{"id":"https://openalex.org/W2524310722","doi":"https://doi.org/10.3233/jcs-160557","title":"Information flow analysis for a dynamically typed language with staged metaprogramming","display_name":"Information flow analysis for a dynamically typed language with staged metaprogramming","publication_year":2016,"publication_date":"2016-09-05","ids":{"openalex":"https://openalex.org/W2524310722","doi":"https://doi.org/10.3233/jcs-160557","mag":"2524310722"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-160557","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-160557","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs557?id=journal-of-computer-security%2Fjcs557","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs557?id=journal-of-computer-security%2Fjcs557","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018150695","display_name":"Martin Mariusz Lester","orcid":"https://orcid.org/0000-0002-2323-1771"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Martin Lester","raw_affiliation_strings":["Department of Computer Science, University of Oxford, Parks Road, Oxford, OX1 3QD, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, Parks Road, Oxford, OX1 3QD, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025152913","display_name":"C.-H. Luke Ong","orcid":"https://orcid.org/0000-0001-7509-680X"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Luke Ong","raw_affiliation_strings":["Department of Computer Science, University of Oxford, Parks Road, Oxford, OX1 3QD, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, Parks Road, Oxford, OX1 3QD, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108554298","display_name":"Max Sch\u00e4fer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Max Sch\u00e4fer","raw_affiliation_strings":["Semmle Limited, Blue Boar Court, 9 Alfred Street, Oxford, OX1 4EH, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Semmle Limited, Blue Boar Court, 9 Alfred Street, Oxford, OX1 4EH, UK","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018150695"],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.06239033,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24","issue":"5","first_page":"541","last_page":"582"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8874715566635132},{"id":"https://openalex.org/keywords/metaprogramming","display_name":"Metaprogramming","score":0.8527533411979675},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.828288197517395},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.8279935121536255},{"id":"https://openalex.org/keywords/javascript","display_name":"JavaScript","score":0.7669731974601746},{"id":"https://openalex.org/keywords/functional-programming","display_name":"Functional programming","score":0.6107192039489746},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4372764229774475},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.4326651692390442},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.41223275661468506},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1131262481212616}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8874715566635132},{"id":"https://openalex.org/C35390924","wikidata":"https://www.wikidata.org/wiki/Q661075","display_name":"Metaprogramming","level":2,"score":0.8527533411979675},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.828288197517395},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.8279935121536255},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.7669731974601746},{"id":"https://openalex.org/C42383842","wikidata":"https://www.wikidata.org/wiki/Q193076","display_name":"Functional programming","level":2,"score":0.6107192039489746},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4372764229774475},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.4326651692390442},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.41223275661468506},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1131262481212616},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/jcs-160557","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-160557","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs557?id=journal-of-computer-security%2Fjcs557","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:centaur.reading.ac.uk:81998","is_oa":false,"landing_page_url":"https://centaur.reading.ac.uk/view/creators/90009422.html>","pdf_url":null,"source":{"id":"https://openalex.org/S4306402273","display_name":"CentAUR (University of Reading)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71052956","host_organization_name":"University of Reading","host_organization_lineage":["https://openalex.org/I71052956"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.3233/jcs-160557","is_oa":true,"landing_page_url":"https://doi.org/10.3233/jcs-160557","pdf_url":"https://content.iospress.com:443/download/journal-of-computer-security/jcs557?id=journal-of-computer-security%2Fjcs557","source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6542465994","display_name":null,"funder_award_id":"EP/M023974/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2524310722.pdf","grobid_xml":"https://content.openalex.org/works/W2524310722.grobid-xml"},"referenced_works_count":56,"referenced_works":["https://openalex.org/W7558436","https://openalex.org/W1481546108","https://openalex.org/W1504051120","https://openalex.org/W1507046749","https://openalex.org/W1553894716","https://openalex.org/W1577719850","https://openalex.org/W1598613569","https://openalex.org/W1725973462","https://openalex.org/W1777693579","https://openalex.org/W1809751277","https://openalex.org/W1839269954","https://openalex.org/W1964066969","https://openalex.org/W1977764760","https://openalex.org/W2005421574","https://openalex.org/W2007397391","https://openalex.org/W2011333687","https://openalex.org/W2014832211","https://openalex.org/W2027822753","https://openalex.org/W2040478106","https://openalex.org/W2043676331","https://openalex.org/W2049268728","https://openalex.org/W2055931054","https://openalex.org/W2057085278","https://openalex.org/W2058347746","https://openalex.org/W2061056245","https://openalex.org/W2067012475","https://openalex.org/W2068711880","https://openalex.org/W2085939020","https://openalex.org/W2090395143","https://openalex.org/W2090924529","https://openalex.org/W2094873755","https://openalex.org/W2110904621","https://openalex.org/W2118431434","https://openalex.org/W2121194882","https://openalex.org/W2122049982","https://openalex.org/W2129278597","https://openalex.org/W2132733485","https://openalex.org/W2150174204","https://openalex.org/W2152767745","https://openalex.org/W2153684747","https://openalex.org/W2155735696","https://openalex.org/W2157117208","https://openalex.org/W2165304392","https://openalex.org/W2296605318","https://openalex.org/W2952100912","https://openalex.org/W3009776881","https://openalex.org/W3103744781","https://openalex.org/W3105116128","https://openalex.org/W4206358530","https://openalex.org/W4229517843","https://openalex.org/W4232808412","https://openalex.org/W4233177776","https://openalex.org/W4236893567","https://openalex.org/W4238033972","https://openalex.org/W4250199140","https://openalex.org/W6894309769"],"related_works":["https://openalex.org/W3216635194","https://openalex.org/W2048147817","https://openalex.org/W2053093724","https://openalex.org/W2729966571","https://openalex.org/W2867457158","https://openalex.org/W2018501482","https://openalex.org/W2889230297","https://openalex.org/W2898037052","https://openalex.org/W3044146059","https://openalex.org/W1513190062"],"abstract_inverted_index":{"Web":[0],"applications":[1],"written":[2],"in":[3,116],"JavaScript":[4],"are":[5],"regularly":[6],"used":[7],"for":[8,42,60,80,131,154,172],"dealing":[9],"with":[10,52,62,86,157],"sensitive":[11],"or":[12],"personal":[13],"data.":[14],"Consequently,":[15],"reasoning":[16],"about":[17],"their":[18],"security":[19,58,111],"properties":[20],"has":[21],"become":[22],"an":[23],"important":[24],"problem,":[25],"which":[26],"is":[27,146],"made":[28],"very":[29],"difficult":[30],"by":[31],"the":[32,37,120,123,147,161],"highly":[33],"dynamic":[34,67],"nature":[35],"of":[36,66,122,166],"language,":[38],"particularly":[39],"its":[40,94,107],"support":[41],"runtime":[43],"code":[44,68],"generation":[45],"via":[46],"eval.":[47],"In":[48],"order":[49],"to":[50,56,105,109],"deal":[51],"this,":[53],"we":[54,73,125],"propose":[55],"investigate":[57],"analyses":[59],"languages":[61],"more":[63],"principled":[64],"forms":[65],"generation.":[69],"To":[70,118,142],"this":[71,145],"end,":[72],"present":[74,127],"a":[75,81,128,133,155,167,173],"static":[76,150],"information":[77,151,169],"flow":[78,152,170],"analysis":[79,153,171],"dynamically":[82],"typed":[83],"functional":[84,174],"language":[85,156],"prototype-based":[87],"inheritance":[88],"and":[89,98,160],"staged":[90,140,158],"metaprogramming.":[91,141],"We":[92],"prove":[93],"soundness,":[95],"implement":[96],"it":[97,100],"test":[99],"on":[101],"various":[102],"examples":[103],"designed":[104],"show":[106],"relevance":[108],"proving":[110],"properties,":[112],"such":[113],"as":[114],"noninterference,":[115],"JavaScript.":[117],"demonstrate":[119],"applicability":[121],"analysis,":[124],"also":[126],"general":[129],"method":[130],"transforming":[132],"program":[134],"using":[135,139],"eval":[136],"into":[137],"one":[138],"our":[143],"knowledge,":[144],"first":[148,162],"fully":[149],"metaprogramming,":[159],"formal":[163],"soundness":[164],"proof":[165],"CFA-based":[168],"programming":[175],"language.":[176]},"counts_by_year":[],"updated_date":"2026-05-04T06:00:05.808912","created_date":"2025-10-10T00:00:00"}
