{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:53Z","timestamp":1750306673175,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T00:00:00Z","timestamp":1406505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,28]]},"DOI":"10.1145\/2637113.2637115","type":"proceedings-article","created":{"date-parts":[[2014,7,22]],"date-time":"2014-07-22T15:08:30Z","timestamp":1406041710000},"page":"2-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["You Sank My Battleship!"],"prefix":"10.1145","author":[{"given":"Alley","family":"Stoughton","sequence":"first","affiliation":[{"name":"MIT Lincoln Laboratory"}]},{"given":"Andrew","family":"Johnson","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory"}]},{"given":"Samuel","family":"Beller","sequence":"additional","affiliation":[{"name":"Brandeis University"}]},{"given":"Karishma","family":"Chadha","sequence":"additional","affiliation":[{"name":"Wellesley College"}]},{"given":"Dennis","family":"Chen","sequence":"additional","affiliation":[{"name":"Tufts University"}]},{"given":"Kenneth","family":"Foner","sequence":"additional","affiliation":[{"name":"Brandeis University"}]},{"given":"Michael","family":"Zhivich","sequence":"additional","affiliation":[{"name":"MIT Lincoln Laboratory"}]}],"member":"320","published-online":{"date-parts":[[2014,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Version 3.4.1","author":"Arden O.","year":"2013","unstructured":"O. Arden , S. Chong , A. Myers , K. Vikram , and D. Zhang . Jif Distribution , Version 3.4.1 , April 2013 . www.cs.cornell.edu\/jif. O. Arden, S. Chong, A. Myers, K. Vikram, and D. Zhang. Jif Distribution, Version 3.4.1, April 2013. www.cs.cornell.edu\/jif."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_3_2_1_4_1","first-page":"47","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12","author":"Giffin D. B.","year":"2012","unstructured":"D. B. Giffin , A. Levy , D. Stefan , D. Terei , D. Mazi\u00e8res , J. C. Mitchell , and A. Russo . Hails: Protecting data privacy in untrusted web applications . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12 , pages 47 -- 60 , Berkeley, CA, USA , 2012 . USENIX Association. D. B. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazi\u00e8res, J. C. Mitchell, and A. Russo. Hails: Protecting data privacy in untrusted web applications. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12, pages 47--60, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.10"},{"key":"e_1_3_2_1_6_1","first-page":"437","volume-title":"Protection. In Proc. of the Fifth Princeton Symposium on Information Sciences and Systems","author":"Lampson B. W.","year":"1971","unstructured":"B. W. Lampson . Protection. In Proc. of the Fifth Princeton Symposium on Information Sciences and Systems , pages 437 -- 443 . Princeton University , 1971 . Reprinted in Operating Systems Review, 8, 1, January 1974, pages 18--24. B. W. Lampson. Protection. In Proc. of the Fifth Princeton Symposium on Information Sciences and Systems, pages 437--443. Princeton University, 1971. Reprinted in Operating Systems Review, 8, 1, January 1974, pages 18--24."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/549659"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/317040"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2096148.2034688"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_16"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364506.2364524"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. Programming Language Interference and Dependence (PLID)","author":"Zdancewic S.","year":"2004","unstructured":"S. Zdancewic . Challenges for information-flow security . In Proc. Programming Language Interference and Dependence (PLID) , 2004 . S. Zdancewic. Challenges for information-flow security. In Proc. Programming Language Interference and Dependence (PLID), 2004."},{"key":"e_1_3_2_1_17_1","first-page":"236","volume-title":"Proc. of the 2003 IEEE Symposium on Security and Privacy","author":"Zheng L.","year":"2003","unstructured":"L. Zheng , S. Chong , A. C. Myers , and S. Zdancewic . Using replication and partitioning to build secure distributed systems . In Proc. of the 2003 IEEE Symposium on Security and Privacy , pages 236 -- 250 . IEEE, 2003 . L. Zheng, S. Chong, A. C. Myers, and S. Zdancewic. Using replication and partitioning to build secure distributed systems. In Proc. of the 2003 IEEE Symposium on Security and Privacy, pages 236--250. IEEE, 2003."}],"event":{"name":"ECOOP '14: European Conference on Object-Oriented Programming","sponsor":["Uppsala University, Department of Information Science Uppsala University, Department of Information Science","SIGPLAN ACM Special Interest Group on Programming Languages","SIGSOFT ACM Special Interest Group on Software Engineering","AITO Assoc Internationale por les Technologies Objects"],"location":"Uppsala Sweden","acronym":"ECOOP '14"},"container-title":["Proceedings of the Ninth Workshop on Programming Languages and Analysis for Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637113.2637115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2637113.2637115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:55Z","timestamp":1750230055000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2637113.2637115"}},"subtitle":["A Case Study in Secure Programming"],"short-title":[],"issued":{"date-parts":[[2014,7,28]]},"references-count":17,"alternative-id":["10.1145\/2637113.2637115","10.1145\/2637113"],"URL":"https:\/\/doi.org\/10.1145\/2637113.2637115","relation":{},"subject":[],"published":{"date-parts":[[2014,7,28]]},"assertion":[{"value":"2014-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}