{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:49:44Z","timestamp":1773481784738,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1053143"],"award-info":[{"award-number":["CNS-1053143"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-10-2-4089"],"award-info":[{"award-number":["N66001-10-2-4089"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043567","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"101-114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Intrusion recovery for database-backed web applications"],"prefix":"10.1145","author":[{"given":"Ramesh","family":"Chandra","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Meelap","family":"Shah","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Neha","family":"Narula","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Nickolai","family":"Zeldovich","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544951"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1033782"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920853"},{"key":"e_1_3_2_1_4_1","unstructured":"Damon Cortesi. Twitter StalkDaily worm postmortem. http:\/\/dcortesi.com\/2009\/04\/11\/twitter-stalkdaily-worm-postmortem\/.  Damon Cortesi. Twitter StalkDaily worm postmortem. http:\/\/dcortesi.com\/2009\/04\/11\/twitter-stalkdaily-worm-postmortem\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/42201.42205"},{"key":"e_1_3_2_1_7_1","unstructured":"C. Goldfeder. Gmail snooze with apps script. http:\/\/googleappsdeveloper.blogspot.com\/2011\/07\/gmail-snooze-with-apps-script.html.  C. Goldfeder. Gmail snooze with apps script. http:\/\/googleappsdeveloper.blogspot.com\/2011\/07\/gmail-snooze-with-apps-script.html."},{"key":"e_1_3_2_1_8_1","volume-title":"The Register","author":"Goodin D.","year":"2008","unstructured":"D. Goodin . Surfing Google may be harmful to your security . The Register , Aug 2008 . http:\/\/www.theregister.co.uk\/2008\/08\/09\/google_gadget_threats\/. D. Goodin. Surfing Google may be harmful to your security. The Register, Aug 2008. http:\/\/www.theregister.co.uk\/2008\/08\/09\/google_gadget_threats\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Google Inc. Google apps script. http:\/\/code.google.com\/googleapps\/appsscript\/.  Google Inc. Google apps script. http:\/\/code.google.com\/googleapps\/appsscript\/."},{"key":"e_1_3_2_1_10_1","unstructured":"S. Gordeychik. Web application security statistics http:\/\/www.webappsec.org\/projects\/statistics\/.  S. Gordeychik. Web application security statistics http:\/\/www.webappsec.org\/projects\/statistics\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236458"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095820"},{"key":"e_1_3_2_1_14_1","first-page":"89","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"Kim T.","year":"2010","unstructured":"T. Kim , X. Wang , N. Zeldovich , and M. F. Kaashoek . Intrusion recovery using selective re-execution . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation , pages 89 -- 104 , Vancouver, Canada , Oct 2010 . T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek. Intrusion recovery using selective re-execution. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, pages 89--104, Vancouver, Canada, Oct 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047918"},{"key":"e_1_3_2_1_16_1","first-page":"50","volume-title":"Proceedings of the AAAI Workshop on AI Approaches in Fraud Detection and Risk Management","author":"Lee W.","year":"1997","unstructured":"W. Lee , S. J. Stolfo , and P. K. Chan . Learning patterns from Unix process execution traces for intrusion detection . In Proceedings of the AAAI Workshop on AI Approaches in Fraud Detection and Risk Management , pages 50 -- 56 , Jul 1997 . W. Lee, S. J. Stolfo, and P. K. Chan. Learning patterns from Unix process execution traces for intrusion detection. In Proceedings of the AAAI Workshop on AI Approaches in Fraud Detection and Risk Management, pages 50--56, Jul 1997."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008731200105"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 2008 USENIX Annual Technical Conference","author":"Livshits B.","year":"2008","unstructured":"B. Livshits and W. Cui . Spectator: Detection and containment of JavaScript worms . In Proceedings of the 2008 USENIX Annual Technical Conference , Boston, MA , Jun 2008 . B. Livshits and W. Cui. Spectator: Detection and containment of JavaScript worms. In Proceedings of the 2008 USENIX Annual Technical Conference, Boston, MA, Jun 2008."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519080"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1525932.1525941"},{"key":"e_1_3_2_1_21_1","unstructured":"MediaWiki. MediaWiki. http:\/\/www.mediawiki.org.  MediaWiki. MediaWiki. http:\/\/www.mediawiki.org."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 7th Symposium on Networked Systems Design and Implementation","author":"Mickens J.","year":"2010","unstructured":"J. Mickens , J. Elson , and J. Howell . Mugshot: Deterministic capture and replay for JavaScript applications . In Proceedings of the 7th Symposium on Networked Systems Design and Implementation , San Jose, CA , Apr 2010 . J. Mickens, J. Elson, and J. Howell. Mugshot: Deterministic capture and replay for JavaScript applications. In Proceedings of the 7th Symposium on Networked Systems Design and Implementation, San Jose, CA, Apr 2010."},{"key":"e_1_3_2_1_23_1","volume-title":"Caja: Safe active content in sanitized JavaScript","author":"Miller M. S.","year":"2008","unstructured":"M. S. Miller , M. Samuel , B. Laurie , I. Awad , and M. Stay . Caja: Safe active content in sanitized JavaScript , 2008 . http:\/\/code.google.com\/p\/google-caja\/downloads\/list. M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized JavaScript, 2008. http:\/\/code.google.com\/p\/google-caja\/downloads\/list."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 2006 USENIX Annual Technical Conference","author":"Muniswamy-Reddy K.-K.","year":"2006","unstructured":"K.-K. Muniswamy-Reddy , D. Holland , U. Braun , and M. Seltzer . Provenance-aware storage systems . In Proceedings of the 2006 USENIX Annual Technical Conference , Boston, MA, May- Jun 2006 . K.-K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer. Provenance-aware storage systems. In Proceedings of the 2006 USENIX Annual Technical Conference, Boston, MA, May-Jun 2006."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855807.1855817"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 8th Conference on File and Storage Technologies","author":"Muniswamy-Reddy K.-K.","year":"2010","unstructured":"K.-K. Muniswamy-Reddy , P. Macko , and M. Seltzer . Provenance for the cloud . In Proceedings of the 8th Conference on File and Storage Technologies , San Jose, CA , Feb 2010 . K.-K. Muniswamy-Reddy, P. Macko, and M. Seltzer. Provenance for the cloud. In Proceedings of the 8th Conference on File and Storage Technologies, San Jose, CA, Feb 2010."},{"key":"e_1_3_2_1_27_1","unstructured":"National Vulnerability Database. CVE statistics. http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics Feb 2011.  National Vulnerability Database. CVE statistics. http:\/\/web.nvd.nist.gov\/view\/vuln\/statistics Feb 2011."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 5th Biennial Conference on Innovative Data Systems Research","author":"Olston C.","year":"2011","unstructured":"C. Olston and A. D. Sarma . Ibis: A provenance manager for multi-layer systems . In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research , Pacific Grove, CA , Jan 2011 . C. Olston and A. D. Sarma. Ibis: A provenance manager for multi-layer systems. In Proceedings of the 5th Biennial Conference on Innovative Data Systems Research, Pacific Grove, CA, Jan 2011."},{"key":"e_1_3_2_1_29_1","unstructured":"Oracle Corporation. Oracle flashback technology. http:\/\/www.oracle.com\/technetwork\/database\/features\/availability\/flashback-overview-082751.html.  Oracle Corporation. Oracle flashback technology. http:\/\/www.oracle.com\/technetwork\/database\/features\/availability\/flashback-overview-082751.html."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1986.1663327"},{"key":"e_1_3_2_1_31_1","unstructured":"J. Tyson. Recent Facebook XSS attacks show increasing sophistication. http:\/\/theharmonyguy.com\/2011\/04\/21\/recent-facebook-xss-attacks\/ Apr 2011.  J. Tyson. Recent Facebook XSS attacks show increasing sophistication. http:\/\/theharmonyguy.com\/2011\/04\/21\/recent-facebook-xss-attacks\/ Apr 2011."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_1_33_1","unstructured":"K. Wickre. About that fake post. http:\/\/googleblog.blogspot.com\/2006\/10\/about-that-fake-post.html.  K. Wickre. About that fake post. http:\/\/googleblog.blogspot.com\/2006\/10\/about-that-fake-post.html."}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","location":"Cascais Portugal","acronym":"SOSP '11","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043567","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043567","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043567"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":33,"alternative-id":["10.1145\/2043556.2043567","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043567","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}