{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:17:08Z","timestamp":1759331828772,"version":"3.41.0"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2023,11,9]],"date-time":"2023-11-09T00:00:00Z","timestamp":1699488000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key RD Plan of China","award":["2020YFB1005803"],"award-info":[{"award-number":["2020YFB1005803"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>\n            To ensure the security of cryptographic algorithm implementations, several cryptographic key protection schemes have been proposed to prevent various memory disclosure attacks. Among them, the register-based solutions do not rely on special hardware features and offer better applicability. However, due to the size limitation of register resources, the performance of register-based solutions is much worse than conventional cryptosystem implementations without security enhancements. This paper presents RegKey, an efficient register-based implementation of\n            <jats:bold>ECC (elliptic curve cryptography)<\/jats:bold>\n            signature algorithms. Different from other schemes that protect the whole cryptographic operations, RegKey only uses CPU registers to execute simple but critical operations, significantly reducing the usage of register resources and performance overheads. To achieve this goal, RegKey splits the ECC signing into two parts, (1) complex elliptic curve group operations on non-sensitive data in main memory as normal implementations, and (2) simple prime field operations on sensitive data inside CPU registers. RegKey guarantees the plaintext private key and random number used for signing only appear in registers to effectively resist one-shot memory disclosure attacks such as cold-boot attacks and warm-boot attacks, which are usually launched by physically accessing the victim machine to acquire partial or even entire memory data but only once. Compared with existing cryptographic key protection schemes, the performance of RegKey is greatly improved. Regkey is applicable to different platforms because it does not rely on special CPU hardware features. Since RegKey focuses on one-shot memory disclosure instead of persistent software-based attacks, it works as a choice suitable for embedded devices or offline machines where physical attacks are the main threat.\n          <\/jats:p>","DOI":"10.1145\/3604805","type":"journal-article","created":{"date-parts":[[2023,6,15]],"date-time":"2023-06-15T12:10:46Z","timestamp":1686831046000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["RegKey: A Register-based Implementation of ECC Signature Algorithms Against One-shot Memory Disclosure"],"prefix":"10.1145","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9895-3816","authenticated-orcid":false,"given":"Yu","family":"Fu","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2639-3722","authenticated-orcid":false,"given":"Jingqiang","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, University of Science and Technology of China, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8515-7124","authenticated-orcid":false,"given":"Dengguo","family":"Feng","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1484-0313","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-7568-289X","authenticated-orcid":false,"given":"Mingyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1477-0984","authenticated-orcid":false,"given":"Wenjie","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,9]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"2014. OpenSSL Heartbleed . (2014). Retrieved October 28 2022 from https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-0160."},{"key":"e_1_3_2_3_2","unstructured":"2016. Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves Part 2: Digital Signature Algorithm . (2016). Retrieved October 28 2022 from http:\/\/www.gmbz.org.cn\/main\/bzlb.html."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2016.01.009"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44709-3_5"},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1145\/2420950.2420961","volume-title":"Proceedings of the 28th Annual Computer Security Applications Conference","author":"Blass Erik-Oliver","year":"2012","unstructured":"Erik-Oliver Blass and William Robertson. 2012. TRESOR-HUNT: Attacking CPU-bound encryption. In Proceedings of the 28th Annual Computer Security Applications Conference. 71\u201378. 10.1145\/2420950.2420961"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1145\/3052973.3052983","volume-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security","author":"Carr Scott A.","year":"2017","unstructured":"Scott A. Carr and Mathias Payer. 2017. DataShield: Configurable data confidentiality and integrity. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. 193\u2013204. 10.1145\/3052973.3052983"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1145\/1455770.1455840","volume-title":"Proceedings of the 15th ACM Conference on Computer and Communications Security","author":"Chan Ellick M.","year":"2008","unstructured":"Ellick M. Chan, Jeffrey C. Carlyle, Francis M. David, Reza Farivar, and Roy H. Campbell. 2008. BootJacker: Compromising computers using forced restarts. In Proceedings of the 15th ACM Conference on Computer and Communications Security. 555\u2013564. 10.1145\/1455770.1455840"},{"key":"e_1_3_2_9_2","first-page":"698","volume-title":"International Conference on Selected Areas in Cryptography","author":"Cheng Hao","year":"2020","unstructured":"Hao Cheng, Johann Gro\u00dfsch\u00e4dl, Jiaqi Tian, Peter B. R\u00f8nne, and Peter Y. A. Ryan. 2020. High-throughput elliptic curve cryptography using AVX2 vector instructions. In International Conference on Selected Areas in Cryptography. Springer, 698\u2013719. 10.1007\/978-3-030-81652-0_27"},{"key":"e_1_3_2_10_2","first-page":"321","volume-title":"USENIX Security Symposium","author":"Chow Jim","year":"2004","unstructured":"Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. 2004. Understanding data lifetime via whole system simulation. In USENIX Security Symposium. 321\u2013336."},{"key":"e_1_3_2_11_2","first-page":"177","volume-title":"Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Colp Patrick","year":"2015","unstructured":"Patrick Colp, Jiawen Zhang, James Gleeson, Sahil Suneja, Eyal De Lara, Himanshu Raj, Stefan Saroiu, and Alec Wolman. 2015. Protecting data on smartphones and tablets from memory attacks. In Proceedings of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems. 177\u2013189. 10.1145\/2694344.2694380"},{"key":"e_1_3_2_12_2","first-page":"1","article-title":"Intel SGX explained","author":"Costan Victor","year":"2016","unstructured":"Victor Costan and Srinivas Devadas. 2016. Intel SGX explained. Cryptology ePrint Archive (2016), 1\u2013118.","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_2_13_2","first-page":"61","volume-title":"Operating Systems Design and Implementation","author":"Dunn Alan M.","year":"2012","unstructured":"Alan M. Dunn, Michael Z. Lee, Suman Jana, Sangman Kim, Mark Silberstein, Yuanzhong Xu, Vitaly Shmatikov, and Emmett Witchel. 2012. Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels. In Operating Systems Design and Implementation. 61\u201375."},{"key":"e_1_3_2_14_2","unstructured":"J. Elbahrawy J. Lovejoy A. Ouyang and J. Perez. 2020. Analysis of Bitcoin improvement proposal 340-Schnorr signatures. (2020)."},{"key":"e_1_3_2_15_2","first-page":"1505","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Fan Shuqin","year":"2016","unstructured":"Shuqin Fan, Wenbo Wang, and Qingfeng Cheng. 2016. Attacking OpenSSL implementation of ECDSA with a few signatures. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 1505\u20131515. 10.1145\/2976749.2978400"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3309759"},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-030-86890-1_17","volume-title":"International Conference on Information and Communications Security","volume":"12918","author":"Fu Yu","year":"2021","unstructured":"Yu Fu, Wei Wang, Lingjia Meng, Qiongxiao Wang, Yuan Zhao, and Jingqiang Lin. 2021. VIRSA: Vectorized in-register RSA computation with memory disclosure resistance. In International Conference on Information and Communications Security, Vol. 12918. Springer, 293\u2013309. DOI:10.1007\/978-3-030-86890-1_17"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0146-7"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/2523649.2523656","volume-title":"Proceedings of the 29th Annual Computer Security Applications Conference","author":"Garmany Behrad","year":"2013","unstructured":"Behrad Garmany and Tilo M\u00fcller. 2013. PRIME: Private RSA infrastructure for memory-less encryption. In Proceedings of the 29th Annual Computer Security Applications Conference. 149\u2013158. 10.1145\/2523649.2523656"},{"key":"e_1_3_2_20_2","first-page":"217","volume-title":"USENIX Security Symposium","author":"Gruss Daniel","year":"2017","unstructured":"Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, Istvan Haller, and Manuel Costa. 2017. Strong and efficient cache side-channel protection using hardware transactional memory. In USENIX Security Symposium. 217\u2013233."},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23125"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.8"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2631548"},{"key":"e_1_3_2_24_2","unstructured":"Shay Gueron. 2010. Intel advanced encryption standard (AES) new instructions set. (2010)."},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1109\/DSN.2007.77","volume-title":"37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201907)","author":"Harrison Keith","year":"2007","unstructured":"Keith Harrison and Shouhuai Xu. 2007. Protecting cryptographic keys from memory disclosure attacks. In 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201907). IEEE, 137\u2013143. DOI:10.1109\/DSN.2007.77"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/1961295.1950398"},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1007\/978-3-030-55304-3_11","volume-title":"Australasian Conference on Information Security and Privacy","author":"Huang Junhao","year":"2020","unstructured":"Junhao Huang, Zhe Liu, Zhi Hu, and Johann Gro\u00dfsch\u00e4dl. 2020. Parallel implementation of SM2 elliptic curve cryptography on Intel processors with AVX2. In Australasian Conference on Information Security and Privacy. Springer, 204\u2013224. 10.1007\/978-3-030-55304-3_11"},{"key":"e_1_3_2_29_2","unstructured":"Intel. 2022. Intel 64 and ia-32 architectures software developer\u2019s manual volume 2 (2a 2b 2c & 2d): Instruction set reference a-z. (2022)."},{"key":"e_1_3_2_30_2","unstructured":"Intel. 2017. SGX SSL. (2017). Retrieved October 28 2022 from https:\/\/github.com\/intel\/intel-sgx-ssl."},{"key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/3359789.3359795","volume-title":"Proceedings of the 35th Annual Computer Security Applications Conference","author":"Jiang Fangjie","year":"2019","unstructured":"Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo, Le Guan, and Ziqiang Ma. 2019. TF-BIV: Transparent and fine-grained binary integrity verification in the cloud. In Proceedings of the 35th Annual Computer Security Applications Conference. 57\u201369. 10.1145\/3359789.3359795"},{"key":"e_1_3_2_32_2","volume-title":"IEEE Symposium on Security and Privacy","author":"Jin Xuancheng","year":"2022","unstructured":"Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, and Juanru Li. 2022. Annotating, tracking, and protecting cryptographic secrets with CryptoMPK. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_34_2","volume-title":"USENIX Security Symposium","author":"Kemerlis Vasileios P.","year":"2012","unstructured":"Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis. 2012. kGuard: Lightweight kernel protection against return-to-user attacks. In USENIX Security Symposium, Vol. 16."},{"key":"e_1_3_2_35_2","first-page":"189","volume-title":"USENIX Security Symposium","author":"Kim Taesoo","year":"2012","unstructured":"Taesoo Kim, Marcus Peinado, and Gloria Mainar-Ruiz. 2012. STEALTHMEM: System-level protection against cache-based side channel attacks in the cloud. In USENIX Security Symposium. 189\u2013204."},{"issue":"177","key":"e_1_3_2_36_2","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic curve cryptosystems","volume":"48","author":"Koblitz Neal","year":"1987","unstructured":"Neal Koblitz. 1987. Elliptic curve cryptosystems. Math. Comp. 48, 177 (1987), 203\u2013209.","journal-title":"Math. Comp."},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2897666"},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1109\/ARES.2015.28","volume-title":"2015 10th International Conference on Availability, Reliability and Security","author":"Lindenlauf Simon","year":"2015","unstructured":"Simon Lindenlauf, Hans H\u00f6fken, and Marko Schuba. 2015. Cold boot attacks on DDR2 and DDR3 SDRAM. In 2015 10th International Conference on Availability, Reliability and Security. IEEE, 287\u2013292. DOI:10.1109\/ARES.2015.28"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446082"},{"key":"e_1_3_2_40_2","first-page":"1","article-title":"Introduction to Intel advanced vector extensions","volume":"23","author":"Lomont Chris","year":"2011","unstructured":"Chris Lomont. 2011. Introduction to Intel advanced vector extensions. Intel White Paper 23 (2011), 1\u201321.","journal-title":"Intel White Paper"},{"key":"e_1_3_2_41_2","first-page":"417","volume-title":"Conference on the Theory and Application of Cryptographic Techniques","volume":"218","author":"Miller Victor S.","year":"1985","unstructured":"Victor S. Miller. 1985. Use of elliptic curves in cryptography. In Conference on the Theory and Application of Cryptographic Techniques, Vol. 218. Springer, 417\u2013426. 10.1007\/3-540-39799-X_31"},{"key":"e_1_3_2_42_2","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1145\/1752046.1752053","volume-title":"Proceedings of the Third European Workshop on System Security","author":"M\u00fcller Tilo","year":"2010","unstructured":"Tilo M\u00fcller, Andreas Dewald, and Felix C. Freiling. 2010. AESSE: A cold-boot resistant implementation of AES. In Proceedings of the Third European Workshop on System Security. 42\u201347. 10.1145\/1752046.1752053"},{"key":"e_1_3_2_43_2","first-page":"1","volume-title":"20th USENIX Security Symposium (USENIX Security 11)","author":"M\u00fcller Tilo","year":"2011","unstructured":"Tilo M\u00fcller, Felix C. Freiling, and Andreas Dewald. 2011. Tresor runs encryption securely outside RAM. In 20th USENIX Security Symposium (USENIX Security 11). USENIX Association, 1\u201316. https:\/\/www.usenix.org\/conference\/usenix-security-11\/tresor-runs-encryption-securely-outside-ram."},{"key":"e_1_3_2_44_2","first-page":"39","volume-title":"International Conference on Trusted Systems","author":"Parker T. Paul","year":"2009","unstructured":"T. Paul Parker and Shouhuai Xu. 2009. A method for safekeeping cryptographic keys from memory disclosure attacks. In International Conference on Trusted Systems. Springer, 39\u201359. 10.1007\/978-3-642-14597-1_3"},{"key":"e_1_3_2_45_2","first-page":"1","article-title":"Cryptographic key recovery from Linux memory dumps","author":"Pettersson Torbj\u00f6rn","year":"2007","unstructured":"Torbj\u00f6rn Pettersson. 2007. Cryptographic key recovery from Linux memory dumps. Chaos Communication Camp (2007), 1\u201314.","journal-title":"Chaos Communication Camp"},{"key":"e_1_3_2_46_2","unstructured":"OpenSSL Project. 2021. OpenSSL-1.1.1k. (2021). Retrieved October 28 2022 from https:\/\/www.openssl.org."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00068"},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/2076732.2076743","volume-title":"Proceedings of the 27th Annual Computer Security Applications Conference","author":"Simmons Patrick","year":"2011","unstructured":"Patrick Simmons. 2011. Security through amnesia: A software-based solution to the cold boot attack on disk encryption. In Proceedings of the 27th Annual Computer Security Applications Conference. 73\u201382. 10.1145\/2076732.2076743"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_1"},{"key":"e_1_3_2_50_2","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-642-37300-8_2","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment: 9th International Conference","author":"Stewin Patrick","year":"2013","unstructured":"Patrick Stewin and Iurii Bystrov. 2013. Understanding DMA malware. In Detection of Intrusions and Malware, and Vulnerability Assessment: 9th International Conference. Springer, 21\u201341. 10.1007\/978-3-642-37300-8_2"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24086"},{"key":"e_1_3_2_52_2","first-page":"1221","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, efficient in-process isolation with protection keys (MPK). In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, 1221\u20131238. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/vahldiek-oberwagner."},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9030-0"},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/978-3-030-88323-2_28","volume-title":"International Conference on Information Security and Cryptology","author":"Wang Wenjie","year":"2021","unstructured":"Wenjie Wang, Wei Wang, Jingqiang Lin, Yu Fu, Lingjia Meng, and Qiongxiao Wang. 2021. SMCOS: Fast and parallel modular multiplication on ARM NEON architecture for ECC. In International Conference on Information Security and Cryptology. Springer, 531\u2013550. 10.1007\/978-3-030-88323-2_28"},{"key":"e_1_3_2_55_2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/978-3-319-21966-0_4","volume-title":"International Conference on Information and Communications Security","volume":"8958","author":"Yang Yang","year":"2014","unstructured":"Yang Yang, Zhi Guan, Zhe Liu, and Zhong Chen. 2014. Protecting elliptic curve cryptography against memory disclosure attacks. In International Conference on Information and Communications Security, Vol. 8958. Springer, 49\u201360. 10.1007\/978-3-319-21966-0_4"},{"key":"e_1_3_2_56_2","article-title":"Recovering OpenSSL ECDSA nonces using the FLUSH+RELOAD cache side-channel attack","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Naomi Benger. 2014. Recovering OpenSSL ECDSA nonces using the FLUSH+RELOAD cache side-channel attack. Cryptology ePrint Archive, Paper 2014\/140. (2014). https:\/\/eprint.iacr.org\/2014\/140.","journal-title":"Cryptology ePrint Archive, Paper 2014\/140"},{"key":"e_1_3_2_57_2","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/978-3-319-33630-5_20","volume-title":"IFIP International Conference on ICT Systems Security and Privacy Protection","volume":"471","author":"Zhao Yuan","year":"2016","unstructured":"Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, and Ziqiang Ma. 2016. RegRSA: Using registers as buffers to resist memory disclosure attacks. In IFIP International Conference on ICT Systems Security and Privacy Protection, Vol. 471. Springer, 293\u2013307. 10.1007\/978-3-319-33630-5_20"}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604805","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3604805","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:04Z","timestamp":1750178764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3604805"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,9]]},"references-count":56,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3604805"],"URL":"https:\/\/doi.org\/10.1145\/3604805","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2023,11,9]]},"assertion":[{"value":"2022-12-23","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-28","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}