{"id":"https://openalex.org/W4288057748","doi":"https://doi.org/10.1109/sp46214.2022.9833650","title":"Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK","display_name":"Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK","publication_year":2022,"publication_date":"2022-05-01","ids":{"openalex":"https://openalex.org/W4288057748","doi":"https://doi.org/10.1109/sp46214.2022.9833650"},"language":"en","primary_location":{"id":"doi:10.1109/sp46214.2022.9833650","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833650","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110818028","display_name":"Xuancheng Jin","orcid":"https://orcid.org/0009-0000-0170-3363"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xuancheng Jin","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054110574","display_name":"Xuangan Xiao","orcid":"https://orcid.org/0000-0002-4534-8364"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuangan Xiao","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077076536","display_name":"Songlin Jia","orcid":"https://orcid.org/0009-0008-2526-0438"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songlin Jia","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073847459","display_name":"Wang Gao","orcid":"https://orcid.org/0000-0001-9671-489X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wang Gao","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438478","display_name":"Hang Zhang","orcid":"https://orcid.org/0000-0003-2514-0811"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hang Zhang","raw_affiliation_strings":["UC Riverside"],"affiliations":[{"raw_affiliation_string":"UC Riverside","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016972157","display_name":"Siqi Ma","orcid":"https://orcid.org/0000-0003-3479-5713"},"institutions":[{"id":"https://openalex.org/I165143802","display_name":"University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Siqi Ma","raw_affiliation_strings":["The University of Queensland"],"affiliations":[{"raw_affiliation_string":"The University of Queensland","institution_ids":["https://openalex.org/I165143802"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022038961","display_name":"Zhiyun Qian","orcid":"https://orcid.org/0000-0003-1506-2522"},"institutions":[{"id":"https://openalex.org/I103635307","display_name":"University of California, Riverside","ror":"https://ror.org/03nawhv43","country_code":"US","type":"education","lineage":["https://openalex.org/I103635307"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiyun Qian","raw_affiliation_strings":["UC Riverside"],"affiliations":[{"raw_affiliation_string":"UC Riverside","institution_ids":["https://openalex.org/I103635307"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020082816","display_name":"Juanru Li","orcid":"https://orcid.org/0000-0002-7978-595X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juanru Li","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5110818028"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":1.9931,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.88594446,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"650","last_page":"665"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9857000112533569,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.830391526222229},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.621427595615387},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.5323253870010376},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5301816463470459},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5297383069992065},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5177085399627686},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5116522908210754},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.45865604281425476},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.43850481510162354},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.36829566955566406},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21132639050483704},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.21031564474105835},{"id":"https://openalex.org/keywords/extended-memory","display_name":"Extended memory","score":0.088828444480896},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.08608531951904297}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.830391526222229},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.621427595615387},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.5323253870010376},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5301816463470459},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5297383069992065},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5177085399627686},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5116522908210754},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.45865604281425476},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.43850481510162354},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.36829566955566406},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21132639050483704},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.21031564474105835},{"id":"https://openalex.org/C171675096","wikidata":"https://www.wikidata.org/wiki/Q1143380","display_name":"Extended memory","level":4,"score":0.088828444480896},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.08608531951904297},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sp46214.2022.9833650","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sp46214.2022.9833650","pdf_url":null,"source":{"id":"https://openalex.org/S4363606603","display_name":"2022 IEEE Symposium on Security and Privacy (SP)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Symposium on Security and Privacy (SP)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":47,"referenced_works":["https://openalex.org/W1482769911","https://openalex.org/W1514794536","https://openalex.org/W1553586369","https://openalex.org/W1816718056","https://openalex.org/W1823377586","https://openalex.org/W1972484642","https://openalex.org/W1987455670","https://openalex.org/W1995727142","https://openalex.org/W2055084740","https://openalex.org/W2097128585","https://openalex.org/W2112736324","https://openalex.org/W2117798902","https://openalex.org/W2129278597","https://openalex.org/W2133592286","https://openalex.org/W2175377689","https://openalex.org/W2502542698","https://openalex.org/W2511669759","https://openalex.org/W2597705742","https://openalex.org/W2605597658","https://openalex.org/W2742138868","https://openalex.org/W2752078705","https://openalex.org/W2753478887","https://openalex.org/W2883613460","https://openalex.org/W2897859437","https://openalex.org/W2908779239","https://openalex.org/W2947243817","https://openalex.org/W2963311060","https://openalex.org/W2965588382","https://openalex.org/W2980011154","https://openalex.org/W2988741178","https://openalex.org/W2991611768","https://openalex.org/W3015513242","https://openalex.org/W3016206947","https://openalex.org/W3113657007","https://openalex.org/W3147482974","https://openalex.org/W3156527753","https://openalex.org/W3169163703","https://openalex.org/W4237773356","https://openalex.org/W6628993848","https://openalex.org/W6630953884","https://openalex.org/W6638487575","https://openalex.org/W6638559843","https://openalex.org/W6742834333","https://openalex.org/W6743382269","https://openalex.org/W6743674419","https://openalex.org/W6753443810","https://openalex.org/W6762668627"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W4308361275","https://openalex.org/W3034338022","https://openalex.org/W2126560026"],"abstract_inverted_index":{"Protecting":[0],"confidential":[1,27,74],"data":[2,28,75],"against":[3,151],"memory":[4,93,103,153,159,171],"disclosure":[5,154],"attacks":[6],"is":[7,20],"crucial":[8],"to":[9,23,33,89,193,215],"many":[10,45],"critical":[11],"applications,":[12],"especially":[13],"those":[14],"involve":[15],"cryptographic":[16,26,73,221],"operations.":[17],"However,":[18],"it":[19,118],"neither":[21],"easy":[22],"identify":[24],"involved":[25],"in":[29,67,107],"a":[30,35,55,82,91,111,129,166],"program":[31],"nor":[32],"implement":[34,80,90],"fine-grained":[36],"and":[37,79,86,99,105,125,182,200,223],"yet":[38],"efficient":[39,146],"protection.":[40],"Existing":[41],"defensive":[42],"techniques":[43],"face":[44],"shortcomings":[46],"such":[47,156,197],"as":[48,157,198],"coarse-grained":[49],"protection":[50,66,71],"or":[51],"exorbitant":[52],"overhead.":[53],"As":[54],"result,":[56],"real":[57],"world":[58],"crypto":[59,124,205],"applications":[60,196],"seldom":[61],"applied":[62],"this":[63],"kind":[64],"of":[65,72,169,218],"practice.To":[68],"make":[69],"the":[70,120,184,231],"practical,":[76],"we":[77],"design":[78],"CRYPTOMPK,":[81,165],"source":[83,108,121],"code":[84,109,122],"analysis":[85],"transformation":[87],"system":[88],"domain-based":[92],"isolation.":[94],"CRYPTOMPK":[95,142,192,210],"first":[96],"automatically":[97],"tracks":[98],"labels":[100],"all":[101],"sensitive":[102],"buffers":[104,172],"operations":[106],"with":[110,128,145,202],"context-sensitive,":[112],"crypto-aware":[113],"information":[114],"flow":[115],"analysis.":[116],"Then":[117],"partitions":[119],"into":[123],"non-crypto":[126],"domains":[127],"context-dependent":[130],"privilege":[131],"switch":[132],"instrumentation.":[133],"By":[134],"further":[135],"utilizing":[136],"Intel":[137],"Memory":[138],"Protection":[139],"Keys":[140],"(MPK),":[141],"generates":[143],"executables":[144],"domain":[147],"switching,":[148],"protecting":[149],"them":[150],"typical":[152],"vulnerabilities":[155],"arbitrary":[158],"read.":[160],"In":[161],"particular,":[162],"by":[163],"using":[164],"large":[167],"number":[168],"intermediate":[170],"that":[173],"have":[174],"been":[175],"previously":[176],"ignored":[177],"before":[178],"are":[179,187],"well":[180],"protected,":[181],"thus":[183],"security":[185],"risks":[186],"reduced":[188],"significantly.":[189],"We":[190],"leveraged":[191],"protect":[194],"prevalent":[195],"Apache":[199],"Nginx":[201],"widely":[203],"used":[204],"libraries":[206],"(e.g.,":[207],"OpenSSL,":[208],"LibSodium).":[209],"only":[211],"needs":[212],"several":[213],"minutes":[214],"analyze":[216],"each":[217],"these":[219],"complex":[220],"programs":[222],"incurs":[224],"at":[225],"most":[226],"9.53%":[227],"performance":[228],"overhead":[229],"for":[230],"protected":[232],"programs.":[233]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
