{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:12:34Z","timestamp":1748664754433,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319259413"},{"type":"electronic","value":"9783319259420"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25942-0_11","type":"book-chapter","created":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T09:32:14Z","timestamp":1444987934000},"page":"168-182","source":"Crossref","is-referenced-by-count":0,"title":["A High-Level Model for an Assembly Language Attacker by Means of Reflection"],"prefix":"10.1007","author":[{"given":"Adriaan","family":"Larmuseau","sequence":"first","affiliation":[]},{"given":"Marco","family":"Patrignani","sequence":"additional","affiliation":[]},{"given":"Dave","family":"Clarke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"issue":"2","key":"11_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/0304-3975(92)90014-7","volume":"103","author":"M Felleisen","year":"1992","unstructured":"Felleisen, M., Hieb, R.: The revised report on the syntactic theories of sequential control and state. Theoret. Comput. Sci. 103(2), 235\u2013271 (1992)","journal-title":"Theoret. Comput. Sci."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Furr, M., Foster, J.S.: Checking type safety of foreign function calls. In: PLDI 2005, pp. 62\u201372. ACM (2005)","DOI":"10.1145\/1065010.1065019"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Jagadeesan, R., Pitcher, C., Rathke, J., Riely, J.: Local memory via layout randomization. In: CSF 2011, pp. 161\u2013174. IEEE (2011)","DOI":"10.1109\/CSF.2011.18"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Jeffrey, A., Rathke, J.: Towards a theory of bisimilarity for local names. In: Logic in Computer Science, pp. 56\u201366. IEEE (2000)","DOI":"10.1109\/LICS.1999.782586"},{"key":"11_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-319-22969-0_16","volume-title":"Software Engineering and Formal Methods","author":"A Larmuseau","year":"2015","unstructured":"Larmuseau, A., Clarke, D.: Formalizing a secure foreign function interface. In: Calinescu, R., Rumpe, B. (eds.) SEFM 2015. LNCS, vol. 9276, pp. 215\u2013230. Springer, Heidelberg (2015)"},{"key":"11_CR6","unstructured":"Larmuseau, A., Clarke, D.: Modelling an Assembly Attacker by Reflection. Technical Report 2015\u2013026, Uppsala University (2015)"},{"key":"11_CR7","unstructured":"Leroy, X., Doligez, D., Garrigue, J., R\u00e9my, D., V\u00f4uillon, J.: The Objective Caml system, release 4.02. Technical report, INRIA, August 2014"},{"issue":"19","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1016\/j.tcs.2010.01.025","volume":"411","author":"P Li","year":"2010","unstructured":"Li, P., Zdancewic, S.: Arrows for secure information flow. Theoret. Comput. Sci. 411(19), 1974\u20131994 (2010)","journal-title":"Theoret. Comput. Sci."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Matthews, J., Findler, R.B.: Operational semantics for multi-language programs. TOPLAS, 31(3):12:1\u201312:44 (2009)","DOI":"10.1145\/1498926.1498930"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"McKeen, F., Alexandrovich, I., Berenzon, A., Rozas, C.V., Shafi, H., hanbhogue, V., Savagaonkar, U.R.: Innovative instructions and software model for isolated execution. In: HASP 2013, pp. 10:1\u201310:1. ACM (2013)","DOI":"10.1145\/2487726.2488368"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Patrignani, M., Clarke, D.: Fully Abstract Trace Semantics of Low-level Isolation Mechanisms. In: SAC 2014, pp. 1562\u20131569. ACM (2014)","DOI":"10.1145\/2554850.2554865"},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/0304-3975(77)90044-5","volume":"5","author":"G Plotkin","year":"1977","unstructured":"Plotkin, G.: LCF considered as a programming language. Theor. Comput. Science 5, 223\u2013255 (1977)","journal-title":"Theor. Comput. Science"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Strackx, R., Piessens, F.: Fides: Selectively hardening software application components against kernel-level malware. In: CCS 2012, pp. 2\u201313. ACM","DOI":"10.1145\/2382196.2382200"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Sumii, E., Pierce, B.C.: A bisimulation for dynamic sealing. In: POPL 2004, pp. 161\u2013172. ACM (2004)","DOI":"10.1145\/982962.964015"},{"issue":"3","key":"11_CR15","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1023\/A:1007720632734","volume":"10","author":"M Wand","year":"1998","unstructured":"Wand, M.: The theory of fexprs is trivial. Lisp and Symbolic Computation 10(3), 189\u2013199 (1998)","journal-title":"Lisp and Symbolic Computation"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Zdancewic, S., Grossman, D., Morrisett, G.: Principals in programming languages:a syntactic proof technique. In: ICFP 1999, pp. 197\u2013 207. ACM","DOI":"10.1145\/317765.317799"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering: Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25942-0_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T01:49:55Z","timestamp":1748656195000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25942-0_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259413","9783319259420"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25942-0_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}