{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:55Z","timestamp":1750307095057,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,16]],"date-time":"2012-10-16T00:00:00Z","timestamp":1350345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,16]]},"DOI":"10.1145\/2382196.2382215","type":"proceedings-article","created":{"date-parts":[[2012,10,15]],"date-time":"2012-10-15T17:13:12Z","timestamp":1350321192000},"page":"145-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Leveraging \"choice\" to automate authorization hook placement"],"prefix":"10.1145","author":[{"given":"Divya","family":"Muthukumaran","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University, University Park, PA, USA"}]},{"given":"Vinod","family":"Ganapathy","sequence":"additional","affiliation":[{"name":"Rutgers University, Piscataway, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/dev.laptop.org\/ticket\/260","author":"XACE.","year":"2006","unstructured":"Implement keyboard and event security in X using XACE. https:\/\/dev.laptop.org\/ticket\/260 , 2006 . Implement keyboard and event security in X using XACE. https:\/\/dev.laptop.org\/ticket\/260, 2006."},{"key":"e_1_3_2_1_3_1","volume-title":"2007 SELinux Symposium","author":"CARTER J.","year":"2007","unstructured":"CARTER , J. Using GConf as an Example of How to Create an Userspace Object Manager . 2007 SELinux Symposium ( 2007 ). CARTER, J. Using GConf as an Example of How to Create an Userspace Object Manager. 2007 SELinux Symposium (2007)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.13"},{"key":"e_1_3_2_1_5_1","volume-title":"Xen security modules (xsm). Xen Summit","author":"COKER G.","year":"2006","unstructured":"COKER , G. Xen security modules (xsm). Xen Summit ( 2006 ), 1--33. COKER, G. Xen security modules (xsm). Xen Summit (2006), 1--33."},{"key":"e_1_3_2_1_6_1","unstructured":"D.WALSH. Selinux\/apache. http:\/\/fedoraproject.org\/wiki\/SELinux\/apache.  D.WALSH. Selinux\/apache. http:\/\/fedoraproject.org\/wiki\/SELinux\/apache."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586141"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 14th Annual National Computer Security Conference (October","author":"EPSTEIN J.","year":"1991","unstructured":"EPSTEIN , J. , AND PICCIOTTO , J. Trusting X : Issues in building trusted X window systems -or- what's not trusted about X? In Proceedings of the 14th Annual National Computer Security Conference (October 1991 ). EPSTEIN, J., AND PICCIOTTO, J. Trusting X: Issues in building trusted X window systems -or- what's not trusted about X? In Proceedings of the 14th Annual National Computer Security Conference (October 1991)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884407"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266859"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102164"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.34"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.54"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1478873.1478928"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/996943.996944"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/503209.503260"},{"key":"e_1_3_2_1_19_1","unstructured":"KOHEI K. Security enhanced postgresql. SEPostgreSQLIntroduction.  KOHEI K. Security enhanced postgresql. SEPostgreSQLIntroduction."},{"key":"e_1_3_2_1_20_1","first-page":"18","volume-title":"Proceedings of the 14th conference on USENIX Security Symposium -","volume":"14","author":"LIVSHITS V. B.","year":"2005","unstructured":"LIVSHITS , V. B. , AND LAM , M. S. Finding security vulnerabilities in java applications with static analysis . In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14 (Berkeley, CA, USA, 2005 ), USENIX Association , pp. 18 -- 18 . LIVSHITS, V. B., AND LAM, M. S. Finding security vulnerabilities in java applications with static analysis. In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14 (Berkeley, CA, USA, 2005), USENIX Association, pp. 18--18."},{"key":"e_1_3_2_1_21_1","first-page":"303","volume-title":"Proceedings of the 21st National Information Systems Security Conference (October","author":"LOSCOCCO P. A.","year":"1998","unstructured":"LOSCOCCO , P. A. , SMALLEY , S. D. , MUCKELBAUER , P. A. , AND S. J. TURNER , R. C. T., AND FARRELL , J. F. The Inevitability of Failure: The flawed assumption of security in modern computing environments . In Proceedings of the 21st National Information Systems Security Conference (October 1998 ), pp. 303 -- 314 . LOSCOCCO, P. A., SMALLEY, S. D., MUCKELBAUER, P. A., AND S. J. TURNER, R. C. T., AND FARRELL, J. F. The Inevitability of Failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference (October 1998), pp. 303--314."},{"key":"e_1_3_2_1_22_1","unstructured":"LOVE R. Get on the D-BUS. http:\/\/www.linuxjournal.com\/article\/7744 Jan. 2005.   LOVE R. Get on the D-BUS. http:\/\/www.linuxjournal.com\/article\/7744 Jan. 2005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.48795"},{"key":"e_1_3_2_1_24_1","first-page":"213","volume-title":"11th International Conference, CC 2002","author":"NECULA G. C.","year":"2002","unstructured":"NECULA , G. C. , MCPEAK , S. , RAHUL , S. P. , AND WEIMER , W. Cil : Intermediate language and tools for analysis and transformation of c programs. In Compiler Construction , 11th International Conference, CC 2002 ( 2002 ), Springer , pp. 213 -- 228 . NECULA, G. C., MCPEAK, S., RAHUL, S. P., AND WEIMER, W. Cil: Intermediate language and tools for analysis and transformation of c programs. In Compiler Construction, 11th International Conference, CC 2002 (2002), Springer, pp. 213--228."},{"key":"e_1_3_2_1_25_1","first-page":"213","volume-title":"Proceedings of the 11th International Conference on Compiler Construction (London, UK, 2002), CC '02, Springer-Verlag","author":"NECULA G. C.","unstructured":"NECULA , G. C. , MCPEAK , S. , RAHUL , S. P. , AND WEIMER , W. Cil : Intermediate language and tools for analysis and transformation of c programs . In Proceedings of the 11th International Conference on Compiler Construction (London, UK, 2002), CC '02, Springer-Verlag , pp. 213 -- 228 . NECULA, G. C., MCPEAK, S., RAHUL, S. P., AND WEIMER, W. Cil: Intermediate language and tools for analysis and transformation of c programs. In Proceedings of the 11th International Conference on Compiler Construction (London, UK, 2002), CC '02, Springer-Verlag, pp. 213--228."},{"key":"e_1_3_2_1_26_1","first-page":"12","volume-title":"Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association","author":"POLITZ J. G.","unstructured":"POLITZ , J. G. , ELIOPOULOS , S. A. , GUHA , A. , AND KRISHNAMURTHI , S. Adsafety : type-based verification of javascript sandboxing . In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association , pp. 12 -- 12 . POLITZ, J. G., ELIOPOULOS, S. A., GUHA, A., AND KRISHNAMURTHI, S. Adsafety: type-based verification of javascript sandboxing. In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association, pp. 12--12."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.13"},{"key":"e_1_3_2_1_28_1","unstructured":"Re: Adding support for SE-Linux security. http:\/\/archives.postgresql.org\/pgsql-hackers\/2009-12\/msg00735.php 2009.  Re: Adding support for SE-Linux security. http:\/\/archives.postgresql.org\/pgsql-hackers\/2009-12\/msg00735.php 2009."},{"key":"e_1_3_2_1_29_1","unstructured":"SE-PostgreSQL? http:\/\/archives.postgresql.org\/message-id\/20090718160600.GE5172@fetter.org 2009.  SE-PostgreSQL? http:\/\/archives.postgresql.org\/message-id\/20090718160600.GE5172@fetter.org 2009."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048146"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993539"},{"key":"e_1_3_2_1_32_1","unstructured":"STAFFORD J. A. A Formal Language-Independent and Compositional Approach to Interprocedural Control Dependence Analysis. PhD thesis University of Colorado 2000.   STAFFORD J. A. A Formal Language-Independent and Compositional Approach to Interprocedural Control Dependence Analysis. PhD thesis University of Colorado 2000."},{"key":"e_1_3_2_1_33_1","first-page":"11","volume-title":"Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association","author":"SUN F.","unstructured":"SUN , F. , XU , L. , AND SU , Z. Static detection of access control vulnerabilities in web applications . In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association , pp. 11 -- 11 . SUN, F., XU, L., AND SU, Z. Static detection of access control vulnerabilities in web applications. In Proceedings of the 20th USENIX conference on Security (Berkeley, CA, USA, 2011), SEC'11, USENIX Association, pp. 11--11."},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 17th conference on Security symposium","author":"TAN L.","year":"2008","unstructured":"TAN , L. , ZHANG , X. , MA , X. , XIONG , W. , AND ZHOU , Y. Autoises : automatically inferring security specifications and detecting violations . In Proceedings of the 17th conference on Security symposium ( Berkeley, CA, USA , 2008 ), USENIX Association, pp. 379--394. TAN, L., ZHANG, X., MA, X., XIONG, W., AND ZHOU, Y. Autoises: automatically inferring security specifications and detecting violations. In Proceedings of the 17th conference on Security symposium (Berkeley, CA, USA, 2008), USENIX Association, pp. 379--394."},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Third Annual Security Enhanced Linux","author":"VANCE C.","year":"2007","unstructured":"VANCE , C. , MILLER , T. , AND DEKELBAUM , R. Security-enhanced darwin : Porting selinux to mac os x . Proceedings of the Third Annual Security Enhanced Linux ( 2007 ). VANCE, C., MILLER, T., AND DEKELBAUM, R. Security-enhanced darwin: Porting selinux to mac os x. Proceedings of the Third Annual Security Enhanced Linux (2007)."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 2007 Security-Enhanced Linux Workshop (Mar.","author":"WALSH E.","year":"2007","unstructured":"WALSH , E. Integrating x. org with security-enhanced linux . In Proceedings of the 2007 Security-Enhanced Linux Workshop (Mar. 2007 ). WALSH, E. Integrating x.org with security-enhanced linux. In Proceedings of the 2007 Security-Enhanced Linux Workshop (Mar. 2007)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250739"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference","author":"WATSON R. N.","year":"2001","unstructured":"WATSON , R. N. M. Trustedbsd : Adding trusted operating system features to freebsd . In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference ( Berkeley, CA, USA , 2001 ), USENIX Association, pp. 15--28. WATSON, R. N. M. Trustedbsd: Adding trusted operating system features to freebsd. In Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference (Berkeley, CA, USA, 2001), USENIX Association, pp. 15--28."},{"key":"e_1_3_2_1_39_1","volume-title":"Analysis of the X protocol for security concerns, draft II","author":"WIGGINS D.","year":"1996","unstructured":"WIGGINS , D. Analysis of the X protocol for security concerns, draft II , X Consortium Inc ., May 1996 . Available at: http:\/\/www.x.org\/X11R6.8.1\/docs\/Xserver\/analysis.pdf. WIGGINS, D. Analysis of the X protocol for security concerns, draft II, X Consortium Inc., May 1996. Available at: http:\/\/www.x.org\/X11R6.8.1\/docs\/Xserver\/analysis.pdf."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01815-2_23"},{"key":"e_1_3_2_1_41_1","first-page":"17","volume-title":"Proceedings of the 11th USENIX Security Symposium (August","author":"WRIGHT C.","year":"2002","unstructured":"WRIGHT , C. , COWAN , C. , SMALLEY , S. , MORRIS , J. , AND KROAH-HARTMAN , G. Linux security modules: General security support for the Linux kernel . In Proceedings of the 11th USENIX Security Symposium (August 2002 ), pp. 17 -- 31 . WRIGHT, C., COWAN, C., SMALLEY, S., MORRIS, J., AND KROAH-HARTMAN, G. Linux security modules: General security support for the Linux kernel. In Proceedings of the 11th USENIX Security Symposium (August 2002), pp. 17--31."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720279"}],"event":{"name":"CCS'12: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Raleigh North Carolina USA","acronym":"CCS'12"},"container-title":["Proceedings of the 2012 ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382215","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382196.2382215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:42Z","timestamp":1750239282000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382196.2382215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,16]]},"references-count":40,"alternative-id":["10.1145\/2382196.2382215","10.1145\/2382196"],"URL":"https:\/\/doi.org\/10.1145\/2382196.2382215","relation":{},"subject":[],"published":{"date-parts":[[2012,10,16]]},"assertion":[{"value":"2012-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}