{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T02:31:16Z","timestamp":1774837876161,"version":"3.50.1"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319664019","type":"print"},{"value":"9783319664026","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66402-6_9","type":"book-chapter","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T13:44:11Z","timestamp":1502459051000},"page":"124-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["We Are Family: Relating Information-Flow Trackers"],"prefix":"10.1007","author":[{"given":"Musard","family":"Balliu","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Schoepe","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,12]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y.L., Octeau, D., McDaniel, P.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: PLDI (2014)","DOI":"10.1145\/2594291.2594299"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Askarov, A., Chong, S.: Learning is change in knowledge: Knowledge-based security for dynamic policies. In: CSF (2012)","DOI":"10.1109\/CSF.2012.31"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-540-88313-5_22","volume-title":"Computer Security - ESORICS 2008","author":"A Askarov","year":"2008","unstructured":"Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 333\u2013348. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-88313-5_22"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Gradual release: unifying declassification, encryption and key release policies. In: S&P (2007)","DOI":"10.1109\/SP.2007.22"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1667209.1667223","volume":"44","author":"TH Austin","year":"2009","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. SIGPLAN Not. 44, 20\u201331 (2009)","journal-title":"SIGPLAN Not."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Permissive dynamic information flow analysis. In: PLAS (2010)","DOI":"10.1145\/1814217.1814220"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Yang, J., Flanagan, C., Solar-Lezama, A.: Faceted execution of policy-agnostic programs. In: PLAS (2013)","DOI":"10.1145\/2465106.2465121"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Balliu, M., Dam, M., Guernic, G.L.: ENCoVer: symbolic exploration for information flow security. In: CSF (2012)","DOI":"10.1109\/CSF.2012.24"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Balliu, M., Dam, M., Le Guernic, G.: Epistemic temporal logic for information flow security. In: PLAS (2011)","DOI":"10.1145\/2166956.2166962"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Banerjee, A., Naumann, D.A., Rosenberg, S.: Expressive declassification policies and modular static enforcement. In: S&P (2008)","DOI":"10.1109\/SP.2008.20"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Bao, T., Zheng, Y., Lin, Z., Zhang, X., Xu, D.: Strict control dependence and its effect on dynamic information flow analyses. In: ISSTA (2010)","DOI":"10.1145\/1831708.1831711"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-642-30793-5_12","volume-title":"Formal Techniques for Distributed Systems","author":"G Barthe","year":"2012","unstructured":"Barthe, G., Crespo, J.M., Devriese, D., Piessens, F., Rivas, E.: Secure multi-execution through static program transformation. In: Giese, H., Rosu, G. (eds.) FMOODS\/FORTE -2012. LNCS, vol. 7273, pp. 186\u2013202. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-30793-5_12"},{"key":"9_CR13","first-page":"1207","volume":"21","author":"G Barthe","year":"2011","unstructured":"Barthe, G., D\u2019Argenio, P.R., Rezk, T.: Secure information flow by self-composition. MSCS 21, 1207\u20131252 (2011)","journal-title":"MSCS"},{"key":"9_CR14","unstructured":"We are family: relating information flow trackers (Extended Version). http:\/\/www.cse.chalmers.se\/research\/group\/security\/family"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-35182-2_5","volume-title":"Programming Languages and Systems","author":"L Beringer","year":"2012","unstructured":"Beringer, L.: End-to-end multilevel hybrid information flow control. In: Jhala, R., Igarashi, A. (eds.) APLAS 2012. LNCS, vol. 7705, pp. 50\u201365. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-35182-2_5"},{"key":"9_CR16","unstructured":"Biba, K.J.: Integrity considerations for secure computer systems. Technical report, MITRE Corp (1977)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-662-49635-0_3","volume-title":"Principles of Security and Trust","author":"N Bielova","year":"2016","unstructured":"Bielova, N., Rezk, T.: A taxonomy of information flow monitors. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 46\u201367. Springer, Heidelberg (2016). doi:10.1007\/978-3-662-49635-0_3"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Chudnov, A., Naumann, D.A.: Information flow monitor inlining. In: CSF (2010)","DOI":"10.1109\/CSF.2010.21"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Chugh, R., Meister, J.A., Jhala, R., Lerner, S.: Staged information flow for javascript. In: PLDI (2009)","DOI":"10.1145\/1542476.1542483"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/978-3-540-32004-3_20","volume-title":"Security in Pervasive Computing","author":"\u00c1 Darvas","year":"2005","unstructured":"Darvas, \u00c1., H\u00e4hnle, R., Sands, D.: A theorem proving approach to analysis of secure information flow. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 193\u2013209. Springer, Heidelberg (2005). doi:10.1007\/978-3-540-32004-3_20"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20, 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Devriese, D., Piessens, F.: Noninterference through secure multi-execution. In: S&P 2010 (2010)","DOI":"10.1109\/SP.2010.15"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-3-642-27940-9_12","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"R Dimitrova","year":"2012","unstructured":"Dimitrova, R., Finkbeiner, B., Kov\u00e1cs, M., Rabe, M.N., Seidl, H.: Model checking information flow in reactive systems. In: Kuncak, V., Rybalchenko, A. (eds.) VMCAI 2012. LNCS, vol. 7148, pp. 169\u2013185. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-27940-9_12"},{"key":"9_CR24","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/2619091","volume":"32","author":"W Enck","year":"2014","unstructured":"Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. 32, 5 (2014)","journal-title":"ACM Trans. Comput. Syst."},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Ernst, M.D., Just, R., Millstein, S., Dietl, W., Pernsteiner, S., Roesner, F., Koscher, K., Barros, P.B., Bhoraskar, R., Han, S., Vines, P., Wu, E.X.: Collaborative verification of information flow for a high-assurance app. store. In: CCS (2014)","DOI":"10.1145\/2660267.2660343"},{"issue":"2","key":"9_CR26","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1093\/comjnl\/17.2.143","volume":"17","author":"JS Fenton","year":"1974","unstructured":"Fenton, J.S.: Memoryless subsystems. Comput. J. 17(2), 143\u2013147 (1974)","journal-title":"Comput. J."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Giacobazzi, R., Mastroeni, I.: Abstract non-interference: parameterizing non-interference by abstract interpretation. In: POPL (2004)","DOI":"10.1145\/964001.964017"},{"key":"9_CR28","doi-asserted-by":"crossref","unstructured":"Goguen, J.A., Meseguer, J.: Security policies and security models. In: S&P (1982)","DOI":"10.1109\/SP.1982.10014"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Gordon, M.I., Kim, D., Perkins, J.H., Gilham, L., Nguyen, N., Rinard, M.C.: Information flow analysis of android applications in droidsafe. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23089"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in javaScript and its APIs. In: SAC (2014)","DOI":"10.1145\/2554850.2554909"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Hedin, D., Bello, L., Sabelfeld, A.: Value-sensitive hybrid information flow control for a javascript-like language. In: CSF (2015)","DOI":"10.1109\/CSF.2015.31"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Hunt, S., Sands, D.: On flow-sensitive security types. In: POPL, pp. 79\u201390 (2006)","DOI":"10.1145\/1111320.1111045"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Jang, D., Jhala, R., Lerner, S., Shacham, H.: An empirical study of privacy-violating information flows in javaScript web applications. In: CCS (2010)","DOI":"10.1145\/1866307.1866339"},{"key":"9_CR34","unstructured":"Kang, M.G., McCamant, S., Poosankam, P., Song, D.: DTA++: dynamic taint analysis with targeted control-flow propagation. In: NDSS (2011)"},{"key":"9_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-89862-7_4","volume-title":"Information Systems Security","author":"D King","year":"2008","unstructured":"King, D., Hicks, B., Hicks, M., Jaeger, T.: Implicit flows: can\u2019t live with \u2018Em, can\u2019t live without \u2018Em. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 56\u201370. Springer, Heidelberg (2008). doi:10.1007\/978-3-540-89862-7_4"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Le Guernic, G.: Confidentiality enforcement using dynamic information flow analyses. Ph.D. thesis, Kansas State University (2007)","DOI":"10.1007\/978-3-540-76929-3_4"},{"key":"9_CR37","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/j.cose.2011.10.002","volume":"31","author":"J Magazinius","year":"2010","unstructured":"Magazinius, J., Russo, A., Sabelfeld, A.: On-the-fly inlining of dynamic security monitors. Comput. Secur. 31, 827\u2013843 (2010)","journal-title":"Comput. Secur."},{"key":"9_CR38","unstructured":"McLean, J.: A general theory of composition for trace sets closed under selective interleaving functions. In: S&P (1994)"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Moore, S., Chong, S.: Static analysis for efficient hybrid information-flow control. In: CSF (2011)","DOI":"10.1109\/CSF.2011.17"},{"key":"9_CR40","first-page":"6","volume":"35","author":"A Nanevski","year":"2013","unstructured":"Nanevski, A., Banerjee, A., Garg, D.: Dependent type theory for verification of information flow and access control policies. ACM Trans. Program. Lang. 35, 6 (2013)","journal-title":"ACM Trans. Program. Lang."},{"key":"9_CR41","unstructured":"https:\/\/f-droid.org\/repository\/browse\/?fdid=name.bagi.levente.pedometer"},{"key":"9_CR42","unstructured":"Russo, A., Sabelfeld, A., Li, K.: Implicit flows in malicious and nonmalicious code. Marktoberdorf Summer School (IOS Press) (2009)"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. static flow-sensitive security analysis. In: CSF (2010)","DOI":"10.1109\/CSF.2010.20"},{"key":"9_CR44","first-page":"5","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. JSAC 21, 5\u201319 (2003)","journal-title":"JSAC"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Schoepe, D., Balliu, M., Pierce, B.C., Sabelfeld, A.: Explicit secrecy: a policy for taint tracking. In: EuroS&P (2016)","DOI":"10.1109\/EuroSP.2016.14"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Schoepe, D., Balliu, M., Piessens, F., Sabelfeld, A.: Let\u2019s face it: faceted values for taint tracking. In: ESORICS (2016)","DOI":"10.1007\/978-3-319-45744-4_28"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Schwartz, E.J., Avgerinos, T., Brumley, D.: All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In: S&P 2010 (2010)","DOI":"10.1109\/SP.2010.26"},{"key":"9_CR48","doi-asserted-by":"crossref","unstructured":"Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: CSF (2007)","DOI":"10.1109\/CSF.2007.20"},{"key":"9_CR49","unstructured":"SnoopWall: Flashlight Apps Threat Assessment Report (2014). https:\/\/www.snoopwall.com\/reports"},{"key":"9_CR50","unstructured":"Staicu, C., Pradel, M.: An empirical study of implicit information flow (2015). poster at PLDI. https:\/\/www.informatik.tu-darmstadt.de\/fileadmin\/user_upload\/Group_SOLA\/Papers\/poster-pldi2015-src.pdf"},{"key":"9_CR51","unstructured":"(2015). http:\/\/www.heartbleed.com"},{"key":"9_CR52","doi-asserted-by":"crossref","unstructured":"Tripp, O., Ferrara, P., Pistoia, M.: Hybrid security analysis of web javascript code via dynamic partial evaluation. In: ISSTA (2014)","DOI":"10.1145\/2610384.2610385"},{"key":"9_CR53","unstructured":"Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., Vachharajani, M., August, D.I.: RIFLE: an architectural framework for user-centric information-flow security. In: MICRO (2004)"},{"key":"9_CR54","unstructured":"Vall\u00e9e-Rai, R., Co, P., Gagnon, E., Hendren, L.J., Lam, P., Sundaresan, V.: Soot - a java bytecode optimization framework. In: CASCR (1999)"},{"key":"9_CR55","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11935308_24","volume-title":"Information and Communications Security","author":"VN Venkatakrishnan","year":"2006","unstructured":"Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 332\u2013351. Springer, Heidelberg (2006). doi:10.1007\/11935308_24"},{"key":"9_CR56","doi-asserted-by":"publisher","first-page":"167","DOI":"10.3233\/JCS-1996-42-304","volume":"4","author":"D Volpano","year":"1996","unstructured":"Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis. JCS 4, 167\u2013187 (1996)","journal-title":"JCS"},{"key":"9_CR57","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-48294-6_20","volume-title":"Static Analysis","author":"D Volpano","year":"1999","unstructured":"Volpano, D.: Safety versus secrecy. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol. 1694, pp. 303\u2013311. Springer, Heidelberg (1999). doi:10.1007\/3-540-48294-6_20"},{"key":"9_CR58","unstructured":"Zdancewic, S.A.: Programming languages for information security. Ph.D. thesis, Cornell University, Ithaca, NY, USA (2002)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66402-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T00:03:36Z","timestamp":1660521816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-66402-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319664019","9783319664026"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66402-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"12 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oslo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/deic.uab.cat\/conferences\/dpm\/dpm2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}