{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T16:48:09Z","timestamp":1749660489987,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/sp.2015.55","type":"proceedings-article","created":{"date-parts":[[2015,7,22]],"date-time":"2015-07-22T20:07:58Z","timestamp":1437595678000},"page":"813-830","source":"Crossref","is-referenced-by-count":28,"title":["Micro-Policies: Formally Verified, Tag-Based Security Monitors"],"prefix":"10.1109","author":[{"given":"Arthur Azevedo de","family":"Amorim","sequence":"first","affiliation":[]},{"given":"Maxime","family":"Denes","sequence":"additional","affiliation":[]},{"given":"Nick","family":"Giannarakis","sequence":"additional","affiliation":[]},{"given":"Catalin","family":"Hritcu","sequence":"additional","affiliation":[]},{"given":"Benjamin C.","family":"Pierce","sequence":"additional","affiliation":[]},{"given":"Antal","family":"Spector-Zabusky","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Tolmach","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"key":"ref32","doi-asserted-by":"crossref","DOI":"10.1145\/168619.168635","article-title":"Efficient softwarebased fault isolation","author":"wahbe","year":"1993","journal-title":"SOSP"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.12.032"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038687"},{"key":"ref34","article-title":"Practical Control Flow Integrity & Randomization for Binary Executables","author":"zhang","year":"0","journal-title":"IEEE S&P 2013"},{"key":"ref10","article-title":"Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection","author":"davi","year":"2014","journal-title":"Usenix Security"},{"journal-title":"Architectural support for softwaredefined metadata processing ASPLOS","year":"2015","author":"dhawan","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2012.11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848461"},{"key":"ref14","article-title":"Out of control: Overcoming control-flow integrity","author":"g\u00f6kta\u00a7","year":"2014","journal-title":"IEEE S&P"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1111596.1111601"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.10"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429105"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.10"},{"key":"ref19","article-title":"Lowfat pointers: compact encoding and efficient gate-level implementation of fat pointers for spatial safety and capability-based security","author":"kwon","year":"2013","journal-title":"CCS"},{"key":"ref28","article-title":"Modular control-flow integrity","author":"niu","year":"2014","journal-title":"PLDI"},{"key":"ref4","article-title":"A verified informationflow architecture","author":"azevedo","year":"0","journal-title":"POPL 2014"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"ref3","article-title":"Computer security technology planning study","author":"anderson","year":"1972","journal-title":"Technical Report ESD-TR-73-51 U S Air Force Electronic Systems Division"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2500365.2500592"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/353323.353382"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181316"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.26"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321673"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2240276.2240279"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2593069.2596656"},{"key":"ref1","article-title":"Control-flow integrity principles","volume":"13","author":"abadi","year":"2009","journal-title":"implementations and applications TISSEC"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-008-9099-0"},{"key":"ref22","article-title":"Cryptographically enforced control flow integrity","author":"mashtizadeh","year":"0","journal-title":"arXiv 1408 145"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0046-8"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254111"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/361932.361937"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2013.26"}],"event":{"name":"2015 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2015,5,17]]},"location":"San Jose, CA","end":{"date-parts":[[2015,5,21]]}},"container-title":["2015 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7160813\/7163005\/07163062.pdf?arnumber=7163062","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T16:17:46Z","timestamp":1567009066000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7163062\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/sp.2015.55","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}