{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:13:28Z","timestamp":1776122008765,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,4]]},"DOI":"10.1145\/1993498.1993512","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T07:53:52Z","timestamp":1307346832000},"page":"109-120","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Caisson"],"prefix":"10.1145","author":[{"given":"Xun","family":"Li","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Mohit","family":"Tiwari","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Jason K.","family":"Oberg","sequence":"additional","affiliation":[{"name":"University of California, San Diego, San Diego, CA, USA"}]},{"given":"Vineeth","family":"Kashyap","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Frederic T.","family":"Chong","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Timothy","family":"Sherwood","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ben","family":"Hardekopf","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Synopsys University program","author":"CMOS","unstructured":"90nm generic CMOS library , Synopsys University program , Synopsys Inc . 90nm generic CMOS library, Synopsys University program, Synopsys Inc."},{"key":"e_1_3_2_1_2_1","unstructured":"Common critera evaluation and validation scheme. http:\/\/www.niap-ccevs.org\/cc-scheme\/cc_docs\/.  Common critera evaluation and validation scheme. http:\/\/www.niap-ccevs.org\/cc-scheme\/cc_docs\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Validated FIPS 140-1 and FIPS 140-2 cryptographic modules. http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/documents\/140-1\/140val-all.htm.  Validated FIPS 140-1 and FIPS 140-2 cryptographic modules. http:\/\/csrc.nist.gov\/groups\/STM\/cmvp\/documents\/140-1\/140val-all.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"What does CC EAL6 mean? http:\/\/www.ok-labs.com\/blog\/entry\/what-does-cc-eal6-mean\/.  What does CC EAL6 mean? http:\/\/www.ok-labs.com\/blog\/entry\/what-does-cc-eal6-mean\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11967668_15"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314466.1314469"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.91"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325702"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.10.031"},{"key":"e_1_3_2_1_10_1","first-page":"382","volume-title":"Noninterference for concurrent programs","author":"Boudol G.","year":"2001","unstructured":"G. Boudol and I. Castellani . Noninterference for concurrent programs . pages 382 -- 395 , 2001 . G. Boudol and I. Castellani. Noninterference for concurrent programs. pages 382--395, 2001."},{"key":"e_1_3_2_1_11_1","unstructured":"E. M. Clarke O. Grumberg and D.Peled. Model Checking. MIT Press 2000.  E. M. Clarke O. Grumberg and D.Peled. Model Checking. MIT Press 2000."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250722"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"e_1_3_2_1_15_1","unstructured":"F. A. A. (FAA). Boeing model 787-8 airplane; systems and data networks security-isolation or protection from unauthorized passenger domain systems access. http:\/\/cryptome.info\/faa010208.htm.  F. A. A. (FAA). Boeing model 787-8 airplane; systems and data networks security-isolation or protection from unauthorized passenger domain systems access. http:\/\/cryptome.info\/faa010208.htm."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/143165.143174"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328478"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050014"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6423(87)90035-9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.02.031"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/647171.718325"},{"key":"e_1_3_2_1_23_1","volume-title":"Design and implementation of an abstract interpreter for VHDL","author":"Hymans C.","year":"2003","unstructured":"C. Hymans . Design and implementation of an abstract interpreter for VHDL . D.Geist and E.Tronci, editors, CHARME, 2860 of LNCS , 2003 . C. Hymans. Design and implementation of an abstract interpreter for VHDL. D.Geist and E.Tronci, editors, CHARME, 2860 of LNCS, 2003."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/646764.703989"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456508.1456514"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.34"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294293"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.6"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the Workshop on Formal Aspects in Security and Trust","author":"Li P.","year":"2003","unstructured":"P. Li , Y. Mao , and S. Zdancewic . Information integrity policies . In Proceedings of the Workshop on Formal Aspects in Security and Trust , 2003 . P. Li, Y. Mao, and S. Zdancewic. Information integrity policies. In Proceedings of the Workshop on Formal Aspects in Security and Trust, 2003."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814217.1814225"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2007.40"},{"key":"e_1_3_2_1_33_1","unstructured":"A. C. Myers N. Nystrom L. Zheng and S. Zdancewic. Jif: Java information flow. Software release. http:\/\/www.cs.cornell.edu\/jif July 2001.  A. C. Myers N. Nystrom L. Zheng and S. Zdancewic. Jif: Java information flow. Software release. http:\/\/www.cs.cornell.edu\/jif July 2001."},{"key":"e_1_3_2_1_34_1","volume-title":"NDSS","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In NDSS , 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005."},{"key":"e_1_3_2_1_35_1","volume-title":"Proc. of BSDCan","author":"Percival C.","year":"2005","unstructured":"C. Percival . Cache missing for fun and profit . In Proc. of BSDCan , 2005 . C. Percival. Cache missing for fun and profit. In Proc. of BSDCan, 2005."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_37_1","first-page":"120","volume-title":"Closing internal timing channels by transformation","author":"Russo A.","year":"2007","unstructured":"A. Russo , J. Hughes , D. Naumann , and A. Sabelfeld . Closing internal timing channels by transformation . pages 120 -- 135 , 2007 . A. Russo, J. Hughes, D. Naumann, and A. Sabelfeld. Closing internal timing channels by transformation. pages 120--135, 2007."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378533.1378538"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_40_1","volume-title":"7th International Workshop on Worst-Case Execution Time (WCET) Analysis","author":"Schlickling M.","year":"2007","unstructured":"M. Schlickling and M. Pister . A framework for static analysis of VHDL code . 7th International Workshop on Worst-Case Execution Time (WCET) Analysis , 2007 . M. Schlickling and M. Pister. A framework for static analysis of VHDL code. 7th International Workshop on Worst-Case Execution Time (WCET) Analysis, 2007."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.502221"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268975"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024393.1024404"},{"key":"e_1_3_2_1_44_1","volume-title":"version v7.30 - initial IEEE standardization proposal edition","author":"Technologies E.","year":"2005","unstructured":"E. Technologies . The Esterel v7 Reference Manual , version v7.30 - initial IEEE standardization proposal edition . 2005 . E. Technologies. The Esterel v7 Reference Manual, version v7.30 - initial IEEE standardization proposal edition. 2005."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669174"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508258"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535294_8"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.31"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2008.4658637"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"},{"key":"e_1_3_2_1_52_1","volume-title":"Eliminating covert flows with minimum typings. page 156","author":"Volpano D.","year":"1997","unstructured":"D. Volpano and G. Smith . Eliminating covert flows with minimum typings. page 156 , 1997 . D. Volpano and G. Smith. Eliminating covert flows with minimum typings. page 156, 1997."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/646620.697712"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250662.1250723"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020843229247"},{"key":"e_1_3_2_1_56_1","first-page":"29","volume-title":"Observational determinism for concurrent program security","author":"Zdancewic S.","year":"2003","unstructured":"S. Zdancewic and A. C. Myers . Observational determinism for concurrent program security . pages 29 -- 43 , 2003 . S. Zdancewic and A. C. Myers. Observational determinism for concurrent program security. pages 29--43, 2003."},{"key":"e_1_3_2_1_57_1","first-page":"293","volume-title":"NSDI","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , S. Boyd-Wickizer , and D. Mazieres . Security distributed systems with information flow control . In NSDI , pages 293 -- 308 , Apr. 2008 . N. Zeldovich, S. Boyd-Wickizer, and D.Mazieres. Security distributed systems with information flow control. In NSDI, pages 293--308, Apr. 2008."},{"key":"e_1_3_2_1_58_1","volume-title":"OSDI","author":"Zeldovich N.","year":"2006","unstructured":"N. Zeldovich , S. Boyd-Wickizer , E. Kohler , and D. Mazi\u00e8res . Making information flow explicit in HiStar . In OSDI , 2006 . N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazi\u00e8res. Making information flow explicit in HiStar. In OSDI, 2006."},{"key":"e_1_3_2_1_59_1","volume-title":"OSDI","author":"Zeldovich N.","year":"2008","unstructured":"N. Zeldovich , H. Kannan , M. Dalton , and C. Kozyrakis . Hardware enforcement of application security policies using tagged memory . In OSDI , Dec. 2008 . N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware enforcement of application security policies using tagged memory. In OSDI, Dec. 2008."}],"event":{"name":"PLDI '11: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"San Jose California USA","acronym":"PLDI '11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993512","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993498.1993512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:05:46Z","timestamp":1750230346000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993512"}},"subtitle":["a hardware description language for secure information flow"],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":58,"alternative-id":["10.1145\/1993498.1993512","10.1145\/1993498"],"URL":"https:\/\/doi.org\/10.1145\/1993498.1993512","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1993316.1993512","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,6,4]]},"assertion":[{"value":"2011-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}