{"id":"https://openalex.org/W2972047516","doi":"https://doi.org/10.1109/csf.2019.00008","title":"Optimising Faceted Secure Multi-Execution","display_name":"Optimising Faceted Secure Multi-Execution","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2972047516","doi":"https://doi.org/10.1109/csf.2019.00008","mag":"2972047516"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/csf.2019.00008","pdf_url":"https://ieeexplore.ieee.org/ielx7/8804915/8823657/08823673.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/8804915/8823657/08823673.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060824078","display_name":"Maximilian Algehed","orcid":"https://orcid.org/0000-0002-1666-9994"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Maximilian Algehed","raw_affiliation_strings":["Computer Science and Engineering Chalmers, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Chalmers, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028178671","display_name":"Alejandro Russo","orcid":"https://orcid.org/0000-0002-4338-6316"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Alejandro Russo","raw_affiliation_strings":["Computer Science and Engineering Chalmers, Gothenburg, Sweden"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Chalmers, Gothenburg, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018139743","display_name":"Cormac Flanagan","orcid":"https://orcid.org/0000-0002-1828-3120"},"institutions":[{"id":"https://openalex.org/I185103710","display_name":"University of California, Santa Cruz","ror":"https://ror.org/03s65by71","country_code":"US","type":"education","lineage":["https://openalex.org/I185103710"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cormac Flanagan","raw_affiliation_strings":["Computer Science and Engineering, University of California, Santa Cruz, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, University of California, Santa Cruz, USA","institution_ids":["https://openalex.org/I185103710"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.529,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":9,"citation_normalized_percentile":{"value":0.614729,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"115"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9877,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/control-flow","display_name":"Control flow","score":0.66392267},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.42793944}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.910029},{"id":"https://openalex.org/C160191386","wikidata":"https://www.wikidata.org/wiki/Q868299","display_name":"Control flow","level":2,"score":0.66392267},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.60852337},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.54464716},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.53589165},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.4479468},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.43786997},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.42793944},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34652707},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.34558046},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2095629},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/csf.2019.00008","pdf_url":"https://ieeexplore.ieee.org/ielx7/8804915/8823657/08823673.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/csf.2019.00008","pdf_url":"https://ieeexplore.ieee.org/ielx7/8804915/8823657/08823673.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.75,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":45,"referenced_works":["https://openalex.org/W1265250368","https://openalex.org/W1606774834","https://openalex.org/W1613776191","https://openalex.org/W1961403075","https://openalex.org/W1977764760","https://openalex.org/W1993175210","https://openalex.org/W1994197051","https://openalex.org/W1995290095","https://openalex.org/W1997988349","https://openalex.org/W2005525408","https://openalex.org/W2008332764","https://openalex.org/W2027146564","https://openalex.org/W2027961147","https://openalex.org/W2028705369","https://openalex.org/W2060493407","https://openalex.org/W2062950667","https://openalex.org/W2081377878","https://openalex.org/W2094873755","https://openalex.org/W2103428609","https://openalex.org/W2106573617","https://openalex.org/W2107779615","https://openalex.org/W2111794592","https://openalex.org/W2122049982","https://openalex.org/W2122167991","https://openalex.org/W2136887296","https://openalex.org/W2146717998","https://openalex.org/W2150174204","https://openalex.org/W2153684747","https://openalex.org/W2158062279","https://openalex.org/W2202148857","https://openalex.org/W2223370306","https://openalex.org/W2463192860","https://openalex.org/W2479255192","https://openalex.org/W2518790240","https://openalex.org/W2519680833","https://openalex.org/W254902136","https://openalex.org/W2766482825","https://openalex.org/W2774134654","https://openalex.org/W2798483320","https://openalex.org/W2890509371","https://openalex.org/W2900152012","https://openalex.org/W3100118001","https://openalex.org/W3125174003","https://openalex.org/W4206358530","https://openalex.org/W4213427446"],"related_works":["https://openalex.org/W4394650907","https://openalex.org/W4254119641","https://openalex.org/W4236324517","https://openalex.org/W3196207352","https://openalex.org/W3084261076","https://openalex.org/W2963408011","https://openalex.org/W2951724202","https://openalex.org/W2576399385","https://openalex.org/W2188516702","https://openalex.org/W155536188"],"abstract_inverted_index":{"Language-Based":[0],"Information":[1],"Flow":[2],"Control":[3],"(IFC)":[4],"provides":[5],"strong":[6],"security":[7,28],"guarantees":[8,29],"for":[9,56,114,126],"untrusted":[10],"code,":[11],"but":[12],"often":[13],"suffers":[14],"from":[15,177],"a":[16,65,115,123,147,152,157],"non-negligible":[17],"rate":[18],"of":[19,120,130,137,183],"false":[20,33,131],"alarms.":[21,34,132],"Multi-execution":[22],"based":[23,159],"techniques":[24,58],"promise":[25],"to":[26,64,70,90,105,144,179],"provide":[27],"without":[30],"raising":[31],"any":[32],"However,":[35],"all":[36],"known":[37],"multi-execution":[38,72,158],"approaches":[39],"introduce":[40],"extraneous":[41],"performance":[42],"overheads":[43,63],"which":[44,87],"are":[45,187],"rarely":[46],"studied.":[47],"In":[48,95],"this":[49],"work,":[50],"we":[51,141],"lay":[52],"down":[53],"the":[54,112,128,135,171],"foundations":[55],"optimisation":[57,139],"aimed":[59],"at":[60],"reducing":[61],"these":[62],"managable":[66],"level,":[67],"thus":[68],"helping":[69],"make":[71],"more":[73],"practical.":[74],"We":[75],"characterise":[76],"our":[77,138,167,184],"optimisations":[78,83,98,168],"as":[79],"data-and":[80],"control-oriented.":[81],"Data-oriented":[82],"reduce":[84,106,170],"storage":[85,172],"overheads-":[86],"also":[88],"helps":[89],"remove":[91],"unnecessary":[92],"repeated":[93],"computations.":[94],"contrast,":[96],"computation-oriented":[97],"rely":[99],"on":[100],"program":[101],"annotations":[102,110],"in":[103,156,192],"order":[104],"needless":[107],"computation.":[108],"These":[109],"motivate":[111],"need":[113],"new,":[116],"stronger,":[117],"theoretical":[118],"notion":[119,125],"transparency-":[121],"i.e.,":[122],"stronger":[124],"characterising":[127],"lack":[129],"To":[133],"show":[134,165],"efficacy":[136],"techniques,":[140],"apply":[142],"them":[143],"two":[145],"case-studies:":[146],"secure":[148],"(faceted)":[149],"database":[150],"and":[151,173],"chat":[153],"server":[154],"written":[155],"IFC":[160],"framework.":[161],"Our":[162],"case-studies":[163],"clearly":[164],"that":[166],"significantly":[169],"computational":[174],"overhead,":[175],"sometimes":[176],"exponential":[178],"polynomial":[180],"order.":[181],"All":[182],"formal":[185],"results":[186],"accompanied":[188],"by":[189],"mechanised":[190],"proofs":[191],"Agda.":[193]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2972047516","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":4}],"updated_date":"2025-01-18T08:18:00.039255","created_date":"2019-09-12"}