{"id":"https://openalex.org/W2534917055","doi":"https://doi.org/10.1145/2976749.2978327","title":"Enforcing Least Privilege Memory Views for Multithreaded Applications","display_name":"Enforcing Least Privilege Memory Views for Multithreaded Applications","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2534917055","doi":"https://doi.org/10.1145/2976749.2978327","mag":"2534917055"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978327","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028365854","display_name":"Terry Ching-Hsiang Hsu","orcid":null},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Terry Ching-Hsiang Hsu","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030577882","display_name":"Kevin Hoffman","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kevin Hoffman","raw_affiliation_strings":["eFolder Inc., Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"eFolder Inc., Atlanta, GA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024420075","display_name":"Patrick Eugster","orcid":"https://orcid.org/0000-0003-3864-9078"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Patrick Eugster","raw_affiliation_strings":["Purdue University and TU Darmstadt, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University and TU Darmstadt, West Lafayette, IN, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065116578","display_name":"Mathias Payer","orcid":"https://orcid.org/0000-0001-5054-7547"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mathias Payer","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5028365854"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":7.2841,"has_fulltext":false,"cited_by_count":53,"citation_normalized_percentile":{"value":0.9720096,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"393","last_page":"405"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9757999777793884,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8149451613426208},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.6356969475746155},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.6294289827346802},{"id":"https://openalex.org/keywords/address-space","display_name":"Address space","score":0.6172159314155579},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.6091077923774719},{"id":"https://openalex.org/keywords/user-space","display_name":"User space","score":0.5563633441925049},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46799275279045105},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.4626058042049408},{"id":"https://openalex.org/keywords/memory-model","display_name":"Memory model","score":0.45096898078918457},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.44444751739501953},{"id":"https://openalex.org/keywords/linux-kernel","display_name":"Linux kernel","score":0.42895767092704773},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.42534926533699036},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41529524326324463},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.37278079986572266},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.3526495099067688},{"id":"https://openalex.org/keywords/shared-memory","display_name":"Shared memory","score":0.3383330702781677},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.13231229782104492}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8149451613426208},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.6356969475746155},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.6294289827346802},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.6172159314155579},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.6091077923774719},{"id":"https://openalex.org/C2775877400","wikidata":"https://www.wikidata.org/wiki/Q1142183","display_name":"User space","level":2,"score":0.5563633441925049},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46799275279045105},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.4626058042049408},{"id":"https://openalex.org/C12186640","wikidata":"https://www.wikidata.org/wiki/Q6815743","display_name":"Memory model","level":3,"score":0.45096898078918457},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.44444751739501953},{"id":"https://openalex.org/C553261973","wikidata":"https://www.wikidata.org/wiki/Q14579","display_name":"Linux kernel","level":2,"score":0.42895767092704773},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.42534926533699036},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41529524326324463},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.37278079986572266},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.3526495099067688},{"id":"https://openalex.org/C133875982","wikidata":"https://www.wikidata.org/wiki/Q764810","display_name":"Shared memory","level":2,"score":0.3383330702781677},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.13231229782104492},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978327","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978327","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8199999928474426,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4370074952","display_name":null,"funder_award_id":"FP7-617805","funder_id":"https://openalex.org/F4320334678","funder_display_name":"European Research Council"}],"funders":[{"id":"https://openalex.org/F4320307791","display_name":"Cisco Systems","ror":"https://ror.org/03yt1ez60"},{"id":"https://openalex.org/F4320334678","display_name":"European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W6385438","https://openalex.org/W174674715","https://openalex.org/W183305829","https://openalex.org/W183323481","https://openalex.org/W1456833637","https://openalex.org/W1459231281","https://openalex.org/W1482769911","https://openalex.org/W1563300346","https://openalex.org/W1608091202","https://openalex.org/W1809664600","https://openalex.org/W1964545511","https://openalex.org/W1993767827","https://openalex.org/W2025536117","https://openalex.org/W2036329595","https://openalex.org/W2057743816","https://openalex.org/W2062340141","https://openalex.org/W2065076704","https://openalex.org/W2077469457","https://openalex.org/W2077997786","https://openalex.org/W2079029390","https://openalex.org/W2086234010","https://openalex.org/W2093460657","https://openalex.org/W2109219878","https://openalex.org/W2111927651","https://openalex.org/W2117798902","https://openalex.org/W2121251946","https://openalex.org/W2126790595","https://openalex.org/W2128159601","https://openalex.org/W2128274900","https://openalex.org/W2129592257","https://openalex.org/W2131660501","https://openalex.org/W2149603369","https://openalex.org/W2157116240","https://openalex.org/W2158126684","https://openalex.org/W2159037316","https://openalex.org/W2162283517","https://openalex.org/W2167804035","https://openalex.org/W2169875292","https://openalex.org/W2171482413","https://openalex.org/W2400216756","https://openalex.org/W2428143441","https://openalex.org/W4236561850","https://openalex.org/W4249713879"],"related_works":["https://openalex.org/W2484072889","https://openalex.org/W3207935656","https://openalex.org/W2052673929","https://openalex.org/W4248542611","https://openalex.org/W4235971859","https://openalex.org/W3151891900","https://openalex.org/W3112625270","https://openalex.org/W2141283509","https://openalex.org/W3140258615","https://openalex.org/W2121519027"],"abstract_inverted_index":{"Failing":[0],"to":[1,31,51,59,115],"properly":[2],"isolate":[3,28,120],"components":[4,30,48],"in":[5,12,88,124,138,151],"the":[6,19,42,71,112,139],"same":[7,113],"address":[8],"space":[9,123],"has":[10],"resulted":[11],"a":[13,77,94,125],"substantial":[14],"amount":[15],"of":[16,105,135],"vulnerabilities.":[17],"Enforcing":[18],"least":[20],"privilege":[21,97],"principle":[22],"for":[23,82],"memory":[24,39,73,86,106,122],"accesses":[25],"can":[26],"selectively":[27],"software":[29,47],"restrict":[32],"attack":[33],"surface":[34],"and":[35,44,54,79,84,107,127,166],"prevent":[36],"unintended":[37],"cross-component":[38],"corruption.":[40],"However,":[41],"boundaries":[43],"interactions":[45],"between":[46],"are":[49],"hard":[50],"reason":[52],"about":[53],"existing":[55],"approaches":[56],"have":[57],"failed":[58],"stop":[60],"attackers":[61],"from":[62],"exploiting":[63],"vulnerabilities":[64],"caused":[65],"by":[66],"poor":[67],"isolation.":[68],"We":[69],"present":[70],"secure":[72,83],"views":[74],"(SMV)":[75],"model:":[76],"practical":[78],"efficient":[80],"model":[81],"selective":[85],"isolation":[87],"monolithic":[89],"multithreaded":[90],"applications.":[91],"SMV":[92],"is":[93],"third":[95],"generation":[96],"separation":[98],"technique":[99],"that":[100],"offers":[101],"explicit":[102],"access":[103],"control":[104],"allows":[108],"concurrent":[109],"threads":[110],"within":[111],"process":[114],"partially":[116],"share":[117],"or":[118],"fully":[119],"their":[121],"controlled":[126],"parallel":[128],"manner":[129],"following":[130],"application":[131],"requirements.":[132],"An":[133],"evaluation":[134],"our":[136],"prototype":[137],"Linux":[140],"kernel":[141],"(TCB":[142],"<":[143],"1,800":[144],"LOC)":[145],"shows":[146],"negligible":[147],"runtime":[148],"performance":[149],"overhead":[150],"real-world":[152],"applications":[153],"including":[154],"Cherokee":[155],"web":[156,162,169],"server":[157,163],"(<":[158,164,171],"0.69%),":[159],"Apache":[160],"httpd":[161],"0.93%),":[165],"Mozilla":[167],"Firefox":[168],"browser":[170],"1.89%)":[172],"with":[173],"at":[174],"most":[175],"12":[176],"LOC":[177],"changes.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
