{"id":"https://openalex.org/W4405182375","doi":"https://doi.org/10.1145/3658644.3690340","title":"<i>u</i> MMU: Securing Data Confidentiality with Unobservable Memory Subsystem","display_name":"<i>u</i> MMU: Securing Data Confidentiality with Unobservable Memory Subsystem","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405182375","doi":"https://doi.org/10.1145/3658644.3690340"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690340","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690340","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690340","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690340","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Hajeong Lim","orcid":"https://orcid.org/0009-0002-1092-7347"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hajeong Lim","raw_affiliation_strings":["Sungkyunkwan University, Suwon, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0002-1092-7347","affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jaeyoon Kim","orcid":"https://orcid.org/0009-0009-7766-9654"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jaeyoon Kim","raw_affiliation_strings":["Sungkyunkwan University, Suwon, Republic of Korea"],"raw_orcid":"https://orcid.org/0009-0009-7766-9654","affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101660662","display_name":"Hojoon Lee","orcid":"https://orcid.org/0000-0001-5344-6266"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hojoon Lee","raw_affiliation_strings":["Sungkyunkwan University, Suwon, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0001-5344-6266","affiliations":[{"raw_affiliation_string":"Sungkyunkwan University, Suwon, Republic of Korea","institution_ids":["https://openalex.org/I848706"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I848706"],"apc_list":null,"apc_paid":null,"fwci":0.3311,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.68561016,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"2993","last_page":"3007"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.8340423107147217},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7490223050117493},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7311463356018066},{"id":"https://openalex.org/keywords/unobservable","display_name":"Unobservable","score":0.5840772390365601},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5395632386207581},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.49324172735214233},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4389122426509857},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3746412396430969},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3246273398399353},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.2835058569908142},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.21575486660003662},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20376509428024292},{"id":"https://openalex.org/keywords/semiconductor-memory","display_name":"Semiconductor memory","score":0.15651831030845642}],"concepts":[{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.8340423107147217},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7490223050117493},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7311463356018066},{"id":"https://openalex.org/C2780695315","wikidata":"https://www.wikidata.org/wiki/Q3799040","display_name":"Unobservable","level":2,"score":0.5840772390365601},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5395632386207581},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.49324172735214233},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4389122426509857},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3746412396430969},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3246273398399353},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.2835058569908142},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.21575486660003662},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20376509428024292},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.15651831030845642},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690340","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690340","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690340","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690340","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690340","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690340","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6717377981","display_name":null,"funder_award_id":"NRF-2022R1C1C101049","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405182375.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W1488058190","https://openalex.org/W1934458198","https://openalex.org/W1988374166","https://openalex.org/W1995727142","https://openalex.org/W2036954436","https://openalex.org/W2051384716","https://openalex.org/W2051576234","https://openalex.org/W2056778557","https://openalex.org/W2067392744","https://openalex.org/W2105112969","https://openalex.org/W2147758029","https://openalex.org/W2166247408","https://openalex.org/W2170138789","https://openalex.org/W2170993700","https://openalex.org/W2238694998","https://openalex.org/W2297774820","https://openalex.org/W2404948481","https://openalex.org/W2406221528","https://openalex.org/W2510286124","https://openalex.org/W2605470470","https://openalex.org/W2605597658","https://openalex.org/W2769061097","https://openalex.org/W2792900670","https://openalex.org/W2807403537","https://openalex.org/W2884163605","https://openalex.org/W2890914193","https://openalex.org/W2927543040","https://openalex.org/W2947561435","https://openalex.org/W2947886797","https://openalex.org/W2954241526","https://openalex.org/W2976763854","https://openalex.org/W2982401473","https://openalex.org/W2990523227","https://openalex.org/W3089734599","https://openalex.org/W3100860658","https://openalex.org/W3156527753","https://openalex.org/W4233119454","https://openalex.org/W4242926647","https://openalex.org/W4293024132","https://openalex.org/W4380881061"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W1531601525","https://openalex.org/W182679101","https://openalex.org/W3006344745","https://openalex.org/W2103519941","https://openalex.org/W3180573957","https://openalex.org/W2162805750","https://openalex.org/W2043669269","https://openalex.org/W4388856880","https://openalex.org/W2081998479"],"abstract_inverted_index":{"Ensuring":[0],"data":[1,25,62],"confidentiality":[2,63],"in":[3],"a":[4,12,58],"computing":[5],"system's":[6],"memory":[7,42],"hierarchy":[8],"proved":[9],"to":[10,32],"be":[11],"formidable":[13],"challenge":[14],"with":[15,34,40],"the":[16,47,69],"large":[17],"attack":[18],"surface.":[19],"Diverse":[20],"and":[21],"powerful":[22],"attacks":[23,55],"threaten":[24],"confidentiality.":[26],"Memory":[27],"safety":[28],"is":[29],"notoriously":[30],"hard":[31],"achieve":[33],"unsafe":[35],"languages,":[36],"thereby":[37],"empowering":[38],"adversaries":[39],"unauthorized":[41],"accesses,":[43],"as":[44,57],"represented":[45],"by":[46],"HeartBleed":[48],"incident.":[49],"More":[50],"recently,":[51],"microarchitectural":[52],"side":[53],"channel":[54],"reign":[56],"prevalent":[59],"threat":[60],"against":[61],"that":[64],"affects":[65],"program":[66],"execution":[67],"including":[68],"safeguarded":[70],"ones":[71],"inside":[72],"TEEs.":[73]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
