{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:31:58Z","timestamp":1765229518946,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1145\/3721462.3770771","type":"proceedings-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T19:56:49Z","timestamp":1765223809000},"page":"195-201","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["svc-hook: hooking system calls on ARM64 by binary rewriting"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-9762-3210","authenticated-orcid":false,"given":"Akira","family":"Moroo","sequence":"first","affiliation":[{"name":"Ricerca Security, Inc., Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6524-2954","authenticated-orcid":false,"given":"Hajime","family":"Tazaki","sequence":"additional","affiliation":[{"name":"IIJ Research Laboratory, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7866-2245","authenticated-orcid":false,"given":"Kenichi","family":"Yasukata","sequence":"additional","affiliation":[{"name":"IIJ Research Laboratory, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2025,12,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Bob Amstadt and Eric Youngdale. 1993. Wine. https:\/\/www.winehq.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Andrea Arcangeli. 2005. seccomp. https:\/\/man7.org\/linux\/man-pages\/man2\/seccomp.2.html."},{"key":"e_1_3_2_1_3_1","volume-title":"SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Arnautov Sergei","year":"2016","unstructured":"Sergei Arnautov, Bohdan Trach, Franz Gregor, Thomas Knauth, Andre Martin, Christian Priebe, Joshua Lind, Divya Muthukumaran, Dan O'Keeffe, Mark L. Stillwell, David Goltzsche, Dave Eyers, R\u00fcdiger Kapitza, Peter Pietzuch, and Christof Fetzer. 2016. SCONE: Secure Linux Containers with Intel SGX. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 689\u2013703. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/arnautov"},{"key":"e_1_3_2_1_4_1","volume-title":"ARMore: Pushing Love Back Into Binaries. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Bartolomeo Luca Di","year":"2023","unstructured":"Luca Di Bartolomeo, Hossein Moghaddas, and Mathias Payer. 2023. ARMore: Pushing Love Back Into Binaries. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 6311\u20136328. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/di-bartolomeo"},{"key":"e_1_3_2_1_5_1","unstructured":"Juan Cespedes. 1997. ltrace. https:\/\/ltrace.org\/."},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"Chamith Buddhika","year":"2017","unstructured":"Buddhika Chamith, Bo Joel Svensson, Luke Dalessandro, and Ryan R. Newton. 2017. Instruction Punning: Lightweight Instrumentation for X86\u201364. In Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation (Barcelona, Spain) (PLDI 2017). Association for Computing Machinery, New York, NY, USA, 320\u2013332. 10.1145\/3062341.3062344"},{"key":"e_1_3_2_1_7_1","volume-title":"User-mode Linux. In 5th Annual Linux Showcase & Conference (ALS 01)","author":"Dike Jeff","year":"2001","unstructured":"Jeff Dike. 2001. User-mode Linux. In 5th Annual Linux Showcase & Conference (ALS 01)."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"Duck Gregory J.","year":"2020","unstructured":"Gregory J. Duck, Xiang Gao, and Abhik Roychoudhury. 2020. Binary Rewriting without Control Flow Recovery. In Proceedings of the 41st ACM SIGPLAN Conference on Programming Language Design and Implementation (London, UK) (PLDI 2020). Association for Computing Machinery, New York, NY, USA, 151\u2013163. 10.1145\/3385412.3385972"},{"key":"e_1_3_2_1_9_1","volume-title":"Design and Implementation of the lwIP TCP\/IP Stack","author":"Dunkels Adam","year":"2001","unstructured":"Adam Dunkels. 2001. Design and Implementation of the lwIP TCP\/IP Stack. Swedish Institute of Computer Science 2, 77 (2001)."},{"key":"e_1_3_2_1_10_1","volume-title":"Making Kernel Bypass Practical for the Cloud with Junction. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Fried Joshua","year":"2024","unstructured":"Joshua Fried, Gohar Irfan Chaudhry, Enrique Saurez, Esha Choukse, Inigo Goiri, Sameh Elnikety, Rodrigo Fonseca, and Adam Belay. 2024. Making Kernel Bypass Practical for the Cloud with Junction. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24). USENIX Association, Santa Clara, CA, 55\u201373. https:\/\/www.usenix.org\/conference\/nsdi24\/presentation\/fried"},{"key":"e_1_3_2_1_11_1","first-page":"10","volume-title":"Proc. ACM Softw. Eng. 2, ISSTA, Article ISSTA005 (June","author":"Hong Quan","year":"2025","unstructured":"Quan Hong, Jiaqi Li, Wen Zhang, and Lidong Zhai. 2025. DataHook: An Efficient and Lightweight System Call Hooking Technique without Instruction Modification. Proc. ACM Softw. Eng. 2, ISSTA, Article ISSTA005 (June 2025), 21 pages. 10.1145\/3728874"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 3rd Conference on USENIX Windows NT Symposium -","volume":"3","author":"Hunt Galen","year":"1999","unstructured":"Galen Hunt and Doug Brubacher. 1999. Detours: Binary Interception of Win32 Functions. In Proceedings of the 3rd Conference on USENIX Windows NT Symposium - Volume 3 (Seattle, Washington) (WINSYM'99). USENIX Association, USA, 14."},{"key":"e_1_3_2_1_13_1","unstructured":"Intel. 2010. Data Plane Development Kit. https:\/\/www.dpdk.org\/."},{"key":"e_1_3_2_1_14_1","volume-title":"System Call Interposition Without Compromise. In 2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 183\u2013194","author":"Jacobs Adriaan","year":"2024","unstructured":"Adriaan Jacobs, Merve G\u00fclmez, Alicia Andries, Stijn Volckaert, and Alexios Voulimeneas. 2024. System Call Interposition Without Compromise. In 2024 54th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 183\u2013194. 10.1109\/DSN58291.2024.00030"},{"key":"e_1_3_2_1_15_1","volume-title":"Practical and Effective Sandboxing for Non-root Users. In 2013 USENIX Annual Technical Conference (USENIX ATC 13)","author":"Kim Taesoo","year":"2013","unstructured":"Taesoo Kim and Nickolai Zeldovich. 2013. Practical and Effective Sandboxing for Non-root Users. In 2013 USENIX Annual Technical Conference (USENIX ATC 13). USENIX Association, San Jose, CA, 139\u2013144. https:\/\/www.usenix.org\/conference\/atc13\/technical-sessions\/presentation\/kim"},{"key":"e_1_3_2_1_16_1","unstructured":"Paul Kranenburg. 1991. strace. https:\/\/strace.io\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Gabriel Krisman Bertazi. 2021. Syscall User Dispatch. https:\/\/www.kernel.org\/doc\/html\/latest\/admin-guide\/syscall-user-dispatch.html."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Sixteenth European Conference on Computer Systems","author":"Kuenzer Simon","year":"2021","unstructured":"Simon Kuenzer, Vlad-Andrei B\u0103doiu, Hugo Lefeuvre, Sharan Santhanam, Alexander Jung, Gaulthier Gain, Cyril Soldani, Costin Lupu, \u015etefan Teodorescu, Costi R\u0103ducanu, Cristian Banu, Laurent Mathy, R\u0103zvan Deaconescu, Costin Raiciu, and Felipe Huici. 2021. Unikraft: Fast, Specialized Unikernels the Easy Way. In Proceedings of the Sixteenth European Conference on Computer Systems (Online Event, United Kingdom) (EuroSys '21). Association for Computing Machinery, New York, NY, USA, 376\u2013394. 10.1145\/3447786.3456248"},{"key":"e_1_3_2_1_19_1","unstructured":"Google LLC. 2018. gVisor. https:\/\/gvisor.dev\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Madhavapeddy Anil","year":"2013","unstructured":"Anil Madhavapeddy, Richard Mortier, Charalampos Rotsos, David Scott, Balraj Singh, Thomas Gazagnaire, Steven Smith, Steven Hand, and Jon Crowcroft. 2013. Unikernels: Library Operating Systems for the Cloud. In Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems (Houston, Texas, USA) (ASPLOS '13). Association for Computing Machinery, New York, NY, USA, 461\u2013472. 10.1145\/2451116.2451167"},{"key":"e_1_3_2_1_21_1","volume-title":"The BSD Packet Filter: A New Architecture for User-level Packet Capture. In USENIX","author":"McCanne Steven","year":"1993","unstructured":"Steven McCanne and Van Jacobson. 1993. The BSD Packet Filter: A New Architecture for User-level Packet Capture. In USENIX Winter 1993 Conference (USENIX Winter 1993 Conference). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/usenix-winter-1993-conference\/bsd-packet-filter-new-architecture-user-level-packet"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 15th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments","author":"Olivier Pierre","year":"2019","unstructured":"Pierre Olivier, Daniel Chiba, Stefan Lankes, Changwoo Min, and Binoy Ravindran. 2019. A Binary-Compatible Unikernel. In Proceedings of the 15th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (Providence, RI, USA) (VEE 2019). Association for Computing Machinery, New York, NY, USA, 59\u201373. 10.1145\/3313808.3313817"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2021.3122896"},{"key":"e_1_3_2_1_24_1","volume-title":"2024 IEEE 17th International Conference on Cloud Computing (CLOUD). 205\u2013216","author":"Qin Kailun","year":"2024","unstructured":"Kailun Qin and Dawu Gu. 2024. One System Call Hook to Rule All TEE OSes in the Cloud. In 2024 IEEE 17th International Conference on Cloud Computing (CLOUD). 205\u2013216. 10.1109\/CLOUD62652.2024.00032"},{"key":"e_1_3_2_1_25_1","unstructured":"Salvatore Sanfilippo. 2009. Redis - Remote Dictionary Server. https:\/\/redis.io\/."},{"key":"e_1_3_2_1_26_1","volume-title":"EbbRT: A Framework for Building Per-Application Library Operating Systems. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Schatzberg Dan","year":"2016","unstructured":"Dan Schatzberg, James Cadden, Han Dong, Orran Krieger, and Jonathan Appavoo. 2016. EbbRT: A Framework for Building Per-Application Library Operating Systems. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 671\u2013688. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/schatzberg"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 15th Workshop on Cyber Security Experimentation and Test","author":"Schulte Eric","year":"2022","unstructured":"Eric Schulte, Michael D. Brown, and Vlad Folts. 2022. A Broad Comparative Evaluation of x86\u201364 Binary Rewriters. In Proceedings of the 15th Workshop on Cyber Security Experimentation and Test (Virtual, CA, USA) (CSET '22). Association for Computing Machinery, New York, NY, USA, 129\u2013144. 10.1145\/3546096.3546112"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 26th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems","author":"Shen Yang","year":"2025","unstructured":"Yang Shen, Min Xie, Tao Wu, Wenzhe Zhang, Ruibo Wang, and Gen Zhang. 2025. ASC-Hook: Efficient System Call Interception for ARM. In Proceedings of the 26th ACM SIGPLAN\/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (Seoul, Republic of Korea) (LCTES '25). Association for Computing Machinery, New York, NY, USA, 73\u201384. 10.1145\/3735452.3735524"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Shen Zhiming","year":"2019","unstructured":"Zhiming Shen, Zhen Sun, Gur-Eyal Sela, Eugene Bagdasaryan, Christina Delimitrou, Robbert Van Renesse, and Hakim Weatherspoon. 2019. X-Containers: Breaking Down Barriers to Improve Performance and Isolation of Cloud-Native Containers. In Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems (Providence, RI, USA) (ASPLOS '19). Association for Computing Machinery, New York, NY, USA, 121\u2013135. 10.1145\/3297858.3304016"},{"key":"e_1_3_2_1_30_1","volume-title":"2016 IEEE Symposium on Security and Privacy (SP). 138\u2013157","author":"Shoshitaishvili Yan","year":"2016","unstructured":"Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2016. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In 2016 IEEE Symposium on Security and Privacy (SP). 138\u2013157. 10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the Sixteenth European Conference on Computer Systems","author":"Thalheim J\u00f6rg","year":"2021","unstructured":"J\u00f6rg Thalheim, Harshavardhan Unnibhavi, Christian Priebe, Pramod Bhatotia, and Peter Pietzuch. 2021. rkt-io: a direct I\/O stack for shielded execution. In Proceedings of the Sixteenth European Conference on Computer Systems (Online Event, United Kingdom) (EuroSys '21). Association for Computing Machinery, New York, NY, USA, 490\u2013506. 10.1145\/3447786.3456255"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Ninth European Conference on Computer Systems","author":"Tsai Chia-Che","unstructured":"Chia-Che Tsai, Kumar Saurabh Arora, Nehal Bandi, Bhushan Jain, William Jannen, Jitin John, Harry A. Kalodner, Vrushali Kulkarni, Daniela Oliveira, and Donald E. Porter. 2014. Cooperation and security isolation of library OSes for multi-process applications. In Proceedings of the Ninth European Conference on Computer Systems (Amsterdam, The Netherlands) (EuroSys '14). Association for Computing Machinery, New York, NY, USA, Article 9, 14 pages. 10.1145\/2592798.2592812"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3687230.3687233"},{"key":"e_1_3_2_1_34_1","volume-title":"2023 USENIX Annual Technical Conference (USENIX ATC 23)","author":"Yasukata Kenichi","year":"2023","unstructured":"Kenichi Yasukata, Hajime Tazaki, Pierre-Louis Aublin, and Kenta Ishiguro. 2023. zpoline: a system call hook mechanism based on binary rewriting. In 2023 USENIX Annual Technical Conference (USENIX ATC 23). USENIX Association, Boston, MA, 293\u2013300. https:\/\/www.usenix.org\/conference\/atc23\/presentation\/yasukata"}],"event":{"name":"MIDDLEWARE '25: 26th International Middleware Conference","location":"Vanderbilt University Nashville TN USA","acronym":"MIDDLEWARE '25","sponsor":["IFIP","Usenix"]},"container-title":["Proceedings of the 26th International Middleware Conference"],"original-title":[],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T20:01:59Z","timestamp":1765224119000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3721462.3770771"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":34,"alternative-id":["10.1145\/3721462.3770771","10.1145\/3721462"],"URL":"https:\/\/doi.org\/10.1145\/3721462.3770771","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]},"assertion":[{"value":"2025-12-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}