{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T19:44:00Z","timestamp":1730231040404,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icbase59196.2023.10303098","type":"proceedings-article","created":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T17:50:59Z","timestamp":1699033859000},"page":"221-224","source":"Crossref","is-referenced-by-count":0,"title":["SAFEJ: An Efficient Infrastructure for Securing Julia Programs"],"prefix":"10.1109","author":[{"given":"Hao","family":"Zhu","sequence":"first","affiliation":[{"name":"Suzhou Institute for Advanced Research, University of Science and Technology of China,School of Software Engineering,Suzhou,China"}]},{"given":"Baojian","family":"Hua","sequence":"additional","affiliation":[{"name":"Suzhou Institute for Advanced Research, University of Science and Technology of China,School of Software Engineering,Suzhou,China"}]}],"member":"263","reference":[{"article-title":"SGX-LKL: Securing the host OS interface for trusted execution[J]","year":"2019","author":"priebe","key":"ref13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.018"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774482"},{"key":"ref14","first-page":"119","article-title":"Sandboxing Applications[C]","author":"prevelakis","year":"2001","journal-title":"USENIX Annual Technical Conference Freenix track"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485903"},{"key":"ref10","article-title":"Hyungon Moon, and Taesoo Kim.2019. libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK)","author":"park","year":"0","journal-title":"2019 USENIX Annual Technical Conference (USENIX ATC 19)"},{"year":"0","key":"ref2"},{"journal-title":"The Julia Language","year":"0","key":"ref1"},{"journal-title":"64 and IA-32 Architectures Software Developer's Manual","year":"2018","key":"ref17"},{"key":"ref16","first-page":"293","article-title":"Vx32: lightweight user-level sandboxing on the x86[C]","author":"ford","year":"2008","journal-title":"USENIX Annual Technical Conference"},{"journal-title":"mprotect(2) - linux man page","year":"0","key":"ref19"},{"journal-title":"Just-in-time (JIT) Compiler of Julia programming language","year":"0","key":"ref18"},{"journal-title":"Power Isac Version 3 0 b","year":"2017","key":"ref24"},{"key":"ref23","first-page":"1","volume":"2016","author":"costan","year":"2016","journal-title":"Intel SGX Explained"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660344"},{"journal-title":"ARM Architecture Reference Manual ARMv7-A and ARMv7-R ed","year":"2018","key":"ref25"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2364506.2364524"},{"key":"ref22","first-page":"106","article-title":"Safe Java native interface[C]","volume":"97","author":"tan","year":"2006","journal-title":"Proceedings of IEEE International Symposium on Secure Software Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1596638.1596653"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23485"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.43"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"ref9","first-page":"161","article-title":"Control-flow bending: On the effectiveness of control-flow integrity[C]","author":"carlini","year":"2015","journal-title":"24th USENIX Security Symposium USENIX Security 15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11693024_21"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-7258-9_14"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485903"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054835"}],"event":{"name":"2023 4th International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE)","start":{"date-parts":[[2023,8,25]]},"location":"Nanjing, China","end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 4th International Conference on Big Data &amp; Artificial Intelligence &amp; Software Engineering (ICBASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10303003\/10303015\/10303098.pdf?arnumber=10303098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T19:33:52Z","timestamp":1701113632000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10303098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icbase59196.2023.10303098","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}