{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:11Z","timestamp":1750307891040,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,6,7]],"date-time":"2008-06-07T00:00:00Z","timestamp":1212796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,6,7]]},"DOI":"10.1145\/1375696.1375708","type":"proceedings-article","created":{"date-parts":[[2008,6,10]],"date-time":"2008-06-10T14:13:22Z","timestamp":1213107202000},"page":"89-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A type system for data-flow integrity on windows vista"],"prefix":"10.1145","author":[{"given":"Avik","family":"Chaudhuri","sequence":"first","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Prasad","family":"Naldurg","sequence":"additional","affiliation":[{"name":"Microsoft Research India, Bangalore, India"}]},{"given":"Sriram","family":"Rajamani","sequence":"additional","affiliation":[{"name":"Microsoft Research India, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2008,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324266"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292555"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503277"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/96709.96712"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360213"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/232627.232638"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(85)90056-0"},{"key":"e_1_3_2_1_8_1","first-page":"155","volume-title":"CSFW?03: Computer Security Foundations Workshop","author":"Banerjee A.","year":"2003","unstructured":"A. Banerjee and D. Naumann . Using access control for secure information flow in a Java-like language . In CSFW?03: Computer Security Foundations Workshop , pages 155 -- 169 . IEEE , 2003 . A. Banerjee and D. Naumann. Using access control for secure information flow in a Java-like language. In CSFW?03: Computer Security Foundations Workshop, pages 155--169. IEEE, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00010-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2004.08.003"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX","author":"Castro M.","year":"2006","unstructured":"M. Castro , M. Costa , and T. Harris . Securing software by enforcing data-flow integrity. In OSDI?06: Operating Systems Design and Implementation, pages 147--160 . USENIX , 2006 . M. Castro, M. Costa, and T. Harris. Securing software by enforcing data-flow integrity. In OSDI?06: Operating Systems Design and Implementation, pages 147--160. USENIX, 2006."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817949_18"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.28"},{"key":"e_1_3_2_1_16_1","first-page":"184","volume-title":"SP?87: Symposium on Security and Privacy","author":"Clark D. D.","year":"1987","unstructured":"D. D. Clark and D. R. Wilson . A comparison of commercial and military computer security policies . In SP?87: Symposium on Security and Privacy , pages 184 -- 194 . IEEE , 1987 . D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In SP?87: Symposium on Security and Privacy, pages 184--194. IEEE, 1987."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_18_1","unstructured":"M. Conover. Analysis of the Windows Vista security model. Available at www.symantec.com\/avcenter\/reference\/Windows_Vista_Security_Model_Analysis.pdf.  M. Conover. Analysis of the Windows Vista security model. Available at www.symantec.com\/avcenter\/reference\/Windows_Vista_Security_Model_Analysis.pdf."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/73560.73576"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111059"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31987-0_11"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/SP.1982.10014","volume-title":"SP?82: Symposium on Security and Privacy","author":"Goguen J. A.","year":"1982","unstructured":"J. A. Goguen and J. Meseguer . Security policies and security models . In SP?82: Symposium on Security and Privacy , pages 11 -- 20 . IEEE , 1982 . J. A. Goguen and J. Meseguer. Security policies and security models. In SP?82: Symposium on Security and Privacy, pages 11--20. IEEE, 1982."},{"key":"e_1_3_2_1_25_1","first-page":"248","volume-title":"HLCL?98: High-Level Concurrent Languages","author":"Gordon A. D.","year":"1998","unstructured":"A. D. Gordon and P. D. Hankin . A concurrent object calculus: Reduction and typing . In HLCL?98: High-Level Concurrent Languages , pages 248 -- 264 . Elsevier , 1998 . A. D. Gordon and P. D. Hankin. A concurrent object calculus: Reduction and typing. In HLCL?98: High-Level Concurrent Languages, pages 248--264. Elsevier, 1998."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(02)00333-X"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11539452_17"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-005-0178-y"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/570886.570890"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503281"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/3-540-45500-0_3","volume-title":"TACS?01: Theoretical Aspects of Computer Software","author":"Hoshina D.","year":"2001","unstructured":"D. Hoshina , E. Sumii , and A. Yonezawa . A typed process calculus for fine-grained resource access control in distributed computation . In TACS?01: Theoretical Aspects of Computer Software , pages 64 -- 81 . Springer , 2001 . D. Hoshina, E. Sumii, and A. Yonezawa. A typed process calculus for fine-grained resource access control in distributed computation. In TACS?01: Theoretical Aspects of Computer Software, pages 64--81. Springer, 2001."},{"key":"e_1_3_2_1_32_1","volume-title":"Writing Secure Code for Windows Vista","author":"Howard M.","year":"2007","unstructured":"M. Howard and D. LeBlanc . Writing Secure Code for Windows Vista . Microsoft Press , 2007 . M. Howard and D. LeBlanc. Writing Secure Code for Windows Vista. Microsoft Press, 2007."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00236-005-0179-x"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040319"},{"key":"e_1_3_2_1_38_1","volume-title":"Programming Perl. O?Reilly","author":"Wall L.","year":"1996","unstructured":"L. Wall , T. Christiansen , and R. Schwartz . Programming Perl. O?Reilly , 1996 . L.Wall, T.Christiansen, and R.Schwartz. Programming Perl. O?Reilly, 1996."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.9"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.10"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351245"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057387.1057392"},{"key":"e_1_3_2_1_44_1","article-title":"Inside Windows Vista User Access Control","author":"Russinovich M.","year":"2007","unstructured":"M. Russinovich . Inside Windows Vista User Access Control . Microsoft Technet Magazine , June 2007 . Available at http:\/\/www.microsoft.com\/technet\/technetmag\/issues\/2007\/06\/UAC\/. M. Russinovich. Inside Windows Vista User Access Control. Microsoft Technet Magazine, June 2007. Available at http:\/\/www.microsoft.com\/technet\/technetmag\/issues\/2007\/06\/UAC\/.","journal-title":"Microsoft Technet Magazine"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_46_1","volume-title":"ISOC","author":"Shankar U.","year":"2006","unstructured":"U. Shankar , T. Jaeger , and R. Sailer . Toward automated information-flow integrity verification for security-critical applications. In NDSS?06: Network and Distributed System Security Symposium . ISOC , 2006 . U. Shankar, T. Jaeger, and R. Sailer. Toward automated information-flow integrity verification for security-critical applications. In NDSS?06: Network and Distributed System Security Symposium. ISOC, 2006."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_48_1","first-page":"179","volume-title":"SP?04: Symposium on Security and Privacy","author":"Tse S.","year":"2004","unstructured":"S. Tse and S. Zdancewic . Run-time principals in information-flow type systems . In SP?04: Symposium on Security and Privacy , pages 179 -- 193 . IEEE , 2004 . S. Tse and S. Zdancewic. Run-time principals in information-flow type systems. In SP?04: Symposium on Security and Privacy, pages 179--193. IEEE, 2004."},{"key":"e_1_3_2_1_49_1","volume-title":"ISOC","author":"Vogt P.","year":"2007","unstructured":"P. Vogt , F. Nentwich , N. Jovanovic , C. Kruegel , E. Kirda , and G. Vigna . Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS?07: Network and Distributed System Security Symposium . ISOC , 2007 . P. Vogt, F. Nentwich, N. Jovanovic, C. Kruegel, E. Kirda, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS?07: Network and Distributed System Security Symposium. ISOC, 2007."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_51_1","volume-title":"Scheme?07: Scheme and Functional Programming","author":"Wadler P.","year":"2007","unstructured":"P. Wadler and R. B. Findler . Well-typed programs can?t be blamed . In Scheme?07: Scheme and Functional Programming , 2007 . P. Wadler and R. B. Findler. Well-typed programs can?t be blamed. In Scheme?07: Scheme and Functional Programming, 2007."},{"key":"e_1_3_2_1_52_1","unstructured":"Windows Vista TechCenter. Understanding and configuring User Account Control in Windows Vista. Available at http:\/\/technet.microsoft.com\/en-us\/windowsvista\/aa905117.aspx.  Windows Vista TechCenter. Understanding and configuring User Account Control in Windows Vista. Available at http:\/\/technet.microsoft.com\/en-us\/windowsvista\/aa905117.aspx."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964014"},{"key":"e_1_3_2_1_55_1","first-page":"5","volume-title":"CSFW?01: Computer Security Foundations Workshop","author":"Myers Zdancewic","year":"2001","unstructured":". Zdancewic and A. C. Myers . Robust declassification . In CSFW?01: Computer Security Foundations Workshop , pages 5 -- 16 . IEEE , 2001 . . Zdancewic and A. C. Myers. Robust declassification. In CSFW?01: Computer Security Foundations Workshop, pages 5--16. IEEE, 2001."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020843229247"},{"key":"e_1_3_2_1_57_1","first-page":"29","volume-title":"CSFW?03: Computer Security Foundations Workshop","author":"Zdancewic S.","year":"2003","unstructured":"S. Zdancewic and A. C. Myers . Observational determinism for concurrent program security . In CSFW?03: Computer Security Foundations Workshop , pages 29 -- 43 . IEEE , 2003 . S. Zdancewic and A. C. Myers. Observational determinism for concurrent program security. In CSFW?03: Computer Security Foundations Workshop, pages 29--43. IEEE, 2003."},{"key":"e_1_3_2_1_58_1","volume-title":"USENIX","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e8res . Making information flow explicit in HiStar. In OSDI?06: Operating Systems Design and Implementation, pages 19--19 . USENIX , 2006 . N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e8res. Making information flow explicit in HiStar. In OSDI?06: Operating Systems Design and Implementation, pages 19--19. USENIX, 2006."},{"key":"e_1_3_2_1_59_1","unstructured":"LL. Zheng. Personal communication July 2007.  LL. Zheng. Personal communication July 2007."},{"key":"e_1_3_2_1_60_1","first-page":"27","volume-title":"FAST?04: Formal Aspects in Security and Trust","author":"Zheng L.","year":"2004","unstructured":"L. Zheng and A. Myers . Dynamic security labels and noninterference . In FAST?04: Formal Aspects in Security and Trust , pages 27 -- 40 . Springer , 2004 . L. Zheng and A. Myers. Dynamic security labels and noninterference. In FAST?04: Formal Aspects in Security and Trust, pages 27--40. Springer, 2004."}],"event":{"name":"PLDI '08: ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"],"location":"Tucson AZ USA","acronym":"PLDI '08"},"container-title":["Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1375696.1375708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1375696.1375708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:18Z","timestamp":1750258038000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1375696.1375708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6,7]]},"references-count":57,"alternative-id":["10.1145\/1375696.1375708","10.1145\/1375696"],"URL":"https:\/\/doi.org\/10.1145\/1375696.1375708","relation":{},"subject":[],"published":{"date-parts":[[2008,6,7]]},"assertion":[{"value":"2008-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}