{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:16:11Z","timestamp":1763968571340,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,8]],"date-time":"2024-04-08T00:00:00Z","timestamp":1712534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Research Foundation of Korea (NRF)","award":["NRF-2020R1A2C2101134","NRF-2020R1F1A1058305"],"award-info":[{"award-number":["NRF-2020R1A2C2101134","NRF-2020R1F1A1058305"]}]},{"name":"IITP","award":["IITP-2020-0-01840"],"award-info":[{"award-number":["IITP-2020-0-01840"]}]},{"name":"Institute for Information & Communication Technology","award":["IITP-2019-0-01343"],"award-info":[{"award-number":["IITP-2019-0-01343"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,8]]},"DOI":"10.1145\/3605098.3635951","type":"proceedings-article","created":{"date-parts":[[2024,5,21]],"date-time":"2024-05-21T17:59:16Z","timestamp":1716314356000},"page":"1366-1375","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["GENESIS: A Generalizable, Efficient, and Secure Intra-kernel Privilege Separation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6775-5764","authenticated-orcid":false,"given":"Seongman","family":"Lee","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5504-8887","authenticated-orcid":false,"given":"Seoye","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0414-9262","authenticated-orcid":false,"given":"Chihyun","family":"Song","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3339-4923","authenticated-orcid":false,"given":"Byeongsu","family":"Woo","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0280-4606","authenticated-orcid":false,"given":"Eunyeong","family":"Ahn","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8451-9754","authenticated-orcid":false,"given":"Junsu","family":"Lee","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4368-9736","authenticated-orcid":false,"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Samsung Research America, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2070-2408","authenticated-orcid":false,"given":"Jinsoo","family":"Jang","sequence":"additional","affiliation":[{"name":"Chungnam National University, Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5344-6266","authenticated-orcid":false,"given":"Hojoon","family":"Lee","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8984-1006","authenticated-orcid":false,"given":"Brent Byunghoon","family":"Kang","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2024,5,21]]},"reference":[{"volume-title":"Privileged architecture version. https:\/\/github.com\/riscv\/riscvisa-manual\/releases\/tag\/Priv-v1.12","author":"Andrew Waterman John Hauser","key":"e_1_3_2_1_1_1","unstructured":"John Hauser Andrew Waterman, Krste Asanovi. 2021. The RISC-V instruction set manual volume II: Privileged architecture version. https:\/\/github.com\/riscv\/riscvisa-manual\/releases\/tag\/Priv-v1.12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23009"},{"key":"e_1_3_2_1_3_1","volume-title":"Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. In Network and Distributed System Security Symposium (NDSS).","author":"Cho Yeongpil","year":"2017","unstructured":"Yeongpil Cho, Donghyun Kwon, Hayoon Yi, and Yunheung Paek. 2017. Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM. In Network and Distributed System Security Symposium (NDSS)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694386"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62105-0_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3386901.3389023"},{"key":"e_1_3_2_1_7_1","volume-title":"23rd USENIX Security Symposium.","author":"Kemerlis Vasileios P","year":"2014","unstructured":"Vasileios P Kemerlis, Michalis Polychronakis, and Angelos D Keromytis. 2014. ret2dir: Rethinking kernel isolation. In 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_9_1","article-title":"Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware","author":"Wu Chenggang","year":"2022","unstructured":"Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, and Tao Li. 2022. Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware. IEEE Transactions on Dependable and Secure Computing (TDSC).","journal-title":"IEEE Transactions on Dependable and Secure Computing (TDSC)."}],"event":{"name":"SAC '24: 39th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Avila Spain","acronym":"SAC '24"},"container-title":["Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635951","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605098.3635951","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:14Z","timestamp":1750178174000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605098.3635951"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,8]]},"references-count":9,"alternative-id":["10.1145\/3605098.3635951","10.1145\/3605098"],"URL":"https:\/\/doi.org\/10.1145\/3605098.3635951","relation":{},"subject":[],"published":{"date-parts":[[2024,4,8]]},"assertion":[{"value":"2024-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}