{"id":"https://openalex.org/W2538446731","doi":"https://doi.org/10.1145/2993600.2993608","title":"On Formalizing Information-Flow Control Libraries","display_name":"On Formalizing Information-Flow Control Libraries","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2538446731","doi":"https://doi.org/10.1145/2993600.2993608","mag":"2538446731"},"language":"en","primary_location":{"id":"doi:10.1145/2993600.2993608","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2993600.2993608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065850135","display_name":"Marco Vassena","orcid":"https://orcid.org/0000-0002-4795-0236"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Marco Vassena","raw_affiliation_strings":["Chalmers University, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028178671","display_name":"Alejandro Russo","orcid":"https://orcid.org/0000-0002-4338-6316"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Alejandro Russo","raw_affiliation_strings":["Chalmers University, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Chalmers University, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5065850135"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":3.5473,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93956569,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8630225658416748},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.712999701499939},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.6283372640609741},{"id":"https://openalex.org/keywords/erasure","display_name":"Erasure","score":0.6144534349441528},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5248028039932251},{"id":"https://openalex.org/keywords/concurrency-control","display_name":"Concurrency control","score":0.46696263551712036},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4541158676147461},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4339018166065216},{"id":"https://openalex.org/keywords/mutual-exclusion","display_name":"Mutual exclusion","score":0.42113959789276123},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3559790849685669}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8630225658416748},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.712999701499939},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.6283372640609741},{"id":"https://openalex.org/C2778790127","wikidata":"https://www.wikidata.org/wiki/Q484885","display_name":"Erasure","level":2,"score":0.6144534349441528},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5248028039932251},{"id":"https://openalex.org/C84511453","wikidata":"https://www.wikidata.org/wiki/Q2914952","display_name":"Concurrency control","level":3,"score":0.46696263551712036},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4541158676147461},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4339018166065216},{"id":"https://openalex.org/C56348326","wikidata":"https://www.wikidata.org/wiki/Q1047554","display_name":"Mutual exclusion","level":2,"score":0.42113959789276123},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3559790849685669},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2993600.2993608","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2993600.2993608","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security","raw_type":"proceedings-article"},{"id":"pmh:oai:publications.lib.chalmers.se:247397","is_oa":false,"landing_page_url":"http://publications.lib.chalmers.se/publication/247397-on-formalizing-information-flow-control-libraries","pdf_url":null,"source":{"id":"https://openalex.org/S4377196470","display_name":"Chalmers Publication Library (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text.Article.Conference.PeerReviewed"},{"id":"pmh:oai:research.chalmers.se:247397","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/247397","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7099999785423279}],"awards":[],"funders":[{"id":"https://openalex.org/F4320308403","display_name":"Neurosurgery Research and Education Foundation","ror":"https://ror.org/04fp9ma57"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W114581357","https://openalex.org/W1608712340","https://openalex.org/W1961998804","https://openalex.org/W1977764760","https://openalex.org/W1988079752","https://openalex.org/W1991895580","https://openalex.org/W1994158024","https://openalex.org/W2005525408","https://openalex.org/W2027961147","https://openalex.org/W2028705369","https://openalex.org/W2033178475","https://openalex.org/W2047370472","https://openalex.org/W2052047106","https://openalex.org/W2057503672","https://openalex.org/W2060493407","https://openalex.org/W2067012475","https://openalex.org/W2072885133","https://openalex.org/W2080914957","https://openalex.org/W2081551198","https://openalex.org/W2099878912","https://openalex.org/W2103428609","https://openalex.org/W2107779615","https://openalex.org/W2122167991","https://openalex.org/W2122643307","https://openalex.org/W2132185316","https://openalex.org/W2134296086","https://openalex.org/W2136624255","https://openalex.org/W2141248338","https://openalex.org/W2141535462","https://openalex.org/W2149143260","https://openalex.org/W2162283517","https://openalex.org/W2463192860","https://openalex.org/W2519805394","https://openalex.org/W4238764625","https://openalex.org/W4290864872"],"related_works":["https://openalex.org/W2072016134","https://openalex.org/W3046715470","https://openalex.org/W2531084474","https://openalex.org/W2526476098","https://openalex.org/W2089352481","https://openalex.org/W2056486266","https://openalex.org/W2583438563","https://openalex.org/W2150179797","https://openalex.org/W2170147831","https://openalex.org/W4242696047"],"abstract_inverted_index":{"Many":[0],"state-of-the-art":[1],"IFC":[2,39,127],"libraries":[3,53],"support":[4],"a":[5,31,147,211],"variety":[6],"of":[7,22,35,98,136],"advanced":[8],"features":[9],"like":[10],"mutuable":[11],"data":[12],"structures,":[13],"exceptions,":[14],"and":[15,56,189],"concurrency,":[16],"whose":[17],"subtle":[18],"interaction":[19],"makes":[20],"verification":[21],"security":[23],"guarantees":[24],"challenging.":[25],"In":[26],"this":[27],"paper,":[28],"we":[29,58,130,145,163],"present":[30],"full-fledged,":[32],"mechanically-verified":[33],"model":[34],"MAC---a":[36],"statically":[37],"enforced":[38],"library.":[40],"We":[41,180,204],"describe":[42],"three":[43],"main":[44,218],"insights":[45],"gained":[46],"during":[47],"the":[48,63,74,96,103,134,194],"formalization":[49],"process.":[50],"As":[51],"previous":[52,137],"(e.g.,":[54],"LIO":[55],"HLIO),":[57],"utilize":[59],"term":[60],"erasure":[61,149,153],"as":[62,123,125],"proof":[64],"technique":[65,70,150],"to":[66,196],"show":[67,181],"non-interference.":[68],"This":[69,116],"essentially":[71],"states":[72],"that":[73,151,206],"same":[75],"public":[76],"output":[77],"should":[78],"be":[79,114],"produced":[80],"if":[81],"secrets":[82,176],"are":[83,107],"erased":[84],"before":[85],"or":[86],"after":[87],"program":[88],"execution.":[89],"Our":[90],"first":[91],"insight":[92],"identifies":[93],"challenges":[94],"when":[95],"sensitivity":[97],"terms":[99],"may":[100],"depend":[101],"on":[102,193],"context":[104],"where":[105,175],"they":[106,112],"used,":[108],"thus":[109],"affecting":[110],"how":[111],"will":[113],"erased.":[115,179],"situation":[117],"is":[118,208],"not":[119],"uncommon":[120],"in":[121,133],"MAC":[122,207],"well":[124],"other":[126],"libraries---in":[128],"fact,":[129],"spot":[131],"problems":[132],"proofs":[135],"work.":[138],"To":[139],"deal":[140],"with":[141],"such":[142],"complicated":[143],"situations,":[144],"propose":[146],"novel":[148],"performs":[152],"by":[154,159,169,214],"additional":[155],"evaluation":[156],"rules,":[157],"triggered":[158],"special-purpose":[160],"constructs.":[161],"Furthermore,":[162],"simplify":[164],"reasoning":[165],"about":[166],"exception-aware":[167],"primitives":[168],"removing":[170],"sensitive":[171],"exceptions":[172],"from":[173],"programs":[174],"have":[177],"been":[178],"progress":[182],"insensitive":[183],"non-interference":[184,199],"for":[185,200],"our":[186,201,217],"sequential":[187],"calculus":[188],"pinpoint":[190],"sufficient":[191],"requirements":[192],"scheduler":[195,213],"prove":[197,205],"progress-sensitive":[198],"concurrent":[202],"calculus.":[203],"secure":[209],"under":[210],"round-robin":[212],"simply":[215],"instantiating":[216],"scheduler-parametric":[219],"theorem.":[220]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":6},{"year":2017,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
