{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:48:29Z","timestamp":1743007709525,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319926117"},{"type":"electronic","value":"9783319926124"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92612-4_8","type":"book-chapter","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T04:35:20Z","timestamp":1527568520000},"page":"141-160","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Information Flow Tracking for Side-Effectful Libraries"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Sj\u00f6sten","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Hedin","sequence":"additional","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,30]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: PLAS (2009)","key":"8_CR1","DOI":"10.1145\/1554339.1554353"},{"doi-asserted-by":"crossref","unstructured":"Bauer, L., Cai, S., Jia, L., Passaro, T., Stroucken, M., Tian, Y.: Run-time monitoring and formal analysis of information flows in chromium. In: NDSS. The Internet Society (2015)","key":"8_CR2","DOI":"10.14722\/ndss.2015.23295"},{"key":"8_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-54792-8_9","volume-title":"Principles of Security and Trust","author":"A Bichhawat","year":"2014","unstructured":"Bichhawat, A., Rajani, V., Garg, D., Hammer, C.: Information flow control in WebKit\u2019s JavaScript bytecode. In: Abadi, M., Kremer, S. (eds.) POST 2014. LNCS, vol. 8414, pp. 159\u2013178. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54792-8_9"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1007\/978-3-662-49635-0_3","volume-title":"Principles of Security and Trust","author":"N Bielova","year":"2016","unstructured":"Bielova, N., Rezk, T.: A taxonomy of information flow monitors. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 46\u201367. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49635-0_3"},{"issue":"5","key":"8_CR5","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Devriese, D., Piessens, F.: Noninterference through secure multi-execution. In: S&P (2010)","key":"8_CR6","DOI":"10.1109\/SP.2010.15"},{"doi-asserted-by":"crossref","unstructured":"Dimoulas, C., Findler, R.B., Flanagan, C., Felleisen, M.: Correct blame for contracts: no more scapegoating. In: POPL (2011)","key":"8_CR7","DOI":"10.1145\/1926385.1926410"},{"doi-asserted-by":"crossref","unstructured":"Dimoulas, C., New, M.S., Findler, R.B., Felleisen, M.: Oh Lord, please don\u2019t let contracts be misunderstood (functional pearl). In: ICFP (2016)","key":"8_CR8","DOI":"10.1145\/2951913.2951930"},{"doi-asserted-by":"crossref","unstructured":"Findler, R.B., Felleisen, M.: Contracts for higher-order functions. In: ICFP (2002)","key":"8_CR9","DOI":"10.1145\/581478.581484"},{"unstructured":"File System\u2013Node.js v9.2.0 Documentation. https:\/\/nodejs.org\/api\/fs.html . Accessed Nov 2017","key":"8_CR10"},{"doi-asserted-by":"crossref","unstructured":"Greenberg, M., Pierce, B.C., Weirich, S.: Contracts made manifest. In: POPL (2010)","key":"8_CR11","DOI":"10.1145\/1706299.1706341"},{"doi-asserted-by":"crossref","unstructured":"Groef, W.D., Devriese, D., Nikiforakis, N., Piessens, F.: FlowFox: a web browser with flexible and precise information flow control. In: CCS (2012)","key":"8_CR12","DOI":"10.1145\/2382196.2382275"},{"key":"8_CR13","doi-asserted-by":"crossref","first-page":"469","DOI":"10.3233\/JCS-130495","volume":"22","author":"WD Groef","year":"2014","unstructured":"Groef, W.D., Devriese, D., Nikiforakis, N., Piessens, F.: Secure multi-execution of web scripts: theory and practice. J. Comput. Secur. 22, 469\u2013509 (2014)","journal-title":"J. Comput. Secur."},{"key":"8_CR14","doi-asserted-by":"crossref","first-page":"181","DOI":"10.3233\/JCS-160544","volume":"24","author":"D Hedin","year":"2015","unstructured":"Hedin, D., Bello, L., Sabelfeld, A.: Information-flow security for JavaScript and its APIs. J. Comput. Secur. 24, 181\u2013234 (2015)","journal-title":"J. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Hedin, D., Birgisson, A., Bello, L., Sabelfeld, A.: JSFlow: tracking information flow in JavaScript and its APIs. In: SAC (2014)","key":"8_CR15","DOI":"10.1145\/2554850.2554909"},{"doi-asserted-by":"crossref","unstructured":"Hedin, D., Sabelfeld, A.: Information-flow security for a core of JavaScript. In: CSF (2012)","key":"8_CR16","DOI":"10.1109\/CSF.2012.19"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-662-54455-6_3","volume-title":"Principles of Security and Trust","author":"D Hedin","year":"2017","unstructured":"Hedin, D., Sj\u00f6sten, A., Piessens, F., Sabelfeld, A.: A principled approach to tracking information flow in the presence of libraries. In: Maffei, M., Ryan, M. (eds.) POST 2017. LNCS, vol. 10204, pp. 49\u201370. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54455-6_3"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-662-46666-7_2","volume-title":"Principles of Security and Trust","author":"S Heule","year":"2015","unstructured":"Heule, S., Stefan, D., Yang, E.Z., Mitchell, J.C., Russo, A.: IFC inside: retrofitting languages with dynamic information flow control. In: Focardi, R., Myers, A. (eds.) POST 2015. LNCS, vol. 9036, pp. 11\u201331. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46666-7_2"},{"unstructured":"INRIA: The Coq Proof Assistant. https:\/\/coq.inria.fr\/ . Accessed Nov 2017","key":"8_CR19"},{"doi-asserted-by":"crossref","unstructured":"Kashyap, V., Wiedermann, B., Hardekopf, B.: Timing- and termination-sensitive secure information flow: exploring a new approach. In: S&P (2011)","key":"8_CR20","DOI":"10.1109\/SP.2011.19"},{"doi-asserted-by":"crossref","unstructured":"King, D., Jaeger, T., Jha, S., Seshia, S.A.: Effective blame for information-flow violations. In: FSE (2008)","key":"8_CR21","DOI":"10.1145\/1453101.1453135"},{"unstructured":"Mozilla Developer Network: Proxy. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/Proxy . Accessed Mar 2018","key":"8_CR22"},{"unstructured":"Mozilla Developer Network: RegExp. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/JavaScript\/Reference\/Global_Objects\/RegExp . Accessed Mar 2018","key":"8_CR23"},{"doi-asserted-by":"crossref","unstructured":"Rafnsson, W., Sabelfeld, A.: Secure multi-execution: fine-grained, declassification-aware, and transparent. In: CSF (2013)","key":"8_CR24","DOI":"10.1109\/CSF.2013.10"},{"issue":"1","key":"8_CR25","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2003)","journal-title":"IEEE J. Sel. Areas Commun."},{"unstructured":"Sharir, M., Pnueli, A.: Two approaches to interprocedural data flow analysis. Program Flow Analysis: Theory and Applications (1981)","key":"8_CR26"},{"unstructured":"Sj\u00f6sten, A., Hedin, D., Sabelfeld, A.: Information Flow Tracking for Side-effectful Libraries - Full version. http:\/\/www.cse.chalmers.se\/research\/group\/security\/side-effectful-libraries\/","key":"8_CR27"},{"unstructured":"Zdancewic, S.A.: Programming languages for information security. Ph.D. thesis, Cornell University (2002)","key":"8_CR28"}],"container-title":["Lecture Notes in Computer Science","Formal Techniques for Distributed Objects, Components, and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92612-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T15:04:19Z","timestamp":1571411059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92612-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319926117","9783319926124"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92612-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"FORTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Formal Techniques for Distributed Objects, Components, and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Madrid","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"forte2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.discotec.org\/cfp_forte.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}