{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:46Z","timestamp":1774946566092,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,14]],"date-time":"2007-10-14T00:00:00Z","timestamp":1192320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,14]]},"DOI":"10.1145\/1294261.1294293","type":"proceedings-article","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T12:15:18Z","timestamp":1192796118000},"page":"321-334","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":203,"title":["Information flow control for standard OS abstractions"],"prefix":"10.1145","author":[{"given":"Maxwell","family":"Krohn","sequence":"first","affiliation":[{"name":"MIT, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexander","family":"Yip","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Micah","family":"Brodsky","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Natan","family":"Cliffer","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M. Frans","family":"Kaashoek","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eddie","family":"Kohler","sequence":"additional","affiliation":[{"name":"UCLA, Los Angeles, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Morris","sequence":"additional","affiliation":[{"name":"MIT, Cambridge, MA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2007,10,14]]},"reference":[{"key":"e_1_3_2_2_4_1","volume-title":"Proc. 16th USENIX Security","author":"Chong S.","year":"2007","unstructured":"S. Chong , K. Vikram , and A. C. Myers . SIF: Enforcing confidentiality and integrity in web applications . In Proc. 16th USENIX Security , Aug. 2007 . S. Chong, K. Vikram, and A. C. Myers. SIF: Enforcing confidentiality and integrity in web applications. In Proc. 16th USENIX Security, Aug. 2007."},{"key":"e_1_3_2_2_5_1","volume-title":"Proc. 11th USENIX Security","author":"Cowan C.","year":"2002","unstructured":"C. Cowan : Automatic detection and prevention of buffer-overflow attacks . In Proc. 11th USENIX Security , Aug. 2002 . C. Cowan et al. StackGuard: Automatic detection and prevention of buffer-overflow attacks. In Proc. 11th USENIX Security, Aug. 2002."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_2_9_1","unstructured":"FastCGI. Open Market. http:\/\/www.fastcgi.com.  FastCGI. Open Market. http:\/\/www.fastcgi.com."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884406"},{"key":"e_1_3_2_2_11_1","volume-title":"Proc. IEEE Security and Privacy","author":"Fraser T.","year":"1999","unstructured":"T. Fraser , L. Badger , and M. Feldman . Hardening COTS software with generic software wrappers . In Proc. IEEE Security and Privacy , 1999 . T. Fraser, L. Badger, and M. Feldman. Hardening COTS software with generic software wrappers. In Proc. IEEE Security and Privacy, 1999."},{"key":"e_1_3_2_2_12_1","volume-title":"Proc. 2004 NDSS","author":"Garfinkel T.","year":"2004","unstructured":"T. Garfinkel , B. Pfaff , and M. Rosenblum . Ostia: A delegating architecture for secure system call interposition . In Proc. 2004 NDSS , February 2004 . T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In Proc. 2004 NDSS, February 2004."},{"key":"e_1_3_2_2_13_1","volume-title":"Jan.","author":"Gelinas J.","year":"2003","unstructured":"J. Gelinas . Virtual private servers and security contexts , Jan. 2003 . http:\/\/linux-vserver.org. J. Gelinas. Virtual private servers and security contexts, Jan. 2003. http:\/\/linux-vserver.org."},{"key":"e_1_3_2_2_14_1","first-page":"309","volume-title":"1973 NCC AFIPS Conf. Proc.","volume":"42","author":"Goldberg R.","year":"1973","unstructured":"R. Goldberg . Architecture of virtual machines . In 1973 NCC AFIPS Conf. Proc. , volume 42 , pages 309 -- 318 , 1973 . R. Goldberg. Architecture of virtual machines. In 1973 NCC AFIPS Conf. Proc., volume 42, pages 309--318, 1973."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.30"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168626"},{"key":"e_1_3_2_2_17_1","volume-title":"Proc. 2nd SANE","author":"Kamp P.-H.","year":"2000","unstructured":"P.-H. Kamp and R. N.M. Watson . Jails : Confining the omnipotent root . In Proc. 2nd SANE , May 2000 . P.-H. Kamp and R. N.M.Watson. Jails: Confining the omnipotent root. In Proc. 2nd SANE, May 2000."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_2_19_1","volume-title":"Proc. 2007 USENIX","author":"Krohn M.","year":"2007","unstructured":"M. Krohn , E. Kohler , and M. F. Kaashoek . Events can make sense . In Proc. 2007 USENIX , June 2007 . M. Krohn, E. Kohler, andM. F. Kaashoek. Events can make sense. In Proc. 2007 USENIX, June 2007."},{"key":"e_1_3_2_2_20_1","volume-title":"Proc. 2001 USENIX","author":"Loscocco P.","year":"2001","unstructured":"P. Loscocco and S. Smalley . Integrating flexible support for security policies into the Linux operating system . In Proc. 2001 USENIX , June 2001 . FREENIX track. P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proc. 2001 USENIX, June 2001. FREENIX track."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380220805"},{"key":"e_1_3_2_2_22_1","volume-title":"Dec.","year":"2006","unstructured":"MoinMoin. The MoinMoin Wiki Engine , Dec. 2006 . http:\/\/moinmoin.wikiwikiweb.de\/. MoinMoin. The MoinMoin Wiki Engine, Dec. 2006. http:\/\/moinmoin.wikiwikiweb.de\/."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"e_1_3_2_2_25_1","unstructured":"National Vulnerability Database. CVE--2007--2637. http:\/\/nvd.nist.gov\/nvd.cfm?cvename=CVE-2007-2637.  National Vulnerability Database. CVE--2007--2637. http:\/\/nvd.nist.gov\/nvd.cfm?cvename=CVE-2007-2637."},{"key":"e_1_3_2_2_26_1","unstructured":"osvdb.org. Open Source Vulnerability Database. http:\/\/osvdb.org\/searchdb.php?base=moinmoin.  osvdb.org. Open Source Vulnerability Database. http:\/\/osvdb.org\/searchdb.php?base=moinmoin."},{"key":"e_1_3_2_2_27_1","volume-title":"Proc. 12th USENIX Security","author":"Provos N.","year":"2003","unstructured":"N. Provos . Improving host security with system call policies . In Proc. 12th USENIX Security , Aug. 2003 . N. Provos. Improving host security with system call policies. In Proc. 12th USENIX Security, Aug. 2003."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_2_29_1","unstructured":"M. Seaborn. Plash: tools for practical least privilege. http:\/\/plash.beasts.org.  M. Seaborn. Plash: tools for practical least privilege. http:\/\/plash.beasts.org."},{"key":"e_1_3_2_2_30_1","volume-title":"February","author":"Smalley S.","year":"2006","unstructured":"S. Smalley , C. Vance , and W. Salamon . Implementing SELinux as a Linux security module , February 2006 . http:\/\/www.nsa.gov\/selinux\/papers\/module-abs.cfm. S. Smalley, C. Vance, andW. Salamon. Implementing SELinux as a Linux security module, February 2006. http:\/\/www.nsa.gov\/selinux\/papers\/module-abs.cfm."},{"key":"e_1_3_2_2_31_1","unstructured":"N. Soffer. MoinBenchmarks. http:\/\/moinmoin.wikiwikiweb.de\/MoinBenchmarks.  N. Soffer. MoinBenchmarks. http:\/\/moinmoin.wikiwikiweb.de\/MoinBenchmarks."},{"key":"e_1_3_2_2_32_1","volume-title":"Proc. 2006 OSDI","author":"Ta-Min R.","year":"2006","unstructured":"R. Ta-Min , L. Litty , and D. Lie . Splitting Interfaces: Making trust between applications and operating systems configurable . In Proc. 2006 OSDI , Nov. 2006 . R. Ta-Min, L. Litty, and D. Lie. Splitting Interfaces: Making trust between applications and operating systems configurable. In Proc. 2006 OSDI, Nov. 2006."},{"key":"e_1_3_2_2_33_1","volume-title":"Jan.","year":"2001","unstructured":"VMware. VMware and the National Security Agency team to build advanced secure computer systems , Jan. 2001 . http:\/\/www.vmware.com\/pdf\/TechTrendNotes.pdf. VMware. VMware and the National Security Agency team to build advanced secure computer systems, Jan. 2001. http:\/\/www.vmware.com\/pdf\/TechTrendNotes.pdf."},{"key":"e_1_3_2_2_34_1","volume-title":"Proc. 2003 USENIX","author":"Watson R.","year":"2003","unstructured":"R. Watson , W. Morrison , C. Vance , and B. Feldman . The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0 . In Proc. 2003 USENIX , June 2003 . R. Watson, W. Morrison, C. Vance, and B. Feldman. The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0. In Proc. 2003 USENIX, June 2003."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060308"},{"key":"e_1_3_2_2_36_1","volume-title":"Proc. 11th USENIX Security","author":"Wright C.","year":"2002","unstructured":"C. Wright , C. Cowan , S. Smalley , J. Morris , and G. Kroah-Hartman . Linux security modules: General security support for the Linux kernel . In Proc. 11th USENIX Security , Aug. 2002 . C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In Proc. 11th USENIX Security, Aug. 2002."},{"key":"e_1_3_2_2_37_1","volume-title":"Proc. 2007 NSDI","author":"Yumerefendi A. R.","year":"2007","unstructured":"A. R. Yumerefendi , B. Mickle , and L. P. Cox . TightLip: Keeping applications from spilling the beans . In Proc. 2007 NSDI , Apr. 2007 . A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping applications from spilling the beans. In Proc. 2007 NSDI, Apr. 2007."},{"key":"e_1_3_2_2_38_1","volume-title":"Proc. 7th OSDI","author":"Zeldovich N. B.","year":"2006","unstructured":"N. B. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazieres . Making information flow explicit in HiStar . In Proc. 7th OSDI , Nov. 2006 . N. B. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazieres. Making information flow explicit in HiStar. In Proc. 7th OSDI, Nov. 2006."}],"event":{"name":"SOSP07: ACM SIGOPS 21st Symposium on Operating Systems Principles 2007","location":"Stevenson Washington USA","acronym":"SOSP07","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1294261.1294293","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1294261.1294293","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:41:18Z","timestamp":1750268478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1294261.1294293"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,14]]},"references-count":35,"alternative-id":["10.1145\/1294261.1294293","10.1145\/1294261"],"URL":"https:\/\/doi.org\/10.1145\/1294261.1294293","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1323293.1294293","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,10,14]]},"assertion":[{"value":"2007-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}