{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:33:08Z","timestamp":1725564788141},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540407966"},{"type":"electronic","value":"9783540452133"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45213-3_2","type":"book-chapter","created":{"date-parts":[[2010,9,4]],"date-time":"2010-09-04T01:44:48Z","timestamp":1283564688000},"page":"12-22","source":"Crossref","is-referenced-by-count":0,"title":["Safe Code \u2013 It\u2019s Not Just for Applets Anymore"],"prefix":"10.1007","author":[{"given":"Michael","family":"Franz","sequence":"first","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Austin, T.M., Breach, S.E., Sohi, G.S.: Efficient Detection of All Pointer and Array Access Errors. In: Proceedings of the ACM SIGPLAN 1994 Conference on Programming Language Design and Implementation (PLDI), Orlando, Florida, June 20\u201324. SIGPLAN Notices, vol.\u00a029(6) (1994)","key":"2_CR1","DOI":"10.1145\/178243.178446"},{"unstructured":"Amme, W., Dalton, N., Frohlich, P.H., Haldar, V., Hous el, P.S., von Ronn, J., Stork, C.H., Zhenochin, S., Franz, M.: Project transPROse: Reconciling Mobile-Code Security with Execution Efficiency. In: DARPA Information Survivability Conference and Exposition (June 2001)","key":"2_CR2"},{"doi-asserted-by":"crossref","unstructured":"Amme, W., Dalton, N., von Ronne, J., Franz, M.: SafeTSA: A type safe and referentially secure mobile-code representation based on sta tic single assignment form. In: Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation, May 2001. SIGPLAN Notices, vol.\u00a036(5), pp. 137\u2013147 (May 2001)","key":"2_CR3","DOI":"10.1145\/378795.378825"},{"unstructured":"Defense Advanced Research Project Agency. Program Composition of Embedded Systems (PCES), SOL BAA 02-25 (2002), http:\/\/www.darpa.mil\/baa\/baa02-25.htm","key":"2_CR4"},{"unstructured":"BSD. Trusted BSD Project, http:\/\/www.trustedbsd.org\/","key":"2_CR5"},{"unstructured":"CERT Advisories (2001), http:\/\/www.cert.org\/advisories","key":"2_CR6"},{"unstructured":"Cowan, C., Pu, C., Maier, D., Walpole, J., Bakke, P., Beattie, S., Grier, A., Wagle, P., Zhang, Q., Hinton, H.: StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. In: Proceedings of the 7th USENIX Security Conference, San Antonio, Texas, January 1998, pp. 63\u201378 (1998)","key":"2_CR7"},{"unstructured":"Debian. Trusted Debian Project, http:\/\/www.trusteddebian.org\/","key":"2_CR8"},{"doi-asserted-by":"crossref","unstructured":"DeLine, R., F\u00e4hndrich, M.: Enforcing High-Level Protocols in Low-Level Software. In: Proceedings of the ACMSIGPLAN 2001 Conference on Programming Language Design and Implementation PLD 2001, May 2001. SIGPLAN Notices, vol.\u00a036(5), pp. 59\u201369 (2001)","key":"2_CR9","DOI":"10.1145\/381694.378811"},{"doi-asserted-by":"crossref","unstructured":"Engler, D., Chelf, B., Chou, A., Hallem, S.: Checking system rules using system-specific, programmer-written compiler extensions. In: Symposium on Operating Systems Design and Implementation (OSDI 2000), San Diego, CA, October 23\u201325 (2000)","key":"2_CR10","DOI":"10.21236\/ADA419626"},{"key":"2_CR11","series-title":"ACM SIGSAC","first-page":"87","volume-title":"New Security Paradigms Workshop","author":"U. Erlingsson","year":"1999","unstructured":"Erlingsson, U., Schneider, F.B.: SASI Enforcement of Security Policies: A Retrospective. In: New Security Paradigms Workshop, Ontario, Canada. ACM SIGSAC, pp. 87\u201395. ACM Press, New York (1999)"},{"doi-asserted-by":"crossref","unstructured":"Franz, M., Chandra, D., Gal, A., Haldar, V., Reig, F., Wang, N.: Aportable virtual machine target for proof-carrying code. In: Proceedings of the ACM SIGPLAN 2003 Workshop on Interpreters, Virtual Machines and Emulators (IVME 2003), San Diego, California (June 2003)","key":"2_CR12","DOI":"10.1145\/858570.858573"},{"doi-asserted-by":"crossref","unstructured":"Haldar, V., Stork, C.H., Franz, M.: The Source is the Proof. In: New Security Paradigms Workshop (September 2002)","key":"2_CR13","DOI":"10.1145\/844102.844114"},{"doi-asserted-by":"crossref","unstructured":"Kozen, D.: Language-Based Security. Mathematical Foundations of Computer Science, 284\u2013298 (1999)","key":"2_CR14","DOI":"10.1007\/3-540-48340-3_26"},{"key":"2_CR15","series-title":"The Java Series","volume-title":"The JavaVirtual Machine Specification","author":"T. Lindholm","year":"1999","unstructured":"Lindholm, T., Yellin, F.: The JavaVirtual Machine Specification, 2nd edn. The Java Series. Addison Wesley Longman, Inc., Amsterdam (1999)","edition":"2"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/BFb0055511","volume-title":"Types in Compilation","author":"G. Morrisett","year":"1998","unstructured":"Morrisett, G., Crary, K., Glew, N., Walker, D.W.: Stack-Based Typed Assembly Language. In: Leroy, X., Ohori, A. (eds.) TIC 1998. LNCS, vol.\u00a01473, pp. 28\u201352. Springer, Heidelberg (1998)"},{"unstructured":"Meijer, E., Gough, J.: Technical Overview of the Common Language Runtime (2001), http:\/\/research.microsoft.com\/~emeijer\/papers\/clr.pdf","key":"2_CR17"},{"unstructured":"Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The Spread of the Sapphire\/Slammer Worm (2003), http:\/\/www.silicondefense.com\/research\/sapphire\/","key":"2_CR18"},{"issue":"3","key":"2_CR19","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1145\/319301.319345","volume":"21","author":"G. Morrisett","year":"1999","unstructured":"Morrisett, G., Walker, D., Crary, K., Glew, N.: From System F to Typed Assembly Language. ACM Transactions on Programming Languages and Systems\u00a021(3), 527\u2013568 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: Practical Mostly-Static Information Flow Control. In: Conference Record of POPL 1999: The 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Antonio, Texas, January 20\u201322, pp. 228\u2013241 (1999)","key":"2_CR20","DOI":"10.1145\/292540.292561"},{"doi-asserted-by":"crossref","unstructured":"Necula, G.C.: Proof-Carrying Code. In: Conference Record of POPL 1997: The 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Paris, France, January 15\u201317, pp. 106\u2013119 (1997)","key":"2_CR21","DOI":"10.1145\/263699.263712"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/3-540-68671-1_5","volume-title":"Mobile Agents and Security","author":"G.C. Necula","year":"1998","unstructured":"Necula, G.C., Lee, P.: Safe, untrusted agents using proof-carrying code. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 61\u201391. Springer, Heidelberg (1998)"},{"doi-asserted-by":"crossref","unstructured":"Necula, G., McPeak, S., Weimer, W.: CCured: Type-Safe Retrofitting of Legacy Code. In: Principles of Programming Languages (2002)","key":"2_CR23","DOI":"10.1145\/503272.503286"},{"unstructured":"National Security Agency. Security Enhanced Linux, http:\/\/www.nsa.gov\/selinux\/","key":"2_CR24"},{"doi-asserted-by":"crossref","unstructured":"Proceedings of the ACM SIGPLAN 2001 Conference on Programming Language Design and Implementation, Snowbird, Utah, June 20-22, SIGPLAN Notices, vol.\u00a036(5) (May 2001)","key":"2_CR25","DOI":"10.1145\/504359.504360"},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable Security Policies. ACM Transactions on Information and System Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Transactions on Information and System Security"},{"doi-asserted-by":"crossref","unstructured":"Schneider, F.B., Morrisett, J.G., Harper, R.: A Language-Based Approach to Security. Informatics, 86\u2013101 (2001)","key":"2_CR27","DOI":"10.1007\/3-540-44577-3_6"},{"unstructured":"Wagner, D., Foster, J.S., Brewer, E.A., Aiken, A.: A First Step towards Automated Detection of Buffer Overrun Vulnerabilities. In: Network and Distributed System Security Symposium, San Diego, CA, pp. 3\u201317 (2000)","key":"2_CR28"}],"container-title":["Lecture Notes in Computer Science","Modular Programming Languages"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45213-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T13:21:12Z","timestamp":1559568072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45213-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540407966","9783540452133"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45213-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}