{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:10:27Z","timestamp":1760044227199,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044434"},{"type":"electronic","value":"9783642044441"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04444-1_6","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T14:34:44Z","timestamp":1252938884000},"page":"86-103","source":"Crossref","is-referenced-by-count":25,"title":["Tracking Information Flow in Dynamic Tree Structures"],"prefix":"10.1007","author":[{"given":"Alejandro","family":"Russo","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Sabelfeld","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Chudnov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-540-88313-5_22","volume-title":"Computer Security - ESORICS 2008","author":"A. Askarov","year":"2008","unstructured":"Askarov, A., Hunt, S., Sabelfeld, A., Sands, D.: Termination-insensitive noninterference leaks more than just a bit. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 333\u2013348. Springer, Heidelberg (2008)"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Askarov, A., Sabelfeld, A.: Tight enforcement of information-release policies for dynamic languages. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)","DOI":"10.1109\/CSF.2009.22"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proc. ACM Workshop on Programming Languages and Analysis for Security (PLAS) (June 2009)","DOI":"10.1145\/1554339.1554353"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1007\/978-3-642-01465-9_2","volume-title":"FAST 2008","author":"G. Boudol","year":"2009","unstructured":"Boudol, G.: Secure information flow as a safety property. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 20\u201334. Springer, Heidelberg (2009)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-540-70542-0_8","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"L. Cavallaro","year":"2008","unstructured":"Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.\u00a05137, pp. 143\u2013163. Springer, Heidelberg (2008)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Chandra, D., Franz, M.: Fine-grained information flow analysis and enforcement in a java virtual machine. In: Proc. Annual Computer Security Applications Conference, December 2007, pp. 463\u2013475 (2007)","DOI":"10.1109\/ACSAC.2007.37"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Chong, S., Liu, J., Myers, A.C., Qi, X., Vikram, K., Zheng, L., Zheng, X.: Secure web applications via automatic partitioning. In: Proc. ACM Symp. on Operating System Principles, October 2007, pp. 31\u201344 (2007)","DOI":"10.1145\/1323293.1294265"},{"key":"6_CR8","unstructured":"Chong, S., Vikram, K., Myers, A.C.: Sif: Enforcing confidentiality and integrity in web applications. In: Proc. USENIX Security Symposium, August 2007, pp. 1\u201316 (2007)"},{"key":"6_CR9","unstructured":"Cooper, E., Lindley, S., Wadler, P., Yallop, J.: Links web-programming language. Software release (2006\u20132008), \n                      \n                        http:\/\/groups.inf.ed.ac.uk\/links\/"},{"key":"6_CR10","unstructured":"Crockford, D.: Making javascript safe for advertising. adsafe.org (2009)"},{"issue":"7","key":"6_CR11","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"D.E. Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Comm. of the ACM\u00a020(7), 504\u2013513 (1977)","journal-title":"Comm. of the ACM"},{"key":"6_CR12","unstructured":"Facebook. FBJS (2009), \n                      \n                        http:\/\/wiki.developers.facebook.com\/index.php\/FBJS"},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1093\/comjnl\/17.2.143","volume":"17","author":"J.S. Fenton","year":"1974","unstructured":"Fenton, J.S.: Memoryless subsystems. Computing J.\u00a017(2), 143\u2013147 (1974)","journal-title":"Computing J."},{"key":"6_CR14","unstructured":"Google. Google Chrome (2009), \n                      \n                        http:\/\/www.google.com\/chrome\/"},{"key":"6_CR15","unstructured":"Google. Google Web Toolkit (2009), \n                      \n                        http:\/\/code.google.com\/webtoolkit"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Heintze, N., Riecke, J.G.: The SLam calculus: programming with secrecy and integrity. In: Proc. ACM Symp. on Principles of Programming Languages, January 1998, pp. 365\u2013377 (1998)","DOI":"10.1145\/268946.268976"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Huang, Y.-W., Yu, F., Hang, C., Tsai, C.-H., Lee, D.-T., Kuo, S.-Y.: Securing web application code by static analysis and runtime protection. In: Proc. International Conference on World Wide Web, May 2004, pp. 40\u201352 (2004)","DOI":"10.1145\/988672.988679"},{"issue":"3","key":"6_CR18","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11416-007-0076-7","volume":"4","author":"M. Johns","year":"2008","unstructured":"Johns, M.: On JavaScript malware and related threats. Journal in Computer Virology\u00a04(3), 161\u2013178 (2008)","journal-title":"Journal in Computer Virology"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Kikuchi, H., Yu, D., Chander, A., Inamura, H., Serikov, I.: Javascript instrumentation in practice. In: APLAS, pp. 326\u2013341 (2008)","DOI":"10.1007\/978-3-540-89330-1_23"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Le Guernic, G.: Automaton-based confidentiality monitoring of concurrent programs. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 218\u2013232 (2007)","DOI":"10.1109\/CSF.2007.10"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-77505-8_7","volume-title":"Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues","author":"G. Guernic Le","year":"2008","unstructured":"Le Guernic, G., Banerjee, A., Jensen, T., Schmidt, D.A.: Automata-based confidentiality monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol.\u00a04435, pp. 75\u201389. Springer, Heidelberg (2008)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"McCamant, S., Ernst, M.D.: Quantitative information flow as network flow capacity. In: Proc. ACM SIGPLAN Conference on Programming language Design and Implementation, pp. 193\u2013205 (2008)","DOI":"10.1145\/1379022.1375606"},{"key":"6_CR23","unstructured":"Miller, M., Samuel, M., Laurie, B., Awad, I., Stay, M.: Caja: Safe active content in sanitized javascript (2008)"},{"key":"6_CR24","unstructured":"Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: Java information flow. Software release (July 2001-2009), \n                      \n                        http:\/\/www.cs.cornell.edu\/jif"},{"key":"6_CR25","unstructured":"Netscape. Using data tainting for security (2006), \n                      \n                        http:\/\/wp.netscape.com\/eng\/mozilla\/3.0\/handbook\/javascript\/advtopic.htm"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Pottier, F., Simonet, V.: Information flow inference for ML. In: Proc. ACM Symp. on Principles of Programming Languages, January 2002, pp. 319\u2013330 (2002)","DOI":"10.1145\/565816.503302"},{"key":"6_CR27","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/1411286.1411289","volume-title":"Proc. ACM SIGPLAN Symposium on Haskell","author":"A. Russo","year":"2008","unstructured":"Russo, A., Claessen, K., Hughes, J.: A library for light-weight information-flow security in Haskell. In: Proc. ACM SIGPLAN Symposium on Haskell, pp. 13\u201324. ACM Press, New York (2008)"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Securing timeout instructions in web applications. In: Proc. IEEE Computer Security Foundations Symposium (July 2009)","DOI":"10.1109\/CSF.2009.16"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A., Chudnov, A.: Tracking information flow in dynamic tree structures (2009), \n                      \n                        http:\/\/www.cse.chalmers.se\/~russo\/domsec\/","DOI":"10.1007\/978-3-642-04444-1_6"},{"issue":"1","key":"6_CR30","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE J. Selected Areas in Communications"},{"key":"6_CR31","doi-asserted-by":"crossref","unstructured":"Sabelfeld, A., Russo, A.: From dynamic to static and back: Riding the roller coaster of information-flow control research. In: PSI 2009. LNCS. Springer, Heidelberg (to appear)","DOI":"10.1007\/978-3-642-11486-1_30"},{"key":"6_CR32","doi-asserted-by":"crossref","unstructured":"Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proc. IEEE Computer Security Foundations Symposium, July 2007, pp. 203\u2013217 (2007)","DOI":"10.1109\/CSF.2007.20"},{"key":"6_CR33","unstructured":"Simonet, V.: The Flow Caml system. Software release (July 2003), \n                      \n                        http:\/\/cristal.inria.fr\/~simonet\/soft\/flowcaml"},{"key":"6_CR34","doi-asserted-by":"crossref","unstructured":"Swamy, N., Corcoran, B.J., Hicks, M.: Fable: A language for enforcing user-defined security policies. In: Proc. IEEE Symp. on Security and Privacy, May 2008, pp. 369\u2013383 (2008)","DOI":"10.1109\/SP.2008.29"},{"key":"6_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1007\/11935308_24","volume-title":"Information and Communications Security","author":"V.N. Venkatakrishnan","year":"2006","unstructured":"Venkatakrishnan, V.N., Xu, W., DuVarney, D.C., Sekar, R.: Provably correct runtime enforcement of non-interference properties. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 332\u2013351. Springer, Heidelberg (2006)"},{"key":"6_CR36","unstructured":"Vogt, P., Nentwich, F., Jovanovic, N., Kirda, E., Kruegel, C., Vigna, G.: Cross-site scripting prevention with dynamic data tainting and static analysis. In: Proc. Network and Distributed System Security Symposium (February 2007)"},{"key":"6_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/3-540-48294-6_20","volume-title":"Static Analysis","author":"D. Volpano","year":"1999","unstructured":"Volpano, D.: Safety versus secrecy. In: Cortesi, A., Fil\u00e9, G. (eds.) SAS 1999. LNCS, vol.\u00a01694, pp. 303\u2013311. Springer, Heidelberg (1999)"},{"key":"6_CR38","unstructured":"Wood, L.: Document Object Model (DOM) Level 1 Specification (1998), \n                      \n                        http:\/\/www.w3.org\/TR\/REC-DOM-Level-1\/"},{"key":"6_CR39","first-page":"237","volume-title":"Proc. ACM Symp. on Principles of Programming Languages","author":"D. Yu","year":"2007","unstructured":"Yu, D., Chander, A., Islam, N., Serikov, I.: JavaScript instrumentation for browser security. In: Proc. ACM Symp. on Principles of Programming Languages, pp. 237\u2013249. ACM Press, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2009"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04444-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:17:12Z","timestamp":1559506632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04444-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044434","9783642044441"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04444-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}