{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:12:21Z","timestamp":1772039541443,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Austrian Research Promotion Agency (FFG)","award":["891092"],"award-info":[{"award-number":["891092"]}]},{"name":"Austrian Research Promotion Agency (FFG)","award":["888087"],"award-info":[{"award-number":["888087"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3661135","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"1214-1230","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Beyond the Edges of Kernel Control-Flow Hijacking Protection with HEK-CFI"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1771-0064","authenticated-orcid":false,"given":"Lukas","family":"Maar","sequence":"first","affiliation":[{"name":"Graz University of Technology, Graz, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7440-4302","authenticated-orcid":false,"given":"Pascal","family":"Nasahl","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Graz, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9650-8041","authenticated-orcid":false,"given":"Stefan","family":"Mangard","sequence":"additional","affiliation":[{"name":"Graz University of Technology, Graz, Graz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Mart\u00edn Abadi Mihai Budiu Ulfar Erlingsson and Jay Ligatti. 2005. Control-Flow Integrity. In CCS.","DOI":"10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","volume-title":"SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In USENIX Security Symposium.","author":"Abubakar Muhammad","year":"2021","unstructured":"Muhammad Abubakar, Adil Ahmad, Pedro Fonseca, and Dongyan Xu. 2021. SHARD: Fine-Grained Kernel Specialization with Context-Aware Hardening. In USENIX Security Symposium."},{"key":"e_1_3_2_1_3_1","unstructured":"Android. 2022. Kernel Control Flow Integrity. https:\/\/source.android.com\/docs\/security\/test\/kcfi"},{"key":"e_1_3_2_1_4_1","unstructured":"ARM. 2022. Arm Architecture Reference Manual for A-profile architecture."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Tyler K. Bletsch Xuxian Jiang Vincent W. Freeh and Zhenkai Liang. 2011. Jump-oriented programming: a new class of code-reuse attack. In AsiaCCS.","DOI":"10.1145\/1966913.1966919"},{"key":"e_1_3_2_1_6_1","volume-title":"Understanding the Linux Kernel","author":"Bovet Daniel P","unstructured":"Daniel P Bovet and Marco Cesati. 2005. Understanding the Linux Kernel. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455776"},{"key":"e_1_3_2_1_8_1","volume-title":"KASLR: Break It, Fix It, Repeat. In AsiaCCS.","author":"Canella Claudio","year":"2020","unstructured":"Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, and Daniel Gruss. 2020. KASLR: Break It, Fix It, Repeat. In AsiaCCS."},{"key":"e_1_3_2_1_9_1","unstructured":"Nicholas Carlini Antonio Barresi Mathias Payer David Wagner and Thomas R Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity.. In USENIX Security."},{"key":"e_1_3_2_1_10_1","volume-title":"Wagner","author":"Carlini Nicholas","year":"2014","unstructured":"Nicholas Carlini and David A. Wagner. 2014. ROP is Still Dangerous: Breaking Modern Defenses. In USENIX Security."},{"key":"e_1_3_2_1_11_1","unstructured":"Andrew Cooper. 2021. Xen CET Supervisor Shadow Stacks. https:\/\/xenbits.xen.org\/people\/andrewcoop\/Xen-CET-SS.pdf"},{"key":"e_1_3_2_1_12_1","unstructured":"Jonathan Corbet. 2012. Supervisor mode access prevention. https:\/\/lwn.net\/Articles\/517475\/"},{"key":"e_1_3_2_1_13_1","unstructured":"Jonathan Corbet. 2015. Kernel security: beyond bug fixing. https:\/\/lwn.net\/Articles\/662219\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Jonathan Corbet. 2016. Defending against Rowhammer in the kernel. https:\/\/lwn.net\/Articles\/704920\/"},{"key":"e_1_3_2_1_15_1","volume-title":"SPEC CPU 2017","author":"Standard Performance Evaluation Corporation","year":"2017","unstructured":"Standard Performance Evaluation Corporation. 2017. SPEC CPU 2017. https:\/\/www.spec.org\/cpu2017\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"John Criswell Nathan Dautenhahn and Vikram Adve. 2014. KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels. In S&P.","DOI":"10.1109\/SP.2014.26"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Lucas Davi David Gens Christopher Liebchen and Ahmad-Reza Sadeghi. 2017. PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables. In NDSS.","DOI":"10.14722\/ndss.2017.23421"},{"key":"e_1_3_2_1_18_1","volume-title":"Camouflage: Hardware-assisted CFI for the ARM Linux kernel. In DAC.","author":"Denis-Courmont R\u00e9mi","year":"2020","unstructured":"R\u00e9mi Denis-Courmont, Hans Liljestrand, Carlos Chinea, and Jan-Erik Ekberg. 2020. Camouflage: Hardware-assisted CFI for the ARM Linux kernel. In DAC."},{"key":"e_1_3_2_1_19_1","unstructured":"Jake Edge. 2011. Extending the use of RO and NX. https:\/\/lwn.net\/Articles\/422487\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Jake Edge. 2013. Kernel address space layout randomization. https:\/\/lwn.net\/Articles\/569635\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Reza Mirzazade Farkhani Saman Jafari Sajjad Arshad William Robertson Engin Kirda and Hamed Okhravi. 2018. On the Effectiveness of Type-Based Control Flow Integrity. In ACSAC.","DOI":"10.1145\/3274694.3274739"},{"key":"e_1_3_2_1_22_1","volume-title":"Kemerlis","author":"Gaidis Alexander J.","year":"2023","unstructured":"Alexander J. Gaidis, Joao Moreira, Ke Sun, Alyssa Milburn, Vaggelis Atlidakis, and Vasileios P. Kemerlis. 2023. FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking. arXiv:2303.16353 (2023)."},{"key":"e_1_3_2_1_23_1","unstructured":"Xinyang Ge Nirupama Talele Mathias Payer and Trent Jaeger. 2016. Fine-Grained Control-Flow Integrity for Kernel Software. In Euro S&P."},{"key":"e_1_3_2_1_24_1","unstructured":"GitHub. 2021. CodeQL. https:\/\/codeql.github.com\/"},{"key":"e_1_3_2_1_25_1","volume-title":"Scott","author":"Gravani Spyridoula","year":"2019","unstructured":"Spyridoula Gravani, Mohammad Hedayati, John Criswell, and Michael L. Scott. 2019. IskiOS: Lightweight Defense Against Kernel-Level Code-Reuse Attacks. arXiv:1903.04654 (2019)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Daniel Gruss Cl\u00e9mentine Maurice Klaus Wagner and Stefan Mangard. 2016. Flush+Flush: A Fast and Stealthy Cache Attack. In DIMVA.","DOI":"10.1007\/978-3-319-40667-1_14"},{"key":"e_1_3_2_1_27_1","volume-title":"Meltdown: Basics, Details, Consequences. In Black Hat USA.","author":"Gruss Daniel","year":"2018","unstructured":"Daniel Gruss, Michael Schwarz, and Moritz Lipp. 2018. Meltdown: Basics, Details, Consequences. In Black Hat USA."},{"key":"e_1_3_2_1_28_1","volume-title":"Freiling","author":"Hund Ralf","year":"2009","unstructured":"Ralf Hund, Thorsten Holz, and Felix C. Freiling. 2009. Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms. In USENIX Security."},{"key":"e_1_3_2_1_29_1","unstructured":"Intel. 2016. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 1: Basic Architecture."},{"key":"e_1_3_2_1_30_1","unstructured":"Intel. 2017. Control-flow Enforcement Technology Preview. Revision 2.0."},{"key":"e_1_3_2_1_31_1","unstructured":"Intel. 2019. Intel 64 and IA-32 Architectures Software Developer's Manual Volume 4: Model-Specific Registers."},{"key":"e_1_3_2_1_32_1","unstructured":"Vasileios P Kemerlis Michalis Polychronakis and Angelos D Keromytis. 2014. ret2dir: Rethinking kernel isolation. In USENIX Security."},{"key":"e_1_3_2_1_33_1","volume-title":"Keromytis","author":"Kemerlis Vasileios P.","year":"2012","unstructured":"Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis. 2012. kGuard: Lightweight Kernel Protection against Return-to-User Attacks. In USENIX Security."},{"key":"e_1_3_2_1_34_1","volume-title":"Spectre Attacks: Exploiting Speculative Execution. In S&P.","author":"Kocher Paul","year":"2019","unstructured":"Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution. In S&P."},{"key":"e_1_3_2_1_35_1","unstructured":"Anil Kurmus Reinhard Tartler Daniela Dorneanu Bernhard Heinloth Valentin Rothberg Andreas Ziegler Wolfgang Schr\u00f6der-Preikschat Daniel Lohmann and R\u00fcdiger Kapitza. 2013. Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring. In NDSS."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Anil Kurmus and Robby Zippel. 2014. A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel. In CCS.","DOI":"10.1145\/2660267.2660331"},{"key":"e_1_3_2_1_37_1","unstructured":"Volodymyr Kuznetsov L\u00e1szl\u00f3 Szekeres Mathias Payer George Candea R Sekar and Dawn Song. 2014. Code-Pointer Integrity. In OSDI."},{"key":"e_1_3_2_1_38_1","volume-title":"LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In IEEE \/ ACM International Symposium on Code Generation and Optimization - CGO.","author":"Lattner Chris","unstructured":"Chris Lattner and Vikram S. Adve. 2004. LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In IEEE \/ ACM International Symposium on Code Generation and Optimization - CGO."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Hugo Lefeuvre Vlad-Andrei B\u0103doiu Yi Chien Felipe Huici Nathan Dautenhahn and Pierre Olivier. 2022. Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. In NDSS.","DOI":"10.14722\/ndss.2023.24117"},{"key":"e_1_3_2_1_40_1","unstructured":"Guoren Li Hang Zhang Jinmeng Zhou Wenbo Shen Yulei Sui and Zhiyun Qian. 2023. A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel. In USENIX Security."},{"key":"e_1_3_2_1_41_1","volume-title":"Fine-CFI: FineGrained Control-Flow Integrity for Operating System Kernels","author":"Li Jinku","year":"2018","unstructured":"Jinku Li, Xiaomeng Tong, Fengwei Zhang, and Jianfeng Ma. 2018. Fine-CFI: FineGrained Control-Flow Integrity for Operating System Kernels. IEEE Transactions on Information Forensics and Security (2018)."},{"key":"e_1_3_2_1_42_1","volume-title":"Jan-Erik Ekberg, and N. Asokan.","author":"Liljestrand Hans","year":"2019","unstructured":"Hans Liljestrand, Thomas Nyman, Kui Wang, Carlos Chinea Perez, Jan-Erik Ekberg, and N. Asokan. 2019. PAC it up: Towards Pointer Integrity using ARM Pointer Authentication. In USENIX."},{"key":"e_1_3_2_1_43_1","unstructured":"Lukas Maar Stefan Gast Martin Unterguggenberger Mathias Oberhuber and Stefan Mangard. 2024. SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel. In USENIX Security."},{"key":"e_1_3_2_1_44_1","volume-title":"DOPE: DOmain Protection Enforcement with PKS. In ACSAC.","author":"Maar Lukas","year":"2023","unstructured":"Lukas Maar, Martin Schwarzl, Fabian Rauscher, Daniel Gruss, and Stefan Mangard. 2023. DOPE: DOmain Protection Enforcement with PKS. In ACSAC."},{"key":"e_1_3_2_1_45_1","volume-title":"Howard Shrobe, Mathias Payer, Hamed Okhravi, and Nathan Burow.","author":"McKee Derrick","year":"2022","unstructured":"Derrick McKee, Yianni Giannaris, Carolina Ortega Perez, Howard Shrobe, Mathias Payer, Hamed Okhravi, and Nathan Burow. 2022. Preventing Kernel Hacks with HAKC. In NDSS."},{"key":"e_1_3_2_1_46_1","volume-title":"Lmbench: Portable Tools for Performance Analysis. In USENIX ATC.","author":"McVoy Larry","year":"1996","unstructured":"Larry McVoy and Carl Staelin. 1996. Lmbench: Portable Tools for Performance Analysis. In USENIX ATC."},{"key":"e_1_3_2_1_47_1","unstructured":"Joao Moreira. 2022. Kernel FineIBT Support. https:\/\/lwn.net\/Articles\/891976\/"},{"key":"e_1_3_2_1_48_1","unstructured":"James Morse. 2015. arm64: kernel: Add support for Privileged Access Never. https:\/\/lwn.net\/Articles\/651614\/"},{"key":"e_1_3_2_1_49_1","volume-title":"Rap: Rip rop.","author":"Team X","year":"2015","unstructured":"PaX Team. 2015. Rap: Rip rop."},{"key":"e_1_3_2_1_50_1","unstructured":"Phoronix. 2022. OpenBenchmarking. https:\/\/openbenchmarking.org"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Marios Pomonis Theofilos Petsios Angelos D Keromytis Michalis Polychronakis and Vasileios P Kemerlis. 2017. kR\u02c6 X: Comprehensive Kernel Protection against Just-In-Time Code Reuse. In EuroSys.","DOI":"10.1145\/3064176.3064216"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Sergej Proskurin Marius Momeu Seyedhamed Ghavamnia Vasileios P. Kemerlis and Michalis Polychronakis. 2020. xMP: Selective Memory Protection for Kernel and User Space. In S&P.","DOI":"10.1109\/SP40000.2020.00041"},{"key":"e_1_3_2_1_53_1","first-page":"l","volume":"201","unstructured":"Samsung Knox News. 2016. Real-time Kernel Protection (RKP). https:\/\/www.samsungknox.com\/de\/blog\/real-time-kernel-protection-rkp","journal-title":"Samsung Knox News."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Felix Schuster Thomas Tendyck Christopher Liebchen Lucas Davi Ahmad-Reza Sadeghi and Thorsten Holz. 2015. Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications. In S&P.","DOI":"10.1109\/SP.2015.51"},{"key":"e_1_3_2_1_55_1","unstructured":"Mark Seaborn. 2015. Exploiting the DRAM rowhammer bug to gain kernel privileges. http:\/\/googleprojectzero.blogspot.com\/2015\/03\/exploiting-dram-rowhammer-bug-to-gain.html"},{"key":"e_1_3_2_1_56_1","unstructured":"INetCop Security. 2016. New Reliable Android Kernel Root Exploitation Techniques. http:\/\/powerofcommunity.net\/poc2016\/x82.pdf"},{"key":"e_1_3_2_1_57_1","unstructured":"Seth Jenkins. 2022. Exploiting CVE-2022-42703 - Bringing back the stack attack. https:\/\/googleprojectzero.blogspot.com\/2022\/12\/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html"},{"key":"e_1_3_2_1_58_1","unstructured":"Seth Jenkins. 2023. Analyzing a Modern In-the-wild Android Exploit. https:\/\/googleprojectzero.blogspot.com\/2023\/09\/analyzing-modern-in-wild-android-exploit.html"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Hovav Shacham. 2007. The geometry of innocent flesh on the bone: Return-intolibc without function calls (on the x86). In CCS.","DOI":"10.1145\/1315245.1315313"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Vedvyas Shanbhogue Deepak Gupta and Ravi Sahita. 2019. Security Analysis of Processor Instruction Set Architecture for Enforcing Control-Flow Integrity. In HASP.","DOI":"10.1145\/3337167.3337175"},{"key":"e_1_3_2_1_61_1","unstructured":"Di Shen. 2017. Defeating Samsung KNOX with Zero Privilege. https:\/\/infocondb.org\/con\/black-hat\/black-hat-usa-2017\/defeating-samsung-knox-with-zero-privilege"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Chengyu Song Byoungyoung Lee Kangjie Lu William R. Harris Taesoo Kim and Wenke Lee. 2016. Enforcing Kernel Security Invariants with Data Flow Integrity. In NDSS.","DOI":"10.14722\/ndss.2016.23218"},{"key":"e_1_3_2_1_63_1","unstructured":"Yoo Sungbae Park Jinbum Kim Seolheui Kim Yeji and Kim Taesoo. 2022. InKernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication. In USENIX Security."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Zhi Wang and Xuxian Jiang. 2010. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. In S&P.","DOI":"10.1109\/SP.2010.30"},{"key":"e_1_3_2_1_65_1","volume-title":"KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. In USENIX Security.","author":"Wu Wei","year":"2019","unstructured":"Wei Wu, Yueqi Chen, Xinyu Xing, and Wei Zou. 2019. KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities. In USENIX Security."},{"key":"e_1_3_2_1_66_1","volume-title":"FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. In USENIX Security.","author":"Wu Wei","year":"2018","unstructured":"Wei Wu, Yueqi Chen, Jun Xu, Xinyu Xing, Xiaorui Gong, and Wei Zou. 2018. FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities. In USENIX Security."},{"key":"e_1_3_2_1_67_1","volume-title":"CETIS: Retrofitting Intel CET for Generic and Efficient Intra-Process Memory Isolation. In CCS.","author":"Xie Mengyao","year":"2022","unstructured":"Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, and Zhe Wang. 2022. CETIS: Retrofitting Intel CET for Generic and Efficient Intra-Process Memory Isolation. In CCS."},{"key":"e_1_3_2_1_68_1","volume-title":"Flavio Toffalini\u2020, Bing Mao, and Mathias Payer.","author":"Xu Jianhao","year":"2023","unstructured":"Jianhao Xu, Luca Di Bartolomeo, Flavio Toffalini\u2020, Bing Mao, and Mathias Payer. 2023. WarpAttack: Bypassing CFI through Compiler-Introduced Double-Fetches. In S&P."},{"key":"e_1_3_2_1_69_1","volume-title":"ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels. arXiv:1912.10666","author":"Yang Yutian","year":"2019","unstructured":"Yutian Yang, Songbo Zhu, Wenbo Shen, Yajin Zhou, Jiadong Sun, and Kui Ren. 2019. ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels. arXiv:1912.10666 (2019)."},{"key":"e_1_3_2_1_70_1","unstructured":"Yuval Yarom and Katrina Falkner. 2014. Flush+Reload: a High Resolution Low Noise L3 Cache Side-Channel Attack. In USENIX Security."},{"key":"e_1_3_2_1_71_1","unstructured":"Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In USENIX Security."},{"key":"e_1_3_2_1_72_1","first-page":"2022","volume":"202","unstructured":"Xiaochen Zou. 2022. CVE-2022-27666 Writeup. https:\/\/etenal.me\/archives\/1825","journal-title":"Xiaochen Zou."}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","location":"Singapore Singapore","acronym":"ASIA CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3661135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3661135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":72,"alternative-id":["10.1145\/3634737.3661135","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3661135","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}