{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:59Z","timestamp":1772164019480,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Google, Inc."},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-10-C- 0237 and FA8750-11-C-0249"],"award-info":[{"award-number":["FA8750-10-C- 0237 and FA8750-11-C-0249"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"UK Higher Education Innovation Fund"},{"DOI":"10.13039\/501100004815","name":"Isaac Newton Trust","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004815","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Thales E-Security"},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/K008528\/1 and EP\/K503757\/1"],"award-info":[{"award-number":["EP\/K008528\/1 and EP\/K503757\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,4,4]]},"DOI":"10.1145\/3037697.3037725","type":"proceedings-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T08:47:40Z","timestamp":1491382060000},"page":"569-583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["CHERI JNI"],"prefix":"10.1145","author":[{"given":"David","family":"Chisnall","sequence":"first","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Brooks","family":"Davis","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, USA"}]},{"given":"Khilan","family":"Gudka","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"David","family":"Brazdil","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Alexandre","family":"Joannou","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Jonathan","family":"Woodruff","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"A. Theodore","family":"Markettos","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"J. Edward","family":"Maste","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Robert","family":"Norton","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Stacey","family":"Son","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Michael","family":"Roe","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Simon W.","family":"Moore","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]},{"given":"Peter G.","family":"Neumann","sequence":"additional","affiliation":[{"name":"SRI International, Menlo Park, USA"}]},{"given":"Ben","family":"Laurie","sequence":"additional","affiliation":[{"name":"DeepMind Technologies Ltd., London, United Kingdom"}]},{"given":"Robert N.M.","family":"Watson","sequence":"additional","affiliation":[{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CHERI open data web site. https:\/\/www.cl.cam.ac.uk\/research\/security\/ctsrd\/data\/. Accessed: 2017-01-27.  CHERI open data web site. https:\/\/www.cl.cam.ac.uk\/research\/security\/ctsrd\/data\/. Accessed: 2017-01-27."},{"key":"e_1_3_2_1_2_1","unstructured":"CHERI open-source web site. http:\/\/www.cheri-cpu.org\/. Accessed: 2017-01-27.  CHERI open-source web site. http:\/\/www.cheri-cpu.org\/. Accessed: 2017-01-27."},{"key":"e_1_3_2_1_3_1","unstructured":"Java native interface specification. https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jni\/spec\/jniTOC.html. Accessed: 2016-07-25.  Java native interface specification. https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jni\/spec\/jniTOC.html. Accessed: 2016-07-25."},{"key":"e_1_3_2_1_4_1","unstructured":"Jsr 51: New i\/o apis for the java platform. https:\/\/jcp.org\/en\/jsr\/detail?id=51. Accessed: 2016-07-25.  Jsr 51: New i\/o apis for the java platform. https:\/\/jcp.org\/en\/jsr\/detail?id=51. Accessed: 2016-07-25."},{"key":"e_1_3_2_1_5_1","unstructured":"Novosoft c2j. http:\/\/www.novosoft-us.com\/solutions\/product_c2j.shtml. Accessed: 2016-07--25.  Novosoft c2j. http:\/\/www.novosoft-us.com\/solutions\/product_c2j.shtml. Accessed: 2016-07--25."},{"key":"e_1_3_2_1_6_1","unstructured":"Tangible software solutions' C++ to java converter. http:\/\/www.tangiblesoftwaresolutions.com\/Product_Details\/CPlusPlus_to_Java_Converter_Details.html. Accessed: 2016-07-25.  Tangible software solutions' C++ to java converter. http:\/\/www.tangiblesoftwaresolutions.com\/Product_Details\/CPlusPlus_to_Java_Converter_Details.html. Accessed: 2016-07-25."},{"key":"e_1_3_2_1_7_1","unstructured":"C++\/CLI language specification. (ECMA-372) December 2005.  C++\/CLI language specification. (ECMA-372) December 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694367"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2001.989483"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353536.1346295"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Symposium on Internet Technologies and Systems. USENIX","author":"Gong L.","year":"1997","unstructured":"L. Gong , M. Mueller , H. Prafullchandra , and R. Schemers . Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2 . In Proceedings of the Symposium on Internet Technologies and Systems. USENIX , December 1997 . L. Gong, M. Mueller, H. Prafullchandra, and R. Schemers. Going beyond the sandbox: An overview of the new security architecture in the Java Development Kit 1.2. In Proceedings of the Symposium on Internet Technologies and Systems. USENIX, December 1997."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018396.2018411"},{"key":"e_1_3_2_1_13_1","unstructured":"Intel Plc. Introduction to Intel\u00ae memory protection extensions. http:\/\/software.intel.com\/en-us\/articles\/introduction-to-intel-memory-protection-extensions July 2013.  Intel Plc. Introduction to Intel\u00ae memory protection extensions. http:\/\/software.intel.com\/en-us\/articles\/introduction-to-intel-memory-protection-extensions July 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10011"},{"key":"e_1_3_2_1_15_1","volume-title":"Kilpatrick. Privman: A Library for Partitioning Applications. In Proceedings of 2003 USENIX Annual Technical Conference","author":"Douglas","year":"2003","unstructured":"Douglas Kilpatrick. Privman: A Library for Partitioning Applications. In Proceedings of 2003 USENIX Annual Technical Conference , 2003 . Douglas Kilpatrick. Privman: A Library for Partitioning Applications. In Proceedings of 2003 USENIX Annual Technical Conference, 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Ephedra - A C to Java Migration Environment: Approaches, Case Studies and Tools for Migrating Legacy Systems from C and C++ to Java","author":"Martin Johannes","year":"2009","unstructured":"Johannes Martin . Ephedra - A C to Java Migration Environment: Approaches, Case Studies and Tools for Migrating Legacy Systems from C and C++ to Java . LAP Lambert Academic Publishing , Germany , 2009 . Johannes Martin. Ephedra - A C to Java Migration Environment: Approaches, Case Studies and Tools for Migrating Legacy Systems from C and C++ to Java. LAP Lambert Academic Publishing, Germany, 2009."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914988"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2002.995799"},{"key":"e_1_3_2_1_20_1","volume-title":"The Design and Implementation of the FreeBSD Operating System. Pearson","author":"McKusick Marshal Kirk","year":"2014","unstructured":"Marshal Kirk McKusick , George V. Neville-Neil , and Robert N. M . Watson . The Design and Implementation of the FreeBSD Operating System. Pearson , 2014 . Marshal Kirk McKusick, George V. Neville-Neil, and Robert N. M. Watson. The Design and Implementation of the FreeBSD Operating System. Pearson, 2014."},{"key":"e_1_3_2_1_21_1","volume-title":"Tyler Close. Joe-E: A Security-Oriented Subset of Java. In NDSS 2010: Proceedings of the Network and Distributed System Security Symposium","author":"Mettler Adrian","year":"2010","unstructured":"Adrian Mettler , David Wagner , and Tyler Close. Joe-E: A Security-Oriented Subset of Java. In NDSS 2010: Proceedings of the Network and Distributed System Security Symposium , 2010 . Adrian Mettler, David Wagner, and Tyler Close. Joe-E: A Security-Oriented Subset of Java. In NDSS 2010: Proceedings of the Network and Distributed System Security Symposium, 2010."},{"key":"e_1_3_2_1_22_1","volume-title":"May","author":"Miller Mark S.","year":"2008","unstructured":"Mark S. Miller , Mike Samuel , Ben Laurie , Ihab Awad , and Mike Stay . Caja: Safe active content in sanitized javascript , May 2008 . http:\/\/google-caja.googlecode.com\/files\/caja-spec-2008-06-07.pdf. Mark S. Miller, Mike Samuel, Ben Laurie, Ihab Awad, and Mike Stay. Caja: Safe active content in sanitized javascript, May 2008. http:\/\/google-caja.googlecode.com\/files\/caja-spec-2008-06-07.pdf."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542504"},{"key":"e_1_3_2_1_25_1","volume-title":"Peter Honeyman. Preventing Privilege Escalation. In Proceedings of the 12th USENIX Security Symposium. USENIX","author":"Provos Neils","year":"2003","unstructured":"Neils Provos , Markus Friedl , and Peter Honeyman. Preventing Privilege Escalation. In Proceedings of the 12th USENIX Security Symposium. USENIX , 2003 . Neils Provos, Markus Friedl, and Peter Honeyman. Preventing Privilege Escalation. In Proceedings of the 12th USENIX Security Symposium. USENIX, 2003."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519090"},{"key":"e_1_3_2_1_27_1","volume-title":"USENIX ATC 2012","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitry Vyukov. Addresssanitizer : A fast address sanity checker . In USENIX ATC 2012 , 2012 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. Addresssanitizer: A fast address sanity checker. In USENIX ATC 2012, 2012."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866331"},{"key":"e_1_3_2_1_29_1","first-page":"842","volume-title":"JVM-Portable Sandboxing of Java's Native Libraries","author":"Sun Mengtao","year":"2012","unstructured":"Mengtao Sun and Gang Tan . JVM-Portable Sandboxing of Java's Native Libraries , pages 842 -- 858 . Springer Berlin Heidelberg , Berlin, Heidelberg , 2012 . Mengtao Sun and Gang Tan. JVM-Portable Sandboxing of Java's Native Libraries, pages 842--858. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012."},{"key":"e_1_3_2_1_30_1","first-page":"165","volume-title":"Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec '14","author":"Sun Mengtao","year":"2014","unstructured":"Mengtao Sun and Gang Tan . Nativeguard : Protecting android applications from third-party native libraries . In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec '14 , pages 165 -- 176 , New York, NY, USA , 2014 . ACM. Mengtao Sun and Gang Tan. Nativeguard: Protecting android applications from third-party native libraries. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks, WiSec '14, pages 165--176, New York, NY, USA, 2014. ACM."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496711.1496736"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076022.1993491"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2678373.2665741"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 19th USENIX Security Symposium. USENIX","author":"Watson R.N.M.","year":"2010","unstructured":"R.N.M. Watson , J. Anderson , B. Laurie , and K. Kennaway . Capsicum: Practical capabilities for Unix . In Proceedings of the 19th USENIX Security Symposium. USENIX , August 2010 . R.N.M. Watson, J. Anderson, B. Laurie, and K. Kennaway. Capsicum: Practical capabilities for Unix. In Proceedings of the 19th USENIX Security Symposium. USENIX, August 2010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323276.1323278"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408792"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095814"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853201"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.25"}],"event":{"name":"ASPLOS '17: Architectural Support for Programming Languages and Operating Systems","location":"Xi'an China","acronym":"ASPLOS '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037725","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037725","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3037697.3037725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:50:27Z","timestamp":1750204227000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3037697.3037725"}},"subtitle":["Sinking the Java Security Model into the C"],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":40,"alternative-id":["10.1145\/3037697.3037725","10.1145\/3037697"],"URL":"https:\/\/doi.org\/10.1145\/3037697.3037725","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3093336.3037725","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/3093337.3037725","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,4,4]]},"assertion":[{"value":"2017-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}