{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:26Z","timestamp":1750219826443,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T00:00:00Z","timestamp":1692835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"LIG ?Emergence? grant"},{"name":"CNRS","award":["MLNS2 International Research Project (IRP)"],"award-info":[{"award-number":["MLNS2 International Research Project (IRP)"]}]},{"name":"ANR Scalevisor","award":["ANR-18-CE25-0016"],"award-info":[{"award-number":["ANR-18-CE25-0016"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,24]]},"DOI":"10.1145\/3609510.3609817","type":"proceedings-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T16:08:44Z","timestamp":1690819724000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["xOS"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7789-8400","authenticated-orcid":false,"given":"Alain","family":"Tchana","sequence":"first","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG, Grenoble, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-3738-5919","authenticated-orcid":false,"given":"Dorian","family":"Goepp","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG, Grenoble, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3723-6581","authenticated-orcid":false,"given":"Stella","family":"Bitchebe","sequence":"additional","affiliation":[{"name":"McGill University, School of Computer Science, Montreal, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9090-7287","authenticated-orcid":false,"given":"Renaud","family":"Lachaize","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, CNRS, Grenoble INP, LIG, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2023,8,24]]},"reference":[{"unstructured":"[n. d.]. ARM Security Technology - Building a Secure System using TrustZone Technology. https:\/\/www.amd.com\/en\/processors\/amd-secure-encrypted-virtualization. ([n. d.]).  [n. d.]. ARM Security Technology - Building a Secure System using TrustZone Technology. https:\/\/www.amd.com\/en\/processors\/amd-secure-encrypted-virtualization. ([n. d.]).","key":"e_1_3_2_1_1_1"},{"unstructured":"2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https:\/\/www.amd.com\/en\/processors\/amd-secure-encrypted-virtualization. (2020).  2020. AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More. https:\/\/www.amd.com\/en\/processors\/amd-secure-encrypted-virtualization. (2020).","key":"e_1_3_2_1_2_1"},{"unstructured":"2023. [Coccinelle Home Page]. https:\/\/coccinelle.gitlabpages.inria.fr\/website\/ (Accessed: 2023-06-01). (2023).  2023. [Coccinelle Home Page]. https:\/\/coccinelle.gitlabpages.inria.fr\/website\/ (Accessed: 2023-06-01). (2023).","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov , Bohdan Trach , Franz Gregor , Thomas Knauth , Andre Martin , Christian Priebe , Joshua Lind , Divya Muthukumaran , Dan O'Keeffe , Mark L. Stillwell , David Goltzsche , Dave Eyers , R\u00fcdiger Kapitza , Peter Pietzuch , and Christof Fetzer . 2016 . SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX Association, Savannah, GA, 689--703. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 689--703. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1629575.1629579"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12)","author":"Belay Adam","year":"2012","unstructured":"Adam Belay , Andrea Bittau , Ali Mashtizadeh , David Terei , David Mazi\u00e8res , and Christos Kozyrakis . 2012 . Dune: Safe User-Level Access to Privileged CPU Features . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12) . USENIX Association, USA, 335--348. Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi\u00e8res, and Christos Kozyrakis. 2012. Dune: Safe User-Level Access to Privileged CPU Features. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12). USENIX Association, USA, 335--348."},{"key":"e_1_3_2_1_7_1","volume-title":"DuVisor: A User-level Hypervisor Through Delegated Virtualization. (Jan","author":"Chen Jiahao","year":"2022","unstructured":"Jiahao Chen , Dingji Li , Zeyu Mi , Yuxuan Liu , Binyu Zang , Haibing Guan , and Haibo Chen . 2022. DuVisor: A User-level Hypervisor Through Delegated Virtualization. (Jan . 2022 ). arXiv:cs\/2201.09652 Jiahao Chen, Dingji Li, Zeyu Mi, Yuxuan Liu, Binyu Zang, Haibing Guan, and Haibo Chen. 2022. DuVisor: A User-level Hypervisor Through Delegated Virtualization. (Jan. 2022). arXiv:cs\/2201.09652"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/3593856.3595909"},{"unstructured":"Intel. 2022. Intel 64 and IA-32 Architectures Software Developper's Manual.  Intel. 2022. Intel 64 and IA-32 Architectures Software Developper's Manual.","key":"e_1_3_2_1_9_1"},{"volume-title":"Intel Software Developer's Manual -","author":"April","unstructured":"Intel. April 2022. Intel Software Developer's Manual - Chapter 34, Introduction to Intel Software Guard Extensions . Vol. 3D. Intel. April 2022. Intel Software Developer's Manual - Chapter 34, Introduction to Intel Software Guard Extensions. Vol. 3D.","key":"e_1_3_2_1_10_1"},{"volume-title":"Intel Software Developer's Manual - Section 2-20: Introduction to Virtual Machine Extensions","author":"April","unstructured":"Intel. April 2022. Intel Software Developer's Manual - Section 2-20: Introduction to Virtual Machine Extensions . Vol. 1 . Intel. April 2022. Intel Software Developer's Manual - Section 2-20: Introduction to Virtual Machine Extensions. Vol. 1.","key":"e_1_3_2_1_11_1"},{"volume-title":"Intel Software Developer's Manual -","author":"April","unstructured":"Intel. April 2022. Intel Software Developer's Manual - Vol. 3C - Section 25- 5 .6: VM Functions . Intel. April 2022. Intel Software Developer's Manual - Vol. 3C - Section 25-5.6: VM Functions.","key":"e_1_3_2_1_12_1"},{"unstructured":"Intel. April 2022. Intel Software Developer's Manual - Vol. 3C - Section 29-1: APIC Virtualization and Virtual Interrupts.  Intel. April 2022. Intel Software Developer's Manual - Vol. 3C - Section 29-1: APIC Virtualization and Virtual Interrupts.","key":"e_1_3_2_1_13_1"},{"volume-title":"The Extended Page Table Mechanism (EPT).","author":"April","unstructured":"Intel. April 2022. Intel Software Developer's Manual - Vol. 3C - Section 29- 1 : The Extended Page Table Mechanism (EPT). Intel. April 2022. Intel Software Developer's Manual - Vol. 3C - Section 29-1: The Extended Page Table Mechanism (EPT).","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Operating System Support for Safe and Efficient Auxiliary Execution. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Jing Yuzhuo","year":"2022","unstructured":"Yuzhuo Jing and Peng Huang . 2022 . Operating System Support for Safe and Efficient Auxiliary Execution. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22) . USENIX Association, Carlsbad, CA, 633--648. https:\/\/www.usenix.org\/conference\/osdi22\/presentation\/jing Yuzhuo Jing and Peng Huang. 2022. Operating System Support for Safe and Efficient Auxiliary Execution. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). USENIX Association, Carlsbad, CA, 633--648. https:\/\/www.usenix.org\/conference\/osdi22\/presentation\/jing"},{"key":"e_1_3_2_1_16_1","volume-title":"Coccinelle: 10 Years of Automated Evolution in the Linux Kernel. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Lawall Julia","year":"2018","unstructured":"Julia Lawall and Gilles Muller . 2018 . Coccinelle: 10 Years of Automated Evolution in the Linux Kernel. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA, 601--614. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/lawall Julia Lawall and Gilles Muller. 2018. Coccinelle: 10 Years of Automated Evolution in the Linux Kernel. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 601--614. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/lawall"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of 30th Network and Distributed System Security (NDSS'23)","author":"Lefeuvre Hugo","year":"2022","unstructured":"Hugo Lefeuvre , Vlad-Andrei B\u0103doiu , Yi Chien , Felipe Huici , Nathan Dautenhahn , and Pierre Olivier . 2022 . Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software . In Proceedings of 30th Network and Distributed System Security (NDSS'23) (NDSS'23). Internet Society, United States. Hugo Lefeuvre, Vlad-Andrei B\u0103doiu, Yi Chien, Felipe Huici, Nathan Dautenhahn, and Pierre Olivier. 2022. Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. In Proceedings of 30th Network and Distributed System Security (NDSS'23) (NDSS'23). Internet Society, United States."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/3503222.3507759"},{"key":"e_1_3_2_1_19_1","volume-title":"Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Litton James","year":"2016","unstructured":"James Litton , Anjo Vahldiek-Oberwagner , Eslam Elnikety , Deepak Garg , Bobby Bhattacharjee , and Peter Druschel . 2016 . Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX Association, Savannah, GA, 49--64. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/litton James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, and Peter Druschel. 2016. Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 49--64. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/litton"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/2810103.2813690"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/3302424.3303946"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/3593856.3595893"},{"key":"e_1_3_2_1_23_1","volume-title":"Nu: Achieving Microsecond-Scale Resource Fungibility with Logical Processes. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Ruan Zhenyuan","year":"2023","unstructured":"Zhenyuan Ruan , Seo Jin Park , Marcos K. Aguilera , Adam Belay , and Malte Schwarzkopf . 2023 . Nu: Achieving Microsecond-Scale Resource Fungibility with Logical Processes. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23) . USENIX Association, Boston, MA, 1409--1427. https:\/\/www.usenix.org\/conference\/nsdi23\/presentation\/ruan Zhenyuan Ruan, Seo Jin Park, Marcos K. Aguilera, Adam Belay, and Malte Schwarzkopf. 2023. Nu: Achieving Microsecond-Scale Resource Fungibility with Logical Processes. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). USENIX Association, Boston, MA, 1409--1427. https:\/\/www.usenix.org\/conference\/nsdi23\/presentation\/ruan"},{"key":"e_1_3_2_1_24_1","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Sartakov Vasily A.","year":"2022","unstructured":"Vasily A. Sartakov , Llu\u00eds Vilanova , David Eyers , Takahiro Shinagawa , and Peter Pietzuch . 2022 . {CAP-VMs}: {Capability-Based} Isolation and Sharing in the Cloud . In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22) . 597--612. Vasily A. Sartakov, Llu\u00eds Vilanova, David Eyers, Takahiro Shinagawa, and Peter Pietzuch. 2022. {CAP-VMs}: {Capability-Based} Isolation and Sharing in the Cloud. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). 597--612."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/3445814.3446731"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium (SEC'20)","author":"Schrammel David","year":"2020","unstructured":"David Schrammel , Samuel Weiser , Stefan Steinegger , Martin Schwarzl , Michael Schwarz , Stefan Mangard , and Daniel Gruss . 2020 . Donky: Domain Keys -- Efficient in-Process Isolation for RISC-V and X86 . In Proceedings of the 29th USENIX Conference on Security Symposium (SEC'20) . USENIX Association, USA, 1677--1694. David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain Keys -- Efficient in-Process Isolation for RISC-V and X86. In Proceedings of the 29th USENIX Conference on Security Symposium (SEC'20). USENIX Association, USA, 1677--1694."},{"key":"e_1_3_2_1_27_1","volume-title":"RESoLVE Workshop (Runtime Environments, Systems, Layering and Virtualized Environments).","author":"Smith Steven","year":"2012","unstructured":"Steven Smith , Anil Madhavapeddy , Christopher Smowton , Malte Schwarzkopf , Richard Mortier , Robert M Watson , and Steven Hand . 2012 . The Case for Reconfigurable I\/O Channels . In RESoLVE Workshop (Runtime Environments, Systems, Layering and Virtualized Environments). Steven Smith, Anil Madhavapeddy, Christopher Smowton, Malte Schwarzkopf, Richard Mortier, Robert M Watson, and Steven Hand. 2012. The Case for Reconfigurable I\/O Channels. In RESoLVE Workshop (Runtime Environments, Systems, Layering and Virtualized Environments)."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Seventeenth European Conference on Computer Systems (EuroSys '22)","author":"Wanninger Nicholas C.","year":"1955","unstructured":"Nicholas C. Wanninger , Joshua J. Bowden , Kirtankumar Shetty , Ayush Garg , and Kyle C. Hale . 2022. Isolating Functions at the Hardware Limit with Virtines . In Proceedings of the Seventeenth European Conference on Computer Systems (EuroSys '22) . Association for Computing Machinery, New York, NY, USA, 644--662. https:\/\/doi.org\/10.1145\/3492321.35 1955 3 10.1145\/3492321.3519553 Nicholas C. Wanninger, Joshua J. Bowden, Kirtankumar Shetty, Ayush Garg, and Kyle C. Hale. 2022. Isolating Functions at the Hardware Limit with Virtines. In Proceedings of the Seventeenth European Conference on Computer Systems (EuroSys '22). Association for Computing Machinery, New York, NY, USA, 644--662. https:\/\/doi.org\/10.1145\/3492321.3519553"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/2678373.2665740"}],"event":{"sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"acronym":"APSys '23","name":"APSys '23: 14th ACM SIGOPS Asia-Pacific Workshop on Systems","location":"Seoul Republic of Korea"},"container-title":["Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609510.3609817","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3609510.3609817","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:25Z","timestamp":1750178785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3609510.3609817"}},"subtitle":["The End Of The Process-Thread Duo Reign"],"short-title":[],"issued":{"date-parts":[[2023,8,24]]},"references-count":29,"alternative-id":["10.1145\/3609510.3609817","10.1145\/3609510"],"URL":"https:\/\/doi.org\/10.1145\/3609510.3609817","relation":{},"subject":[],"published":{"date-parts":[[2023,8,24]]},"assertion":[{"value":"2023-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}