{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:26:41Z","timestamp":1742387201542,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1109\/icse.2009.5070519","type":"proceedings-article","created":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T14:24:29Z","timestamp":1244643869000},"page":"177-187","source":"Crossref","is-referenced-by-count":14,"title":["Modular string-sensitive permission analysis with demand-driven precision"],"prefix":"10.1109","author":[{"given":"Emmanuel","family":"Geay","sequence":"first","affiliation":[]},{"given":"Marco","family":"Pistoia","sequence":"additional","affiliation":[]},{"family":"Takaaki Tateishi","sequence":"additional","affiliation":[]},{"given":"Barbara G.","family":"Ryder","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Dolby","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/smr.351"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85114-1_21"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/53990.53994"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1004558126118"},{"year":"0","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582452"},{"key":"ref14","article-title":"Modular Setbased Analysis from Contracts","author":"meunier","year":"0","journal-title":"POPL 2006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060809"},{"key":"ref16","article-title":"Enforcing RobustDeclassification","author":"myers","year":"0","journal-title":"CSFW 2004"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.10"},{"key":"ref18","article-title":"Interprocedural Analysis for Privileged Code Placement and Tarined Variable Detection","author":"pistoia","year":"0","journal-title":"ECOOP 2005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45309-1_3"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674823"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848461"},{"journal-title":"Libraries for Analysis (WALA)","year":"0","author":"watson","key":"ref27"},{"year":"0","key":"ref3"},{"key":"ref6","article-title":"Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2","author":"gong","year":"1997","journal-title":"USITS"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250739"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/316686.316703"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"journal-title":"General Lattice Theory","year":"2003","author":"gr\u00e4tzer","key":"ref7"},{"key":"ref2","article-title":"Precise Analysis of String Expressions","author":"christensen","year":"0","journal-title":"SAS 2003"},{"key":"ref9","article-title":"The Confused Deputy (Or Why Capabilities Might Have Been Invented)","volume":"22","author":"hardy","year":"1988","journal-title":"OSR"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00236-1"},{"key":"ref20","article-title":"Points-to analysis and side effect analysis for programs built with precompiled library modules","author":"rountev","year":"0","journal-title":"CC 2001"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"ref21","article-title":"Data-Flow Analysis of Program Fragments","author":"rountev","year":"0","journal-title":"FSE 1999"},{"year":"0","key":"ref24"},{"key":"ref23","article-title":"Control Flow Analysis in Scheme","author":"shivers","year":"1998","journal-title":"PLDI"},{"year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250748"}],"event":{"name":"2009 IEEE 31st International Conference on Software Engineering","start":{"date-parts":[[2009,5,16]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,5,24]]}},"container-title":["2009 IEEE 31st International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5062304\/5070493\/05070519.pdf?arnumber=5070519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T23:56:02Z","timestamp":1489794962000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5070519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icse.2009.5070519","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}