{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T04:13:35Z","timestamp":1742789615260,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287558"},{"type":"electronic","value":"9783642287565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28756-5_10","type":"book-chapter","created":{"date-parts":[[2012,3,22]],"date-time":"2012-03-22T20:57:15Z","timestamp":1332449835000},"page":"126-140","source":"Crossref","is-referenced-by-count":7,"title":["Aspect-Oriented Runtime Monitor Certification"],"prefix":"10.1007","author":[{"given":"Kevin W.","family":"Hamlen","sequence":"first","affiliation":[]},{"given":"Micah M.","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Meera","family":"Sridhar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-68237-0_19","volume-title":"FM 2008: Formal Methods","author":"I. Aktug","year":"2008","unstructured":"Aktug, I., Dam, M., Gurov, D.: Provably Correct Runtime Monitoring. In: Cuellar, J., Sere, K. (eds.) FM 2008. LNCS, vol.\u00a05014, pp. 262\u2013277. Springer, Heidelberg (2008)"},{"key":"10_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.scico.2008.09.004","volume":"74","author":"I. Aktug","year":"2008","unstructured":"Aktug, I., Naliuka, K.: ConSpec - a formal language for policy specification. Science of Comput. Prog.\u00a074, 2\u201312 (2008)","journal-title":"Science of Comput. Prog."},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/BF01782772","volume":"2","author":"B. Alpern","year":"1986","unstructured":"Alpern, B., Schneider, F.B.: Recognizing safety and liveness. Distributed Computing\u00a02, 117\u2013126 (1986)","journal-title":"Distributed Computing"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/978-3-540-31980-1_36","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"F. Chen","year":"2005","unstructured":"Chen, F., Ro\u015fu, G.: Java-MOP: A Monitoring Oriented Programming Environment for Java. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 546\u2013550. Springer, Heidelberg (2005)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proc. Sym. on Principles of Prog. Lang., pp. 234\u2013252 (1977)","DOI":"10.1145\/512950.512973"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1007\/978-3-642-03013-0_25","volume-title":"ECOOP 2009 \u2013 Object-Oriented Programming","author":"M. Dam","year":"2009","unstructured":"Dam, M., Jacobs, B., Lundblad, A., Piessens, F.: Security Monitor Inlining for Multithreaded Java. In: Drossopoulou, S. (ed.) ECOOP 2009. LNCS, vol.\u00a05653, pp. 546\u2013569. Springer, Heidelberg (2009)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Dantas, D.S., Walker, D.: Harmless advice. In: Proc.\u00a0ACM Sym. on Principles of Prog. Lang. (POPL), pp. 383\u2013396 (2006)","DOI":"10.1145\/1111320.1111071"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Dantas, D.S., Walker, D., Washburn, G., Weirich, S.: AspectML: A polymorphic aspect-oriented functional programming language. ACM Trans.\u00a0Prog. Lang. and Systems\u00a030(3) (2008)","DOI":"10.1145\/1353445.1353448"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"DeVries, B.W., Gupta, G., Hamlen, K.W., Moore, S., Sridhar, M.: ActionScript bytecode verification with co-logic programming. In: Proc. ACM Workshop on Prog. Lang. and Analysis for Security (PLAS), pp. 9\u201315 (2009)","DOI":"10.1145\/1554339.1554342"},{"key":"10_CR10","unstructured":"Erlingsson, \u00da.: The Inlined Reference Monitor Approach to Security Policy Enforcement. Ph.D. thesis, Cornell University, Ithaca, New York (2004)"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Schneider, F.B.: SASI enforcement of security policies: A retrospective. In: Proc. New Security Paradigms Workshop (NSPW), pp. 87\u201395 (1999)","DOI":"10.1145\/335169.335201"},{"key":"10_CR12","unstructured":"FileInfo.com: Executable file types (2011), http:\/\/www.fileinfo.com\/filetypes\/executable"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Flatt, M., Krishnamurthi, S., Felleisen, M.: Classes and mixins. In: Proc. ACM Sym. on Principles of Prog. Lang. (POPL), pp. 171\u2013183 (1998)","DOI":"10.1145\/268946.268961"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Jones, M.: Aspect-oriented in-lined reference monitors. In: Proc. ACM Workshop on Prog. Lang. and Analysis for Security (PLAS), pp. 11\u201320 (2008)","DOI":"10.1145\/1375696.1375699"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Jones, M.M., Sridhar, M.: Chekov: Aspect-oriented runtime monitor certification via model-checking (extended version). Tech. rep., Dept. of Comput. Science, U. Texas at Dallas (May 2011)","DOI":"10.1007\/978-3-642-28756-5_10"},{"issue":"6","key":"10_CR16","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1016\/j.csi.2009.04.004","volume":"31","author":"K.W. Hamlen","year":"2009","unstructured":"Hamlen, K.W., Mohan, V., Masud, M.M., Khan, L., Thuraisingham, B.: Exploiting an antivirus interface. Comput. Standards & Interfaces J.\u00a031(6), 1182\u20131189 (2009)","journal-title":"Comput. Standards & Interfaces J."},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Certified in-lined reference monitoring on. NET. In: Proc. ACM Workshop on Prog. Lang. and Analysis for Security (PLAS), pp. 7\u201316 (2006)","DOI":"10.1145\/1134744.1134748"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1145\/1111596.1111601","volume":"28","author":"K.W. Hamlen","year":"2006","unstructured":"Hamlen, K.W., Morrisett, G., Schneider, F.B.: Computability classes for enforcement mechanisms. ACM Trans. Prog. Lang. and Systems\u00a028(1), 175\u2013205 (2006)","journal-title":"ACM Trans. Prog. Lang. and Systems"},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Jaffar, J., Maher, M.J.: Constraint logic programming: A survey. J. Log. Program., 503\u2013581 (1994)","DOI":"10.1016\/0743-1066(94)90033-7"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Jones, M., Hamlen, K.W.: Enforcing IRM security policies: Two case studies. In: Proc.\u00a0IEEE Intelligence and Security Informatics (ISI) Conf., pp. 214\u2013216 (2009)","DOI":"10.1109\/ISI.2009.5137306"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Jones, M., Hamlen, K.W.: Disambiguating aspect-oriented policies. In: Proc.\u00a0Int. Conf. on Aspect-Oriented Software Development (AOSD), pp. 193\u2013204 (2010)","DOI":"10.1145\/1739230.1739253"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"G. Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Lee, S.H. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, pp. 327\u2013353. Springer, Heidelberg (2001)"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Li, Z., Wang, X.: FIRM: Capability-based inline mediation of Flash behaviors. In: Proc. Annual Comput. Security Applications Conf. (ACSAC), pp. 181\u2013190 (2010)","DOI":"10.1145\/1920261.1920289"},{"key":"10_CR24","unstructured":"Ligatti, J.A.: Policy Enforcement via Program Monitoring. Ph.D. thesis, Princeton University, Princeton, New Jersey (2006)"},{"issue":"1-2","key":"10_CR25","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10207-004-0046-8","volume":"4","author":"J. Ligatti","year":"2005","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Edit automata: Enforcement mechanisms for run-time security policies. Int. J. Information Security\u00a04(1-2), 2\u201316 (2005)","journal-title":"Int. J. Information Security"},{"key":"10_CR26","doi-asserted-by":"crossref","unstructured":"Ligatti, J., Bauer, L., Walker, D.: Run-time enforcement of nonsafety policies. ACM Trans. Information and Systems Security\u00a012(3) (2009)","DOI":"10.1145\/1455526.1455532"},{"issue":"1","key":"10_CR27","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/353323.353382","volume":"3","author":"F.B. Schneider","year":"2000","unstructured":"Schneider, F.B.: Enforceable security policies. ACM Trans. Information and Systems Security\u00a03(1), 30\u201350 (2000)","journal-title":"ACM Trans. Information and Systems Security"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Shah, V., Hill, F.: An aspect-oriented security framework. In: Proc.\u00a0DARPA Information Survivability Conf. and Exposition, vol.\u00a02 (2003)","DOI":"10.1109\/DISCEX.2003.1194952"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-11503-5_13","volume-title":"Practical Aspects of Declarative Languages","author":"M. Sridhar","year":"2010","unstructured":"Sridhar, M., Hamlen, K.W.: ActionScript In-Lined Reference Monitoring in Prolog. In: Carro, M., Pe\u00f1a, R. (eds.) PADL 2010. LNCS, vol.\u00a05937, pp. 149\u2013151. Springer, Heidelberg (2010)"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-642-11319-2_23","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"M. Sridhar","year":"2010","unstructured":"Sridhar, M., Hamlen, K.W.: Model-Checking In-Lined Reference Monitors. In: Barthe, G., Hermenegildo, M. (eds.) VMCAI 2010. LNCS, vol.\u00a05944, pp. 312\u2013327. Springer, Heidelberg (2010)"},{"key":"10_CR31","doi-asserted-by":"crossref","unstructured":"Sridhar, M., Hamlen, K.W.: Flexible in-lined reference monitor certification: Challenges and future directions. In: Proc. ACM Workshop on Prog. Lang. meets Program Verification (PLPV), pp. 55\u201360 (2011)","DOI":"10.1145\/1929529.1929537"},{"key":"10_CR32","unstructured":"Viega, J., Bloch, J.T., Chandra, P.: Applying aspect-oriented programming to security. Cutter IT J.\u00a014(2) (2001)"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Walker, D.: A type system for expressive security policies. In: Proc. of ACM Sym. on Principles of Prog. Lang. (POPL) (2000)","DOI":"10.1145\/325694.325728"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28756-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T18:53:17Z","timestamp":1742755997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28756-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287558","9783642287565"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28756-5_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}