{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:30:02Z","timestamp":1766449802791,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key R&D Program of China","award":["2022YFE0113200"],"award-info":[{"award-number":["2022YFE0113200"]}]},{"name":"Key R&D Program of Zhejiang Province","award":["2022C01165"],"award-info":[{"award-number":["2022C01165"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3700786","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"467-480","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["LightZone: Lightweight Hardware-Assisted In-Process Isolation for ARM64"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5586-5621","authenticated-orcid":false,"given":"Ziqi","family":"Yuan","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6204-2543","authenticated-orcid":false,"given":"Siyu","family":"Hong","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5436-6724","authenticated-orcid":false,"given":"Ruorong","family":"Guo","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0178-0171","authenticated-orcid":false,"given":"Rui","family":"Chang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8433-7281","authenticated-orcid":false,"given":"Mingyu","family":"Gao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2899-6121","authenticated-orcid":false,"given":"Wenbo","family":"Shen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7610-4736","authenticated-orcid":false,"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM. 2023. Armv8.5-A Memory Tagging Extension. https:\/\/developer.arm.com\/documentation\/102925\/latest\/."},{"key":"e_1_3_2_1_2_1","first-page":"21","article-title":"SKEE: A lightweight Secure Kernel-level Execution Environment for ARM","volume":"16","author":"Azab Ahmed M","year":"2016","unstructured":"Ahmed M Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, and Peng Ning. 2016. SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.. In NDSS, Vol. 16. 21--24.","journal-title":"NDSS"},{"key":"e_1_3_2_1_3_1","volume-title":"the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Belay Adam","year":"2012","unstructured":"Adam Belay, Andrea Bittau, Ali Mashtizadeh, David Terei, David Mazi\u00e8res, and Christos Kozyrakis. 2012. Dune: Safe user-level access to privileged CPU features. In the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 335--348."},{"key":"e_1_3_2_1_4_1","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)","author":"Belay Adam","year":"2014","unstructured":"Adam Belay, George Prekas, Ana Klimovic, Samuel Grossman, Christos Kozyrakis, and Edouard Bugnion. 2014. IX: a protected dataplane operating system for high throughput and low latency. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). 49--65."},{"key":"e_1_3_2_1_5_1","volume-title":"SecureCells: A Secure Compartmentalized Architecture. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 2921--2939","author":"Bhattacharyya Atri","year":"2023","unstructured":"Atri Bhattacharyya, Florian Hofhammer, Yuanlong Li, Siddharth Gupta, Andres Sanchez, Babak Falsafi, and Mathias Payer. 2023. SecureCells: A Secure Compartmentalized Architecture. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE, 2921--2939."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3595797"},{"key":"e_1_3_2_1_7_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Bosamiya Jay","year":"2022","unstructured":"Jay Bosamiya, Wen Shih Lim, and Bryan Parno. 2022. Provably-Safe multilingual software sandboxing using WebAssembly. In 31st USENIX Security Symposium (USENIX Security 22). 1975--1992."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/381792.195579"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_10_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Clements Abraham A","year":"2018","unstructured":"Abraham A Clements, Naif Saleh Almakhdhub, Saurabh Bagchi, and Mathias Payer. 2018. {ACES}: Automatic compartments for embedded systems. In 27th USENIX Security Symposium (USENIX Security 18). 65--82."},{"key":"e_1_3_2_1_11_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Connor R Joseph","year":"2020","unstructured":"R Joseph Connor, Tyler McDaniel, Jared M Smith, and Max Schuchard. 2020. {PKU} Pitfalls: Attacks on {PKU-based} Memory Isolation Systems. In 29th USENIX Security Symposium (USENIX Security 20). 1409--1426."},{"key":"e_1_3_2_1_12_1","unstructured":"Jonathan Corbet. 2015. Pagemap: security fixes vs. ABI compatibility. https:\/\/lwn.net\/Articles\/642069\/."},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Annual Technical Conference. 221--233","author":"Dall Christoffer","year":"2017","unstructured":"Christoffer Dall, Shih-Wei Li, and Jason Nieh. 2017. Optimizing the Design and Implementation of the Linux ARM Hypervisor.. In USENIX Annual Technical Conference. 221--233."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644865.2541946"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 874--888","author":"Duy Kha Dinh","year":"2023","unstructured":"Kha Dinh Duy, Kyuwon Cho, Taehyun Noh, and Hojoon Lee. 2023. Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM Architectures. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. 874--888."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 7th symposium on Operating systems design and implementation. 75--88","author":"Erlingsson Ulfar","year":"2006","unstructured":"Ulfar Erlingsson, Mart\u00edn Abadi, Michael Vrable, Mihai Budiu, and George C Necula. 2006. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th symposium on Operating systems design and implementation. 75--88."},{"key":"e_1_3_2_1_17_1","unstructured":"The Apache Software Foundation. 2023. ab. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304037"},{"key":"e_1_3_2_1_19_1","volume-title":"EPK: Scalable and Efficient Memory Protection Keys. In 2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Gu Jinyu","year":"2022","unstructured":"Jinyu Gu, Hao Li, Wentai Li, Yubin Xia, and Haibo Chen. 2022. EPK: Scalable and Efficient Memory Protection Keys. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). 609--624."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3489146.3489173"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 2019 USENIX Annual Technical Conference.","author":"Hedayati Mohammad","year":"2019","unstructured":"Mohammad Hedayati and Spyridoula Gravani. 2019. Hodor: Intra-process isolation for high-throughput data plane libraries. In Proceedings of the 2019 USENIX Annual Technical Conference."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.48550\/ARXIV.2108.03705"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3316781.3317843"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665726"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519582"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093337.3037732"},{"key":"e_1_3_2_1_27_1","volume-title":"Assessing the impact of interface vulnerabilities in compartmentalized software. arXiv preprint arXiv:2212.12904","author":"Lefeuvre Hugo","year":"2022","unstructured":"Hugo Lefeuvre, Vlad-Andrei B\u0103doiu, Yi Chien, Felipe Huici, Nathan Dautenhahn, and Pierre Olivier. 2022. Assessing the impact of interface vulnerabilities in compartmentalized software. arXiv preprint arXiv:2212.12904 (2022)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507759"},{"key":"e_1_3_2_1_29_1","volume-title":"BULKOR: Enabling Bulk Loading for Path ORAM. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 103--103","author":"Li Xiang","year":"2024","unstructured":"Xiang Li, Yunqian Luo, and Mingyu Gao. 2024. BULKOR: Enabling Bulk Loading for Path ORAM. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 103--103."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132754"},{"key":"e_1_3_2_1_31_1","volume-title":"Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Litton James","year":"2016","unstructured":"James Litton, Anjo Vahldiek-Oberwagner, Eslam Elnikety, Deepak Garg, Bobby Bhattacharjee, and Peter Druschel. 2016. Light-Weight Contexts: An OS Abstraction for Safety and Performance. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 49--64. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/litton"},{"key":"e_1_3_2_1_32_1","volume-title":"MOAT: Towards Safe BPF Kernel Extension. arXiv preprint arXiv:2301.13421","author":"Lu Hongyi","year":"2023","unstructured":"Hongyi Lu, Shuai Wang, Yechang Wu, Wanning He, and Fengwei Zhang. 2023. MOAT: Towards Safe BPF Kernel Extension. arXiv preprint arXiv:2301.13421 (2023)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3627106.3627113"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Security Symposium","volume":"10","author":"McCamant Stephen","year":"2006","unstructured":"Stephen McCamant and Greg Morrisett. 2006. Evaluating SFI for a CISC Architecture.. In USENIX Security Symposium, Vol. 10. 209--224."},{"key":"e_1_3_2_1_35_1","volume-title":"EnclaveDom: Privilege separation for large-TCB applications in trusted execution environments. arXiv preprint arXiv:1907.13245","author":"Melara Marcela S","year":"2019","unstructured":"Marcela S Melara, Michael J Freedman, and Mic Bowman. 2019. EnclaveDom: Privilege separation for large-TCB applications in trusted execution environments. arXiv preprint arXiv:1907.13245 (2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833675"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254111"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582023"},{"key":"e_1_3_2_1_39_1","volume-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)","author":"Narayanan Vikram","year":"2019","unstructured":"Vikram Narayanan, Abhiram Balasubramanian, Charlie Jacobsen, Sarah Spall, Scott Bauer, Michael Quigley, Aftab Hussain, Abdullah Younis, Junjie Shen, Moinak Bhattacharyya, et al. 2019. {LXDs}: Towards isolation of kernel subsystems. In 2019 USENIX Annual Technical Conference (USENIX ATC 19). 269--284."},{"key":"e_1_3_2_1_40_1","unstructured":"Nginx. 2023. Nginx. https:\/\/www.nginx.com\/."},{"key":"e_1_3_2_1_41_1","unstructured":"University of Cambridge. 2023. Early performance results from the prototype Morello microarchitecture. https:\/\/www.cl.cam.ac.uk\/techreports\/UCAM-CL-TR-986.pdf."},{"key":"e_1_3_2_1_42_1","volume-title":"USENIX Annual Technical Conference. 241--254","author":"Park Soyeon","year":"2019","unstructured":"Soyeon Park, Sangho Lee, Wen Xu, Hyungon Moon, and Taesoo Kim. 2019. libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK).. In USENIX Annual Technical Conference. 241--254."},{"key":"e_1_3_2_1_43_1","first-page":"997","article-title":"Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM","volume":"2014","author":"Ren Ling","year":"2014","unstructured":"Ling Ren, Christopher W Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. 2014. Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM. IACR Cryptol. ePrint Arch. 2014 (2014), 997.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 1677--1694","author":"Schrammel David","year":"2020","unstructured":"David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, and Daniel Gruss. 2020. Donky: Domain keys-efficient in-process isolation for risc-v and x86. In Proceedings of the 29th USENIX Conference on Security Symposium. 1677--1694."},{"key":"e_1_3_2_1_45_1","volume-title":"19th USENIX Security Symposium (USENIX Security 10)","author":"Sehr David","year":"2010","unstructured":"David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. 2010. Adapting Software Fault Isolation to Contemporary {CPU} Architectures. In 19th USENIX Security Symposium (USENIX Security 10)."},{"key":"e_1_3_2_1_46_1","unstructured":"Siguza. 2023. Apple Silicon APRR. https:\/\/blog.siguza.net\/APRR\/."},{"key":"e_1_3_2_1_47_1","volume-title":"FlexSC: Flexible System Call Scheduling with Exception-Less System Calls. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)","author":"Soares Livio","year":"2010","unstructured":"Livio Soares and Michael Stumm. 2010. FlexSC: Flexible System Call Scheduling with Exception-Less System Calls. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177872"},{"key":"e_1_3_2_1_49_1","volume-title":"\u03bcTiles: Efficient Intra-Process Privilege Enforcement of Memory Regions. arXiv preprint arXiv:2004.04846","author":"Tarkhani Zahra","year":"2020","unstructured":"Zahra Tarkhani and Anil Madhavapeddy. 2020. \u03bcTiles: Efficient Intra-Process Privilege Enforcement of Memory Regions. arXiv preprint arXiv:2004.04846 (2020)."},{"key":"e_1_3_2_1_50_1","volume-title":"TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption. arXiv preprint arXiv:2407.10740","author":"Unterguggenberger Martin","year":"2024","unstructured":"Martin Unterguggenberger, Lukas Lamster, David Schrammel, Martin Schwarzl, and Stefan Mangard. 2024. TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption. arXiv preprint arXiv:2407.10740 (2024)."},{"key":"e_1_3_2_1_51_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Vahldiek-Oberwagner Anjo","year":"2019","unstructured":"Anjo Vahldiek-Oberwagner, Eslam Elnikety, Nuno O Duarte, Michael Sammler, Peter Druschel, and Deepak Garg. 2019. ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK). In 28th USENIX Security Symposium (USENIX Security 19). 1221--1238."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Nikos Vasilakis Ben Karel Nick Roessler Nathan Dautenhahn Andr\u00e9 DeHon and Jonathan M Smith. 2018. BreakApp: Automated Flexible Application Compartmentalization.. In NDSS.","DOI":"10.14722\/ndss.2018.23131"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665741"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519560"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00087"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2019.2914037"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665740"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3489517.3530549"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623206"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3607199.3607212"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378492"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Zachary Yedidia. 2024. Lightweight Fault Isolation: Practical Efficient and Secure Software Sandboxing. (2024).","DOI":"10.1145\/3620665.3640408"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575735"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046713"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEED51797.2021.00014"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519573"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660344"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690376"},{"key":"e_1_3_2_1_72_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zimmermann Markus","year":"2019","unstructured":"Markus Zimmermann, Cristian-Alexandru Staicu, Cam Tenny, and Michael Pradel. 2019. Small world with high risks: A study of security threats in the npm ecosystem. In 28th USENIX Security Symposium (USENIX Security 19). 995--1010."},{"key":"e_1_3_2_1_73_1","unstructured":"Marc Zyngier. 2016. Enforce Break-Before-Make on Stage-2 page tables. https:\/\/patchwork.kernel.org\/project\/linux-arm-kernel\/patch\/1461856591-5751-1-git-send-email-marc.zyngier@arm.com\/."}],"event":{"name":"Middleware '24: 25th International Middleware Conference","sponsor":["IFIP","Usenix"],"location":"Hong Kong Hong Kong","acronym":"Middleware '24"},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700786","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3700786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":73,"alternative-id":["10.1145\/3652892.3700786","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3700786","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}