{"id":"https://openalex.org/W4388282217","doi":"https://doi.org/10.1109/icbase59196.2023.10303098","title":"SAFEJ: An Efficient Infrastructure for Securing Julia Programs","display_name":"SAFEJ: An Efficient Infrastructure for Securing Julia Programs","publication_year":2023,"publication_date":"2023-08-25","ids":{"openalex":"https://openalex.org/W4388282217","doi":"https://doi.org/10.1109/icbase59196.2023.10303098"},"language":"en","primary_location":{"id":"doi:10.1109/icbase59196.2023.10303098","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icbase59196.2023.10303098","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 4th International Conference on Big Data &amp; Artificial Intelligence &amp; Software Engineering (ICBASE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100523537","display_name":"Hao Zhu","orcid":"https://orcid.org/0009-0007-0323-3183"},"institutions":[{"id":"https://openalex.org/I308837","display_name":"Suzhou University of Science and Technology","ror":"https://ror.org/04en8wb91","country_code":"CN","type":"education","lineage":["https://openalex.org/I308837"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hao Zhu","raw_affiliation_strings":["Suzhou Institute for Advanced Research, University of Science and Technology of China,School of Software Engineering,Suzhou,China","School of Software Engineering, Suzhou Institute for Advanced Research, University of Science and Technology of China, Suzhou, China"],"affiliations":[{"raw_affiliation_string":"Suzhou Institute for Advanced Research, University of Science and Technology of China,School of Software Engineering,Suzhou,China","institution_ids":["https://openalex.org/I308837"]},{"raw_affiliation_string":"School of Software Engineering, Suzhou Institute for Advanced Research, University of Science and Technology of China, Suzhou, China","institution_ids":["https://openalex.org/I308837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082542143","display_name":"Baojian Hua","orcid":"https://orcid.org/0000-0003-4434-2355"},"institutions":[{"id":"https://openalex.org/I308837","display_name":"Suzhou University of Science and Technology","ror":"https://ror.org/04en8wb91","country_code":"CN","type":"education","lineage":["https://openalex.org/I308837"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baojian Hua","raw_affiliation_strings":["Suzhou Institute for Advanced Research, University of Science and Technology of China,School of Software Engineering,Suzhou,China","School of Software Engineering, Suzhou Institute for Advanced Research, University of Science and Technology of China, Suzhou, China"],"affiliations":[{"raw_affiliation_string":"Suzhou Institute for Advanced Research, University of Science and Technology of China,School of Software Engineering,Suzhou,China","institution_ids":["https://openalex.org/I308837"]},{"raw_affiliation_string":"School of Software Engineering, Suzhou Institute for Advanced Research, University of Science and Technology of China, Suzhou, China","institution_ids":["https://openalex.org/I308837"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100523537"],"corresponding_institution_ids":["https://openalex.org/I308837"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14236005,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2016","issue":null,"first_page":"221","last_page":"224"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9789000153541565,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8366338014602661},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.7835635542869568},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5251248478889465},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5135858058929443},{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.4852473735809326},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.43884721398353577},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35159823298454285},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.27645665407180786},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.2720247507095337}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8366338014602661},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.7835635542869568},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5251248478889465},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5135858058929443},{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.4852473735809326},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.43884721398353577},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35159823298454285},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.27645665407180786},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.2720247507095337},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icbase59196.2023.10303098","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icbase59196.2023.10303098","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 4th International Conference on Big Data &amp; Artificial Intelligence &amp; Software Engineering (ICBASE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6600000262260437,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1855973055","https://openalex.org/W2018014973","https://openalex.org/W2022292029","https://openalex.org/W2116730531","https://openalex.org/W2159059513","https://openalex.org/W2167464078","https://openalex.org/W2296133386","https://openalex.org/W2573983983","https://openalex.org/W2922119900","https://openalex.org/W3014990389","https://openalex.org/W4200421685","https://openalex.org/W4229904572"],"related_works":["https://openalex.org/W2374400535","https://openalex.org/W1603110617","https://openalex.org/W2108239983","https://openalex.org/W2892079901","https://openalex.org/W2940342784","https://openalex.org/W2134261832","https://openalex.org/W4385764548","https://openalex.org/W2387387477","https://openalex.org/W2394051415","https://openalex.org/W2378735042"],"abstract_inverted_index":{"Julia":[0,25,39,52,58,100],"is":[1,113],"an":[2,34],"emerging":[3],"programming":[4],"language":[5],"designed":[6],"for":[7],"high-performance":[8],"and":[9,59,62,68,89,105],"parallel":[10],"computing.":[11],"However,":[12],"its":[13,106],"simple-designed":[14],"foreign":[15],"function":[16],"interface,":[17],"ccall,":[18],"lacks":[19],"necessary":[20],"security":[21],"checks,":[22],"making":[23],"multilingual":[24],"applications":[26],"vulnerable":[27],"to":[28,37,50,66,76,85],"exploitation.":[29],"This":[30],"paper":[31],"introduces":[32],"SAFEJ,":[33],"infrastructure":[35],"developed":[36],"enhance":[38],"FFI":[40],"security.":[41],"SAFEJ":[42,97],"includes":[43],"two":[44],"key":[45],"components:":[46],"1)":[47],"privilege":[48,120],"separation":[49,121],"protect":[51],"by":[53],"isolating":[54],"the":[55,87],"memory":[56,70,103],"of":[57,91,126],"native":[60,74],"code":[61,75],"2)":[63],"pointer":[64,111],"sanitization":[65,112],"filter":[67],"check":[69],"accesses":[71],"from":[72,101],"unsafe":[73],"provide":[77],"more":[78],"flexible":[79],"protection.":[80],"We":[81],"conducted":[82],"extensive":[83],"experiments":[84],"evaluate":[86],"effectiveness":[88],"performance":[90,130],"SAFEJ.":[92],"The":[93],"results":[94],"demonstrate":[95],"that":[96,110],"effectively":[98],"protects":[99],"common":[102],"attacks,":[104],"efficiency":[107],"tests":[108],"indicate":[109],"on":[114],"par":[115],"with":[116],"prior":[117],"studies,":[118],"while":[119],"achieves":[122],"a":[123],"maximum":[124],"reduction":[125],"85%":[127],"in":[128],"runtime":[129],"overhead.":[131]},"counts_by_year":[],"updated_date":"2025-12-25T23:11:45.687758","created_date":"2025-10-10T00:00:00"}
