{"id":"https://openalex.org/W4308643135","doi":"https://doi.org/10.1145/3548606.3559344","title":"CETIS","display_name":"CETIS","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308643135","doi":"https://doi.org/10.1145/3548606.3559344"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3559344","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559344","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559344","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559344","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087377040","display_name":"Mengyao Xie","orcid":"https://orcid.org/0000-0002-8511-1118"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mengyao Xie","raw_affiliation_strings":["SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046439614","display_name":"Chenggang Wu","orcid":"https://orcid.org/0000-0003-1777-8110"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenggang Wu","raw_affiliation_strings":["SKLP, Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences, Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLP, Institute of Computing Technology, CAS &amp; University of Chinese Academy of Sciences, Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070946957","display_name":"Yinqian Zhang","orcid":"https://orcid.org/0000-0002-7585-1075"},"institutions":[{"id":"https://openalex.org/I4210139618","display_name":"Shanghai Key Laboratory of Trustworthy Computing","ror":"https://ror.org/030qbr085","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210139618"]},{"id":"https://openalex.org/I3045169105","display_name":"Southern University of Science and Technology","ror":"https://ror.org/049tv2d57","country_code":"CN","type":"education","lineage":["https://openalex.org/I3045169105"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinqian Zhang","raw_affiliation_strings":["Department of Computer Science and Engineering, SUSTech, Research Institute of Trustworthy Autonomous Systems, SUSTech, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, SUSTech, Research Institute of Trustworthy Autonomous Systems, SUSTech, Shenzhen, China","institution_ids":["https://openalex.org/I4210139618","https://openalex.org/I3045169105"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101444385","display_name":"Jiali Xu","orcid":"https://orcid.org/0000-0001-6194-6113"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiali Xu","raw_affiliation_strings":["SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069706570","display_name":"Y. F. Lai","orcid":"https://orcid.org/0000-0001-5885-0858"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanming Lai","raw_affiliation_strings":["SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062832787","display_name":"Yan Kang","orcid":"https://orcid.org/0000-0001-6969-0562"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Kang","raw_affiliation_strings":["SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLP, Institute of Computing Technology, CAS, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100392198","display_name":"Wei Wang","orcid":"https://orcid.org/0000-0003-1585-8731"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Wang","raw_affiliation_strings":["SKLP, Institute of Computing Technology, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLP, Institute of Computing Technology, CAS, Beijing, China","institution_ids":["https://openalex.org/I4210090176"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100407686","display_name":"Zhe Wang","orcid":"https://orcid.org/0000-0003-4719-1804"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Wang","raw_affiliation_strings":["SKLP, Institute of Computing Technology, CAS, Zhongguancun Laboratory, Beijing, China"],"affiliations":[{"raw_affiliation_string":"SKLP, Institute of Computing Technology, CAS, Zhongguancun Laboratory, Beijing, China","institution_ids":["https://openalex.org/I4210090176"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5087377040"],"corresponding_institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":1.4552,"has_fulltext":true,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84297565,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2989","last_page":"3002"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9868999719619751,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7820945978164673},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.6133039593696594},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.5805563926696777},{"id":"https://openalex.org/keywords/shadow","display_name":"Shadow (psychology)","score":0.5500166416168213},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5453691482543945},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.5082511305809021},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49898552894592285},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49645358324050903},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.461894154548645},{"id":"https://openalex.org/keywords/isolation","display_name":"Isolation (microbiology)","score":0.44338107109069824},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4277680814266205},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.415442556142807},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.18792474269866943},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1512688398361206}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7820945978164673},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.6133039593696594},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.5805563926696777},{"id":"https://openalex.org/C117797892","wikidata":"https://www.wikidata.org/wiki/Q286363","display_name":"Shadow (psychology)","level":2,"score":0.5500166416168213},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5453691482543945},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.5082511305809021},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49898552894592285},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49645358324050903},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.461894154548645},{"id":"https://openalex.org/C2775941552","wikidata":"https://www.wikidata.org/wiki/Q25212305","display_name":"Isolation (microbiology)","level":2,"score":0.44338107109069824},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4277680814266205},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.415442556142807},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.18792474269866943},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1512688398361206},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C89423630","wikidata":"https://www.wikidata.org/wiki/Q7193","display_name":"Microbiology","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3559344","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559344","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559344","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3548606.3559344","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3559344","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3559344","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8299999833106995}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4308643135.pdf","grobid_xml":"https://content.openalex.org/works/W4308643135.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W23242426","https://openalex.org/W1972484642","https://openalex.org/W1993736952","https://openalex.org/W1996931407","https://openalex.org/W2031641633","https://openalex.org/W2080313875","https://openalex.org/W2141389113","https://openalex.org/W2162800072","https://openalex.org/W2512784977","https://openalex.org/W2572561587","https://openalex.org/W2578771209","https://openalex.org/W2605597658","https://openalex.org/W2726232829","https://openalex.org/W2734941459","https://openalex.org/W2767198771","https://openalex.org/W2891253189","https://openalex.org/W2899759798","https://openalex.org/W2947243817","https://openalex.org/W3001455961","https://openalex.org/W3015513242","https://openalex.org/W3016206947","https://openalex.org/W3101740510","https://openalex.org/W3135203045","https://openalex.org/W4245410964","https://openalex.org/W4302784197","https://openalex.org/W6790705086"],"related_works":["https://openalex.org/W2368477821","https://openalex.org/W1584308544","https://openalex.org/W2069613115","https://openalex.org/W261562921","https://openalex.org/W2138847","https://openalex.org/W2013051930","https://openalex.org/W2379457214","https://openalex.org/W2052673929","https://openalex.org/W2055367414","https://openalex.org/W2140386982"],"abstract_inverted_index":{"Intel":[0,13],"control-flow":[1,19],"enforcement":[2],"technology":[3],"(CET)":[4],"is":[5],"a":[6,48],"new":[7],"hardware":[8],"feature":[9],"available":[10],"in":[11],"recent":[12],"processors.":[14],"It":[15],"supports":[16],"the":[17,35],"coarse-grained":[18],"integrity":[20],"for":[21,42],"software":[22],"to":[23,46],"defeat":[24],"memory":[25,53],"corruption":[26],"attacks.":[27],"In":[28],"this":[29],"paper,":[30],"we":[31],"retrofit":[32],"CET,":[33],"particularly":[34],"write-protected":[36],"shadow":[37,44],"pages":[38],"of":[39],"CET":[40],"used":[41],"implementing":[43],"stacks,":[45],"develop":[47],"generic":[49],"and":[50],"efficient":[51],"intra-process":[52],"isolation":[54],"mechanism,":[55],"dubbed":[56],"CETIS.":[57]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-11-13T00:00:00"}
