{"id":"https://openalex.org/W4308410011","doi":"https://doi.org/10.1145/3548606.3560680","title":"P-Verifier","display_name":"P-Verifier","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308410011","doi":"https://doi.org/10.1145/3548606.3560680"},"language":"en","primary_location":{"id":"doi:10.1145/3548606.3560680","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560680","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560680","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560680","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103029944","display_name":"Ze Jin","orcid":"https://orcid.org/0000-0003-3379-5113"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["CN","US"],"is_corresponding":true,"raw_author_name":"Ze Jin","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences &amp; Indiana University Bloomington, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences &amp; Indiana University Bloomington, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036446600","display_name":"Luyi Xing","orcid":"https://orcid.org/0000-0002-1036-1163"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Luyi Xing","raw_affiliation_strings":["Indiana University Bloomington, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University Bloomington, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091169184","display_name":"Yiwei Fang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Yiwei Fang","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences &amp; Indiana University Bloomington, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences &amp; Indiana University Bloomington, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038","https://openalex.org/I4210119109"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101605747","display_name":"Yan Jia","orcid":"https://orcid.org/0000-0003-0689-2508"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Jia","raw_affiliation_strings":["Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076311357","display_name":"Bin Yuan","orcid":"https://orcid.org/0000-0002-5365-904X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yuan","raw_affiliation_strings":["HuaZhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"HuaZhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004834139","display_name":"Qixu Liu","orcid":"https://orcid.org/0000-0003-0895-9585"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qixu Liu","raw_affiliation_strings":["Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, Chinese Academy of Sciences &amp; School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I4210165038"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5103029944"],"corresponding_institution_ids":["https://openalex.org/I4210119109","https://openalex.org/I4210156404","https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":2.1869,"has_fulltext":true,"cited_by_count":19,"citation_normalized_percentile":{"value":0.90620082,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1647","last_page":"1661"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7452183961868286},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7300726175308228},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7234430313110352},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5343536138534546},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5176361203193665},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.46935969591140747},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4619237780570984},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.4571608603000641},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.45284074544906616},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.43648552894592285},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4227233827114105},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1795462667942047},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1270054280757904},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0827404260635376}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7452183961868286},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7300726175308228},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7234430313110352},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5343536138534546},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5176361203193665},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.46935969591140747},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4619237780570984},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.4571608603000641},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.45284074544906616},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.43648552894592285},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4227233827114105},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1795462667942047},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1270054280757904},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0827404260635376},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3548606.3560680","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560680","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560680","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3548606.3560680","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3548606.3560680","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3548606.3560680","source":{"id":"https://openalex.org/S4363608815","display_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.6200000047683716,"display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G1018342707","display_name":null,"funder_award_id":"2021M691","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1187739995","display_name":"Ultra High Performance Digital Circuit Design and Synthesis","funder_award_id":"0204010","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2082826544","display_name":null,"funder_award_id":"Postdoctoral","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2104653401","display_name":null,"funder_award_id":"2021M","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G2843015554","display_name":null,"funder_award_id":"2021M691673","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3390532264","display_name":null,"funder_award_id":"XDC02040100","funder_id":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences"},{"id":"https://openalex.org/G3789452610","display_name":null,"funder_award_id":"62102198","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4183041220","display_name":null,"funder_award_id":"CNS-2145675 CCF-2124225","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G529307786","display_name":null,"funder_award_id":"2019163","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G5481911862","display_name":null,"funder_award_id":"2102198","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5821257792","display_name":"CAREER: Foundations for IoT Cloud Security","funder_award_id":"2145675","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6258415954","display_name":null,"funder_award_id":"Chinese","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8058437614","display_name":null,"funder_award_id":"XDC02040100","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"},{"id":"https://openalex.org/G8137009922","display_name":null,"funder_award_id":"C020401","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8701658582","display_name":null,"funder_award_id":"No.2019163","funder_id":"https://openalex.org/F4320322847","funder_display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321133","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"},{"id":"https://openalex.org/F4320322847","display_name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","ror":"https://ror.org/031141b54"},{"id":"https://openalex.org/F4320335892","display_name":"Youth Innovation Promotion Association","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4308410011.pdf","grobid_xml":"https://content.openalex.org/works/W4308410011.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1490597684","https://openalex.org/W1606208191","https://openalex.org/W1682877232","https://openalex.org/W1856491113","https://openalex.org/W2020992910","https://openalex.org/W2031606427","https://openalex.org/W2064070192","https://openalex.org/W2124260419","https://openalex.org/W2164779671","https://openalex.org/W2169568031","https://openalex.org/W2508433864","https://openalex.org/W2533712304","https://openalex.org/W2605367183","https://openalex.org/W2613352518","https://openalex.org/W2738594908","https://openalex.org/W2755469379","https://openalex.org/W2889851986","https://openalex.org/W2890188242","https://openalex.org/W2908957302","https://openalex.org/W2929275958","https://openalex.org/W2929305171","https://openalex.org/W2933426098","https://openalex.org/W2947175569","https://openalex.org/W2947292651","https://openalex.org/W2947392770","https://openalex.org/W2983277367","https://openalex.org/W3015797940","https://openalex.org/W3046246673","https://openalex.org/W3096559598","https://openalex.org/W3108419307","https://openalex.org/W3112086075","https://openalex.org/W3114076591","https://openalex.org/W3115634732","https://openalex.org/W3136780060","https://openalex.org/W4229730107","https://openalex.org/W4238448826","https://openalex.org/W4248223175","https://openalex.org/W4284675888","https://openalex.org/W4308469381"],"related_works":["https://openalex.org/W2393973626","https://openalex.org/W2473372874","https://openalex.org/W2107355607","https://openalex.org/W2105261429","https://openalex.org/W2012419258","https://openalex.org/W318167434","https://openalex.org/W1482564230","https://openalex.org/W4285408982","https://openalex.org/W2127259385","https://openalex.org/W2004929657"],"abstract_inverted_index":{"Modern":[0],"IoT":[1,15,26,29,37,44,52,70,76,86,104,141,169,187,200,215,234],"device":[2,98,132,164],"manufacturers":[3,99,133,165,195],"are":[4,112],"taking":[5],"advantage":[6],"of":[7,68,91,154,162,176],"the":[8,66,82,85,92,122,145,152,172,177,253],"managed":[9],"Platform-as-a-Service":[10],"(PaaS)":[11],"and":[12,24,88,151,166,174,191,197,221,236,247],"Infrastructure-as-a-Service":[13],"(IaaS)":[14],"clouds":[16,150],"(e.g.,":[17],"AWS":[18],"IoT,":[19],"Azure":[20],"IoT)":[21],"for":[22,97,157],"secure":[23],"convenient":[25],"development/deployment.":[27],"The":[28],"access":[30,38,50,71,105,237],"control":[31],"is":[32,126],"achieved":[33],"by":[34,148],"manufacturer-specified,":[35],"cloud-enforced":[36],"policies":[39,72,93],"(cloud-standard":[40],"JSON":[41],"documents,":[42],"called":[43],"Policies)":[45],"stating":[46],"which":[47,51,111,179],"users":[48],"can":[49,182,211],"devices/resources":[53],"under":[54],"what":[55],"constraints.":[56],"In":[57,117],"this":[58],"paper,":[59],"we":[60,203],"performed":[61],"a":[62,102,206],"systematic":[63],"study":[64],"on":[65,73,186,252],"security":[67,230],"cloud-based":[69,214],"modern":[74,233],"PaaS/IaaS":[75,149],"clouds.":[77],"Our":[78,160],"research":[79],"shows":[80],"that":[81,130,210],"complexity":[83],"in":[84,121,139,232],"semantics":[87],"enforcement":[89],"logic":[90,109],"leaves":[94],"tremendous":[95],"space":[96],"to":[100,114,119,128,144,228,244],"program":[101],"flawed":[103],"policy,":[106],"introducing":[107],"convoluted":[108],"flaws":[110],"non-trivial":[113],"reason":[115],"about.":[116],"addition":[118],"challenges/mistakes":[120],"design":[123],"space,":[124],"it":[125],"astonishing":[127],"find":[129],"mainstream":[131],"also":[134],"generally":[135],"make":[136],"critical":[137],"mistakes":[138],"deploying":[140],"Policies":[142],"thanks":[143],"flexibility":[146],"offered":[147],"lack":[153],"standard":[155],"practices":[156],"doing":[158],"so.":[159],"assessment":[161],"36":[163],"310":[167],"open-source":[168],"projects":[170],"highlights":[171],"pervasiveness":[173],"seriousness":[175],"problems,":[178],"once":[180],"exploited,":[181],"have":[183],"serious":[184],"impacts":[185],"users'":[188],"security,":[189],"safety,":[190],"privacy.":[192],"To":[193],"help":[194],"identify":[196],"easily":[198],"fix":[199],"Policy":[201],"flaws,":[202],"introduce":[204],"P-Verifier,":[205],"formal":[207],"verification":[208],"tool":[209],"automatically":[212],"verify":[213],"Policies.":[216],"With":[217],"evaluated":[218],"high":[219],"effectiveness":[220],"low":[222],"performance":[223],"overhead,":[224],"P-Verifier":[225],"will":[226],"contribute":[227],"elevating":[229],"assurance":[231],"deployments":[235],"control.":[238],"We":[239],"responsibly":[240],"reported":[241],"all":[242],"findings":[243],"affected":[245],"vendors":[246],"fixes":[248],"were":[249],"deployed":[250],"or":[251],"way.":[254]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":1}],"updated_date":"2026-04-18T07:56:08.524223","created_date":"2022-11-11T00:00:00"}
