{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:45:35Z","timestamp":1773193535780,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,4]]},"DOI":"10.1145\/1993498.1993540","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T07:53:52Z","timestamp":1307346832000},"page":"355-366","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Language-independent sandboxing of just-in-time compilation and self-modifying code"],"prefix":"10.1145","author":[{"given":"Jason","family":"Ansel","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Petr","family":"Marchenko","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"\u00dalfar","family":"Erlingsson","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Elijah","family":"Taylor","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Brad","family":"Chen","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Derek L.","family":"Schuff","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"David","family":"Sehr","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Cliff L.","family":"Biffle","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]},{"given":"Bennet","family":"Yee","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609960"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378832"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/857076.857077"},{"key":"e_1_3_2_1_4_1","volume-title":"The security architecture of the chromium browser. Technical report","author":"Barth A.","year":"2008","unstructured":"A. Barth , C. Jackson , C. Reis , and Google Chrome Team . The security architecture of the chromium browser. Technical report , Stanford University , 2008 . URL http:\/\/crypto.stanford.edu\/websec\/chromium\/chromium-security-architecture.pdf. A. Barth, C. Jackson, C. Reis, and Google Chrome Team. The security architecture of the chromium browser. Technical report, Stanford University, 2008. URL http:\/\/crypto.stanford.edu\/websec\/chromium\/chromium-security-architecture.pdf."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460690.1460736"},{"key":"e_1_3_2_1_6_1","volume-title":"Naval Postgraduate School","author":"Barwinski Mark","year":"2006","unstructured":"Mark Barwinski , Cynthia Irvine , and Tim Levin . Empirical study of drive-by-download spyware. Technical report , Naval Postgraduate School , 2006 . Mark Barwinski, Cynthia Irvine, and Tim Levin. Empirical study of drive-by-download spyware. Technical report, Naval Postgraduate School, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/224056.224077"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250743"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411304.1411315"},{"key":"e_1_3_2_1_10_1","volume-title":"ATC","author":"Cantrill Bryan M.","year":"2004","unstructured":"Bryan M. Cantrill , Michael W. Shapiro , and Adam H. Leventhal . Dynamic instrumentation of production systems . In ATC , 2004 . Bryan M. Cantrill, Michael W. Shapiro, and Adam H. Leventhal. Dynamic instrumentation of production systems. In ATC, 2004."},{"key":"e_1_3_2_1_11_1","volume-title":"OSDI","author":"Castro Miguel","year":"2006","unstructured":"Miguel Castro , Manuel Costa , and Tim Harris . Securing software by enforcing data-flow integrity . In OSDI , 2006 . Miguel Castro, Manuel Costa, and Tim Harris. Securing software by enforcing data-flow integrity. In OSDI, 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629581"},{"key":"e_1_3_2_1_13_1","volume-title":"Black Hat DC","author":"Blazakis D.","year":"2010","unstructured":"Blazakis D. Interpreter exploitation : Pointer inference and JIT spraying . In Black Hat DC , 2010 . Blazakis D. Interpreter exploitation: Pointer inference and JIT spraying. In Black Hat DC, 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"IFIP","author":"Deutsch P.","year":"1971","unstructured":"P. Deutsch and C. A. Grant . A flexible measurement tool for software systems . In IFIP , 1971 . P. Deutsch and C. A. Grant. A flexible measurement tool for software systems. In IFIP, 1971."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/800017.800542"},{"key":"e_1_3_2_1_16_1","unstructured":"ECMA 2001. URL http:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST\/Ecma-327.pdf.  ECMA 2001. URL http:\/\/www.ecma-international.org\/publications\/files\/ECMA-ST\/Ecma-327.pdf."},{"key":"e_1_3_2_1_17_1","volume-title":"Mitigating drive-by download attacks: Challenges and open problems. In iNetSec 2009 -- Open Research Problems in Network Security","author":"Egele Manuel","year":"2009","unstructured":"Manuel Egele , Engin Kirda , and Christopher Kruegel . Mitigating drive-by download attacks: Challenges and open problems. In iNetSec 2009 -- Open Research Problems in Network Security , 2009 . Manuel Egele, Engin Kirda, and Christopher Kruegel. Mitigating drive-by download attacks: Challenges and open problems. In iNetSec 2009 -- Open Research Problems in Network Security, 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/335169.335201"},{"key":"e_1_3_2_1_19_1","volume-title":"High-performance binary applets","author":"Erlingsson \u00dalfar","year":"1997","unstructured":"\u00dalfar Erlingsson . High-performance binary applets , 1997 . URL http:\/\/www.cs.cornell.edu\/home\/ulfar\/cuba\/paper. \u00dalfar Erlingsson. High-performance binary applets, 1997. URL http:\/\/www.cs.cornell.edu\/home\/ulfar\/cuba\/paper."},{"key":"e_1_3_2_1_20_1","volume-title":"OSDI","author":"Erlingsson \u00dalfar","year":"2006","unstructured":"\u00dalfar Erlingsson , Mart\u00edn Abadi , Michael Vrable , Mihai Budiu , and George C. Necula . Xfi: software guards for system address spaces . In OSDI , 2006 . \u00dalfar Erlingsson, Mart\u00edn Abadi, Michael Vrable, Mihai Budiu, and George C. Necula. Xfi: software guards for system address spaces. In OSDI, 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.434"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/5666.5673"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.53"},{"key":"e_1_3_2_1_24_1","volume-title":"Software Optimization Guide for AMD64 Processors","author":"Advance Micro Devices Inc.","year":"2005","unstructured":"Advance Micro Devices Inc. Software Optimization Guide for AMD64 Processors , 2005 . Advance Micro Devices Inc. Software Optimization Guide for AMD64 Processors, 2005."},{"key":"e_1_3_2_1_25_1","volume-title":"AMD64 Architecture Programmers Manual Volume 1: Application Programming","author":"Advance Micro Devices Inc.","year":"2009","unstructured":"Advance Micro Devices Inc. AMD64 Architecture Programmers Manual Volume 1: Application Programming , 2009 . Advance Micro Devices Inc. AMD64 Architecture Programmers Manual Volume 1: Application Programming, 2009."},{"key":"e_1_3_2_1_26_1","unstructured":"Google Inc. Google web toolkit. URL http:\/\/code.google.com\/webtoolkit.  Google Inc. Google web toolkit. URL http:\/\/code.google.com\/webtoolkit."},{"key":"e_1_3_2_1_27_1","unstructured":"Google Inc. The V8 JavaScript engine. URL http:\/\/code.google.com\/p\/v8.  Google Inc. The V8 JavaScript engine. URL http:\/\/code.google.com\/p\/v8."},{"key":"e_1_3_2_1_28_1","first-page":"1","author":"Intel Inc. Intel 64 and IA-32 Architectures Software Developers Manual Volume 3A: System Programming Guide","year":"2010","unstructured":"Intel Inc. Intel 64 and IA-32 Architectures Software Developers Manual Volume 3A: System Programming Guide , Part 1 , 2010 . Intel Inc. Intel 64 and IA-32 Architectures Software Developers Manual Volume 3A: System Programming Guide, Part 1, 2010.","journal-title":"Part"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/950785.950899"},{"key":"e_1_3_2_1_30_1","volume-title":"The Java Virtual Machine Specification","author":"Lindholm T.","year":"1996","unstructured":"T. Lindholm and F Yellin . The Java Virtual Machine Specification . Addison-Wesley , 1996 . T. Lindholm and F Yellin. The Java Virtual Machine Specification. Addison-Wesley, 1996."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_32_1","volume-title":"Usenix Security","author":"McCamant S.","year":"2006","unstructured":"S. McCamant and G. Morrisett . Evaluating SFI for a CISC architecture . In Usenix Security , 2006 . S. McCamant and G. Morrisett. Evaluating SFI for a CISC architecture. In Usenix Security, 2006."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/367177.367199"},{"key":"e_1_3_2_1_34_1","unstructured":"Kevin Millikin and Florian Schneider 2010. URL http:\/\/blog.chromium.org\/2010\/12\/new-crankshaft-for-v8.html.  Kevin Millikin and Florian Schneider 2010. URL http:\/\/blog.chromium.org\/2010\/12\/new-crankshaft-for-v8.html."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268954"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706313"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_3_2_1_38_1","volume-title":"NDSS","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In NDSS , 2005 . James Newsome and Dawn Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, 2005."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065887.1065893"},{"key":"e_1_3_2_1_40_1","volume-title":"Trusted computer system evaluation criteria (orange book)","author":"Department of Defense.","year":"1985","unstructured":"Department of Defense. Trusted computer system evaluation criteria (orange book) , 1985 . Department of Defense. Trusted computer system evaluation criteria (orange book), 1985."},{"key":"e_1_3_2_1_41_1","unstructured":"The Mono Project. The Mono language runtime. URL http:\/\/www.mono-project.com.  The Mono Project. The Mono language runtime. URL http:\/\/www.mono-project.com."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519090"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237175"},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX Security","author":"Sehr David","year":"2010","unstructured":"David Sehr , Robert Muth , Cliff Biffle , Victor Khimenko , Egor Pasko , Karl Schimpf , Bennet Yee , and Brad Chen . Adapting software fault isolation to contemporary cpu architectures . In USENIX Security , 2010 . David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, and Brad Chen. Adapting software fault isolation to contemporary cpu architectures. In USENIX Security, 2010."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866331"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/4434.708254"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1017\/S095679680200463X"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810479.1810530"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2006.16"},{"key":"e_1_3_2_1_50_1","unstructured":"SunSpider Benchmark Suite. URL http:\/\/www2.webkit.org\/perf\/sunspider\/sunspider.html.  SunSpider Benchmark Suite. URL http:\/\/www2.webkit.org\/perf\/sunspider\/sunspider.html."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047919"},{"key":"e_1_3_2_1_52_1","unstructured":"The perfmon2 hardware-based performance monitoring interface for Linux. URL http:\/\/perfmon2.sourceforge.net.  The perfmon2 hardware-based performance monitoring interface for Linux. URL http:\/\/perfmon2.sourceforge.net."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX Security","author":"Watson Robert","year":"2010","unstructured":"Robert Watson , Jonathan Anderson , Ben Laurie , and Kris Kennaway . Capsicum : practical capabilities for unix . In USENIX Security , 2010 . Robert Watson, Jonathan Anderson, Ben Laurie, and Kris Kennaway. Capsicum: practical capabilities for unix. In USENIX Security, 2010."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866415"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"}],"event":{"name":"PLDI '11: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"San Jose California USA","acronym":"PLDI '11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993498.1993540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:05:46Z","timestamp":1750230346000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":56,"alternative-id":["10.1145\/1993498.1993540","10.1145\/1993498"],"URL":"https:\/\/doi.org\/10.1145\/1993498.1993540","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1993316.1993540","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,6,4]]},"assertion":[{"value":"2011-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}