{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:31:15Z","timestamp":1774837875372,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319457437","type":"print"},{"value":"9783319457444","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45744-4_25","type":"book-chapter","created":{"date-parts":[[2016,9,14]],"date-time":"2016-09-14T04:54:30Z","timestamp":1473828870000},"page":"501-519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Spot the Difference: Secure Multi-execution and Multiple Facets"],"prefix":"10.1007","author":[{"given":"Nataliia","family":"Bielova","sequence":"first","affiliation":[]},{"given":"Tamara","family":"Rezk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"25_CR1","unstructured":"Austin, T., Knowles, K., Flanagan, C.: Typed faceted values for secure information flow in haskell. Technical report UCSC-SOE-14-07, University of California, Santa Cruz (2014)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: PLAS 2009, pp. 113\u2013124 (2009)","DOI":"10.1145\/1554339.1554353"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS 2010, pp. 3:1\u20133:12. ACM (2010)","DOI":"10.1145\/1814217.1814220"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Multiple facets for dynamic information flow. In: Proceeding of the 39th Symposium of Principles of Programming Languages. ACM (2012)","DOI":"10.1145\/2103656.2103677"},{"key":"25_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-642-30793-5_12","volume-title":"Formal Techniques for Distributed Systems","author":"G Barthe","year":"2012","unstructured":"Barthe, G., Crespo, J.M., Devriese, D., Piessens, F., Rivas, E.: Secure multi-execution through static program transformation. In: Giese, H., Rosu, G. (eds.) FORTE 2012 and FMOODS 2012. LNCS, vol. 7273, pp. 186\u2013202. Springer, Heidelberg (2012)"},{"issue":"1\u20132","key":"25_CR6","first-page":"2","volume":"4","author":"L Bauer","year":"2005","unstructured":"Bauer, L., Ligatti, J., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur. 4(1\u20132), 2\u201316 (2005)","journal-title":"Int. J. Inf. Secur."},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Bielova, N., Devriese, D., Massacci, F., Piessens, F.: Reactive non-interference for a browser model. In: Proceeding of the 5th International Conference on Network and System Security (NSS), pp. 97\u2013104. IEEE (2011)","DOI":"10.1109\/ICNSS.2011.6059965"},{"key":"25_CR8","unstructured":"Bielova, N., Rezk, T. Spot the difference: secure multi-execution and multiple facets technical report. https:\/\/goo.gl\/b7yoQ9"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-662-49635-0_3","volume-title":"Principles of Security and Trust","author":"N Bielova","year":"2016","unstructured":"Bielova, N., Rezk, T.: A taxonomy of information flow monitors. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 46\u201367. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49635-0_3"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-662-49635-0_2","volume-title":"Principles of Security and Trust","author":"I Bolosteanu","year":"2016","unstructured":"Bolosteanu, I., Garg, D.: Asymmetric secure multi-execution with declassification. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 24\u201345. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49635-0_2"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Groef, W., Devriese, D., Nikiforakis, N., Piessens, F.: FlowFox: a web browser with flexible and precise information flow control. In: Proceeding of the 19th ACM Conference on Communications and Computer Security, pp. 748\u2013759 (2012)","DOI":"10.1145\/2382196.2382275"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Devriese, D., Piessens, F.: Non-interference through secure multi-execution. In: Proceeding of the Symposium on Security and Privacy, pp. 109\u2013124. IEEE (2010)","DOI":"10.1109\/SP.2010.15"},{"key":"25_CR13","unstructured":"Erlingsson, U.: The inlined reference monitor approach to security policy enforcement. Ph.D. thesis, Cornell University (2003)"},{"issue":"2","key":"25_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1093\/comjnl\/17.2.143","volume":"17","author":"JS Fenton","year":"1974","unstructured":"Fenton, J.S.: Memoryless subsystems. Comput. J. 17(2), 143\u2013147 (1974)","journal-title":"Comput. J."},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Hedin, D., Bello, L., Sabelfeld, A.: Value-sensitive hybrid information flow control for a Javascript-like language. In: IEEE 28th Computer Security Foundations Symposium, CSF (2015)","DOI":"10.1109\/CSF.2015.31"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Kashyap, V., Wiedermann, B., Hardekopf, B.: Timing-and termination-sensitive secure information flow: Exploring a new approach. In: IEEE Symposium on Security and Privacy (SP), pp. 413\u2013428 (2011)","DOI":"10.1109\/SP.2011.19"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Le Guernic, G.: Confidentiality enforcement using dynamic information flow analyses. Ph.D. thesis, Kansas State University and University of Rennes 1 (2007)","DOI":"10.1007\/978-3-540-76929-3_4"},{"key":"25_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/11555827_21","volume-title":"Computer Security \u2013 ESORICS 2005","author":"J Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.W.: Enforcing non-safety security policies with program monitors. In: Vimercati, S.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355\u2013373. Springer, Heidelberg (2005)"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Trustworthy Global Computing","author":"A Almeida-Matos","year":"2014","unstructured":"Almeida-Matos, A., Fragoso Santos, J., Rezk, T.: An information flow monitor for a core of DOM. In: Maffei, M., Tuosto, E. (eds.) TGC 2014. LNCS, vol. 8902, pp. 1\u201316. Springer, Heidelberg (2014)"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Rafnsson, W., Sabelfeld, A.: Secure multi-execution: fine-grained, declassification-aware, and transparent. In: IEEE 26th Computer Security Foundations Symposium (2013)","DOI":"10.1109\/CSF.2013.10"},{"issue":"1","key":"25_CR21","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-150541","volume":"24","author":"W Rafnsson","year":"2016","unstructured":"Rafnsson, W., Sabelfeld, A.: Secure multi-execution: fine-grained, declassification-aware, and transparent. J. Comput. Secur. 24(1), 39\u201390 (2016)","journal-title":"J. Comput. Secur."},{"issue":"1","key":"25_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"25_CR23","doi-asserted-by":"publisher","first-page":"517","DOI":"10.3233\/JCS-2009-0352","volume":"17","author":"A Sabelfeld","year":"2009","unstructured":"Sabelfeld, A., Sands, D.: Declassification: dimensions and principles. J. Comput. Secur. 17(5), 517\u2013548 (2009)","journal-title":"J. Comput. Secur."},{"key":"25_CR24","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/978-3-642-55415-5_23","volume-title":"ICT Systems Security and Privacy Protection","author":"Jos\u00e9 Fragoso Santos","year":"2014","unstructured":"Santos, J.F., Rezk, T.: An information flow monitor-inlining compiler forsecuring a core of Javascript. In: 29th IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2014 (2014)"},{"key":"25_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-49635-0_1","volume-title":"Principles of Security and Trust","author":"T Schmitz","year":"2016","unstructured":"Schmitz, T., Rhodes, D., Austin, T.H., Knowles, K., Flanagan, C.: Faceted dynamic information flow via control and data monads. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 3\u201323. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49635-0_1"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Groef, W.D., Devriese, D., Piessens, F., Rezk, T.: Stateful declassification policies for event-driven programs. In: IEEE 27th Computer Security Foundations Symposium, CSF, pp. 293\u2013307 (2014)","DOI":"10.1109\/CSF.2014.28"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Zanarini, D., Jaskelioff, M., Russo, A.: Precise enforcement of confidentiality for reactive systems. In: IEEE 26th Computer Security Foundations Symposium, pp. 18\u201332 (2013)","DOI":"10.1109\/CSF.2013.9"},{"key":"25_CR28","unstructured":"Zdancewic, S.A.: Programming languages for information security. Ph.D. thesis, Cornell University (2002)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2016"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45744-4_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T18:37:14Z","timestamp":1749580634000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-45744-4_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319457437","9783319457444"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45744-4_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"15 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}