how-many-asic-gates-does-it-take-to-fill-an-fpga\/ 2015.  M. Posner. How many ASIC Gates does it take to fill an FPGA? https:\/\/blogs.synopsys.com\/breakingthethreelaws\/2015\/02\/how-many-asic-gates-does-it-take-to-fill-an-fpga\/ 2015."},{"key":"e_1_3_2_1_100_1","unstructured":"V. Strumpen. Introduction to Digital Circuits: Basic Digital Circuits. http:\/\/bibl.ica.jku.at\/dc\/build\/html\/basiccircuits\/basiccircuits.html 2015.  V. Strumpen. Introduction to Digital Circuits: Basic Digital Circuits. http:\/\/bibl.ica.jku.at\/dc\/build\/html\/basiccircuits\/basiccircuits.html 2015."},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/NEWCAS.2014.6934002"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIEA.2009.5356318"},{"key":"e_1_3_2_1_103_1","volume-title":"https:\/\/www.cnet.com\/tech\/mobile\/apples-a15-bionic-chip-powers-iphone-13-with-15-billion-transistors-new-graphics-and-ai\/","author":"Shankland S.","year":"2021","unstructured":"S. Shankland . https:\/\/www.cnet.com\/tech\/mobile\/apples-a15-bionic-chip-powers-iphone-13-with-15-billion-transistors-new-graphics-and-ai\/ , 2021 . S. Shankland. https:\/\/www.cnet.com\/tech\/mobile\/apples-a15-bionic-chip-powers-iphone-13-with-15-billion-transistors-new-graphics-and-ai\/, 2021."},{"key":"e_1_3_2_1_104_1","volume-title":"Huawei Announces Mate 40 Series: Powered by 15.3bn Transistors 5nm Kirin 9000. https:\/\/www.anandtech.com\/show\/16156\/huawei-announces-mate-40-series","author":"Frumusanu A.","year":"2020","unstructured":"A. Frumusanu . Huawei Announces Mate 40 Series: Powered by 15.3bn Transistors 5nm Kirin 9000. https:\/\/www.anandtech.com\/show\/16156\/huawei-announces-mate-40-series , 2020 . A. Frumusanu. Huawei Announces Mate 40 Series: Powered by 15.3bn Transistors 5nm Kirin 9000. https:\/\/www.anandtech.com\/show\/16156\/huawei-announces-mate-40-series, 2020."},{"key":"e_1_3_2_1_105_1","volume-title":"Technical Reference Manual. UG1085 (v2.2)","author":"Device Zynq","year":"2020","unstructured":"Xilinx. Zynq UltraScale + Device . Technical Reference Manual. UG1085 (v2.2) December 4, 2020 . Xilinx. Zynq UltraScale + Device. Technical Reference Manual. UG1085 (v2.2) December 4, 2020."},{"key":"e_1_3_2_1_106_1","volume-title":"https:\/\/zipcpu.com\/blog\/2021\/03\/20\/xilinx-forums.html","author":"Xilinx's Common AXI","year":"2021","unstructured":"Common AXI Themes on Xilinx's Forum (see Section \"Out-of-protocol designs\" for the discussion on a bug in Xilinx's Ethernet-lite controller). https:\/\/zipcpu.com\/blog\/2021\/03\/20\/xilinx-forums.html , 2021 . Common AXI Themes on Xilinx's Forum (see Section \"Out-of-protocol designs\" for the discussion on a bug in Xilinx's Ethernet-lite controller). https:\/\/zipcpu.com\/blog\/2021\/03\/20\/xilinx-forums.html, 2021."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359661"},{"key":"e_1_3_2_1_108_1","volume-title":"Sani and T. Anderson. The Case for I\/O-Device-as-a-Service. In Proc. ACM HotOS","author":"Amiri A.","year":"2019","unstructured":"A. Amiri Sani and T. Anderson. The Case for I\/O-Device-as-a-Service. In Proc. ACM HotOS , 2019 . A. Amiri Sani and T. Anderson. The Case for I\/O-Device-as-a-Service. In Proc. ACM HotOS, 2019."},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352625"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.5555\/2536849"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029822"},{"key":"e_1_3_2_1_112_1","volume-title":"Proc. USENIX Security Symposium","author":"Bahmani R.","year":"2021","unstructured":"R. Bahmani , F. Brasser , G. Dessouky , P. Jauernig , M. Klimmek , A. Sadeghi , and E. Stapf . CURE: A Security Architecture with CUstomizable and Resilient Enclaves . In Proc. USENIX Security Symposium , 2021 . R. Bahmani, F. Brasser, G. Dessouky, P. Jauernig, M. Klimmek, A. Sadeghi, and E. Stapf. CURE: A Security Architecture with CUstomizable and Resilient Enclaves. In Proc. USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303976"},{"key":"e_1_3_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00019"},{"key":"e_1_3_2_1_115_1","volume-title":"https:\/\/www.sigarch.org\/calling-for-the-return-of-non-virtualized-microprocessor-systems\/","author":"Non-Virtualized Microprocessor Calling","year":"2022","unstructured":"Calling for the Return of Non-Virtualized Microprocessor Systems. https:\/\/www.sigarch.org\/calling-for-the-return-of-non-virtualized-microprocessor-systems\/ , 2022 . Calling for the Return of Non-Virtualized Microprocessor Systems. https:\/\/www.sigarch.org\/calling-for-the-return-of-non-virtualized-microprocessor-systems\/, 2022."},{"key":"e_1_3_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132782"},{"key":"e_1_3_2_1_117_1","volume-title":"Proc. USENIX OSDI","author":"Li X.","year":"2022","unstructured":"X. Li , X. Li , C. Dall , R. Gu , J. Nieh , Y. Sait , and G. Stockwell . Design and Verification of the Arm Confidential Compute Architecture . In Proc. USENIX OSDI , 2022 . X. Li, X. Li, C. Dall, R. Gu, J. Nieh, Y. Sait, and G. Stockwell. Design and Verification of the Arm Confidential Compute Architecture. In Proc. USENIX OSDI, 2022."},{"key":"e_1_3_2_1_118_1","volume-title":"Proc. USENIX Security Symposium","author":"Costan V.","year":"2016","unstructured":"V. Costan , I. Lebedev , and S. Devadas . Sanctum: Minimal Hardware Extensions for Strong Software Isolation . In Proc. USENIX Security Symposium , 2016 . V. Costan, I. Lebedev, and S. Devadas. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. In Proc. USENIX Security Symposium, 2016."},{"key":"e_1_3_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358310"},{"key":"e_1_3_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23448"},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3466628"},{"key":"e_1_3_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465291"},{"key":"e_1_3_2_1_123_1","volume-title":"https:\/\/android-developers.googleblog.com\/2018\/10\/android-protected-confirmation.html","author":"Confirmation Android Protected","year":"2018","unstructured":"Android Protected Confirmation . https:\/\/android-developers.googleblog.com\/2018\/10\/android-protected-confirmation.html , 2018 . Android Protected Confirmation. https:\/\/android-developers.googleblog.com\/2018\/10\/android-protected-confirmation.html, 2018."}],"event":{"name":"MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Helsinki Finland","acronym":"MobiSys '23"},"container-title":["Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596864","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3581791.3596864","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:31Z","timestamp":1750178191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3581791.3596864"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,18]]},"references-count":123,"alternative-id":["10.1145\/3581791.3596864","10.1145\/3581791"],"URL":"https:\/\/doi.org\/10.1145\/3581791.3596864","relation":{},"subject":[],"published":{"date-parts":[[2023,6,18]]},"assertion":[{"value":"2023-06-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}