{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:42:25Z","timestamp":1730194945141,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035367","type":"proceedings-article","created":{"date-parts":[[2020,3,16]],"date-time":"2020-03-16T23:08:51Z","timestamp":1584400131000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A Survey of In-Lined Reference Monitors: Policies, Applications and Challenges"],"prefix":"10.1109","author":[{"given":"Fadi","family":"Yilmaz","sequence":"first","affiliation":[]},{"given":"Meera","family":"Sridhar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Hacking team shows the world how not to stockpile exploits","year":"2015","author":"zetter","key":"ref39"},{"key":"ref38","article-title":"Javascript instrumentation for browser security","author":"dachuan","year":"0","journal-title":"Proc Symp Principles of Programming Languages (POPL)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.02.024"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00078"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1929529.1929537"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11319-2_23"},{"key":"ref37","article-title":"Native client: A sandbox for portable, untrusted x86 native code","author":"bennet","year":"0","journal-title":"Proc IEEE Symp Security and Privacy (S&P)"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/978-3-319-98989-1_7","article-title":"SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks","volume":"11099","author":"wenhao","year":"2018","journal-title":"Computer Security ESORICS"},{"key":"ref35","first-page":"203","article-title":"Efficient software-based fault isolation","author":"robert","year":"0","journal-title":"Proceedings of the Symposium on Operating Systems Principles (SOSP)"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360308"},{"key":"ref10","article-title":"XFI: Software guards for system address spaces","author":"erlingsson","year":"0","journal-title":"Proceedings of the Symposium on Operating Systems Design and Implementation"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/335169.335201"},{"key":"ref12","article-title":"A first look at browser-based Crypto-jacking","author":"eskandari","year":"0","journal-title":"Proceedings of the European Symposium on Security and Privacy Workshops"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21236\/ADA446967"},{"journal-title":"Policy-Directed Code Safety","year":"2000","author":"evans","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63166-6_10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1375696.1375699"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28756-5_10"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1111596.1111601"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21236\/ADA417906"},{"key":"ref28","article-title":"LUSTRE: A declarative language for programming synchronous systems","author":"pilaud","year":"0","journal-title":"Proc Symp Principles of Programming Languages (POPL)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065047"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2355847"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2008.09.004"},{"key":"ref6","first-page":"37","article-title":"Provably correct in-line monitoring for multithreaded Java-like programs","volume":"18","author":"mads","year":"2009","journal-title":"Journal of Computer Security"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_36"},{"key":"ref8","article-title":"I-ARM-Droid: A rewriting framework for in-app reference monitors for android applications","author":"benjamin","year":"0","journal-title":"Mobile Security Technologies Workshop (MoST)"},{"key":"ref7","article-title":"Security monitor in-lining for multithreated Java","author":"mads","year":"0","journal-title":"Proceedings of the European Conference on Object-Oriented Programming (ECOOP)"},{"journal-title":"Adobe Actionscript3 0 overview","year":"0","key":"ref2"},{"journal-title":"The Inlined Reference Monitor Approach to Security Policy Enforcement","year":"2004","author":"erlingsson","key":"ref9"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1609956.1609960","article-title":"Control-flow integrity principles, implementations, and applications","volume":"13","author":"martin","year":"2009","journal-title":"ACM Trans Information and System Security (TISSEC)"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1023\/B:FORM.0000017719.43755.7c","article-title":"Java-MaC: A runtime assurance approach for Java programs","volume":"24","author":"moonzoo","year":"2004","journal-title":"Formal Methods in System Design"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0046-8"},{"key":"ref21","article-title":"FIRM: Capability-based inline mediation of Flash behaviors","author":"zhou","year":"0","journal-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_39"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_21"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.34"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357178"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2019,11,3]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035367.pdf?arnumber=9035367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:45:59Z","timestamp":1658141159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035367","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}