{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:46:53Z","timestamp":1768549613129,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T00:00:00Z","timestamp":1730678400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3694715.3695950","type":"proceedings-article","created":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T19:28:18Z","timestamp":1731698898000},"page":"249-264","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Fast, Flexible, and Practical Kernel Extensions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7496-9639","authenticated-orcid":false,"given":"Kumar Kartikeya","family":"Dwivedi","sequence":"first","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5599-8636","authenticated-orcid":false,"given":"Rishabh","family":"Iyer","sequence":"additional","affiliation":[{"name":"UC Berkeley, Berkeley, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9534-8565","authenticated-orcid":false,"given":"Sanidhya","family":"Kashyap","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,11,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Jemalloc Arena Extent Hooks. https:\/\/jemalloc.net\/jemalloc.3.html#arena.i.extent_hooks."},{"key":"e_1_3_2_1_2_1","unstructured":"bpf(2) --- Linux Manual Page. https:\/\/man7.org\/linux\/man-pages\/man2\/bpf.2.html."},{"key":"e_1_3_2_1_3_1","unstructured":"CGroup v2. https:\/\/docs.kernel.org\/admin-guide\/cgroup-v2.html."},{"key":"e_1_3_2_1_4_1","unstructured":"The Dafny Programming and Verification Language. https:\/\/dafny.org\/dafny\/."},{"key":"e_1_3_2_1_5_1","unstructured":"Making eBPF work on Windows. hhttps:\/\/cloudblogs.microsoft.com\/opensource\/2021\/05\/10\/making-ebpf-work-on-windows\/."},{"key":"e_1_3_2_1_6_1","unstructured":"eBPF Instruction Manual. https:\/\/docs.kernel.org\/bpf\/standardization\/instruction-set.html#basic-instruction-encoding."},{"key":"e_1_3_2_1_7_1","unstructured":"eBPF Instruction Set Specification v1.0. https:\/\/docs.kernel.org\/bpf\/standardization\/instruction-set.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Jemalloc. https:\/\/jemalloc.net."},{"key":"e_1_3_2_1_9_1","unstructured":"KeyDB. https:\/\/docs.keydb.dev\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Linux Virtual Memory Map for x86_64. https:\/\/www.kernel.org\/doc\/Documentation\/x86\/x86_64\/mm.txt."},{"key":"e_1_3_2_1_11_1","unstructured":"Metering in WASM. https:\/\/ewasm.readthedocs.io\/en\/mkdocs\/metering\/."},{"key":"e_1_3_2_1_12_1","unstructured":"Linux Observability. https:\/\/www.oreilly.com\/library\/view\/linux-observability-with\/9781492050193\/ch04.html."},{"key":"e_1_3_2_1_13_1","unstructured":"Benchmarking Methodology for Networking Interconnect Devices. https:\/\/www.ietf.org\/rfc\/rfc2544.txt."},{"key":"e_1_3_2_1_14_1","unstructured":"The Rust Programming Language. https:\/\/www.rust-lang.org\/."},{"key":"e_1_3_2_1_15_1","unstructured":"seL4. https:\/\/en.wikipedia.org\/wiki\/L4_microkernel_family#High_assurance:_seL4."},{"key":"e_1_3_2_1_16_1","unstructured":"Softlockup detector and hardlockup detector. https:\/\/docs.kernel.org\/admin-guide\/lockup-watchdogs.html."},{"key":"e_1_3_2_1_17_1","unstructured":"The State of eBPF 2024. https:\/\/www.linuxfoundation.org\/hubfs\/eBPF\/The_State_of_eBPF.pdf."},{"key":"e_1_3_2_1_18_1","volume-title":"Mach: A New Kernel Foundation For UNIX Development","author":"Accetta M.","year":"1986","unstructured":"M. Accetta, R. Baron, W. Bolosky, D. Golub, R. Rashid, A. Tevanian, and M. Young. Mach: A New Kernel Foundation For UNIX Development. 1986."},{"key":"e_1_3_2_1_19_1","volume-title":"A proposal for shared memory in BPF programs","author":"Alden D.","year":"2024","unstructured":"D. Alden. A proposal for shared memory in BPF programs, 2024. https:\/\/lwn.net\/Articles\/961941."},{"key":"e_1_3_2_1_20_1","volume-title":"Cleaning up after BPF exceptions","author":"Alden D.","year":"2024","unstructured":"D. Alden. Cleaning up after BPF exceptions, 2024. https:\/\/lwn.net\/Articles\/969185\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3015146"},{"key":"e_1_3_2_1_22_1","volume-title":"IX: A Protected Dataplane Operating System for High Throughput and Low Latency. In 11th USENIX Symposium on Operating Systems Design and Implementation","author":"Belay A.","year":"2014","unstructured":"A. Belay, G. Prekas, A. Klimovic, S. Grossman, C. Kozyrakis, and E. Bugnion. IX: A Protected Dataplane Operating System for High Throughput and Low Latency. In 11th USENIX Symposium on Operating Systems Design and Implementation, 2014."},{"key":"e_1_3_2_1_23_1","volume-title":"Safety and Performance in the SPIN Operating System. In Proceedings of the Fifteenth ACM Symposium on Operating System Principles","author":"Bershad B. N.","year":"1995","unstructured":"B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, and S. J. Eggers. Extensibility, Safety and Performance in the SPIN Operating System. In Proceedings of the Fifteenth ACM Symposium on Operating System Principles, 1995."},{"key":"e_1_3_2_1_24_1","volume-title":"ACM SIGCOMM Conference","author":"Cai Q.","year":"2022","unstructured":"Q. Cai, M. Vuppalapati, J. Hwang, C. Kozyrakis, and R. Agarwal. Towards \u03bcs tail latency and terabit ethernet: disaggregating the host network stack. In ACM SIGCOMM Conference, 2022."},{"key":"e_1_3_2_1_25_1","first-page":"45","volume-title":"Richard. Fast Byte-Granularity Software Fault Isolation. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles","author":"Costa Miguel","year":"2009","unstructured":"Castro, Miguel and Costa, Manuel and Martin, Jean-Philippe and Peinado, Marcus and Akritidis, Periklis and Donnelly, Austin and Barham, Paul and Black, Richard. Fast Byte-Granularity Software Fault Isolation. In Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, pages 45--58, 2009."},{"key":"e_1_3_2_1_26_1","volume-title":"https:\/\/lwn.net\/Articles\/650333\/","author":"Corbet J.","year":"2015","unstructured":"J. Corbet. Restartable Sequences. https:\/\/lwn.net\/Articles\/650333\/, 2015."},{"key":"e_1_3_2_1_27_1","volume-title":"BPF at Facebook (and beyond). https:\/\/lwn.net\/Articles\/801871\/","author":"Corbet J.","year":"2019","unstructured":"J. Corbet. BPF at Facebook (and beyond). https:\/\/lwn.net\/Articles\/801871\/, 2019."},{"key":"e_1_3_2_1_28_1","volume-title":"Concurrency management in BPF","author":"Corbet J.","year":"2019","unstructured":"J. Corbet. Concurrency management in BPF, 2019. https:\/\/lwn.net\/Articles\/779120\/."},{"key":"e_1_3_2_1_29_1","volume-title":"Sleepable BPF programs","author":"Corbet J.","year":"2020","unstructured":"J. Corbet. Sleepable BPF programs, 2020. https:\/\/lwn.net\/Articles\/825415\/."},{"key":"e_1_3_2_1_30_1","unstructured":"J. Corbet. Generic iterators for BPF 2023. https:\/\/lwn.net\/Articles\/926041\/."},{"key":"e_1_3_2_1_31_1","unstructured":"J. Corbet. Red-black trees for BPF programs 2023. https:\/\/lwn.net\/Articles\/924128\/."},{"key":"e_1_3_2_1_32_1","volume-title":"User-space spinlocks with help from rseq(). https:\/\/lwn.net\/Articles\/944895\/","author":"Corbet J.","year":"2023","unstructured":"J. Corbet. User-space spinlocks with help from rseq(). https:\/\/lwn.net\/Articles\/944895\/, 2023."},{"key":"e_1_3_2_1_33_1","volume-title":"Stack unwinding with exceptions in eBPF","author":"Corbet J.","year":"2023","unstructured":"J. Corbet. Stack unwinding with exceptions in eBPF, 2023. https:\/\/lwn.net\/Articles\/938435\/."},{"key":"e_1_3_2_1_34_1","volume-title":"Exceptions in eBPF - Linux Plumbers Conference","author":"Dwivedi K. K.","year":"2023","unstructured":"K. K. Dwivedi. Exceptions in eBPF - Linux Plumbers Conference, 2023. https:\/\/lpc.events\/event\/17\/contributions\/1578\/attachments\/1240\/2521\/Exceptions%20in%20BPF.pdf."},{"key":"e_1_3_2_1_35_1","volume-title":"User-defined objects in eBPF","author":"Dwivedi K. K.","year":"2022","unstructured":"K. K. Dwivedi. User-defined objects in eBPF, 2022. https:\/\/lore.kernel.org\/bpf\/20221118015614.2013203-1-memxor@gmail.com\/."},{"key":"e_1_3_2_1_36_1","volume-title":"Zero overhead PROBE_MEM","author":"Dwivedi K. K.","year":"2024","unstructured":"K. K. Dwivedi. Zero overhead PROBE_MEM, 2024. https:\/\/lore.kernel.org\/bpf\/20240619092216.1780946-1-memxor@gmail.com\/."},{"key":"e_1_3_2_1_37_1","volume-title":"The FUSE BPF Filesystem","author":"Edge J.","year":"2023","unstructured":"J. Edge. The FUSE BPF Filesystem, 2023. https:\/\/lwn.net\/Articles\/937433\/."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/3133775"},{"key":"e_1_3_2_1_39_1","volume-title":"Jr. Exokernel: An Operating System Architecture for Application-Level Resource Management. In Proceedings of the Fifteenth ACM Symposium on Operating System Principles","author":"Engler D. R.","year":"1995","unstructured":"D. R. Engler, M. F. Kaashoek, and J. W. O. Jr. Exokernel: An Operating System Architecture for Application-Level Resource Management. In Proceedings of the Fifteenth ACM Symposium on Operating System Principles, 1995."},{"key":"e_1_3_2_1_40_1","first-page":"75","volume-title":"George C. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th symposium on Operating systems design and implementation","author":"Abadi Ulfar","year":"2006","unstructured":"Erlingsson, Ulfar and Abadi, Mart\u00edn and Vrable, Michael and Budiu, Mihai and Necula, George C. XFI: Software Guards for System Address Spaces. In Proceedings of the 7th symposium on Operating systems design and implementation, pages 75--88, 2006."},{"key":"e_1_3_2_1_41_1","volume-title":"A thorough introduction to eBPF","author":"Fleming M.","year":"2017","unstructured":"M. Fleming. A thorough introduction to eBPF, 2017. https:\/\/lwn.net\/Articles\/740157\/."},{"key":"e_1_3_2_1_42_1","volume-title":"18th USENIX Symposium on Networked Systems Design and Implementation","author":"Ghigoff Y.","year":"2021","unstructured":"Y. Ghigoff, J. Sopena, K. Lazri, A. Blin, and G. Muller. BMC: Accelerating Memcached using Safe In-kernel Caching and Pre-stack Processing. In 18th USENIX Symposium on Networked Systems Design and Implementation, 2021."},{"key":"e_1_3_2_1_43_1","volume-title":"BPF Extensible Scheduler Class","author":"Heo T.","year":"2022","unstructured":"T. Heo. BPF Extensible Scheduler Class, 2022. https:\/\/lore.kernel.org\/bpf\/20221130082313.3241517-1-tj@kernel.org."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281443"},{"key":"e_1_3_2_1_45_1","author":"Hunt G. C.","year":"2007","unstructured":"G. C. Hunt and J. R. Larus. Singularity: Rethinking the Software Stack. ACM SIGOPS Operating Systems Review, 2007.","journal-title":"Singularity: Rethinking the Software Stack. ACM SIGOPS Operating Systems Review"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613136"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593856.3595892"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Johnson E.","year":"2021","unstructured":"E. Johnson, D. Thien, Y. Alhessi, S. Narayan, F. Brown, S. Lerner, T. McMullen, S. Savage, and D. Stefan. SFI safety for native-compiled Wasm. In Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, Feb. 2021."},{"key":"e_1_3_2_1_49_1","volume-title":"Bypassing the Load Balancer Without Regrets. In ACM Symposium on Cloud Computing","author":"Kogias M.","year":"2020","unstructured":"M. Kogias, R. Iyer, and E. Bugnion. Bypassing the Load Balancer Without Regrets. In ACM Symposium on Cloud Computing, 2020."},{"key":"e_1_3_2_1_50_1","volume-title":"Overview of the BPF networking hooks and user experience in Meta - Linux Plumbers Conference","author":"Lau M.","year":"2022","unstructured":"M. Lau. Overview of the BPF networking hooks and user experience in Meta - Linux Plumbers Conference 2022. https:\/\/lpc.events\/event\/16\/contributions\/1363\/."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132786"},{"key":"e_1_3_2_1_52_1","volume-title":"ACM SIGOPS Operating Systems Review","author":"Liedtke J.","year":"1995","unstructured":"J. Liedtke. On micro-kernel construction. ACM SIGOPS Operating Systems Review, 1995."},{"key":"e_1_3_2_1_53_1","volume-title":"Verifiable Binary Sandboxing for a CISC Architecture.","author":"McCamant S.","year":"2005","unstructured":"S. McCamant and G. Morrisett. Efficient, Verifiable Binary Sandboxing for a CISC Architecture. 2005."},{"key":"e_1_3_2_1_54_1","first-page":"209","volume-title":"USENIX Security Symposium","volume":"10","author":"McCamant S.","year":"2006","unstructured":"S. McCamant and G. Morrisett. Evaluating SFI for a CISC Architecture. In USENIX Security Symposium, volume 10, pages 209--224, 2006."},{"key":"e_1_3_2_1_55_1","unstructured":"P. E. McKenney. BPF Memory Model. https:\/\/datatracker.ietf.org\/meeting\/118\/materials\/slides-118-bpf-bpf-memory-model-00."},{"key":"e_1_3_2_1_56_1","volume-title":"Algorithms for Scalable Synchronization on Shared-Memory Multiprocessors. ACM Transactions on Computer Systems (TOCS), 9(1):21--65","author":"Scott JohnMand","year":"1991","unstructured":"Mellor-Crummey, JohnMand Scott, Michael L. Algorithms for Scalable Synchronization on Shared-Memory Multiprocessors. ACM Transactions on Computer Systems (TOCS), 9(1):21--65, 1991."},{"key":"e_1_3_2_1_57_1","volume-title":"High Velocity Kernel File Systems with Bento. In 19th USENIX Conference on File and Storage Technologies","author":"Miller S.","year":"2021","unstructured":"S. Miller, K. Zhang, M. Chen, R. Jennings, A. Chen, D. Zhuo, and T. E. Anderson. High Velocity Kernel File Systems with Bento. In 19th USENIX Conference on File and Storage Technologies, 2021."},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the Ninteenth EuroSys Conference","author":"Miller S.","year":"2024","unstructured":"S. Miller, A. Kumar, T. Vakharia, T. Anderson, A. Chen, and D. Zhuo. Agile Development of Linux Schedulers with Ekiben. In Proceedings of the Ninteenth EuroSys Conference, 2024."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1145\/2254064.2254111","volume-title":"Proceedings of the 33rd ACM SIGPLAN conference on Programming Language Design and Implementation","author":"Morrisett G.","year":"2012","unstructured":"G. Morrisett, G. Tan, J. Tassarotti, J.-B. Tristan, and E. Gan. RockSalt: better, faster, stronger SFI for the x86. In Proceedings of the 33rd ACM SIGPLAN conference on Programming Language Design and Implementation, pages 395--404, 2012."},{"key":"e_1_3_2_1_60_1","volume-title":"The 17th Workshop on Programming Languages and Analysis for Security","author":"Garfinkel Shravan","year":"2022","unstructured":"Narayan, Shravan and Garfinkel, Tal. Segue & ColorGuard: Optimizing SFI Performance and Scalability on Modern x86. In The 17th Workshop on Programming Languages and Analysis for Security, 2022."},{"key":"e_1_3_2_1_61_1","volume-title":"Safe kernel extensions without run-time checking. SIGOPS Operating Systems Review, 30(SI):229--243","author":"Necula G. C.","year":"1996","unstructured":"G. C. Necula and P. Lee. Safe kernel extensions without run-time checking. SIGOPS Operating Systems Review, 30(SI):229--243, 1996."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132748"},{"key":"e_1_3_2_1_63_1","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation","author":"Peter S.","year":"2014","unstructured":"S. Peter, J. Li, I. Zhang, D. R. K. Ports, D. Woos, A. Krishnamurthy, T. E. Anderson, and T. Roscoe. Arrakis: The Operating System is the Control Plane. In 11th USENIX Symposium on Operating Systems Design and Implementation, 2014."},{"key":"e_1_3_2_1_64_1","volume-title":"XXH3 Hash - LS-F\/MM\/BPF","author":"Protopopov A.","year":"2023","unstructured":"A. Protopopov. BPF static keys, wildcard map, XXH3 Hash - LS-F\/MM\/BPF, 2023. http:\/\/vger.kernel.org\/bpfconf2023_material\/anton-protopopov-lsf-mm-bpf-2023.pdf."},{"key":"e_1_3_2_1_65_1","unstructured":"B. Rhoden. eBPF Shenanigans with Flux - Linux Plumbers Conference 2023. https:\/\/lpc.events\/event\/17\/contributions\/1601\/."},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation","author":"Seltzer M. I.","year":"1996","unstructured":"M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with Disaster: Surviving Misbehaved Kernel Extensions. In Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation, 1996."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593856.3595888"},{"key":"e_1_3_2_1_68_1","volume-title":"https:\/\/lwn.net\/Articles\/820560\/","author":"Starovoitov A.","year":"2020","unstructured":"A. Starovoitov. Introduce CAP_BPF. https:\/\/lwn.net\/Articles\/820560\/, 2020."},{"key":"e_1_3_2_1_69_1","unstructured":"A. Stern. Linux Kernel Memory Model. https:\/\/github.com\/torvalds\/linux\/blob\/master\/tools\/memory-model\/Documentation\/explanation.txt."},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Sutherland M.","year":"2023","unstructured":"M. Sutherland, B. Falsafi, and A. Daglis. Cooperative Concurrency Control for Write-Intensive Key-Value Workloads. In Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023."},{"key":"e_1_3_2_1_71_1","volume-title":"Recovering device drivers. ACM Transactions on Computer Systems (TOCS), 24(4):333--360","author":"Annamalai Michael","year":"2006","unstructured":"Swift, Michael M and Annamalai, Muthukaruppan and Bershad, Brian N and Levy, Henry M. Recovering device drivers. ACM Transactions on Computer Systems (TOCS), 24(4):333--360, 2006."},{"issue":"3","key":"e_1_3_2_1_72_1","first-page":"19","volume":"1","author":"Tan","year":"2017","unstructured":"Tan, Gang. Principles and Implementation Techniques of Software-Based Fault Isolation. 1(3):19--20, 2017.","journal-title":"Gang. Principles and Implementation Techniques of Software-Based Fault Isolation."},{"key":"e_1_3_2_1_73_1","unstructured":"H. Tao. Ternary Search Tree Proposal - BPF 2022. https:\/\/lore.kernel.org\/bpf\/20220331122822.14283-1-houtao1@huawei.com\/."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_75_1","volume-title":"eBPF's Adoption in Production","year":"2024","unstructured":"Wikipedia. eBPF's Adoption in Production, 2024. https:\/\/en.wikipedia.org\/wiki\/EBPF."},{"key":"e_1_3_2_1_76_1","volume-title":"Supervisor Mode Access Prevention. https:\/\/en.wikipedia.org\/wiki\/Supervisor_Mode_Access_Prevention","year":"2024","unstructured":"Wikipedia. Supervisor Mode Access Prevention. https:\/\/en.wikipedia.org\/wiki\/Supervisor_Mode_Access_Prevention, 2024."},{"key":"e_1_3_2_1_77_1","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation","author":"Yang J.","year":"2020","unstructured":"J. Yang, Y. Yue, and K. V. Rashmi. A large scale analysis of hundreds of in-memory cache clusters at twitter. In 14th USENIX Symposium on Operating Systems Design and Implementation, 2020."},{"key":"e_1_3_2_1_78_1","volume-title":"Proceedings of the 1st Workshop on eBPF and Kernel Extensions, eBPF 2023","author":"Yang R.","year":"2023","unstructured":"R. Yang and M. Kogias. HEELS: A Host-Enabled eBPF-Based Load Balancing Scheme. In Proceedings of the 1st Workshop on eBPF and Kernel Extensions, eBPF 2023, New York, NY, USA, 10 September 2023, 2023."},{"key":"e_1_3_2_1_79_1","volume-title":"Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Yedidia Z.","year":"2024","unstructured":"Z. Yedidia. Lightweight Fault Isolation: Practical, Efficient, and Secure Software Sandboxing. In Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024."},{"key":"e_1_3_2_1_80_1","volume-title":"Untrusted x86 Native Code","author":"Sehr Bennet","year":"2010","unstructured":"Yee, Bennet and Sehr, David and Dardyk, Gregory and Chen, J Bradley and Muth, Robert and Ormandy, Tavis and Okasaka, Shiki and Narula, Neha and Fullagar, Nicholas. Native client: A Sandbox for Portable, Untrusted x86 Native Code, 2010."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359647"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1145\/2038642.2038687","volume-title":"Proceedings of the ninth ACM international conference on Embedded software","author":"Zhao L.","year":"2011","unstructured":"L. Zhao, G. Li, B. De Sutter, and J. Regehr. Armor: Fully verified software fault isolation. In Proceedings of the ninth ACM international conference on Embedded software, pages 289--298, 2011."},{"key":"e_1_3_2_1_83_1","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation","author":"Zhou Y.","year":"2023","unstructured":"Y. Zhou, Z. Wang, S. Dharanipragada, and M. Yu. Electrode: Accelerating Distributed Protocols with eBPF. In 20th USENIX Symposium on Networked Systems Design and Implementation, 2023."},{"key":"e_1_3_2_1_84_1","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation","author":"Zhou Y.","year":"2024","unstructured":"Y. Zhou, X. Xiang, M. Kiley, S. Dharanipragada, and M. Yu. DINT: Fast In-Kernel Distributed Transactions with eBPF. In 21st USENIX Symposium on Networked Systems Design and Implementation, 2024."},{"key":"e_1_3_2_1_85_1","first-page":"45","volume-title":"Eric. SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. In Proceedings of the 7th symposium on Operating systems design and implementation","author":"Condit Feng","year":"2006","unstructured":"Zhou, Feng and Condit, Jeremy and Anderson, Zachary and Bagrak, Ilya and Ennals, Rob and Harren, Matthew and Necula, George and Brewer, Eric. SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques. In Proceedings of the 7th symposium on Operating systems design and implementation, pages 45--60, 2006."}],"event":{"name":"SOSP '24: ACM SIGOPS 30th Symposium on Operating Systems Principles","location":"Austin TX USA","acronym":"SOSP '24","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX"]},"container-title":["Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3694715.3695950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3694715.3695950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:47Z","timestamp":1750291547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3694715.3695950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":85,"alternative-id":["10.1145\/3694715.3695950","10.1145\/3694715"],"URL":"https:\/\/doi.org\/10.1145\/3694715.3695950","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}