{"id":"https://openalex.org/W1972484642","doi":"https://doi.org/10.1145/2810103.2813690","title":"Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation","display_name":"Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W1972484642","doi":"https://doi.org/10.1145/2810103.2813690","mag":"1972484642"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813690","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813690","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100422851","display_name":"Yutao Liu","orcid":"https://orcid.org/0009-0009-8562-4026"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yutao Liu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China","[Shanghai Jiao Tong University, Shanghai, China]"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Shanghai Jiao Tong University, Shanghai, China]","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059728539","display_name":"Tianyu Zhou","orcid":"https://orcid.org/0000-0002-7325-0399"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyu Zhou","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China","[Shanghai Jiao Tong University, Shanghai, China]"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Shanghai Jiao Tong University, Shanghai, China]","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100627368","display_name":"Kexin Chen","orcid":"https://orcid.org/0000-0003-4248-7681"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kexin Chen","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China","[Shanghai Jiao Tong University, Shanghai, China]"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Shanghai Jiao Tong University, Shanghai, China]","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100406215","display_name":"Haibo Chen","orcid":"https://orcid.org/0000-0002-9720-0361"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Chen","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China","[Shanghai Jiao Tong University, Shanghai, China]"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Shanghai Jiao Tong University, Shanghai, China]","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026023746","display_name":"Yubin Xia","orcid":"https://orcid.org/0000-0001-6558-5298"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yubin Xia","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China","[Shanghai Jiao Tong University, Shanghai, China]"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"[Shanghai Jiao Tong University, Shanghai, China]","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100422851"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":13.8061,"has_fulltext":false,"cited_by_count":120,"citation_normalized_percentile":{"value":0.98790834,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1607","last_page":"1619"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8299541473388672},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.7959074974060059},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6356357932090759},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.5258391499519348},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.4930700957775116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44202721118927},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.44169747829437256},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4388171434402466},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.4266008138656616},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.42255860567092896},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.2093907594680786}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8299541473388672},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.7959074974060059},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6356357932090759},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.5258391499519348},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.4930700957775116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44202721118927},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44169747829437256},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4388171434402466},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.4266008138656616},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.42255860567092896},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2093907594680786},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813690","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813690","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2774869227","display_name":null,"funder_award_id":"61303011","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5716657872","display_name":null,"funder_award_id":"TS0220103006, ZXZY037003","funder_id":"https://openalex.org/F4320321106","funder_display_name":"Ministry of Education of the People's Republic of China"},{"id":"https://openalex.org/G66016963","display_name":null,"funder_award_id":"14511100902","funder_id":"https://openalex.org/F4320321885","funder_display_name":"Science and Technology Commission of Shanghai Municipality"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321106","display_name":"Ministry of Education of the People's Republic of China","ror":"https://ror.org/01mv9t934"},{"id":"https://openalex.org/F4320321885","display_name":"Science and Technology Commission of Shanghai Municipality","ror":"https://ror.org/03kt66j61"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W236281116","https://openalex.org/W1514794536","https://openalex.org/W1553586369","https://openalex.org/W1809664600","https://openalex.org/W1852007091","https://openalex.org/W1963947298","https://openalex.org/W1978703818","https://openalex.org/W1992291252","https://openalex.org/W1993767827","https://openalex.org/W1995727142","https://openalex.org/W2000375627","https://openalex.org/W2022018347","https://openalex.org/W2027135600","https://openalex.org/W2031806437","https://openalex.org/W2036601091","https://openalex.org/W2042494357","https://openalex.org/W2043501224","https://openalex.org/W2073294836","https://openalex.org/W2074419584","https://openalex.org/W2092423386","https://openalex.org/W2096828726","https://openalex.org/W2106705612","https://openalex.org/W2107289225","https://openalex.org/W2107466081","https://openalex.org/W2108255910","https://openalex.org/W2112735498","https://openalex.org/W2112736324","https://openalex.org/W2122913395","https://openalex.org/W2128159601","https://openalex.org/W2130694829","https://openalex.org/W2131660501","https://openalex.org/W2150174204","https://openalex.org/W2150615820","https://openalex.org/W2150709728","https://openalex.org/W2154795299","https://openalex.org/W2166004296","https://openalex.org/W2167804035","https://openalex.org/W2168601499","https://openalex.org/W2168873228","https://openalex.org/W2171482413","https://openalex.org/W2171863291","https://openalex.org/W2176235539","https://openalex.org/W2185582414","https://openalex.org/W2293825325","https://openalex.org/W2525658600","https://openalex.org/W3140837477","https://openalex.org/W4206314719","https://openalex.org/W4206796831","https://openalex.org/W4256367411","https://openalex.org/W4285719527","https://openalex.org/W6727414461"],"related_works":["https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W1515917392","https://openalex.org/W2743348030","https://openalex.org/W1991063492","https://openalex.org/W2613320081","https://openalex.org/W1973516247","https://openalex.org/W2179519055","https://openalex.org/W2413559826","https://openalex.org/W4387237709"],"abstract_inverted_index":{"Exploiting":[0],"memory":[1,194],"disclosure":[2],"vulnerabilities":[3],"like":[4],"the":[5,110,129,135,171,181],"HeartBleed":[6],"bug":[7],"may":[8,131,162],"cause":[9],"arbitrary":[10],"reading":[11],"of":[12,19,72,81,83,103,160,173],"a":[13,44,88,119,124],"victim's":[14],"memory,":[15],"leading":[16],"to":[17,53,76,99,116,151,190],"leakage":[18],"critical":[20,36,107],"secrets":[21,37,108,165],"such":[22],"as":[23],"crypto":[24],"keys,":[25],"personal":[26],"identity":[27],"and":[28,148,166,176,184,202],"financial":[29],"information.":[30],"While":[31],"isolating":[32],"code":[33,105],"that":[34],"manipulates":[35],"into":[38,155],"an":[39],"isolated":[40],"execution":[41],"environment":[42],"is":[43,114],"promising":[45],"countermeasure,":[46],"existing":[47],"approaches":[48],"are":[49,74],"either":[50],"too":[51],"coarse-grained":[52],"prevent":[54],"intra-domain":[55],"attacks,":[56],"or":[57,66,68,127],"require":[58],"excessive":[59],"intervention":[60],"from":[61,109],"low-level":[62],"software":[63,78,140,154],"(e.g.,":[64],"hypervisor":[65,208],"OS),":[67],"both.":[69],"Further,":[70],"few":[71],"them":[73],"applicable":[75],"large-scale":[77,139],"with":[79,141],"millions":[80],"lines":[82],"code.":[84,112,169],"This":[85],"paper":[86],"describes":[87],"new":[89],"approach,":[90],"namely":[91],"SeCage,":[92],"which":[93,161],"retrofits":[94,180],"commodity":[95],"hardware":[96],"virtualization":[97],"extensions":[98],"support":[100],"efficient":[101],"isolation":[102],"sensitive":[104],"manipulating":[106],"remaining":[111],"SeCage":[113,145,179],"designed":[115],"work":[117],"under":[118],"strong":[120],"adversary":[121],"model":[122],"where":[123],"victim":[125],"application":[126],"even":[128],"OS":[130],"be":[132],"controlled":[133],"by":[134],"adversary,":[136],"while":[137,199],"supporting":[138],"small":[142],"deployment":[143],"cost.":[144],"combines":[146],"static":[147],"dynamic":[149],"analysis":[150],"decompose":[152],"monolithic":[153],"several":[156],"compart-":[157],"ments,":[158],"each":[159],"contain":[163],"different":[164,193,197],"their":[167],"corresponding":[168],"Following":[170],"idea":[172],"separating":[174],"control":[175],"data":[177],"plane,":[178],"VMFUNC":[182],"mechanism":[183],"nested":[185],"paging":[186],"in":[187],"Intel":[188],"processors":[189],"transparently":[191],"provide":[192],"views":[195],"for":[196],"compartments,":[198],"allowing":[200],"low-cost":[201],"transparent":[203],"invocation":[204],"across":[205],"domains":[206],"without":[207],"intervention.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":19},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":15},{"year":2016,"cited_by_count":4}],"updated_date":"2026-02-25T23:00:34.991745","created_date":"2025-10-10T00:00:00"}
