{"id":"https://openalex.org/W4286542393","doi":"https://doi.org/10.1109/tdsc.2022.3192524","title":"Harnessing the x86 Intermediate Rings for Intra-Process Isolation","display_name":"Harnessing the x86 Intermediate Rings for Intra-Process Isolation","publication_year":2022,"publication_date":"2022-07-21","ids":{"openalex":"https://openalex.org/W4286542393","doi":"https://doi.org/10.1109/tdsc.2022.3192524"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2022.3192524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3192524","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101660662","display_name":"Hojoon Lee","orcid":"https://orcid.org/0000-0001-5344-6266"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hojoon Lee","raw_affiliation_strings":["Department of Computer Science Engineering, Sungkyunkwan University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0001-5344-6266","affiliations":[{"raw_affiliation_string":"Department of Computer Science Engineering, Sungkyunkwan University, Seoul, South Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030038027","display_name":"Chihyun Song","orcid":"https://orcid.org/0000-0002-0414-9262"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Chihyun Song","raw_affiliation_strings":["Graduate School of Information Security, KAIST, Daejeon, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, KAIST, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046066368","display_name":"Brent Byunghoon Kang","orcid":"https://orcid.org/0000-0001-8984-1006"},"institutions":[{"id":"https://openalex.org/I157485424","display_name":"Korea Advanced Institute of Science and Technology","ror":"https://ror.org/05apxxy63","country_code":"KR","type":"education","lineage":["https://openalex.org/I157485424"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Brent Byunghoon Kang","raw_affiliation_strings":["Graduate School of Information Security, KAIST, Daejeon, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Graduate School of Information Security, KAIST, Daejeon, South Korea","institution_ids":["https://openalex.org/I157485424"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101660662"],"corresponding_institution_ids":["https://openalex.org/I848706"],"apc_list":null,"apc_paid":null,"fwci":0.5549,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.71871864,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"20","issue":"4","first_page":"3251","last_page":"3268"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7265167236328125},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.5470061302185059},{"id":"https://openalex.org/keywords/vendor","display_name":"Vendor","score":0.4871037006378174},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3249747157096863}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7265167236328125},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.5470061302185059},{"id":"https://openalex.org/C2777338717","wikidata":"https://www.wikidata.org/wiki/Q1762621","display_name":"Vendor","level":2,"score":0.4871037006378174},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3249747157096863},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2022.3192524","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2022.3192524","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.550000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1972484642","https://openalex.org/W2009248821","https://openalex.org/W2021806553","https://openalex.org/W2061643296","https://openalex.org/W2062340141","https://openalex.org/W2070168906","https://openalex.org/W2079029390","https://openalex.org/W2090590366","https://openalex.org/W2105112969","https://openalex.org/W2112736324","https://openalex.org/W2128159601","https://openalex.org/W2168601499","https://openalex.org/W2176235539","https://openalex.org/W2511669759","https://openalex.org/W2534917055","https://openalex.org/W2597705742","https://openalex.org/W2605597658","https://openalex.org/W2766188225","https://openalex.org/W2908779239","https://openalex.org/W2913025439","https://openalex.org/W2947886797","https://openalex.org/W2963311060","https://openalex.org/W3015513242","https://openalex.org/W3016206947","https://openalex.org/W3156527753","https://openalex.org/W4240658150","https://openalex.org/W4244510028","https://openalex.org/W4244704438","https://openalex.org/W4248670172","https://openalex.org/W4255163382","https://openalex.org/W4288057748","https://openalex.org/W6600103111","https://openalex.org/W6600256889","https://openalex.org/W6602324607","https://openalex.org/W6607473425","https://openalex.org/W6628425136","https://openalex.org/W6628993848","https://openalex.org/W6633875382","https://openalex.org/W6638627507","https://openalex.org/W6678483193","https://openalex.org/W6682091879","https://openalex.org/W6740257447","https://openalex.org/W6753443810","https://openalex.org/W6760312436","https://openalex.org/W6762668627","https://openalex.org/W6766685781"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2004830053","https://openalex.org/W2478661203","https://openalex.org/W3008115697","https://openalex.org/W2145175947","https://openalex.org/W3124949371","https://openalex.org/W2120643196","https://openalex.org/W2374400535","https://openalex.org/W2471694075"],"abstract_inverted_index":{"Modern":[0],"applications":[1],"often":[2,46],"involve":[3,166],"the":[4,10,16,43,55,69,100,106,141,146,167,189,198,201,249],"processing":[5],"of":[6,12,54,115,242],"sensitive":[7,20,70,162],"information.":[8],"However,":[9,42],"lack":[11,49],"privilege":[13,83,103],"separation":[14],"within":[15,117],"user":[17,91,125],"space":[18,120],"leaves":[19,59],"application":[21,71,132,163,191],"secrets":[22,133,168],"such":[23],"as":[24,28,30],"cryptographic":[25],"keys":[26],"just":[27],"unprotected":[29],"a":[31,76,88,113,128,172,195,219,240,245,265],"\u201dhello":[32],"world\u201d":[33],"string.":[34],"Cutting-edge":[35],"hardware-supported":[36],"security":[37],"features":[38,44],"are":[39,45,122,169],"being":[40],"introduced.":[41],"vendor-specific":[47],"or":[48,208],"compatibility":[50],"with":[51,61],"older":[52],"generations":[53],"processors.":[56],"The":[57,109,176],"situation":[58],"developers":[60],"no":[62],"portable":[63,79],"solution":[64],"to":[65,124,151,153,228],"incorporate":[66],"protection":[67],"for":[68,81,131,203],"component.":[72],"We":[73,139,213,238],"propose":[74],"LOTRx86,":[75],"fundamental":[77],"and":[78,134,256,259],"approach":[80,86],"user-space":[82],"separation.":[84],"Our":[85],"creates":[87],"more":[89],"privileged":[90],"execution":[92],"layer":[93],"called":[94],"<italic":[95,184,252],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[96,148,185,253],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">PrivUser</i>":[97],"by":[98,217],"harnessing":[99],"underused":[101],"intermediate":[102],"levels":[104],"on":[105,248,251],"x86":[107],"architecture.":[108],"PrivUser":[110],"memory":[111,177],"space,":[112],"set":[114,241],"pages":[116],"process":[118],"address":[119,211],"that":[121,136,144,165,224,261],"inaccessible":[123],"mode,":[126],"is":[127,183],"safe":[129],"place":[130],"routines":[135,157],"access":[137,178,230],"them.":[138],"implement":[140],"LOTRx86":[142,262],"ABI":[143],"exports":[145],"<monospace":[147],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">privcall</monospace>":[149],"interface":[150],"users":[152],"invoke":[154],"secret":[155,192],"handling":[156],"in":[158,171,180,197,210],"PrivUser.":[159],"This":[160],"way,":[161],"operations":[164],"performed":[170],"strictly":[173],"controlled":[174],"manner.":[175],"control":[179],"our":[181,215,226],"architecture":[182,227],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">privilege-based</i>":[186],",":[187],"accessing":[188],"protected":[190],"only":[193,264],"requires":[194],"change":[196,209],"privilege,":[199],"eliminating":[200],"need":[202],"costly":[204],"remote":[205],"procedure":[206],"calls":[207],"space.":[212],"evaluated":[214],"platform":[216],"developing":[218],"proof-of-concept":[220],"LOTRx86-enabled":[221],"web":[222],"server":[223],"employs":[225],"securely":[229],"its":[231],"private":[232],"key":[233],"during":[234],"an":[235],"SSL":[236],"connection.":[237],"conducted":[239],"experiments,":[243],"including":[244],"performance":[246,267],"measurement":[247],"PoC":[250],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">both</i>":[254],"Intel":[255],"AMD":[257],"PCs,":[258],"confirmed":[260],"incurs":[263],"limited":[266],"overhead.":[268]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
