{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:24:35Z","timestamp":1725798275489},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA87501220139"],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-09-1-0273"],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600177","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["In-nimbo sandboxing"],"prefix":"10.1145","author":[{"given":"Michael","family":"Maass","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"William L.","family":"Scherlis","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Jonathan","family":"Aldrich","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AppDB Adobe Reader. http:\/\/goo.gl\/Fx9pd. AppDB Adobe Reader. http:\/\/goo.gl\/Fx9pd."},{"key":"e_1_3_2_1_2_1","unstructured":"Chromium sandbox. http:\/\/www.chromium.org\/developers\/design-documents\/sandbox\/. Chromium sandbox. http:\/\/www.chromium.org\/developers\/design-documents\/sandbox\/."},{"key":"e_1_3_2_1_3_1","unstructured":"National vulnerability database (NVD) national vulnerability database (CVE-2010-3019). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2010-3019. National vulnerability database (NVD) national vulnerability database (CVE-2010-3019). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2010-3019."},{"key":"e_1_3_2_1_4_1","unstructured":"National vulnerability database (NVD) national vulnerability database (CVE-2013-0768). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-0768. National vulnerability database (NVD) national vulnerability database (CVE-2013-0768). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-0768."},{"key":"e_1_3_2_1_5_1","unstructured":"PDF x-RAY. https:\/\/github.com\/9b\/pdfxray_public. PDF x-RAY. https:\/\/github.com\/9b\/pdfxray_public."},{"key":"e_1_3_2_1_6_1","unstructured":"What is protected view? - word - office.com. http:\/\/office.microsoft.com\/en-us\/word-help\/what-is-protected-view-HA010355931.aspx. What is protected view? - word - office.com. http:\/\/office.microsoft.com\/en-us\/word-help\/what-is-protected-view-HA010355931.aspx."},{"volume-title":"Adobe Systems Incorporated","year":"2006","author":"Reference","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"Two new vulnerabilities in Adobe Acrobat Reader. http:\/\/www.f-secure.com\/weblog\/archives\/00001671.html Apr. 2009. Two new vulnerabilities in Adobe Acrobat Reader. http:\/\/www.f-secure.com\/weblog\/archives\/00001671.html Apr. 2009."},{"key":"e_1_3_2_1_9_1","unstructured":"Anatomy of a malicious PDF file. http:\/\/goo.gl\/VlLmU Feb. 2010. Anatomy of a malicious PDF file. http:\/\/goo.gl\/VlLmU Feb. 2010."},{"key":"e_1_3_2_1_10_1","unstructured":"Military targets. http:\/\/www.f-secure.com\/weblog\/archives\/00002203.html July 2011. Military targets. http:\/\/www.f-secure.com\/weblog\/archives\/00002203.html July 2011."},{"key":"e_1_3_2_1_11_1","unstructured":"National vulnerability database (NVD) national vulnerability database (CVE-2011-2949). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2011-2949 Oct. 2011. National vulnerability database (NVD) national vulnerability database (CVE-2011-2949). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2011-2949 Oct. 2011."},{"key":"e_1_3_2_1_12_1","unstructured":"Understanding and working in protected mode internet explorer. http:\/\/msdn.microsoft.com\/en-us\/library\/bb250462(v=vs.85).aspx Feb. 2011. Understanding and working in protected mode internet explorer. http:\/\/msdn.microsoft.com\/en-us\/library\/bb250462(v=vs.85).aspx Feb. 2011."},{"key":"e_1_3_2_1_13_1","unstructured":"4\n .8.11 the canvas element - HTML5. http:\/\/www.w3.org\/TR\/html5\/the-canvas-element.html#the-canvas-element Mar. 2012. 4.8.11 the canvas element - HTML5. http:\/\/www.w3.org\/TR\/html5\/the-canvas-element.html#the-canvas-element Mar. 2012."},{"key":"e_1_3_2_1_14_1","unstructured":"Adobe PDF library SDK | adobe developer connection. http:\/\/www.adobe.com\/devnet\/pdf\/library.html Aug. 2012. Adobe PDF library SDK | adobe developer connection. http:\/\/www.adobe.com\/devnet\/pdf\/library.html Aug. 2012."},{"key":"e_1_3_2_1_15_1","unstructured":"Google warns of using adobe reader - particularly on linux. http:\/\/www.h-online.com\/security\/news\/item\/Google-warns-of-using-Adobe-Reader-particularly-on-Linux-1668153.html Aug. 2012. Google warns of using adobe reader - particularly on linux. http:\/\/www.h-online.com\/security\/news\/item\/Google-warns-of-using-Adobe-Reader-particularly-on-Linux-1668153.html Aug. 2012."},{"key":"e_1_3_2_1_16_1","unstructured":"National vulnerability database (NVD) national vulnerability database (CVE-2010-2937). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2010-2937 Jan. 2012. National vulnerability database (NVD) national vulnerability database (CVE-2010-2937). http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2010-2937 Jan. 2012."},{"key":"e_1_3_2_1_17_1","unstructured":"Arkin Brad. Illegal access to Adobe source code. http:\/\/blogs.adobe.com\/asset\/2013\/10\/illegal-access-to-adobe-source-code.html Oct. 2013. Arkin Brad. Illegal access to Adobe source code. http:\/\/blogs.adobe.com\/asset\/2013\/10\/illegal-access-to-adobe-source-code.html Oct. 2013."},{"key":"e_1_3_2_1_18_1","unstructured":"Buchanan K. Evans C. Reis C. and Sepez T. Chromium blog: A tale of two pwnies (Part 2). http:\/\/blog.chromium.org\/2012\/06\/tale-of-two-pwnies-part-2.html June 2012. Buchanan K. Evans C. Reis C. and Sepez T. Chromium blog: A tale of two pwnies (Part 2). http:\/\/blog.chromium.org\/2012\/06\/tale-of-two-pwnies-part-2.html June 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1891823.1891830"},{"key":"e_1_3_2_1_20_1","unstructured":"Delugre G. Bypassing ASLR and DEP on Adobe Reader X - Sogeti ESEC Lab. http:\/\/esec-lab.sogeti.com\/post\/Bypassing-ASLR-and-DEP-on-Adobe-Reader-X June 2012. Delugre G. Bypassing ASLR and DEP on Adobe Reader X - Sogeti ESEC Lab. http:\/\/esec-lab.sogeti.com\/post\/Bypassing-ASLR-and-DEP-on-Adobe-Reader-X June 2012."},{"key":"e_1_3_2_1_21_1","unstructured":"Esparza J. peepdf - PDF analysis and creation\/modification tool. http:\/\/code.google.com\/p\/peepdf\/. Esparza J. peepdf - PDF analysis and creation\/modification tool. http:\/\/code.google.com\/p\/peepdf\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_4"},{"key":"e_1_3_2_1_23_1","unstructured":"Friedl S. Best practices for UNIX chroot() operations. http:\/\/www.unixwiz.net\/techtips\/chroot-practices.html. Friedl S. Best practices for UNIX chroot() operations. http:\/\/www.unixwiz.net\/techtips\/chroot-practices.html."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_25_1","unstructured":"Goodin D. At hacking contest Google Chrome falls to third zero-day attack (Updated). http:\/\/arstechnica.com\/business\/news\/2012\/03\/googles-chrome-browser-on-friday.ars Mar. 2012. Goodin D. At hacking contest Google Chrome falls to third zero-day attack (Updated). http:\/\/arstechnica.com\/business\/news\/2012\/03\/googles-chrome-browser-on-friday.ars Mar. 2012."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111596.1111601"},{"key":"e_1_3_2_1_27_1","unstructured":"Higgins K. Spear-phishing attacks out of China targeted source code intellectual property. http:\/\/goo.gl\/8RzyT Jan. 2010. Higgins K. Spear-phishing attacks out of China targeted source code intellectual property. http:\/\/goo.gl\/8RzyT Jan. 2010."},{"key":"e_1_3_2_1_28_1","unstructured":"International Organization for Standardization I. ISO 15929:2002 - International Organization for Standardization. http:\/\/goo.gl\/SUP1A. International Organization for Standardization I. ISO 15929:2002 - International Organization for Standardization. http:\/\/goo.gl\/SUP1A."},{"volume-title":"I. ISO 19005-2: 2011 - International Organization for Standardization. http:\/\/goo.gl\/mtHWw.","author":"International Organization for Standardization","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"International Organization for Standardization I. ISO 32000-1: 2008 - International Organization for Standardization. International Organization for Standardization I. ISO 32000-1:2008 - International Organization for Standardization."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.33"},{"key":"e_1_3_2_1_32_1","unstructured":"Landesman M. Free PDF readers: Alternatives to Adobe Reader and Acrobat. http:\/\/antivirus.about.com\/od\/securitytips\/tp\/Free-Pdf-Readers-Alternatives-To-Adobe-Reader-Acrobat.htm. Landesman M. Free PDF readers: Alternatives to Adobe Reader and Acrobat. http:\/\/antivirus.about.com\/od\/securitytips\/tp\/Free-Pdf-Readers-Alternatives-To-Adobe-Reader-Acrobat.htm."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076785"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484327"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31537-4_40"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/829514.830531"},{"first-page":"14","volume-title":"Proceedings of the 2012 USENIX conference on Annual Technical Conference (Berkeley, CA, USA, 2012), USENIX ATC'12, USENIX Association","author":"Martignoni L.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1353534.1346285"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352625"},{"key":"e_1_3_2_1_41_1","unstructured":"McQuarrie L. Mehra A. Mishra S. Randolph K. and Rogers B. Inside Adobe Reader Protected Mode - part 1 - design. http:\/\/blogs.adobe.com\/asset\/2010\/10\/inside-adobe-reader-protected-mode-part-1-design.html Oct. 2010. McQuarrie L. Mehra A. Mishra S. Randolph K. and Rogers B. Inside Adobe Reader Protected Mode - part 1 - design. http:\/\/blogs.adobe.com\/asset\/2010\/10\/inside-adobe-reader-protected-mode-part-1-design.html Oct. 2010."},{"key":"e_1_3_2_1_42_1","unstructured":"McQuarrie L. Mehra A. Mishra S. Randolph K. and Rogers B. Inside adobe reader protected mode - part 2 - the sandbox process. http:\/\/blogs.adobe.com\/asset\/2010\/10\/inside-adobe-reader-protected-mode-%E2%80%93-part-2-%E2%80%93-the-sandbox-process.html Oct. 2010. McQuarrie L. Mehra A. Mishra S. Randolph K. and Rogers B. Inside adobe reader protected mode - part 2 - the sandbox process. http:\/\/blogs.adobe.com\/asset\/2010\/10\/inside-adobe-reader-protected-mode-%E2%80%93-part-2-%E2%80%93-the-sandbox-process.html Oct. 2010."},{"key":"e_1_3_2_1_43_1","unstructured":"McQuarrie L. Mehra A. Mishra S. Randolph K. and Rogers B. Inside adobe reader protected mode - part 3 - broker process policies and inter-process communication. http:\/\/blogs.adobe.com\/asset\/2010\/11\/inside-adobe-reader-protected-mode-part-3-broker-process-policies-and-inter-process-communication.html Nov. 2010. McQuarrie L. Mehra A. Mishra S. Randolph K. and Rogers B. Inside adobe reader protected mode - part 3 - broker process policies and inter-process communication. http:\/\/blogs.adobe.com\/asset\/2010\/11\/inside-adobe-reader-protected-mode-part-3-broker-process-policies-and-inter-process-communication.html Nov. 2010."},{"volume-title":"Microsoft Press","year":"2006","author":"Michael Howard","key":"e_1_3_2_1_44_1"},{"volume-title":"Network and Distributed System Security Symposium","year":"2013","author":"Nedim","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","unstructured":"Obes J. and Schuh J. Chromium blog: A tale of two pwnies (Part 1). http:\/\/blog.chromium.org\/2012\/05\/tale-of-two-pwnies-part-1.html May 2012. Obes J. and Schuh J. Chromium blog: A tale of two pwnies (Part 1). http:\/\/blog.chromium.org\/2012\/05\/tale-of-two-pwnies-part-1.html May 2012."},{"key":"e_1_3_2_1_47_1","unstructured":"Sabanal P. and Yason M. Playing in the Reader X sandbox. Black Hat USA Briefings (July 2011). Sabanal P. and Yason M. Playing in the Reader X sandbox. Black Hat USA Briefings (July 2011)."},{"key":"e_1_3_2_1_48_1","unstructured":"Schuh J. Chromium blog: The road to safer more stable and flashier flash. http:\/\/blog.chromium.org\/2012\/08\/the-road-to-safer-more-stable-and.html Aug. 2012. Schuh J. Chromium blog: The road to safer more stable and flashier flash. http:\/\/blog.chromium.org\/2012\/08\/the-road-to-safer-more-stable-and.html Aug. 2012."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/794199.795116"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217951"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420987"},{"key":"e_1_3_2_1_52_1","unstructured":"Stender S. Inside adobe reader protected mode - part 4 - the challenge of sandboxing. http:\/\/blogs.adobe.com\/asset\/2010\/11\/inside-adobe-reader-protected-mode-part-4-the-challenge-of-sandboxing.html Nov. 2010. Stender S. Inside adobe reader protected mode - part 4 - the challenge of sandboxing. http:\/\/blogs.adobe.com\/asset\/2010\/11\/inside-adobe-reader-protected-mode-part-4-the-challenge-of-sandboxing.html Nov. 2010."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151033"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1972551.1972555"},{"key":"e_1_3_2_1_55_1","unstructured":"Uhley P. and Gwalani R. Inside flash player protected mode for firefox. http:\/\/blogs.adobe.com\/asset\/2012\/06\/inside-flash-player-protected-mode-for-firefox.html June 2012. Uhley P. and Gwalani R. Inside flash player protected mode for firefox. http:\/\/blogs.adobe.com\/asset\/2012\/06\/inside-flash-player-protected-mode-for-firefox.html June 2012."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/173668.168635"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600177","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T18:35:41Z","timestamp":1673548541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":57,"alternative-id":["10.1145\/2600176.2600177","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600177","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}