{"id":"https://openalex.org/W2031965919","doi":"https://doi.org/10.1145/1455526.1455527","title":"Alcatraz","display_name":"Alcatraz","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2031965919","doi":"https://doi.org/10.1145/1455526.1455527","mag":"2031965919"},"language":"en","primary_location":{"id":"doi:10.1145/1455526.1455527","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455526.1455527","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084611756","display_name":"Zhenkai Liang","orcid":"https://orcid.org/0000-0001-7138-5030"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Zhenkai Liang","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101955087","display_name":"Weiqing Sun","orcid":"https://orcid.org/0000-0002-6973-0509"},"institutions":[{"id":"https://openalex.org/I90871651","display_name":"University of Toledo","ror":"https://ror.org/01pbdzh19","country_code":"US","type":"education","lineage":["https://openalex.org/I90871651"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weiqing Sun","raw_affiliation_strings":["University of Toledo"],"affiliations":[{"raw_affiliation_string":"University of Toledo","institution_ids":["https://openalex.org/I90871651"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058117020","display_name":"V. N. Venkatakrishnan","orcid":"https://orcid.org/0000-0002-1690-9185"},"institutions":[{"id":"https://openalex.org/I39422238","display_name":"University of Illinois Chicago","ror":"https://ror.org/02mpq6x41","country_code":"US","type":"education","lineage":["https://openalex.org/I39422238"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"V. N. Venkatakrishnan","raw_affiliation_strings":["University of Illinois, Chicago"],"affiliations":[{"raw_affiliation_string":"University of Illinois, Chicago","institution_ids":["https://openalex.org/I39422238"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102886132","display_name":"R. Sekar","orcid":"https://orcid.org/0009-0008-9135-3296"},"institutions":[{"id":"https://openalex.org/I59553526","display_name":"Stony Brook University","ror":"https://ror.org/05qghxh33","country_code":"US","type":"education","lineage":["https://openalex.org/I59553526"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"R. Sekar","raw_affiliation_strings":["Stony Brook University"],"affiliations":[{"raw_affiliation_string":"Stony Brook University","institution_ids":["https://openalex.org/I59553526"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5084611756"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":3.9257,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.93601506,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"12","issue":"3","first_page":"1","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8594326972961426},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.6870895624160767},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.644226610660553},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5868246555328369},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5104717016220093},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.49258953332901},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4711396098136902},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.43005314469337463},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34537172317504883},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3399294912815094},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.19889801740646362}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8594326972961426},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.6870895624160767},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.644226610660553},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5868246555328369},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5104717016220093},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.49258953332901},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4711396098136902},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.43005314469337463},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34537172317504883},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3399294912815094},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.19889801740646362},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/1455526.1455527","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455526.1455527","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:scholarbank.nus.edu.sg:10635/38984","is_oa":false,"landing_page_url":"http://scholarbank.nus.edu.sg/handle/10635/38984","pdf_url":null,"source":{"id":"https://openalex.org/S7407052290","display_name":"National University of Singapore","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus","raw_type":"Article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7642798657","display_name":null,"funder_award_id":"CCR-0208877CNS-0627687CNS-0551660CNS-0716584","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7741287916","display_name":null,"funder_award_id":"1.40E+20","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G8784186081","display_name":null,"funder_award_id":"CCR-0208877CNS-0627687CNS-0551660CNS-0716584","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W24839522","https://openalex.org/W161866744","https://openalex.org/W176967344","https://openalex.org/W182375779","https://openalex.org/W186343359","https://openalex.org/W1482766136","https://openalex.org/W1485749815","https://openalex.org/W1486097113","https://openalex.org/W1499366546","https://openalex.org/W1516211918","https://openalex.org/W1542723081","https://openalex.org/W1549974913","https://openalex.org/W1571573079","https://openalex.org/W1576397915","https://openalex.org/W1583574052","https://openalex.org/W1612561802","https://openalex.org/W1813040609","https://openalex.org/W1926330396","https://openalex.org/W1979717085","https://openalex.org/W2066137796","https://openalex.org/W2093406244","https://openalex.org/W2098881120","https://openalex.org/W2099137371","https://openalex.org/W2103499520","https://openalex.org/W2108528485","https://openalex.org/W2109037124","https://openalex.org/W2117882778","https://openalex.org/W2121284774","https://openalex.org/W2138804620","https://openalex.org/W2154022444","https://openalex.org/W2157657700","https://openalex.org/W2157801087","https://openalex.org/W2176994592","https://openalex.org/W2911234530","https://openalex.org/W4254234063","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2394779770","https://openalex.org/W2117112636","https://openalex.org/W2001981265","https://openalex.org/W2415102733","https://openalex.org/W4386784740","https://openalex.org/W2056273954","https://openalex.org/W2072346427","https://openalex.org/W2487222174","https://openalex.org/W2418291489","https://openalex.org/W2068583297"],"abstract_inverted_index":{"In":[0],"this":[1],"article,":[2],"we":[3],"present":[4],"an":[5],"approach":[6],"for":[7,154,224],"realizing":[8,225],"a":[9,99,122,151,179,226],"safe":[10],"execution":[11,133],"environment":[12,81],"(SEE)":[13],"that":[14,45,199,233],"enables":[15],"users":[16,155],"to":[17,25,79,156,189],"\u201ctry":[18],"out\u201d":[19],"new":[20],"software":[21,139,144],"(or":[22],"configuration":[23,140],"changes":[24,159,166,183],"existing":[26],"software)":[27],"without":[28],"the":[29,33,49,60,74,80,84,96,105,112,117,162,176,182,193,204,217,220],"fear":[30],"of":[31,41,51,107,114,125,129,134,143,178,203],"damaging":[32],"system":[34,158],"in":[35,214,219],"any":[36],"manner.":[37],"A":[38],"key":[39],"property":[40],"our":[42,247],"SEE":[43,75,101],"is":[44,66],"it":[46],"faithfully":[47],"reproduces":[48],"behavior":[50,106],"applications,":[52,242],"as":[53,188],"if":[54],"they":[55,170],"were":[56],"running":[57,72],"natively":[58],"on":[59,116],"underlying":[61],"(host)":[62],"operating":[63],"system.":[64],"This":[65],"accomplished":[67],"via":[68],"one-way":[69],"isolation:":[70],"processes":[71,102],"within":[73,161,246],"are":[76,91,167],"given":[77],"read-access":[78],"provided":[82],"by":[83],"host":[85,108,118],"OS,":[86],"but":[87],"their":[88],"write":[89],"operations":[90],"prevented":[92],"from":[93],"escaping":[94],"outside":[95,192],"SEE.":[97,163,194],"As":[98],"result,":[100],"cannot":[103],"impact":[104],"OS":[109,221],"processes,":[110],"or":[111],"integrity":[113],"data":[115],"OS.":[119],"SEEs":[120],"support":[121],"wide":[123],"range":[124],"tasks,":[126],"including:":[127],"study":[128],"malicious":[130],"code,":[131],"controlled":[132],"untrusted":[135],"software,":[136,235],"experimentation":[137],"with":[138],"changes,":[141],"testing":[142],"patches,":[145],"and":[146,216,240],"so":[147,187],"on.":[148],"It":[149,249],"provides":[150],"convenient":[152],"way":[153],"inspect":[157],"made":[160],"If":[164],"these":[165],"not":[168],"accepted,":[169],"can":[171,184,243],"be":[172,185],"rolled":[173],"back":[174],"at":[175],"click":[177],"button.":[180],"Otherwise,":[181],"committed":[186,205],"become":[190],"visible":[191],"We":[195,207],"provide":[196],"consistency":[197,202],"criteria":[198],"ensure":[200],"semantic":[201],"results.":[206],"develop":[208],"two":[209],"different":[210],"implementation":[211,230],"approaches,":[212],"one":[213],"user-land":[215],"other":[218],"kernel":[222],",":[223],"safe-execution":[227],"environment.":[228],"Our":[229],"results":[231],"show":[232],"most":[234],"including":[236],"fairly":[237],"complex":[238],"server":[239],"client":[241],"run":[244],"successfully":[245],"SEEs.":[248],"introduces":[250],"low":[251],"performance":[252],"overheads,":[253],"typically":[254],"below":[255],"10":[256],"percent.":[257]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
