{"id":"https://openalex.org/W2793146918","doi":"https://doi.org/10.1145/3176258.3176330","title":"Fidelius Charm","display_name":"Fidelius Charm","publication_year":2018,"publication_date":"2018-03-13","ids":{"openalex":"https://openalex.org/W2793146918","doi":"https://doi.org/10.1145/3176258.3176330","mag":"2793146918"},"language":"en","primary_location":{"id":"doi:10.1145/3176258.3176330","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3176258.3176330","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176330","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176330","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063912683","display_name":"Hussain M. J. Almohri","orcid":"https://orcid.org/0000-0002-7738-5864"},"institutions":[{"id":"https://openalex.org/I36721946","display_name":"Kuwait University","ror":"https://ror.org/021e5j056","country_code":"KW","type":"education","lineage":["https://openalex.org/I36721946"]}],"countries":["KW"],"is_corresponding":true,"raw_author_name":"Hussain M. J. Almohri","raw_affiliation_strings":["Kuwait University &amp; University of Virginia, Kuwait, Kuwait"],"affiliations":[{"raw_affiliation_string":"Kuwait University &amp; University of Virginia, Kuwait, Kuwait","institution_ids":["https://openalex.org/I36721946"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027001546","display_name":"David Evans","orcid":"https://orcid.org/0000-0001-7988-8943"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Evans","raw_affiliation_strings":["University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5063912683"],"corresponding_institution_ids":["https://openalex.org/I36721946"],"apc_list":null,"apc_paid":null,"fwci":1.1846,"has_fulltext":true,"cited_by_count":21,"citation_normalized_percentile":{"value":0.83957688,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"248","last_page":"255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rust","display_name":"Rust (programming language)","score":0.8418499231338501},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7642748355865479},{"id":"https://openalex.org/keywords/memory-safety","display_name":"Memory safety","score":0.7439842224121094},{"id":"https://openalex.org/keywords/address-space","display_name":"Address space","score":0.6335105895996094},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.631658673286438},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5587986707687378},{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.53428053855896},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.48477405309677124},{"id":"https://openalex.org/keywords/kernel","display_name":"Kernel (algebra)","score":0.4616154134273529},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.4423998296260834},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.41499078273773193},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.39342600107192993},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.31699416041374207},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.20755881071090698},{"id":"https://openalex.org/keywords/overlay","display_name":"Overlay","score":0.1894434690475464}],"concepts":[{"id":"https://openalex.org/C197781089","wikidata":"https://www.wikidata.org/wiki/Q575650","display_name":"Rust (programming language)","level":2,"score":0.8418499231338501},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7642748355865479},{"id":"https://openalex.org/C28180684","wikidata":"https://www.wikidata.org/wiki/Q4080983","display_name":"Memory safety","level":3,"score":0.7439842224121094},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.6335105895996094},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.631658673286438},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5587986707687378},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.53428053855896},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.48477405309677124},{"id":"https://openalex.org/C74193536","wikidata":"https://www.wikidata.org/wiki/Q574844","display_name":"Kernel (algebra)","level":2,"score":0.4616154134273529},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4423998296260834},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.41499078273773193},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.39342600107192993},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.31699416041374207},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.20755881071090698},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.1894434690475464},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3176258.3176330","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3176258.3176330","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176330","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3176258.3176330","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3176258.3176330","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3176258.3176330","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6014401568","display_name":null,"funder_award_id":"1422332","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2793146918.pdf","grobid_xml":"https://content.openalex.org/works/W2793146918.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W6385438","https://openalex.org/W66307533","https://openalex.org/W155216046","https://openalex.org/W1456833637","https://openalex.org/W1482769911","https://openalex.org/W1517334976","https://openalex.org/W1809664600","https://openalex.org/W1904738922","https://openalex.org/W1972484642","https://openalex.org/W2012559808","https://openalex.org/W2060475972","https://openalex.org/W2062340141","https://openalex.org/W2065076704","https://openalex.org/W2076438261","https://openalex.org/W2079029390","https://openalex.org/W2081461624","https://openalex.org/W2086795351","https://openalex.org/W2107082099","https://openalex.org/W2117798902","https://openalex.org/W2123553986","https://openalex.org/W2201054308","https://openalex.org/W2325681100","https://openalex.org/W2416938811","https://openalex.org/W2508824203","https://openalex.org/W2511669759","https://openalex.org/W2539012550","https://openalex.org/W2575425722","https://openalex.org/W2577352649","https://openalex.org/W2597705742","https://openalex.org/W2607063282","https://openalex.org/W2779850521","https://openalex.org/W4299301436","https://openalex.org/W6600256889"],"related_works":["https://openalex.org/W2033239416","https://openalex.org/W4244773577","https://openalex.org/W2083276427","https://openalex.org/W2484072889","https://openalex.org/W2793146918","https://openalex.org/W43269751","https://openalex.org/W4385373783","https://openalex.org/W2171724053","https://openalex.org/W2720962420","https://openalex.org/W81281010"],"abstract_inverted_index":{"The":[0],"Rust":[1,51,95,122,148],"programming":[2],"language":[3,18,48],"has":[4],"a":[5,50,58,62,102,111,124],"safe":[6],"memory":[7,14,25,68,85],"model":[8],"that":[9,60],"promises":[10],"to":[11,40,82,127],"eliminate":[12],"critical":[13],"bugs.":[15],"While":[16],"the":[17,83,98,107,116],"is":[19,37,159],"strong":[20],"in":[21,45,67,121,147],"doing":[22],"so,":[23],"its":[24,156],"guarantees":[26],"are":[27,33],"lost":[28],"when":[29],"any":[30],"unsafe":[31,47,74,88,128],"blocks":[32],"used.":[34],"Unsafe":[35],"code":[36],"often":[38],"needed":[39],"call":[41],"library":[42],"functions":[43,119],"written":[44,120],"an":[46],"inside":[49],"program.":[52],"We":[53],"present":[54],"Fidelius":[55],"Charm":[56],"(FC),":[57],"system":[59],"protects":[61],"programmer-specified":[63],"subset":[64],"of":[65,94,118,138],"data":[66],"from":[69],"unauthorized":[70],"access":[71,81],"through":[72],"vulnerable":[73],"libraries.":[75,89,130],"FC":[76,90,146],"does":[77],"this":[78],"by":[79],"limiting":[80],"program's":[84],"while":[86],"executing":[87],"uses":[91],"standard":[92],"features":[93],"and":[96,123,136,151],"utilizes":[97],"Linux":[99],"kernel":[100],"as":[101],"trusted":[103,112],"base":[104],"for":[105,144,161],"splitting":[106],"address":[108],"space":[109],"into":[110],"privileged":[113],"region":[114,125],"under":[115],"control":[117],"available":[126],"external":[129],"This":[131],"paper":[132],"presents":[133,140],"our":[134],"design":[135],"implementation":[137],"FC,":[139],"two":[141],"case":[142],"studies":[143],"using":[145],"TLS":[149],"libraries,":[150],"reports":[152],"on":[153],"experiments":[154],"showing":[155],"performance":[157],"overhead":[158],"low":[160],"typical":[162],"uses.":[163]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2018-03-29T00:00:00"}
