{"id":"https://openalex.org/W2159151855","doi":"https://doi.org/10.1145/2535505","title":"Bringing java's wild native world under control","display_name":"Bringing java's wild native world under control","publication_year":2013,"publication_date":"2013-11-01","ids":{"openalex":"https://openalex.org/W2159151855","doi":"https://doi.org/10.1145/2535505","mag":"2159151855"},"language":"en","primary_location":{"id":"doi:10.1145/2535505","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2535505","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083230387","display_name":"Mengtao Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mengtao Sun","raw_affiliation_strings":["Lehigh University, Bethlehem, PA"],"affiliations":[{"raw_affiliation_string":"Lehigh University, Bethlehem, PA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010830558","display_name":"Gang Tan","orcid":"https://orcid.org/0000-0001-6109-6091"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gang Tan","raw_affiliation_strings":["Lehigh University, Bethlehem, PA"],"affiliations":[{"raw_affiliation_string":"Lehigh University, Bethlehem, PA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072932085","display_name":"Joseph Siefers","orcid":null},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joseph Siefers","raw_affiliation_strings":["Lehigh University, Bethlehem, PA"],"affiliations":[{"raw_affiliation_string":"Lehigh University, Bethlehem, PA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101148662","display_name":"Bin Zeng","orcid":null},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bin Zeng","raw_affiliation_strings":["Lehigh University, Bethlehem, PA"],"affiliations":[{"raw_affiliation_string":"Lehigh University, Bethlehem, PA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064972235","display_name":"Greg Morrisett","orcid":null},"institutions":[{"id":"https://openalex.org/I2801851002","display_name":"Harvard University Press","ror":"https://ror.org/006v7bf86","country_code":"US","type":"other","lineage":["https://openalex.org/I136199984","https://openalex.org/I2801851002"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Greg Morrisett","raw_affiliation_strings":["Harvard University, Cambridge, MA"],"affiliations":[{"raw_affiliation_string":"Harvard University, Cambridge, MA","institution_ids":["https://openalex.org/I2801851002"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5083230387"],"corresponding_institution_ids":["https://openalex.org/I186143895"],"apc_list":null,"apc_paid":null,"fwci":3.9539,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.93921879,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"16","issue":"3","first_page":"1","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8822774887084961},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.8122787475585938},{"id":"https://openalex.org/keywords/strictfp","display_name":"strictfp","score":0.6096739172935486},{"id":"https://openalex.org/keywords/java-annotation","display_name":"Java annotation","score":0.5899108648300171},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.556821346282959},{"id":"https://openalex.org/keywords/real-time-java","display_name":"Real time Java","score":0.5330829620361328},{"id":"https://openalex.org/keywords/sandbox","display_name":"Sandbox (software development)","score":0.5236325263977051},{"id":"https://openalex.org/keywords/generics-in-java","display_name":"Generics in Java","score":0.5196244120597839},{"id":"https://openalex.org/keywords/java-applet","display_name":"Java applet","score":0.5019030570983887},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.49446702003479004},{"id":"https://openalex.org/keywords/machine-code","display_name":"Machine code","score":0.4711303412914276},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42887169122695923},{"id":"https://openalex.org/keywords/java-api-for-xml-based-rpc","display_name":"Java API for XML-based RPC","score":0.41093170642852783},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.1278584599494934},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.12408742308616638}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8822774887084961},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.8122787475585938},{"id":"https://openalex.org/C174954855","wikidata":"https://www.wikidata.org/wiki/Q7623626","display_name":"strictfp","level":4,"score":0.6096739172935486},{"id":"https://openalex.org/C168702491","wikidata":"https://www.wikidata.org/wiki/Q567345","display_name":"Java annotation","level":4,"score":0.5899108648300171},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.556821346282959},{"id":"https://openalex.org/C132106392","wikidata":"https://www.wikidata.org/wiki/Q1373903","display_name":"Real time Java","level":3,"score":0.5330829620361328},{"id":"https://openalex.org/C167981075","wikidata":"https://www.wikidata.org/wiki/Q2667186","display_name":"Sandbox (software development)","level":2,"score":0.5236325263977051},{"id":"https://openalex.org/C172482141","wikidata":"https://www.wikidata.org/wiki/Q379273","display_name":"Generics in Java","level":5,"score":0.5196244120597839},{"id":"https://openalex.org/C15524039","wikidata":"https://www.wikidata.org/wiki/Q865817","display_name":"Java applet","level":3,"score":0.5019030570983887},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.49446702003479004},{"id":"https://openalex.org/C115168132","wikidata":"https://www.wikidata.org/wiki/Q55813","display_name":"Machine code","level":3,"score":0.4711303412914276},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42887169122695923},{"id":"https://openalex.org/C32235180","wikidata":"https://www.wikidata.org/wiki/Q921902","display_name":"Java API for XML-based RPC","level":5,"score":0.41093170642852783},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.1278584599494934},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.12408742308616638}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2535505","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2535505","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.588.4316","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.588.4316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.lehigh.edu/~mes310/publications/tissec13.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.588.7","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.588.7","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cse.lehigh.edu/~gtan/paper/tissec13.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5190707551","display_name":null,"funder_award_id":"CCF-0915157, CCF-0915030, CCF-1149211","funder_id":"https://openalex.org/F4320337387","funder_display_name":"Division of Computing and Communication Foundations"}],"funders":[{"id":"https://openalex.org/F4320337387","display_name":"Division of Computing and Communication Foundations","ror":"https://ror.org/01mng8331"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":56,"referenced_works":["https://openalex.org/W15883","https://openalex.org/W2363194","https://openalex.org/W24839522","https://openalex.org/W131387342","https://openalex.org/W183305829","https://openalex.org/W1482769911","https://openalex.org/W1516211918","https://openalex.org/W1560840983","https://openalex.org/W1563300346","https://openalex.org/W1567552421","https://openalex.org/W1606518565","https://openalex.org/W1608091202","https://openalex.org/W1825457006","https://openalex.org/W1855973055","https://openalex.org/W2006611045","https://openalex.org/W2010163347","https://openalex.org/W2032997497","https://openalex.org/W2034711041","https://openalex.org/W2036716313","https://openalex.org/W2060031515","https://openalex.org/W2062340141","https://openalex.org/W2069107692","https://openalex.org/W2071907540","https://openalex.org/W2079029390","https://openalex.org/W2086234010","https://openalex.org/W2096887945","https://openalex.org/W2097166325","https://openalex.org/W2103380617","https://openalex.org/W2109219878","https://openalex.org/W2120878745","https://openalex.org/W2123553986","https://openalex.org/W2132185316","https://openalex.org/W2139187903","https://openalex.org/W2139223589","https://openalex.org/W2140611647","https://openalex.org/W2142778065","https://openalex.org/W2148127931","https://openalex.org/W2149603369","https://openalex.org/W2149684006","https://openalex.org/W2157514610","https://openalex.org/W2162283517","https://openalex.org/W2162568437","https://openalex.org/W2162800072","https://openalex.org/W2163738369","https://openalex.org/W2166091242","https://openalex.org/W2174598112","https://openalex.org/W2400216756","https://openalex.org/W2472188794","https://openalex.org/W2631389871","https://openalex.org/W2913264117","https://openalex.org/W2914982603","https://openalex.org/W4234020632","https://openalex.org/W4235021791","https://openalex.org/W4236561850","https://openalex.org/W4238764625","https://openalex.org/W6630877225"],"related_works":["https://openalex.org/W370370040","https://openalex.org/W2267955400","https://openalex.org/W2541866089","https://openalex.org/W1572758480","https://openalex.org/W586734670","https://openalex.org/W2547095320","https://openalex.org/W3172992491","https://openalex.org/W2066931381","https://openalex.org/W1537929493","https://openalex.org/W2076663662"],"abstract_inverted_index":{"For":[0],"performance":[1,149],"and":[2,20,64,83,91,132],"for":[3],"incorporating":[4],"legacy":[5],"libraries,":[6],"many":[7],"Java":[8,26,30,52,93,116,168],"applications":[9],"contain":[10],"native-code":[11],"components":[12,23,27],"written":[13],"in":[14,79],"unsafe":[15],"languages":[16],"such":[17],"as":[18],"C":[19],"C++.":[21],"Native-code":[22],"interoperate":[24],"with":[25],"through":[28,96],"the":[29,50,74,85,88,92,109,121,124,130,145,165],"Native":[31],"Interface":[32],"(JNI).":[33],"As":[34],"native":[35,66,77,89],"code":[36,67,78],"is":[37,112,126],"not":[38],"regulated":[39],"by":[40],"Java's":[41,61],"security":[42,47,57,62,110,166],"model,":[43],"it":[44,157],"poses":[45],"serious":[46],"threats":[48],"to":[49],"managed":[51],"world.":[53],"We":[54],"introduce":[55],"a":[56,80,97,115],"framework":[58,75,111,125,154],"that":[59,156],"extends":[60],"model":[63],"brings":[65],"under":[68],"control.":[69],"Leveraging":[70],"software-based":[71],"fault":[72],"isolation,":[73],"puts":[76],"separate":[81],"sandbox":[82],"allows":[84],"interaction":[86],"between":[87],"world":[90,94],"only":[95],"carefully":[98],"designed":[99],"pathway.":[100],"Two":[101],"different":[102],"implementations":[103],"were":[104],"built.":[105],"In":[106,120],"one":[107],"implementation,":[108,123],"integrated":[113],"into":[114],"Virtual":[117],"Machine":[118],"(JVM).":[119],"second":[122,139],"built":[127],"outside":[128],"of":[129,135,147,152,167],"JVM":[131,142],"takes":[133],"advantage":[134],"JVM-independent":[136],"interfaces.":[137],"The":[138],"implementation":[140],"provides":[141],"portability,":[143],"at":[144],"expense":[146],"some":[148],"degradation.":[150],"Evaluation":[151],"our":[153],"demonstrates":[155],"incurs":[158],"modest":[159],"runtime":[160],"overhead":[161],"while":[162],"significantly":[163],"enhancing":[164],"applications.":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
