{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:44:32Z","timestamp":1773737072993,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T00:00:00Z","timestamp":1701648000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Austrian Research Promotion Agency (FFG) via the SEIZE project","award":["888087"],"award-info":[{"award-number":["888087"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,4]]},"DOI":"10.1145\/3627106.3627113","type":"proceedings-article","created":{"date-parts":[[2023,12,2]],"date-time":"2023-12-02T18:13:22Z","timestamp":1701540802000},"page":"662-676","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["DOPE: DOmain Protection Enforcement with PKS"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1771-0064","authenticated-orcid":false,"given":"Lukas","family":"Maar","sequence":"first","affiliation":[{"name":"Graz University of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3760-1929","authenticated-orcid":false,"given":"Martin","family":"Schwarzl","sequence":"additional","affiliation":[{"name":"Independent Researcher, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7286-1156","authenticated-orcid":false,"given":"Fabian","family":"Rauscher","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7977-3246","authenticated-orcid":false,"given":"Daniel","family":"Gruss","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9650-8041","authenticated-orcid":false,"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Austria"}]}],"member":"320","published-online":{"date-parts":[[2023,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Mart\u00edn Abadi Mihai Budiu Ulfar Erlingsson and Jay Ligatti. 2005. Control-Flow Integrity. In CCS.","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","volume-title":"Control-flow integrity principles, implementations, and applications. TISSEC","author":"Abadi Mart\u00edn","year":"2009","unstructured":"Mart\u00edn Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. 2009. Control-flow integrity principles, implementations, and applications. TISSEC (2009)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Periklis Akritidis Cristian Cadar Costin Raiciu Manuel Costa and Miguel Castro. 2008. Preventing Memory Error Exploits with WIT. In S&P.","DOI":"10.1109\/SP.2008.30"},{"key":"e_1_3_2_1_4_1","unstructured":"Khalid Aziz. 2019. Add support for eXclusive Page Frame Ownership. https:\/\/lwn.net\/Articles\/779818\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Brian Belleville Hyungon Moon Jangseop Shin Dongil Hwang Joseph\u00a0M Nash Seonhwa Jung Yeoul Na Stijn Volckaert Per Larsen Yunheung Paek 2018. Hardware assisted randomization of data. In RAID.","DOI":"10.1007\/978-3-030-00470-5_16"},{"key":"e_1_3_2_1_6_1","unstructured":"Sandeep Bhatkar and R Sekar. 2008. Data space randomization. In DIMVA."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Tyler\u00a0K. Bletsch Xuxian Jiang Vincent\u00a0W. Freeh and Zhenkai Liang. 2011. Jump-oriented programming: a new class of code-reuse attack. In AsiaCCS.","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_8_1","unstructured":"Neil Brown. 2015. RCU-walk: faster pathname lookup in Linux. https:\/\/lwn.net\/Articles\/649729\/"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_10_1","unstructured":"Cristian Cadar Periklis Akritidis Manuel Costa Jean-Phillipe Martin and Miguel Castro. 2008. Data randomization. (2008)."},{"key":"e_1_3_2_1_11_1","unstructured":"Nicholas Carlini and David\u00a0A. Wagner. 2014. ROP is Still Dangerous: Breaking Modern Defenses. In USENIX Security."},{"key":"e_1_3_2_1_12_1","unstructured":"Miguel Castro Manuel Costa and Tim Harris. 2006. Securing software by enforcing data-flow integrity. In OSDI."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24174-6_4"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Quan Chen Ahmed\u00a0M. Azab Guruprasad Ganesh and Peng Ning. 2017. PrivWatcher: Non-Bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks. In AsiaCCS.","DOI":"10.1145\/3052973.3053029"},{"key":"e_1_3_2_1_15_1","unstructured":"Shuo Chen Jun Xu Emre\u00a0Can Sezer Prachi Gauriar and Ravishankar\u00a0K Iyer. 2005. Non-Control-Data Attacks Are Realistic Threats.. In USENIX Security."},{"key":"e_1_3_2_1_16_1","unstructured":"Chromium. 2018. PartitionAlloc Design. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/lkcr\/base\/allocator\/partition_allocator\/PartitionAlloc.md"},{"key":"e_1_3_2_1_17_1","volume-title":"PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In USENIX Security Symposium.","author":"Connor Joseph","year":"2020","unstructured":"R.\u00a0Joseph Connor, Tyler McDaniel, Jared\u00a0M. Smith, and Max Schuchard. 2020. PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_1_18_1","unstructured":"Jonathan Corbet. 2012. Supervisor mode access prevention. https:\/\/lwn.net\/Articles\/517475\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Jonathan Corbet. 2016. Defending against Rowhammer in the kernel. https:\/\/lwn.net\/Articles\/704920\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Jonathan Corbet. 2016. Exclusive page-frame ownership. https:\/\/lwn.net\/Articles\/700647\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Jonathan Corbet. 2018. Kernel support for control-flow enforcement. https:\/\/lwn.net\/Articles\/758245\/"},{"key":"e_1_3_2_1_22_1","unstructured":"Jonathan Corbet. 2020. Memory protection keys for the kernel. https:\/\/lwn.net\/Articles\/826554\/"},{"key":"e_1_3_2_1_23_1","unstructured":"Jonathan Corbet. 2022. Seeking an API for protection keys supervisor. https:\/\/lwn.net\/Articles\/894531\/"},{"key":"e_1_3_2_1_24_1","unstructured":"Jonathan Corbet. 2022. Solutions for direct-map fragmentation. https:\/\/lwn.net\/Articles\/894557\/"},{"key":"e_1_3_2_1_25_1","volume-title":"SPEC CPU 2017","author":"Standard Performance\u00a0Evaluation Corporation","year":"2017","unstructured":"Standard Performance\u00a0Evaluation Corporation. 2017. SPEC CPU 2017. https:\/\/www.spec.org\/cpu2017\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"John Criswell Nathan Dautenhahn and Vikram Adve. 2014. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. In S&P.","DOI":"10.1109\/SP.2014.26"},{"key":"e_1_3_2_1_27_1","unstructured":"Cyril Hrubis. 2022. Linux Test Project. https:\/\/github.com\/linux-test-project\/ltp"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Lucas Davi David Gens Christopher Liebchen and Ahmad-Reza Sadeghi. 2017. PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. In NDSS.","DOI":"10.14722\/ndss.2017.23421"},{"key":"e_1_3_2_1_29_1","unstructured":"Jake Edge. 2011. Extending the use of RO and NX. https:\/\/lwn.net\/Articles\/422487\/"},{"key":"e_1_3_2_1_30_1","unstructured":"Jake Edge. 2013. Kernel address space layout randomization. https:\/\/lwn.net\/Articles\/569635\/"},{"key":"e_1_3_2_1_31_1","unstructured":"Jake Edge. 2020. Control-flow integrity for the kernel. https:\/\/lwn.net\/Articles\/810077\/"},{"key":"e_1_3_2_1_32_1","volume-title":"FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. arXiv:2303.16353","author":"Gaidis J.","year":"2023","unstructured":"Alexander\u00a0J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, and Vasileios\u00a0P. Kemerlis. 2023. FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. arXiv:2303.16353 (2023)."},{"key":"e_1_3_2_1_33_1","unstructured":"Xinyang Ge Nirupama Talele Mathias Payer and Trent Jaeger. 2016. Fine-Grained Control-Flow Integrity for Kernel Software. In Euro S&P."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice Klaus Wagner and Stefan Mangard. 2016. Flush+Flush: A Fast and Stealthy Cache Attack. In DIMVA.","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_35_1","volume-title":"Meltdown: Basics, Details, Consequences. In Black Hat USA.","author":"Gruss Daniel","year":"2018","unstructured":"Daniel Gruss, Michael Schwarz, and Moritz Lipp. 2018. Meltdown: Basics, Details, Consequences. In Black Hat USA."},{"key":"e_1_3_2_1_36_1","volume-title":"EPK: Scalable and Efficient Memory Protection Keys. In USENIX Security.","author":"Gu Jinyu","year":"2022","unstructured":"Jinyu Gu, Hao Li, Wentai Li, Yubin Xia, and Haibo Chen. 2022. EPK: Scalable and Efficient Memory Protection Keys. In USENIX Security."},{"key":"e_1_3_2_1_37_1","unstructured":"Hong Hu Shweta Shinde Sendroiu Adrian Zheng\u00a0Leong Chua Prateek Saxena and Zhenkai Liang. 2016. Data-oriented programming: On the expressiveness of non-control data attacks. In S&P."},{"key":"e_1_3_2_1_38_1","unstructured":"Ralf Hund Thorsten Holz and Felix\u00a0C. Freiling. 2009. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In USENIX Security."},{"key":"e_1_3_2_1_39_1","unstructured":"Intel. 2019. Intel 64 and IA-32 Architectures Software Developer\u2019s Manual Volume 4: Model-Specific Registers."},{"key":"e_1_3_2_1_40_1","unstructured":"Vasileios\u00a0P Kemerlis Michalis Polychronakis and Angelos\u00a0D Keromytis. 2014. ret2dir: Rethinking kernel isolation. In USENIX Security."},{"key":"e_1_3_2_1_41_1","unstructured":"Vasileios\u00a0P. Kemerlis Georgios Portokalidis and Angelos\u00a0D. Keromytis. 2012. kGuard: Lightweight Kernel Protection against Return-to-User Attacks. In USENIX Security."},{"key":"e_1_3_2_1_42_1","unstructured":"kernel.org. 2009. Virtual memory map with 4 level page tables (x86_64). https:\/\/www.kernel.org\/doc\/Documentation\/x86\/x86_64\/mm.txt"},{"key":"e_1_3_2_1_43_1","unstructured":"Michael Kerrisk. 2021. capabilities(7) \u2014 Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man7\/capabilities.7.html."},{"key":"e_1_3_2_1_44_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In S&P.","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In S&P."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15255-9_4"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.30.563"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Hugo Lefeuvre Vlad-Andrei B\u0103doiu Yi Chien Felipe Huici Nathan Dautenhahn and Pierre Olivier. 2022. Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. In NDSS.","DOI":"10.14722\/ndss.2023.24117"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Hugo Lefeuvre Vlad-Andrei B\u0103doiu Alexander Jung Stefan\u00a0Lucian Teodorescu Sebastian Rauch Felipe Huici Costin Raiciu and Pierre Olivier. 2022. FlexOS: Towards Flexible OS Isolation. In Architectural Support for Programming Languages and Operating Systems.","DOI":"10.1145\/3503222.3507759"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-020-00051-9"},{"key":"e_1_3_2_1_50_1","unstructured":"Zhenpeng Lin Yuhang Wu and Xinyu Xing. 2022. DirtyCred: Escalating Privilege in Linux Kernel. In ACM."},{"key":"e_1_3_2_1_51_1","volume-title":"PLATYPUS: Software-based Power Side-Channel Attacks on x86. In S&P.","author":"Lipp Moritz","year":"2021","unstructured":"Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, and Daniel Gruss. 2021. PLATYPUS: Software-based Power Side-Channel Attacks on x86. In S&P."},{"key":"e_1_3_2_1_52_1","volume-title":"USMA: Share Kernel Code with Me. In Black Hat Asia.","author":"Liu Yong","year":"2022","unstructured":"Yong Liu, Jun Yao, and Xiaodong Wang. 2022. USMA: Share Kernel Code with Me. In Black Hat Asia."},{"key":"e_1_3_2_1_53_1","unstructured":"LLVM. 2019. The LLVM Compiler Infrastructure. https:\/\/llvm.org"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Derrick McKee Yianni Giannaris Carolina\u00a0Ortega Perez Howard Shrobe Mathias Payer Hamed Okhravi and Nathan Burow. 2022. Preventing Kernel Hacks with HAKC. In NDSS.","DOI":"10.14722\/ndss.2022.24026"},{"key":"e_1_3_2_1_55_1","unstructured":"Paul McKenney. 2007. What is RCU Fundamentally?https:\/\/lwn.net\/Articles\/262464\/"},{"key":"e_1_3_2_1_56_1","volume-title":"Lmbench: Portable Tools for Performance Analysis. In USENIX ATC.","author":"McVoy Larry","year":"1996","unstructured":"Larry McVoy and Carl Staelin. 1996. Lmbench: Portable Tools for Performance Analysis. In USENIX ATC."},{"key":"e_1_3_2_1_57_1","unstructured":"Joao Moreira. 2022. Kernel FineIBT Support. https:\/\/lwn.net\/Articles\/891976\/"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"crossref","unstructured":"Jo\u00e3o Moreira Sandro Rigo Michalis Polychronakis and Vasileios Kemerlis. 2017. DROP THE ROP Fine-grained Control-flow Integrity for the Linux Kernel. In Black Hat Asia.","DOI":"10.5753\/sbseg.2016.19322"},{"key":"e_1_3_2_1_59_1","unstructured":"James Morse. 2015. arm64: kernel: Add support for Privileged Access Never. https:\/\/lwn.net\/Articles\/651614\/"},{"key":"e_1_3_2_1_60_1","unstructured":"Soyeon Park Sangho Lee Wen Xu HyunGon Moon and Taesoo Kim. 2019. libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). In USENIX ATC."},{"key":"e_1_3_2_1_61_1","unstructured":"Phoronix. 2022. OpenBenchmarking. https:\/\/openbenchmarking.org"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Sergej Proskurin Marius Momeu Seyedhamed Ghavamnia Vasileios\u00a0P. Kemerlis and Michalis Polychronakis. 2020. xMP: Selective Memory Protection for Kernel and User Space. In S&P.","DOI":"10.1109\/SP40000.2020.00041"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866498"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Nick Roessler Lucas Atayde Imani Palmer Derrick McKee Jai Pandey Vasileios\u00a0P. Kemerlis Mathias Payer Adam Bates Jonathan\u00a0M. Smith Andre DeHon and Nathan Dautenhahn. 2021. uSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. In RAID.","DOI":"10.1145\/3471621.3471839"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Vasily\u00a0A. Sartakov Llu\u00eds Vilanova and Peter Pietzuch. 2021. CubicleOS: A Library OS with Software Componentisation for Practical Isolation. In Architectural Support for Programming Languages and Operating Systems.","DOI":"10.1145\/3445814.3446731"},{"key":"e_1_3_2_1_67_1","volume-title":"Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium.","author":"Schrammel David","year":"2022","unstructured":"David Schrammel, Samuel Weiser, Richard Sadek, and Stefan Mangard. 2022. Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. In USENIX Security Symposium."},{"key":"e_1_3_2_1_68_1","volume-title":"Donky: Domain Keys\u2013Efficient In-Process Isolation for RISC-V and x86. In USENIX Security.","author":"Schrammel David","year":"2020","unstructured":"David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain Keys\u2013Efficient In-Process Isolation for RISC-V and x86. In USENIX Security."},{"key":"e_1_3_2_1_69_1","unstructured":"Mark Seaborn. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. http:\/\/googleprojectzero.blogspot.com\/2015\/03\/exploiting-dram-rowhammer-bug-to-gain.html"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"crossref","unstructured":"Chengyu Song Byoungyoung Lee Kangjie Lu William\u00a0R. Harris Taesoo Kim and Wenke Lee. 2016. Enforcing Kernel Security Invariants with Data Flow Integrity. In NDSS.","DOI":"10.14722\/ndss.2016.23218"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"crossref","unstructured":"Mincheol Sung Pierre Olivier Stefan Lankes and Binoy Ravindran. 2020. Intra-Unikernel Isolation with Intel Memory Protection Keys. In ACM.","DOI":"10.1145\/3381052.3381326"},{"key":"e_1_3_2_1_72_1","unstructured":"Yoo Sungbae Park Jinbum Kim Seolheui Kim Yeji and Kim Taesoo. 2022. In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. In USENIX Security."},{"key":"e_1_3_2_1_73_1","unstructured":"The Linux Kernel. 2021. File system drivers (Part 2). https:\/\/linux-kernel-labs.github.io\/refs\/heads\/master\/labs\/filesystems_part2.html"},{"key":"e_1_3_2_1_74_1","unstructured":"The Linux Kernel. 2022. Index Nodes. https:\/\/www.kernel.org\/doc\/html\/latest\/filesystems\/ext4\/inodes.html"},{"key":"e_1_3_2_1_75_1","unstructured":"The Linux Kernel. 2022. Locking. https:\/\/www.kernel.org\/doc\/html\/latest\/filesystems\/locking.html"},{"key":"e_1_3_2_1_76_1","unstructured":"The Linux Kernel. 2022. Memory Allocation Guide. https:\/\/docs.kernel.org\/core-api\/memory-allocation.html?highlight=kmem_cache_alloc"},{"key":"e_1_3_2_1_77_1","unstructured":"The Linux Kernel. 2022. Memory Protection Keys. https:\/\/www.kernel.org\/doc\/html\/latest\/core-api\/protection-keys.html"},{"key":"e_1_3_2_1_78_1","volume-title":"ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys. In USENIX Security.","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno\u00a0O. Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure and Efficient In-process Isolation with Memory Protection Keys. In USENIX Security."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Alexios Voulimeneas Jonas Vinck Ruben Mechelinck and Stijn Volckaert. 2022. You Shall Not (by)Pass! Practical Secure and Fast PKU-Based Sandboxing. In EuroSys.","DOI":"10.1145\/3492321.3519560"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095814"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_8"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-020-00514-7"}],"event":{"name":"ACSAC '23: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC '23"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627106.3627113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:37:13Z","timestamp":1755884233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627106.3627113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,4]]},"references-count":82,"alternative-id":["10.1145\/3627106.3627113","10.1145\/3627106"],"URL":"https:\/\/doi.org\/10.1145\/3627106.3627113","relation":{},"subject":[],"published":{"date-parts":[[2023,12,4]]},"assertion":[{"value":"2023-12-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}