{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T14:50:16Z","timestamp":1777733416472,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["DGE-2146755"],"award-info":[{"award-number":["DGE-2146755"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640408","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"649-665","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Lightweight Fault Isolation: Practical, Efficient, and Secure Software Sandboxing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4244-1690","authenticated-orcid":false,"given":"Zachary","family":"Yedidia","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, California, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bytecode Alliance. Wasmtime 2023. URL: https:\/\/wasmtime.dev\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Webassembly micro runtime","author":"Alliance Bytecode","year":"2023","unstructured":"Bytecode Alliance. Webassembly micro runtime, 2023. URL: https:\/\/bytecodealliance.github.io\/wamr.dev\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121151"},{"key":"e_1_3_2_1_4_1","volume-title":"Arm Architecture Reference Manual for A-profile architecture","year":"2016","unstructured":"Arm. Arm Architecture Reference Manual for A-profile architecture, 2016. FEAT_LVA, p. A2-90."},{"key":"e_1_3_2_1_5_1","volume-title":"Arm Architecture Reference Manual for A-profile architecture","year":"2016","unstructured":"Arm. Arm Architecture Reference Manual for A-profile architecture, 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"Arm Architecture Reference Manual for A-profile architecture","year":"2016","unstructured":"Arm. Arm Architecture Reference Manual for A-profile architecture, 2016. FEAT_CSV2_2, p. A2-76."},{"key":"e_1_3_2_1_7_1","volume-title":"Arm Architecture Reference Manual for A-profile architecture","year":"2016","unstructured":"Arm. Arm Architecture Reference Manual for A-profile architecture, 2016. SCXTNUM_EL0, EL0 Read\/Write Software Context Number, p. D13-5913."},{"key":"e_1_3_2_1_8_1","volume-title":"Arm Cortex-X3 Core: Software Optimization Guide, r1p2 edition","year":"2021","unstructured":"Arm. Arm Cortex-X3 Core: Software Optimization Guide, r1p2 edition, 2021."},{"key":"e_1_3_2_1_9_1","volume-title":"Exploration tools","year":"2023","unstructured":"Arm. Exploration tools, 2023. URL: https:\/\/developer.arm.com\/downloads\/-\/exploration-tools."},{"key":"e_1_3_2_1_10_1","volume-title":"wasm2c: Convert wasm files to c source and header","year":"2023","unstructured":"Wasm2c authors. wasm2c: Convert wasm files to c source and header, 2023. URL: https:\/\/github.com\/WebAssembly\/wabt\/tree\/main\/wasm2c."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/224057.224077"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, OSDI'20, USA","author":"Boos Kevin","year":"2020","unstructured":"Kevin Boos, Namitha Liyanage, Ramla Ijaz, and Lin Zhong. Theseus: An experiment in operating system structure and state management. In Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, OSDI'20, USA, 2020. USENIX Association."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3185771"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_15_1","volume-title":"Performance of webassembly runtimes","author":"Denis Frank","year":"2023","unstructured":"Frank Denis. Performance of webassembly runtimes in 2023, 2023. URL: https:\/\/00f.net\/2023\/01\/04\/webassembly-benchmark-2023\/."},{"key":"e_1_3_2_1_16_1","first-page":"75","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06","author":"Erlingsson \u00dalfar","year":"2006","unstructured":"\u00dalfar Erlingsson, Mart\u00edn Abadi, Michael Vrable, Mihai Budiu, and George C. Necula. Xfi: Software guards for system address spaces. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, OSDI '06, page 75--88, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_17_1","first-page":"293","volume-title":"2008 USENIX Annual Technical Conference, Boston, MA, USA, June 22-27, 2008. Proceedings","author":"Ford Bryan","year":"2008","unstructured":"Bryan Ford and Russ Cox. Vx32: Lightweight user-level sandboxing on the x86. In Rebecca Isaacs and Yuanyuan Zhou, editors, 2008 USENIX Annual Technical Conference, Boston, MA, USA, June 22-27, 2008. Proceedings, pages 293--306. USENIX Association, 2008. URL: http:\/\/www.usenix.org\/events\/usenix08\/tech\/full_papers\/ford\/ford.pdf."},{"key":"e_1_3_2_1_18_1","volume-title":"gvisor documentation","year":"2021","unstructured":"Google. gvisor documentation, 2021. URL: https:\/\/gvisor.dev\/docs\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/560667"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_1_21_1","volume-title":"A problem about \"traps in dead code","author":"He Liang","year":"2023","unstructured":"Liang He. A problem about \"traps in dead code\", 2023. URL: https:\/\/github.com\/bytecodealliance\/wasm-micro-runtime\/issues\/2773."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2893177"},{"key":"e_1_3_2_1_23_1","volume-title":"How fastly and the developer community are investing in the webassembly ecosystem","author":"Hickey Pat","year":"2020","unstructured":"Pat Hickey. How fastly and the developer community are investing in the webassembly ecosystem, 2020. URL: https:\/\/www.fastly.com\/blog\/how-fastly-and-developer-community-invest-in-webassembly-ecosystem."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_3_2_1_25_1","volume-title":"Intel 64 and IA-32 architectures software developer's manual","year":"2020","unstructured":"Intel. Intel 64 and IA-32 architectures software developer's manual, 2020."},{"key":"e_1_3_2_1_26_1","volume-title":"The RISC-V Instruction Set Manual","author":"International RISC-V","year":"2021","unstructured":"RISC-V International. The RISC-V Instruction Set Manual, Volume II: Privileged Architecture, 20211203 edition, 2021. sv57, p. 87."},{"key":"e_1_3_2_1_27_1","volume-title":"Apple microarchitecture research","author":"Johnson Dougall","year":"2021","unstructured":"Dougall Johnson. Apple microarchitecture research, 2021. URL: https:\/\/dougallj.github.io\/applecpu\/firestorm.html."},{"key":"e_1_3_2_1_28_1","volume-title":"\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u00b4\u044f\u0439: SFI safety for native-compiled Wasm","author":"Johnson Evan","year":"2021","unstructured":"Evan Johnson, David Thien, Yousef Alhessi, Shravan Narayan, Fraser Brown, Sorin Lerner, Tyler McMullen, Stefan Savage, and Deian Stefan. \u0414\u043e\u0432\u0435\u0440\u00b4\u044f\u0439, \u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0440\u00b4\u044f\u0439: SFI safety for native-compiled Wasm. In NDSS. Internet Society, 2021."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064217"},{"key":"e_1_3_2_1_30_1","first-page":"284","volume-title":"Mathematical Foundations of Computer Science","author":"Kozen Dexter","year":"1999","unstructured":"Dexter Kozen. Language-based security. In Miros\u0142aw Kuty\u0142owski, Leszek Pacholski, and Tomasz Wierzbicki, editors, Mathematical Foundations of Computer Science 1999, pages 284--298, Berlin, Heidelberg, 1999. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_31_1","volume-title":"Ground-up aarch64","author":"Lamoureux Andrew","year":"2021","unstructured":"Andrew Lamoureux. Ground-up aarch64, 2021. URL: https:\/\/binary.ninja\/2021\/04\/05\/groundup-aarch64.html."},{"key":"e_1_3_2_1_32_1","volume-title":"Amazon graviton3 vs. intel xeon vs. amd epyc performance","author":"Larabel Michael","year":"2022","unstructured":"Michael Larabel. Amazon graviton3 vs. intel xeon vs. amd epyc performance, 2022. URL: https:\/\/www.phoronix.com\/review\/graviton3-amd-intel."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_34_1","first-page":"49","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI'16","author":"Litton James","year":"2016","unstructured":"James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, and Peter Druschel. Light-weight contexts: An os abstraction for safety and performance. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI'16, page 49--64, USA, 2016. USENIX Association."},{"key":"e_1_3_2_1_35_1","volume-title":"Aarch64: compress jump tables to minimum size needed to reach destinations","author":"LLVM.","year":"2017","unstructured":"LLVM. Aarch64: compress jump tables to minimum size needed to reach destinations, 2017. URL: https:\/\/reviews.llvm.org\/D32564."},{"key":"e_1_3_2_1_36_1","unstructured":"LLVM. Assembling a complete toolchain 2023. URL: https:\/\/clang.llvm.org\/docs\/Toolchain.html."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043568"},{"key":"e_1_3_2_1_39_1","volume-title":"verifiable binary sandboxing for a cisc architecture","author":"McCamant Stephen","year":"2005","unstructured":"Stephen McCamant and Greg Morrisett. Efficient, verifiable binary sandboxing for a cisc architecture. 2005."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium -","volume":"15","author":"McCamant Stephen","year":"2006","unstructured":"Stephen McCamant and Greg Morrisett. Evaluating sfi for a cisc architecture. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796801004178"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254111"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/319301.319345"},{"key":"e_1_3_2_1_44_1","volume-title":"musl libc","year":"2023","unstructured":"musl. musl libc, 2023. URL: https:\/\/musl.libc.org\/."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/641914.641916"},{"key":"e_1_3_2_1_46_1","first-page":"1433","volume-title":"30th USENIX Security Symposium, USENIX Security 2021","author":"Narayan Shravan","year":"2021","unstructured":"Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean M. Tullsen, and Deian Stefan. Swivel: Hardening webassembly against spectre. In Michael Bailey and Rachel Greenstadt, editors, 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pages 1433--1450. USENIX Association, 2021. URL: https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/narayan."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582023"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, OSDI'20, USA","author":"Narayanan Vikram","year":"2020","unstructured":"Vikram Narayanan, Tianjiao Huang, David Detweiler, Dan Appel, Zhaofeng Li, Gerd Zellweger, and Anton Burtsev. Redleaf: Isolation and communication in a safe operating system. In Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation, OSDI'20, USA, 2020. USENIX Association."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_3_2_1_50_1","volume-title":"uvwasi","author":"JS.","year":"2023","unstructured":"NodeJS. uvwasi, 2023. URL: https:\/\/github.com\/nodejs\/uvwasi."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/358818.358822"},{"key":"e_1_3_2_1_52_1","first-page":"1","volume-title":"19th USENIX Security Symposium","author":"Sehr David","year":"2010","unstructured":"David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. Adapting software fault isolation to contemporary CPU architectures. In 19th USENIX Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings, pages 1--12. USENIX Association, 2010. URL: http:\/\/www.usenix.org\/events\/sec10\/tech\/full_papers\/Sehr.pdf."},{"key":"e_1_3_2_1_53_1","volume-title":"sel4 performance","year":"2023","unstructured":"seL4. sel4 performance, 2023. URL: https:\/\/sel4.systems\/About\/Performance\/home.pml."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, USENIX ATC'20, USA","author":"Shillaker Simon","year":"2020","unstructured":"Simon Shillaker and Peter Pietzuch. Faasm: Lightweight isolation for efficient stateful serverless computing. In Proceedings of the 2020 USENIX Conference on Usenix Annual Technical Conference, USENIX ATC'20, USA, 2020. USENIX Association."},{"key":"e_1_3_2_1_55_1","first-page":"13","volume-title":"Proceedings of the 3rd Conference on USENIX Conference on Object-Oriented Technologies (COOTS) -","volume":"3","author":"Small Christopher","year":"1997","unstructured":"Christopher Small. A tool for constructing safe extensible c++ systems. In Proceedings of the 3rd Conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3, COOTS'97, page 13, USA, 1997. USENIX Association."},{"key":"e_1_3_2_1_56_1","first-page":"33","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10","author":"Soares Livio","year":"2010","unstructured":"Livio Soares and Michael Stumm. Flexsc: Flexible system call scheduling with exception-less system calls. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, page 33--46, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381052.3381326"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/3203940"},{"key":"e_1_3_2_1_59_1","first-page":"1221","volume-title":"Proceedings of the 28th USENIX Conference on Security Symposium, SEC'19","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. Erim: Secure, efficient in-process isolation with protection keys (mpk). In Proceedings of the 28th USENIX Conference on Security Symposium, SEC'19, page 1221--1238, USA, 2019. USENIX Association."},{"key":"e_1_3_2_1_60_1","volume-title":"Webassembly on cloudflare workers","author":"Varda Kenton","year":"2018","unstructured":"Kenton Varda. Webassembly on cloudflare workers, 2018. URL: https:\/\/blog.cloudflare.com\/webassembly-on-cloudflare-workers\/."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_62_1","volume-title":"Introducing intel\u00ae advanced performance extensions (intel\u00ae apx)","author":"Winkel Sebastian","year":"2023","unstructured":"Sebastian Winkel and Jason Agron. Introducing intel\u00ae advanced performance extensions (intel\u00ae apx), 2023. URL: https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/advanced-performance-extensions-apx.html."},{"key":"e_1_3_2_1_63_1","volume-title":"wasm2c: run tests with -o2 on non-windows","author":"Winstein Keith","year":"2022","unstructured":"Keith Winstein. wasm2c: run tests with -o2 on non-windows, 2022. URL: https:\/\/github.com\/WebAssembly\/wabt\/pull\/1939."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.5555\/2665671.2665740"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806610"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"key":"e_1_3_2_1_67_1","first-page":"1973","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Yu Jiyong","year":"2023","unstructured":"Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, and Christopher W. Fletcher. Synchronization storage channels (S2C): Timer-less cache Side-Channel attacks on the apple m1 via hardware synchronization instructions. In 32nd USENIX Security Symposium (USENIX Security 23), pages 1973--1990, Anaheim, CA, August 2023. USENIX Association. URL: https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/yu-jiyong."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046713"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038687"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660344"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640408","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3620665.3640408","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640408","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640408","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:42Z","timestamp":1750291422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640408"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":70,"alternative-id":["10.1145\/3620665.3640408","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640408","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}