{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:43:13Z","timestamp":1774946593891,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1524052"],"award-info":[{"award-number":["1524052"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1513797"],"award-info":[{"award-number":["1513797"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134054","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"1875-1891","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Nonmalleable Information Flow Control"],"prefix":"10.1145","author":[{"given":"Ethan","family":"Cecchetti","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Andrew C.","family":"Myers","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Owen","family":"Arden","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz &amp; Harvard University, Santa Cruz, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159803.1159839"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70525-3_9"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292555"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.42"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2016.17"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.2168\/LMCS-7(3:17)2011"},{"key":"e_1_3_2_2_8_1","volume-title":"Paralocks-Role-Based Information Flow Control and Beyond 37th ACM Symp. on Principles of Programming Languages (POPL).","author":"Broberg Niklas","year":"2010","unstructured":"Niklas Broberg and David Sands 2010. Paralocks-Role-Based Information Flow Control and Beyond 37th ACM Symp. on Principles of Programming Languages (POPL)."},{"key":"e_1_3_2_2_9_1","volume-title":"HLIO: Mixing Static and Dynamic Typing for Information-Flow Control in Haskell 20th ACM SIGPLAN Int'l Conf. on Functional Programming. ACM, 289--301.","author":"Buiras Pablo","year":"2015","unstructured":"Pablo Buiras, Dimitrios Vytiniotis, and Alejandro Russo. 2015. HLIO: Mixing Static and Dynamic Typing for Information-Flow Control in Haskell 20th ACM SIGPLAN Int'l Conf. on Functional Programming. ACM, 289--301."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2006.11"},{"key":"e_1_3_2_2_12_1","volume-title":"End-to-End Enforcement of Erasure and Declassification IEEE Symp. on Computer Security Foundations (CSF). 98--111","author":"Chong Stephen","unstructured":"Stephen Chong and Andrew C. Myers 2008. End-to-End Enforcement of Erasure and Declassification IEEE Symp. on Computer Security Foundations (CSF). 98--111."},{"key":"e_1_3_2_2_13_1","volume-title":"Hyperproperties IEEE Symp. on Computer Security Foundations (CSF). 51--65","author":"Michael","unstructured":"Michael R. Clarkson and Fred B. Schneider 2008. Hyperproperties IEEE Symp. on Computer Security Foundations (CSF). 51--65."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144503429856"},{"key":"e_1_3_2_2_16_1","volume-title":"Labels and Event Processes in the Asbestos Operating System 20th ACM Symp. on Operating System Principles (SOSP).","author":"Efstathopoulos Petros","year":"2005","unstructured":"Petros Efstathopoulos, Maxwell Krohn, Steve VanDeBogart, Cliff Frey, David Ziegler, Eddie Kohler, David Mazi\u00e8res, Frans Kaashoek, and Robert Morris. 2005. Labels and Event Processes in the Asbestos Operating System 20th ACM Symp. on Operating System Principles (SOSP)."},{"key":"e_1_3_2_2_17_1","volume-title":"Wu","author":"Ernst Michael D.","year":"2014","unstructured":"Michael D. Ernst, Ren\u00e9 Just, Suzanne Millstein, Werner Dietl, Stuart Pernsteiner, Franziska Roesner, Karl Koscher, Paulo Barros, Ravi Bhoraskar, Seungyeop Han, Paul Vines, and Edward X. Wu. 2014. Collaborative Verification of Information Flow for a High-Assurance App Store 21st ACM Conf. on Computer and Communications Security (CCS). 1092--1104."},{"key":"e_1_3_2_2_18_1","volume-title":"Role-Based Access Controls. In 15th National Computer Security Conference.","author":"Ferraiolo David","year":"1992","unstructured":"David Ferraiolo and Richard Kuhn 1992. Role-Based Access Controls. In 15th National Computer Security Conference."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_2_20_1","volume-title":"Aura: A Programming Language for Authorization and Audit 13th ACM SIGPLAN Int'l Conf. on Functional Programming","author":"Jia Limin","unstructured":"Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic 2008. Aura: A Programming Language for Authorization and Audit 13th ACM SIGPLAN Int'l Conf. on Functional Programming."},{"key":"e_1_3_2_2_21_1","volume-title":"Haskell Servant Example. https:\/\/github.com\/krdlab\/examples. (Dec","year":"2014","unstructured":"krdlab 2014. Haskell Servant Example. https:\/\/github.com\/krdlab\/examples. (Dec. 2014)."},{"key":"e_1_3_2_2_22_1","volume-title":"Information Flow Control for Standard OS Abstractions 21st ACM Symp. on Operating System Principles (SOSP).","author":"Krohn Maxwell","year":"2007","unstructured":"Maxwell Krohn, Alexander Yip, Micah Brodsky, Natan Cliffer, M. Frans Kaashoek, Eddie Kohler, and Robert Morris 2007. Information Flow Control for Standard OS Abstractions 21st ACM Symp. on Operating System Principles (SOSP)."},{"key":"e_1_3_2_2_23_1","volume-title":"19th IEEE Computer Security Foundations Workshop (CSFW). personPablo Buiras, Dan King, Stephen Chong, and Alejandro Russo","author":"Li Peng","year":"2015","unstructured":"Peng Li and Steve Zdancewic 2006. Encoding information flow in Haskell. In 19th IEEE Computer Security Foundations Workshop (CSFW). personPablo Buiras, Dan King, Stephen Chong, and Alejandro Russo 2015. It's My Privilege: Controlling Downgrading in DC-Labels Proceedings of the 11th International Workshop on Security and Trust Management."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63846"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1994.1093"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930133"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"},{"key":"e_1_3_2_2_28_1","volume-title":"Making Information Flow Explicit in HiStar. In 7th USENIX Symp. on Operating Systems Design and Implementation (OSDI). 263--278","author":"Zeldovich Nickolai","year":"2006","unstructured":"Nickolai Zeldovich, Silas Boyd-Wickizer, Eddie Kohler, and David Mazi\u00e8res 2006. Making Information Flow Explicit in HiStar. In 7th USENIX Symp. on Operating Systems Design and Implementation (OSDI). 263--278."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0019-9"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134054","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134054","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134054"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":27,"alternative-id":["10.1145\/3133956.3134054","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134054","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}