{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:46Z","timestamp":1772164126660,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T00:00:00Z","timestamp":1749427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202465"],"award-info":[{"award-number":["62202465"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program of Key Laboratory of Network Assessment Technology, the Chinese Academy of Sciences, Program of Beijing Key Laboratory of Network Security and Protection Technology, National Key Research and Development Program of China","award":["2021YFB2910109"],"award-info":[{"award-number":["2021YFB2910109"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,9]]},"DOI":"10.1145\/3726854.3727328","type":"proceedings-article","created":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T09:46:42Z","timestamp":1749030402000},"page":"79-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["UniContainer: Unlocking the Potential of Unikernel for Secure and Efficient Containerization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3635-7785","authenticated-orcid":false,"given":"Zhicong","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8565-1923","authenticated-orcid":false,"given":"Qihang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-8141-8183","authenticated-orcid":false,"given":"Shaowen","family":"Xu","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2547-3667","authenticated-orcid":false,"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9858-3587","authenticated-orcid":false,"given":"Weijuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8376-3235","authenticated-orcid":false,"given":"Xiaoqi","family":"Jia","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China and School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,6,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.]. Application Container Market Size & Share Analysis - Growth Trends & Forecasts (2023 -","year":"2028","unstructured":"[n. d.]. Application Container Market Size & Share Analysis - Growth Trends & Forecasts (2023 - 2028). https:\/\/www.mordorintelligence.com\/industryreports\/application-container-market."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Application Container Market Size Growth Trends Analysis 2024--2028. https:\/\/www.technavio.com\/report\/application-container-market-analysis."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. bitnami\/memcached - Docker Image | Docker Hub. https:\/\/hub.docker.com\/r\/bitnami\/memcached."},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. busybox - Docker Image | Docker Hub. https:\/\/hub.docker.com\/_\/busybox."},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. capabilities(7) - Linux manual page. https:\/\/www.man7.org\/linux\/manpages\/man7\/capabilities.7.html."},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. cgroups(7) - Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man7\/cgroups.7.html."},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. clone(2) - Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man2\/clone.2.html."},{"key":"e_1_3_2_1_8_1","volume-title":"d.]. Cloud Computing Market Share, Size and Industry Growth Analysis 2021 -","year":"2026","unstructured":"[n. d.]. Cloud Computing Market Share, Size and Industry Growth Analysis 2021 - 2026. https:\/\/www.industryarc.com\/Report\/19533\/cloud-computingmarket.html."},{"key":"e_1_3_2_1_9_1","unstructured":"[n.d.]. The Container Security Platform | gVisor. https:\/\/gvisor.dev."},{"key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. Docker Hub. https:\/\/hub.docker.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"[n.d.]. execve(2) - Linux manual page. https:\/\/www.man7.org\/linux\/manpages\/man2\/execve.2.html."},{"key":"e_1_3_2_1_12_1","unstructured":"[n. d.]. FFmpeg. https:\/\/ffmpeg.org\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"[n. d.]. Global Application Container Market (2021 to 2026) - Growth Trends COVID-19 Impact and Forecasts. https:\/\/www.globenewswire.com\/newsrelease\/2021\/02\/18\/2178094\/0\/en\/Global-Application-Container-Market-2021- to-2026-Growth-Trends-COVID-19-Impact-and-Forecasts.html.","DOI":"10.1016\/j.focat.2021.08.004"},{"key":"e_1_3_2_1_14_1","volume-title":"d.]. The global cloud computing market size is expected to grow from USD 445.3 billion in 2021 to USD 947.3 billion by","year":"2026","unstructured":"[n. d.]. The global cloud computing market size is expected to grow from USD 445.3 billion in 2021 to USD 947.3 billion by 2026, at a Compound Annual Growth Rate (CAGR) of 16.3%. https:\/\/www.globenewswire.com\/news-release\/2021\/1 1\/05\/2328288\/0\/en\/The-global-cloud-computing-market-size-is-expected-togrow-from-USD-445--3-billion-in-2021-to-USD-947--3-billion-by-2026-at-a-Compound-Annual-Growth-Rate-CAGR-of-16--3.html."},{"key":"e_1_3_2_1_15_1","unstructured":"[n. d.]. hellyna\/tar - Docker Image | Docker Hub. https:\/\/hub.docker.com\/r\/hellyna\/tar."},{"key":"e_1_3_2_1_16_1","unstructured":"[n. d.]. jitesoft\/sqlite - Docker Image | Docker Hub. https:\/\/hub.docker.com\/r\/jitesoft\/sqlite."},{"key":"e_1_3_2_1_17_1","unstructured":"[n. d.]. leplusorg\/hash - Docker Image | Docker Hub. https:\/\/hub.docker.com\/r\/leplusorg\/hash."},{"key":"e_1_3_2_1_18_1","unstructured":"[n. d.]. namespaces(7) - Linux manual page. https:\/\/man7.org\/linux\/manpages\/man7\/namespaces.7.html."},{"key":"e_1_3_2_1_19_1","unstructured":"[n. d.]. nginx - Docker Image | Docker Hub. https:\/\/hub.docker.com\/_\/nginx."},{"key":"e_1_3_2_1_20_1","unstructured":"[n. d.]. NVD - CVE-2022-0185. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-0185."},{"key":"e_1_3_2_1_21_1","unstructured":"[n. d.]. NVD - CVE-2022-0492. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-0492."},{"key":"e_1_3_2_1_22_1","unstructured":"[n. d.]. NVD - CVE-2022-0847. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-0847."},{"key":"e_1_3_2_1_23_1","unstructured":"[n. d.]. QEMU. https:\/\/www.qemu.org\/."},{"key":"e_1_3_2_1_24_1","unstructured":"[n. d.]. redis - Docker Image | Docker Hub. https:\/\/hub.docker.com\/_\/redis."},{"key":"e_1_3_2_1_25_1","unstructured":"[n. d.]. SECure COMPuting with filters. https:\/\/www.kernel.org\/doc\/Documentation\/prctl\/seccomp_filter.txt."},{"key":"e_1_3_2_1_26_1","unstructured":"[n.d.]. selinux(8) - Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man8\/selinux.8.html."},{"key":"e_1_3_2_1_27_1","unstructured":"[n.d.]. sha1sum(1) - Linux manual page. https:\/\/man7.org\/linux\/man-pages\/man1\/sha1sum.1.html."},{"key":"e_1_3_2_1_28_1","unstructured":"[n. d.]. strace - the linux syscall tracer. https:\/\/github.com\/strace\/strace."},{"key":"e_1_3_2_1_29_1","unstructured":"[n. d.]. unikraft\/dynamic-apps: Pre-built Dynamic Linux ELFs. https:\/\/github.com\/unikraft\/dynamic-apps."},{"key":"e_1_3_2_1_30_1","unstructured":"[n. d.]. unikraft\/run-app-elfloader: Run Unikraft ELF Loader app on Linux executables. https:\/\/github.com\/unikraft\/run-app-elfloader."},{"key":"e_1_3_2_1_31_1","unstructured":"[n. d.]. vulhub\/imagemagick - Docker Image | Docker Hub. https:\/\/hub.docker.com\/r\/vulhub\/imagemagick."},{"key":"e_1_3_2_1_32_1","unstructured":"[n. d.]. vulhub\/openssl - Docker Image | Docker Hub. https:\/\/hub.docker.com\/r\/vulhub\/openssl."},{"key":"e_1_3_2_1_33_1","unstructured":"[n. d.]. Xen Project - Open Source Virtualization. https:\/\/xenproject.org\/."},{"key":"e_1_3_2_1_34_1","volume-title":"Firecracker: Lightweight Virtualization for Serverless Applications. In Symposium on Networked Systems Design and Implementation. https:\/\/api.semanticscholar.org\/CorpusID:266037377","author":"Agache Alexandru","year":"2020","unstructured":"Alexandru Agache, Marc Brooker, Alexandra Iordache, Anthony Liguori, Rolf Neugebauer, Phil Piwonka, and Diana-Maria Popa. 2020. Firecracker: Lightweight Virtualization for Serverless Applications. In Symposium on Networked Systems Design and Implementation. https:\/\/api.semanticscholar.org\/CorpusID:266037377"},{"key":"e_1_3_2_1_35_1","volume-title":"2015 IEEE Symposium on Security and Privacy","author":"Apecechea Gorka Irazoqui","year":"2015","unstructured":"Gorka Irazoqui Apecechea, Thomas Eisenbarth, and Berk Sunar. 2015. S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES. 2015 IEEE Symposium on Security and Privacy (2015), 591--604. https:\/\/api.semanticscholar.org\/CorpusID:7499994"},{"key":"e_1_3_2_1_36_1","volume-title":"Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In Network and Distributed System Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:3058975","author":"Backes Michael","year":"2013","unstructured":"Michael Backes, Goran Doychev, and Boris K\u00f6pf. 2013. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In Network and Distributed System Security Symposium. https:\/\/api.semanticscholar.org\/CorpusID:3058975"},{"key":"e_1_3_2_1_37_1","volume-title":"Electromagnetic Analysis: Concrete Results. In Workshop on Cryptographic Hardware and Embedded Systems. https:\/\/api.semanticscholar.org\/CorpusID:17453088","author":"Gandolfi Karine","year":"2001","unstructured":"Karine Gandolfi, Christophe Mourtel, and Francis Olivier. 2001. Electromagnetic Analysis: Concrete Results. In Workshop on Cryptographic Hardware and Embedded Systems. https:\/\/api.semanticscholar.org\/CorpusID:17453088"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.49"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354227"},{"key":"e_1_3_2_1_40_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Ghavamnia Seyedhamed","year":"2020","unstructured":"Seyedhamed Ghavamnia, Tapti Palit, Azzedine Benameur, and Michalis Polychronakis. 2020. Confine: Automated system call policy generation for container attack surface reduction. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 443--458."},{"key":"e_1_3_2_1_41_1","unstructured":"iximiuz kcq. [n. d.]. slimtoolkit\/slim: Slim(toolkit)). https:\/\/github.com\/slimtoolkit\/slim."},{"key":"e_1_3_2_1_42_1","volume-title":"OSv - Optimizing the Operating System for Virtual Machines. In USENIX Annual Technical Conference. https:\/\/api.semanticscholar. org\/CorpusID:16993971","author":"Kivity Avi","year":"2014","unstructured":"Avi Kivity, Dor Laor, Glauber Costa, Pekka Enberg, Nadav Har'El, Don Marti, and Vlad Zolotarov. 2014. OSv - Optimizing the Operating System for Virtual Machines. In USENIX Annual Technical Conference. https:\/\/api.semanticscholar. org\/CorpusID:16993971"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456248"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66504-3_12"},{"key":"e_1_3_2_1_45_1","volume-title":"Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","author":"Lefeuvre Hugo","year":"2021","unstructured":"Hugo Lefeuvre, Vlad-Andrei Badoiu, Alexander Jung, Stefan Teodorescu, Sebastian Rauch, Felipe Huici, Costin Raiciu, and Pierre Olivier. 2021. FlexOS: towards flexible OS isolation. Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (2021). https:\/\/api.semanticscholar.org\/CorpusID:245123994"},{"key":"e_1_3_2_1_46_1","volume-title":"Loupe: Driving the Development of OS Compatibility Layers. ArXiv abs\/2309.15996","author":"Lefeuvre Hugo","year":"2023","unstructured":"Hugo Lefeuvre, Gaulthier Gain, Vlad-Andrei Badoiu, Daniel Dinca, Vlad-Radu Schiller, Costin Raiciu, Felipe Huici, and Pierre Olivier. 2023. Loupe: Driving the Development of OS Compatibility Layers. ArXiv abs\/2309.15996 (2023). https:\/\/api.semanticscholar.org\/CorpusID:263135468"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274720"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.43"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00169"},{"key":"e_1_3_2_1_50_1","volume-title":"International Symposium on Recent Advances in Intrusion Detection. https:\/\/api.semanticscholar.org\/CorpusID:202754788","author":"Luo Wu","year":"2019","unstructured":"Wu Luo, Qingni Shen, Yutang Xia, and Zhonghai Wu. 2019. Container-IMA: A privacy-preserving Integrity Measurement Architecture for Containers. In International Symposium on Recent Advances in Intrusion Detection. https:\/\/api.semanticscholar.org\/CorpusID:202754788"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451167"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132763"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346869"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3302424.3303946"},{"key":"e_1_3_2_1_55_1","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Nam Jaehyun","year":"2020","unstructured":"Jaehyun Nam, Seungsoo Lee, Hyunmin Seo, Phil Porras, Vinod Yegneswaran, and Seungwon Shin. 2020. {BASTION}: A security enforcement network stack for container networks. In 2020 USENIX Annual Technical Conference (USENIX ATC 20). 81--95."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313808.3313817"},{"key":"e_1_3_2_1_57_1","volume-title":"NEM: A NEW In-VM Monitoring with High Efficiency and Strong Isolation. In International Conference on Smart Computing and Communication. https:\/\/api.semanticscholar.org\/CorpusID:41950758","author":"Qin Jingjie","year":"2017","unstructured":"Jingjie Qin, Bin Shi, and Bo Li. 2017. NEM: A NEW In-VM Monitoring with High Efficiency and Strong Isolation. In International Conference on Smart Computing and Communication. https:\/\/api.semanticscholar.org\/CorpusID:41950758"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106271"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the Eighteenth European Conference on Computer Systems","author":"Raza Ali","year":"2022","unstructured":"Ali Raza, Thomas Unger, Matthew Boyd, Eric B Munson, Parul Sohal, Ulrich Drepper, Richard Jones, Daniel Bristot De Oliveira, Larry Woodman, Renato Mancuso, Jonathan Appavoo, and Orran Krieger. 2022. Unikernel Linux (UKL). Proceedings of the Eighteenth European Conference on Computer Systems (2022). https:\/\/api.semanticscholar.org\/CorpusID:258508652"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446731"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304016"},{"key":"e_1_3_2_1_63_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Sun Yuqiong","year":"2018","unstructured":"Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, and Trent Jaeger. 2018. Security namespace: making linux security frameworks available to containers. In 27th USENIX Security Symposium (USENIX Security 18). 1423--1439."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381052.3381326"},{"key":"e_1_3_2_1_65_1","volume-title":"2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE)","author":"Xia Chun","year":"2023","unstructured":"Chun Xia, Matteo Paltenghi, Jia Le Tian, Michael Pradel, and Lingming Zhang. 2023. Fuzz4ALL: Universal Fuzzing with Large Language Models. 2024 IEEE\/ACM 46th International Conference on Software Engineering (ICSE) (2023), 1547--1559. https:\/\/api.semanticscholar.org\/CorpusID:260735598"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484744"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3582016.3582042"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3639032","article-title":"Machine Learning Systems are Bloated and Vulnerable","volume":"8","author":"Zhang Huaifeng","year":"2022","unstructured":"Huaifeng Zhang, Mohannad J. Alhanahnah, Fahmi Abdulqadir Ahmed, Dyako Fatih, Philipp Leitner, and Ahmed Ali-Eldin. 2022. Machine Learning Systems are Bloated and Vulnerable. Proceedings of the ACM on Measurement and Analysis of Computing Systems 8 (2022), 1 -- 30. https:\/\/api.semanticscholar.org\/CorpusID:258558127","journal-title":"Proceedings of the ACM on Measurement and Analysis of Computing Systems"},{"key":"e_1_3_2_1_69_1","volume-title":"SummSlim: A Universal and Automated Approach for Debloating Container Images. 2024 IEEE 30th International Conference on Parallel and Distributed Systems (ICPADS)","author":"Zhang Zhicong","year":"2024","unstructured":"Zhicong Zhang, Heqing Huang, Shaowen Xu, Qihang Zhou, Tianshu Zhang, Xiaoqi Jia, and Weijuan Zhang. 2024. SummSlim: A Universal and Automated Approach for Debloating Container Images. 2024 IEEE 30th International Conference on Parallel and Distributed Systems (ICPADS) (2024), 132--141. https:\/\/api.semanticscholar.org\/CorpusID:274372644"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.102924"}],"event":{"name":"SIGMETRICS '25: ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","location":"Stony Brook NY USA","acronym":"SIGMETRICS '25","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726854.3727328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3726854.3727328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T22:23:41Z","timestamp":1752704621000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3726854.3727328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,9]]},"references-count":70,"alternative-id":["10.1145\/3726854.3727328","10.1145\/3726854"],"URL":"https:\/\/doi.org\/10.1145\/3726854.3727328","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3744970.3727328","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2025,6,9]]},"assertion":[{"value":"2025-06-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}