{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:39Z","timestamp":1772163939139,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,17]],"date-time":"2010-03-17T00:00:00Z","timestamp":1268784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,17]]},"DOI":"10.1145\/1735997.1736008","type":"proceedings-article","created":{"date-parts":[[2010,3,19]],"date-time":"2010-03-19T15:22:47Z","timestamp":1269012167000},"page":"63-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Neon"],"prefix":"10.1145","author":[{"given":"Qing","family":"Zhang","sequence":"first","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"John","family":"McCullough","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Justin","family":"Ma","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Nabil","family":"Schear","sequence":"additional","affiliation":[{"name":"UIUC, Champaign, IL, USA"}]},{"given":"Michael","family":"Vrable","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Amin","family":"Vahdat","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Alex C.","family":"Snoeren","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]},{"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"UCSD, San Diego, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,3,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Fast and Portable Dynamic Translator. In Proceedings of the USENIX Annual Technical Conference","author":"Bellard F.","year":"2005","unstructured":"F. Bellard . QEMU , a Fast and Portable Dynamic Translator. In Proceedings of the USENIX Annual Technical Conference , Apr. 2005 . F. Bellard. QEMU, a Fast and Portable Dynamic Translator. In Proceedings of the USENIX Annual Technical Conference, Apr. 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1813"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2006.158"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proceedings of the 16th USENIX Security Symposium","author":"Chong S.","year":"2007","unstructured":"S. Chong , K. Vikram , and A. C. Myers . SIF: Enforcing Confidentiality and Integrity inWeb Applications . In Proceedings of the 16th USENIX Security Symposium , pages 1 -- 16 , Berkeley, CA, USA , August 2007 . S. Chong, K. Vikram, and A. C. Myers. SIF: Enforcing Confidentiality and Integrity inWeb Applications. In Proceedings of the 16th USENIX Security Symposium, pages 1--16, Berkeley, CA, USA, August 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. 13th USENIX Security Symposium","author":"Chow J.","year":"2004","unstructured":"J. Chow , B. Pfaff , T. Garfinkel , K. Christopher , and M. Rosenblum . Understanding Data Lifetime via Whole System Simulation . In Proc. 13th USENIX Security Symposium , August 2004 . J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum. Understanding Data Lifetime via Whole System Simulation. In Proc. 13th USENIX Security Symposium, August 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095824"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_9_1","volume-title":"Deconstructing Hardware Architectures for Security. In Workshop on Duplicating, Deconstructing and Debugging","author":"Dalton M.","year":"2006","unstructured":"M. Dalton , H. Kannan , and C. Kozyrakis . Deconstructing Hardware Architectures for Security. In Workshop on Duplicating, Deconstructing and Debugging , Boston, MA , June 2006 . M. Dalton, H. Kannan, and C. Kozyrakis. Deconstructing Hardware Architectures for Security. In Workshop on Duplicating, Deconstructing and Debugging, Boston, MA, June 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_12_1","volume-title":"Global Data Leakage Survey","author":"Dolya A.","year":"2006","unstructured":"A. Dolya . Global Data Leakage Survey 2006 . http:\/\/www.infowatch.com\/, Feb. 2007. A. Dolya. Global Data Leakage Survey 2006. http:\/\/www.infowatch.com\/, Feb. 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352624"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095813"},{"key":"e_1_3_2_1_16_1","volume-title":"http:\/\/www.fsf.org\/licensing\/dealt.html","author":"Foundation Free Software","year":"2007","unstructured":"Free Software Foundation . Negotiating Compliance . http:\/\/www.fsf.org\/licensing\/dealt.html , 2007 . Free Software Foundation. Negotiating Compliance. http:\/\/www.fsf.org\/licensing\/dealt.html, 2007."},{"key":"e_1_3_2_1_17_1","unstructured":"L. A. Gordon M. P. Loeb W. Lucyshyn and R. Richardson. CSI\/FBI Computer Crime and Security Survey. http:\/\/i.cmpnet.com\/gocsi\/db area\/pdfs\/fbi\/FBI2006.pdf 2006.  L. A. Gordon M. P. Loeb W. Lucyshyn and R. Richardson. CSI\/FBI Computer Crime and Security Survey. http:\/\/i.cmpnet.com\/gocsi\/db area\/pdfs\/fbi\/FBI2006.pdf 2006."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720293"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.105"},{"key":"e_1_3_2_1_22_1","first-page":"15","volume-title":"Causality-Based Versioning. In FAST '09: Proccedings of the 7th conference on File and storage technologies","author":"Muniswamy-Reddy K.-K.","year":"2009","unstructured":"K.-K. Muniswamy-Reddy and D. A. Holland . Causality-Based Versioning. In FAST '09: Proccedings of the 7th conference on File and storage technologies , pages 15 -- 28 , Berkeley, CA, USA , 2009 . USENIX Association. K.-K. Muniswamy-Reddy and D. A. Holland. Causality-Based Versioning. In FAST '09: Proccedings of the 7th conference on File and storage technologies, pages 15--28, Berkeley, CA, USA, 2009. USENIX Association."},{"key":"e_1_3_2_1_23_1","first-page":"4","volume-title":"Provenance-aware Storage Systems. In ATEC '06: Proceedings of the annual conference on USENIX '06 Annual Technical Conference","author":"Muniswamy-Reddy K.-K.","year":"2006","unstructured":"K.-K. Muniswamy-Reddy , D. A. Holland , U. Braun , and M. Seltzer . Provenance-aware Storage Systems. In ATEC '06: Proceedings of the annual conference on USENIX '06 Annual Technical Conference , pages 4 -- 4 , Berkeley, CA, USA , 2006 . USENIX Association. K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. Seltzer. Provenance-aware Storage Systems. In ATEC '06: Proceedings of the annual conference on USENIX '06 Annual Technical Conference, pages 4--4, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346308"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.10.010"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS 2005)","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Proceedings of the Network and Distributed System Security Symposium (NDSS 2005) , 2005 . J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005."},{"key":"e_1_3_2_1_29_1","unstructured":"U. G. D. of Veterans Affairs. Latest Information on Veterans Affairs Data Security. http:\/\/www.usa.gov\/veteransinfo\/ Mar. 2007.  U. G. D. of Veterans Affairs. Latest Information on Veterans Affairs Data Security. http:\/\/www.usa.gov\/veteransinfo\/ Mar. 2007."},{"key":"e_1_3_2_1_30_1","volume-title":"Spy Laptop Safety No Longer Mission Impossible","author":"O'Hanlon S.","year":"2001","unstructured":"S. O'Hanlon . Spy Laptop Safety No Longer Mission Impossible . Reuters , Aug. 2001 . S. O'Hanlon. Spy Laptop Safety No Longer Mission Impossible. Reuters, Aug. 2001."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217938"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2005.29"},{"key":"e_1_3_2_1_33_1","article-title":"Hotels.com Credit-Card Data Lost","author":"Reilly D.","year":"2006","unstructured":"D. Reilly . Hotels.com Credit-Card Data Lost in Stolen Laptop Computer. Wall Street Journal , June 2006 . D. Reilly. Hotels.com Credit-Card Data Lost in Stolen Laptop Computer. Wall Street Journal, June 2006.","journal-title":"Stolen Laptop Computer. Wall Street Journal"},{"key":"e_1_3_2_1_34_1","volume-title":"Testimony of The Computer Report. REPORT ON THE INVESTIGATION INTO IMPROPER ACCESS TO THE SENATE JUDICIARY COMMITTEE'S COMPUTER SYSTEM","author":"Arms U. S.","year":"2004","unstructured":"U. S. Sergeant at Arms . Testimony of The Computer Report. REPORT ON THE INVESTIGATION INTO IMPROPER ACCESS TO THE SENATE JUDICIARY COMMITTEE'S COMPUTER SYSTEM , 2004 . U. S. Sergeant at Arms. Testimony of The Computer Report. REPORT ON THE INVESTIGATION INTO IMPROPER ACCESS TO THE SENATE JUDICIARY COMMITTEE'S COMPUTER SYSTEM, 2004."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519073"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"e_1_3_2_1_38_1","unstructured":"H. Welte. Netfilter libnetfilter queue. http:\/\/www.netfilter.org\/.  H. Welte. Netfilter libnetfilter queue. http:\/\/www.netfilter.org\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.36"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation","author":"Zeldoch N.","year":"2006","unstructured":"N. Zeldoch , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e8res . Making Information Flow Explicit in Histar . In Proceedings of the 7th Symposium on Operating Systems Design and Implementation , Seattle, WA , November 2006 . N. Zeldoch, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e8res. Making Information Flow Explicit in Histar. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, November 2006."},{"key":"e_1_3_2_1_41_1","first-page":"293","volume-title":"Securing Distributed Systems with Information Flow Control. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , S. Boyd-Wickizer , and D. Mazi\u00e8res . Securing Distributed Systems with Information Flow Control. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation , pages 293 -- 308 , Berkeley, CA, USA , 2008 . USENIX Association. N. Zeldovich, S. Boyd-Wickizer, and D. Mazi\u00e8res. Securing Distributed Systems with Information Flow Control. In NSDI'08: Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pages 293--308, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_3_2_1_42_1","first-page":"225","volume-title":"OSDI","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , H. Kannan , M. Dalton , and C. Kozyrakis . Hardware Enforcement of Application Security Policies Using Tagged Memory. In R. Draves and R. van Renesse, editors , OSDI , pages 225 -- 240 . USENIX Association , 2008 . N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware Enforcement of Application Security Policies Using Tagged Memory. In R. Draves and R. van Renesse, editors, OSDI, pages 225--240. USENIX Association, 2008."}],"event":{"name":"VEE '10: ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments","location":"Pittsburgh Pennsylvania USA","acronym":"VEE '10","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 6th ACM SIGPLAN\/SIGOPS international conference on Virtual execution environments"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1735997.1736008","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1735997.1736008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:41:21Z","timestamp":1750236081000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1735997.1736008"}},"subtitle":["system support for derived data management"],"short-title":[],"issued":{"date-parts":[[2010,3,17]]},"references-count":42,"alternative-id":["10.1145\/1735997.1736008","10.1145\/1735997"],"URL":"https:\/\/doi.org\/10.1145\/1735997.1736008","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1837854.1736008","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,3,17]]},"assertion":[{"value":"2010-03-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}