{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:02Z","timestamp":1750306082194,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134607","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Kakute"],"prefix":"10.1145","author":[{"given":"Jianyu","family":"Jiang","sequence":"first","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Shixiong","family":"Zhao","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Danish","family":"Alsayed","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Yuexuan","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, The University of Hong Kong"}]},{"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Feng","family":"Liang","sequence":"additional","affiliation":[{"name":"The University of Hong Kong"}]},{"given":"Zhaoquan","family":"Gu","sequence":"additional","affiliation":[{"name":"Guangzhou University, The University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"17","volume-title":"Proceedings of the 6th USENIX Conference on Hot Topics in Cloud Computing, HotCloud'14","author":"Akoush S.","year":"2014","unstructured":"S. Akoush , L. Carata , R. Sohan , and A. Hopper . Mrlazy: Lazy runtime label propagation for mapreduce . In Proceedings of the 6th USENIX Conference on Hot Topics in Cloud Computing, HotCloud'14 , pages 17 -- 17 , Berkeley, CA, USA , 2014 . USENIX Association. S. Akoush, L. Carata, R. Sohan, and A. Hopper. Mrlazy: Lazy runtime label propagation for mapreduce. In Proceedings of the 6th USENIX Conference on Hot Topics in Cloud Computing, HotCloud'14, pages 17--17, Berkeley, CA, USA, 2014. USENIX Association."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27585-2_12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660212"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2005.01.010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454166"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.37"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.18"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994530"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-002-0083-8"},{"key":"e_1_3_2_1_11_1","unstructured":"A. Dave and M. Zaharia. Arthur: Rich post-facto debugging for production analytics applications.  A. Dave and M. Zaharia. Arthur: Rich post-facto debugging for production analytics applications."},{"key":"e_1_3_2_1_12_1","first-page":"10","volume-title":"OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation","author":"Dean J.","year":"2004","unstructured":"J. Dean and S. Ghemawat . Mapreduce: simplified data processing on large clusters . In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation , pages 10 -- 10 , 2004 . J. Dean and S. Ghemawat. Mapreduce: simplified data processing on large clusters. In OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, pages 10--10, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Enck W.","year":"2010","unstructured":"W. Enck , P. Gilbert , B.-G. Chun , L. P. Cox , J. Jung , P. McDaniel , and A. N. Sheth . TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , pages 1 -- 6 , 2010 . W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), pages 1--6, 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393650"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687553.1687568"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884813"},{"key":"e_1_3_2_1_18_1","volume-title":"CIDR","author":"Ikeda R.","year":"2011","unstructured":"R. Ikeda , H. Park , and J. Widom . Provenance for generalized map and reduce workflows . In CIDR 2011 . Stanford InfoLab. R. Ikeda, H. Park, and J. Widom. Provenance for generalized map and reduce workflows. In CIDR 2011. Stanford InfoLab."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/2850583.2850595"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516704"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2014.83"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_1_24_1","volume-title":"DTIC Document","author":"Leek T. R.","year":"2007","unstructured":"T. R. Leek , G. Z. Baker , R. E. Brown , M. A. Zhivich , and R. Lippmann . Coverage maximization using dynamic taint tracing. Technical report , DTIC Document , 2007 . T. R. Leek, G. Z. Baker, R. E. Brown, M. A. Zhivich, and R. Lippmann. Coverage maximization using dynamic taint tracing. Technical report, DTIC Document, 2007."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523619"},{"key":"e_1_3_2_1_26_1","volume-title":"TaPP","author":"Martin A. P.","year":"2012","unstructured":"A. P. Martin , J. Lyle , and C. Namiluko . Provenance as a security control . In TaPP , 2012 . A. P. Martin, J. Lyle, and C. Namiluko. Provenance as a security control. In TaPP, 2012."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.27"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559850"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213876"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2014.7035307"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_33_1","volume-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. 2005."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376726"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_21"},{"key":"e_1_3_2_1_36_1","unstructured":"https:\/\/cwiki.apache.org\/confluence\/display\/PIG\/PigMix.  https:\/\/cwiki.apache.org\/confluence\/display\/PIG\/PigMix."},{"key":"e_1_3_2_1_37_1","first-page":"20","volume-title":"Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10","author":"Roy I.","year":"2010","unstructured":"I. Roy , S. T. V. Setty , A. Kilzer , V. Shmatikov , and E. Witchel . Airavat: Security and privacy for mapreduce . In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10 , pages 20 -- 20 , Berkeley, CA, USA , 2010 . USENIX Association. I. Roy, S. T. V. Setty, A. Kilzer, V. Shmatikov, and E. Witchel. Airavat: Security and privacy for mapreduce. In Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10, pages 20--20, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_38_1","unstructured":"https:\/\/spark.apache.org\/examples.html.  https:\/\/spark.apache.org\/examples.html."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991109"},{"key":"e_1_3_2_1_40_1","first-page":"77","volume-title":"Proceedings of the Tenth Symposium on Operating Systems Design and Implementation (OSDI '12)","author":"Tang Y.","year":"2012","unstructured":"Y. Tang , P. Ames , S. Bhamidipati , A. Bijlani , R. Geambasu , and N. Sarda . CleanOS: limiting mobile data exposure with idle eviction . In Proceedings of the Tenth Symposium on Operating Systems Design and Implementation (OSDI '12) , pages 77 -- 91 , 2012 . Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. CleanOS: limiting mobile data exposure with idle eviction. In Proceedings of the Tenth Symposium on Operating Systems Design and Implementation (OSDI '12), pages 77--91, 2012."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629604"},{"key":"e_1_3_2_1_42_1","unstructured":"Y. Yu M. Isard D. Fetterly M. Budiu \u00da. Erlingsson P. K. Gunda and J. Currey. Dryadlinq: A system for general-purpose distributed data-parallel computing using a high-level language.  Y. Yu M. Isard D. Fetterly M. Budiu \u00da. Erlingsson P. K. Gunda and J. Currey. Dryadlinq: A system for general-purpose distributed data-parallel computing using a high-level language."},{"key":"e_1_3_2_1_43_1","first-page":"2","volume-title":"Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation","author":"Zaharia M.","year":"2012","unstructured":"M. Zaharia , M. Chowdhury , T. Das , A. Dave , J. Ma , M. McCauley , M. J. Franklin , S. Shenker , and I. Stoica . Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation , pages 2 -- 2 . USENIX Association , 2012 . M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin, S. Shenker, and I. Stoica. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, pages 2--2. USENIX Association, 2012."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2075658.2075670"},{"key":"e_1_3_2_1_45_1","unstructured":"J. Zhang H. Zhou R. Chen X. Fan Z. Guo H. Lin J. Y. Li W. Lin J. Zhou and L. Zhou. Optimizing data shuffling in data-parallel computation by understanding user-defined functions.  J. Zhang H. Zhou R. Chen X. Fan Z. Guo H. Lin J. Y. Li W. Lin J. Zhou and L. Zhou. Optimizing data shuffling in data-parallel computation by understanding user-defined functions."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046767"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735997.1736008"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535568.2448939"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134607"}},"subtitle":["A Precise, Unified Information Flow Analysis System for Big-data Security"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":48,"alternative-id":["10.1145\/3134600.3134607","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134607","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}