{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T05:24:04Z","timestamp":1776317044883,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297498","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"2215-2223","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Statically analyzing information flows"],"prefix":"10.1145","author":[{"given":"Isabella","family":"Mastroeni","sequence":"first","affiliation":[{"name":"University of Verona, Verona, Italy"}]},{"given":"Michele","family":"Pasqua","sequence":"additional","affiliation":[{"name":"University of Verona, Verona, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of CSF. 239--252","author":"Agrawal S.","unstructured":"S. Agrawal and B. Bonakdarpour. 2016. Runtime Verification of k-Safety Hyper-properties in HyperLTL. In Proc. of CSF. 239--252."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062378"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009889"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2166956.2166962"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1009380.1009669"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of POST.","author":"Clarkson M. R.","unstructured":"M. R. Clarkson, B. Finkbeiner, M. Koleini, K. K. Micinski, M. N. Rabe, and C. S\u00e1nchez. 2014. Temporal Logics for Hyperproperties. In Proc. of POST."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1891823.1891830"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067625.806556"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103687"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of CAV. 75--95\".","author":"Cousot P.","unstructured":"P. Cousot, R. Giacobazzi, and F. Ranzato. 2018. Program Analysis Is Harder Than Verification: A Computability Perspective. In Proc. of CAV. 75--95\"."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_12"},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. of CAV. 30--48","author":"Finkbeiner B.","unstructured":"B. Finkbeiner, M. N. Rabe, and C. S\u00e1nchez. 2015. Algorithms for Model Checking HyperLTL and HyperCTL. In Proc. of CAV. 30--48."},{"key":"e_1_3_2_1_14_1","first-page":"319","article-title":"A Perspective on Information-Flow Control","volume":"33","author":"Hedin D.","year":"2012","unstructured":"D. Hedin and A. Sabelfeld. 2012. A Perspective on Information-Flow Control. Software Safety and Security 33 (2012), 319--347.","journal-title":"Software Safety and Security"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"R. Hodovan and A. Kiss. 2018. Grammarinator -ANTLRv4 grammar-based test generator. https:\/\/github.com\/renatahodovan\/grammarinator","DOI":"10.1145\/3278186.3278193"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of SAS. 232--252","author":"Mastroeni I.","unstructured":"I. Mastroeni and M. Pasqua. 2017. Hyperhierarchy of Semantics - A Formal Framework for Hyperproperties Verification. In Proc. of SAS. 232--252."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of SAS. 263--283","author":"Mastroeni I.","unstructured":"I. Mastroeni and M. Pasqua. 2018. Verifying Bounded Subset-Closed Hyperproperties. In Proc. of SAS. 263--283."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908092"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_24"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of ESOP. 683--710","author":"Urban C.","unstructured":"C. Urban and P. M\u00fcller. 2018. An Abstract Interpretation Framework for Input Data Usage. In Proc. of ESOP. 683--710."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/353629.353648"}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","location":"Limassol Cyprus","acronym":"SAC '19","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297498","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:15Z","timestamp":1750204455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297498"}},"subtitle":["an abstract interpretation-based hyperanalysis for non-interference"],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":21,"alternative-id":["10.1145\/3297280.3297498","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297498","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}