{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:13:10Z","timestamp":1750306390435,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":5,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1145\/2801694.2802141","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T20:08:52Z","timestamp":1440706132000},"page":"21-21","source":"Crossref","is-referenced-by-count":2,"title":["Demo"],"prefix":"10.1145","author":[{"given":"Kirill","family":"Kononenko","sequence":"first","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2801694.2802141-1","doi-asserted-by":"crossref","unstructured":"Kirill Kononenko. A unified approach to identifying and healing vulnerabilities in x86 machine code. In Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Mobicom '12, pages 397--398, New York, USA, ACM.","DOI":"10.1145\/2348543.2348593"},{"key":"key-10.1145\/2801694.2802141-2","unstructured":"Kirill Kononenko. Libjit linear scan: a model for fast and efficient compilation. In International Review on Modeling and Simulations, October 2010, Vol. 3 N.5."},{"key":"key-10.1145\/2801694.2802141-3","unstructured":"Kirill Kononenko. Fast Compilation in O(n). In Proceedings of the 2010 International Conference on Theoretical and Mathematical Foundations of Computer Science, pages 51--56, Orlando, Florida."},{"key":"key-10.1145\/2801694.2802141-4","doi-asserted-by":"crossref","unstructured":"Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, and Nikhil Swamy. 2013. DKAL*: constructing executable specifications of authorization protocols. In Proceedings of the 5th international conference on Engineering Secure Software and Systems (ESSoS'13), Jan J&#252;rjens, Benjamin Livshits, and Riccardo Scandariato (Eds.). Springer-Verlag, Berlin, Heidelberg, 139--154.","DOI":"10.1007\/978-3-642-36563-8_10"},{"key":"key-10.1145\/2801694.2802141-5","unstructured":"Amittai Aviram, Shu-Chun Weng, Sen Hu, and Bryan Ford. 2012. Efficient system-enforced deterministic parallelism. Commun. ACM, 55(5):111--119."}],"event":{"number":"2015","sponsor":["SIGMOBILE, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"acronym":"S3 '15","name":"the 2015 Workshop","start":{"date-parts":[[2015,9,11]]},"location":"Paris, France","end":{"date-parts":[[2015,9,11]]}},"container-title":["Proceedings of the 2015 Workshop on Wireless of the Students, by the Students, &amp; for the Students - S3 '15"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2801694.2802141","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2802141&amp;ftid=1616575&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:13Z","timestamp":1750223233000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2801694.2802141"}},"subtitle":["Dynamic Neutralization of Data Leakages"],"proceedings-subject":"Wireless of the Students, by the Students, & for the Students","short-title":[],"issued":{"date-parts":[[2015]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1145\/2801694.2802141","relation":{},"subject":[],"published":{"date-parts":[[2015]]}}}