{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:12Z","timestamp":1750220352424,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.1145\/3483899.3483901","type":"proceedings-article","created":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T20:50:33Z","timestamp":1633467033000},"page":"80-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Analysis Between Information Flow Control Tools for Java-written systems"],"prefix":"10.1145","author":[{"given":"Gabrielle","family":"Porto","sequence":"first","affiliation":[{"name":"Universidade Federal do Agreste de Pernambuco, Brazil"}]},{"given":"Rodrigo","family":"Andrade","sequence":"additional","affiliation":[{"name":"Universidade Federal do Agreste de Pernambuco, Brazil"}]},{"given":"Felipe","family":"Ebert","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology (TU\/e), The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2021,10,5]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1007\/978-3-642-31057-7_30"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1007\/978-3-642-39038-8_16"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1002\/spe.2872"},{"key":"e_1_3_2_1_4_1","volume-title":"Integrity considerations for secure computer systems","author":"Biba Ken","year":"1975","unstructured":"Ken Biba . 1975. Integrity considerations for secure computer systems . Mitre Corporation ( 1975 ). Ken Biba. 1975. Integrity considerations for secure computer systems. Mitre Corporation (1975)."},{"unstructured":"Blojsom. 2021. Blojsom. https:\/\/sourceforge.net\/projects\/blojsom\/  Blojsom. 2021. Blojsom. https:\/\/sourceforge.net\/projects\/blojsom\/","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1030083.1030110"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.5555\/1362903.1362904"},{"unstructured":"CWE Community. 2021. CWE - Common Weakness Enumeration. https:\/\/cwe.mitre.org\/  CWE Community. 2021. CWE - Common Weakness Enumeration. https:\/\/cwe.mitre.org\/","key":"e_1_3_2_1_8_1"},{"volume-title":"Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In ISOC Network and Distributed System Security Symposium.","author":"Andrea\u00a0Continella","unstructured":"Andrea\u00a0Continella et al.2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In ISOC Network and Distributed System Security Symposium. Andrea\u00a0Continella et al.2017. Obfuscation-Resilient Privacy Leak Detection for Mobile Apps Through Differential Analysis. In ISOC Network and Distributed System Security Symposium.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/2349018"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1290520.1290523"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1543135.1542486"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/978-3-642-37057-1_15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2666356.2594299"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2001420.2001442"},{"volume-title":"Gruschka Nordic Conference on Secure IT Systems. 437\u2013453","author":"Tobias\u00a0Hamann","unstructured":"Tobias\u00a0Hamann et al.2018. A uniform information-flow security benchmark suite for source code and bytecode . In Gruschka Nordic Conference on Secure IT Systems. 437\u2013453 . Tobias\u00a0Hamann et al.2018. A uniform information-flow security benchmark suite for source code and bytecode. In Gruschka Nordic Conference on Secure IT Systems. 437\u2013453.","key":"e_1_3_2_1_16_1"},{"unstructured":"Victor\u00a0Basili et al. 1994. The goal question metric approach. In Encyclopedia of Software Engineering John\u00a0J. Marciniak (Ed.). Wiley New Jersey 528\u2013532.  Victor\u00a0Basili et al. 1994. The goal question metric approach. In Encyclopedia of Software Engineering John\u00a0J. Marciniak (Ed.). Wiley New Jersey 528\u2013532.","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/1924943.1924971"},{"unstructured":"Simple Logging\u00a0Facade for Java. 2004. SLF4J -Simple Logging Facade for Java. http:\/\/www.slf4j.org  Simple Logging\u00a0Facade for Java. 2004. SLF4J -Simple Logging Facade for Java. http:\/\/www.slf4j.org","key":"e_1_3_2_1_19_1"},{"unstructured":"OWASP Foundation. 2021. OWASP - Open Web Application Security Project. https:\/\/owasp.org\/  OWASP Foundation. 2021. OWASP - Open Web Application Security Project. https:\/\/owasp.org\/","key":"e_1_3_2_1_20_1"},{"unstructured":"Karlsruher\u00a0Institut fur Technologie. 2021. JOANA (Java Object-Sensitive Analysis) - Information Flow Control Framework for Java. https:\/\/pp.ipd.kit.edu\/projects\/joana\/  Karlsruher\u00a0Institut fur Technologie. 2021. JOANA (Java Object-Sensitive Analysis) - Information Flow Control Framework for Java. https:\/\/pp.ipd.kit.edu\/projects\/joana\/","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","volume-title":"Using JOANA for Information Flow Control in Java Programs - A Practical Guide. In Work. Conf. Program. Languages. 123\u2013138","author":"Graf J\u00fcrgen","year":"2013","unstructured":"J\u00fcrgen Graf , Martin Hecker , and Martin Mohr . 2013 . Using JOANA for Information Flow Control in Java Programs - A Practical Guide. In Work. Conf. Program. Languages. 123\u2013138 . J\u00fcrgen Graf, Martin Hecker, and Martin Mohr. 2013. Using JOANA for Information Flow Control in Java Programs - A Practical Guide. In Work. Conf. Program. Languages. 123\u2013138."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/s10207-009-0086-1"},{"key":"e_1_3_2_1_24_1","volume-title":"A Perspective on Information-Flow Control.Software Safety and Security 33","author":"Hedin Daniel","year":"2012","unstructured":"Daniel Hedin and Andrei Sabelfeld . 2012. A Perspective on Information-Flow Control.Software Safety and Security 33 ( 2012 ), 319\u2013347. Daniel Hedin and Andrei Sabelfeld. 2012. A Perspective on Information-Flow Control.Software Safety and Security 33 (2012), 319\u2013347."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/77606.77608"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/2813885.2737957"},{"unstructured":"Benhamin Livshits. 2021. Securibench Micro. http:\/\/suif.stanford.edu\/~livshits\/work\/securibench-micro\/  Benhamin Livshits. 2021. Securibench Micro. http:\/\/suif.stanford.edu\/~livshits\/work\/securibench-micro\/","key":"e_1_3_2_1_27_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.5555\/1251398.1251416"},{"unstructured":"Lutece. 2021. Lutece. https:\/\/github.com\/lutece-platform  Lutece. 2021. Lutece. https:\/\/github.com\/lutece-platform","key":"e_1_3_2_1_29_1"},{"volume-title":"Joe-E: A Security-Oriented Subset of Java. In Network and Distributed System Security Symposium. 357\u2013374","author":"Mettler A.","unstructured":"A. Mettler , D. Wagner , and T. Close . 2010 . Joe-E: A Security-Oriented Subset of Java. In Network and Distributed System Security Symposium. 357\u2013374 . A. Mettler, D. Wagner, and T. Close. 2010. Joe-E: A Security-Oriented Subset of Java. In Network and Distributed System Security Symposium. 357\u2013374.","key":"e_1_3_2_1_30_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_32_1","volume-title":"Jif: Java information flow","author":"Myers C.","year":"2021","unstructured":"A.\u00a0 C. Myers , N. Nystrom , L. Zheng , and S. Zdancewic . 2021 . Jif: Java information flow . http:\/\/www.cs.cornell.edu\/jif A.\u00a0C. Myers, N. Nystrom, L. Zheng, and S. Zdancewic. 2021. Jif: Java information flow. http:\/\/www.cs.cornell.edu\/jif"},{"volume-title":"Net. and Dist. Sys. Security Symp.","author":"Newsome J.","unstructured":"J. Newsome and D. Song . 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Net. and Dist. Sys. Security Symp. J. Newsome and D. Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Net. and Dist. Sys. Security Symp.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/JSAC.2002.806121"},{"unstructured":"Scribejava. 2021. Simple OAuth library for Java. https:\/\/github.com\/scribejava\/scribejava  Scribejava. 2021. Simple OAuth library for Java. https:\/\/github.com\/scribejava\/scribejava","key":"e_1_3_2_1_35_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.5555\/2671225.2671237"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1145\/2103656.2103669"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/2245276.2231983"}],"event":{"acronym":"SBCARS '21","name":"SBCARS '21: Brazilian Symposium on Software Components, Architectures, and Reuse","location":"Joinville Brazil"},"container-title":["15th Brazilian Symposium on Software Components, Architectures, and Reuse"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3483899.3483901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3483899.3483901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:12Z","timestamp":1750191432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3483899.3483901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":38,"alternative-id":["10.1145\/3483899.3483901","10.1145\/3483899"],"URL":"https:\/\/doi.org\/10.1145\/3483899.3483901","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]},"assertion":[{"value":"2021-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}