{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:33:39Z","timestamp":1725474819446},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/isncc.2015.7238568","type":"proceedings-article","created":{"date-parts":[[2015,9,7]],"date-time":"2015-09-07T21:36:37Z","timestamp":1441661797000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Towards an automated generation of application confinement policies with binary analysis"],"prefix":"10.1109","author":[{"given":"Tobias","family":"Rauter","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andrea","family":"Holler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nermin","family":"Kajtazovic","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christian","family":"Kreiner","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133375"},{"key":"ref11","article-title":"Improving Host Security with System Call Policies","author":"provos","year":"2003","journal-title":"Usenix Security"},{"key":"ref12","article-title":"Integrating flexible support for security policies into the Linux operating system","author":"loscocco","year":"2001","journal-title":"FREENIX Track 2001 USENIX Annual Technical"},{"key":"ref13","first-page":"1","article-title":"SubDomain: Parsimonious Server Security","author":"cowan","year":"2000","journal-title":"Usenix LISA"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2012010104"},{"key":"ref15","article-title":"MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications","author":"anurag","year":"2000","journal-title":"Proceedings &#x2013; 9th USENIX Security Symposium"},{"article-title":"Functionality-Based Application Confinement","year":"2012","author":"schreuders","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_1"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1145\/583854.582452","article-title":"Access rights analysis for Java","author":"koved","year":"2002","journal-title":"ACM SIGPLAN Notices"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070519"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1809100.1809102"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.16"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.47"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.39"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693091"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","article-title":"The Protection of Information in Computer Systems","author":"salzer","year":"1975","journal-title":"Proceedings of the IEEE"},{"key":"ref9","article-title":"Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2","author":"gong","year":"1997","journal-title":"USENIX Symposium on Internet Technologies and Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SHPCC.1994.296728"}],"event":{"name":"2015 International Symposium on Networks, Computers and Communications (ISNCC)","start":{"date-parts":[[2015,5,13]]},"location":"Hammamet","end":{"date-parts":[[2015,5,15]]}},"container-title":["2015 International Symposium on Networks, Computers and Communications (ISNCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210261\/7238567\/07238568.pdf?arnumber=7238568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T19:06:15Z","timestamp":1498244775000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7238568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/isncc.2015.7238568","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}