{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:36:20Z","timestamp":1769751380382,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100004682","name":"Oracle","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004682","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3357390.3361028","type":"proceedings-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T18:52:21Z","timestamp":1570733541000},"page":"85-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Towards efficient, multi-language dynamic taint analysis"],"prefix":"10.1145","author":[{"given":"Jacob","family":"Kreindl","sequence":"first","affiliation":[{"name":"JKU Linz, Austria"}]},{"given":"Daniele","family":"Bonetta","sequence":"additional","affiliation":[{"name":"Oracle Labs, USA"}]},{"given":"Hanspeter","family":"M\u00f6ssenb\u00f6ck","sequence":"additional","affiliation":[{"name":"JKU Linz, Austria"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Graal.js GitHub Repository. https:\/\/github.com\/graalvm\/graaljs . Accessed: 2019-07-12.  2019. Graal.js GitHub Repository. https:\/\/github.com\/graalvm\/graaljs . Accessed: 2019-07-12."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. GraalVM Language Runtimes. https:\/\/www.graalvm.org\/docs\/ reference-manual\/ . Accessed: 2019-07-12.  2019. GraalVM Language Runtimes. https:\/\/www.graalvm.org\/docs\/ reference-manual\/ . Accessed: 2019-07-12."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. LLVM Data-Flow Sanitizer. https:\/\/clang.llvm.org\/docs\/ DataFlowSanitizer.html . Accessed: 2019-09-01.  2019. LLVM Data-Flow Sanitizer. https:\/\/clang.llvm.org\/docs\/ DataFlowSanitizer.html . Accessed: 2019-09-01."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. Node.js. http:\/\/www.nodejs.org\/ . Accessed: 2019-07-06.  2019. Node.js. http:\/\/www.nodejs.org\/ . Accessed: 2019-07-06."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. Node.js API Documentation. https:\/\/nodejs.org\/docs\/latest\/api\/ . Accessed: 2019-08-30.  2019. Node.js API Documentation. https:\/\/nodejs.org\/docs\/latest\/api\/ . Accessed: 2019-08-30."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. Node.js Package Manager. http:\/\/www.npmjs.com\/ . Accessed: 2019-07-06.  2019. Node.js Package Manager. http:\/\/www.npmjs.com\/ . Accessed: 2019-07-06."},{"key":"e_1_3_2_1_7_1","unstructured":"2019. Node.js Security Advisories. https:\/\/www.npmjs.com\/advisories\/ . Accessed: 2019-07-06.  2019. Node.js Security Advisories. https:\/\/www.npmjs.com\/advisories\/ . Accessed: 2019-07-06."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915)","author":"Araujo Frederico","unstructured":"Frederico Araujo and Kevin W. Hamlen . 2015. Compiler-instrumented, Dynamic Secret-redaction of Legacy Processes for Attacker Deception . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915) . USENIX Association, Berkeley, CA, USA, 145\u2013159. http: \/\/dl.acm.org\/citation.cfm?id=2831143.2831153 Frederico Araujo and Kevin W. Hamlen. 2015. Compiler-instrumented, Dynamic Secret-redaction of Legacy Processes for Attacker Deception. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915) . USENIX Association, Berkeley, CA, USA, 145\u2013159. http: \/\/dl.acm.org\/citation.cfm?id=2831143.2831153"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.5"},{"key":"e_1_3_2_1_10_1","volume-title":"Minemu: The World\u2019s Fastest Taint Tracker. In Recent Advances in Intrusion Detection","author":"Bosman Erik","year":"2011","unstructured":"Erik Bosman , Asia Slowinska , and Herbert Bos . 2011 . Minemu: The World\u2019s Fastest Taint Tracker. In Recent Advances in Intrusion Detection , Robin Sommer, Davide Balzarotti, and Gregor Maier (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 1\u201320. Erik Bosman, Asia Slowinska, and Herbert Bos. 2011. Minemu: The World\u2019s Fastest Taint Tracker. In Recent Advances in Intrusion Detection, Robin Sommer, Davide Balzarotti, and Gregor Maier (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1\u201320."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-016-1133-1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2015.7339160"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572301"},{"key":"e_1_3_2_1_17_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)","author":"Davanian Ali","year":"2020","unstructured":"Ali Davanian , Zhenxiao Qi , Yu Qu , and Heng Yin . 2020 . DECAF++: Elastic Whole-System Dynamic Taint Analysis . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019) . USENIX Association, Chaoyang District, Beijing. https:\/\/www.usenix. org\/conference\/raid 2019\/presentation\/davanian Ali Davanian, Zhenxiao Qi, Yu Qu, and Heng Yin. 2020. DECAF++: Elastic Whole-System Dynamic Taint Analysis. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019) . USENIX Association, Chaoyang District, Beijing. https:\/\/www.usenix. org\/conference\/raid2019\/presentation\/davanian"},{"key":"e_1_3_2_1_18_1","unstructured":"Andrey Ermolinskiy Sachin Katti Scott Shenker Lisa L. Fowler Murphy Mccauley Andrey Ermolinskiy Sachin Katti Scott Shenker Lisa Fowler and Murphy Mccauley. 2010. Towards Practical Taint Tracking.  Andrey Ermolinskiy Sachin Katti Scott Shenker Lisa L. Fowler Murphy Mccauley Andrey Ermolinskiy Sachin Katti Scott Shenker Lisa Fowler and Murphy Mccauley. 2010. Towards Practical Taint Tracking."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2724525.2728790"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554909"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_3"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610407"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217939"},{"key":"e_1_3_2_1_24_1","volume-title":"NDSS Symposium .","author":"Kangkook Jee","unstructured":"Jee Kangkook , Georgios Portokalidis , Vasileios P. Kemerlis , Soumyadeep Ghosh , David I. August , and Angelos D. Keromytis . 2012. A General Approach for Efficiently Accelerating Software-Based Dynamic Data Flow Tracking on Commodity Hardware . In NDSS Symposium . Jee Kangkook, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August, and Angelos D. Keromytis. 2012. A General Approach for Efficiently Accelerating Software-Based Dynamic Data Flow Tracking on Commodity Hardware. In NDSS Symposium ."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2878020"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541228.2555295"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516703"},{"key":"e_1_3_2_1_31_1","volume-title":"Efficient Reverse Engineering of Automotive Firmware","author":"Milburn Alyssa","unstructured":"Alyssa Milburn and Niek Timmers . 2018. Efficient Reverse Engineering of Automotive Firmware . Detroit, MI, USA . https:\/\/www.riscure.com\/ publication\/efficient-reverse-engineering-automotive-firmware\/ Alyssa Milburn and Niek Timmers. 2018. Efficient Reverse Engineering of Automotive Firmware. Detroit, MI, USA. https:\/\/www.riscure.com\/ publication\/efficient-reverse-engineering-automotive-firmware\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2007.10.010"},{"key":"e_1_3_2_1_33_1","unstructured":"James Newsome and Dawn Xiaodong Song. 2005. Dynamic Taint Analysis for Automatic Detection Analysis and Signature Generation of Exploits on Commodity Software. In NDSS.  James Newsome and Dawn Xiaodong Song. 2005. Dynamic Taint Analysis for Automatic Detection Analysis and Signature Generation of Exploits on Commodity Software. In NDSS."},{"key":"e_1_3_2_1_34_1","volume-title":"Security and Privacy in the Age of Ubiquitous Computing (2005) (IFIP Advances in Information and Communication Technology)","author":"Nguyen-Tuong Anh","unstructured":"Anh Nguyen-Tuong , Salvatore Guarnieri , Doug Greene , Jeff Shirley , and David Evans . 2005. Automatically Hardening Web Applications Using Precise Tainting . In Security and Privacy in the Age of Ubiquitous Computing (2005) (IFIP Advances in Information and Communication Technology) , Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, and Hiroshi Yoshiura (Eds.). Springer US , 295\u2013307. Anh Nguyen-Tuong, Salvatore Guarnieri, Doug Greene, Jeff Shirley, and David Evans. 2005. Automatically Hardening Web Applications Using Precise Tainting. In Security and Privacy in the Age of Ubiquitous Computing (2005) (IFIP Advances in Information and Communication Technology) , Ryoichi Sasaki, Sihan Qing, Eiji Okamoto, and Hiroshi Yoshiura (Eds.). Springer US, 295\u2013307."},{"key":"e_1_3_2_1_35_1","volume-title":"A Truffle-based Interpreter for x86 Binary Code . Master\u2019s thesis","author":"Pekarek Daniel Alexander","unstructured":"Daniel Alexander Pekarek . 2019. A Truffle-based Interpreter for x86 Binary Code . Master\u2019s thesis . Johannes Kepler University Linz , Austria . https:\/\/resolver.obvsg.at\/urn:nbn:at:at-ubl:1-27719 Daniel Alexander Pekarek. 2019. A Truffle-based Interpreter for x86 Binary Code . Master\u2019s thesis. Johannes Kepler University Linz, Austria. https:\/\/resolver.obvsg.at\/urn:nbn:at:at-ubl:1-27719"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352622"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2006.29"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998415.2998416"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_40_1","volume-title":"Formal Techniques for Distributed Objects, Components, and Systems (2018) (Lecture Notes in Computer Science) , Christel Baier and Lu\u00eds Caires (Eds.)","author":"Sj\u00f6sten Alexander","unstructured":"Alexander Sj\u00f6sten , Daniel Hedin , and Andrei Sabelfeld . 2018. Information Flow Tracking for Side-Effectful Libraries . In Formal Techniques for Distributed Objects, Components, and Systems (2018) (Lecture Notes in Computer Science) , Christel Baier and Lu\u00eds Caires (Eds.) . Springer International Publishing , 141\u2013160. Alexander Sj\u00f6sten, Daniel Hedin, and Andrei Sabelfeld. 2018. Information Flow Tracking for Side-Effectful Libraries. In Formal Techniques for Distributed Objects, Components, and Systems (2018) (Lecture Notes in Computer Science) , Christel Baier and Lu\u00eds Caires (Eds.). Springer International Publishing, 141\u2013160."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544157"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178372.3179527"},{"key":"e_1_3_2_1_43_1","volume-title":"Programming Ruby: The Pragmatic Programmers","author":"Thomas David","year":"2004","unstructured":"David Thomas , Chad Fowler , and Andrew Hunt . 2004 . Programming Ruby: The Pragmatic Programmers \u2019 Guide ( 2 nd ed.). Pragmatic Programmers . David Thomas, Chad Fowler, and Andrew Hunt. 2004. Programming Ruby: The Pragmatic Programmers\u2019 Guide (2nd ed.). Pragmatic Programmers.","edition":"2"},{"key":"e_1_3_2_1_44_1","first-page":"3","article-title":"Fast, Flexible, Polyglot Instrumentation Support for Debuggers and Other Tools","volume":"2","author":"De Vanter Michael Van","year":"2018","unstructured":"Michael Van De Vanter , Chris Seaton , Michael Haupt , Christian Humer , and Thomas W\u00fcrthinger . 2018 . Fast, Flexible, Polyglot Instrumentation Support for Debuggers and Other Tools . The Art, Science, and Engineering of Programming 2 , 3 (March 2018), 14:1\u201314:30. Michael Van De Vanter, Chris Seaton, Michael Haupt, Christian Humer, and Thomas W\u00fcrthinger. 2018. Fast, Flexible, Polyglot Instrumentation Support for Debuggers and Other Tools. The Art, Science, and Engineering of Programming 2, 3 (March 2018), 14:1\u201314:30.","journal-title":"The Art, Science, and Engineering of Programming"},{"key":"e_1_3_2_1_45_1","volume-title":"Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In In Proceeding of the Network and Distributed System Security Symposium (NDSS\u201907)","author":"Vogt Philipp","year":"2007","unstructured":"Philipp Vogt , Florian Nentwich , Nenad Jovanovic , Engin Kirda , Christopher Kruegel , and Giovanni Vigna . 2007 . Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In In Proceeding of the Network and Distributed System Security Symposium (NDSS\u201907) (2007). Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna. 2007. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In In Proceeding of the Network and Distributed System Security Symposium (NDSS\u201907) (2007)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509578.2509581"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.08.001"}],"event":{"name":"MPLR '19: 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes","location":"Athens Greece","acronym":"MPLR '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357390.3361028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357390.3361028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:12Z","timestamp":1750202592000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357390.3361028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":45,"alternative-id":["10.1145\/3357390.3361028","10.1145\/3357390"],"URL":"https:\/\/doi.org\/10.1145\/3357390.3361028","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}