{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T02:17:12Z","timestamp":1772158632746,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,15]],"date-time":"2018-10-15T00:00:00Z","timestamp":1539561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1513854"],"award-info":[{"award-number":["1513854"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010663","name":"European Research Council","doi-asserted-by":"publisher","award":["Starting Grant SECOMP (715753)"],"award-info":[{"award-number":["Starting Grant SECOMP (715753)"]}],"id":[{"id":"10.13039\/100010663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HOPE\/SSITH"],"award-info":[{"award-number":["HOPE\/SSITH"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,15]]},"DOI":"10.1145\/3243734.3243745","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T17:38:33Z","timestamp":1539711513000},"page":"1351-1368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["When Good Components Go Bad"],"prefix":"10.1145","author":[{"given":"Carmine","family":"Abate","sequence":"first","affiliation":[{"name":"Inria Paris &amp; University of Trento, Paris, France"}]},{"given":"Arthur","family":"Azevedo de Amorim","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Roberto","family":"Blanco","sequence":"additional","affiliation":[{"name":"Inria Paris, Paris, France"}]},{"given":"Ana Nora","family":"Evans","sequence":"additional","affiliation":[{"name":"Inria Paris &amp; University of Virginia, Charlottesville, VA, USA"}]},{"given":"Guglielmo","family":"Fachini","sequence":"additional","affiliation":[{"name":"Inria Paris, Paris, France"}]},{"given":"Catalin","family":"Hritcu","sequence":"additional","affiliation":[{"name":"Inria Paris, Paris, France"}]},{"given":"Th\u00e9o","family":"Laurent","sequence":"additional","affiliation":[{"name":"Inria Paris &amp; ENS Paris, Paris, France"}]},{"given":"Benjamin C.","family":"Pierce","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, PA, USA"}]},{"given":"Marco","family":"Stronati","sequence":"additional","affiliation":[{"name":"Inria Paris, Paris, France"}]},{"given":"Andrew","family":"Tolmach","sequence":"additional","affiliation":[{"name":"Portland State University, Portland, OR, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,15]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Security Issues for Mobile and Distributed Objects (Lecture Notes in Computer Science)","author":"Abadi Mart\u0131n","unstructured":"Mart\u0131n Abadi . 1999. Protection in Programming-Language Translations . In Security Issues for Mobile and Distributed Objects (Lecture Notes in Computer Science) , Vol. Vol. 1603 . Springer , 19--34. Mart\u0131n Abadi. 1999. Protection in Programming-Language Translations. In Security Issues for Mobile and Distributed Objects (Lecture Notes in Computer Science), Vol. Vol. 1603. Springer, 19--34."},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 10th Annual Network and Distributed System Security Symposium. The Internet Society, 107--121","author":"Abadi M.","unstructured":"M. Abadi and C. Fournet . 2003. Access Control Based on Execution History . In Proceedings of the 10th Annual Network and Distributed System Security Symposium. The Internet Society, 107--121 . M. Abadi and C. Fournet. 2003. Access Control Based on Execution History. In Proceedings of the 10th Annual Network and Distributed System Security Symposium. The Internet Society, 107--121."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.2002.3086"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36830-1_9"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2240276.2240279"},{"key":"e_1_3_2_2_6_1","unstructured":"Carmine Abate Roberto Blanco Deepak Garg Cuatualin Hrictcu Marco Patrignani and J\u00e9r\u00e9my Thibault. 2018. Exploring Robust Property Preservation for Secure Compilation. arXiv:1807.04603. https:\/\/arxiv.org\/abs\/1807.04603  Carmine Abate Roberto Blanco Deepak Garg Cuatualin Hrictcu Marco Patrignani and J\u00e9r\u00e9my Thibault. 2018. Exploring Robust Property Preservation for Secure Compilation. arXiv:1807.04603. https:\/\/arxiv.org\/abs\/1807.04603"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2676726.2676972"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.12"},{"key":"e_1_3_2_2_9_1","volume-title":"1st Summit on Advances in Programming Languages (LIPIcs)","volume":"32","author":"Ahmed Amal","year":"2015","unstructured":"Amal Ahmed . 2015 . Verified Compilers for a Multi-Language World . In 1st Summit on Advances in Programming Languages (LIPIcs) , Vol. Vol. 32 . Schloss Dagstuhl, 15--31. Amal Ahmed. 2015. Verified Compilers for a Multi-Language World. In 1st Summit on Advances in Programming Languages (LIPIcs), Vol. Vol. 32. Schloss Dagstuhl, 15--31."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411204.1411227"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034773.2034830"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535839"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.55"},{"key":"e_1_3_2_2_15_1","volume-title":"The Meaning of Memory Safety. In 7th International Conference on Principles of Security and Trust (POST). 79--105","author":"de Amorim Arthur Azevedo","unstructured":"Arthur Azevedo de Amorim , Cuatualin Hrictcu , and Benjamin C. Pierce . 2018 . The Meaning of Memory Safety. In 7th International Conference on Principles of Security and Trust (POST). 79--105 . Arthur Azevedo de Amorim, Cuatualin Hrictcu, and Benjamin C. Pierce. 2018. The Meaning of Memory Safety. In 7th International Conference on Principles of Security and Trust (POST). 79--105."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2009.24"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658996"},{"key":"e_1_3_2_2_18_1","volume-title":"Wedge: Splitting Applications into Reduced-Privilege Compartments USENIX Symposium on Networked Systems Design and Implementation. 309--322.","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau , Petr Marchenko , Mark Handley , and Brad Karp . 2008 . Wedge: Splitting Applications into Reduced-Privilege Compartments USENIX Symposium on Networked Systems Design and Implementation. 309--322. Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-Privilege Compartments USENIX Symposium on Networked Systems Design and Implementation. 309--322."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694367"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1891823.1891830"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837618"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158126"},{"key":"e_1_3_2_2_24_1","volume-title":"Fully-abstract Compilation by Approximate Back-translation. LMCS","author":"Devriese Dominique","year":"2017","unstructured":"Dominique Devriese , Marco Patrignani , Frank Piessens , and Steven Keuchel . 2017. Modular , Fully-abstract Compilation by Approximate Back-translation. LMCS Vol. 13 , 4 ( 2017 ). Dominique Devriese, Marco Patrignani, Frank Piessens, and Steven Keuchel. 2017. Modular, Fully-abstract Compilation by Approximate Back-translation. LMCS Vol. 13, 4 (2017)."},{"key":"e_1_3_2_2_25_1","volume-title":"Reasoning About Object Capabilities with Logical Relations and Effect Parametricity 1st IEEE European Symposium on Security and Privacy. IEEE.","author":"Devriese Dominique","year":"2016","unstructured":"Dominique Devriese , Frank Piessens , and Lars Birkedal . 2016 b . Reasoning About Object Capabilities with Logical Relations and Effect Parametricity 1st IEEE European Symposium on Security and Privacy. IEEE. Dominique Devriese, Frank Piessens, and Lars Birkedal. 2016 b. Reasoning About Object Capabilities with Logical Relations and Effect Parametricity 1st IEEE European Symposium on Security and Privacy. IEEE."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786763.2694383"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192388"},{"key":"e_1_3_2_2_28_1","unstructured":". http:\/\/arxiv.org\/abs\/1710.06125  . http:\/\/arxiv.org\/abs\/1710.06125"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.7"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429114"},{"key":"e_1_3_2_2_31_1","unstructured":"Anitha Gollamudi and C\u00e9dric Fournet. 2018. Building Secure SGX Enclaves using F* C\/C  Anitha Gollamudi and C\u00e9dric Fournet. 2018. Building Secure SGX Enclaves using F* C\/C"},{"key":"e_1_3_2_2_32_1","volume-title":"2nd Workshop on Principles of Secure Compilation","unstructured":"and X64. 2nd Workshop on Principles of Secure Compilation ( PriSC). and X64. 2nd Workshop on Principles of Secure Compilation (PriSC)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1297352.1297358"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/11539452_17"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813611"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978405"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737979"},{"key":"e_1_3_2_2_39_1","unstructured":"ISO\/IEC. 2011. ISO\/IEC 9899:2011 - Programming languages -- C.  ISO\/IEC. 2011. ISO\/IEC 9899:2011 - Programming languages -- C."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.18"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31987-0_29"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2015.38"},{"key":"e_1_3_2_2_43_1","volume-title":"Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. In IEEE 29th Computer Security Foundations Symposium, CSF 2016. 45--60","author":"Juglaret Yannis","unstructured":"Yannis Juglaret , Cuatualin Hrictcu , Arthur Azevedo de Amorim , Boris Eng , and Benjamin C. Pierce . 2016 . Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. In IEEE 29th Computer Security Foundations Symposium, CSF 2016. 45--60 . Yannis Juglaret, Cuatualin Hrictcu, Arthur Azevedo de Amorim, Boris Eng, and Benjamin C. Pierce. 2016. Beyond Good and Evil: Formalizing the Security Guarantees of Compartmentalizing Compilation. In IEEE 29th Computer Security Foundations Symposium, CSF 2016. 45--60."},{"key":"e_1_3_2_2_44_1","volume-title":"Benjamin C. Pierce, Antal Spector-Zabusky, and Andrew Tolmach.","author":"Juglaret Yannis","year":"2015","unstructured":"Yannis Juglaret , Cuatualin Hrictcu , Arthur Azevedo de Amorim , Benjamin C. Pierce, Antal Spector-Zabusky, and Andrew Tolmach. 2015 . Towards a Fully Abstract Compiler Using Micro-Policies: Secure Compilation for Mutually Distrustful Components. CoRR Vol . abs\/1510.00697 (2015). http:\/\/arxiv.org\/abs\/1510.00697 Yannis Juglaret, Cuatualin Hrictcu, Arthur Azevedo de Amorim, Benjamin C. Pierce, Antal Spector-Zabusky, and Andrew Tolmach. 2015. Towards a Fully Abstract Compiler Using Micro-Policies: Secure Compilation for Mutually Distrustful Components. CoRR Vol. abs\/1510.00697 (2015). http:\/\/arxiv.org\/abs\/1510.00697"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837642"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.08.014"},{"key":"e_1_3_2_2_47_1","volume-title":"Privman: A Library for Partitioning Applications Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference. USENIX Association, 273--284","author":"Kilpatrick Douglas","year":"2003","unstructured":"Douglas Kilpatrick . 2003 . Privman: A Library for Partitioning Applications Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference. USENIX Association, 273--284 . Douglas Kilpatrick. 2003. Privman: A Library for Partitioning Applications Proceedings of the FREENIX Track: 2003 USENIX Annual Technical Conference. USENIX Association, 273--284."},{"key":"e_1_3_2_2_48_1","unstructured":"Thomas F. Knight Jr. Andr\u00e9 DeHon Andrew Sutherland Udit Dhawan Albert Kwon and Sumit Ray. 2012. SAFE ISA (version 3.0 with Interrupts per Thread). http:\/\/ic.ese.upenn.edu\/distributions\/safe_processor\/  Thomas F. Knight Jr. Andr\u00e9 DeHon Andrew Sutherland Udit Dhawan Albert Kwon and Sumit Ray. 2012. SAFE ISA (version 3.0 with Interrupts per Thread). http:\/\/ic.ese.upenn.edu\/distributions\/safe_processor\/"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2014.10"},{"key":"e_1_3_2_2_51_1","volume-title":"Robust Satisfaction. In CONCUR '99: 10th International Conference on Concurrency Theory. 383--398","author":"Kupferman Orna","unstructured":"Orna Kupferman and Moshe Y. Vardi . 1999 . Robust Satisfaction. In CONCUR '99: 10th International Conference on Concurrency Theory. 383--398 . Orna Kupferman and Moshe Y. Vardi. 1999. Robust Satisfaction. In CONCUR '99: 10th International Conference on Concurrency Theory. 383--398."},{"key":"e_1_3_2_2_52_1","volume-title":"Schneider","author":"Lamport Leslie","year":"1984","unstructured":"Leslie Lamport and Fred B . Schneider . 1984 . Formal Foundation for Specification and Verification Distributed Systems: Methods and Tools for Specification, An Advanced Course, April 3--12, 1984 and April 16--25, 1985 Munich . 203--285. Leslie Lamport and Fred B. Schneider. 1984. Formal Foundation for Specification and Verification Distributed Systems: Methods and Tools for Specification, An Advanced Course, April 3--12, 1984 and April 16--25, 1985 Munich. 203--285."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_2_54_1","unstructured":"Chris Lattner. 2011. What Every C Programmer Should Know About Undefined Behavior #1\/3. LLVM Project Blog. http:\/\/blog.llvm.org\/2011\/05\/what-every-c-programmer-should-know.html  Chris Lattner. 2011. What Every C Programmer Should Know About Undefined Behavior #1\/3. LLVM Project Blog. http:\/\/blog.llvm.org\/2011\/05\/what-every-c-programmer-should-know.html"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062343"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538814"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-008-9099-0"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254111"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908109"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.35"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2951913.2951941"},{"key":"e_1_3_2_2_62_1","volume-title":"Foundational Property-Based Testing. In 6th International Conference on Interactive Theorem Proving (ITP) (LNCS)","volume":"9236","author":"Paraskevopoulou Zoe","unstructured":"Zoe Paraskevopoulou , Cuatualin Hrictcu , Maxime D\u00e9n\u00e8s , Leonidas Lampropoulos , and Benjamin C. Pierce . 2015 . Foundational Property-Based Testing. In 6th International Conference on Interactive Theorem Proving (ITP) (LNCS) , Vol. Vol. 9236 . Springer, 325--343. Zoe Paraskevopoulou, Cuatualin Hrictcu, Maxime D\u00e9n\u00e8s, Leonidas Lampropoulos, and Benjamin C. Pierce. 2015. Foundational Property-Based Testing. In 6th International Conference on Interactive Theorem Proving (ITP) (LNCS), Vol. Vol. 9236. Springer, 325--343."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699503"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cl.2015.03.002"},{"key":"e_1_3_2_2_65_1","volume-title":"On Modular and Fully-Abstract Compilation. In 29th IEEE Computer Security Foundations Symposium. IEEE.","author":"Patrignani Marco","year":"2016","unstructured":"Marco Patrignani , Dominique Devriese , and Frank Piessens . 2016 . On Modular and Fully-Abstract Compilation. In 29th IEEE Computer Security Foundations Symposium. IEEE. Marco Patrignani, Dominique Devriese, and Frank Piessens. 2016. On Modular and Fully-Abstract Compilation. In 29th IEEE Computer Security Foundations Symposium. IEEE."},{"key":"e_1_3_2_2_66_1","volume-title":"Robustly Safe Compilation. CoRR","author":"Patrignani Marco","year":"2018","unstructured":"Marco Patrignani and Deepak Garg . 2018. Robustly Safe Compilation. CoRR Vol. abs\/ 1804 .00489 ( 2018 ). {arxiv}1804.00489http:\/\/arxiv.org\/abs\/1804.00489 Marco Patrignani and Deepak Garg. 2018. Robustly Safe Compilation. CoRR Vol. abs\/1804.00489 (2018). {arxiv}1804.00489http:\/\/arxiv.org\/abs\/1804.00489"},{"key":"e_1_3_2_2_67_1","volume-title":"Preventing Privilege Escalation. In 12th USENIX Security Symposium. USENIX Association.","author":"Provos Niels","year":"2003","unstructured":"Niels Provos , Markus Friedl , and Peter Honeyman . 2003 . Preventing Privilege Escalation. In 12th USENIX Security Symposium. USENIX Association. Niels Provos, Markus Friedl, and Peter Honeyman. 2003. Preventing Privilege Escalation. In 12th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_2_68_1","unstructured":"John Regehr. 2010. A Guide to Undefined Behavior in C and C+ Part 3. Embedded in Academia blog. https:\/\/blog.regehr.org\/archives\/232  John Regehr. 2010. A Guide to Undefined Behavior in C and C+ Part 3. Embedded in Academia blog. https:\/\/blog.regehr.org\/archives\/232"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519090"},{"key":"e_1_3_2_2_70_1","volume-title":"2nd Workshop on Principles of Secure Compilation","author":"Skorstengaard Lau","year":"2018","unstructured":"Lau Skorstengaard , Dominique Devriese , and Lars Birkedal . 2018 a. Enforcing Well-bracketed Control Flow and Stack Encapsulation using Linear Capabilities . 2nd Workshop on Principles of Secure Compilation ( PriSC). Lau Skorstengaard, Dominique Devriese, and Lars Birkedal. 2018 a. Enforcing Well-bracketed Control Flow and Stack Encapsulation using Linear Capabilities. 2nd Workshop on Principles of Secure Compilation (PriSC)."},{"key":"e_1_3_2_2_71_1","volume-title":"27th European Symposium on Programming, ESOP. 475--501","author":"Skorstengaard Lau","year":"2018","unstructured":"Lau Skorstengaard , Dominique Devriese , and Lars Birkedal . 2018 b. Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management . In 27th European Symposium on Programming, ESOP. 475--501 . Lau Skorstengaard, Dominique Devriese, and Lars Birkedal. 2018 b. Reasoning About a Machine with Local Capabilities - Provably Safe Stack and Return Pointer Management. In 27th European Symposium on Programming, ESOP. 475--501."},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133913"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.13"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000013"},{"key":"e_1_3_2_2_75_1","volume-title":"Towards Automatic Compartmentalization of C Programs on Capability Machines Workshop on Foundations of Computer Security (FCS). 1--14","author":"Tsampas Stylianos","year":"2017","unstructured":"Stylianos Tsampas , Akram El-Korashy , Marco Patrignani , Dominique Devriese , Deepak Garg , and Frank Piessens . 2017 . Towards Automatic Compartmentalization of C Programs on Capability Machines Workshop on Foundations of Computer Security (FCS). 1--14 . Stylianos Tsampas, Akram El-Korashy, Marco Patrignani, Dominique Devriese, Deepak Garg, and Frank Piessens. 2017. Towards Automatic Compartmentalization of C Programs on Capability Machines Workshop on Foundations of Computer Security (FCS). 1--14."},{"key":"e_1_3_2_2_76_1","volume-title":"Towards Safe Enclaves. In 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot).","author":"van Ginkel Neline","year":"2016","unstructured":"Neline van Ginkel , Raoul Strackx , Jan Tobias Muehlberg , and Frank Piessens . 2016 . Towards Safe Enclaves. In 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot). Neline van Ginkel, Raoul Strackx, Jan Tobias Muehlberg, and Frank Piessens. 2016. Towards Safe Enclaves. In 4th Workshop on Hot Issues in Security Principles and Trust (HotSpot)."},{"key":"e_1_3_2_2_77_1","volume-title":"Linear Capabilities for Modular Fully-Abstract Compilation of Verified Code. 2nd Workshop on Principles of Secure Compilation","author":"Strydonck Thomas Van","year":"2018","unstructured":"Thomas Van Strydonck , Dominique Devriese , and Frank Piessens . 2018 . Linear Capabilities for Modular Fully-Abstract Compilation of Verified Code. 2nd Workshop on Principles of Secure Compilation ( PriSC). Thomas Van Strydonck, Dominique Devriese, and Frank Piessens. 2018. Linear Capabilities for Modular Fully-Abstract Compilation of Verified Code. 2nd Workshop on Principles of Secure Compilation (PriSC)."},{"key":"e_1_3_2_2_78_1","volume-title":"Smith","author":"Vasilakis Nikos","year":"2018","unstructured":"Nikos Vasilakis , Ben Karel , Nick Roessler , Nathan Dautenhahn , Andr\u00e9 DeHon , and Jonathan M . Smith . 2018 . BreakApp: Automated, Flexible Application Compartmentalization. To appear at NDSS. Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, Andr\u00e9 DeHon, and Jonathan M. Smith. 2018. BreakApp: Automated, Flexible Application Compartmentalization. To appear at NDSS."},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.9"},{"key":"e_1_3_2_2_82_1","volume-title":"CompCert for Software Fault Isolation. Secure Compilation Meeting (SCM).","author":"Wilke Pierre","year":"2017","unstructured":"Pierre Wilke , Fr\u00e9d\u00e9ric Besson , Sandrine Blazy , and Alexandre Dang . 2017 . CompCert for Software Fault Isolation. Secure Compilation Meeting (SCM). Pierre Wilke, Fr\u00e9d\u00e9ric Besson, Sandrine Blazy, and Alexandre Dang. 2017. CompCert for Software Fault Isolation. Secure Compilation Meeting (SCM)."},{"key":"e_1_3_2_2_83_1","volume-title":"1993 IEEE Symposium on Research in Security and Privacy. IEEE, 178--194","author":"Thomas Y.","unstructured":"Thomas Y. C. Woo and Simon S. Lam. 1993. A Semantic Model for Authentication Protocols . In 1993 IEEE Symposium on Research in Security and Privacy. IEEE, 178--194 . Thomas Y. C. Woo and Simon S. Lam. 1993. A Semantic Model for Authentication Protocols. In 1993 IEEE Symposium on Research in Security and Privacy. IEEE, 178--194."},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038642.2038687"}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","location":"Toronto Canada","acronym":"CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243745","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243745","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3243734.3243745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:32Z","timestamp":1750208252000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243745"}},"subtitle":["Formally Secure Compilation Despite Dynamic Compromise"],"short-title":[],"issued":{"date-parts":[[2018,10,15]]},"references-count":83,"alternative-id":["10.1145\/3243734.3243745","10.1145\/3243734"],"URL":"https:\/\/doi.org\/10.1145\/3243734.3243745","relation":{},"subject":[],"published":{"date-parts":[[2018,10,15]]},"assertion":[{"value":"2018-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}