{"id":"https://openalex.org/W2039244047","doi":"https://doi.org/10.1145/2660267.2660326","title":"ShadowCrypt","display_name":"ShadowCrypt","publication_year":2014,"publication_date":"2014-11-03","ids":{"openalex":"https://openalex.org/W2039244047","doi":"https://doi.org/10.1145/2660267.2660326","mag":"2039244047"},"language":"en","primary_location":{"id":"doi:10.1145/2660267.2660326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2660326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113907946","display_name":"Warren He","orcid":null},"institutions":[{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]},{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Warren He","raw_affiliation_strings":["UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064923144","display_name":"Devdatta Akhawe","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]},{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Devdatta Akhawe","raw_affiliation_strings":["UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047845291","display_name":"Sumeet Jain","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]},{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sumeet Jain","raw_affiliation_strings":["UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089202539","display_name":"Elaine Shi","orcid":"https://orcid.org/0000-0002-5605-1048"},"institutions":[{"id":"https://openalex.org/I66946132","display_name":"University of Maryland, College Park","ror":"https://ror.org/047s2c258","country_code":"US","type":"education","lineage":["https://openalex.org/I66946132"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elaine Shi","raw_affiliation_strings":["University of Maryland, College Park, MD, USA"],"affiliations":[{"raw_affiliation_string":"University of Maryland, College Park, MD, USA","institution_ids":["https://openalex.org/I66946132"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102160255","display_name":"Dawn Song","orcid":null},"institutions":[{"id":"https://openalex.org/I134446601","display_name":"Berkeley College","ror":"https://ror.org/02xewxa75","country_code":"US","type":"education","lineage":["https://openalex.org/I134446601"]},{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dawn Song","raw_affiliation_strings":["UC Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"UC Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5113907946"],"corresponding_institution_ids":["https://openalex.org/I134446601","https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":11.0433,"has_fulltext":false,"cited_by_count":80,"citation_normalized_percentile":{"value":0.98408439,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1028","last_page":"1039"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8964526653289795},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8103366494178772},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.6891717910766602},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6836463809013367},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.5540741682052612},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5392917394638062},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.4652557969093323},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.4386492371559143},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.41931676864624023},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.3776567876338959},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3445836305618286},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30171576142311096},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.21252813935279846},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16481268405914307}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8964526653289795},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8103366494178772},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.6891717910766602},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6836463809013367},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.5540741682052612},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5392917394638062},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.4652557969093323},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.4386492371559143},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.41931676864624023},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.3776567876338959},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3445836305618286},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30171576142311096},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.21252813935279846},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16481268405914307},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2660267.2660326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2660267.2660326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6399999856948853}],"awards":[{"id":"https://openalex.org/G2710018188","display_name":null,"funder_award_id":"N000140911081","funder_id":"https://openalex.org/F4320337345","funder_display_name":"Office of Naval Research"},{"id":"https://openalex.org/G4568640989","display_name":null,"funder_award_id":"CNS-1314857","funder_id":"https://openalex.org/F4320337388","funder_display_name":"Division of Computer and Network Systems"},{"id":"https://openalex.org/G505378490","display_name":null,"funder_award_id":"FA9550-09-1-0539","funder_id":"https://openalex.org/F4320338279","funder_display_name":"Air Force Office of Scientific Research"},{"id":"https://openalex.org/G7325467095","display_name":null,"funder_award_id":"831501","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7755306388","display_name":null,"funder_award_id":"1239166","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320306151","display_name":"Alfred P. Sloan Foundation","ror":"https://ror.org/052csg198"},{"id":"https://openalex.org/F4320309327","display_name":"Google","ror":"https://ror.org/00njsd438"},{"id":"https://openalex.org/F4320337345","display_name":"Office of Naval Research","ror":"https://ror.org/00rk2pe57"},{"id":"https://openalex.org/F4320337388","display_name":"Division of Computer and Network Systems","ror":"https://ror.org/02rdzmk74"},{"id":"https://openalex.org/F4320338279","display_name":"Air Force Office of Scientific Research","ror":"https://ror.org/011e9bt93"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W195811623","https://openalex.org/W1498316612","https://openalex.org/W1502708590","https://openalex.org/W1543993937","https://openalex.org/W1673464365","https://openalex.org/W1724472458","https://openalex.org/W1774682829","https://openalex.org/W1972999341","https://openalex.org/W1988374166","https://openalex.org/W1992664255","https://openalex.org/W2031533839","https://openalex.org/W2061619267","https://openalex.org/W2088492763","https://openalex.org/W2103262407","https://openalex.org/W2107881300","https://openalex.org/W2108072891","https://openalex.org/W2122167991","https://openalex.org/W2138858469","https://openalex.org/W2146244799","https://openalex.org/W2147929033","https://openalex.org/W2159915142","https://openalex.org/W2340158903","https://openalex.org/W2914012796","https://openalex.org/W2914494418"],"related_works":["https://openalex.org/W2893218741","https://openalex.org/W2558319350","https://openalex.org/W1492594177","https://openalex.org/W1842742976","https://openalex.org/W2803235238","https://openalex.org/W399661440","https://openalex.org/W410356389","https://openalex.org/W1992929574","https://openalex.org/W3112085556","https://openalex.org/W2124796039"],"abstract_inverted_index":{"A":[0],"number":[1],"of":[2,20,24,33,53,100,110,122,137,152],"recent":[3],"research":[4],"and":[5,27,31,87,121,145,149],"industry":[6],"proposals":[7],"discussed":[8],"using":[9],"encrypted":[10,47,64,88],"data":[11,155],"in":[12,79],"web":[13,25,55,68,140],"applications.":[14,56,69],"We":[15],"first":[16],"present":[17,38,134],"a":[18,40,73,80,135],"systematization":[19],"the":[21,29,54,98,146,154],"design":[22,43],"space":[23],"applications":[26],"highlight":[28],"advantages":[30,151],"limitations":[32],"current":[34],"proposals.":[35],"Next,":[36],"we":[37,133],"ShadowCrypt,":[39,132],"previously":[41],"unexplored":[42],"point":[44],"that":[45,106,116],"enables":[46],"input/output":[48,65],"without":[49],"trusting":[50],"any":[51],"part":[52],"ShadowCrypt":[57,70,117],"allows":[58,107],"users":[59],"to":[60,63],"transparently":[61],"switch":[62],"for":[66],"text-based":[67],"runs":[71],"as":[72],"browser":[74],"extension,":[75],"replacing":[76],"input":[77],"elements":[78],"page":[81],"with":[82,90,131],"secure,":[83,91],"isolated":[84,92],"shadow":[85],"inputs":[86],"text":[89],"cleartext.":[93],"ShadowCrypt's":[94],"key":[95],"innovation":[96],"is":[97],"use":[99,124],"Shadow":[101],"DOM,":[102],"an":[103],"upcoming":[104],"primitive":[105],"low-overhead":[108],"isolation":[109],"DOM":[111],"trees.":[112],"Evaluation":[113],"results":[114],"indicate":[115],"has":[118],"low":[119],"overhead":[120],"practical":[123],"today.":[125],"Finally,":[126],"based":[127],"on":[128],"our":[129],"experience":[130],"study":[136],"17":[138],"popular":[139],"applications,":[141],"across":[142],"different":[143],"domains,":[144],"functionality":[147],"impact":[148],"security":[150],"encrypting":[153],"they":[156],"handle.":[157]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":13},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
