{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T12:15:32Z","timestamp":1725624932999},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642338250"},{"type":"electronic","value":"9783642338267"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33826-7_26","type":"book-chapter","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T22:46:25Z","timestamp":1348613185000},"page":"367-381","source":"Crossref","is-referenced-by-count":3,"title":["A Low-Overhead, Value-Tracking Approach to Information Flow Security"],"prefix":"10.1007","author":[{"given":"Kostyantyn","family":"Vorobyov","sequence":"first","affiliation":[]},{"given":"Padmanabhan","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Stocks","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"clang: a C language family frontend for LLVM (March 2012), http:\/\/clang.llvm.org","key":"26_CR1"},{"doi-asserted-by":"crossref","unstructured":"Austin, T.H., Flanagan, C.: Efficient purely-dynamic information flow analysis. In: Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security, PLAS 2009, pp. 113\u2013124. ACM (2009)","key":"26_CR2","DOI":"10.1145\/1554339.1554353"},{"unstructured":"Lattner, C., Adve, V.: LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In: Proceedings of the 2004 International Symposium on Code Generation and Optimization, Palo Alto, California (March 2004)","key":"26_CR3"},{"key":"26_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-77505-8_7","volume-title":"Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues","author":"G. Le Guernic","year":"2008","unstructured":"Le Guernic, G., Banerjee, A., Jensen, T.P., Schmidt, D.A.: Automata-Based Confidentiality Monitoring. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol.\u00a04435, pp. 75\u201389. Springer, Heidelberg (2008)"},{"issue":"8","key":"26_CR5","first-page":"707","volume":"10","author":"V.I. Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady\u00a010(8), 707\u2013710 (1966)","journal-title":"Soviet Physics Doklady"},{"doi-asserted-by":"crossref","unstructured":"Ma, W., Campbell, J., Tran, D., Kleeman, D.: Password entropy and password quality. In: International Conference on Network and System Security, pp. 583\u2013587 (2010)","key":"26_CR6","DOI":"10.1109\/NSS.2010.18"},{"key":"26_CR7","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-15257-3_16","volume-title":"Security and Privacy \u2013 Silver Linings in the Cloud","author":"J. Magazinius","year":"2010","unstructured":"Magazinius, J., Russo, A., Sabelfeld, A.: On-the-fly Inlining of Dynamic Security Monitors. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) SEC 2010. IFIP AICT, vol.\u00a0330, pp. 173\u2013186. Springer, Heidelberg (2010)"},{"doi-asserted-by":"crossref","unstructured":"Qin, F., Wang, C., Li, Z., Kim, H., Zhou, Y., Wu, Y.: Lift: A low-overhead practical information flow tracking system for detecting security attacks. In: 39th Annual IEEE\/ACM International Symposium on Microarchitecture, Orlando, Florida, USA, pp. 135\u2013148 (December 2006)","key":"26_CR8","DOI":"10.1109\/MICRO.2006.29"},{"doi-asserted-by":"crossref","unstructured":"Russo, A., Sabelfeld, A.: Dynamic vs. static flow-sensitive security analysis. In: Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, pp. 186\u2013199. IEEE (2010)","key":"26_CR9","DOI":"10.1109\/CSF.2010.20"},{"issue":"1","key":"26_CR10","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A. Sabelfeld","year":"2003","unstructured":"Sabelfeld, A., Myers, A.: Language-based information-flow security. IEEE Journal on Selected Areas in Communications\u00a021(1), 5\u201319 (2003)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"doi-asserted-by":"crossref","unstructured":"Shroff, P., Smith, S.F., Thober, M.: Dynamic dependency monitoring to secure information flow. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium, CSF 2007, pp. 203\u2013217. IEEE (2007)","key":"26_CR11","DOI":"10.1109\/CSF.2007.20"},{"doi-asserted-by":"crossref","unstructured":"Smith, G.: Principles of secure information flow analysis. In: Christodorescu, M., Jha, S., Maughan, D., Song, D., Wang, C. (eds.) Malware Detection, Advances in Information Security, vol.\u00a027, pp. 291\u2013307. Springer US (2007)","key":"26_CR12","DOI":"10.1007\/978-0-387-44599-1_13"},{"doi-asserted-by":"crossref","unstructured":"Winskel, G.: The formal semantics of programming languages - an introduction. Foundation of computing series. MIT Press (1993)","key":"26_CR13","DOI":"10.7551\/mitpress\/3054.001.0001"},{"doi-asserted-by":"crossref","unstructured":"Yip, A., Wang, X., Zeldovich, N., Kaashoek, M.F.: Improving application security with data flow assertions. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, SOSP 2009, pp. 291\u2013304. ACM (2009)","key":"26_CR14","DOI":"10.1145\/1629575.1629604"},{"key":"26_CR15","first-page":"75","volume-title":"Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, CODASPY 2011","author":"J. Yu","year":"2011","unstructured":"Yu, J., Zhang, S., Liu, P., Li, Z.: Leakprober: a framework for profiling sensitive data leakage paths. In: Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 75\u201384. ACM, New York (2011)"},{"issue":"2-3","key":"26_CR16","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10207-007-0019-9","volume":"6","author":"L. Zheng","year":"2007","unstructured":"Zheng, L., Myers, A.C.: Dynamic security labels and static information flow control. International Journal of Information Security\u00a06(2-3), 67\u201384 (2007)","journal-title":"International Journal of Information Security"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33826-7_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:22:15Z","timestamp":1620130935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33826-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642338250","9783642338267"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33826-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}