{"id":"https://openalex.org/W2150709728","doi":"https://doi.org/10.1145/1346281.1346284","title":"Overshadow","display_name":"Overshadow","publication_year":2008,"publication_date":"2008-03-01","ids":{"openalex":"https://openalex.org/W2150709728","doi":"https://doi.org/10.1145/1346281.1346284","mag":"2150709728"},"language":"en","primary_location":{"id":"doi:10.1145/1346281.1346284","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1346281.1346284","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100674293","display_name":"Xiaoxin Chen","orcid":"https://orcid.org/0009-0009-0984-7500"},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiaoxin Chen","raw_affiliation_strings":["VMware: Inc., Palo Alto, CA"],"affiliations":[{"raw_affiliation_string":"VMware: Inc., Palo Alto, CA","institution_ids":["https://openalex.org/I74786994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064270205","display_name":"Tal Garfinkel","orcid":"https://orcid.org/0000-0003-4213-4755"},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tal Garfinkel","raw_affiliation_strings":["VMware: Inc., Palo Alto, CA"],"affiliations":[{"raw_affiliation_string":"VMware: Inc., Palo Alto, CA","institution_ids":["https://openalex.org/I74786994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070140575","display_name":"E. Christopher Lewis","orcid":null},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"E. Christopher Lewis","raw_affiliation_strings":["VMware: Inc., Palo Alto, CA"],"affiliations":[{"raw_affiliation_string":"VMware: Inc., Palo Alto, CA","institution_ids":["https://openalex.org/I74786994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084052354","display_name":"Pratap Subrahmanyam","orcid":null},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pratap Subrahmanyam","raw_affiliation_strings":["VMware: Inc., Palo Alto, CA"],"affiliations":[{"raw_affiliation_string":"VMware: Inc., Palo Alto, CA","institution_ids":["https://openalex.org/I74786994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015339187","display_name":"Carl A. Waldspurger","orcid":"https://orcid.org/0009-0002-3587-3058"},"institutions":[{"id":"https://openalex.org/I74786994","display_name":"Kitware (United States)","ror":"https://ror.org/02s2acn37","country_code":"US","type":"company","lineage":["https://openalex.org/I74786994"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Carl A. Waldspurger","raw_affiliation_strings":["VMware: Inc., Palo Alto, CA"],"affiliations":[{"raw_affiliation_string":"VMware: Inc., Palo Alto, CA","institution_ids":["https://openalex.org/I74786994"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027798962","display_name":"Dan Boneh","orcid":"https://orcid.org/0000-0003-0820-0421"},"institutions":[{"id":"https://openalex.org/I97018004","display_name":"Stanford University","ror":"https://ror.org/00f54p054","country_code":"US","type":"education","lineage":["https://openalex.org/I97018004"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan Boneh","raw_affiliation_strings":["Stanford University, Stanford, CA"],"affiliations":[{"raw_affiliation_string":"Stanford University, Stanford, CA","institution_ids":["https://openalex.org/I97018004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064549948","display_name":"Jeffrey Dwoskin","orcid":null},"institutions":[{"id":"https://openalex.org/I20089843","display_name":"Princeton University","ror":"https://ror.org/00hx57361","country_code":"US","type":"education","lineage":["https://openalex.org/I20089843"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeffrey Dwoskin","raw_affiliation_strings":["Princeton University, Princeton, NJ"],"affiliations":[{"raw_affiliation_string":"Princeton University, Princeton, NJ","institution_ids":["https://openalex.org/I20089843"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026925980","display_name":"Dan R. K. Ports","orcid":"https://orcid.org/0000-0001-6093-5711"},"institutions":[{"id":"https://openalex.org/I4210110987","display_name":"IIT@MIT","ror":"https://ror.org/01wp8zh54","country_code":"US","type":"facility","lineage":["https://openalex.org/I30771326","https://openalex.org/I4210110987"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dan R.K. Ports","raw_affiliation_strings":["MIT, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"MIT, Cambridge, MA","institution_ids":["https://openalex.org/I4210110987"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100674293"],"corresponding_institution_ids":["https://openalex.org/I74786994"],"apc_list":null,"apc_paid":null,"fwci":56.7825,"has_fulltext":false,"cited_by_count":420,"citation_normalized_percentile":{"value":0.99902398,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8297622203826904},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5772335529327393},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.5471195578575134},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5276519060134888},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.46746376156806946},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.43202853202819824},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.42667779326438904},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.41687965393066406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3751843273639679},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3374990224838257},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.27293673157691956},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.18520203232765198},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.1786748170852661}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8297622203826904},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5772335529327393},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.5471195578575134},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5276519060134888},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.46746376156806946},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.43202853202819824},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.42667779326438904},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.41687965393066406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3751843273639679},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3374990224838257},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.27293673157691956},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.18520203232765198},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.1786748170852661},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1346281.1346284","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1346281.1346284","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 13th international conference on Architectural support for programming languages and operating systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W73598622","https://openalex.org/W100863554","https://openalex.org/W1613874182","https://openalex.org/W1993694077","https://openalex.org/W1997269120","https://openalex.org/W2005725110","https://openalex.org/W2006816934","https://openalex.org/W2027135600","https://openalex.org/W2082222018","https://openalex.org/W2084445812","https://openalex.org/W2092423386","https://openalex.org/W2107890513","https://openalex.org/W2108255910","https://openalex.org/W2114349788","https://openalex.org/W2117648703","https://openalex.org/W2121542813","https://openalex.org/W2122122437","https://openalex.org/W2125895608","https://openalex.org/W2131726714","https://openalex.org/W2135228299","https://openalex.org/W2137902624","https://openalex.org/W2138165844","https://openalex.org/W2147448476","https://openalex.org/W2153553074","https://openalex.org/W2154766204","https://openalex.org/W2157185728","https://openalex.org/W2166004296","https://openalex.org/W2167800525","https://openalex.org/W3044736293","https://openalex.org/W3140837477","https://openalex.org/W4206796831","https://openalex.org/W4230464498","https://openalex.org/W4244704438","https://openalex.org/W4249902158","https://openalex.org/W4300807510","https://openalex.org/W6604066429","https://openalex.org/W6649948755","https://openalex.org/W6671597114","https://openalex.org/W6677228968","https://openalex.org/W6680602711"],"related_works":["https://openalex.org/W2801622120","https://openalex.org/W2164141394","https://openalex.org/W4240977217","https://openalex.org/W3036524962","https://openalex.org/W2508088450","https://openalex.org/W2389434635","https://openalex.org/W4214750239","https://openalex.org/W2279908259","https://openalex.org/W2025641871","https://openalex.org/W4252107351"],"abstract_inverted_index":{"Commodity":[0],"operating":[1,68,136,183],"systems":[2,137],"entrusted":[3],"with":[4,51,61,158],"securing":[5],"sensitive":[6],"data":[7],"are":[8],"remarkably":[9],"large":[10],"and":[11,13,34,138,144,148,167],"complex,":[12],"consequently,":[14],"frequently":[15],"prone":[16],"to":[17,70,84,169],"compromise.":[18],"To":[19],"address":[20],"this":[21,194],"limitation,":[22],"we":[23],"introduce":[24],"a":[25,44,52,92,103,171],"virtual-machine-based":[26],"system":[27,69],"called":[28],"Overshadow":[29,47,90,147],"that":[30,106,193],"protects":[31],"the":[32,41,59,67,73,115,118,129,142,187],"privacy":[33],"integrity":[35],"of":[36,43,55,76,95,110,126,146,174,189],"application":[37,50,98],"data,":[38],"even":[39],"in":[40],"event":[42],"total":[45],"OScompromise.":[46],"presents":[48,107],"an":[49,62,78,123,180],"normal":[53],"view":[54],"its":[56,151],"resources,":[57,80],"but":[58],"OS":[60],"encrypted":[63],"view.":[64],"This":[65,120],"allows":[66],"carry":[71],"out":[72],"complex":[74],"task":[75],"managing":[77],"application's":[79],"without":[81],"allowing":[82],"it":[83],"read":[85],"or":[86],"modify":[87],"them.":[88],"Thus,":[89],"offers":[91,122],"last":[93],"line":[94],"defense":[96],"for":[97],"data.Overshadow":[99],"builds":[100],"on":[101,114,179],"multi-shadowing,":[102],"novel":[104],"mechanism":[105],"different":[108],"views":[109],"physical":[111],"memory,":[112],"depending":[113],"context":[116],"performing":[117],"access.":[119],"primitive":[121],"additional":[124],"dimension":[125],"protection":[127,131,153],"beyond":[128],"hierarchical":[130],"domains":[132],"implemented":[133,166],"by":[134],"traditional":[135],"processor":[139],"architectures.We":[140],"present":[141],"design":[143,162],"implementation":[145],"show":[149],"how":[150],"new":[152],"semantics":[154],"can":[155],"be":[156],"integrated":[157],"existing":[159],"systems.":[160],"Our":[161],"has":[163],"been":[164],"fully":[165],"used":[168],"protect":[170],"wide":[172],"range":[173],"unmodified":[175,181],"legacy":[176],"applications":[177],"running":[178],"Linux":[182],"system.":[184],"We":[185],"evaluate":[186],"performance":[188],"our":[190],"implementation,":[191],"demonstrating":[192],"approach":[195],"is":[196],"practical.":[197]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":21},{"year":2019,"cited_by_count":21},{"year":2018,"cited_by_count":28},{"year":2017,"cited_by_count":35},{"year":2016,"cited_by_count":31},{"year":2015,"cited_by_count":47},{"year":2014,"cited_by_count":39},{"year":2013,"cited_by_count":30},{"year":2012,"cited_by_count":44}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
