{"id":"https://openalex.org/W1995895256","doi":"https://doi.org/10.1145/1363686.1363776","title":"Type-based information flow analysis for bytecode languages with variable object field policies","display_name":"Type-based information flow analysis for bytecode languages with variable object field policies","publication_year":2008,"publication_date":"2008-03-16","ids":{"openalex":"https://openalex.org/W1995895256","doi":"https://doi.org/10.1145/1363686.1363776","mag":"1995895256"},"language":"en","primary_location":{"id":"doi:10.1145/1363686.1363776","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1363686.1363776","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 ACM symposium on Applied computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5105834025","display_name":"Francisco Bavera","orcid":null},"institutions":[{"id":"https://openalex.org/I151201029","display_name":"Consejo Nacional de Investigaciones Cient\u00edficas y T\u00e9cnicas","ror":"https://ror.org/03cqe8w59","country_code":"AR","type":"funder","lineage":["https://openalex.org/I151201029","https://openalex.org/I4210123736","https://openalex.org/I4387155568"]}],"countries":["AR"],"is_corresponding":true,"raw_author_name":"Francisco Bavera","raw_affiliation_strings":["FCEFQyN, UNRC, Argentina and CONICET","FCEFQyN, UNRC, Argentina and CONICET#TAB#"],"affiliations":[{"raw_affiliation_string":"FCEFQyN, UNRC, Argentina and CONICET","institution_ids":["https://openalex.org/I151201029"]},{"raw_affiliation_string":"FCEFQyN, UNRC, Argentina and CONICET#TAB#","institution_ids":["https://openalex.org/I151201029"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112080959","display_name":"Eduardo Bonelli","orcid":"https://orcid.org/0000-0003-1856-2856"},"institutions":[{"id":"https://openalex.org/I151201029","display_name":"Consejo Nacional de Investigaciones Cient\u00edficas y T\u00e9cnicas","ror":"https://ror.org/03cqe8w59","country_code":"AR","type":"funder","lineage":["https://openalex.org/I151201029","https://openalex.org/I4210123736","https://openalex.org/I4387155568"]}],"countries":["AR"],"is_corresponding":false,"raw_author_name":"Eduardo Bonelli","raw_affiliation_strings":["LIFIA, Fac. de Inform\u00e1tica, UNLP, Argentina and CONICET"],"affiliations":[{"raw_affiliation_string":"LIFIA, Fac. de Inform\u00e1tica, UNLP, Argentina and CONICET","institution_ids":["https://openalex.org/I151201029"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5105834025"],"corresponding_institution_ids":["https://openalex.org/I151201029"],"apc_list":null,"apc_paid":null,"fwci":1.7161,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.86867585,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"347","last_page":"351"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9771999716758728,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.9467806816101074},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.778484046459198},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.7212597131729126},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6613981127738953},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6598421335220337},{"id":"https://openalex.org/keywords/java-bytecode","display_name":"Java bytecode","score":0.6314990520477295},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.6088845729827881},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5698016881942749},{"id":"https://openalex.org/keywords/object-oriented-programming","display_name":"Object-oriented programming","score":0.5685140490531921},{"id":"https://openalex.org/keywords/abstract-interpretation","display_name":"Abstract interpretation","score":0.5616994500160217},{"id":"https://openalex.org/keywords/variable","display_name":"Variable (mathematics)","score":0.5495074391365051},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.5043126344680786},{"id":"https://openalex.org/keywords/type-inference","display_name":"Type inference","score":0.48605233430862427},{"id":"https://openalex.org/keywords/aspect-oriented-programming","display_name":"Aspect-oriented programming","score":0.4677847623825073},{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.46080565452575684},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.45362961292266846},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.44705501198768616},{"id":"https://openalex.org/keywords/type","display_name":"Type (biology)","score":0.44330033659935},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.4407097399234772},{"id":"https://openalex.org/keywords/data-type","display_name":"Data type","score":0.41859573125839233},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2146751880645752},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.21059948205947876},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.19236725568771362},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.18340358138084412},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11781436204910278},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.10331955552101135},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.09210994839668274},{"id":"https://openalex.org/keywords/real-time-java","display_name":"Real time Java","score":0.08893951773643494},{"id":"https://openalex.org/keywords/java-annotation","display_name":"Java annotation","score":0.08622828125953674}],"concepts":[{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.9467806816101074},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.778484046459198},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.7212597131729126},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6613981127738953},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6598421335220337},{"id":"https://openalex.org/C2777472213","wikidata":"https://www.wikidata.org/wiki/Q137496","display_name":"Java bytecode","level":5,"score":0.6314990520477295},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.6088845729827881},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5698016881942749},{"id":"https://openalex.org/C73752529","wikidata":"https://www.wikidata.org/wiki/Q79872","display_name":"Object-oriented programming","level":2,"score":0.5685140490531921},{"id":"https://openalex.org/C2780654840","wikidata":"https://www.wikidata.org/wiki/Q333341","display_name":"Abstract interpretation","level":2,"score":0.5616994500160217},{"id":"https://openalex.org/C182365436","wikidata":"https://www.wikidata.org/wiki/Q50701","display_name":"Variable (mathematics)","level":2,"score":0.5495074391365051},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.5043126344680786},{"id":"https://openalex.org/C198370458","wikidata":"https://www.wikidata.org/wiki/Q586459","display_name":"Type inference","level":3,"score":0.48605233430862427},{"id":"https://openalex.org/C60051680","wikidata":"https://www.wikidata.org/wiki/Q30267","display_name":"Aspect-oriented programming","level":3,"score":0.4677847623825073},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.46080565452575684},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.45362961292266846},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.44705501198768616},{"id":"https://openalex.org/C2777299769","wikidata":"https://www.wikidata.org/wiki/Q3707858","display_name":"Type (biology)","level":2,"score":0.44330033659935},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.4407097399234772},{"id":"https://openalex.org/C138958017","wikidata":"https://www.wikidata.org/wiki/Q190087","display_name":"Data type","level":2,"score":0.41859573125839233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2146751880645752},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.21059948205947876},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.19236725568771362},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.18340358138084412},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11781436204910278},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.10331955552101135},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.09210994839668274},{"id":"https://openalex.org/C132106392","wikidata":"https://www.wikidata.org/wiki/Q1373903","display_name":"Real time Java","level":3,"score":0.08893951773643494},{"id":"https://openalex.org/C168702491","wikidata":"https://www.wikidata.org/wiki/Q567345","display_name":"Java annotation","level":4,"score":0.08622828125953674},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1363686.1363776","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1363686.1363776","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2008 ACM symposium on Applied computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.800000011920929,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W641942956","https://openalex.org/W1518533182","https://openalex.org/W1548432452","https://openalex.org/W1597958972","https://openalex.org/W1940493318","https://openalex.org/W1973336874","https://openalex.org/W1977764760","https://openalex.org/W2005334135","https://openalex.org/W2005978190","https://openalex.org/W2012470235","https://openalex.org/W2017639917","https://openalex.org/W2047881370","https://openalex.org/W2075849836","https://openalex.org/W2102917576","https://openalex.org/W2117723002","https://openalex.org/W2122049982","https://openalex.org/W2136296832","https://openalex.org/W2149143260","https://openalex.org/W2158126684","https://openalex.org/W2307322691","https://openalex.org/W6640507510"],"related_works":["https://openalex.org/W2070229111","https://openalex.org/W2035862850","https://openalex.org/W2150693788","https://openalex.org/W2563883939","https://openalex.org/W2146252952","https://openalex.org/W1553357069","https://openalex.org/W2002997445","https://openalex.org/W2146202824","https://openalex.org/W1583225756","https://openalex.org/W2155079805"],"abstract_inverted_index":{"Static,":[0],"type-based":[1],"information":[2,80],"flow":[3],"analysis":[4],"techniques":[5],"targeted":[6],"at":[7,94],"Java":[8],"and":[9],"JVM-like":[10,83],"code":[11],"typically":[12],"assume":[13],"a":[14,25,70,82,90,102],"global":[15],"security":[16,27,45],"policy":[17],"on":[18],"object":[19,96],"fields:":[20],"all":[21],"fields":[22],"are":[23,32],"assigned":[24],"fixed":[26],"level.":[28],"In":[29],"essence":[30],"they":[31],"treated":[33],"as":[34,53],"standard":[35],"variables.":[36],"However":[37],"different":[38,95],"objects":[39],"may":[40],"be":[41],"created":[42],"under":[43],"varying":[44],"contexts,":[46],"particularly":[47],"for":[48,74,105],"widely":[49],"used":[50],"classes":[51],"such":[52],"wrapper":[54],"or":[55],"collection":[56],"classes.":[57],"This":[58],"entails":[59],"an":[60],"important":[61],"loss":[62],"in":[63,81],"precision":[64],"of":[65,79,89],"the":[66,87],"analysis.":[67],"We":[68],"present":[69],"flow-sensitive":[71],"type":[72],"system":[73],"statically":[75],"detecting":[76],"illegal":[77],"flows":[78],"language":[84],"that":[85],"allows":[86],"level":[88],"field":[91],"to":[92],"vary":[93],"creation":[97],"points.":[98],"Also,":[99],"we":[100],"prove":[101],"noninterference":[103],"result":[104],"this":[106],"language.":[107]},"counts_by_year":[{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
