{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T00:14:25Z","timestamp":1777421665022,"version":"3.51.4"},"reference-count":27,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1145\/1629175.1629203","type":"journal-article","created":{"date-parts":[[2009,12,21]],"date-time":"2009-12-21T14:08:04Z","timestamp":1261404484000},"page":"91-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":83,"title":["Native Client"],"prefix":"10.1145","volume":"53","author":[{"given":"Bennet","family":"Yee","sequence":"first","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Sehr","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gregory","family":"Dardyk","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J. Bradley","family":"Chen","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert","family":"Muth","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tavis","family":"Ormandy","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shiki","family":"Okasaka","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Neha","family":"Narula","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nicholas","family":"Fullagar","sequence":"additional","affiliation":[{"name":"Google, Inc., Mountainview, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,1]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"112","volume":"93","author":"Accetta M.","year":"1986","unstructured":"Accetta , M. , baron, R., Bolosky , W. , Golub , D. , Rashid , R. , Tevanian , A. , Young , M. Mach: A New Kernel Foundation for UNIX Development . 1986 , 93 -- 112 . Accetta, M., baron, R., Bolosky, W., Golub, D., Rashid, R., Tevanian, A., Young, M. Mach: A New Kernel Foundation for UNIX Development. 1986, 93--112.","journal-title":"Mach: A New Kernel Foundation for UNIX Development"},{"key":"e_1_2_1_2_1","unstructured":"Burns J. developing secure mobile applications for android. http:\/\/isecpartners.com\/files\/iSEC_Securing_Android_Apps.pdf 2008.  Burns J. developing secure mobile applications for android. http:\/\/isecpartners.com\/files\/iSEC_Securing_Android_Apps.pdf 2008."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/876661.876669"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/42392.42400"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(92)90192-T"},{"key":"e_1_2_1_6_1","volume-title":"Programming 80386","author":"Crawford J.","year":"1991","unstructured":"Crawford , J. Gelsinger , P. Programming 80386 . Sybex Inc . ( 1991 ). Crawford, J. Gelsinger, P. Programming 80386. Sybex Inc. (1991)."},{"key":"e_1_2_1_7_1","volume-title":"ActiveX Controls Inside Out","author":"Denning A.","year":"1997","unstructured":"Denning , A. ActiveX Controls Inside Out . Microsoft Press (May 1997 ). Denning, A. ActiveX Controls Inside Out. Microsoft Press (May 1997)."},{"key":"e_1_2_1_8_1","unstructured":"Directorate for Command Control Communications and Computer systems U.S. Department of defense Joint staff. Information assurance through defense-in-depth. Technical report directorate for Command Control Communications and Computer systems U.S. Department of defense Joint staff Feb. 2000.  Directorate for Command Control Communications and Computer systems U.S. Department of defense Joint staff. Information assurance through defense-in-depth. Technical report directorate for Command Control Communications and Computer systems U.S. Department of defense Joint staff Feb. 2000."},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 2008 Symposium on Operating System Design and Implementation (December","author":"Douceur J.R.","year":"2008","unstructured":"Douceur , J.R. , Elson , J. , Howell , J. , Lorch , J.R. Leveraging legacy code to deploy desktop applications on the web . In Proceedings of the 2008 Symposium on Operating System Design and Implementation (December 2008 ). Douceur, J.R., Elson, J., Howell, J., Lorch, J.R. Leveraging legacy code to deploy desktop applications on the web. In Proceedings of the 2008 Symposium on Operating System Design and Implementation (December 2008)."},{"key":"e_1_2_1_10_1","volume-title":"2008 USENIX Annual Technical Conference (June","author":"Ford B.","year":"2008","unstructured":"Ford , B. , Cox , R. Vx 32 : lightweight user-level sandboxing on the x86 . In 2008 USENIX Annual Technical Conference (June 2008 ). Ford, B., Cox, R. Vx32: lightweight user-level sandboxing on the x86. In 2008 USENIX Annual Technical Conference (June 2008)."},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 6th USENIX Security Symposium","author":"Goldberg I.","year":"1996","unstructured":"Goldberg , I. , Wagner , D. , Thomas , R. , brewer, E.A. A secure enviroment for untrusted helper applications . In Proceedings of the 6th USENIX Security Symposium ( 1996 ). Goldberg, I., Wagner, D., Thomas, R., brewer, E.A. A secure enviroment for untrusted helper applications. In Proceedings of the 6th USENIX Security Symposium (1996)."},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the","author":"Golub D.","year":"1990","unstructured":"Golub , D. , Dean , A. , Forin , R. , Rashid , R. UNIX as an application program . In Proceedings of the Summer 1990 USENIX Conference (1990), 87--95. Golub, D., Dean, A., Forin, R., Rashid, R. UNIX as an application program. In Proceedings of the Summer 1990 USENIX Conference (1990), 87--95."},{"key":"e_1_2_1_13_1","volume-title":"Computer systems research","author":"Joy W.","year":"1983","unstructured":"Joy , W. , Cooper , E. , Fabry , R. , Leffler , S. , McKusick , K. , Mosher , D. 4.2 BSD system manual. Technical report , Computer systems research Group , university of California, Berkeley, 1983 . Joy, W., Cooper, E., Fabry, R., Leffler, S., McKusick, K., Mosher, D. 4.2 BSD system manual. Technical report, Computer systems research Group, university of California, Berkeley, 1983."},{"key":"e_1_2_1_14_1","volume-title":"Hack In The Box (HITB) 2008 Malaysia Conference.","author":"Kaspersky K.","unstructured":"Kaspersky , K. , Chang , A. remote code execution through Intel CPU bugs . In Hack In The Box (HITB) 2008 Malaysia Conference. Kaspersky, K., Chang, A. remote code execution through Intel CPU bugs. In Hack In The Box (HITB) 2008 Malaysia Conference."},{"key":"e_1_2_1_15_1","volume-title":"verifable binary sandboxing for a CISC architecture. Technical report MIT-CSAIL-TR-2005--030","author":"McCamant S.","year":"2005","unstructured":"McCamant , S. , Morrisett , G. Efficient , verifable binary sandboxing for a CISC architecture. Technical report MIT-CSAIL-TR-2005--030 , 2005 . McCamant, S., Morrisett, G. Efficient, verifable binary sandboxing for a CISC architecture. Technical report MIT-CSAIL-TR-2005--030, 2005."},{"key":"e_1_2_1_16_1","volume-title":"15th USENIX Security Symposium (Aug.","author":"McCamant S.","year":"2006","unstructured":"McCamant , S. , Morrisett , G. Evaluating SFI for a CISC architecture . In 15th USENIX Security Symposium (Aug. 2006 ). McCamant, S., Morrisett, G. Evaluating SFI for a CISC architecture. In 15th USENIX Security Symposium (Aug. 2006)."},{"key":"e_1_2_1_17_1","unstructured":"Microsoft Corporation. Signing and checking code with Authenticode. http:\/\/msdn.microsoft.com\/en-us\/library\/ms537364(VS.85).aspx.  Microsoft Corporation. Signing and checking code with Authenticode. http:\/\/msdn.microsoft.com\/en-us\/library\/ms537364(VS.85).aspx."},{"key":"e_1_2_1_18_1","unstructured":"Microsoft Corporation. Structured exception handling. http:\/\/msdn.microsoft.com\/en-us\/library\/ms680657(VS.85).aspx 2008.  Microsoft Corporation. Structured exception handling. http:\/\/msdn.microsoft.com\/en-us\/library\/ms680657(VS.85).aspx 2008."},{"key":"e_1_2_1_19_1","unstructured":"Netscape Corporation. Gecko plugin API reference. http:\/\/developer.mozilla.org\/en\/docs\/Gecko_Plugin_API_Reference.  Netscape Corporation. Gecko plugin API reference. http:\/\/developer.mozilla.org\/en\/docs\/Gecko_Plugin_API_Reference."},{"key":"e_1_2_1_20_1","volume-title":"USENIX Security Symposium (Aug.","author":"Provos N.","year":"2003","unstructured":"Provos , N. Improving host security with system call policies . In USENIX Security Symposium (Aug. 2003 ). Provos, N. Improving host security with system call policies. In USENIX Security Symposium (Aug. 2003)."},{"key":"e_1_2_1_21_1","volume-title":"Intel Thread Building Blocks. O'Reilly&amp;Associates","author":"Reinders J.","year":"2007","unstructured":"Reinders , J. Intel Thread Building Blocks. O'Reilly&amp;Associates , 2007 . Reinders, J. Intel Thread Building Blocks. O'Reilly&amp;Associates, 2007."},{"key":"e_1_2_1_22_1","volume-title":"ChannelWeb","author":"Savage M.","year":"2001","unstructured":"Savage , M. Cost of computer viruses top $10 billion already this year . ChannelWeb , Aug. 2001 . Savage, M. Cost of computer viruses top $10 billion already this year. ChannelWeb, Aug. 2001."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the Third USENIX Conference on Object-Oriented Technologies (June","author":"Small C.","year":"1997","unstructured":"Small , C. Mi SFIT : A tool for constructing safe extensible C++ systems . In Proceedings of the Third USENIX Conference on Object-Oriented Technologies (June 1997 ). Small, C. MiSFIT: A tool for constructing safe extensible C++ systems. In Proceedings of the Third USENIX Conference on Object-Oriented Technologies (June 1997)."},{"key":"e_1_2_1_24_1","volume-title":"The C++ Programming Language","author":"Stroustrup B.","year":"1997","unstructured":"Stroustrup , B. The C++ Programming Language : Second Edition. Addison-Wesley , 1997 . Stroustrup, B. The C++ Programming Language: Second Edition. Addison-Wesley, 1997."},{"key":"e_1_2_1_25_1","unstructured":"Tarreau W. ptrace documentation. http:\/\/www.linuxhq.com\/kernel\/v2.4\/36--rc1\/Documentation\/ptrace.txt 2007.  Tarreau W. ptrace documentation. http:\/\/www.linuxhq.com\/kernel\/v2.4\/36--rc1\/Documentation\/ptrace.txt 2007."},{"key":"e_1_2_1_26_1","volume-title":"Dec.","author":"U. S. Department of defense","year":"1985","unstructured":"U. S. Department of defense , Computer security Center. trusted computer system evaluation criteria , Dec. 1985 . U. S. Department of defense, Computer security Center. trusted computer system evaluation criteria, Dec. 1985."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629175.1629203","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1629175.1629203","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:25Z","timestamp":1750250485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1629175.1629203"}},"subtitle":["a sandbox for portable, untrusted x86 native code"],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["10.1145\/1629175.1629203"],"URL":"https:\/\/doi.org\/10.1145\/1629175.1629203","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1]]},"assertion":[{"value":"2010-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}