{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:48:10Z","timestamp":1763459290029,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T00:00:00Z","timestamp":1481068800000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005713","name":"Office of the Secretary of Defense","doi-asserted-by":"publisher","award":["HQ0034-13-D-0004"],"award-info":[{"award-number":["HQ0034-13-D-0004"]}],"id":[{"id":"10.13039\/100005713","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,7]]},"DOI":"10.1145\/2818000.2818003","type":"proceedings-article","created":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T12:06:08Z","timestamp":1449835568000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Evaluating the Flexibility of the Java Sandbox"],"prefix":"10.1145","author":[{"given":"Zack","family":"Coker","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Michael","family":"Maass","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Tianyuan","family":"Ding","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Claire","family":"Le Goues","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Joshua","family":"Sunshine","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267279.1267289"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/599797"},{"key":"e_1_3_2_1_3_1","unstructured":"IBM Security Systems \"IBM X-Force threat intelligence report.\" http:\/\/www.ibm.com\/security\/xforce\/ February 2014."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"L. Garber \"Have Java's Security Issues Gotten out of Hand? \" in 2012 IEEE Technology News pp. 18--21 2012. 10.1109\/MC.2012.411","DOI":"10.1109\/MC.2012.411"},{"key":"e_1_3_2_1_5_1","volume-title":"June","author":"Singh A.","year":"2013","unstructured":"A. Singh and S. Kapoor, \"Get Set Null Java Security.\" http:\/\/www.fireeye.com\/blog\/technical\/2013\/06\/get-set-null-java-security.html, June 2013."},{"key":"e_1_3_2_1_6_1","unstructured":"D. Svoboda \"Anatomy of Java Exploits.\" http:\/\/www.cert.org\/blogs\/certcc\/post.cfm?EntryID=136."},{"key":"e_1_3_2_1_7_1","unstructured":"A. Gowdiak \"Security Vulnerabilities in Java SE \" Tech. Rep. SE-2012-01 Project Security Explorations 2012."},{"key":"e_1_3_2_1_8_1","volume-title":"Rep. BH-US-12","author":"Oh J. W.","year":"2012","unstructured":"J. W. Oh, \"Recent Java exploitation trends and malware,\" Tech. Rep. BH-US-12, Black Hat, 2012."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.46"},{"key":"e_1_3_2_1_10_1","unstructured":"\"Permissions in the JDK.\" http:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/security\/permissions.html 2014."},{"key":"e_1_3_2_1_11_1","unstructured":"\"Default Policy Implementation and Policy File Syntax.\" http:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/security\/PolicyFiles.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796804005453"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2004.11"},{"key":"e_1_3_2_1_14_1","first-page":"52","volume-title":"Understanding Java Stack Inspection,\" in IEEE Symposium on Security and Privacy","author":"Wallach D. S.","year":"1998","unstructured":"D. S. Wallach and E. W. Felten, \"Understanding Java Stack Inspection,\" in IEEE Symposium on Security and Privacy, pp. 52--63, 1998."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503301"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2049728"},{"key":"e_1_3_2_1_17_1","volume-title":"Sept.","author":"Svoboda D.","year":"2014","unstructured":"D. Svoboda and Y. Toda, \"Anatomy of Another Java Zero-Day Exploit.\" https:\/\/oracleus.activeevents.com\/2014\/connect\/sessionDetail.ww?SESSION_ID=2120, Sept. 2014."},{"key":"e_1_3_2_1_18_1","unstructured":"\"Vulnerability Summary for CVE-2012-0507.\" https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2012-0507 June 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/54289.871709"},{"key":"e_1_3_2_1_20_1","unstructured":"\"Vulnerability Summary for CVE-2012-4681.\" http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2012-4681 Oct. 2013."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_2_1_22_1","unstructured":"\"Java Virtual Machine Tool Interface.\" https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jvmti\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362814"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671255"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866332"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251353.1251369"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093157.2093159"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866331"},{"key":"e_1_3_2_1_31_1","first-page":"842","volume-title":"JVM-Portable Sandboxing of Java's Native Libraries,\" in European Symposium on Research in Computer Security (ESORICS)","author":"Sun M.","year":"2012","unstructured":"M. Sun and G. Tan, \"JVM-Portable Sandboxing of Java's Native Libraries,\" in European Symposium on Research in Computer Security (ESORICS), pp. 842--858, 2012."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772720"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.41"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00076-5"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420988"},{"key":"e_1_3_2_1_36_1","first-page":"55","volume-title":"An android application sandbox system for suspicious software detection,\" in Conference on Malicious and Unwanted Software (MALWARE)","author":"Blasing T.","year":"2010","unstructured":"T. Blasing, L. Batyuk, A.-D. Schmidt, S. A. Camtepe, and S. Albayrak, \"An android application sandbox system for suspicious software detection,\" in Conference on Malicious and Unwanted Software (MALWARE), pp. 55--62, 2010."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.44"},{"key":"e_1_3_2_1_38_1","unstructured":"\"IntelliJ IDEA inspections list (632).\" http:\/\/www.jetbrains.com\/idea\/documentation\/inspections.jsp."}],"event":{"name":"ACSAC 2015: 2015 Annual Computer Security Applications Conference","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Los Angeles CA USA","acronym":"ACSAC 2015"},"container-title":["Proceedings of the 31st Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818003","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818003","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2818000.2818003","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:42:18Z","timestamp":1763458938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2818000.2818003"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,7]]},"references-count":38,"alternative-id":["10.1145\/2818000.2818003","10.1145\/2818000"],"URL":"https:\/\/doi.org\/10.1145\/2818000.2818003","relation":{},"subject":[],"published":{"date-parts":[[2015,12,7]]},"assertion":[{"value":"2015-12-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}