id sid tid token lemma pos work_dzeata5onzf7rp26j2quaotjza 1 1 A a DT work_dzeata5onzf7rp26j2quaotjza 1 2 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 1 3 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 1 4 of of IN work_dzeata5onzf7rp26j2quaotjza 1 5 the the DT work_dzeata5onzf7rp26j2quaotjza 1 6 science science NN work_dzeata5onzf7rp26j2quaotjza 1 7 of of IN work_dzeata5onzf7rp26j2quaotjza 1 8 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 1 9 Submitted submit VBN work_dzeata5onzf7rp26j2quaotjza 1 10 15 15 CD work_dzeata5onzf7rp26j2quaotjza 1 11 October October NNP work_dzeata5onzf7rp26j2quaotjza 1 12 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 1 13 Accepted accept VBD work_dzeata5onzf7rp26j2quaotjza 1 14 28 28 CD work_dzeata5onzf7rp26j2quaotjza 1 15 December December NNP work_dzeata5onzf7rp26j2quaotjza 1 16 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 1 17 Published publish VBD work_dzeata5onzf7rp26j2quaotjza 1 18 27 27 CD work_dzeata5onzf7rp26j2quaotjza 1 19 January January NNP work_dzeata5onzf7rp26j2quaotjza 1 20 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 1 21 Corresponding Corresponding NNP work_dzeata5onzf7rp26j2quaotjza 1 22 author author NN work_dzeata5onzf7rp26j2quaotjza 1 23 Michael Michael NNP work_dzeata5onzf7rp26j2quaotjza 1 24 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 1 25 , , , work_dzeata5onzf7rp26j2quaotjza 1 26 mmaass@andrew.cmu.edu mmaass@andrew.cmu.edu VBZ work_dzeata5onzf7rp26j2quaotjza 1 27 Academic academic JJ work_dzeata5onzf7rp26j2quaotjza 1 28 editor editor NN work_dzeata5onzf7rp26j2quaotjza 1 29 Cynthia Cynthia NNP work_dzeata5onzf7rp26j2quaotjza 1 30 Irvine Irvine NNP work_dzeata5onzf7rp26j2quaotjza 1 31 Additional Additional NNP work_dzeata5onzf7rp26j2quaotjza 1 32 Information Information NNP work_dzeata5onzf7rp26j2quaotjza 1 33 and and CC work_dzeata5onzf7rp26j2quaotjza 1 34 Declarations declaration NNS work_dzeata5onzf7rp26j2quaotjza 1 35 can can MD work_dzeata5onzf7rp26j2quaotjza 1 36 be be VB work_dzeata5onzf7rp26j2quaotjza 1 37 found find VBN work_dzeata5onzf7rp26j2quaotjza 1 38 on on IN work_dzeata5onzf7rp26j2quaotjza 1 39 page page NN work_dzeata5onzf7rp26j2quaotjza 1 40 29 29 CD work_dzeata5onzf7rp26j2quaotjza 1 41 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1 42 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 1 43 / / SYM work_dzeata5onzf7rp26j2quaotjza 1 44 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 1 45 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1 46 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1 47 Copyright copyright NN work_dzeata5onzf7rp26j2quaotjza 1 48 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 1 49 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 1 50 et et NNP work_dzeata5onzf7rp26j2quaotjza 1 51 al al NNP work_dzeata5onzf7rp26j2quaotjza 1 52 . . . work_dzeata5onzf7rp26j2quaotjza 2 1 Distributed distribute VBN work_dzeata5onzf7rp26j2quaotjza 2 2 under under IN work_dzeata5onzf7rp26j2quaotjza 2 3 Creative Creative NNP work_dzeata5onzf7rp26j2quaotjza 2 4 Commons Commons NNP work_dzeata5onzf7rp26j2quaotjza 2 5 CC CC NNP work_dzeata5onzf7rp26j2quaotjza 2 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 2 7 BY BY NNP work_dzeata5onzf7rp26j2quaotjza 2 8 4.0 4.0 CD work_dzeata5onzf7rp26j2quaotjza 2 9 OPEN open JJ work_dzeata5onzf7rp26j2quaotjza 2 10 ACCESS access NN work_dzeata5onzf7rp26j2quaotjza 2 11 A a DT work_dzeata5onzf7rp26j2quaotjza 2 12 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 2 13 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 2 14 of of IN work_dzeata5onzf7rp26j2quaotjza 2 15 the the DT work_dzeata5onzf7rp26j2quaotjza 2 16 science science NN work_dzeata5onzf7rp26j2quaotjza 2 17 of of IN work_dzeata5onzf7rp26j2quaotjza 2 18 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 2 19 Michael Michael NNP work_dzeata5onzf7rp26j2quaotjza 2 20 Maass1 Maass1 NNP work_dzeata5onzf7rp26j2quaotjza 2 21 , , , work_dzeata5onzf7rp26j2quaotjza 2 22 Adam Adam NNP work_dzeata5onzf7rp26j2quaotjza 2 23 Sales2 Sales2 NNP work_dzeata5onzf7rp26j2quaotjza 2 24 , , , work_dzeata5onzf7rp26j2quaotjza 2 25 Benjamin Benjamin NNP work_dzeata5onzf7rp26j2quaotjza 2 26 Chung1 Chung1 NNP work_dzeata5onzf7rp26j2quaotjza 2 27 and and CC work_dzeata5onzf7rp26j2quaotjza 2 28 Joshua Joshua NNP work_dzeata5onzf7rp26j2quaotjza 2 29 Sunshine1 Sunshine1 NNP work_dzeata5onzf7rp26j2quaotjza 2 30 1 1 CD work_dzeata5onzf7rp26j2quaotjza 2 31 Institute Institute NNP work_dzeata5onzf7rp26j2quaotjza 2 32 for for IN work_dzeata5onzf7rp26j2quaotjza 2 33 Software Software NNP work_dzeata5onzf7rp26j2quaotjza 2 34 Research Research NNP work_dzeata5onzf7rp26j2quaotjza 2 35 , , , work_dzeata5onzf7rp26j2quaotjza 2 36 School School NNP work_dzeata5onzf7rp26j2quaotjza 2 37 of of IN work_dzeata5onzf7rp26j2quaotjza 2 38 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 2 39 Science Science NNP work_dzeata5onzf7rp26j2quaotjza 2 40 , , , work_dzeata5onzf7rp26j2quaotjza 2 41 Carnegie Carnegie NNP work_dzeata5onzf7rp26j2quaotjza 2 42 Mellon Mellon NNP work_dzeata5onzf7rp26j2quaotjza 2 43 University University NNP work_dzeata5onzf7rp26j2quaotjza 2 44 , , , work_dzeata5onzf7rp26j2quaotjza 2 45 Pittsburgh Pittsburgh NNP work_dzeata5onzf7rp26j2quaotjza 2 46 , , , work_dzeata5onzf7rp26j2quaotjza 2 47 PA PA NNP work_dzeata5onzf7rp26j2quaotjza 2 48 , , , work_dzeata5onzf7rp26j2quaotjza 2 49 United United NNP work_dzeata5onzf7rp26j2quaotjza 2 50 States States NNP work_dzeata5onzf7rp26j2quaotjza 2 51 2 2 CD work_dzeata5onzf7rp26j2quaotjza 2 52 Statistics Statistics NNPS work_dzeata5onzf7rp26j2quaotjza 2 53 Department Department NNP work_dzeata5onzf7rp26j2quaotjza 2 54 , , , work_dzeata5onzf7rp26j2quaotjza 2 55 Carnegie Carnegie NNP work_dzeata5onzf7rp26j2quaotjza 2 56 Mellon Mellon NNP work_dzeata5onzf7rp26j2quaotjza 2 57 University University NNP work_dzeata5onzf7rp26j2quaotjza 2 58 , , , work_dzeata5onzf7rp26j2quaotjza 2 59 Pittsburgh Pittsburgh NNP work_dzeata5onzf7rp26j2quaotjza 2 60 , , , work_dzeata5onzf7rp26j2quaotjza 2 61 PA PA NNP work_dzeata5onzf7rp26j2quaotjza 2 62 , , , work_dzeata5onzf7rp26j2quaotjza 2 63 United United NNP work_dzeata5onzf7rp26j2quaotjza 2 64 States States NNP work_dzeata5onzf7rp26j2quaotjza 2 65 ABSTRACT ABSTRACT NNP work_dzeata5onzf7rp26j2quaotjza 2 66 Sandboxes Sandboxes NNPS work_dzeata5onzf7rp26j2quaotjza 2 67 are be VBP work_dzeata5onzf7rp26j2quaotjza 2 68 increasingly increasingly RB work_dzeata5onzf7rp26j2quaotjza 2 69 important important JJ work_dzeata5onzf7rp26j2quaotjza 2 70 building building NN work_dzeata5onzf7rp26j2quaotjza 2 71 materials material NNS work_dzeata5onzf7rp26j2quaotjza 2 72 for for IN work_dzeata5onzf7rp26j2quaotjza 2 73 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 2 74 software software NN work_dzeata5onzf7rp26j2quaotjza 2 75 systems system NNS work_dzeata5onzf7rp26j2quaotjza 2 76 . . . work_dzeata5onzf7rp26j2quaotjza 3 1 In in IN work_dzeata5onzf7rp26j2quaotjza 3 2 recognition recognition NN work_dzeata5onzf7rp26j2quaotjza 3 3 of of IN work_dzeata5onzf7rp26j2quaotjza 3 4 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 3 5 potential potential NN work_dzeata5onzf7rp26j2quaotjza 3 6 to to TO work_dzeata5onzf7rp26j2quaotjza 3 7 improve improve VB work_dzeata5onzf7rp26j2quaotjza 3 8 the the DT work_dzeata5onzf7rp26j2quaotjza 3 9 security security NN work_dzeata5onzf7rp26j2quaotjza 3 10 posture posture NN work_dzeata5onzf7rp26j2quaotjza 3 11 of of IN work_dzeata5onzf7rp26j2quaotjza 3 12 many many JJ work_dzeata5onzf7rp26j2quaotjza 3 13 systems system NNS work_dzeata5onzf7rp26j2quaotjza 3 14 at at IN work_dzeata5onzf7rp26j2quaotjza 3 15 various various JJ work_dzeata5onzf7rp26j2quaotjza 3 16 points point NNS work_dzeata5onzf7rp26j2quaotjza 3 17 in in IN work_dzeata5onzf7rp26j2quaotjza 3 18 the the DT work_dzeata5onzf7rp26j2quaotjza 3 19 development development NN work_dzeata5onzf7rp26j2quaotjza 3 20 lifecycle lifecycle NN work_dzeata5onzf7rp26j2quaotjza 3 21 , , , work_dzeata5onzf7rp26j2quaotjza 3 22 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 3 23 have have VBP work_dzeata5onzf7rp26j2quaotjza 3 24 spent spend VBN work_dzeata5onzf7rp26j2quaotjza 3 25 the the DT work_dzeata5onzf7rp26j2quaotjza 3 26 last last JJ work_dzeata5onzf7rp26j2quaotjza 3 27 several several JJ work_dzeata5onzf7rp26j2quaotjza 3 28 decades decade NNS work_dzeata5onzf7rp26j2quaotjza 3 29 developing develop VBG work_dzeata5onzf7rp26j2quaotjza 3 30 , , , work_dzeata5onzf7rp26j2quaotjza 3 31 improving improve VBG work_dzeata5onzf7rp26j2quaotjza 3 32 , , , work_dzeata5onzf7rp26j2quaotjza 3 33 and and CC work_dzeata5onzf7rp26j2quaotjza 3 34 evaluating evaluate VBG work_dzeata5onzf7rp26j2quaotjza 3 35 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 3 36 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 3 37 . . . work_dzeata5onzf7rp26j2quaotjza 4 1 What what WP work_dzeata5onzf7rp26j2quaotjza 4 2 has have VBZ work_dzeata5onzf7rp26j2quaotjza 4 3 been be VBN work_dzeata5onzf7rp26j2quaotjza 4 4 done do VBN work_dzeata5onzf7rp26j2quaotjza 4 5 in in IN work_dzeata5onzf7rp26j2quaotjza 4 6 this this DT work_dzeata5onzf7rp26j2quaotjza 4 7 space space NN work_dzeata5onzf7rp26j2quaotjza 4 8 ? ? . work_dzeata5onzf7rp26j2quaotjza 5 1 Where where WRB work_dzeata5onzf7rp26j2quaotjza 5 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 5 3 the the DT work_dzeata5onzf7rp26j2quaotjza 5 4 barriers barrier NNS work_dzeata5onzf7rp26j2quaotjza 5 5 to to IN work_dzeata5onzf7rp26j2quaotjza 5 6 advancement advancement NN work_dzeata5onzf7rp26j2quaotjza 5 7 ? ? . work_dzeata5onzf7rp26j2quaotjza 6 1 What what WP work_dzeata5onzf7rp26j2quaotjza 6 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 6 3 the the DT work_dzeata5onzf7rp26j2quaotjza 6 4 gaps gap NNS work_dzeata5onzf7rp26j2quaotjza 6 5 in in IN work_dzeata5onzf7rp26j2quaotjza 6 6 these these DT work_dzeata5onzf7rp26j2quaotjza 6 7 efforts effort NNS work_dzeata5onzf7rp26j2quaotjza 6 8 ? ? . work_dzeata5onzf7rp26j2quaotjza 7 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 7 2 systematically systematically RB work_dzeata5onzf7rp26j2quaotjza 7 3 analyze analyze VBP work_dzeata5onzf7rp26j2quaotjza 7 4 a a DT work_dzeata5onzf7rp26j2quaotjza 7 5 decade decade NN work_dzeata5onzf7rp26j2quaotjza 7 6 of of IN work_dzeata5onzf7rp26j2quaotjza 7 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 7 8 research research NN work_dzeata5onzf7rp26j2quaotjza 7 9 from from IN work_dzeata5onzf7rp26j2quaotjza 7 10 five five CD work_dzeata5onzf7rp26j2quaotjza 7 11 top top JJ work_dzeata5onzf7rp26j2quaotjza 7 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 7 13 tier tier NN work_dzeata5onzf7rp26j2quaotjza 7 14 security security NN work_dzeata5onzf7rp26j2quaotjza 7 15 and and CC work_dzeata5onzf7rp26j2quaotjza 7 16 systems system NNS work_dzeata5onzf7rp26j2quaotjza 7 17 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 7 18 using use VBG work_dzeata5onzf7rp26j2quaotjza 7 19 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 7 20 content content NN work_dzeata5onzf7rp26j2quaotjza 7 21 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 7 22 , , , work_dzeata5onzf7rp26j2quaotjza 7 23 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 7 24 clustering clustering NN work_dzeata5onzf7rp26j2quaotjza 7 25 , , , work_dzeata5onzf7rp26j2quaotjza 7 26 and and CC work_dzeata5onzf7rp26j2quaotjza 7 27 graph graph NN work_dzeata5onzf7rp26j2quaotjza 7 28 - - HYPH work_dzeata5onzf7rp26j2quaotjza 7 29 based base VBN work_dzeata5onzf7rp26j2quaotjza 7 30 metrics metric NNS work_dzeata5onzf7rp26j2quaotjza 7 31 to to TO work_dzeata5onzf7rp26j2quaotjza 7 32 answer answer VB work_dzeata5onzf7rp26j2quaotjza 7 33 these these DT work_dzeata5onzf7rp26j2quaotjza 7 34 questions question NNS work_dzeata5onzf7rp26j2quaotjza 7 35 and and CC work_dzeata5onzf7rp26j2quaotjza 7 36 more more JJR work_dzeata5onzf7rp26j2quaotjza 7 37 . . . work_dzeata5onzf7rp26j2quaotjza 8 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 8 2 find find VBP work_dzeata5onzf7rp26j2quaotjza 8 3 that that IN work_dzeata5onzf7rp26j2quaotjza 8 4 the the DT work_dzeata5onzf7rp26j2quaotjza 8 5 term term NN work_dzeata5onzf7rp26j2quaotjza 8 6 “ " `` work_dzeata5onzf7rp26j2quaotjza 8 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 8 8 ” " '' work_dzeata5onzf7rp26j2quaotjza 8 9 currently currently RB work_dzeata5onzf7rp26j2quaotjza 8 10 has have VBZ work_dzeata5onzf7rp26j2quaotjza 8 11 no no DT work_dzeata5onzf7rp26j2quaotjza 8 12 widely widely RB work_dzeata5onzf7rp26j2quaotjza 8 13 accepted accept VBN work_dzeata5onzf7rp26j2quaotjza 8 14 or or CC work_dzeata5onzf7rp26j2quaotjza 8 15 acceptable acceptable JJ work_dzeata5onzf7rp26j2quaotjza 8 16 definition definition NN work_dzeata5onzf7rp26j2quaotjza 8 17 . . . work_dzeata5onzf7rp26j2quaotjza 9 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 9 2 use use VBP work_dzeata5onzf7rp26j2quaotjza 9 3 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 9 4 broad broad JJ work_dzeata5onzf7rp26j2quaotjza 9 5 scope scope NN work_dzeata5onzf7rp26j2quaotjza 9 6 to to TO work_dzeata5onzf7rp26j2quaotjza 9 7 propose propose VB work_dzeata5onzf7rp26j2quaotjza 9 8 the the DT work_dzeata5onzf7rp26j2quaotjza 9 9 first first JJ work_dzeata5onzf7rp26j2quaotjza 9 10 concise concise NN work_dzeata5onzf7rp26j2quaotjza 9 11 and and CC work_dzeata5onzf7rp26j2quaotjza 9 12 comprehensive comprehensive JJ work_dzeata5onzf7rp26j2quaotjza 9 13 definition definition NN work_dzeata5onzf7rp26j2quaotjza 9 14 for for IN work_dzeata5onzf7rp26j2quaotjza 9 15 “ " `` work_dzeata5onzf7rp26j2quaotjza 9 16 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 9 17 ” " '' work_dzeata5onzf7rp26j2quaotjza 9 18 that that WDT work_dzeata5onzf7rp26j2quaotjza 9 19 consistently consistently RB work_dzeata5onzf7rp26j2quaotjza 9 20 encompasses encompass VBZ work_dzeata5onzf7rp26j2quaotjza 9 21 research research NN work_dzeata5onzf7rp26j2quaotjza 9 22 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 9 23 . . . work_dzeata5onzf7rp26j2quaotjza 10 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 10 2 learn learn VBP work_dzeata5onzf7rp26j2quaotjza 10 3 that that IN work_dzeata5onzf7rp26j2quaotjza 10 4 the the DT work_dzeata5onzf7rp26j2quaotjza 10 5 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 10 6 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 10 7 covers cover VBZ work_dzeata5onzf7rp26j2quaotjza 10 8 a a DT work_dzeata5onzf7rp26j2quaotjza 10 9 range range NN work_dzeata5onzf7rp26j2quaotjza 10 10 of of IN work_dzeata5onzf7rp26j2quaotjza 10 11 deployment deployment NN work_dzeata5onzf7rp26j2quaotjza 10 12 options option NNS work_dzeata5onzf7rp26j2quaotjza 10 13 and and CC work_dzeata5onzf7rp26j2quaotjza 10 14 policy policy NN work_dzeata5onzf7rp26j2quaotjza 10 15 enforce- enforce- JJ work_dzeata5onzf7rp26j2quaotjza 10 16 ment ment JJ work_dzeata5onzf7rp26j2quaotjza 10 17 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 10 18 collectively collectively RB work_dzeata5onzf7rp26j2quaotjza 10 19 capable capable JJ work_dzeata5onzf7rp26j2quaotjza 10 20 of of IN work_dzeata5onzf7rp26j2quaotjza 10 21 defending defend VBG work_dzeata5onzf7rp26j2quaotjza 10 22 diverse diverse JJ work_dzeata5onzf7rp26j2quaotjza 10 23 sets set NNS work_dzeata5onzf7rp26j2quaotjza 10 24 of of IN work_dzeata5onzf7rp26j2quaotjza 10 25 components component NNS work_dzeata5onzf7rp26j2quaotjza 10 26 while while IN work_dzeata5onzf7rp26j2quaotjza 10 27 mitigating mitigate VBG work_dzeata5onzf7rp26j2quaotjza 10 28 a a DT work_dzeata5onzf7rp26j2quaotjza 10 29 wide wide JJ work_dzeata5onzf7rp26j2quaotjza 10 30 range range NN work_dzeata5onzf7rp26j2quaotjza 10 31 of of IN work_dzeata5onzf7rp26j2quaotjza 10 32 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 10 33 . . . work_dzeata5onzf7rp26j2quaotjza 11 1 Researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 11 2 consistently consistently RB work_dzeata5onzf7rp26j2quaotjza 11 3 make make VBP work_dzeata5onzf7rp26j2quaotjza 11 4 security security NN work_dzeata5onzf7rp26j2quaotjza 11 5 , , , work_dzeata5onzf7rp26j2quaotjza 11 6 performance performance NN work_dzeata5onzf7rp26j2quaotjza 11 7 , , , work_dzeata5onzf7rp26j2quaotjza 11 8 and and CC work_dzeata5onzf7rp26j2quaotjza 11 9 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 11 10 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 11 11 about about IN work_dzeata5onzf7rp26j2quaotjza 11 12 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 11 13 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 11 14 and and CC work_dzeata5onzf7rp26j2quaotjza 11 15 tend tend VBP work_dzeata5onzf7rp26j2quaotjza 11 16 to to TO work_dzeata5onzf7rp26j2quaotjza 11 17 narrowly narrowly RB work_dzeata5onzf7rp26j2quaotjza 11 18 define define VB work_dzeata5onzf7rp26j2quaotjza 11 19 the the DT work_dzeata5onzf7rp26j2quaotjza 11 20 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 11 21 to to TO work_dzeata5onzf7rp26j2quaotjza 11 22 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 11 23 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 11 24 can can MD work_dzeata5onzf7rp26j2quaotjza 11 25 be be VB work_dzeata5onzf7rp26j2quaotjza 11 26 evaluated evaluate VBN work_dzeata5onzf7rp26j2quaotjza 11 27 . . . work_dzeata5onzf7rp26j2quaotjza 12 1 Those those DT work_dzeata5onzf7rp26j2quaotjza 12 2 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 12 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 12 4 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 12 5 using use VBG work_dzeata5onzf7rp26j2quaotjza 12 6 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 12 7 - - JJ work_dzeata5onzf7rp26j2quaotjza 12 8 faceted faceted JJ work_dzeata5onzf7rp26j2quaotjza 12 9 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 12 10 spanning span VBG work_dzeata5onzf7rp26j2quaotjza 12 11 proof proof NN work_dzeata5onzf7rp26j2quaotjza 12 12 , , , work_dzeata5onzf7rp26j2quaotjza 12 13 analytical analytical JJ work_dzeata5onzf7rp26j2quaotjza 12 14 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 12 15 , , , work_dzeata5onzf7rp26j2quaotjza 12 16 benchmark benchmark NN work_dzeata5onzf7rp26j2quaotjza 12 17 suites suite NNS work_dzeata5onzf7rp26j2quaotjza 12 18 , , , work_dzeata5onzf7rp26j2quaotjza 12 19 case case NN work_dzeata5onzf7rp26j2quaotjza 12 20 studies study NNS work_dzeata5onzf7rp26j2quaotjza 12 21 , , , work_dzeata5onzf7rp26j2quaotjza 12 22 and and CC work_dzeata5onzf7rp26j2quaotjza 12 23 argumentation argumentation NN work_dzeata5onzf7rp26j2quaotjza 12 24 . . . work_dzeata5onzf7rp26j2quaotjza 13 1 However however RB work_dzeata5onzf7rp26j2quaotjza 13 2 , , , work_dzeata5onzf7rp26j2quaotjza 13 3 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 13 4 find find VBP work_dzeata5onzf7rp26j2quaotjza 13 5 two two CD work_dzeata5onzf7rp26j2quaotjza 13 6 cases case NNS work_dzeata5onzf7rp26j2quaotjza 13 7 for for IN work_dzeata5onzf7rp26j2quaotjza 13 8 improvement improvement NN work_dzeata5onzf7rp26j2quaotjza 13 9 : : : work_dzeata5onzf7rp26j2quaotjza 13 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 13 11 1 1 LS work_dzeata5onzf7rp26j2quaotjza 13 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 13 13 the the DT work_dzeata5onzf7rp26j2quaotjza 13 14 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 13 15 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 13 16 present present JJ work_dzeata5onzf7rp26j2quaotjza 13 17 are be VBP work_dzeata5onzf7rp26j2quaotjza 13 18 often often RB work_dzeata5onzf7rp26j2quaotjza 13 19 ad ad FW work_dzeata5onzf7rp26j2quaotjza 13 20 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 13 21 and and CC work_dzeata5onzf7rp26j2quaotjza 13 22 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 13 23 2 2 LS work_dzeata5onzf7rp26j2quaotjza 13 24 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 13 25 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 13 26 usability usability NN work_dzeata5onzf7rp26j2quaotjza 13 27 is be VBZ work_dzeata5onzf7rp26j2quaotjza 13 28 mostly mostly RB work_dzeata5onzf7rp26j2quaotjza 13 29 uncharted uncharted JJ work_dzeata5onzf7rp26j2quaotjza 13 30 territory territory NN work_dzeata5onzf7rp26j2quaotjza 13 31 . . . work_dzeata5onzf7rp26j2quaotjza 14 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 14 2 propose propose VBP work_dzeata5onzf7rp26j2quaotjza 14 3 ways way NNS work_dzeata5onzf7rp26j2quaotjza 14 4 to to IN work_dzeata5onzf7rp26j2quaotjza 14 5 structure structure NN work_dzeata5onzf7rp26j2quaotjza 14 6 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 14 7 to to TO work_dzeata5onzf7rp26j2quaotjza 14 8 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 14 9 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 14 10 fully fully RB work_dzeata5onzf7rp26j2quaotjza 14 11 support support VBP work_dzeata5onzf7rp26j2quaotjza 14 12 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 14 13 corresponding corresponding JJ work_dzeata5onzf7rp26j2quaotjza 14 14 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 14 15 and and CC work_dzeata5onzf7rp26j2quaotjza 14 16 suggest suggest VBP work_dzeata5onzf7rp26j2quaotjza 14 17 lightweight lightweight JJ work_dzeata5onzf7rp26j2quaotjza 14 18 means mean NNS work_dzeata5onzf7rp26j2quaotjza 14 19 of of IN work_dzeata5onzf7rp26j2quaotjza 14 20 evaluating evaluate VBG work_dzeata5onzf7rp26j2quaotjza 14 21 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 14 22 usability usability NN work_dzeata5onzf7rp26j2quaotjza 14 23 . . . work_dzeata5onzf7rp26j2quaotjza 15 1 Subjects Subjects NNPS work_dzeata5onzf7rp26j2quaotjza 15 2 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 15 3 and and CC work_dzeata5onzf7rp26j2quaotjza 15 4 Privacy Privacy NNP work_dzeata5onzf7rp26j2quaotjza 15 5 , , , work_dzeata5onzf7rp26j2quaotjza 15 6 Operating Operating NNP work_dzeata5onzf7rp26j2quaotjza 15 7 Systems Systems NNPS work_dzeata5onzf7rp26j2quaotjza 15 8 , , , work_dzeata5onzf7rp26j2quaotjza 15 9 Software Software NNP work_dzeata5onzf7rp26j2quaotjza 15 10 Engineering Engineering NNP work_dzeata5onzf7rp26j2quaotjza 15 11 Keywords Keywords NNPS work_dzeata5onzf7rp26j2quaotjza 15 12 Sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 15 13 , , , work_dzeata5onzf7rp26j2quaotjza 15 14 Qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 15 15 content content NN work_dzeata5onzf7rp26j2quaotjza 15 16 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 15 17 , , , work_dzeata5onzf7rp26j2quaotjza 15 18 Software software NN work_dzeata5onzf7rp26j2quaotjza 15 19 protection protection NN work_dzeata5onzf7rp26j2quaotjza 15 20 , , , work_dzeata5onzf7rp26j2quaotjza 15 21 Access access NN work_dzeata5onzf7rp26j2quaotjza 15 22 control control NN work_dzeata5onzf7rp26j2quaotjza 15 23 , , , work_dzeata5onzf7rp26j2quaotjza 15 24 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 15 25 , , , work_dzeata5onzf7rp26j2quaotjza 15 26 Security security NN work_dzeata5onzf7rp26j2quaotjza 15 27 validation validation NN work_dzeata5onzf7rp26j2quaotjza 15 28 INTRODUCTION introduction NN work_dzeata5onzf7rp26j2quaotjza 15 29 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 15 30 can can MD work_dzeata5onzf7rp26j2quaotjza 15 31 be be VB work_dzeata5onzf7rp26j2quaotjza 15 32 found find VBN work_dzeata5onzf7rp26j2quaotjza 15 33 where where WRB work_dzeata5onzf7rp26j2quaotjza 15 34 software software NN work_dzeata5onzf7rp26j2quaotjza 15 35 components component NNS work_dzeata5onzf7rp26j2quaotjza 15 36 must must MD work_dzeata5onzf7rp26j2quaotjza 15 37 be be VB work_dzeata5onzf7rp26j2quaotjza 15 38 used use VBN work_dzeata5onzf7rp26j2quaotjza 15 39 but but CC work_dzeata5onzf7rp26j2quaotjza 15 40 can can MD work_dzeata5onzf7rp26j2quaotjza 15 41 not not RB work_dzeata5onzf7rp26j2quaotjza 15 42 currently currently RB work_dzeata5onzf7rp26j2quaotjza 15 43 be be VB work_dzeata5onzf7rp26j2quaotjza 15 44 verified verify VBN work_dzeata5onzf7rp26j2quaotjza 15 45 or or CC work_dzeata5onzf7rp26j2quaotjza 15 46 trusted trust VBN work_dzeata5onzf7rp26j2quaotjza 15 47 . . . work_dzeata5onzf7rp26j2quaotjza 16 1 Sandboxed sandboxe VBN work_dzeata5onzf7rp26j2quaotjza 16 2 components component NNS work_dzeata5onzf7rp26j2quaotjza 16 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 16 4 often often RB work_dzeata5onzf7rp26j2quaotjza 16 5 feared fear VBN work_dzeata5onzf7rp26j2quaotjza 16 6 to to TO work_dzeata5onzf7rp26j2quaotjza 16 7 be be VB work_dzeata5onzf7rp26j2quaotjza 16 8 either either CC work_dzeata5onzf7rp26j2quaotjza 16 9 malicious malicious JJ work_dzeata5onzf7rp26j2quaotjza 16 10 or or CC work_dzeata5onzf7rp26j2quaotjza 16 11 vulnerable vulnerable JJ work_dzeata5onzf7rp26j2quaotjza 16 12 to to IN work_dzeata5onzf7rp26j2quaotjza 16 13 attack attack NN work_dzeata5onzf7rp26j2quaotjza 16 14 . . . work_dzeata5onzf7rp26j2quaotjza 17 1 For for IN work_dzeata5onzf7rp26j2quaotjza 17 2 example example NN work_dzeata5onzf7rp26j2quaotjza 17 3 , , , work_dzeata5onzf7rp26j2quaotjza 17 4 popular popular JJ work_dzeata5onzf7rp26j2quaotjza 17 5 browser browser NN work_dzeata5onzf7rp26j2quaotjza 17 6 engines engine NNS work_dzeata5onzf7rp26j2quaotjza 17 7 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 17 8 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 17 9 , , , work_dzeata5onzf7rp26j2quaotjza 17 10 Google Google NNP work_dzeata5onzf7rp26j2quaotjza 17 11 Chrome Chrome NNP work_dzeata5onzf7rp26j2quaotjza 17 12 and and CC work_dzeata5onzf7rp26j2quaotjza 17 13 Internet Internet NNP work_dzeata5onzf7rp26j2quaotjza 17 14 Explorer Explorer NNP work_dzeata5onzf7rp26j2quaotjza 17 15 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 17 16 , , , work_dzeata5onzf7rp26j2quaotjza 17 17 productivity productivity NN work_dzeata5onzf7rp26j2quaotjza 17 18 software software NN work_dzeata5onzf7rp26j2quaotjza 17 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 17 20 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 17 21 , , , work_dzeata5onzf7rp26j2quaotjza 17 22 Microsoft Microsoft NNP work_dzeata5onzf7rp26j2quaotjza 17 23 Word Word NNP work_dzeata5onzf7rp26j2quaotjza 17 24 and and CC work_dzeata5onzf7rp26j2quaotjza 17 25 Adobe Adobe NNP work_dzeata5onzf7rp26j2quaotjza 17 26 Reader Reader NNP work_dzeata5onzf7rp26j2quaotjza 17 27 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 17 28 , , , work_dzeata5onzf7rp26j2quaotjza 17 29 and and CC work_dzeata5onzf7rp26j2quaotjza 17 30 operating operating NN work_dzeata5onzf7rp26j2quaotjza 17 31 system system NN work_dzeata5onzf7rp26j2quaotjza 17 32 kernels kernel NNS work_dzeata5onzf7rp26j2quaotjza 17 33 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 17 34 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 17 35 , , , work_dzeata5onzf7rp26j2quaotjza 17 36 Windows Windows NNP work_dzeata5onzf7rp26j2quaotjza 17 37 8) 8) CD work_dzeata5onzf7rp26j2quaotjza 17 38 have have VBP work_dzeata5onzf7rp26j2quaotjza 17 39 all all DT work_dzeata5onzf7rp26j2quaotjza 17 40 been be VBN work_dzeata5onzf7rp26j2quaotjza 17 41 sandboxed sandboxe VBN work_dzeata5onzf7rp26j2quaotjza 17 42 to to IN work_dzeata5onzf7rp26j2quaotjza 17 43 varying vary VBG work_dzeata5onzf7rp26j2quaotjza 17 44 degrees degree NNS work_dzeata5onzf7rp26j2quaotjza 17 45 . . . work_dzeata5onzf7rp26j2quaotjza 18 1 Virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 18 2 machines machine NNS work_dzeata5onzf7rp26j2quaotjza 18 3 , , , work_dzeata5onzf7rp26j2quaotjza 18 4 which which WDT work_dzeata5onzf7rp26j2quaotjza 18 5 run run VBP work_dzeata5onzf7rp26j2quaotjza 18 6 software software NN work_dzeata5onzf7rp26j2quaotjza 18 7 on on IN work_dzeata5onzf7rp26j2quaotjza 18 8 simulated simulate VBN work_dzeata5onzf7rp26j2quaotjza 18 9 hardware hardware NN work_dzeata5onzf7rp26j2quaotjza 18 10 separate separate JJ work_dzeata5onzf7rp26j2quaotjza 18 11 from from IN work_dzeata5onzf7rp26j2quaotjza 18 12 the the DT work_dzeata5onzf7rp26j2quaotjza 18 13 rest rest NN work_dzeata5onzf7rp26j2quaotjza 18 14 of of IN work_dzeata5onzf7rp26j2quaotjza 18 15 the the DT work_dzeata5onzf7rp26j2quaotjza 18 16 How how WRB work_dzeata5onzf7rp26j2quaotjza 18 17 to to TO work_dzeata5onzf7rp26j2quaotjza 18 18 cite cite VB work_dzeata5onzf7rp26j2quaotjza 18 19 this this DT work_dzeata5onzf7rp26j2quaotjza 18 20 article article NN work_dzeata5onzf7rp26j2quaotjza 18 21 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 18 22 et et NNP work_dzeata5onzf7rp26j2quaotjza 18 23 al al NNP work_dzeata5onzf7rp26j2quaotjza 18 24 . . . work_dzeata5onzf7rp26j2quaotjza 19 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 19 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 19 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 19 4 , , , work_dzeata5onzf7rp26j2quaotjza 19 5 A a DT work_dzeata5onzf7rp26j2quaotjza 19 6 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 19 7 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 19 8 of of IN work_dzeata5onzf7rp26j2quaotjza 19 9 the the DT work_dzeata5onzf7rp26j2quaotjza 19 10 science science NN work_dzeata5onzf7rp26j2quaotjza 19 11 of of IN work_dzeata5onzf7rp26j2quaotjza 19 12 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 19 13 . . . work_dzeata5onzf7rp26j2quaotjza 20 1 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 20 2 Comput comput NN work_dzeata5onzf7rp26j2quaotjza 20 3 . . . work_dzeata5onzf7rp26j2quaotjza 21 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 21 2 . . . work_dzeata5onzf7rp26j2quaotjza 22 1 2 2 LS work_dzeata5onzf7rp26j2quaotjza 22 2 : : : work_dzeata5onzf7rp26j2quaotjza 22 3 e43 e43 XX work_dzeata5onzf7rp26j2quaotjza 22 4 ; ; : work_dzeata5onzf7rp26j2quaotjza 22 5 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 22 6 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 22 7 / / SYM work_dzeata5onzf7rp26j2quaotjza 22 8 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 22 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 22 10 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 22 11 mailto:mmaass@andrew.cmu.edu mailto:mmaass@andrew.cmu.edu CD work_dzeata5onzf7rp26j2quaotjza 22 12 https://peerj.com/academic-boards/editors/ https://peerj.com/academic-boards/editors/ NNP work_dzeata5onzf7rp26j2quaotjza 22 13 https://peerj.com/academic-boards/editors/ https://peerj.com/academic-boards/editors/ NNP work_dzeata5onzf7rp26j2quaotjza 22 14 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 22 15 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 UH work_dzeata5onzf7rp26j2quaotjza 22 16 http://creativecommons.org/licenses/by/4.0/ http://creativecommons.org/licenses/by/4.0/ -LRB- work_dzeata5onzf7rp26j2quaotjza 22 17 http://creativecommons.org/licenses/by/4.0/ http://creativecommons.org/licenses/by/4.0/ NNP work_dzeata5onzf7rp26j2quaotjza 22 18 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 22 19 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 22 20 host host NN work_dzeata5onzf7rp26j2quaotjza 22 21 system system NN work_dzeata5onzf7rp26j2quaotjza 22 22 , , , work_dzeata5onzf7rp26j2quaotjza 22 23 are be VBP work_dzeata5onzf7rp26j2quaotjza 22 24 commonly commonly RB work_dzeata5onzf7rp26j2quaotjza 22 25 used use VBN work_dzeata5onzf7rp26j2quaotjza 22 26 in in IN work_dzeata5onzf7rp26j2quaotjza 22 27 malware malware JJ work_dzeata5onzf7rp26j2quaotjza 22 28 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 22 29 to to TO work_dzeata5onzf7rp26j2quaotjza 22 30 contain contain VB work_dzeata5onzf7rp26j2quaotjza 22 31 malicious malicious JJ work_dzeata5onzf7rp26j2quaotjza 22 32 computations computation NNS work_dzeata5onzf7rp26j2quaotjza 22 33 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 22 34 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 22 35 , , , work_dzeata5onzf7rp26j2quaotjza 22 36 Cuckoo Cuckoo NNP work_dzeata5onzf7rp26j2quaotjza 22 37 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 22 38 and and CC work_dzeata5onzf7rp26j2quaotjza 22 39 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 22 40 are be VBP work_dzeata5onzf7rp26j2quaotjza 22 41 used use VBN work_dzeata5onzf7rp26j2quaotjza 22 42 in in IN work_dzeata5onzf7rp26j2quaotjza 22 43 mobile mobile JJ work_dzeata5onzf7rp26j2quaotjza 22 44 ecosystems ecosystem NNS work_dzeata5onzf7rp26j2quaotjza 22 45 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 22 46 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 22 47 , , , work_dzeata5onzf7rp26j2quaotjza 22 48 Android Android NNP work_dzeata5onzf7rp26j2quaotjza 22 49 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 22 50 to to TO work_dzeata5onzf7rp26j2quaotjza 22 51 limit limit VB work_dzeata5onzf7rp26j2quaotjza 22 52 the the DT work_dzeata5onzf7rp26j2quaotjza 22 53 havoc havoc NN work_dzeata5onzf7rp26j2quaotjza 22 54 malicious malicious JJ work_dzeata5onzf7rp26j2quaotjza 22 55 applications application NNS work_dzeata5onzf7rp26j2quaotjza 22 56 can can MD work_dzeata5onzf7rp26j2quaotjza 22 57 wreak wreak VB work_dzeata5onzf7rp26j2quaotjza 22 58 on on IN work_dzeata5onzf7rp26j2quaotjza 22 59 a a DT work_dzeata5onzf7rp26j2quaotjza 22 60 device device NN work_dzeata5onzf7rp26j2quaotjza 22 61 . . . work_dzeata5onzf7rp26j2quaotjza 23 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 23 2 provide provide VBP work_dzeata5onzf7rp26j2quaotjza 23 3 some some DT work_dzeata5onzf7rp26j2quaotjza 23 4 salvation salvation NN work_dzeata5onzf7rp26j2quaotjza 23 5 in in IN work_dzeata5onzf7rp26j2quaotjza 23 6 a a DT work_dzeata5onzf7rp26j2quaotjza 23 7 world world NN work_dzeata5onzf7rp26j2quaotjza 23 8 full full JJ work_dzeata5onzf7rp26j2quaotjza 23 9 of of IN work_dzeata5onzf7rp26j2quaotjza 23 10 complex complex JJ work_dzeata5onzf7rp26j2quaotjza 23 11 components component NNS work_dzeata5onzf7rp26j2quaotjza 23 12 : : : work_dzeata5onzf7rp26j2quaotjza 23 13 instead instead RB work_dzeata5onzf7rp26j2quaotjza 23 14 of of IN work_dzeata5onzf7rp26j2quaotjza 23 15 vetting vet VBG work_dzeata5onzf7rp26j2quaotjza 23 16 intractably intractably RB work_dzeata5onzf7rp26j2quaotjza 23 17 enigmatic enigmatic JJ work_dzeata5onzf7rp26j2quaotjza 23 18 software software NN work_dzeata5onzf7rp26j2quaotjza 23 19 systems system NNS work_dzeata5onzf7rp26j2quaotjza 23 20 , , , work_dzeata5onzf7rp26j2quaotjza 23 21 sandbox sandbox VB work_dzeata5onzf7rp26j2quaotjza 23 22 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 23 23 and and CC work_dzeata5onzf7rp26j2quaotjza 23 24 vet vet VBP work_dzeata5onzf7rp26j2quaotjza 23 25 the the DT work_dzeata5onzf7rp26j2quaotjza 23 26 relatively relatively RB work_dzeata5onzf7rp26j2quaotjza 23 27 simple simple JJ work_dzeata5onzf7rp26j2quaotjza 23 28 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 23 29 . . . work_dzeata5onzf7rp26j2quaotjza 24 1 What what WP work_dzeata5onzf7rp26j2quaotjza 24 2 else else RB work_dzeata5onzf7rp26j2quaotjza 24 3 do do VBP work_dzeata5onzf7rp26j2quaotjza 24 4 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 24 5 in in IN work_dzeata5onzf7rp26j2quaotjza 24 6 mainstream mainstream JJ work_dzeata5onzf7rp26j2quaotjza 24 7 use use NN work_dzeata5onzf7rp26j2quaotjza 24 8 have have VBP work_dzeata5onzf7rp26j2quaotjza 24 9 in in IN work_dzeata5onzf7rp26j2quaotjza 24 10 common common JJ work_dzeata5onzf7rp26j2quaotjza 24 11 ? ? . work_dzeata5onzf7rp26j2quaotjza 25 1 They -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 25 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 25 3 largely largely RB work_dzeata5onzf7rp26j2quaotjza 25 4 dependent dependent JJ work_dzeata5onzf7rp26j2quaotjza 25 5 on on IN work_dzeata5onzf7rp26j2quaotjza 25 6 relatively relatively RB work_dzeata5onzf7rp26j2quaotjza 25 7 easily easily RB work_dzeata5onzf7rp26j2quaotjza 25 8 composed compose VBN work_dzeata5onzf7rp26j2quaotjza 25 9 coarse coarse RB work_dzeata5onzf7rp26j2quaotjza 25 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 25 11 grained grain VBN work_dzeata5onzf7rp26j2quaotjza 25 12 operating operating NN work_dzeata5onzf7rp26j2quaotjza 25 13 system system NN work_dzeata5onzf7rp26j2quaotjza 25 14 features feature NNS work_dzeata5onzf7rp26j2quaotjza 25 15 , , , work_dzeata5onzf7rp26j2quaotjza 25 16 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 25 17 are be VBP work_dzeata5onzf7rp26j2quaotjza 25 18 essentially essentially RB work_dzeata5onzf7rp26j2quaotjza 25 19 transparent transparent JJ work_dzeata5onzf7rp26j2quaotjza 25 20 to to IN work_dzeata5onzf7rp26j2quaotjza 25 21 the the DT work_dzeata5onzf7rp26j2quaotjza 25 22 users user NNS work_dzeata5onzf7rp26j2quaotjza 25 23 of of IN work_dzeata5onzf7rp26j2quaotjza 25 24 sandboxed sandboxed JJ work_dzeata5onzf7rp26j2quaotjza 25 25 components component NNS work_dzeata5onzf7rp26j2quaotjza 25 26 , , , work_dzeata5onzf7rp26j2quaotjza 25 27 and and CC work_dzeata5onzf7rp26j2quaotjza 25 28 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 25 29 make make VBP work_dzeata5onzf7rp26j2quaotjza 25 30 little little JJ work_dzeata5onzf7rp26j2quaotjza 25 31 use use NN work_dzeata5onzf7rp26j2quaotjza 25 32 of of IN work_dzeata5onzf7rp26j2quaotjza 25 33 decades decade NNS work_dzeata5onzf7rp26j2quaotjza 25 34 worth worth NN work_dzeata5onzf7rp26j2quaotjza 25 35 of of IN work_dzeata5onzf7rp26j2quaotjza 25 36 research research NN work_dzeata5onzf7rp26j2quaotjza 25 37 produced produce VBN work_dzeata5onzf7rp26j2quaotjza 25 38 within within IN work_dzeata5onzf7rp26j2quaotjza 25 39 the the DT work_dzeata5onzf7rp26j2quaotjza 25 40 domain domain NN work_dzeata5onzf7rp26j2quaotjza 25 41 of of IN work_dzeata5onzf7rp26j2quaotjza 25 42 software software NN work_dzeata5onzf7rp26j2quaotjza 25 43 security security NN work_dzeata5onzf7rp26j2quaotjza 25 44 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 25 45 . . . work_dzeata5onzf7rp26j2quaotjza 26 1 Researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 26 2 have have VBP work_dzeata5onzf7rp26j2quaotjza 26 3 spent spend VBN work_dzeata5onzf7rp26j2quaotjza 26 4 the the DT work_dzeata5onzf7rp26j2quaotjza 26 5 last last JJ work_dzeata5onzf7rp26j2quaotjza 26 6 several several JJ work_dzeata5onzf7rp26j2quaotjza 26 7 decades decade NNS work_dzeata5onzf7rp26j2quaotjza 26 8 building building NN work_dzeata5onzf7rp26j2quaotjza 26 9 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 26 10 capable capable JJ work_dzeata5onzf7rp26j2quaotjza 26 11 of of IN work_dzeata5onzf7rp26j2quaotjza 26 12 containing contain VBG work_dzeata5onzf7rp26j2quaotjza 26 13 computations computation NNS work_dzeata5onzf7rp26j2quaotjza 26 14 ranging range VBG work_dzeata5onzf7rp26j2quaotjza 26 15 from from IN work_dzeata5onzf7rp26j2quaotjza 26 16 fully fully RB work_dzeata5onzf7rp26j2quaotjza 26 17 featured feature VBN work_dzeata5onzf7rp26j2quaotjza 26 18 desktop desktop NN work_dzeata5onzf7rp26j2quaotjza 26 19 applications application NNS work_dzeata5onzf7rp26j2quaotjza 26 20 to to IN work_dzeata5onzf7rp26j2quaotjza 26 21 subsets subset NNS work_dzeata5onzf7rp26j2quaotjza 26 22 of of IN work_dzeata5onzf7rp26j2quaotjza 26 23 nearly nearly RB work_dzeata5onzf7rp26j2quaotjza 26 24 every every DT work_dzeata5onzf7rp26j2quaotjza 26 25 kind kind NN work_dzeata5onzf7rp26j2quaotjza 26 26 of of IN work_dzeata5onzf7rp26j2quaotjza 26 27 application application NN work_dzeata5onzf7rp26j2quaotjza 26 28 in in IN work_dzeata5onzf7rp26j2quaotjza 26 29 existence existence NN work_dzeata5onzf7rp26j2quaotjza 26 30 , , , work_dzeata5onzf7rp26j2quaotjza 26 31 from from IN work_dzeata5onzf7rp26j2quaotjza 26 32 third third JJ work_dzeata5onzf7rp26j2quaotjza 26 33 party party NN work_dzeata5onzf7rp26j2quaotjza 26 34 libraries library NNS work_dzeata5onzf7rp26j2quaotjza 26 35 in in IN work_dzeata5onzf7rp26j2quaotjza 26 36 Java Java NNP work_dzeata5onzf7rp26j2quaotjza 26 37 programs program NNS work_dzeata5onzf7rp26j2quaotjza 26 38 to to IN work_dzeata5onzf7rp26j2quaotjza 26 39 ads ad NNS work_dzeata5onzf7rp26j2quaotjza 26 40 on on IN work_dzeata5onzf7rp26j2quaotjza 26 41 web web NN work_dzeata5onzf7rp26j2quaotjza 26 42 sites site NNS work_dzeata5onzf7rp26j2quaotjza 26 43 . . . work_dzeata5onzf7rp26j2quaotjza 27 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 27 2 have have VBP work_dzeata5onzf7rp26j2quaotjza 27 3 been be VBN work_dzeata5onzf7rp26j2quaotjza 27 4 built build VBN work_dzeata5onzf7rp26j2quaotjza 27 5 to to TO work_dzeata5onzf7rp26j2quaotjza 27 6 stop stop VB work_dzeata5onzf7rp26j2quaotjza 27 7 memory memory NN work_dzeata5onzf7rp26j2quaotjza 27 8 corruption corruption NN work_dzeata5onzf7rp26j2quaotjza 27 9 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 27 10 , , , work_dzeata5onzf7rp26j2quaotjza 27 11 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 27 12 control- control- JJ work_dzeata5onzf7rp26j2quaotjza 27 13 and and CC work_dzeata5onzf7rp26j2quaotjza 27 14 data data NN work_dzeata5onzf7rp26j2quaotjza 27 15 - - HYPH work_dzeata5onzf7rp26j2quaotjza 27 16 flow flow NN work_dzeata5onzf7rp26j2quaotjza 27 17 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 27 18 , , , work_dzeata5onzf7rp26j2quaotjza 27 19 enforce enforce VB work_dzeata5onzf7rp26j2quaotjza 27 20 information information NN work_dzeata5onzf7rp26j2quaotjza 27 21 flow flow NN work_dzeata5onzf7rp26j2quaotjza 27 22 constraints constraint NNS work_dzeata5onzf7rp26j2quaotjza 27 23 , , , work_dzeata5onzf7rp26j2quaotjza 27 24 introduce introduce VB work_dzeata5onzf7rp26j2quaotjza 27 25 diversity diversity NN work_dzeata5onzf7rp26j2quaotjza 27 26 where where WRB work_dzeata5onzf7rp26j2quaotjza 27 27 monocultures monoculture NNS work_dzeata5onzf7rp26j2quaotjza 27 28 previously previously RB work_dzeata5onzf7rp26j2quaotjza 27 29 existed exist VBD work_dzeata5onzf7rp26j2quaotjza 27 30 , , , work_dzeata5onzf7rp26j2quaotjza 27 31 and and CC work_dzeata5onzf7rp26j2quaotjza 27 32 much much RB work_dzeata5onzf7rp26j2quaotjza 27 33 more more JJR work_dzeata5onzf7rp26j2quaotjza 27 34 . . . work_dzeata5onzf7rp26j2quaotjza 28 1 What what WP work_dzeata5onzf7rp26j2quaotjza 28 2 more more JJR work_dzeata5onzf7rp26j2quaotjza 28 3 can can MD work_dzeata5onzf7rp26j2quaotjza 28 4 the the DT work_dzeata5onzf7rp26j2quaotjza 28 5 community community NN work_dzeata5onzf7rp26j2quaotjza 28 6 do do VB work_dzeata5onzf7rp26j2quaotjza 28 7 to to TO work_dzeata5onzf7rp26j2quaotjza 28 8 bring bring VB work_dzeata5onzf7rp26j2quaotjza 28 9 value value NN work_dzeata5onzf7rp26j2quaotjza 28 10 ? ? . work_dzeata5onzf7rp26j2quaotjza 29 1 In in IN work_dzeata5onzf7rp26j2quaotjza 29 2 this this DT work_dzeata5onzf7rp26j2quaotjza 29 3 paper paper NN work_dzeata5onzf7rp26j2quaotjza 29 4 , , , work_dzeata5onzf7rp26j2quaotjza 29 5 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 29 6 use use VBP work_dzeata5onzf7rp26j2quaotjza 29 7 multidisciplinary multidisciplinary JJ work_dzeata5onzf7rp26j2quaotjza 29 8 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 29 9 from from IN work_dzeata5onzf7rp26j2quaotjza 29 10 software software NN work_dzeata5onzf7rp26j2quaotjza 29 11 engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 29 12 , , , work_dzeata5onzf7rp26j2quaotjza 29 13 statistics statistic NNS work_dzeata5onzf7rp26j2quaotjza 29 14 , , , work_dzeata5onzf7rp26j2quaotjza 29 15 the the DT work_dzeata5onzf7rp26j2quaotjza 29 16 social social JJ work_dzeata5onzf7rp26j2quaotjza 29 17 sciences sciences NNPS work_dzeata5onzf7rp26j2quaotjza 29 18 , , , work_dzeata5onzf7rp26j2quaotjza 29 19 and and CC work_dzeata5onzf7rp26j2quaotjza 29 20 graph graph NN work_dzeata5onzf7rp26j2quaotjza 29 21 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 29 22 to to TO work_dzeata5onzf7rp26j2quaotjza 29 23 systematically systematically RB work_dzeata5onzf7rp26j2quaotjza 29 24 analyze analyze VB work_dzeata5onzf7rp26j2quaotjza 29 25 the the DT work_dzeata5onzf7rp26j2quaotjza 29 26 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 29 27 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 29 28 as as IN work_dzeata5onzf7rp26j2quaotjza 29 29 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 29 30 is be VBZ work_dzeata5onzf7rp26j2quaotjza 29 31 reflected reflect VBN work_dzeata5onzf7rp26j2quaotjza 29 32 by by IN work_dzeata5onzf7rp26j2quaotjza 29 33 five five CD work_dzeata5onzf7rp26j2quaotjza 29 34 top top JJ work_dzeata5onzf7rp26j2quaotjza 29 35 - - HYPH work_dzeata5onzf7rp26j2quaotjza 29 36 tier tier NN work_dzeata5onzf7rp26j2quaotjza 29 37 security security NN work_dzeata5onzf7rp26j2quaotjza 29 38 and and CC work_dzeata5onzf7rp26j2quaotjza 29 39 systems system NNS work_dzeata5onzf7rp26j2quaotjza 29 40 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 29 41 . . . work_dzeata5onzf7rp26j2quaotjza 30 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 30 2 aim aim VBP work_dzeata5onzf7rp26j2quaotjza 30 3 to to TO work_dzeata5onzf7rp26j2quaotjza 30 4 answer answer VB work_dzeata5onzf7rp26j2quaotjza 30 5 questions question NNS work_dzeata5onzf7rp26j2quaotjza 30 6 about about IN work_dzeata5onzf7rp26j2quaotjza 30 7 what what WP work_dzeata5onzf7rp26j2quaotjza 30 8 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 30 9 can can MD work_dzeata5onzf7rp26j2quaotjza 30 10 already already RB work_dzeata5onzf7rp26j2quaotjza 30 11 do do VB work_dzeata5onzf7rp26j2quaotjza 30 12 , , , work_dzeata5onzf7rp26j2quaotjza 30 13 how how WRB work_dzeata5onzf7rp26j2quaotjza 30 14 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 30 15 do do VBP work_dzeata5onzf7rp26j2quaotjza 30 16 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 30 17 , , , work_dzeata5onzf7rp26j2quaotjza 30 18 what what WP work_dzeata5onzf7rp26j2quaotjza 30 19 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 30 20 takes take VBZ work_dzeata5onzf7rp26j2quaotjza 30 21 to to TO work_dzeata5onzf7rp26j2quaotjza 30 22 use use VB work_dzeata5onzf7rp26j2quaotjza 30 23 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 30 24 , , , work_dzeata5onzf7rp26j2quaotjza 30 25 what what WP work_dzeata5onzf7rp26j2quaotjza 30 26 claims claim VBZ work_dzeata5onzf7rp26j2quaotjza 30 27 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 30 28 inventors inventor NNS work_dzeata5onzf7rp26j2quaotjza 30 29 make make VBP work_dzeata5onzf7rp26j2quaotjza 30 30 about about IN work_dzeata5onzf7rp26j2quaotjza 30 31 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 30 32 creations creation NNS work_dzeata5onzf7rp26j2quaotjza 30 33 , , , work_dzeata5onzf7rp26j2quaotjza 30 34 and and CC work_dzeata5onzf7rp26j2quaotjza 30 35 how how WRB work_dzeata5onzf7rp26j2quaotjza 30 36 those those DT work_dzeata5onzf7rp26j2quaotjza 30 37 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 30 38 are be VBP work_dzeata5onzf7rp26j2quaotjza 30 39 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 30 40 . . . work_dzeata5onzf7rp26j2quaotjza 31 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 31 2 identify identify VBP work_dzeata5onzf7rp26j2quaotjza 31 3 and and CC work_dzeata5onzf7rp26j2quaotjza 31 4 resolve resolve VB work_dzeata5onzf7rp26j2quaotjza 31 5 ambiguity ambiguity NN work_dzeata5onzf7rp26j2quaotjza 31 6 in in IN work_dzeata5onzf7rp26j2quaotjza 31 7 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 31 8 for for IN work_dzeata5onzf7rp26j2quaotjza 31 9 “ " `` work_dzeata5onzf7rp26j2quaotjza 31 10 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 31 11 ” " '' work_dzeata5onzf7rp26j2quaotjza 31 12 , , , work_dzeata5onzf7rp26j2quaotjza 31 13 systematize systematize VB work_dzeata5onzf7rp26j2quaotjza 31 14 ten ten CD work_dzeata5onzf7rp26j2quaotjza 31 15 years year NNS work_dzeata5onzf7rp26j2quaotjza 31 16 of of IN work_dzeata5onzf7rp26j2quaotjza 31 17 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 31 18 research research NN work_dzeata5onzf7rp26j2quaotjza 31 19 , , , work_dzeata5onzf7rp26j2quaotjza 31 20 and and CC work_dzeata5onzf7rp26j2quaotjza 31 21 point point VB work_dzeata5onzf7rp26j2quaotjza 31 22 out out RP work_dzeata5onzf7rp26j2quaotjza 31 23 gaps gap NNS work_dzeata5onzf7rp26j2quaotjza 31 24 in in IN work_dzeata5onzf7rp26j2quaotjza 31 25 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 31 26 current current JJ work_dzeata5onzf7rp26j2quaotjza 31 27 practices practice NNS work_dzeata5onzf7rp26j2quaotjza 31 28 and and CC work_dzeata5onzf7rp26j2quaotjza 31 29 propose propose VB work_dzeata5onzf7rp26j2quaotjza 31 30 ways way NNS work_dzeata5onzf7rp26j2quaotjza 31 31 forward forward RB work_dzeata5onzf7rp26j2quaotjza 31 32 in in IN work_dzeata5onzf7rp26j2quaotjza 31 33 resolving resolve VBG work_dzeata5onzf7rp26j2quaotjza 31 34 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 31 35 . . . work_dzeata5onzf7rp26j2quaotjza 32 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 32 2 contribute contribute VBP work_dzeata5onzf7rp26j2quaotjza 32 3 the the DT work_dzeata5onzf7rp26j2quaotjza 32 4 following following NN work_dzeata5onzf7rp26j2quaotjza 32 5 : : : work_dzeata5onzf7rp26j2quaotjza 32 6 • • VB work_dzeata5onzf7rp26j2quaotjza 32 7 A a DT work_dzeata5onzf7rp26j2quaotjza 32 8 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 32 9 - - JJ work_dzeata5onzf7rp26j2quaotjza 32 10 disciplinary disciplinary JJ work_dzeata5onzf7rp26j2quaotjza 32 11 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 32 12 for for IN work_dzeata5onzf7rp26j2quaotjza 32 13 systematically systematically RB work_dzeata5onzf7rp26j2quaotjza 32 14 analyzing analyze VBG work_dzeata5onzf7rp26j2quaotjza 32 15 the the DT work_dzeata5onzf7rp26j2quaotjza 32 16 state state NN work_dzeata5onzf7rp26j2quaotjza 32 17 of of IN work_dzeata5onzf7rp26j2quaotjza 32 18 practice practice NN work_dzeata5onzf7rp26j2quaotjza 32 19 in in IN work_dzeata5onzf7rp26j2quaotjza 32 20 a a DT work_dzeata5onzf7rp26j2quaotjza 32 21 research research NN work_dzeata5onzf7rp26j2quaotjza 32 22 domain domain NN work_dzeata5onzf7rp26j2quaotjza 32 23 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 32 24 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 32 25 Methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 32 26 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 32 27 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 32 28 . . . work_dzeata5onzf7rp26j2quaotjza 33 1 • • VB work_dzeata5onzf7rp26j2quaotjza 33 2 The the DT work_dzeata5onzf7rp26j2quaotjza 33 3 first first JJ work_dzeata5onzf7rp26j2quaotjza 33 4 concise concise NN work_dzeata5onzf7rp26j2quaotjza 33 5 definition definition NN work_dzeata5onzf7rp26j2quaotjza 33 6 for for IN work_dzeata5onzf7rp26j2quaotjza 33 7 “ " `` work_dzeata5onzf7rp26j2quaotjza 33 8 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 33 9 ” " '' work_dzeata5onzf7rp26j2quaotjza 33 10 that that WDT work_dzeata5onzf7rp26j2quaotjza 33 11 consistently consistently RB work_dzeata5onzf7rp26j2quaotjza 33 12 describes describe VBZ work_dzeata5onzf7rp26j2quaotjza 33 13 research research NN work_dzeata5onzf7rp26j2quaotjza 33 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 33 15 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 33 16 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 33 17 What what WP work_dzeata5onzf7rp26j2quaotjza 33 18 is be VBZ work_dzeata5onzf7rp26j2quaotjza 33 19 a a DT work_dzeata5onzf7rp26j2quaotjza 33 20 Sandbox Sandbox NNP work_dzeata5onzf7rp26j2quaotjza 33 21 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 33 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 33 23 . . . work_dzeata5onzf7rp26j2quaotjza 34 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 34 2 Systemization systemization NN work_dzeata5onzf7rp26j2quaotjza 34 3 of of IN work_dzeata5onzf7rp26j2quaotjza 34 4 the the DT work_dzeata5onzf7rp26j2quaotjza 34 5 research research NN work_dzeata5onzf7rp26j2quaotjza 34 6 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 34 7 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 34 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 34 9 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 34 10 Results result NNS work_dzeata5onzf7rp26j2quaotjza 34 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 34 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 34 13 . . . work_dzeata5onzf7rp26j2quaotjza 35 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 35 2 Identification identification NN work_dzeata5onzf7rp26j2quaotjza 35 3 of of IN work_dzeata5onzf7rp26j2quaotjza 35 4 and and CC work_dzeata5onzf7rp26j2quaotjza 35 5 proposed propose VBN work_dzeata5onzf7rp26j2quaotjza 35 6 solutions solution NNS work_dzeata5onzf7rp26j2quaotjza 35 7 to to IN work_dzeata5onzf7rp26j2quaotjza 35 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 35 9 1 1 LS work_dzeata5onzf7rp26j2quaotjza 35 10 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 35 11 an an DT work_dzeata5onzf7rp26j2quaotjza 35 12 over over IN work_dzeata5onzf7rp26j2quaotjza 35 13 - - HYPH work_dzeata5onzf7rp26j2quaotjza 35 14 reliance reliance NN work_dzeata5onzf7rp26j2quaotjza 35 15 on on IN work_dzeata5onzf7rp26j2quaotjza 35 16 ad ad FW work_dzeata5onzf7rp26j2quaotjza 35 17 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 35 18 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 35 19 for for IN work_dzeata5onzf7rp26j2quaotjza 35 20 security security NN work_dzeata5onzf7rp26j2quaotjza 35 21 validation validation NN work_dzeata5onzf7rp26j2quaotjza 35 22 and and CC work_dzeata5onzf7rp26j2quaotjza 35 23 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 35 24 2 2 LS work_dzeata5onzf7rp26j2quaotjza 35 25 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 35 26 the the DT work_dzeata5onzf7rp26j2quaotjza 35 27 neglect neglect NN work_dzeata5onzf7rp26j2quaotjza 35 28 of of IN work_dzeata5onzf7rp26j2quaotjza 35 29 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 35 30 and and CC work_dzeata5onzf7rp26j2quaotjza 35 31 policy policy NN work_dzeata5onzf7rp26j2quaotjza 35 32 usability usability NN work_dzeata5onzf7rp26j2quaotjza 35 33 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 35 34 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 35 35 Strengthening strengthen VBG work_dzeata5onzf7rp26j2quaotjza 35 36 Sandboxing Sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 35 37 Results Results NNPS work_dzeata5onzf7rp26j2quaotjza 35 38 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 35 39 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 35 40 . . . work_dzeata5onzf7rp26j2quaotjza 36 1 WHAT what WP work_dzeata5onzf7rp26j2quaotjza 36 2 IS be VBZ work_dzeata5onzf7rp26j2quaotjza 36 3 A a DT work_dzeata5onzf7rp26j2quaotjza 36 4 SANDBOX sandbox NN work_dzeata5onzf7rp26j2quaotjza 36 5 ? ? . work_dzeata5onzf7rp26j2quaotjza 37 1 In in IN work_dzeata5onzf7rp26j2quaotjza 37 2 order order NN work_dzeata5onzf7rp26j2quaotjza 37 3 to to TO work_dzeata5onzf7rp26j2quaotjza 37 4 systematically systematically RB work_dzeata5onzf7rp26j2quaotjza 37 5 analyze analyze VB work_dzeata5onzf7rp26j2quaotjza 37 6 the the DT work_dzeata5onzf7rp26j2quaotjza 37 7 “ " `` work_dzeata5onzf7rp26j2quaotjza 37 8 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 37 9 ” " '' work_dzeata5onzf7rp26j2quaotjza 37 10 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 37 11 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 37 12 need need VBP work_dzeata5onzf7rp26j2quaotjza 37 13 to to TO work_dzeata5onzf7rp26j2quaotjza 37 14 clarify clarify VB work_dzeata5onzf7rp26j2quaotjza 37 15 the the DT work_dzeata5onzf7rp26j2quaotjza 37 16 meaning meaning NN work_dzeata5onzf7rp26j2quaotjza 37 17 of of IN work_dzeata5onzf7rp26j2quaotjza 37 18 the the DT work_dzeata5onzf7rp26j2quaotjza 37 19 term term NN work_dzeata5onzf7rp26j2quaotjza 37 20 . . . work_dzeata5onzf7rp26j2quaotjza 38 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 38 2 reviewed review VBD work_dzeata5onzf7rp26j2quaotjza 38 3 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 38 4 used use VBN work_dzeata5onzf7rp26j2quaotjza 38 5 by by IN work_dzeata5onzf7rp26j2quaotjza 38 6 practitioners practitioner NNS work_dzeata5onzf7rp26j2quaotjza 38 7 and and CC work_dzeata5onzf7rp26j2quaotjza 38 8 in in IN work_dzeata5onzf7rp26j2quaotjza 38 9 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 38 10 within within IN work_dzeata5onzf7rp26j2quaotjza 38 11 the the DT work_dzeata5onzf7rp26j2quaotjza 38 12 field field NN work_dzeata5onzf7rp26j2quaotjza 38 13 , , , work_dzeata5onzf7rp26j2quaotjza 38 14 both both CC work_dzeata5onzf7rp26j2quaotjza 38 15 in in IN work_dzeata5onzf7rp26j2quaotjza 38 16 the the DT work_dzeata5onzf7rp26j2quaotjza 38 17 substance substance NN work_dzeata5onzf7rp26j2quaotjza 38 18 of of IN work_dzeata5onzf7rp26j2quaotjza 38 19 the the DT work_dzeata5onzf7rp26j2quaotjza 38 20 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 38 21 and and CC work_dzeata5onzf7rp26j2quaotjza 38 22 in in IN work_dzeata5onzf7rp26j2quaotjza 38 23 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 38 24 quality quality NN work_dzeata5onzf7rp26j2quaotjza 38 25 as as IN work_dzeata5onzf7rp26j2quaotjza 38 26 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 38 27 . . . work_dzeata5onzf7rp26j2quaotjza 39 1 This this DT work_dzeata5onzf7rp26j2quaotjza 39 2 section section NN work_dzeata5onzf7rp26j2quaotjza 39 3 reviews review VBZ work_dzeata5onzf7rp26j2quaotjza 39 4 those those DT work_dzeata5onzf7rp26j2quaotjza 39 5 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 39 6 and and CC work_dzeata5onzf7rp26j2quaotjza 39 7 establishes establish VBZ work_dzeata5onzf7rp26j2quaotjza 39 8 a a DT work_dzeata5onzf7rp26j2quaotjza 39 9 definition definition NN work_dzeata5onzf7rp26j2quaotjza 39 10 for for IN work_dzeata5onzf7rp26j2quaotjza 39 11 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 39 12 use use NN work_dzeata5onzf7rp26j2quaotjza 39 13 here here RB work_dzeata5onzf7rp26j2quaotjza 39 14 , , , work_dzeata5onzf7rp26j2quaotjza 39 15 which which WDT work_dzeata5onzf7rp26j2quaotjza 39 16 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 39 17 advance advance VBP work_dzeata5onzf7rp26j2quaotjza 39 18 as as IN work_dzeata5onzf7rp26j2quaotjza 39 19 an an DT work_dzeata5onzf7rp26j2quaotjza 39 20 improved improved JJ work_dzeata5onzf7rp26j2quaotjza 39 21 definition definition NN work_dzeata5onzf7rp26j2quaotjza 39 22 for for IN work_dzeata5onzf7rp26j2quaotjza 39 23 the the DT work_dzeata5onzf7rp26j2quaotjza 39 24 field field NN work_dzeata5onzf7rp26j2quaotjza 39 25 . . . work_dzeata5onzf7rp26j2quaotjza 40 1 A a DT work_dzeata5onzf7rp26j2quaotjza 40 2 definition definition NN work_dzeata5onzf7rp26j2quaotjza 40 3 should should MD work_dzeata5onzf7rp26j2quaotjza 40 4 be be VB work_dzeata5onzf7rp26j2quaotjza 40 5 a a DT work_dzeata5onzf7rp26j2quaotjza 40 6 concise concise JJ work_dzeata5onzf7rp26j2quaotjza 40 7 statement statement NN work_dzeata5onzf7rp26j2quaotjza 40 8 of of IN work_dzeata5onzf7rp26j2quaotjza 40 9 the the DT work_dzeata5onzf7rp26j2quaotjza 40 10 exact exact JJ work_dzeata5onzf7rp26j2quaotjza 40 11 meaning meaning NN work_dzeata5onzf7rp26j2quaotjza 40 12 of of IN work_dzeata5onzf7rp26j2quaotjza 40 13 a a DT work_dzeata5onzf7rp26j2quaotjza 40 14 word word NN work_dzeata5onzf7rp26j2quaotjza 40 15 and and CC work_dzeata5onzf7rp26j2quaotjza 40 16 may may MD work_dzeata5onzf7rp26j2quaotjza 40 17 be be VB work_dzeata5onzf7rp26j2quaotjza 40 18 accompanied accompany VBN work_dzeata5onzf7rp26j2quaotjza 40 19 by by IN work_dzeata5onzf7rp26j2quaotjza 40 20 narration narration NN work_dzeata5onzf7rp26j2quaotjza 40 21 of of IN work_dzeata5onzf7rp26j2quaotjza 40 22 some some DT work_dzeata5onzf7rp26j2quaotjza 40 23 properties property NNS work_dzeata5onzf7rp26j2quaotjza 40 24 implied imply VBN work_dzeata5onzf7rp26j2quaotjza 40 25 by by IN work_dzeata5onzf7rp26j2quaotjza 40 26 the the DT work_dzeata5onzf7rp26j2quaotjza 40 27 definition definition NN work_dzeata5onzf7rp26j2quaotjza 40 28 . . . work_dzeata5onzf7rp26j2quaotjza 41 1 In in IN work_dzeata5onzf7rp26j2quaotjza 41 2 this this DT work_dzeata5onzf7rp26j2quaotjza 41 3 case case NN work_dzeata5onzf7rp26j2quaotjza 41 4 , , , work_dzeata5onzf7rp26j2quaotjza 41 5 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 41 6 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 41 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 41 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 41 9 . . . work_dzeata5onzf7rp26j2quaotjza 42 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 42 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 42 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 42 4 , , , work_dzeata5onzf7rp26j2quaotjza 42 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 42 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 42 7 . . . work_dzeata5onzf7rp26j2quaotjza 43 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 43 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 43 3 , , , work_dzeata5onzf7rp26j2quaotjza 43 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 43 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 43 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 43 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 43 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 43 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 43 10 2/36 2/36 NNP work_dzeata5onzf7rp26j2quaotjza 43 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 43 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 43 13 should should MD work_dzeata5onzf7rp26j2quaotjza 43 14 clearly clearly RB work_dzeata5onzf7rp26j2quaotjza 43 15 distinguish distinguish VB work_dzeata5onzf7rp26j2quaotjza 43 16 between between IN work_dzeata5onzf7rp26j2quaotjza 43 17 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 43 18 that that WDT work_dzeata5onzf7rp26j2quaotjza 43 19 are be VBP work_dzeata5onzf7rp26j2quaotjza 43 20 and and CC work_dzeata5onzf7rp26j2quaotjza 43 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 43 22 not not RB work_dzeata5onzf7rp26j2quaotjza 43 23 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 43 24 . . . work_dzeata5onzf7rp26j2quaotjza 44 1 To to TO work_dzeata5onzf7rp26j2quaotjza 44 2 gain gain VB work_dzeata5onzf7rp26j2quaotjza 44 3 widespread widespread JJ work_dzeata5onzf7rp26j2quaotjza 44 4 use use NN work_dzeata5onzf7rp26j2quaotjza 44 5 , , , work_dzeata5onzf7rp26j2quaotjza 44 6 a a DT work_dzeata5onzf7rp26j2quaotjza 44 7 new new JJ work_dzeata5onzf7rp26j2quaotjza 44 8 definition definition NN work_dzeata5onzf7rp26j2quaotjza 44 9 must must MD work_dzeata5onzf7rp26j2quaotjza 44 10 include include VB work_dzeata5onzf7rp26j2quaotjza 44 11 all all DT work_dzeata5onzf7rp26j2quaotjza 44 12 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 44 13 that that WDT work_dzeata5onzf7rp26j2quaotjza 44 14 are be VBP work_dzeata5onzf7rp26j2quaotjza 44 15 already already RB work_dzeata5onzf7rp26j2quaotjza 44 16 widely widely RB work_dzeata5onzf7rp26j2quaotjza 44 17 considered consider VBN work_dzeata5onzf7rp26j2quaotjza 44 18 to to TO work_dzeata5onzf7rp26j2quaotjza 44 19 be be VB work_dzeata5onzf7rp26j2quaotjza 44 20 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 44 21 . . . work_dzeata5onzf7rp26j2quaotjza 45 1 In in IN work_dzeata5onzf7rp26j2quaotjza 45 2 software software NN work_dzeata5onzf7rp26j2quaotjza 45 3 security security NN work_dzeata5onzf7rp26j2quaotjza 45 4 contexts contexts NN work_dzeata5onzf7rp26j2quaotjza 45 5 , , , work_dzeata5onzf7rp26j2quaotjza 45 6 the the DT work_dzeata5onzf7rp26j2quaotjza 45 7 term term NN work_dzeata5onzf7rp26j2quaotjza 45 8 “ " `` work_dzeata5onzf7rp26j2quaotjza 45 9 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 45 10 ” " '' work_dzeata5onzf7rp26j2quaotjza 45 11 has have VBZ work_dzeata5onzf7rp26j2quaotjza 45 12 grown grow VBN work_dzeata5onzf7rp26j2quaotjza 45 13 ambiguous ambiguous JJ work_dzeata5onzf7rp26j2quaotjza 45 14 . . . work_dzeata5onzf7rp26j2quaotjza 46 1 In in IN work_dzeata5onzf7rp26j2quaotjza 46 2 an an DT work_dzeata5onzf7rp26j2quaotjza 46 3 early early JJ work_dzeata5onzf7rp26j2quaotjza 46 4 published publish VBN work_dzeata5onzf7rp26j2quaotjza 46 5 use use NN work_dzeata5onzf7rp26j2quaotjza 46 6 , , , work_dzeata5onzf7rp26j2quaotjza 46 7 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 46 8 described describe VBD work_dzeata5onzf7rp26j2quaotjza 46 9 an an DT work_dzeata5onzf7rp26j2quaotjza 46 10 approach approach NN work_dzeata5onzf7rp26j2quaotjza 46 11 for for IN work_dzeata5onzf7rp26j2quaotjza 46 12 achieving achieve VBG work_dzeata5onzf7rp26j2quaotjza 46 13 fault fault NN work_dzeata5onzf7rp26j2quaotjza 46 14 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 46 15 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 46 16 Wahbe Wahbe NNP work_dzeata5onzf7rp26j2quaotjza 46 17 et et FW work_dzeata5onzf7rp26j2quaotjza 46 18 al al NNP work_dzeata5onzf7rp26j2quaotjza 46 19 . . NNP work_dzeata5onzf7rp26j2quaotjza 46 20 , , , work_dzeata5onzf7rp26j2quaotjza 46 21 1993 1993 CD work_dzeata5onzf7rp26j2quaotjza 46 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 46 23 . . . work_dzeata5onzf7rp26j2quaotjza 47 1 Discussions discussion NNS work_dzeata5onzf7rp26j2quaotjza 47 2 where where WRB work_dzeata5onzf7rp26j2quaotjza 47 3 practicing practice VBG work_dzeata5onzf7rp26j2quaotjza 47 4 programmers programmer NNS work_dzeata5onzf7rp26j2quaotjza 47 5 are be VBP work_dzeata5onzf7rp26j2quaotjza 47 6 trying try VBG work_dzeata5onzf7rp26j2quaotjza 47 7 to to TO work_dzeata5onzf7rp26j2quaotjza 47 8 understand understand VB work_dzeata5onzf7rp26j2quaotjza 47 9 what what WP work_dzeata5onzf7rp26j2quaotjza 47 10 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 47 11 is be VBZ work_dzeata5onzf7rp26j2quaotjza 47 12 often often RB work_dzeata5onzf7rp26j2quaotjza 47 13 fail fail VBP work_dzeata5onzf7rp26j2quaotjza 47 14 to to TO work_dzeata5onzf7rp26j2quaotjza 47 15 achieve achieve VB work_dzeata5onzf7rp26j2quaotjza 47 16 a a DT work_dzeata5onzf7rp26j2quaotjza 47 17 precise precise JJ work_dzeata5onzf7rp26j2quaotjza 47 18 resolution resolution NN work_dzeata5onzf7rp26j2quaotjza 47 19 and and CC work_dzeata5onzf7rp26j2quaotjza 47 20 instead instead RB work_dzeata5onzf7rp26j2quaotjza 47 21 describe describe VB work_dzeata5onzf7rp26j2quaotjza 47 22 the the DT work_dzeata5onzf7rp26j2quaotjza 47 23 term term NN work_dzeata5onzf7rp26j2quaotjza 47 24 by by IN work_dzeata5onzf7rp26j2quaotjza 47 25 listing list VBG work_dzeata5onzf7rp26j2quaotjza 47 26 products product NNS work_dzeata5onzf7rp26j2quaotjza 47 27 that that WDT work_dzeata5onzf7rp26j2quaotjza 47 28 are be VBP work_dzeata5onzf7rp26j2quaotjza 47 29 typically typically RB work_dzeata5onzf7rp26j2quaotjza 47 30 considered consider VBN work_dzeata5onzf7rp26j2quaotjza 47 31 to to TO work_dzeata5onzf7rp26j2quaotjza 47 32 be be VB work_dzeata5onzf7rp26j2quaotjza 47 33 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 47 34 or or CC work_dzeata5onzf7rp26j2quaotjza 47 35 cases case NNS work_dzeata5onzf7rp26j2quaotjza 47 36 where where WRB work_dzeata5onzf7rp26j2quaotjza 47 37 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 47 38 are be VBP work_dzeata5onzf7rp26j2quaotjza 47 39 often often RB work_dzeata5onzf7rp26j2quaotjza 47 40 used use VBN work_dzeata5onzf7rp26j2quaotjza 47 41 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 47 42 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing UH work_dzeata5onzf7rp26j2quaotjza 47 43 , , , work_dzeata5onzf7rp26j2quaotjza 47 44 http://security http://security ADD work_dzeata5onzf7rp26j2quaotjza 47 45 . . . work_dzeata5onzf7rp26j2quaotjza 48 1 stackexchange.com/questions/16291/are-sandboxes-overrated stackexchange.com/questions/16291/are-sandboxes-overrate VBN work_dzeata5onzf7rp26j2quaotjza 48 2 , , , work_dzeata5onzf7rp26j2quaotjza 48 3 http://en.wikipedia.org/ http://en.wikipedia.org/ NNP work_dzeata5onzf7rp26j2quaotjza 48 4 w w NNP work_dzeata5onzf7rp26j2quaotjza 48 5 / / SYM work_dzeata5onzf7rp26j2quaotjza 48 6 index.php?title index.php?title JJ work_dzeata5onzf7rp26j2quaotjza 48 7 = = SYM work_dzeata5onzf7rp26j2quaotjza 48 8 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 48 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 48 10 computer computer NN work_dzeata5onzf7rp26j2quaotjza 48 11 security)&oldid=596038515 security)&oldid=596038515 NNS work_dzeata5onzf7rp26j2quaotjza 48 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 48 13 . . . work_dzeata5onzf7rp26j2quaotjza 49 1 However however RB work_dzeata5onzf7rp26j2quaotjza 49 2 , , , work_dzeata5onzf7rp26j2quaotjza 49 3 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 49 4 did do VBD work_dzeata5onzf7rp26j2quaotjza 49 5 find find VB work_dzeata5onzf7rp26j2quaotjza 49 6 cases case NNS work_dzeata5onzf7rp26j2quaotjza 49 7 where where WRB work_dzeata5onzf7rp26j2quaotjza 49 8 attempts attempt NNS work_dzeata5onzf7rp26j2quaotjza 49 9 were be VBD work_dzeata5onzf7rp26j2quaotjza 49 10 made make VBN work_dzeata5onzf7rp26j2quaotjza 49 11 at at IN work_dzeata5onzf7rp26j2quaotjza 49 12 a a DT work_dzeata5onzf7rp26j2quaotjza 49 13 concise concise JJ work_dzeata5onzf7rp26j2quaotjza 49 14 and and CC work_dzeata5onzf7rp26j2quaotjza 49 15 general general JJ work_dzeata5onzf7rp26j2quaotjza 49 16 definition definition NN work_dzeata5onzf7rp26j2quaotjza 49 17 . . . work_dzeata5onzf7rp26j2quaotjza 50 1 A a DT work_dzeata5onzf7rp26j2quaotjza 50 2 representative representative NN work_dzeata5onzf7rp26j2quaotjza 50 3 and and CC work_dzeata5onzf7rp26j2quaotjza 50 4 accepted accept VBD work_dzeata5onzf7rp26j2quaotjza 50 5 StackOverflow StackOverflow NNP work_dzeata5onzf7rp26j2quaotjza 50 6 answer answer NN work_dzeata5onzf7rp26j2quaotjza 50 7 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 50 8 http://security.stackexchange.com/questions/5334/ http://security.stackexchange.com/questions/5334/ NNP work_dzeata5onzf7rp26j2quaotjza 50 9 what what WP work_dzeata5onzf7rp26j2quaotjza 50 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 50 11 is be VBZ work_dzeata5onzf7rp26j2quaotjza 50 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 50 13 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 50 14 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 50 15 started start VBD work_dzeata5onzf7rp26j2quaotjza 50 16 with with IN work_dzeata5onzf7rp26j2quaotjza 50 17 , , , work_dzeata5onzf7rp26j2quaotjza 50 18 “ " `` work_dzeata5onzf7rp26j2quaotjza 50 19 In in IN work_dzeata5onzf7rp26j2quaotjza 50 20 the the DT work_dzeata5onzf7rp26j2quaotjza 50 21 context context NN work_dzeata5onzf7rp26j2quaotjza 50 22 of of IN work_dzeata5onzf7rp26j2quaotjza 50 23 IT IT NNP work_dzeata5onzf7rp26j2quaotjza 50 24 security security NN work_dzeata5onzf7rp26j2quaotjza 50 25 , , , work_dzeata5onzf7rp26j2quaotjza 50 26 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 50 27 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 50 28 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 50 29 means mean VBZ work_dzeata5onzf7rp26j2quaotjza 50 30 isolating isolate VBG work_dzeata5onzf7rp26j2quaotjza 50 31 some some DT work_dzeata5onzf7rp26j2quaotjza 50 32 piece piece NN work_dzeata5onzf7rp26j2quaotjza 50 33 of of IN work_dzeata5onzf7rp26j2quaotjza 50 34 software software NN work_dzeata5onzf7rp26j2quaotjza 50 35 in in IN work_dzeata5onzf7rp26j2quaotjza 50 36 such such PDT work_dzeata5onzf7rp26j2quaotjza 50 37 a a DT work_dzeata5onzf7rp26j2quaotjza 50 38 way way NN work_dzeata5onzf7rp26j2quaotjza 50 39 that that IN work_dzeata5onzf7rp26j2quaotjza 50 40 whatever whatever WDT work_dzeata5onzf7rp26j2quaotjza 50 41 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 50 42 does do VBZ work_dzeata5onzf7rp26j2quaotjza 50 43 , , , work_dzeata5onzf7rp26j2quaotjza 50 44 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 50 45 will will MD work_dzeata5onzf7rp26j2quaotjza 50 46 not not RB work_dzeata5onzf7rp26j2quaotjza 50 47 spread spread VB work_dzeata5onzf7rp26j2quaotjza 50 48 havoc havoc NN work_dzeata5onzf7rp26j2quaotjza 50 49 elsewhere”—a elsewhere”—a NNP work_dzeata5onzf7rp26j2quaotjza 50 50 definition definition NN work_dzeata5onzf7rp26j2quaotjza 50 51 that that WDT work_dzeata5onzf7rp26j2quaotjza 50 52 is be VBZ work_dzeata5onzf7rp26j2quaotjza 50 53 not not RB work_dzeata5onzf7rp26j2quaotjza 50 54 sufficiently sufficiently RB work_dzeata5onzf7rp26j2quaotjza 50 55 precise precise JJ work_dzeata5onzf7rp26j2quaotjza 50 56 to to TO work_dzeata5onzf7rp26j2quaotjza 50 57 separate separate VB work_dzeata5onzf7rp26j2quaotjza 50 58 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 50 59 from from IN work_dzeata5onzf7rp26j2quaotjza 50 60 other other JJ work_dzeata5onzf7rp26j2quaotjza 50 61 defensive defensive JJ work_dzeata5onzf7rp26j2quaotjza 50 62 measures measure NNS work_dzeata5onzf7rp26j2quaotjza 50 63 . . . work_dzeata5onzf7rp26j2quaotjza 51 1 Even even RB work_dzeata5onzf7rp26j2quaotjza 51 2 recently recently RB work_dzeata5onzf7rp26j2quaotjza 51 3 published publish VBN work_dzeata5onzf7rp26j2quaotjza 51 4 surveys survey NNS work_dzeata5onzf7rp26j2quaotjza 51 5 of of IN work_dzeata5onzf7rp26j2quaotjza 51 6 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 51 7 literature literature NN work_dzeata5onzf7rp26j2quaotjza 51 8 have have VBP work_dzeata5onzf7rp26j2quaotjza 51 9 either either CC work_dzeata5onzf7rp26j2quaotjza 51 10 acknowledged acknowledge VBN work_dzeata5onzf7rp26j2quaotjza 51 11 the the DT work_dzeata5onzf7rp26j2quaotjza 51 12 ambiguity ambiguity NN work_dzeata5onzf7rp26j2quaotjza 51 13 , , , work_dzeata5onzf7rp26j2quaotjza 51 14 then then RB work_dzeata5onzf7rp26j2quaotjza 51 15 used use VBD work_dzeata5onzf7rp26j2quaotjza 51 16 overly overly RB work_dzeata5onzf7rp26j2quaotjza 51 17 - - HYPH work_dzeata5onzf7rp26j2quaotjza 51 18 broad broad JJ work_dzeata5onzf7rp26j2quaotjza 51 19 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 51 20 that that WDT work_dzeata5onzf7rp26j2quaotjza 51 21 include include VBP work_dzeata5onzf7rp26j2quaotjza 51 22 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 51 23 not not RB work_dzeata5onzf7rp26j2quaotjza 51 24 traditionally traditionally RB work_dzeata5onzf7rp26j2quaotjza 51 25 considered consider VBN work_dzeata5onzf7rp26j2quaotjza 51 26 to to TO work_dzeata5onzf7rp26j2quaotjza 51 27 be be VB work_dzeata5onzf7rp26j2quaotjza 51 28 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 51 29 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 51 30 Schreuders Schreuders NNPS work_dzeata5onzf7rp26j2quaotjza 51 31 , , , work_dzeata5onzf7rp26j2quaotjza 51 32 McGill McGill NNP work_dzeata5onzf7rp26j2quaotjza 51 33 & & CC work_dzeata5onzf7rp26j2quaotjza 51 34 Payne Payne NNP work_dzeata5onzf7rp26j2quaotjza 51 35 , , , work_dzeata5onzf7rp26j2quaotjza 51 36 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 51 37 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 51 38 , , , work_dzeata5onzf7rp26j2quaotjza 51 39 or or CC work_dzeata5onzf7rp26j2quaotjza 51 40 have have VBP work_dzeata5onzf7rp26j2quaotjza 51 41 relied rely VBN work_dzeata5onzf7rp26j2quaotjza 51 42 entirely entirely RB work_dzeata5onzf7rp26j2quaotjza 51 43 on on IN work_dzeata5onzf7rp26j2quaotjza 51 44 the the DT work_dzeata5onzf7rp26j2quaotjza 51 45 use use NN work_dzeata5onzf7rp26j2quaotjza 51 46 of of IN work_dzeata5onzf7rp26j2quaotjza 51 47 examples example NNS work_dzeata5onzf7rp26j2quaotjza 51 48 instead instead RB work_dzeata5onzf7rp26j2quaotjza 51 49 of of IN work_dzeata5onzf7rp26j2quaotjza 51 50 a a DT work_dzeata5onzf7rp26j2quaotjza 51 51 precise precise JJ work_dzeata5onzf7rp26j2quaotjza 51 52 definition definition NN work_dzeata5onzf7rp26j2quaotjza 51 53 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 51 54 Al Al NNP work_dzeata5onzf7rp26j2quaotjza 51 55 Ameiri Ameiri NNP work_dzeata5onzf7rp26j2quaotjza 51 56 & & CC work_dzeata5onzf7rp26j2quaotjza 51 57 Salah Salah NNP work_dzeata5onzf7rp26j2quaotjza 51 58 , , , work_dzeata5onzf7rp26j2quaotjza 51 59 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 51 60 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 51 61 . . . work_dzeata5onzf7rp26j2quaotjza 52 1 Schreuders schreuder NNS work_dzeata5onzf7rp26j2quaotjza 52 2 writes write VBZ work_dzeata5onzf7rp26j2quaotjza 52 3 , , , work_dzeata5onzf7rp26j2quaotjza 52 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 52 5 Although although IN work_dzeata5onzf7rp26j2quaotjza 52 6 the the DT work_dzeata5onzf7rp26j2quaotjza 52 7 terminology terminology NN work_dzeata5onzf7rp26j2quaotjza 52 8 in in IN work_dzeata5onzf7rp26j2quaotjza 52 9 use use NN work_dzeata5onzf7rp26j2quaotjza 52 10 varies vary VBZ work_dzeata5onzf7rp26j2quaotjza 52 11 , , , work_dzeata5onzf7rp26j2quaotjza 52 12 in in IN work_dzeata5onzf7rp26j2quaotjza 52 13 general general JJ work_dzeata5onzf7rp26j2quaotjza 52 14 a a DT work_dzeata5onzf7rp26j2quaotjza 52 15 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 52 16 is be VBZ work_dzeata5onzf7rp26j2quaotjza 52 17 separate separate JJ work_dzeata5onzf7rp26j2quaotjza 52 18 from from IN work_dzeata5onzf7rp26j2quaotjza 52 19 the the DT work_dzeata5onzf7rp26j2quaotjza 52 20 access access NN work_dzeata5onzf7rp26j2quaotjza 52 21 controls control NNS work_dzeata5onzf7rp26j2quaotjza 52 22 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 52 23 to to IN work_dzeata5onzf7rp26j2quaotjza 52 24 all all DT work_dzeata5onzf7rp26j2quaotjza 52 25 running running NN work_dzeata5onzf7rp26j2quaotjza 52 26 programs program NNS work_dzeata5onzf7rp26j2quaotjza 52 27 . . . work_dzeata5onzf7rp26j2quaotjza 53 1 Typically typically RB work_dzeata5onzf7rp26j2quaotjza 53 2 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 53 3 only only RB work_dzeata5onzf7rp26j2quaotjza 53 4 apply apply VBP work_dzeata5onzf7rp26j2quaotjza 53 5 to to IN work_dzeata5onzf7rp26j2quaotjza 53 6 programs program NNS work_dzeata5onzf7rp26j2quaotjza 53 7 explicitly explicitly RB work_dzeata5onzf7rp26j2quaotjza 53 8 launched launch VBN work_dzeata5onzf7rp26j2quaotjza 53 9 into into IN work_dzeata5onzf7rp26j2quaotjza 53 10 or or CC work_dzeata5onzf7rp26j2quaotjza 53 11 from from IN work_dzeata5onzf7rp26j2quaotjza 53 12 within within IN work_dzeata5onzf7rp26j2quaotjza 53 13 a a DT work_dzeata5onzf7rp26j2quaotjza 53 14 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 53 15 . . . work_dzeata5onzf7rp26j2quaotjza 54 1 In in IN work_dzeata5onzf7rp26j2quaotjza 54 2 most most JJS work_dzeata5onzf7rp26j2quaotjza 54 3 cases case NNS work_dzeata5onzf7rp26j2quaotjza 54 4 no no DT work_dzeata5onzf7rp26j2quaotjza 54 5 security security NN work_dzeata5onzf7rp26j2quaotjza 54 6 context context NN work_dzeata5onzf7rp26j2quaotjza 54 7 changes change NNS work_dzeata5onzf7rp26j2quaotjza 54 8 take take VBP work_dzeata5onzf7rp26j2quaotjza 54 9 place place NN work_dzeata5onzf7rp26j2quaotjza 54 10 when when WRB work_dzeata5onzf7rp26j2quaotjza 54 11 a a DT work_dzeata5onzf7rp26j2quaotjza 54 12 new new JJ work_dzeata5onzf7rp26j2quaotjza 54 13 process process NN work_dzeata5onzf7rp26j2quaotjza 54 14 is be VBZ work_dzeata5onzf7rp26j2quaotjza 54 15 started start VBN work_dzeata5onzf7rp26j2quaotjza 54 16 , , , work_dzeata5onzf7rp26j2quaotjza 54 17 and and CC work_dzeata5onzf7rp26j2quaotjza 54 18 all all DT work_dzeata5onzf7rp26j2quaotjza 54 19 programs program NNS work_dzeata5onzf7rp26j2quaotjza 54 20 in in IN work_dzeata5onzf7rp26j2quaotjza 54 21 a a DT work_dzeata5onzf7rp26j2quaotjza 54 22 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 54 23 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 54 24 run run NN work_dzeata5onzf7rp26j2quaotjza 54 25 with with IN work_dzeata5onzf7rp26j2quaotjza 54 26 the the DT work_dzeata5onzf7rp26j2quaotjza 54 27 same same JJ work_dzeata5onzf7rp26j2quaotjza 54 28 set set NN work_dzeata5onzf7rp26j2quaotjza 54 29 of of IN work_dzeata5onzf7rp26j2quaotjza 54 30 rights right NNS work_dzeata5onzf7rp26j2quaotjza 54 31 . . . work_dzeata5onzf7rp26j2quaotjza 55 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 55 2 can can MD work_dzeata5onzf7rp26j2quaotjza 55 3 either either CC work_dzeata5onzf7rp26j2quaotjza 55 4 be be VB work_dzeata5onzf7rp26j2quaotjza 55 5 permanent permanent JJ work_dzeata5onzf7rp26j2quaotjza 55 6 where where WRB work_dzeata5onzf7rp26j2quaotjza 55 7 resource resource NN work_dzeata5onzf7rp26j2quaotjza 55 8 changes change NNS work_dzeata5onzf7rp26j2quaotjza 55 9 persist persist VBP work_dzeata5onzf7rp26j2quaotjza 55 10 after after IN work_dzeata5onzf7rp26j2quaotjza 55 11 the the DT work_dzeata5onzf7rp26j2quaotjza 55 12 programs program NNS work_dzeata5onzf7rp26j2quaotjza 55 13 finish finish VBP work_dzeata5onzf7rp26j2quaotjza 55 14 running running NN work_dzeata5onzf7rp26j2quaotjza 55 15 , , , work_dzeata5onzf7rp26j2quaotjza 55 16 or or CC work_dzeata5onzf7rp26j2quaotjza 55 17 ephemeral ephemeral JJ work_dzeata5onzf7rp26j2quaotjza 55 18 where where WRB work_dzeata5onzf7rp26j2quaotjza 55 19 changes change NNS work_dzeata5onzf7rp26j2quaotjza 55 20 are be VBP work_dzeata5onzf7rp26j2quaotjza 55 21 discarded discard VBN work_dzeata5onzf7rp26j2quaotjza 55 22 after after IN work_dzeata5onzf7rp26j2quaotjza 55 23 the the DT work_dzeata5onzf7rp26j2quaotjza 55 24 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 55 25 is be VBZ work_dzeata5onzf7rp26j2quaotjza 55 26 no no RB work_dzeata5onzf7rp26j2quaotjza 55 27 longer long RBR work_dzeata5onzf7rp26j2quaotjza 55 28 in in IN work_dzeata5onzf7rp26j2quaotjza 55 29 use use NN work_dzeata5onzf7rp26j2quaotjza 55 30 . . . work_dzeata5onzf7rp26j2quaotjza 56 1 . . . work_dzeata5onzf7rp26j2quaotjza 57 1 . . . work_dzeata5onzf7rp26j2quaotjza 58 1 . . . work_dzeata5onzf7rp26j2quaotjza 59 1 ” " `` work_dzeata5onzf7rp26j2quaotjza 59 2 This this DT work_dzeata5onzf7rp26j2quaotjza 59 3 definition definition NN work_dzeata5onzf7rp26j2quaotjza 59 4 suffers suffer VBZ work_dzeata5onzf7rp26j2quaotjza 59 5 from from IN work_dzeata5onzf7rp26j2quaotjza 59 6 three three CD work_dzeata5onzf7rp26j2quaotjza 59 7 problems problem NNS work_dzeata5onzf7rp26j2quaotjza 59 8 . . . work_dzeata5onzf7rp26j2quaotjza 60 1 First first RB work_dzeata5onzf7rp26j2quaotjza 60 2 , , , work_dzeata5onzf7rp26j2quaotjza 60 3 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 60 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 60 5 still still RB work_dzeata5onzf7rp26j2quaotjza 60 6 overly overly RB work_dzeata5onzf7rp26j2quaotjza 60 7 reliant reliant JJ work_dzeata5onzf7rp26j2quaotjza 60 8 on on IN work_dzeata5onzf7rp26j2quaotjza 60 9 examples example NNS work_dzeata5onzf7rp26j2quaotjza 60 10 and and CC work_dzeata5onzf7rp26j2quaotjza 60 11 thus thus RB work_dzeata5onzf7rp26j2quaotjza 60 12 is be VBZ work_dzeata5onzf7rp26j2quaotjza 60 13 unlikely unlikely JJ work_dzeata5onzf7rp26j2quaotjza 60 14 to to TO work_dzeata5onzf7rp26j2quaotjza 60 15 capture capture VB work_dzeata5onzf7rp26j2quaotjza 60 16 all all DT work_dzeata5onzf7rp26j2quaotjza 60 17 security security NN work_dzeata5onzf7rp26j2quaotjza 60 18 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 60 19 that that WDT work_dzeata5onzf7rp26j2quaotjza 60 20 are be VBP work_dzeata5onzf7rp26j2quaotjza 60 21 uncontroversially uncontroversially RB work_dzeata5onzf7rp26j2quaotjza 60 22 called call VBN work_dzeata5onzf7rp26j2quaotjza 60 23 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 60 24 . . . work_dzeata5onzf7rp26j2quaotjza 61 1 Along along IN work_dzeata5onzf7rp26j2quaotjza 61 2 the the DT work_dzeata5onzf7rp26j2quaotjza 61 3 same same JJ work_dzeata5onzf7rp26j2quaotjza 61 4 lines line NNS work_dzeata5onzf7rp26j2quaotjza 61 5 , , , work_dzeata5onzf7rp26j2quaotjza 61 6 characterizations characterization NNS work_dzeata5onzf7rp26j2quaotjza 61 7 prefaced preface VBD work_dzeata5onzf7rp26j2quaotjza 61 8 with with IN work_dzeata5onzf7rp26j2quaotjza 61 9 , , , work_dzeata5onzf7rp26j2quaotjza 61 10 “ " `` work_dzeata5onzf7rp26j2quaotjza 61 11 In in IN work_dzeata5onzf7rp26j2quaotjza 61 12 most most JJS work_dzeata5onzf7rp26j2quaotjza 61 13 cases case NNS work_dzeata5onzf7rp26j2quaotjza 61 14 . . . work_dzeata5onzf7rp26j2quaotjza 62 1 . . . work_dzeata5onzf7rp26j2quaotjza 63 1 . . . work_dzeata5onzf7rp26j2quaotjza 64 1 ” " '' work_dzeata5onzf7rp26j2quaotjza 64 2 , , , work_dzeata5onzf7rp26j2quaotjza 64 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 64 4 not not RB work_dzeata5onzf7rp26j2quaotjza 64 5 precise precise JJ work_dzeata5onzf7rp26j2quaotjza 64 6 enough enough RB work_dzeata5onzf7rp26j2quaotjza 64 7 to to TO work_dzeata5onzf7rp26j2quaotjza 64 8 reliably reliably RB work_dzeata5onzf7rp26j2quaotjza 64 9 separate separate JJ work_dzeata5onzf7rp26j2quaotjza 64 10 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 64 11 from from IN work_dzeata5onzf7rp26j2quaotjza 64 12 non non JJ work_dzeata5onzf7rp26j2quaotjza 64 13 - - NNS work_dzeata5onzf7rp26j2quaotjza 64 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 64 15 . . . work_dzeata5onzf7rp26j2quaotjza 65 1 Finally finally RB work_dzeata5onzf7rp26j2quaotjza 65 2 , , , work_dzeata5onzf7rp26j2quaotjza 65 3 the the DT work_dzeata5onzf7rp26j2quaotjza 65 4 comparison comparison NN work_dzeata5onzf7rp26j2quaotjza 65 5 to to TO work_dzeata5onzf7rp26j2quaotjza 65 6 access access VB work_dzeata5onzf7rp26j2quaotjza 65 7 controls control NNS work_dzeata5onzf7rp26j2quaotjza 65 8 is be VBZ work_dzeata5onzf7rp26j2quaotjza 65 9 not not RB work_dzeata5onzf7rp26j2quaotjza 65 10 conclusive conclusive JJ work_dzeata5onzf7rp26j2quaotjza 65 11 because because IN work_dzeata5onzf7rp26j2quaotjza 65 12 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 65 13 does do VBZ work_dzeata5onzf7rp26j2quaotjza 65 14 not not RB work_dzeata5onzf7rp26j2quaotjza 65 15 clarify clarify VB work_dzeata5onzf7rp26j2quaotjza 65 16 which which WDT work_dzeata5onzf7rp26j2quaotjza 65 17 , , , work_dzeata5onzf7rp26j2quaotjza 65 18 if if IN work_dzeata5onzf7rp26j2quaotjza 65 19 any any DT work_dzeata5onzf7rp26j2quaotjza 65 20 , , , work_dzeata5onzf7rp26j2quaotjza 65 21 access access NN work_dzeata5onzf7rp26j2quaotjza 65 22 control control NN work_dzeata5onzf7rp26j2quaotjza 65 23 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 65 24 applied apply VBD work_dzeata5onzf7rp26j2quaotjza 65 25 to to IN work_dzeata5onzf7rp26j2quaotjza 65 26 a a DT work_dzeata5onzf7rp26j2quaotjza 65 27 subset subset NN work_dzeata5onzf7rp26j2quaotjza 65 28 of of IN work_dzeata5onzf7rp26j2quaotjza 65 29 running running NN work_dzeata5onzf7rp26j2quaotjza 65 30 programs program NNS work_dzeata5onzf7rp26j2quaotjza 65 31 are be VBP work_dzeata5onzf7rp26j2quaotjza 65 32 not not RB work_dzeata5onzf7rp26j2quaotjza 65 33 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 65 34 . . . work_dzeata5onzf7rp26j2quaotjza 66 1 In in IN work_dzeata5onzf7rp26j2quaotjza 66 2 this this DT work_dzeata5onzf7rp26j2quaotjza 66 3 section section NN work_dzeata5onzf7rp26j2quaotjza 66 4 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 66 5 aim aim VBP work_dzeata5onzf7rp26j2quaotjza 66 6 to to TO work_dzeata5onzf7rp26j2quaotjza 66 7 resolve resolve VB work_dzeata5onzf7rp26j2quaotjza 66 8 this this DT work_dzeata5onzf7rp26j2quaotjza 66 9 ambiguity ambiguity NN work_dzeata5onzf7rp26j2quaotjza 66 10 to to TO work_dzeata5onzf7rp26j2quaotjza 66 11 lay lay VB work_dzeata5onzf7rp26j2quaotjza 66 12 the the DT work_dzeata5onzf7rp26j2quaotjza 66 13 groundwork groundwork NN work_dzeata5onzf7rp26j2quaotjza 66 14 for for IN work_dzeata5onzf7rp26j2quaotjza 66 15 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 66 16 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 66 17 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 66 18 inclusion inclusion NN work_dzeata5onzf7rp26j2quaotjza 66 19 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 66 20 . . . work_dzeata5onzf7rp26j2quaotjza 67 1 While while IN work_dzeata5onzf7rp26j2quaotjza 67 2 this this DT work_dzeata5onzf7rp26j2quaotjza 67 3 definition definition NN work_dzeata5onzf7rp26j2quaotjza 67 4 serves serve VBZ work_dzeata5onzf7rp26j2quaotjza 67 5 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 67 6 purposes purpose NNS work_dzeata5onzf7rp26j2quaotjza 67 7 , , , work_dzeata5onzf7rp26j2quaotjza 67 8 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 67 9 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 67 10 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 67 11 can can MD work_dzeata5onzf7rp26j2quaotjza 67 12 strengthen strengthen VB work_dzeata5onzf7rp26j2quaotjza 67 13 future future JJ work_dzeata5onzf7rp26j2quaotjza 67 14 attempts attempt NNS work_dzeata5onzf7rp26j2quaotjza 67 15 to to TO work_dzeata5onzf7rp26j2quaotjza 67 16 communicate communicate VB work_dzeata5onzf7rp26j2quaotjza 67 17 scientifically scientifically RB work_dzeata5onzf7rp26j2quaotjza 67 18 about about IN work_dzeata5onzf7rp26j2quaotjza 67 19 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 67 20 by by IN work_dzeata5onzf7rp26j2quaotjza 67 21 adding add VBG work_dzeata5onzf7rp26j2quaotjza 67 22 additional additional JJ work_dzeata5onzf7rp26j2quaotjza 67 23 precision precision NN work_dzeata5onzf7rp26j2quaotjza 67 24 . . . work_dzeata5onzf7rp26j2quaotjza 68 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 68 2 derive derive VBP work_dzeata5onzf7rp26j2quaotjza 68 3 a a DT work_dzeata5onzf7rp26j2quaotjza 68 4 clear clear JJ work_dzeata5onzf7rp26j2quaotjza 68 5 , , , work_dzeata5onzf7rp26j2quaotjza 68 6 concise concise JJ work_dzeata5onzf7rp26j2quaotjza 68 7 definition definition NN work_dzeata5onzf7rp26j2quaotjza 68 8 for for IN work_dzeata5onzf7rp26j2quaotjza 68 9 what what WP work_dzeata5onzf7rp26j2quaotjza 68 10 a a DT work_dzeata5onzf7rp26j2quaotjza 68 11 “ " `` work_dzeata5onzf7rp26j2quaotjza 68 12 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 68 13 ” " '' work_dzeata5onzf7rp26j2quaotjza 68 14 is be VBZ work_dzeata5onzf7rp26j2quaotjza 68 15 using use VBG work_dzeata5onzf7rp26j2quaotjza 68 16 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 68 17 that that WDT work_dzeata5onzf7rp26j2quaotjza 68 18 appear appear VBP work_dzeata5onzf7rp26j2quaotjza 68 19 in in IN work_dzeata5onzf7rp26j2quaotjza 68 20 five five CD work_dzeata5onzf7rp26j2quaotjza 68 21 top top JJ work_dzeata5onzf7rp26j2quaotjza 68 22 - - HYPH work_dzeata5onzf7rp26j2quaotjza 68 23 tier tier NN work_dzeata5onzf7rp26j2quaotjza 68 24 security security NN work_dzeata5onzf7rp26j2quaotjza 68 25 and and CC work_dzeata5onzf7rp26j2quaotjza 68 26 operating operating NN work_dzeata5onzf7rp26j2quaotjza 68 27 system system NN work_dzeata5onzf7rp26j2quaotjza 68 28 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 68 29 , , , work_dzeata5onzf7rp26j2quaotjza 68 30 selected select VBN work_dzeata5onzf7rp26j2quaotjza 68 31 because because IN work_dzeata5onzf7rp26j2quaotjza 68 32 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 68 33 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 68 34 of of IN work_dzeata5onzf7rp26j2quaotjza 68 35 interest interest NN work_dzeata5onzf7rp26j2quaotjza 68 36 are be VBP work_dzeata5onzf7rp26j2quaotjza 68 37 broad broad JJ work_dzeata5onzf7rp26j2quaotjza 68 38 enough enough RB work_dzeata5onzf7rp26j2quaotjza 68 39 to to TO work_dzeata5onzf7rp26j2quaotjza 68 40 include include VB work_dzeata5onzf7rp26j2quaotjza 68 41 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 68 42 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 68 43 most most JJS work_dzeata5onzf7rp26j2quaotjza 68 44 years year NNS work_dzeata5onzf7rp26j2quaotjza 68 45 . . . work_dzeata5onzf7rp26j2quaotjza 69 1 While while IN work_dzeata5onzf7rp26j2quaotjza 69 2 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 69 3 do do VBP work_dzeata5onzf7rp26j2quaotjza 69 4 not not RB work_dzeata5onzf7rp26j2quaotjza 69 5 attempt attempt VB work_dzeata5onzf7rp26j2quaotjza 69 6 to to TO work_dzeata5onzf7rp26j2quaotjza 69 7 thoroughly thoroughly RB work_dzeata5onzf7rp26j2quaotjza 69 8 validate validate VB work_dzeata5onzf7rp26j2quaotjza 69 9 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 69 10 definition definition NN work_dzeata5onzf7rp26j2quaotjza 69 11 using use VBG work_dzeata5onzf7rp26j2quaotjza 69 12 commercial commercial JJ work_dzeata5onzf7rp26j2quaotjza 69 13 and and CC work_dzeata5onzf7rp26j2quaotjza 69 14 open open JJ work_dzeata5onzf7rp26j2quaotjza 69 15 source source NN work_dzeata5onzf7rp26j2quaotjza 69 16 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 69 17 , , , work_dzeata5onzf7rp26j2quaotjza 69 18 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 69 19 does do VBZ work_dzeata5onzf7rp26j2quaotjza 69 20 encompass encompass VB work_dzeata5onzf7rp26j2quaotjza 69 21 the the DT work_dzeata5onzf7rp26j2quaotjza 69 22 tools tool NNS work_dzeata5onzf7rp26j2quaotjza 69 23 with with IN work_dzeata5onzf7rp26j2quaotjza 69 24 which which WDT work_dzeata5onzf7rp26j2quaotjza 69 25 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 69 26 are be VBP work_dzeata5onzf7rp26j2quaotjza 69 27 most most RBS work_dzeata5onzf7rp26j2quaotjza 69 28 familiar familiar JJ work_dzeata5onzf7rp26j2quaotjza 69 29 . . . work_dzeata5onzf7rp26j2quaotjza 70 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 70 2 et et FW work_dzeata5onzf7rp26j2quaotjza 70 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 70 4 . . . work_dzeata5onzf7rp26j2quaotjza 71 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 71 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 71 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 71 4 , , , work_dzeata5onzf7rp26j2quaotjza 71 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 71 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 71 7 . . . work_dzeata5onzf7rp26j2quaotjza 72 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 72 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 72 3 , , , work_dzeata5onzf7rp26j2quaotjza 72 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 72 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 72 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 72 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 72 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 72 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 72 10 3/36 3/36 CD work_dzeata5onzf7rp26j2quaotjza 72 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ RB work_dzeata5onzf7rp26j2quaotjza 72 12 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 13 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 14 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 15 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 16 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 17 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 18 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 19 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 20 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 21 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 22 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 23 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 24 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 25 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 26 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 27 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 28 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 29 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 30 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 31 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 32 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 33 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 34 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 35 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 36 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 37 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 38 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 39 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 40 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 41 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 42 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 43 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 44 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 45 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 46 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 47 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 48 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 49 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 50 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 51 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 52 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 53 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 54 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 55 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 56 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 57 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 58 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 59 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 60 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 61 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 62 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 63 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 64 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 65 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 66 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 67 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 68 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 69 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 70 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 71 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 72 72 http://stackoverflow.com/questions/2126174/what-is-sandboxing http://stackoverflow.com/questions/2126174/what-is-sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 72 73 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 74 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 75 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 76 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 77 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 78 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 79 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 80 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 81 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 82 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 83 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 84 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 85 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 86 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 87 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 88 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 89 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 90 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 91 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 92 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 93 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 94 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 95 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 96 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 97 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 98 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 99 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 100 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 101 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 102 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 103 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 104 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 105 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 106 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 107 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 108 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 109 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 110 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 111 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 112 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 113 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 114 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 115 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 116 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 117 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 118 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 119 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 120 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 121 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 122 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 123 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 124 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 125 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 126 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 127 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 128 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 129 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 130 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 131 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 132 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 133 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 134 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 135 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 136 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 137 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 138 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 139 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 140 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 141 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 142 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 143 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 144 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 145 http://security.stackexchange.com/questions/16291/are-sandboxes-overrated http://security.stackexchange.com/questions/16291/are-sandboxes-overrated CD work_dzeata5onzf7rp26j2quaotjza 72 146 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 147 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 148 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 149 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 150 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 151 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 152 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 153 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 154 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 155 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 156 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 157 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 158 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 159 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 160 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 161 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 162 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 163 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 164 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 165 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 166 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 167 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 168 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 169 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 170 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 171 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 172 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 173 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 174 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 175 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 176 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 177 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 178 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 179 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 180 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 181 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 182 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 183 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 184 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 185 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 186 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 187 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 188 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 189 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 190 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 191 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 192 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 193 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 194 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 195 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 196 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 197 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 198 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 199 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 200 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 201 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 202 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 203 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 204 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 205 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 206 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 207 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 208 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 209 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 210 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 211 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 212 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 213 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 214 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 215 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 216 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 217 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 218 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 219 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 220 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 221 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 222 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 223 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 224 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 225 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 226 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 227 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 228 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 229 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 230 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 http://en.wikipedia.org/w/index.php?title=Sandbox_(computer_security)&oldid=596038515 NNP work_dzeata5onzf7rp26j2quaotjza 72 231 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 72 232 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 233 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 234 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 235 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 236 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 237 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 238 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 239 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 240 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 241 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 242 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 243 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 244 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 245 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 246 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 247 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 248 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 249 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 250 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 251 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 252 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 253 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 254 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 255 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 256 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 257 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 258 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 259 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 260 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 261 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 262 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 263 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 264 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 265 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 266 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 267 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 268 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 269 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 270 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 271 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 272 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 273 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 274 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 275 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 276 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 277 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 278 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 279 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 280 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 281 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 282 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 283 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 284 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 285 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 286 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 287 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 288 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 289 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 290 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 291 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 292 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 293 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 294 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 295 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 296 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 72 297 http://security.stackexchange.com/questions/5334/what-is-sandboxing http://security.stackexchange.com/questions/5334/what-is-sandboxing UH work_dzeata5onzf7rp26j2quaotjza 72 298 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 UH work_dzeata5onzf7rp26j2quaotjza 72 299 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 72 300 found find VBD work_dzeata5onzf7rp26j2quaotjza 72 301 101 101 CD work_dzeata5onzf7rp26j2quaotjza 72 302 potential potential JJ work_dzeata5onzf7rp26j2quaotjza 72 303 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 72 304 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 72 305 . . . work_dzeata5onzf7rp26j2quaotjza 73 1 Out out IN work_dzeata5onzf7rp26j2quaotjza 73 2 of of IN work_dzeata5onzf7rp26j2quaotjza 73 3 these these DT work_dzeata5onzf7rp26j2quaotjza 73 4 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 73 5 , , , work_dzeata5onzf7rp26j2quaotjza 73 6 49 49 CD work_dzeata5onzf7rp26j2quaotjza 73 7 use use VBP work_dzeata5onzf7rp26j2quaotjza 73 8 the the DT work_dzeata5onzf7rp26j2quaotjza 73 9 term term NN work_dzeata5onzf7rp26j2quaotjza 73 10 “ " `` work_dzeata5onzf7rp26j2quaotjza 73 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 73 12 ” " '' work_dzeata5onzf7rp26j2quaotjza 73 13 at at IN work_dzeata5onzf7rp26j2quaotjza 73 14 least least JJS work_dzeata5onzf7rp26j2quaotjza 73 15 once once RB work_dzeata5onzf7rp26j2quaotjza 73 16 , , , work_dzeata5onzf7rp26j2quaotjza 73 17 and and CC work_dzeata5onzf7rp26j2quaotjza 73 18 14 14 CD work_dzeata5onzf7rp26j2quaotjza 73 19 provide provide VB work_dzeata5onzf7rp26j2quaotjza 73 20 either either CC work_dzeata5onzf7rp26j2quaotjza 73 21 an an DT work_dzeata5onzf7rp26j2quaotjza 73 22 explicit explicit JJ work_dzeata5onzf7rp26j2quaotjza 73 23 or or CC work_dzeata5onzf7rp26j2quaotjza 73 24 implicit implicit JJ work_dzeata5onzf7rp26j2quaotjza 73 25 definition definition NN work_dzeata5onzf7rp26j2quaotjza 73 26 of of IN work_dzeata5onzf7rp26j2quaotjza 73 27 the the DT work_dzeata5onzf7rp26j2quaotjza 73 28 term term NN work_dzeata5onzf7rp26j2quaotjza 73 29 that that WDT work_dzeata5onzf7rp26j2quaotjza 73 30 is be VBZ work_dzeata5onzf7rp26j2quaotjza 73 31 clear clear JJ work_dzeata5onzf7rp26j2quaotjza 73 32 enough enough RB work_dzeata5onzf7rp26j2quaotjza 73 33 to to TO work_dzeata5onzf7rp26j2quaotjza 73 34 characterize characterize VB work_dzeata5onzf7rp26j2quaotjza 73 35 . . . work_dzeata5onzf7rp26j2quaotjza 74 1 The the DT work_dzeata5onzf7rp26j2quaotjza 74 2 remaining remain VBG work_dzeata5onzf7rp26j2quaotjza 74 3 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 74 4 that that WDT work_dzeata5onzf7rp26j2quaotjza 74 5 use use VBP work_dzeata5onzf7rp26j2quaotjza 74 6 the the DT work_dzeata5onzf7rp26j2quaotjza 74 7 term term NN work_dzeata5onzf7rp26j2quaotjza 74 8 make make VBP work_dzeata5onzf7rp26j2quaotjza 74 9 no no DT work_dzeata5onzf7rp26j2quaotjza 74 10 attempt attempt NN work_dzeata5onzf7rp26j2quaotjza 74 11 at at IN work_dzeata5onzf7rp26j2quaotjza 74 12 a a DT work_dzeata5onzf7rp26j2quaotjza 74 13 definition definition NN work_dzeata5onzf7rp26j2quaotjza 74 14 or or CC work_dzeata5onzf7rp26j2quaotjza 74 15 provide provide VB work_dzeata5onzf7rp26j2quaotjza 74 16 an an DT work_dzeata5onzf7rp26j2quaotjza 74 17 ambiguous ambiguous JJ work_dzeata5onzf7rp26j2quaotjza 74 18 explanation explanation NN work_dzeata5onzf7rp26j2quaotjza 74 19 , , , work_dzeata5onzf7rp26j2quaotjza 74 20 intertwined intertwine VBN work_dzeata5onzf7rp26j2quaotjza 74 21 with with IN work_dzeata5onzf7rp26j2quaotjza 74 22 other other JJ work_dzeata5onzf7rp26j2quaotjza 74 23 ideas idea NNS work_dzeata5onzf7rp26j2quaotjza 74 24 , , , work_dzeata5onzf7rp26j2quaotjza 74 25 and and CC work_dzeata5onzf7rp26j2quaotjza 74 26 spread spread VBD work_dzeata5onzf7rp26j2quaotjza 74 27 over over IN work_dzeata5onzf7rp26j2quaotjza 74 28 multiple multiple JJ work_dzeata5onzf7rp26j2quaotjza 74 29 sentences sentence NNS work_dzeata5onzf7rp26j2quaotjza 74 30 . . . work_dzeata5onzf7rp26j2quaotjza 75 1 Within within IN work_dzeata5onzf7rp26j2quaotjza 75 2 the the DT work_dzeata5onzf7rp26j2quaotjza 75 3 set set NN work_dzeata5onzf7rp26j2quaotjza 75 4 of of IN work_dzeata5onzf7rp26j2quaotjza 75 5 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 75 6 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 75 7 identify identify VBP work_dzeata5onzf7rp26j2quaotjza 75 8 two two CD work_dzeata5onzf7rp26j2quaotjza 75 9 themes theme NNS work_dzeata5onzf7rp26j2quaotjza 75 10 : : : work_dzeata5onzf7rp26j2quaotjza 75 11 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 75 12 as as IN work_dzeata5onzf7rp26j2quaotjza 75 13 encapsulation encapsulation NN work_dzeata5onzf7rp26j2quaotjza 75 14 and and CC work_dzeata5onzf7rp26j2quaotjza 75 15 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 75 16 as as IN work_dzeata5onzf7rp26j2quaotjza 75 17 policy policy NN work_dzeata5onzf7rp26j2quaotjza 75 18 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 75 19 . . . work_dzeata5onzf7rp26j2quaotjza 76 1 Sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 76 2 as as IN work_dzeata5onzf7rp26j2quaotjza 76 3 encapsulation encapsulation NN work_dzeata5onzf7rp26j2quaotjza 76 4 has have VBZ work_dzeata5onzf7rp26j2quaotjza 76 5 a a DT work_dzeata5onzf7rp26j2quaotjza 76 6 natural natural JJ work_dzeata5onzf7rp26j2quaotjza 76 7 analogy analogy NN work_dzeata5onzf7rp26j2quaotjza 76 8 : : : work_dzeata5onzf7rp26j2quaotjza 76 9 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 76 10 on on IN work_dzeata5onzf7rp26j2quaotjza 76 11 playgrounds playground NNS work_dzeata5onzf7rp26j2quaotjza 76 12 provide provide VBP work_dzeata5onzf7rp26j2quaotjza 76 13 a a DT work_dzeata5onzf7rp26j2quaotjza 76 14 place place NN work_dzeata5onzf7rp26j2quaotjza 76 15 for for IN work_dzeata5onzf7rp26j2quaotjza 76 16 children child NNS work_dzeata5onzf7rp26j2quaotjza 76 17 to to TO work_dzeata5onzf7rp26j2quaotjza 76 18 play play VB work_dzeata5onzf7rp26j2quaotjza 76 19 with with IN work_dzeata5onzf7rp26j2quaotjza 76 20 indisputably indisputably RB work_dzeata5onzf7rp26j2quaotjza 76 21 - - HYPH work_dzeata5onzf7rp26j2quaotjza 76 22 defined define VBN work_dzeata5onzf7rp26j2quaotjza 76 23 bounds bound NNS work_dzeata5onzf7rp26j2quaotjza 76 24 , , , work_dzeata5onzf7rp26j2quaotjza 76 25 making make VBG work_dzeata5onzf7rp26j2quaotjza 76 26 the the DT work_dzeata5onzf7rp26j2quaotjza 76 27 children child NNS work_dzeata5onzf7rp26j2quaotjza 76 28 easier easy JJR work_dzeata5onzf7rp26j2quaotjza 76 29 to to TO work_dzeata5onzf7rp26j2quaotjza 76 30 watch watch VB work_dzeata5onzf7rp26j2quaotjza 76 31 , , , work_dzeata5onzf7rp26j2quaotjza 76 32 and and CC work_dzeata5onzf7rp26j2quaotjza 76 33 where where WRB work_dzeata5onzf7rp26j2quaotjza 76 34 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 76 35 are be VBP work_dzeata5onzf7rp26j2quaotjza 76 36 less less RBR work_dzeata5onzf7rp26j2quaotjza 76 37 likely likely JJ work_dzeata5onzf7rp26j2quaotjza 76 38 to to TO work_dzeata5onzf7rp26j2quaotjza 76 39 get get VB work_dzeata5onzf7rp26j2quaotjza 76 40 hurt hurt VBN work_dzeata5onzf7rp26j2quaotjza 76 41 or or CC work_dzeata5onzf7rp26j2quaotjza 76 42 hurt hurt VB work_dzeata5onzf7rp26j2quaotjza 76 43 someone someone NN work_dzeata5onzf7rp26j2quaotjza 76 44 else else RB work_dzeata5onzf7rp26j2quaotjza 76 45 . . . work_dzeata5onzf7rp26j2quaotjza 77 1 They -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 77 2 also also RB work_dzeata5onzf7rp26j2quaotjza 77 3 contain contain VBP work_dzeata5onzf7rp26j2quaotjza 77 4 the the DT work_dzeata5onzf7rp26j2quaotjza 77 5 sand sand NN work_dzeata5onzf7rp26j2quaotjza 77 6 , , , work_dzeata5onzf7rp26j2quaotjza 77 7 thus thus RB work_dzeata5onzf7rp26j2quaotjza 77 8 preventing prevent VBG work_dzeata5onzf7rp26j2quaotjza 77 9 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 77 10 from from IN work_dzeata5onzf7rp26j2quaotjza 77 11 getting get VBG work_dzeata5onzf7rp26j2quaotjza 77 12 strewn strew VBN work_dzeata5onzf7rp26j2quaotjza 77 13 across across IN work_dzeata5onzf7rp26j2quaotjza 77 14 neighboring neighboring NN work_dzeata5onzf7rp26j2quaotjza 77 15 surfaces surface NNS work_dzeata5onzf7rp26j2quaotjza 77 16 . . . work_dzeata5onzf7rp26j2quaotjza 78 1 A a DT work_dzeata5onzf7rp26j2quaotjza 78 2 similar similar JJ work_dzeata5onzf7rp26j2quaotjza 78 3 analogy analogy NN work_dzeata5onzf7rp26j2quaotjza 78 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 78 5 used use VBN work_dzeata5onzf7rp26j2quaotjza 78 6 in in IN work_dzeata5onzf7rp26j2quaotjza 78 7 an an DT work_dzeata5onzf7rp26j2quaotjza 78 8 answer answer NN work_dzeata5onzf7rp26j2quaotjza 78 9 on on IN work_dzeata5onzf7rp26j2quaotjza 78 10 the the DT work_dzeata5onzf7rp26j2quaotjza 78 11 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 78 12 StackExchange StackExchange NNP work_dzeata5onzf7rp26j2quaotjza 78 13 to to IN work_dzeata5onzf7rp26j2quaotjza 78 14 the the DT work_dzeata5onzf7rp26j2quaotjza 78 15 question question NN work_dzeata5onzf7rp26j2quaotjza 78 16 , , , work_dzeata5onzf7rp26j2quaotjza 78 17 “ " `` work_dzeata5onzf7rp26j2quaotjza 78 18 What what WP work_dzeata5onzf7rp26j2quaotjza 78 19 is be VBZ work_dzeata5onzf7rp26j2quaotjza 78 20 a a DT work_dzeata5onzf7rp26j2quaotjza 78 21 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 78 22 ? ? . work_dzeata5onzf7rp26j2quaotjza 78 23 ” " '' work_dzeata5onzf7rp26j2quaotjza 78 24 Indeed indeed RB work_dzeata5onzf7rp26j2quaotjza 78 25 , , , work_dzeata5onzf7rp26j2quaotjza 78 26 Wahbe Wahbe NNP work_dzeata5onzf7rp26j2quaotjza 78 27 was be VBD work_dzeata5onzf7rp26j2quaotjza 78 28 working work VBG work_dzeata5onzf7rp26j2quaotjza 78 29 to to TO work_dzeata5onzf7rp26j2quaotjza 78 30 solve solve VB work_dzeata5onzf7rp26j2quaotjza 78 31 the the DT work_dzeata5onzf7rp26j2quaotjza 78 32 problem problem NN work_dzeata5onzf7rp26j2quaotjza 78 33 of of IN work_dzeata5onzf7rp26j2quaotjza 78 34 encapsulating encapsulate VBG work_dzeata5onzf7rp26j2quaotjza 78 35 software software NN work_dzeata5onzf7rp26j2quaotjza 78 36 modules module NNS work_dzeata5onzf7rp26j2quaotjza 78 37 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 78 38 to to TO work_dzeata5onzf7rp26j2quaotjza 78 39 keep keep VB work_dzeata5onzf7rp26j2quaotjza 78 40 a a DT work_dzeata5onzf7rp26j2quaotjza 78 41 fault fault NN work_dzeata5onzf7rp26j2quaotjza 78 42 in in IN work_dzeata5onzf7rp26j2quaotjza 78 43 a a DT work_dzeata5onzf7rp26j2quaotjza 78 44 distrusted distrusted JJ work_dzeata5onzf7rp26j2quaotjza 78 45 module module NN work_dzeata5onzf7rp26j2quaotjza 78 46 from from IN work_dzeata5onzf7rp26j2quaotjza 78 47 affecting affect VBG work_dzeata5onzf7rp26j2quaotjza 78 48 other other JJ work_dzeata5onzf7rp26j2quaotjza 78 49 modules module NNS work_dzeata5onzf7rp26j2quaotjza 78 50 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 78 51 when when WRB work_dzeata5onzf7rp26j2quaotjza 78 52 he -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 78 53 popularized popularize VBD work_dzeata5onzf7rp26j2quaotjza 78 54 the the DT work_dzeata5onzf7rp26j2quaotjza 78 55 term term NN work_dzeata5onzf7rp26j2quaotjza 78 56 in in IN work_dzeata5onzf7rp26j2quaotjza 78 57 this this DT work_dzeata5onzf7rp26j2quaotjza 78 58 domain.1 domain.1 NN work_dzeata5onzf7rp26j2quaotjza 78 59 1 1 CD work_dzeata5onzf7rp26j2quaotjza 78 60 While while IN work_dzeata5onzf7rp26j2quaotjza 78 61 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 78 62 is be VBZ work_dzeata5onzf7rp26j2quaotjza 78 63 clear clear JJ work_dzeata5onzf7rp26j2quaotjza 78 64 from from IN work_dzeata5onzf7rp26j2quaotjza 78 65 at at RB work_dzeata5onzf7rp26j2quaotjza 78 66 least least RBS work_dzeata5onzf7rp26j2quaotjza 78 67 one one CD work_dzeata5onzf7rp26j2quaotjza 78 68 publication publication NN work_dzeata5onzf7rp26j2quaotjza 78 69 that that IN work_dzeata5onzf7rp26j2quaotjza 78 70 the the DT work_dzeata5onzf7rp26j2quaotjza 78 71 term term NN work_dzeata5onzf7rp26j2quaotjza 78 72 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 78 73 was be VBD work_dzeata5onzf7rp26j2quaotjza 78 74 used use VBN work_dzeata5onzf7rp26j2quaotjza 78 75 in in IN work_dzeata5onzf7rp26j2quaotjza 78 76 computer computer NN work_dzeata5onzf7rp26j2quaotjza 78 77 security security NN work_dzeata5onzf7rp26j2quaotjza 78 78 earlier early RBR work_dzeata5onzf7rp26j2quaotjza 78 79 than than IN work_dzeata5onzf7rp26j2quaotjza 78 80 Wahbe Wahbe NNP work_dzeata5onzf7rp26j2quaotjza 78 81 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 78 82 paper paper NN work_dzeata5onzf7rp26j2quaotjza 78 83 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 78 84 Neumann Neumann NNP work_dzeata5onzf7rp26j2quaotjza 78 85 , , , work_dzeata5onzf7rp26j2quaotjza 78 86 1990 1990 CD work_dzeata5onzf7rp26j2quaotjza 78 87 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 78 88 , , , work_dzeata5onzf7rp26j2quaotjza 78 89 many many JJ work_dzeata5onzf7rp26j2quaotjza 78 90 early early JJ work_dzeata5onzf7rp26j2quaotjza 78 91 software software NN work_dzeata5onzf7rp26j2quaotjza 78 92 protection protection NN work_dzeata5onzf7rp26j2quaotjza 78 93 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 78 94 cite cite VBP work_dzeata5onzf7rp26j2quaotjza 78 95 Wahbe Wahbe NNP work_dzeata5onzf7rp26j2quaotjza 78 96 as as IN work_dzeata5onzf7rp26j2quaotjza 78 97 the the DT work_dzeata5onzf7rp26j2quaotjza 78 98 origin origin NN work_dzeata5onzf7rp26j2quaotjza 78 99 of of IN work_dzeata5onzf7rp26j2quaotjza 78 100 the the DT work_dzeata5onzf7rp26j2quaotjza 78 101 “ " `` work_dzeata5onzf7rp26j2quaotjza 78 102 sandbox sandbox JJ work_dzeata5onzf7rp26j2quaotjza 78 103 ” " '' work_dzeata5onzf7rp26j2quaotjza 78 104 method method NN work_dzeata5onzf7rp26j2quaotjza 78 105 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 78 106 Zhong Zhong NNP work_dzeata5onzf7rp26j2quaotjza 78 107 , , , work_dzeata5onzf7rp26j2quaotjza 78 108 Edwards Edwards NNP work_dzeata5onzf7rp26j2quaotjza 78 109 & & CC work_dzeata5onzf7rp26j2quaotjza 78 110 Rees Rees NNPS work_dzeata5onzf7rp26j2quaotjza 78 111 , , , work_dzeata5onzf7rp26j2quaotjza 78 112 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 78 113 ; ; : work_dzeata5onzf7rp26j2quaotjza 78 114 Wallach Wallach NNP work_dzeata5onzf7rp26j2quaotjza 78 115 et et NNP work_dzeata5onzf7rp26j2quaotjza 78 116 al al NNP work_dzeata5onzf7rp26j2quaotjza 78 117 . . NNP work_dzeata5onzf7rp26j2quaotjza 78 118 , , , work_dzeata5onzf7rp26j2quaotjza 78 119 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 78 120 ; ; : work_dzeata5onzf7rp26j2quaotjza 78 121 Schneider schneider NN work_dzeata5onzf7rp26j2quaotjza 78 122 , , , work_dzeata5onzf7rp26j2quaotjza 78 123 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 78 124 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 78 125 . . . work_dzeata5onzf7rp26j2quaotjza 79 1 At at RB work_dzeata5onzf7rp26j2quaotjza 79 2 least least RBS work_dzeata5onzf7rp26j2quaotjza 79 3 one one CD work_dzeata5onzf7rp26j2quaotjza 79 4 early early JJ work_dzeata5onzf7rp26j2quaotjza 79 5 commentator commentator NN work_dzeata5onzf7rp26j2quaotjza 79 6 felt feel VBD work_dzeata5onzf7rp26j2quaotjza 79 7 that that IN work_dzeata5onzf7rp26j2quaotjza 79 8 this this DT work_dzeata5onzf7rp26j2quaotjza 79 9 use use NN work_dzeata5onzf7rp26j2quaotjza 79 10 of of IN work_dzeata5onzf7rp26j2quaotjza 79 11 the the DT work_dzeata5onzf7rp26j2quaotjza 79 12 term term NN work_dzeata5onzf7rp26j2quaotjza 79 13 “ " `` work_dzeata5onzf7rp26j2quaotjza 79 14 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 79 15 ” " '' work_dzeata5onzf7rp26j2quaotjza 79 16 was be VBD work_dzeata5onzf7rp26j2quaotjza 79 17 merely merely RB work_dzeata5onzf7rp26j2quaotjza 79 18 renaming rename VBG work_dzeata5onzf7rp26j2quaotjza 79 19 “ " `` work_dzeata5onzf7rp26j2quaotjza 79 20 trusted trusted JJ work_dzeata5onzf7rp26j2quaotjza 79 21 computing computing NN work_dzeata5onzf7rp26j2quaotjza 79 22 bases basis NNS work_dzeata5onzf7rp26j2quaotjza 79 23 ” " '' work_dzeata5onzf7rp26j2quaotjza 79 24 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 79 25 TCB TCB NNP work_dzeata5onzf7rp26j2quaotjza 79 26 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 79 27 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 79 28 McLean McLean NNP work_dzeata5onzf7rp26j2quaotjza 79 29 , , , work_dzeata5onzf7rp26j2quaotjza 79 30 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 79 31 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 79 32 . . . work_dzeata5onzf7rp26j2quaotjza 80 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 80 2 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 80 3 this this DT work_dzeata5onzf7rp26j2quaotjza 80 4 section section NN work_dzeata5onzf7rp26j2quaotjza 80 5 makes make VBZ work_dzeata5onzf7rp26j2quaotjza 80 6 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 80 7 clear clear JJ work_dzeata5onzf7rp26j2quaotjza 80 8 that that IN work_dzeata5onzf7rp26j2quaotjza 80 9 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 80 10 meet meet VB work_dzeata5onzf7rp26j2quaotjza 80 11 common common JJ work_dzeata5onzf7rp26j2quaotjza 80 12 TCB TCB NNP work_dzeata5onzf7rp26j2quaotjza 80 13 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 80 14 , , , work_dzeata5onzf7rp26j2quaotjza 80 15 but but CC work_dzeata5onzf7rp26j2quaotjza 80 16 that that IN work_dzeata5onzf7rp26j2quaotjza 80 17 not not RB work_dzeata5onzf7rp26j2quaotjza 80 18 all all DT work_dzeata5onzf7rp26j2quaotjza 80 19 TCBs tcb NNS work_dzeata5onzf7rp26j2quaotjza 80 20 are be VBP work_dzeata5onzf7rp26j2quaotjza 80 21 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 80 22 . . . work_dzeata5onzf7rp26j2quaotjza 81 1 Table table NN work_dzeata5onzf7rp26j2quaotjza 81 2 1 1 CD work_dzeata5onzf7rp26j2quaotjza 81 3 lists list VBZ work_dzeata5onzf7rp26j2quaotjza 81 4 the the DT work_dzeata5onzf7rp26j2quaotjza 81 5 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 81 6 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 81 7 found find VBD work_dzeata5onzf7rp26j2quaotjza 81 8 that that IN work_dzeata5onzf7rp26j2quaotjza 81 9 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 81 10 characterize characterize VBP work_dzeata5onzf7rp26j2quaotjza 81 11 as as IN work_dzeata5onzf7rp26j2quaotjza 81 12 falling fall VBG work_dzeata5onzf7rp26j2quaotjza 81 13 within within IN work_dzeata5onzf7rp26j2quaotjza 81 14 the the DT work_dzeata5onzf7rp26j2quaotjza 81 15 theme theme NN work_dzeata5onzf7rp26j2quaotjza 81 16 of of IN work_dzeata5onzf7rp26j2quaotjza 81 17 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 81 18 as as IN work_dzeata5onzf7rp26j2quaotjza 81 19 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 81 20 . . . work_dzeata5onzf7rp26j2quaotjza 82 1 Many many JJ work_dzeata5onzf7rp26j2quaotjza 82 2 of of IN work_dzeata5onzf7rp26j2quaotjza 82 3 these these DT work_dzeata5onzf7rp26j2quaotjza 82 4 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 82 5 use use VBP work_dzeata5onzf7rp26j2quaotjza 82 6 the the DT work_dzeata5onzf7rp26j2quaotjza 82 7 term term NN work_dzeata5onzf7rp26j2quaotjza 82 8 “ " `` work_dzeata5onzf7rp26j2quaotjza 82 9 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 82 10 , , , work_dzeata5onzf7rp26j2quaotjza 82 11 ” " '' work_dzeata5onzf7rp26j2quaotjza 82 12 but but CC work_dzeata5onzf7rp26j2quaotjza 82 13 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 82 14 prefer prefer VBP work_dzeata5onzf7rp26j2quaotjza 82 15 the the DT work_dzeata5onzf7rp26j2quaotjza 82 16 use use NN work_dzeata5onzf7rp26j2quaotjza 82 17 of of IN work_dzeata5onzf7rp26j2quaotjza 82 18 encapsulation encapsulation NN work_dzeata5onzf7rp26j2quaotjza 82 19 . . . work_dzeata5onzf7rp26j2quaotjza 83 1 In in IN work_dzeata5onzf7rp26j2quaotjza 83 2 Object Object NNP work_dzeata5onzf7rp26j2quaotjza 83 3 Oriented Oriented NNP work_dzeata5onzf7rp26j2quaotjza 83 4 Programming Programming NNP work_dzeata5onzf7rp26j2quaotjza 83 5 , , , work_dzeata5onzf7rp26j2quaotjza 83 6 an an DT work_dzeata5onzf7rp26j2quaotjza 83 7 object object NN work_dzeata5onzf7rp26j2quaotjza 83 8 encapsulates encapsulate VBZ work_dzeata5onzf7rp26j2quaotjza 83 9 related related JJ work_dzeata5onzf7rp26j2quaotjza 83 10 components component NNS work_dzeata5onzf7rp26j2quaotjza 83 11 and and CC work_dzeata5onzf7rp26j2quaotjza 83 12 selectively selectively RB work_dzeata5onzf7rp26j2quaotjza 83 13 restricts restrict VBZ work_dzeata5onzf7rp26j2quaotjza 83 14 access access NN work_dzeata5onzf7rp26j2quaotjza 83 15 to to IN work_dzeata5onzf7rp26j2quaotjza 83 16 some some DT work_dzeata5onzf7rp26j2quaotjza 83 17 of of IN work_dzeata5onzf7rp26j2quaotjza 83 18 those those DT work_dzeata5onzf7rp26j2quaotjza 83 19 components component NNS work_dzeata5onzf7rp26j2quaotjza 83 20 . . . work_dzeata5onzf7rp26j2quaotjza 84 1 Isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 84 2 , , , work_dzeata5onzf7rp26j2quaotjza 84 3 on on IN work_dzeata5onzf7rp26j2quaotjza 84 4 the the DT work_dzeata5onzf7rp26j2quaotjza 84 5 other other JJ work_dzeata5onzf7rp26j2quaotjza 84 6 hand hand NN work_dzeata5onzf7rp26j2quaotjza 84 7 , , , work_dzeata5onzf7rp26j2quaotjza 84 8 sometimes sometimes RB work_dzeata5onzf7rp26j2quaotjza 84 9 refers refer VBZ work_dzeata5onzf7rp26j2quaotjza 84 10 to to IN work_dzeata5onzf7rp26j2quaotjza 84 11 a a DT work_dzeata5onzf7rp26j2quaotjza 84 12 stronger strong JJR work_dzeata5onzf7rp26j2quaotjza 84 13 property property NN work_dzeata5onzf7rp26j2quaotjza 84 14 in in IN work_dzeata5onzf7rp26j2quaotjza 84 15 which which WDT work_dzeata5onzf7rp26j2quaotjza 84 16 modules module NNS work_dzeata5onzf7rp26j2quaotjza 84 17 use use VBP work_dzeata5onzf7rp26j2quaotjza 84 18 entirely entirely RB work_dzeata5onzf7rp26j2quaotjza 84 19 different different JJ work_dzeata5onzf7rp26j2quaotjza 84 20 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 84 21 and and CC work_dzeata5onzf7rp26j2quaotjza 84 22 therefore therefore RB work_dzeata5onzf7rp26j2quaotjza 84 23 can can MD work_dzeata5onzf7rp26j2quaotjza 84 24 not not RB work_dzeata5onzf7rp26j2quaotjza 84 25 interfere interfere VB work_dzeata5onzf7rp26j2quaotjza 84 26 with with IN work_dzeata5onzf7rp26j2quaotjza 84 27 each each DT work_dzeata5onzf7rp26j2quaotjza 84 28 other other JJ work_dzeata5onzf7rp26j2quaotjza 84 29 at at RB work_dzeata5onzf7rp26j2quaotjza 84 30 all all RB work_dzeata5onzf7rp26j2quaotjza 84 31 . . . work_dzeata5onzf7rp26j2quaotjza 85 1 Sandboxed sandboxe VBN work_dzeata5onzf7rp26j2quaotjza 85 2 components component NNS work_dzeata5onzf7rp26j2quaotjza 85 3 often often RB work_dzeata5onzf7rp26j2quaotjza 85 4 need need VBP work_dzeata5onzf7rp26j2quaotjza 85 5 to to TO work_dzeata5onzf7rp26j2quaotjza 85 6 cooperate cooperate VB work_dzeata5onzf7rp26j2quaotjza 85 7 to to TO work_dzeata5onzf7rp26j2quaotjza 85 8 be be VB work_dzeata5onzf7rp26j2quaotjza 85 9 useful useful JJ work_dzeata5onzf7rp26j2quaotjza 85 10 . . . work_dzeata5onzf7rp26j2quaotjza 86 1 Cooperation cooperation NN work_dzeata5onzf7rp26j2quaotjza 86 2 and and CC work_dzeata5onzf7rp26j2quaotjza 86 3 the the DT work_dzeata5onzf7rp26j2quaotjza 86 4 idea idea NN work_dzeata5onzf7rp26j2quaotjza 86 5 of of IN work_dzeata5onzf7rp26j2quaotjza 86 6 disjoint disjoint NN work_dzeata5onzf7rp26j2quaotjza 86 7 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 86 8 are be VBP work_dzeata5onzf7rp26j2quaotjza 86 9 present present JJ work_dzeata5onzf7rp26j2quaotjza 86 10 in in IN work_dzeata5onzf7rp26j2quaotjza 86 11 Wahbe Wahbe NNP work_dzeata5onzf7rp26j2quaotjza 86 12 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 86 13 original original JJ work_dzeata5onzf7rp26j2quaotjza 86 14 use use NN work_dzeata5onzf7rp26j2quaotjza 86 15 of of IN work_dzeata5onzf7rp26j2quaotjza 86 16 the the DT work_dzeata5onzf7rp26j2quaotjza 86 17 term term NN work_dzeata5onzf7rp26j2quaotjza 86 18 “ " `` work_dzeata5onzf7rp26j2quaotjza 86 19 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 86 20 ” " '' work_dzeata5onzf7rp26j2quaotjza 86 21 : : : work_dzeata5onzf7rp26j2quaotjza 86 22 Wahbe Wahbe NNP work_dzeata5onzf7rp26j2quaotjza 86 23 was be VBD work_dzeata5onzf7rp26j2quaotjza 86 24 trying try VBG work_dzeata5onzf7rp26j2quaotjza 86 25 to to TO work_dzeata5onzf7rp26j2quaotjza 86 26 reduce reduce VB work_dzeata5onzf7rp26j2quaotjza 86 27 the the DT work_dzeata5onzf7rp26j2quaotjza 86 28 communication communication NN work_dzeata5onzf7rp26j2quaotjza 86 29 overhead overhead RB work_dzeata5onzf7rp26j2quaotjza 86 30 present present JJ work_dzeata5onzf7rp26j2quaotjza 86 31 in in IN work_dzeata5onzf7rp26j2quaotjza 86 32 hardware hardware NN work_dzeata5onzf7rp26j2quaotjza 86 33 fault fault NN work_dzeata5onzf7rp26j2quaotjza 86 34 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 86 35 by by IN work_dzeata5onzf7rp26j2quaotjza 86 36 instead instead RB work_dzeata5onzf7rp26j2quaotjza 86 37 creating create VBG work_dzeata5onzf7rp26j2quaotjza 86 38 software software NN work_dzeata5onzf7rp26j2quaotjza 86 39 domains domain NNS work_dzeata5onzf7rp26j2quaotjza 86 40 that that WDT work_dzeata5onzf7rp26j2quaotjza 86 41 run run VBP work_dzeata5onzf7rp26j2quaotjza 86 42 in in IN work_dzeata5onzf7rp26j2quaotjza 86 43 the the DT work_dzeata5onzf7rp26j2quaotjza 86 44 same same JJ work_dzeata5onzf7rp26j2quaotjza 86 45 hardware hardware NN work_dzeata5onzf7rp26j2quaotjza 86 46 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 86 47 , , , work_dzeata5onzf7rp26j2quaotjza 86 48 but but CC work_dzeata5onzf7rp26j2quaotjza 86 49 that that DT work_dzeata5onzf7rp26j2quaotjza 86 50 do do VBP work_dzeata5onzf7rp26j2quaotjza 86 51 not not RB work_dzeata5onzf7rp26j2quaotjza 86 52 interfere interfere VB work_dzeata5onzf7rp26j2quaotjza 86 53 when when WRB work_dzeata5onzf7rp26j2quaotjza 86 54 faulty faulty JJ work_dzeata5onzf7rp26j2quaotjza 86 55 . . . work_dzeata5onzf7rp26j2quaotjza 87 1 One one CD work_dzeata5onzf7rp26j2quaotjza 87 2 potential potential JJ work_dzeata5onzf7rp26j2quaotjza 87 3 counterpoint counterpoint NN work_dzeata5onzf7rp26j2quaotjza 87 4 to to IN work_dzeata5onzf7rp26j2quaotjza 87 5 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 87 6 use use NN work_dzeata5onzf7rp26j2quaotjza 87 7 of of IN work_dzeata5onzf7rp26j2quaotjza 87 8 “ " `` work_dzeata5onzf7rp26j2quaotjza 87 9 encapsulation encapsulation NN work_dzeata5onzf7rp26j2quaotjza 87 10 ” " '' work_dzeata5onzf7rp26j2quaotjza 87 11 is be VBZ work_dzeata5onzf7rp26j2quaotjza 87 12 that that IN work_dzeata5onzf7rp26j2quaotjza 87 13 the the DT work_dzeata5onzf7rp26j2quaotjza 87 14 term term NN work_dzeata5onzf7rp26j2quaotjza 87 15 typically typically RB work_dzeata5onzf7rp26j2quaotjza 87 16 is be VBZ work_dzeata5onzf7rp26j2quaotjza 87 17 used use VBN work_dzeata5onzf7rp26j2quaotjza 87 18 to to TO work_dzeata5onzf7rp26j2quaotjza 87 19 refer refer VB work_dzeata5onzf7rp26j2quaotjza 87 20 to to IN work_dzeata5onzf7rp26j2quaotjza 87 21 cases case NNS work_dzeata5onzf7rp26j2quaotjza 87 22 where where WRB work_dzeata5onzf7rp26j2quaotjza 87 23 the the DT work_dzeata5onzf7rp26j2quaotjza 87 24 inside inside NN work_dzeata5onzf7rp26j2quaotjza 87 25 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 87 26 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 87 27 , , , work_dzeata5onzf7rp26j2quaotjza 87 28 of of IN work_dzeata5onzf7rp26j2quaotjza 87 29 an an DT work_dzeata5onzf7rp26j2quaotjza 87 30 object object NN work_dzeata5onzf7rp26j2quaotjza 87 31 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 87 32 is be VBZ work_dzeata5onzf7rp26j2quaotjza 87 33 protected protect VBN work_dzeata5onzf7rp26j2quaotjza 87 34 from from IN work_dzeata5onzf7rp26j2quaotjza 87 35 the the DT work_dzeata5onzf7rp26j2quaotjza 87 36 outside outside NN work_dzeata5onzf7rp26j2quaotjza 87 37 , , , work_dzeata5onzf7rp26j2quaotjza 87 38 but but CC work_dzeata5onzf7rp26j2quaotjza 87 39 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 87 40 often often RB work_dzeata5onzf7rp26j2quaotjza 87 41 protect protect VBP work_dzeata5onzf7rp26j2quaotjza 87 42 the the DT work_dzeata5onzf7rp26j2quaotjza 87 43 external external JJ work_dzeata5onzf7rp26j2quaotjza 87 44 system system NN work_dzeata5onzf7rp26j2quaotjza 87 45 from from IN work_dzeata5onzf7rp26j2quaotjza 87 46 the the DT work_dzeata5onzf7rp26j2quaotjza 87 47 contents content NNS work_dzeata5onzf7rp26j2quaotjza 87 48 of of IN work_dzeata5onzf7rp26j2quaotjza 87 49 the the DT work_dzeata5onzf7rp26j2quaotjza 87 50 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 87 51 . . . work_dzeata5onzf7rp26j2quaotjza 88 1 While while IN work_dzeata5onzf7rp26j2quaotjza 88 2 this this DT work_dzeata5onzf7rp26j2quaotjza 88 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 88 4 a a DT work_dzeata5onzf7rp26j2quaotjza 88 5 fair fair JJ work_dzeata5onzf7rp26j2quaotjza 88 6 point point NN work_dzeata5onzf7rp26j2quaotjza 88 7 , , , work_dzeata5onzf7rp26j2quaotjza 88 8 this this DT work_dzeata5onzf7rp26j2quaotjza 88 9 paper paper NN work_dzeata5onzf7rp26j2quaotjza 88 10 does do VBZ work_dzeata5onzf7rp26j2quaotjza 88 11 discuss discuss VB work_dzeata5onzf7rp26j2quaotjza 88 12 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 88 13 that that WDT work_dzeata5onzf7rp26j2quaotjza 88 14 protect protect VBP work_dzeata5onzf7rp26j2quaotjza 88 15 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 88 16 contents content NNS work_dzeata5onzf7rp26j2quaotjza 88 17 from from IN work_dzeata5onzf7rp26j2quaotjza 88 18 the the DT work_dzeata5onzf7rp26j2quaotjza 88 19 outside outside NN work_dzeata5onzf7rp26j2quaotjza 88 20 and and CC work_dzeata5onzf7rp26j2quaotjza 88 21 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 88 22 exist exist VBP work_dzeata5onzf7rp26j2quaotjza 88 23 that that WDT work_dzeata5onzf7rp26j2quaotjza 88 24 simultaneously simultaneously RB work_dzeata5onzf7rp26j2quaotjza 88 25 defend defend VBP work_dzeata5onzf7rp26j2quaotjza 88 26 the the DT work_dzeata5onzf7rp26j2quaotjza 88 27 inside inside NN work_dzeata5onzf7rp26j2quaotjza 88 28 from from IN work_dzeata5onzf7rp26j2quaotjza 88 29 the the DT work_dzeata5onzf7rp26j2quaotjza 88 30 outside outside NN work_dzeata5onzf7rp26j2quaotjza 88 31 and and CC work_dzeata5onzf7rp26j2quaotjza 88 32 vice vice NN work_dzeata5onzf7rp26j2quaotjza 88 33 versa versa RB work_dzeata5onzf7rp26j2quaotjza 88 34 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 88 35 Li Li NNP work_dzeata5onzf7rp26j2quaotjza 88 36 et et FW work_dzeata5onzf7rp26j2quaotjza 88 37 al al NNP work_dzeata5onzf7rp26j2quaotjza 88 38 . . NNP work_dzeata5onzf7rp26j2quaotjza 88 39 , , , work_dzeata5onzf7rp26j2quaotjza 88 40 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 88 41 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 88 42 . . . work_dzeata5onzf7rp26j2quaotjza 89 1 Furthermore furthermore RB work_dzeata5onzf7rp26j2quaotjza 89 2 , , , work_dzeata5onzf7rp26j2quaotjza 89 3 one one PRP work_dzeata5onzf7rp26j2quaotjza 89 4 can can MD work_dzeata5onzf7rp26j2quaotjza 89 5 consider consider VB work_dzeata5onzf7rp26j2quaotjza 89 6 that that IN work_dzeata5onzf7rp26j2quaotjza 89 7 a a DT work_dzeata5onzf7rp26j2quaotjza 89 8 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 89 9 encapsulates encapsulate VBZ work_dzeata5onzf7rp26j2quaotjza 89 10 an an DT work_dzeata5onzf7rp26j2quaotjza 89 11 external external JJ work_dzeata5onzf7rp26j2quaotjza 89 12 system system NN work_dzeata5onzf7rp26j2quaotjza 89 13 that that WDT work_dzeata5onzf7rp26j2quaotjza 89 14 must must MD work_dzeata5onzf7rp26j2quaotjza 89 15 be be VB work_dzeata5onzf7rp26j2quaotjza 89 16 protected protect VBN work_dzeata5onzf7rp26j2quaotjza 89 17 from from IN work_dzeata5onzf7rp26j2quaotjza 89 18 a a DT work_dzeata5onzf7rp26j2quaotjza 89 19 potentially potentially RB work_dzeata5onzf7rp26j2quaotjza 89 20 malicious malicious JJ work_dzeata5onzf7rp26j2quaotjza 89 21 component component NN work_dzeata5onzf7rp26j2quaotjza 89 22 . . . work_dzeata5onzf7rp26j2quaotjza 90 1 Given give VBN work_dzeata5onzf7rp26j2quaotjza 90 2 these these DT work_dzeata5onzf7rp26j2quaotjza 90 3 points point NNS work_dzeata5onzf7rp26j2quaotjza 90 4 , , , work_dzeata5onzf7rp26j2quaotjza 90 5 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 90 6 maintain maintain VBP work_dzeata5onzf7rp26j2quaotjza 90 7 that that DT work_dzeata5onzf7rp26j2quaotjza 90 8 encapsulation encapsulation NN work_dzeata5onzf7rp26j2quaotjza 90 9 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 90 10 recognition recognition NN work_dzeata5onzf7rp26j2quaotjza 90 11 of of IN work_dzeata5onzf7rp26j2quaotjza 90 12 cooperation cooperation NN work_dzeata5onzf7rp26j2quaotjza 90 13 is be VBZ work_dzeata5onzf7rp26j2quaotjza 90 14 important important JJ work_dzeata5onzf7rp26j2quaotjza 90 15 enough enough RB work_dzeata5onzf7rp26j2quaotjza 90 16 to to TO work_dzeata5onzf7rp26j2quaotjza 90 17 use use VB work_dzeata5onzf7rp26j2quaotjza 90 18 the the DT work_dzeata5onzf7rp26j2quaotjza 90 19 term term NN work_dzeata5onzf7rp26j2quaotjza 90 20 over over IN work_dzeata5onzf7rp26j2quaotjza 90 21 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 90 22 . . . work_dzeata5onzf7rp26j2quaotjza 91 1 Nevertheless nevertheless RB work_dzeata5onzf7rp26j2quaotjza 91 2 , , , work_dzeata5onzf7rp26j2quaotjza 91 3 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 91 4 retain retain VBP work_dzeata5onzf7rp26j2quaotjza 91 5 the the DT work_dzeata5onzf7rp26j2quaotjza 91 6 use use NN work_dzeata5onzf7rp26j2quaotjza 91 7 of of IN work_dzeata5onzf7rp26j2quaotjza 91 8 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 91 9 when when WRB work_dzeata5onzf7rp26j2quaotjza 91 10 discussing discuss VBG work_dzeata5onzf7rp26j2quaotjza 91 11 existing exist VBG work_dzeata5onzf7rp26j2quaotjza 91 12 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 91 13 . . . work_dzeata5onzf7rp26j2quaotjza 92 1 Table table NN work_dzeata5onzf7rp26j2quaotjza 92 2 2 2 CD work_dzeata5onzf7rp26j2quaotjza 92 3 presents present VBZ work_dzeata5onzf7rp26j2quaotjza 92 4 seven seven CD work_dzeata5onzf7rp26j2quaotjza 92 5 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 92 6 that that WDT work_dzeata5onzf7rp26j2quaotjza 92 7 discuss discuss VBP work_dzeata5onzf7rp26j2quaotjza 92 8 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 92 9 in in IN work_dzeata5onzf7rp26j2quaotjza 92 10 terms term NNS work_dzeata5onzf7rp26j2quaotjza 92 11 of of IN work_dzeata5onzf7rp26j2quaotjza 92 12 restrictions restriction NNS work_dzeata5onzf7rp26j2quaotjza 92 13 or or CC work_dzeata5onzf7rp26j2quaotjza 92 14 policy policy NN work_dzeata5onzf7rp26j2quaotjza 92 15 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 92 16 . . . work_dzeata5onzf7rp26j2quaotjza 93 1 These these DT work_dzeata5onzf7rp26j2quaotjza 93 2 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 93 3 reflect reflect VBP work_dzeata5onzf7rp26j2quaotjza 93 4 different different JJ work_dzeata5onzf7rp26j2quaotjza 93 5 dimensions dimension NNS work_dzeata5onzf7rp26j2quaotjza 93 6 of of IN work_dzeata5onzf7rp26j2quaotjza 93 7 the the DT work_dzeata5onzf7rp26j2quaotjza 93 8 same same JJ work_dzeata5onzf7rp26j2quaotjza 93 9 idea idea NN work_dzeata5onzf7rp26j2quaotjza 93 10 : : : work_dzeata5onzf7rp26j2quaotjza 93 11 a a DT work_dzeata5onzf7rp26j2quaotjza 93 12 security security NN work_dzeata5onzf7rp26j2quaotjza 93 13 policy policy NN work_dzeata5onzf7rp26j2quaotjza 93 14 can can MD work_dzeata5onzf7rp26j2quaotjza 93 15 state state VB work_dzeata5onzf7rp26j2quaotjza 93 16 what what WP work_dzeata5onzf7rp26j2quaotjza 93 17 is be VBZ work_dzeata5onzf7rp26j2quaotjza 93 18 allowed allow VBN work_dzeata5onzf7rp26j2quaotjza 93 19 , , , work_dzeata5onzf7rp26j2quaotjza 93 20 verboten verboten VB work_dzeata5onzf7rp26j2quaotjza 93 21 , , , work_dzeata5onzf7rp26j2quaotjza 93 22 or or CC work_dzeata5onzf7rp26j2quaotjza 93 23 both both DT work_dzeata5onzf7rp26j2quaotjza 93 24 . . . work_dzeata5onzf7rp26j2quaotjza 94 1 The the DT work_dzeata5onzf7rp26j2quaotjza 94 2 “ " `` work_dzeata5onzf7rp26j2quaotjza 94 3 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 94 4 ” " '' work_dzeata5onzf7rp26j2quaotjza 94 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 94 6 the the DT work_dzeata5onzf7rp26j2quaotjza 94 7 subject subject NN work_dzeata5onzf7rp26j2quaotjza 94 8 that that WDT work_dzeata5onzf7rp26j2quaotjza 94 9 enforces enforce VBZ work_dzeata5onzf7rp26j2quaotjza 94 10 the the DT work_dzeata5onzf7rp26j2quaotjza 94 11 policy policy NN work_dzeata5onzf7rp26j2quaotjza 94 12 or or CC work_dzeata5onzf7rp26j2quaotjza 94 13 “ " `` work_dzeata5onzf7rp26j2quaotjza 94 14 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 94 15 ” " '' work_dzeata5onzf7rp26j2quaotjza 94 16 is be VBZ work_dzeata5onzf7rp26j2quaotjza 94 17 the the DT work_dzeata5onzf7rp26j2quaotjza 94 18 act act NN work_dzeata5onzf7rp26j2quaotjza 94 19 of of IN work_dzeata5onzf7rp26j2quaotjza 94 20 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 94 21 a a DT work_dzeata5onzf7rp26j2quaotjza 94 22 policy policy NN work_dzeata5onzf7rp26j2quaotjza 94 23 . . . work_dzeata5onzf7rp26j2quaotjza 95 1 In in IN work_dzeata5onzf7rp26j2quaotjza 95 2 short short JJ work_dzeata5onzf7rp26j2quaotjza 95 3 , , , work_dzeata5onzf7rp26j2quaotjza 95 4 these these DT work_dzeata5onzf7rp26j2quaotjza 95 5 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 95 6 cast cast VBD work_dzeata5onzf7rp26j2quaotjza 95 7 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 95 8 as as IN work_dzeata5onzf7rp26j2quaotjza 95 9 policy policy NN work_dzeata5onzf7rp26j2quaotjza 95 10 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 95 11 . . . work_dzeata5onzf7rp26j2quaotjza 96 1 Careful careful JJ work_dzeata5onzf7rp26j2quaotjza 96 2 inspection inspection NN work_dzeata5onzf7rp26j2quaotjza 96 3 of of IN work_dzeata5onzf7rp26j2quaotjza 96 4 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 96 5 definition definition NN work_dzeata5onzf7rp26j2quaotjza 96 6 tables table NNS work_dzeata5onzf7rp26j2quaotjza 96 7 shows show VBZ work_dzeata5onzf7rp26j2quaotjza 96 8 that that IN work_dzeata5onzf7rp26j2quaotjza 96 9 the the DT work_dzeata5onzf7rp26j2quaotjza 96 10 same same JJ work_dzeata5onzf7rp26j2quaotjza 96 11 technique technique NN work_dzeata5onzf7rp26j2quaotjza 96 12 , , , work_dzeata5onzf7rp26j2quaotjza 96 13 Sofware- Sofware- NNP work_dzeata5onzf7rp26j2quaotjza 96 14 based base VBN work_dzeata5onzf7rp26j2quaotjza 96 15 Fault Fault NNP work_dzeata5onzf7rp26j2quaotjza 96 16 Isolation Isolation NNP work_dzeata5onzf7rp26j2quaotjza 96 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 96 18 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 96 19 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 96 20 , , , work_dzeata5onzf7rp26j2quaotjza 96 21 appears appear VBZ work_dzeata5onzf7rp26j2quaotjza 96 22 in in IN work_dzeata5onzf7rp26j2quaotjza 96 23 both both DT work_dzeata5onzf7rp26j2quaotjza 96 24 tables table NNS work_dzeata5onzf7rp26j2quaotjza 96 25 . . . work_dzeata5onzf7rp26j2quaotjza 97 1 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 97 2 explicitly explicitly RB work_dzeata5onzf7rp26j2quaotjza 97 3 states state VBZ work_dzeata5onzf7rp26j2quaotjza 97 4 that that IN work_dzeata5onzf7rp26j2quaotjza 97 5 hardening harden VBG work_dzeata5onzf7rp26j2quaotjza 97 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 97 7 not not RB work_dzeata5onzf7rp26j2quaotjza 97 8 used use VBN work_dzeata5onzf7rp26j2quaotjza 97 9 in in IN work_dzeata5onzf7rp26j2quaotjza 97 10 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 97 11 , , , work_dzeata5onzf7rp26j2quaotjza 97 12 but but CC work_dzeata5onzf7rp26j2quaotjza 97 13 McCamant McCamant NNP work_dzeata5onzf7rp26j2quaotjza 97 14 very very RB work_dzeata5onzf7rp26j2quaotjza 97 15 clearly clearly RB work_dzeata5onzf7rp26j2quaotjza 97 16 refers refer VBZ work_dzeata5onzf7rp26j2quaotjza 97 17 to to IN work_dzeata5onzf7rp26j2quaotjza 97 18 operations operation NNS work_dzeata5onzf7rp26j2quaotjza 97 19 being be VBG work_dzeata5onzf7rp26j2quaotjza 97 20 “ " `` work_dzeata5onzf7rp26j2quaotjza 97 21 allowed allow VBN work_dzeata5onzf7rp26j2quaotjza 97 22 ” " '' work_dzeata5onzf7rp26j2quaotjza 97 23 and and CC work_dzeata5onzf7rp26j2quaotjza 97 24 the the DT work_dzeata5onzf7rp26j2quaotjza 97 25 existence existence NN work_dzeata5onzf7rp26j2quaotjza 97 26 of of IN work_dzeata5onzf7rp26j2quaotjza 97 27 a a DT work_dzeata5onzf7rp26j2quaotjza 97 28 policy policy NN work_dzeata5onzf7rp26j2quaotjza 97 29 . . . work_dzeata5onzf7rp26j2quaotjza 98 1 While while IN work_dzeata5onzf7rp26j2quaotjza 98 2 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 98 3 could could MD work_dzeata5onzf7rp26j2quaotjza 98 4 seem seem VB work_dzeata5onzf7rp26j2quaotjza 98 5 that that IN work_dzeata5onzf7rp26j2quaotjza 98 6 the the DT work_dzeata5onzf7rp26j2quaotjza 98 7 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 98 8 as as IN work_dzeata5onzf7rp26j2quaotjza 98 9 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 98 10 and and CC work_dzeata5onzf7rp26j2quaotjza 98 11 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 98 12 as as IN work_dzeata5onzf7rp26j2quaotjza 98 13 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 98 14 et et NNP work_dzeata5onzf7rp26j2quaotjza 98 15 al al NNP work_dzeata5onzf7rp26j2quaotjza 98 16 . . . work_dzeata5onzf7rp26j2quaotjza 99 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 99 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 99 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 99 4 , , , work_dzeata5onzf7rp26j2quaotjza 99 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 99 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 99 7 . . . work_dzeata5onzf7rp26j2quaotjza 100 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 100 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 100 3 , , , work_dzeata5onzf7rp26j2quaotjza 100 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 100 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 100 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 100 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 100 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 100 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 100 10 4/36 4/36 NNP work_dzeata5onzf7rp26j2quaotjza 100 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_dzeata5onzf7rp26j2quaotjza 100 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 100 13 Table table NN work_dzeata5onzf7rp26j2quaotjza 100 14 1 1 CD work_dzeata5onzf7rp26j2quaotjza 100 15 Definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 100 16 that that WDT work_dzeata5onzf7rp26j2quaotjza 100 17 speak speak VBP work_dzeata5onzf7rp26j2quaotjza 100 18 about about IN work_dzeata5onzf7rp26j2quaotjza 100 19 “ " `` work_dzeata5onzf7rp26j2quaotjza 100 20 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 100 21 ” " '' work_dzeata5onzf7rp26j2quaotjza 100 22 in in IN work_dzeata5onzf7rp26j2quaotjza 100 23 terms term NNS work_dzeata5onzf7rp26j2quaotjza 100 24 of of IN work_dzeata5onzf7rp26j2quaotjza 100 25 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 100 26 . . . work_dzeata5onzf7rp26j2quaotjza 101 1 Reference reference NN work_dzeata5onzf7rp26j2quaotjza 101 2 Quote Quote NNP work_dzeata5onzf7rp26j2quaotjza 101 3 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 101 4 et et FW work_dzeata5onzf7rp26j2quaotjza 101 5 al al NNP work_dzeata5onzf7rp26j2quaotjza 101 6 . . . work_dzeata5onzf7rp26j2quaotjza 102 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 102 2 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 102 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 102 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 102 5 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 102 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 102 7 Software(-based software(-based JJ work_dzeata5onzf7rp26j2quaotjza 102 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 102 9 Fault Fault NNP work_dzeata5onzf7rp26j2quaotjza 102 10 Isolation Isolation NNP work_dzeata5onzf7rp26j2quaotjza 102 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 102 12 uses use VBZ work_dzeata5onzf7rp26j2quaotjza 102 13 instruction instruction NN work_dzeata5onzf7rp26j2quaotjza 102 14 rewriting rewrite VBG work_dzeata5onzf7rp26j2quaotjza 102 15 but but CC work_dzeata5onzf7rp26j2quaotjza 102 16 provides provide VBZ work_dzeata5onzf7rp26j2quaotjza 102 17 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 102 18 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 102 19 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 102 20 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 102 21 rather rather RB work_dzeata5onzf7rp26j2quaotjza 102 22 than than IN work_dzeata5onzf7rp26j2quaotjza 102 23 hardening harden VBG work_dzeata5onzf7rp26j2quaotjza 102 24 , , , work_dzeata5onzf7rp26j2quaotjza 102 25 typically typically RB work_dzeata5onzf7rp26j2quaotjza 102 26 allowing allow VBG work_dzeata5onzf7rp26j2quaotjza 102 27 jumps jump VBZ work_dzeata5onzf7rp26j2quaotjza 102 28 anywhere anywhere RB work_dzeata5onzf7rp26j2quaotjza 102 29 within within IN work_dzeata5onzf7rp26j2quaotjza 102 30 a a DT work_dzeata5onzf7rp26j2quaotjza 102 31 sandboxed sandboxed JJ work_dzeata5onzf7rp26j2quaotjza 102 32 code code NN work_dzeata5onzf7rp26j2quaotjza 102 33 region region NN work_dzeata5onzf7rp26j2quaotjza 102 34 . . . work_dzeata5onzf7rp26j2quaotjza 102 35 ” " '' work_dzeata5onzf7rp26j2quaotjza 102 36 Zeng Zeng NNP work_dzeata5onzf7rp26j2quaotjza 102 37 , , , work_dzeata5onzf7rp26j2quaotjza 102 38 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 102 39 & & CC work_dzeata5onzf7rp26j2quaotjza 102 40 Erlingsson Erlingsson NNP work_dzeata5onzf7rp26j2quaotjza 102 41 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 102 42 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 102 43 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 102 44 “ " `` work_dzeata5onzf7rp26j2quaotjza 102 45 It -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 102 46 is be VBZ work_dzeata5onzf7rp26j2quaotjza 102 47 a a DT work_dzeata5onzf7rp26j2quaotjza 102 48 code code NN work_dzeata5onzf7rp26j2quaotjza 102 49 - - HYPH work_dzeata5onzf7rp26j2quaotjza 102 50 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 102 51 technique technique NN work_dzeata5onzf7rp26j2quaotjza 102 52 that that WDT work_dzeata5onzf7rp26j2quaotjza 102 53 isolates isolate VBZ work_dzeata5onzf7rp26j2quaotjza 102 54 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 102 55 modules module NNS work_dzeata5onzf7rp26j2quaotjza 102 56 from from IN work_dzeata5onzf7rp26j2quaotjza 102 57 trusted trusted JJ work_dzeata5onzf7rp26j2quaotjza 102 58 environments environment NNS work_dzeata5onzf7rp26j2quaotjza 102 59 . . . work_dzeata5onzf7rp26j2quaotjza 103 1 . . . work_dzeata5onzf7rp26j2quaotjza 104 1 . . . work_dzeata5onzf7rp26j2quaotjza 105 1 . . . work_dzeata5onzf7rp26j2quaotjza 106 1 In in IN work_dzeata5onzf7rp26j2quaotjza 106 2 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 106 3 , , , work_dzeata5onzf7rp26j2quaotjza 106 4 checks check NNS work_dzeata5onzf7rp26j2quaotjza 106 5 are be VBP work_dzeata5onzf7rp26j2quaotjza 106 6 inserted insert VBN work_dzeata5onzf7rp26j2quaotjza 106 7 before before IN work_dzeata5onzf7rp26j2quaotjza 106 8 memory memory NN work_dzeata5onzf7rp26j2quaotjza 106 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 106 10 access access NN work_dzeata5onzf7rp26j2quaotjza 106 11 and and CC work_dzeata5onzf7rp26j2quaotjza 106 12 control control NN work_dzeata5onzf7rp26j2quaotjza 106 13 - - HYPH work_dzeata5onzf7rp26j2quaotjza 106 14 flow flow NN work_dzeata5onzf7rp26j2quaotjza 106 15 instructions instruction NNS work_dzeata5onzf7rp26j2quaotjza 106 16 to to TO work_dzeata5onzf7rp26j2quaotjza 106 17 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 106 18 memory memory NN work_dzeata5onzf7rp26j2quaotjza 106 19 access access NN work_dzeata5onzf7rp26j2quaotjza 106 20 and and CC work_dzeata5onzf7rp26j2quaotjza 106 21 control control NN work_dzeata5onzf7rp26j2quaotjza 106 22 flow flow NN work_dzeata5onzf7rp26j2quaotjza 106 23 stay stay VB work_dzeata5onzf7rp26j2quaotjza 106 24 in in IN work_dzeata5onzf7rp26j2quaotjza 106 25 a a DT work_dzeata5onzf7rp26j2quaotjza 106 26 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 106 27 . . . work_dzeata5onzf7rp26j2quaotjza 107 1 A a DT work_dzeata5onzf7rp26j2quaotjza 107 2 carefully carefully RB work_dzeata5onzf7rp26j2quaotjza 107 3 designed design VBN work_dzeata5onzf7rp26j2quaotjza 107 4 interface interface NN work_dzeata5onzf7rp26j2quaotjza 107 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 107 6 the the DT work_dzeata5onzf7rp26j2quaotjza 107 7 only only JJ work_dzeata5onzf7rp26j2quaotjza 107 8 pathway pathway NN work_dzeata5onzf7rp26j2quaotjza 107 9 through through IN work_dzeata5onzf7rp26j2quaotjza 107 10 which which WDT work_dzeata5onzf7rp26j2quaotjza 107 11 sandboxed sandboxe VBD work_dzeata5onzf7rp26j2quaotjza 107 12 modules module NNS work_dzeata5onzf7rp26j2quaotjza 107 13 interact interact VBP work_dzeata5onzf7rp26j2quaotjza 107 14 with with IN work_dzeata5onzf7rp26j2quaotjza 107 15 the the DT work_dzeata5onzf7rp26j2quaotjza 107 16 rest rest NN work_dzeata5onzf7rp26j2quaotjza 107 17 of of IN work_dzeata5onzf7rp26j2quaotjza 107 18 the the DT work_dzeata5onzf7rp26j2quaotjza 107 19 system system NN work_dzeata5onzf7rp26j2quaotjza 107 20 . . . work_dzeata5onzf7rp26j2quaotjza 107 21 ” " '' work_dzeata5onzf7rp26j2quaotjza 107 22 Geneiatakis Geneiatakis NNP work_dzeata5onzf7rp26j2quaotjza 107 23 et et NNP work_dzeata5onzf7rp26j2quaotjza 107 24 al al NNP work_dzeata5onzf7rp26j2quaotjza 107 25 . . . work_dzeata5onzf7rp26j2quaotjza 108 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 108 2 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 108 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 108 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 108 5 Others other NNS work_dzeata5onzf7rp26j2quaotjza 108 6 works work VBZ work_dzeata5onzf7rp26j2quaotjza 108 7 have have VBP work_dzeata5onzf7rp26j2quaotjza 108 8 also also RB work_dzeata5onzf7rp26j2quaotjza 108 9 focused focus VBN work_dzeata5onzf7rp26j2quaotjza 108 10 on on IN work_dzeata5onzf7rp26j2quaotjza 108 11 shrinking shrink VBG work_dzeata5onzf7rp26j2quaotjza 108 12 the the DT work_dzeata5onzf7rp26j2quaotjza 108 13 attack attack NN work_dzeata5onzf7rp26j2quaotjza 108 14 surface surface NN work_dzeata5onzf7rp26j2quaotjza 108 15 of of IN work_dzeata5onzf7rp26j2quaotjza 108 16 applications application NNS work_dzeata5onzf7rp26j2quaotjza 108 17 by by IN work_dzeata5onzf7rp26j2quaotjza 108 18 reducing reduce VBG work_dzeata5onzf7rp26j2quaotjza 108 19 the the DT work_dzeata5onzf7rp26j2quaotjza 108 20 parts part NNS work_dzeata5onzf7rp26j2quaotjza 108 21 that that WDT work_dzeata5onzf7rp26j2quaotjza 108 22 are be VBP work_dzeata5onzf7rp26j2quaotjza 108 23 exposed expose VBN work_dzeata5onzf7rp26j2quaotjza 108 24 to to TO work_dzeata5onzf7rp26j2quaotjza 108 25 attack attack NN work_dzeata5onzf7rp26j2quaotjza 108 26 , , , work_dzeata5onzf7rp26j2quaotjza 108 27 and and CC work_dzeata5onzf7rp26j2quaotjza 108 28 isolating isolate VBG work_dzeata5onzf7rp26j2quaotjza 108 29 the the DT work_dzeata5onzf7rp26j2quaotjza 108 30 most most RBS work_dzeata5onzf7rp26j2quaotjza 108 31 vulnerable vulnerable JJ work_dzeata5onzf7rp26j2quaotjza 108 32 parts part NNS work_dzeata5onzf7rp26j2quaotjza 108 33 , , , work_dzeata5onzf7rp26j2quaotjza 108 34 using use VBG work_dzeata5onzf7rp26j2quaotjza 108 35 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 108 36 like like IN work_dzeata5onzf7rp26j2quaotjza 108 37 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 108 38 and and CC work_dzeata5onzf7rp26j2quaotjza 108 39 privilege privilege NN work_dzeata5onzf7rp26j2quaotjza 108 40 separation separation NN work_dzeata5onzf7rp26j2quaotjza 108 41 . . . work_dzeata5onzf7rp26j2quaotjza 108 42 ” " '' work_dzeata5onzf7rp26j2quaotjza 108 43 De De NNP work_dzeata5onzf7rp26j2quaotjza 108 44 Groef Groef NNP work_dzeata5onzf7rp26j2quaotjza 108 45 et et FW work_dzeata5onzf7rp26j2quaotjza 108 46 al al NNP work_dzeata5onzf7rp26j2quaotjza 108 47 . . . work_dzeata5onzf7rp26j2quaotjza 109 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 109 2 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 109 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 109 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 109 5 Isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 109 6 or or CC work_dzeata5onzf7rp26j2quaotjza 109 7 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 109 8 based base VBN work_dzeata5onzf7rp26j2quaotjza 109 9 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 109 10 develop develop VBP work_dzeata5onzf7rp26j2quaotjza 109 11 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 109 12 where where WRB work_dzeata5onzf7rp26j2quaotjza 109 13 scripts script NNS work_dzeata5onzf7rp26j2quaotjza 109 14 can can MD work_dzeata5onzf7rp26j2quaotjza 109 15 be be VB work_dzeata5onzf7rp26j2quaotjza 109 16 included include VBN work_dzeata5onzf7rp26j2quaotjza 109 17 in in IN work_dzeata5onzf7rp26j2quaotjza 109 18 web web NN work_dzeata5onzf7rp26j2quaotjza 109 19 pages page NNS work_dzeata5onzf7rp26j2quaotjza 109 20 without without IN work_dzeata5onzf7rp26j2quaotjza 109 21 giving give VBG work_dzeata5onzf7rp26j2quaotjza 109 22 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 109 23 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 109 24 full full JJ work_dzeata5onzf7rp26j2quaotjza 109 25 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 109 26 access access NN work_dzeata5onzf7rp26j2quaotjza 109 27 to to IN work_dzeata5onzf7rp26j2quaotjza 109 28 the the DT work_dzeata5onzf7rp26j2quaotjza 109 29 surrounding surround VBG work_dzeata5onzf7rp26j2quaotjza 109 30 page page NN work_dzeata5onzf7rp26j2quaotjza 109 31 and and CC work_dzeata5onzf7rp26j2quaotjza 109 32 the the DT work_dzeata5onzf7rp26j2quaotjza 109 33 browser browser NN work_dzeata5onzf7rp26j2quaotjza 109 34 API API NNP work_dzeata5onzf7rp26j2quaotjza 109 35 . . . work_dzeata5onzf7rp26j2quaotjza 109 36 ” " '' work_dzeata5onzf7rp26j2quaotjza 109 37 Cappos Cappos NNP work_dzeata5onzf7rp26j2quaotjza 109 38 et et NNP work_dzeata5onzf7rp26j2quaotjza 109 39 al al NNP work_dzeata5onzf7rp26j2quaotjza 109 40 . . . work_dzeata5onzf7rp26j2quaotjza 110 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 110 2 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 110 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 110 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 110 5 Such such JJ work_dzeata5onzf7rp26j2quaotjza 110 6 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 110 7 have have VBP work_dzeata5onzf7rp26j2quaotjza 110 8 gained gain VBN work_dzeata5onzf7rp26j2quaotjza 110 9 widespread widespread JJ work_dzeata5onzf7rp26j2quaotjza 110 10 adoption adoption NN work_dzeata5onzf7rp26j2quaotjza 110 11 with with IN work_dzeata5onzf7rp26j2quaotjza 110 12 web web NN work_dzeata5onzf7rp26j2quaotjza 110 13 browsers browser NNS work_dzeata5onzf7rp26j2quaotjza 110 14 , , , work_dzeata5onzf7rp26j2quaotjza 110 15 within within IN work_dzeata5onzf7rp26j2quaotjza 110 16 which which WDT work_dzeata5onzf7rp26j2quaotjza 110 17 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 110 18 are be VBP work_dzeata5onzf7rp26j2quaotjza 110 19 used use VBN work_dzeata5onzf7rp26j2quaotjza 110 20 for for IN work_dzeata5onzf7rp26j2quaotjza 110 21 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 110 22 code code NN work_dzeata5onzf7rp26j2quaotjza 110 23 execution execution NN work_dzeata5onzf7rp26j2quaotjza 110 24 , , , work_dzeata5onzf7rp26j2quaotjza 110 25 to to TO work_dzeata5onzf7rp26j2quaotjza 110 26 safely safely RB work_dzeata5onzf7rp26j2quaotjza 110 27 host host VB work_dzeata5onzf7rp26j2quaotjza 110 28 plug plug NN work_dzeata5onzf7rp26j2quaotjza 110 29 - - HYPH work_dzeata5onzf7rp26j2quaotjza 110 30 ins in NNS work_dzeata5onzf7rp26j2quaotjza 110 31 , , , work_dzeata5onzf7rp26j2quaotjza 110 32 and and CC work_dzeata5onzf7rp26j2quaotjza 110 33 to to TO work_dzeata5onzf7rp26j2quaotjza 110 34 control control VB work_dzeata5onzf7rp26j2quaotjza 110 35 application application NN work_dzeata5onzf7rp26j2quaotjza 110 36 behavior behavior NN work_dzeata5onzf7rp26j2quaotjza 110 37 on on IN work_dzeata5onzf7rp26j2quaotjza 110 38 closed closed JJ work_dzeata5onzf7rp26j2quaotjza 110 39 platforms platform NNS work_dzeata5onzf7rp26j2quaotjza 110 40 such such JJ work_dzeata5onzf7rp26j2quaotjza 110 41 as as IN work_dzeata5onzf7rp26j2quaotjza 110 42 mobile mobile JJ work_dzeata5onzf7rp26j2quaotjza 110 43 phones phone NNS work_dzeata5onzf7rp26j2quaotjza 110 44 . . . work_dzeata5onzf7rp26j2quaotjza 111 1 Despite despite IN work_dzeata5onzf7rp26j2quaotjza 111 2 the the DT work_dzeata5onzf7rp26j2quaotjza 111 3 fact fact NN work_dzeata5onzf7rp26j2quaotjza 111 4 that that IN work_dzeata5onzf7rp26j2quaotjza 111 5 program program NN work_dzeata5onzf7rp26j2quaotjza 111 6 containment containment NN work_dzeata5onzf7rp26j2quaotjza 111 7 is be VBZ work_dzeata5onzf7rp26j2quaotjza 111 8 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 111 9 primary primary JJ work_dzeata5onzf7rp26j2quaotjza 111 10 goal goal NN work_dzeata5onzf7rp26j2quaotjza 111 11 , , , work_dzeata5onzf7rp26j2quaotjza 111 12 flaws flaw NNS work_dzeata5onzf7rp26j2quaotjza 111 13 in in IN work_dzeata5onzf7rp26j2quaotjza 111 14 these these DT work_dzeata5onzf7rp26j2quaotjza 111 15 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 111 16 represent represent VBP work_dzeata5onzf7rp26j2quaotjza 111 17 a a DT work_dzeata5onzf7rp26j2quaotjza 111 18 major major JJ work_dzeata5onzf7rp26j2quaotjza 111 19 risk risk NN work_dzeata5onzf7rp26j2quaotjza 111 20 to to TO work_dzeata5onzf7rp26j2quaotjza 111 21 computer computer NN work_dzeata5onzf7rp26j2quaotjza 111 22 security security NN work_dzeata5onzf7rp26j2quaotjza 111 23 . . . work_dzeata5onzf7rp26j2quaotjza 111 24 ” " '' work_dzeata5onzf7rp26j2quaotjza 111 25 Reis Reis NNP work_dzeata5onzf7rp26j2quaotjza 111 26 et et NNP work_dzeata5onzf7rp26j2quaotjza 111 27 al al NNP work_dzeata5onzf7rp26j2quaotjza 111 28 . . . work_dzeata5onzf7rp26j2quaotjza 112 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 112 2 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 112 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 112 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 112 5 Wagner Wagner NNP work_dzeata5onzf7rp26j2quaotjza 112 6 et et FW work_dzeata5onzf7rp26j2quaotjza 112 7 al al NNP work_dzeata5onzf7rp26j2quaotjza 112 8 . . . work_dzeata5onzf7rp26j2quaotjza 113 1 use use VB work_dzeata5onzf7rp26j2quaotjza 113 2 system system NN work_dzeata5onzf7rp26j2quaotjza 113 3 call call VBP work_dzeata5onzf7rp26j2quaotjza 113 4 interposition interposition NN work_dzeata5onzf7rp26j2quaotjza 113 5 in in IN work_dzeata5onzf7rp26j2quaotjza 113 6 Janus Janus NNP work_dzeata5onzf7rp26j2quaotjza 113 7 to to TO work_dzeata5onzf7rp26j2quaotjza 113 8 confine confine VB work_dzeata5onzf7rp26j2quaotjza 113 9 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 113 10 applications application NNS work_dzeata5onzf7rp26j2quaotjza 113 11 to to IN work_dzeata5onzf7rp26j2quaotjza 113 12 a a DT work_dzeata5onzf7rp26j2quaotjza 113 13 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 113 14 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 113 15 environment environment NN work_dzeata5onzf7rp26j2quaotjza 113 16 . . . work_dzeata5onzf7rp26j2quaotjza 113 17 ” " '' work_dzeata5onzf7rp26j2quaotjza 113 18 Cox Cox NNP work_dzeata5onzf7rp26j2quaotjza 113 19 et et NNP work_dzeata5onzf7rp26j2quaotjza 113 20 al al NNP work_dzeata5onzf7rp26j2quaotjza 113 21 . . . work_dzeata5onzf7rp26j2quaotjza 114 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 114 2 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 114 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 114 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 114 5 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 114 6 work work NN work_dzeata5onzf7rp26j2quaotjza 114 7 uses use VBZ work_dzeata5onzf7rp26j2quaotjza 114 8 VMs vm NNS work_dzeata5onzf7rp26j2quaotjza 114 9 to to TO work_dzeata5onzf7rp26j2quaotjza 114 10 provide provide VB work_dzeata5onzf7rp26j2quaotjza 114 11 strong strong JJ work_dzeata5onzf7rp26j2quaotjza 114 12 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 114 13 for for IN work_dzeata5onzf7rp26j2quaotjza 114 14 Web web NN work_dzeata5onzf7rp26j2quaotjza 114 15 browser browser NN work_dzeata5onzf7rp26j2quaotjza 114 16 instances instance NNS work_dzeata5onzf7rp26j2quaotjza 114 17 , , , work_dzeata5onzf7rp26j2quaotjza 114 18 but but CC work_dzeata5onzf7rp26j2quaotjza 114 19 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 114 20 contribution contribution NN work_dzeata5onzf7rp26j2quaotjza 114 21 is be VBZ work_dzeata5onzf7rp26j2quaotjza 114 22 much much RB work_dzeata5onzf7rp26j2quaotjza 114 23 broader broad JJR work_dzeata5onzf7rp26j2quaotjza 114 24 than than IN work_dzeata5onzf7rp26j2quaotjza 114 25 the the DT work_dzeata5onzf7rp26j2quaotjza 114 26 containment containment NN work_dzeata5onzf7rp26j2quaotjza 114 27 this this DT work_dzeata5onzf7rp26j2quaotjza 114 28 provides provide VBZ work_dzeata5onzf7rp26j2quaotjza 114 29 . . . work_dzeata5onzf7rp26j2quaotjza 114 30 ” " '' work_dzeata5onzf7rp26j2quaotjza 114 31 policy policy NN work_dzeata5onzf7rp26j2quaotjza 114 32 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 114 33 camps camp NNS work_dzeata5onzf7rp26j2quaotjza 114 34 are be VBP work_dzeata5onzf7rp26j2quaotjza 114 35 disjoint disjoint JJ work_dzeata5onzf7rp26j2quaotjza 114 36 , , , work_dzeata5onzf7rp26j2quaotjza 114 37 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 114 38 claim claim VBP work_dzeata5onzf7rp26j2quaotjza 114 39 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 114 40 are be VBP work_dzeata5onzf7rp26j2quaotjza 114 41 talking talk VBG work_dzeata5onzf7rp26j2quaotjza 114 42 about about IN work_dzeata5onzf7rp26j2quaotjza 114 43 different different JJ work_dzeata5onzf7rp26j2quaotjza 114 44 dimensions dimension NNS work_dzeata5onzf7rp26j2quaotjza 114 45 of of IN work_dzeata5onzf7rp26j2quaotjza 114 46 the the DT work_dzeata5onzf7rp26j2quaotjza 114 47 same same JJ work_dzeata5onzf7rp26j2quaotjza 114 48 idea idea NN work_dzeata5onzf7rp26j2quaotjza 114 49 . . . work_dzeata5onzf7rp26j2quaotjza 115 1 Isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 115 2 refers refer VBZ work_dzeata5onzf7rp26j2quaotjza 115 3 to to IN work_dzeata5onzf7rp26j2quaotjza 115 4 the the DT work_dzeata5onzf7rp26j2quaotjza 115 5 what what WP work_dzeata5onzf7rp26j2quaotjza 115 6 : : : work_dzeata5onzf7rp26j2quaotjza 115 7 an an DT work_dzeata5onzf7rp26j2quaotjza 115 8 isolated isolated JJ work_dzeata5onzf7rp26j2quaotjza 115 9 environment environment NN work_dzeata5onzf7rp26j2quaotjza 115 10 where where WRB work_dzeata5onzf7rp26j2quaotjza 115 11 a a DT work_dzeata5onzf7rp26j2quaotjza 115 12 module module NN work_dzeata5onzf7rp26j2quaotjza 115 13 can can MD work_dzeata5onzf7rp26j2quaotjza 115 14 not not RB work_dzeata5onzf7rp26j2quaotjza 115 15 do do VB work_dzeata5onzf7rp26j2quaotjza 115 16 harm harm VB work_dzeata5onzf7rp26j2quaotjza 115 17 or or CC work_dzeata5onzf7rp26j2quaotjza 115 18 be be VB work_dzeata5onzf7rp26j2quaotjza 115 19 harmed harm VBN work_dzeata5onzf7rp26j2quaotjza 115 20 . . . work_dzeata5onzf7rp26j2quaotjza 116 1 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 116 2 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 116 3 refers refer VBZ work_dzeata5onzf7rp26j2quaotjza 116 4 to to IN work_dzeata5onzf7rp26j2quaotjza 116 5 the the DT work_dzeata5onzf7rp26j2quaotjza 116 6 how how WRB work_dzeata5onzf7rp26j2quaotjza 116 7 : : : work_dzeata5onzf7rp26j2quaotjza 116 8 by by IN work_dzeata5onzf7rp26j2quaotjza 116 9 clearly clearly RB work_dzeata5onzf7rp26j2quaotjza 116 10 defining define VBG work_dzeata5onzf7rp26j2quaotjza 116 11 what what WP work_dzeata5onzf7rp26j2quaotjza 116 12 is be VBZ work_dzeata5onzf7rp26j2quaotjza 116 13 or or CC work_dzeata5onzf7rp26j2quaotjza 116 14 is be VBZ work_dzeata5onzf7rp26j2quaotjza 116 15 not not RB work_dzeata5onzf7rp26j2quaotjza 116 16 allowed allow VBN work_dzeata5onzf7rp26j2quaotjza 116 17 . . . work_dzeata5onzf7rp26j2quaotjza 117 1 To to TO work_dzeata5onzf7rp26j2quaotjza 117 2 use use VB work_dzeata5onzf7rp26j2quaotjza 117 3 another another DT work_dzeata5onzf7rp26j2quaotjza 117 4 childhood childhood NN work_dzeata5onzf7rp26j2quaotjza 117 5 analogy analogy NN work_dzeata5onzf7rp26j2quaotjza 117 6 , , , work_dzeata5onzf7rp26j2quaotjza 117 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 117 8 often often RB work_dzeata5onzf7rp26j2quaotjza 117 9 sandbox sandbox VBP work_dzeata5onzf7rp26j2quaotjza 117 10 children child NNS work_dzeata5onzf7rp26j2quaotjza 117 11 when when WRB work_dzeata5onzf7rp26j2quaotjza 117 12 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 117 13 place place VBP work_dzeata5onzf7rp26j2quaotjza 117 14 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 117 15 in in IN work_dzeata5onzf7rp26j2quaotjza 117 16 the the DT work_dzeata5onzf7rp26j2quaotjza 117 17 corner corner NN work_dzeata5onzf7rp26j2quaotjza 117 18 as as IN work_dzeata5onzf7rp26j2quaotjza 117 19 a a DT work_dzeata5onzf7rp26j2quaotjza 117 20 punishment punishment NN work_dzeata5onzf7rp26j2quaotjza 117 21 . . . work_dzeata5onzf7rp26j2quaotjza 118 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 2 isolate isolate VBP work_dzeata5onzf7rp26j2quaotjza 118 3 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 4 by by IN work_dzeata5onzf7rp26j2quaotjza 118 5 moving move VBG work_dzeata5onzf7rp26j2quaotjza 118 6 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 7 away away RB work_dzeata5onzf7rp26j2quaotjza 118 8 from from IN work_dzeata5onzf7rp26j2quaotjza 118 9 everyone everyone NN work_dzeata5onzf7rp26j2quaotjza 118 10 else else RB work_dzeata5onzf7rp26j2quaotjza 118 11 and and CC work_dzeata5onzf7rp26j2quaotjza 118 12 placing place VBG work_dzeata5onzf7rp26j2quaotjza 118 13 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 14 in in IN work_dzeata5onzf7rp26j2quaotjza 118 15 a a DT work_dzeata5onzf7rp26j2quaotjza 118 16 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 118 17 , , , work_dzeata5onzf7rp26j2quaotjza 118 18 bounded bound VBN work_dzeata5onzf7rp26j2quaotjza 118 19 location location NN work_dzeata5onzf7rp26j2quaotjza 118 20 , , , work_dzeata5onzf7rp26j2quaotjza 118 21 then then RB work_dzeata5onzf7rp26j2quaotjza 118 22 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 23 impose impose VBP work_dzeata5onzf7rp26j2quaotjza 118 24 a a DT work_dzeata5onzf7rp26j2quaotjza 118 25 security security NN work_dzeata5onzf7rp26j2quaotjza 118 26 policy policy NN work_dzeata5onzf7rp26j2quaotjza 118 27 on on IN work_dzeata5onzf7rp26j2quaotjza 118 28 them -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 29 by by IN work_dzeata5onzf7rp26j2quaotjza 118 30 making make VBG work_dzeata5onzf7rp26j2quaotjza 118 31 statements statement NNS work_dzeata5onzf7rp26j2quaotjza 118 32 such such JJ work_dzeata5onzf7rp26j2quaotjza 118 33 as as IN work_dzeata5onzf7rp26j2quaotjza 118 34 , , , work_dzeata5onzf7rp26j2quaotjza 118 35 “ " `` work_dzeata5onzf7rp26j2quaotjza 118 36 Do do VB work_dzeata5onzf7rp26j2quaotjza 118 37 not not RB work_dzeata5onzf7rp26j2quaotjza 118 38 speak speak VB work_dzeata5onzf7rp26j2quaotjza 118 39 , , , work_dzeata5onzf7rp26j2quaotjza 118 40 look look VB work_dzeata5onzf7rp26j2quaotjza 118 41 straight straight RB work_dzeata5onzf7rp26j2quaotjza 118 42 ahead ahead RB work_dzeata5onzf7rp26j2quaotjza 118 43 , , , work_dzeata5onzf7rp26j2quaotjza 118 44 and and CC work_dzeata5onzf7rp26j2quaotjza 118 45 think think VB work_dzeata5onzf7rp26j2quaotjza 118 46 about about IN work_dzeata5onzf7rp26j2quaotjza 118 47 what what WP work_dzeata5onzf7rp26j2quaotjza 118 48 you -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 49 did do VBD work_dzeata5onzf7rp26j2quaotjza 118 50 . . . work_dzeata5onzf7rp26j2quaotjza 118 51 ” " '' work_dzeata5onzf7rp26j2quaotjza 118 52 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 118 53 resolve resolve VBP work_dzeata5onzf7rp26j2quaotjza 118 54 ambiguity ambiguity NN work_dzeata5onzf7rp26j2quaotjza 118 55 in in IN work_dzeata5onzf7rp26j2quaotjza 118 56 the the DT work_dzeata5onzf7rp26j2quaotjza 118 57 use use NN work_dzeata5onzf7rp26j2quaotjza 118 58 of of IN work_dzeata5onzf7rp26j2quaotjza 118 59 the the DT work_dzeata5onzf7rp26j2quaotjza 118 60 term term NN work_dzeata5onzf7rp26j2quaotjza 118 61 “ " `` work_dzeata5onzf7rp26j2quaotjza 118 62 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 118 63 ” " '' work_dzeata5onzf7rp26j2quaotjza 118 64 by by IN work_dzeata5onzf7rp26j2quaotjza 118 65 combining combine VBG work_dzeata5onzf7rp26j2quaotjza 118 66 these these DT work_dzeata5onzf7rp26j2quaotjza 118 67 themes theme NNS work_dzeata5onzf7rp26j2quaotjza 118 68 : : : work_dzeata5onzf7rp26j2quaotjza 118 69 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 118 70 An an DT work_dzeata5onzf7rp26j2quaotjza 118 71 encapsulation encapsulation NN work_dzeata5onzf7rp26j2quaotjza 118 72 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 118 73 that that WDT work_dzeata5onzf7rp26j2quaotjza 118 74 is be VBZ work_dzeata5onzf7rp26j2quaotjza 118 75 used use VBN work_dzeata5onzf7rp26j2quaotjza 118 76 to to TO work_dzeata5onzf7rp26j2quaotjza 118 77 impose impose VB work_dzeata5onzf7rp26j2quaotjza 118 78 a a DT work_dzeata5onzf7rp26j2quaotjza 118 79 security security NN work_dzeata5onzf7rp26j2quaotjza 118 80 policy policy NN work_dzeata5onzf7rp26j2quaotjza 118 81 on on IN work_dzeata5onzf7rp26j2quaotjza 118 82 software software NN work_dzeata5onzf7rp26j2quaotjza 118 83 components component NNS work_dzeata5onzf7rp26j2quaotjza 118 84 . . . work_dzeata5onzf7rp26j2quaotjza 119 1 This this DT work_dzeata5onzf7rp26j2quaotjza 119 2 definition definition NN work_dzeata5onzf7rp26j2quaotjza 119 3 concisely concisely RB work_dzeata5onzf7rp26j2quaotjza 119 4 and and CC work_dzeata5onzf7rp26j2quaotjza 119 5 consistently consistently RB work_dzeata5onzf7rp26j2quaotjza 119 6 describes describe VBZ work_dzeata5onzf7rp26j2quaotjza 119 7 the the DT work_dzeata5onzf7rp26j2quaotjza 119 8 research research NN work_dzeata5onzf7rp26j2quaotjza 119 9 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 119 10 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 119 11 identify identify VBP work_dzeata5onzf7rp26j2quaotjza 119 12 in in IN work_dzeata5onzf7rp26j2quaotjza 119 13 the the DT work_dzeata5onzf7rp26j2quaotjza 119 14 remainder remainder NN work_dzeata5onzf7rp26j2quaotjza 119 15 of of IN work_dzeata5onzf7rp26j2quaotjza 119 16 this this DT work_dzeata5onzf7rp26j2quaotjza 119 17 paper paper NN work_dzeata5onzf7rp26j2quaotjza 119 18 . . . work_dzeata5onzf7rp26j2quaotjza 120 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 120 2 et et FW work_dzeata5onzf7rp26j2quaotjza 120 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 120 4 . . . work_dzeata5onzf7rp26j2quaotjza 121 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 121 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 121 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 121 4 , , , work_dzeata5onzf7rp26j2quaotjza 121 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 121 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 121 7 . . . work_dzeata5onzf7rp26j2quaotjza 122 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 122 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 122 3 , , , work_dzeata5onzf7rp26j2quaotjza 122 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 122 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 122 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 122 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 122 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 122 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 122 10 5/36 5/36 CD work_dzeata5onzf7rp26j2quaotjza 122 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_dzeata5onzf7rp26j2quaotjza 122 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 122 13 Table table NN work_dzeata5onzf7rp26j2quaotjza 122 14 2 2 CD work_dzeata5onzf7rp26j2quaotjza 122 15 Definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 122 16 that that WDT work_dzeata5onzf7rp26j2quaotjza 122 17 speak speak VBP work_dzeata5onzf7rp26j2quaotjza 122 18 about about IN work_dzeata5onzf7rp26j2quaotjza 122 19 “ " `` work_dzeata5onzf7rp26j2quaotjza 122 20 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 122 21 ” " '' work_dzeata5onzf7rp26j2quaotjza 122 22 in in IN work_dzeata5onzf7rp26j2quaotjza 122 23 terms term NNS work_dzeata5onzf7rp26j2quaotjza 122 24 of of IN work_dzeata5onzf7rp26j2quaotjza 122 25 policy policy NN work_dzeata5onzf7rp26j2quaotjza 122 26 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 122 27 . . . work_dzeata5onzf7rp26j2quaotjza 123 1 Reference reference NN work_dzeata5onzf7rp26j2quaotjza 123 2 Quote Quote NNP work_dzeata5onzf7rp26j2quaotjza 123 3 Xu Xu NNP work_dzeata5onzf7rp26j2quaotjza 123 4 , , , work_dzeata5onzf7rp26j2quaotjza 123 5 Saı̈di saı̈di XX work_dzeata5onzf7rp26j2quaotjza 123 6 & & CC work_dzeata5onzf7rp26j2quaotjza 123 7 Anderson Anderson NNP work_dzeata5onzf7rp26j2quaotjza 123 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 123 9 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 123 10 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 123 11 “ " `` work_dzeata5onzf7rp26j2quaotjza 123 12 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 123 13 automatically automatically RB work_dzeata5onzf7rp26j2quaotjza 123 14 repackage repackage VBP work_dzeata5onzf7rp26j2quaotjza 123 15 arbitrary arbitrary JJ work_dzeata5onzf7rp26j2quaotjza 123 16 applications application NNS work_dzeata5onzf7rp26j2quaotjza 123 17 to to TO work_dzeata5onzf7rp26j2quaotjza 123 18 attach attach VB work_dzeata5onzf7rp26j2quaotjza 123 19 user user NN work_dzeata5onzf7rp26j2quaotjza 123 20 - - HYPH work_dzeata5onzf7rp26j2quaotjza 123 21 level level NN work_dzeata5onzf7rp26j2quaotjza 123 22 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 123 23 and and CC work_dzeata5onzf7rp26j2quaotjza 123 24 policy policy NN work_dzeata5onzf7rp26j2quaotjza 123 25 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 123 26 code code NN work_dzeata5onzf7rp26j2quaotjza 123 27 , , , work_dzeata5onzf7rp26j2quaotjza 123 28 which which WDT work_dzeata5onzf7rp26j2quaotjza 123 29 closely closely RB work_dzeata5onzf7rp26j2quaotjza 123 30 watches watch VBZ work_dzeata5onzf7rp26j2quaotjza 123 31 the the DT work_dzeata5onzf7rp26j2quaotjza 123 32 applications application NNS work_dzeata5onzf7rp26j2quaotjza 123 33 behavior behavior NN work_dzeata5onzf7rp26j2quaotjza 123 34 for for IN work_dzeata5onzf7rp26j2quaotjza 123 35 security security NN work_dzeata5onzf7rp26j2quaotjza 123 36 and and CC work_dzeata5onzf7rp26j2quaotjza 123 37 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 123 38 violations violation NNS work_dzeata5onzf7rp26j2quaotjza 123 39 such such JJ work_dzeata5onzf7rp26j2quaotjza 123 40 as as IN work_dzeata5onzf7rp26j2quaotjza 123 41 attempts attempt NNS work_dzeata5onzf7rp26j2quaotjza 123 42 to to TO work_dzeata5onzf7rp26j2quaotjza 123 43 retrieve retrieve VB work_dzeata5onzf7rp26j2quaotjza 123 44 a a DT work_dzeata5onzf7rp26j2quaotjza 123 45 users user NNS work_dzeata5onzf7rp26j2quaotjza 123 46 sensitive sensitive JJ work_dzeata5onzf7rp26j2quaotjza 123 47 information information NN work_dzeata5onzf7rp26j2quaotjza 123 48 , , , work_dzeata5onzf7rp26j2quaotjza 123 49 send send VBP work_dzeata5onzf7rp26j2quaotjza 123 50 SMS SMS NNP work_dzeata5onzf7rp26j2quaotjza 123 51 covertly covertly RB work_dzeata5onzf7rp26j2quaotjza 123 52 to to IN work_dzeata5onzf7rp26j2quaotjza 123 53 premium premium JJ work_dzeata5onzf7rp26j2quaotjza 123 54 numbers number NNS work_dzeata5onzf7rp26j2quaotjza 123 55 , , , work_dzeata5onzf7rp26j2quaotjza 123 56 or or CC work_dzeata5onzf7rp26j2quaotjza 123 57 access access NN work_dzeata5onzf7rp26j2quaotjza 123 58 malicious malicious JJ work_dzeata5onzf7rp26j2quaotjza 123 59 IP ip NN work_dzeata5onzf7rp26j2quaotjza 123 60 addresses address NNS work_dzeata5onzf7rp26j2quaotjza 123 61 . . . work_dzeata5onzf7rp26j2quaotjza 123 62 ” " '' work_dzeata5onzf7rp26j2quaotjza 123 63 Chandra Chandra NNP work_dzeata5onzf7rp26j2quaotjza 123 64 et et NNP work_dzeata5onzf7rp26j2quaotjza 123 65 al al NNP work_dzeata5onzf7rp26j2quaotjza 123 66 . . . work_dzeata5onzf7rp26j2quaotjza 124 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 124 2 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 124 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 124 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 124 5 The the DT work_dzeata5onzf7rp26j2quaotjza 124 6 re re JJ work_dzeata5onzf7rp26j2quaotjza 124 7 - - JJ work_dzeata5onzf7rp26j2quaotjza 124 8 executed execute VBN work_dzeata5onzf7rp26j2quaotjza 124 9 browser browser NN work_dzeata5onzf7rp26j2quaotjza 124 10 runs run VBZ work_dzeata5onzf7rp26j2quaotjza 124 11 in in IN work_dzeata5onzf7rp26j2quaotjza 124 12 a a DT work_dzeata5onzf7rp26j2quaotjza 124 13 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 124 14 , , , work_dzeata5onzf7rp26j2quaotjza 124 15 and and CC work_dzeata5onzf7rp26j2quaotjza 124 16 only only RB work_dzeata5onzf7rp26j2quaotjza 124 17 has have VBZ work_dzeata5onzf7rp26j2quaotjza 124 18 access access NN work_dzeata5onzf7rp26j2quaotjza 124 19 to to IN work_dzeata5onzf7rp26j2quaotjza 124 20 the the DT work_dzeata5onzf7rp26j2quaotjza 124 21 client client NN work_dzeata5onzf7rp26j2quaotjza 124 22 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 124 23 HTTP HTTP VBN work_dzeata5onzf7rp26j2quaotjza 124 24 cookie cookie NN work_dzeata5onzf7rp26j2quaotjza 124 25 , , , work_dzeata5onzf7rp26j2quaotjza 124 26 ensuring ensure VBG work_dzeata5onzf7rp26j2quaotjza 124 27 that that IN work_dzeata5onzf7rp26j2quaotjza 124 28 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 124 29 gets get VBZ work_dzeata5onzf7rp26j2quaotjza 124 30 no no DT work_dzeata5onzf7rp26j2quaotjza 124 31 additional additional JJ work_dzeata5onzf7rp26j2quaotjza 124 32 privileges privilege NNS work_dzeata5onzf7rp26j2quaotjza 124 33 despite despite IN work_dzeata5onzf7rp26j2quaotjza 124 34 running run VBG work_dzeata5onzf7rp26j2quaotjza 124 35 on on IN work_dzeata5onzf7rp26j2quaotjza 124 36 the the DT work_dzeata5onzf7rp26j2quaotjza 124 37 server server NN work_dzeata5onzf7rp26j2quaotjza 124 38 . . . work_dzeata5onzf7rp26j2quaotjza 124 39 ” " '' work_dzeata5onzf7rp26j2quaotjza 124 40 Politz Politz NNP work_dzeata5onzf7rp26j2quaotjza 124 41 et et NNP work_dzeata5onzf7rp26j2quaotjza 124 42 al al NNP work_dzeata5onzf7rp26j2quaotjza 124 43 . . . work_dzeata5onzf7rp26j2quaotjza 125 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 125 2 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 125 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 125 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 125 5 ADsafe ADsafe NNP work_dzeata5onzf7rp26j2quaotjza 125 6 , , , work_dzeata5onzf7rp26j2quaotjza 125 7 like like IN work_dzeata5onzf7rp26j2quaotjza 125 8 all all DT work_dzeata5onzf7rp26j2quaotjza 125 9 Web web NN work_dzeata5onzf7rp26j2quaotjza 125 10 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 125 11 , , , work_dzeata5onzf7rp26j2quaotjza 125 12 consists consist VBZ work_dzeata5onzf7rp26j2quaotjza 125 13 of of IN work_dzeata5onzf7rp26j2quaotjza 125 14 two two CD work_dzeata5onzf7rp26j2quaotjza 125 15 inter inter JJ work_dzeata5onzf7rp26j2quaotjza 125 16 - - JJ work_dzeata5onzf7rp26j2quaotjza 125 17 dependent dependent JJ work_dzeata5onzf7rp26j2quaotjza 125 18 components component NNS work_dzeata5onzf7rp26j2quaotjza 125 19 : : : work_dzeata5onzf7rp26j2quaotjza 125 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 125 21 1 1 LS work_dzeata5onzf7rp26j2quaotjza 125 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 125 23 a a DT work_dzeata5onzf7rp26j2quaotjza 125 24 static static NN work_dzeata5onzf7rp26j2quaotjza 125 25 verifier verifier NN work_dzeata5onzf7rp26j2quaotjza 125 26 , , , work_dzeata5onzf7rp26j2quaotjza 125 27 called call VBD work_dzeata5onzf7rp26j2quaotjza 125 28 JSLint JSLint NNP work_dzeata5onzf7rp26j2quaotjza 125 29 , , , work_dzeata5onzf7rp26j2quaotjza 125 30 which which WDT work_dzeata5onzf7rp26j2quaotjza 125 31 filters filter VBZ work_dzeata5onzf7rp26j2quaotjza 125 32 out out RP work_dzeata5onzf7rp26j2quaotjza 125 33 widgets widget NNS work_dzeata5onzf7rp26j2quaotjza 125 34 not not RB work_dzeata5onzf7rp26j2quaotjza 125 35 in in IN work_dzeata5onzf7rp26j2quaotjza 125 36 a a DT work_dzeata5onzf7rp26j2quaotjza 125 37 safe safe JJ work_dzeata5onzf7rp26j2quaotjza 125 38 subset subset NN work_dzeata5onzf7rp26j2quaotjza 125 39 of of IN work_dzeata5onzf7rp26j2quaotjza 125 40 JavaScript JavaScript NNP work_dzeata5onzf7rp26j2quaotjza 125 41 , , , work_dzeata5onzf7rp26j2quaotjza 125 42 and and CC work_dzeata5onzf7rp26j2quaotjza 125 43 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 125 44 2 2 LS work_dzeata5onzf7rp26j2quaotjza 125 45 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 125 46 a a DT work_dzeata5onzf7rp26j2quaotjza 125 47 runtime runtime NN work_dzeata5onzf7rp26j2quaotjza 125 48 library library NN work_dzeata5onzf7rp26j2quaotjza 125 49 , , , work_dzeata5onzf7rp26j2quaotjza 125 50 adsafe.js adsafe.js ADD work_dzeata5onzf7rp26j2quaotjza 125 51 , , , work_dzeata5onzf7rp26j2quaotjza 125 52 which which WDT work_dzeata5onzf7rp26j2quaotjza 125 53 implements implement VBZ work_dzeata5onzf7rp26j2quaotjza 125 54 DOM DOM NNP work_dzeata5onzf7rp26j2quaotjza 125 55 wrappers wrapper NNS work_dzeata5onzf7rp26j2quaotjza 125 56 and and CC work_dzeata5onzf7rp26j2quaotjza 125 57 other other JJ work_dzeata5onzf7rp26j2quaotjza 125 58 runtime runtime NN work_dzeata5onzf7rp26j2quaotjza 125 59 checks check NNS work_dzeata5onzf7rp26j2quaotjza 125 60 . . . work_dzeata5onzf7rp26j2quaotjza 125 61 ” " '' work_dzeata5onzf7rp26j2quaotjza 125 62 Tang Tang NNP work_dzeata5onzf7rp26j2quaotjza 125 63 , , , work_dzeata5onzf7rp26j2quaotjza 125 64 Mai Mai NNP work_dzeata5onzf7rp26j2quaotjza 125 65 & & CC work_dzeata5onzf7rp26j2quaotjza 125 66 King King NNP work_dzeata5onzf7rp26j2quaotjza 125 67 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 125 68 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 125 69 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 125 70 “ " `` work_dzeata5onzf7rp26j2quaotjza 125 71 Fundamentally fundamentally RB work_dzeata5onzf7rp26j2quaotjza 125 72 , , , work_dzeata5onzf7rp26j2quaotjza 125 73 rule rule NN work_dzeata5onzf7rp26j2quaotjza 125 74 - - HYPH work_dzeata5onzf7rp26j2quaotjza 125 75 based base VBN work_dzeata5onzf7rp26j2quaotjza 125 76 OS os NN work_dzeata5onzf7rp26j2quaotjza 125 77 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 125 78 is be VBZ work_dzeata5onzf7rp26j2quaotjza 125 79 about about IN work_dzeata5onzf7rp26j2quaotjza 125 80 restricting restrict VBG work_dzeata5onzf7rp26j2quaotjza 125 81 unused unused JJ work_dzeata5onzf7rp26j2quaotjza 125 82 or or CC work_dzeata5onzf7rp26j2quaotjza 125 83 overly overly RB work_dzeata5onzf7rp26j2quaotjza 125 84 permissive permissive JJ work_dzeata5onzf7rp26j2quaotjza 125 85 interfaces interface NNS work_dzeata5onzf7rp26j2quaotjza 125 86 exposed expose VBN work_dzeata5onzf7rp26j2quaotjza 125 87 by by IN work_dzeata5onzf7rp26j2quaotjza 125 88 today today NN work_dzeata5onzf7rp26j2quaotjza 125 89 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 125 90 operating operating NN work_dzeata5onzf7rp26j2quaotjza 125 91 systems system NNS work_dzeata5onzf7rp26j2quaotjza 125 92 . . . work_dzeata5onzf7rp26j2quaotjza 125 93 ” " '' work_dzeata5onzf7rp26j2quaotjza 125 94 Sun Sun NNP work_dzeata5onzf7rp26j2quaotjza 125 95 et et NNP work_dzeata5onzf7rp26j2quaotjza 125 96 al al NNP work_dzeata5onzf7rp26j2quaotjza 125 97 . . . work_dzeata5onzf7rp26j2quaotjza 126 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 126 2 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 126 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 126 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 126 5 Sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 126 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 126 7 a a DT work_dzeata5onzf7rp26j2quaotjza 126 8 commonly commonly RB work_dzeata5onzf7rp26j2quaotjza 126 9 deployed deploy VBN work_dzeata5onzf7rp26j2quaotjza 126 10 proactive proactive JJ work_dzeata5onzf7rp26j2quaotjza 126 11 defense defense NN work_dzeata5onzf7rp26j2quaotjza 126 12 against against IN work_dzeata5onzf7rp26j2quaotjza 126 13 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 126 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 126 15 and and CC work_dzeata5onzf7rp26j2quaotjza 126 16 hence hence RB work_dzeata5onzf7rp26j2quaotjza 126 17 potentially potentially RB work_dzeata5onzf7rp26j2quaotjza 126 18 malicious malicious JJ work_dzeata5onzf7rp26j2quaotjza 126 19 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 126 20 software software NN work_dzeata5onzf7rp26j2quaotjza 126 21 . . . work_dzeata5onzf7rp26j2quaotjza 127 1 It -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 127 2 restricts restrict VBZ work_dzeata5onzf7rp26j2quaotjza 127 3 the the DT work_dzeata5onzf7rp26j2quaotjza 127 4 set set NN work_dzeata5onzf7rp26j2quaotjza 127 5 of of IN work_dzeata5onzf7rp26j2quaotjza 127 6 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 127 7 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 127 8 such such JJ work_dzeata5onzf7rp26j2quaotjza 127 9 as as IN work_dzeata5onzf7rp26j2quaotjza 127 10 files file NNS work_dzeata5onzf7rp26j2quaotjza 127 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 127 12 that that WDT work_dzeata5onzf7rp26j2quaotjza 127 13 can can MD work_dzeata5onzf7rp26j2quaotjza 127 14 be be VB work_dzeata5onzf7rp26j2quaotjza 127 15 written write VBN work_dzeata5onzf7rp26j2quaotjza 127 16 by by IN work_dzeata5onzf7rp26j2quaotjza 127 17 an an DT work_dzeata5onzf7rp26j2quaotjza 127 18 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 127 19 process process NN work_dzeata5onzf7rp26j2quaotjza 127 20 , , , work_dzeata5onzf7rp26j2quaotjza 127 21 and and CC work_dzeata5onzf7rp26j2quaotjza 127 22 also also RB work_dzeata5onzf7rp26j2quaotjza 127 23 limits limit VBZ work_dzeata5onzf7rp26j2quaotjza 127 24 communication communication NN work_dzeata5onzf7rp26j2quaotjza 127 25 with with IN work_dzeata5onzf7rp26j2quaotjza 127 26 other other JJ work_dzeata5onzf7rp26j2quaotjza 127 27 processes process NNS work_dzeata5onzf7rp26j2quaotjza 127 28 on on IN work_dzeata5onzf7rp26j2quaotjza 127 29 the the DT work_dzeata5onzf7rp26j2quaotjza 127 30 system system NN work_dzeata5onzf7rp26j2quaotjza 127 31 . . . work_dzeata5onzf7rp26j2quaotjza 127 32 ” " '' work_dzeata5onzf7rp26j2quaotjza 127 33 McCamant McCamant NNP work_dzeata5onzf7rp26j2quaotjza 127 34 & & CC work_dzeata5onzf7rp26j2quaotjza 127 35 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 127 36 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 127 37 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 127 38 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 127 39 “ " `` work_dzeata5onzf7rp26j2quaotjza 127 40 Executing execute VBG work_dzeata5onzf7rp26j2quaotjza 127 41 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 127 42 code code NN work_dzeata5onzf7rp26j2quaotjza 127 43 while while IN work_dzeata5onzf7rp26j2quaotjza 127 44 preserving preserve VBG work_dzeata5onzf7rp26j2quaotjza 127 45 security security NN work_dzeata5onzf7rp26j2quaotjza 127 46 requires require VBZ work_dzeata5onzf7rp26j2quaotjza 127 47 that that IN work_dzeata5onzf7rp26j2quaotjza 127 48 the the DT work_dzeata5onzf7rp26j2quaotjza 127 49 code code NN work_dzeata5onzf7rp26j2quaotjza 127 50 be be VB work_dzeata5onzf7rp26j2quaotjza 127 51 prevented prevent VBN work_dzeata5onzf7rp26j2quaotjza 127 52 from from IN work_dzeata5onzf7rp26j2quaotjza 127 53 modifying modify VBG work_dzeata5onzf7rp26j2quaotjza 127 54 memory memory NN work_dzeata5onzf7rp26j2quaotjza 127 55 or or CC work_dzeata5onzf7rp26j2quaotjza 127 56 executing execute VBG work_dzeata5onzf7rp26j2quaotjza 127 57 instructions instruction NNS work_dzeata5onzf7rp26j2quaotjza 127 58 except except IN work_dzeata5onzf7rp26j2quaotjza 127 59 as as RB work_dzeata5onzf7rp26j2quaotjza 127 60 explicitly explicitly RB work_dzeata5onzf7rp26j2quaotjza 127 61 allowed allow VBN work_dzeata5onzf7rp26j2quaotjza 127 62 . . . work_dzeata5onzf7rp26j2quaotjza 128 1 Software software NN work_dzeata5onzf7rp26j2quaotjza 128 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 128 3 based base VBN work_dzeata5onzf7rp26j2quaotjza 128 4 fault fault NN work_dzeata5onzf7rp26j2quaotjza 128 5 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 128 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 128 7 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 128 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 128 9 or or CC work_dzeata5onzf7rp26j2quaotjza 128 10 “ " `` work_dzeata5onzf7rp26j2quaotjza 128 11 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 128 12 ” " '' work_dzeata5onzf7rp26j2quaotjza 128 13 enforces enforce NNS work_dzeata5onzf7rp26j2quaotjza 128 14 such such PDT work_dzeata5onzf7rp26j2quaotjza 128 15 a a DT work_dzeata5onzf7rp26j2quaotjza 128 16 policy policy NN work_dzeata5onzf7rp26j2quaotjza 128 17 by by IN work_dzeata5onzf7rp26j2quaotjza 128 18 rewriting rewrite VBG work_dzeata5onzf7rp26j2quaotjza 128 19 the the DT work_dzeata5onzf7rp26j2quaotjza 128 20 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 128 21 code code NN work_dzeata5onzf7rp26j2quaotjza 128 22 at at IN work_dzeata5onzf7rp26j2quaotjza 128 23 the the DT work_dzeata5onzf7rp26j2quaotjza 128 24 instruction instruction NN work_dzeata5onzf7rp26j2quaotjza 128 25 level level NN work_dzeata5onzf7rp26j2quaotjza 128 26 . . . work_dzeata5onzf7rp26j2quaotjza 128 27 ” " '' work_dzeata5onzf7rp26j2quaotjza 128 28 Provos Provos NNP work_dzeata5onzf7rp26j2quaotjza 128 29 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 128 30 2003 2003 CD work_dzeata5onzf7rp26j2quaotjza 128 31 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 128 32 “ " `` work_dzeata5onzf7rp26j2quaotjza 128 33 For for IN work_dzeata5onzf7rp26j2quaotjza 128 34 an an DT work_dzeata5onzf7rp26j2quaotjza 128 35 application application NN work_dzeata5onzf7rp26j2quaotjza 128 36 executing execute VBG work_dzeata5onzf7rp26j2quaotjza 128 37 in in IN work_dzeata5onzf7rp26j2quaotjza 128 38 the the DT work_dzeata5onzf7rp26j2quaotjza 128 39 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 128 40 , , , work_dzeata5onzf7rp26j2quaotjza 128 41 the the DT work_dzeata5onzf7rp26j2quaotjza 128 42 system system NN work_dzeata5onzf7rp26j2quaotjza 128 43 call call VBP work_dzeata5onzf7rp26j2quaotjza 128 44 gateway gateway NN work_dzeata5onzf7rp26j2quaotjza 128 45 requests request VBZ work_dzeata5onzf7rp26j2quaotjza 128 46 a a DT work_dzeata5onzf7rp26j2quaotjza 128 47 policy policy NN work_dzeata5onzf7rp26j2quaotjza 128 48 decision decision NN work_dzeata5onzf7rp26j2quaotjza 128 49 from from IN work_dzeata5onzf7rp26j2quaotjza 128 50 Systrace Systrace NNP work_dzeata5onzf7rp26j2quaotjza 128 51 for for IN work_dzeata5onzf7rp26j2quaotjza 128 52 every every DT work_dzeata5onzf7rp26j2quaotjza 128 53 system system NN work_dzeata5onzf7rp26j2quaotjza 128 54 call call NN work_dzeata5onzf7rp26j2quaotjza 128 55 . . . work_dzeata5onzf7rp26j2quaotjza 128 56 ” " '' work_dzeata5onzf7rp26j2quaotjza 128 57 METHODOLOGY METHODOLOGY NNP work_dzeata5onzf7rp26j2quaotjza 128 58 In in IN work_dzeata5onzf7rp26j2quaotjza 128 59 this this DT work_dzeata5onzf7rp26j2quaotjza 128 60 section section NN work_dzeata5onzf7rp26j2quaotjza 128 61 , , , work_dzeata5onzf7rp26j2quaotjza 128 62 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 128 63 discuss discuss VBP work_dzeata5onzf7rp26j2quaotjza 128 64 the the DT work_dzeata5onzf7rp26j2quaotjza 128 65 steps step NNS work_dzeata5onzf7rp26j2quaotjza 128 66 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 128 67 took take VBD work_dzeata5onzf7rp26j2quaotjza 128 68 in in IN work_dzeata5onzf7rp26j2quaotjza 128 69 order order NN work_dzeata5onzf7rp26j2quaotjza 128 70 to to TO work_dzeata5onzf7rp26j2quaotjza 128 71 select select VB work_dzeata5onzf7rp26j2quaotjza 128 72 and and CC work_dzeata5onzf7rp26j2quaotjza 128 73 analyze analyze VB work_dzeata5onzf7rp26j2quaotjza 128 74 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 128 75 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 128 76 and and CC work_dzeata5onzf7rp26j2quaotjza 128 77 the the DT work_dzeata5onzf7rp26j2quaotjza 128 78 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 128 79 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 128 80 describe describe VBP work_dzeata5onzf7rp26j2quaotjza 128 81 . . . work_dzeata5onzf7rp26j2quaotjza 129 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 129 2 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 129 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 129 4 primarily primarily RB work_dzeata5onzf7rp26j2quaotjza 129 5 based base VBN work_dzeata5onzf7rp26j2quaotjza 129 6 on on IN work_dzeata5onzf7rp26j2quaotjza 129 7 the the DT work_dzeata5onzf7rp26j2quaotjza 129 8 book book NN work_dzeata5onzf7rp26j2quaotjza 129 9 “ " `` work_dzeata5onzf7rp26j2quaotjza 129 10 Qualitative Qualitative NNP work_dzeata5onzf7rp26j2quaotjza 129 11 Content Content NNP work_dzeata5onzf7rp26j2quaotjza 129 12 Analysis Analysis NNP work_dzeata5onzf7rp26j2quaotjza 129 13 in in IN work_dzeata5onzf7rp26j2quaotjza 129 14 Practice Practice NNP work_dzeata5onzf7rp26j2quaotjza 129 15 ” " '' work_dzeata5onzf7rp26j2quaotjza 129 16 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 129 17 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 129 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 129 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 129 20 Schreier schrei JJR work_dzeata5onzf7rp26j2quaotjza 129 21 , , , work_dzeata5onzf7rp26j2quaotjza 129 22 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 129 23 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 129 24 . . . work_dzeata5onzf7rp26j2quaotjza 130 1 Barnes barne NNS work_dzeata5onzf7rp26j2quaotjza 130 2 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 130 3 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 130 4 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 130 5 provides provide VBZ work_dzeata5onzf7rp26j2quaotjza 130 6 a a DT work_dzeata5onzf7rp26j2quaotjza 130 7 succinct succinct JJ work_dzeata5onzf7rp26j2quaotjza 130 8 summary summary NN work_dzeata5onzf7rp26j2quaotjza 130 9 of of IN work_dzeata5onzf7rp26j2quaotjza 130 10 the the DT work_dzeata5onzf7rp26j2quaotjza 130 11 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 130 12 in in IN work_dzeata5onzf7rp26j2quaotjza 130 13 Section Section NNP work_dzeata5onzf7rp26j2quaotjza 130 14 5.3 5.3 CD work_dzeata5onzf7rp26j2quaotjza 130 15 of of IN work_dzeata5onzf7rp26j2quaotjza 130 16 his -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 130 17 dissertation dissertation NN work_dzeata5onzf7rp26j2quaotjza 130 18 . . . work_dzeata5onzf7rp26j2quaotjza 131 1 This this DT work_dzeata5onzf7rp26j2quaotjza 131 2 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 131 3 originates originate VBZ work_dzeata5onzf7rp26j2quaotjza 131 4 in in IN work_dzeata5onzf7rp26j2quaotjza 131 5 the the DT work_dzeata5onzf7rp26j2quaotjza 131 6 social social JJ work_dzeata5onzf7rp26j2quaotjza 131 7 sciences sciences NNPS work_dzeata5onzf7rp26j2quaotjza 131 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 131 9 Berelson Berelson NNP work_dzeata5onzf7rp26j2quaotjza 131 10 , , , work_dzeata5onzf7rp26j2quaotjza 131 11 1952 1952 CD work_dzeata5onzf7rp26j2quaotjza 131 12 ; ; : work_dzeata5onzf7rp26j2quaotjza 131 13 Krippendorff Krippendorff NNP work_dzeata5onzf7rp26j2quaotjza 131 14 , , , work_dzeata5onzf7rp26j2quaotjza 131 15 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 131 16 ; ; : work_dzeata5onzf7rp26j2quaotjza 131 17 Denzin Denzin NNP work_dzeata5onzf7rp26j2quaotjza 131 18 & & CC work_dzeata5onzf7rp26j2quaotjza 131 19 Lincoln Lincoln NNP work_dzeata5onzf7rp26j2quaotjza 131 20 , , , work_dzeata5onzf7rp26j2quaotjza 131 21 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 131 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 131 23 and and CC work_dzeata5onzf7rp26j2quaotjza 131 24 is be VBZ work_dzeata5onzf7rp26j2quaotjza 131 25 intended intend VBN work_dzeata5onzf7rp26j2quaotjza 131 26 to to TO work_dzeata5onzf7rp26j2quaotjza 131 27 repeatably repeatably RB work_dzeata5onzf7rp26j2quaotjza 131 28 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 131 29 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 131 30 data datum NNS work_dzeata5onzf7rp26j2quaotjza 131 31 to to TO work_dzeata5onzf7rp26j2quaotjza 131 32 answer answer VB work_dzeata5onzf7rp26j2quaotjza 131 33 a a DT work_dzeata5onzf7rp26j2quaotjza 131 34 set set NN work_dzeata5onzf7rp26j2quaotjza 131 35 of of IN work_dzeata5onzf7rp26j2quaotjza 131 36 research research NN work_dzeata5onzf7rp26j2quaotjza 131 37 questions question NNS work_dzeata5onzf7rp26j2quaotjza 131 38 . . . work_dzeata5onzf7rp26j2quaotjza 132 1 Figure figure NN work_dzeata5onzf7rp26j2quaotjza 132 2 1 1 CD work_dzeata5onzf7rp26j2quaotjza 132 3 summarizes summarize VBZ work_dzeata5onzf7rp26j2quaotjza 132 4 the the DT work_dzeata5onzf7rp26j2quaotjza 132 5 iterative iterative JJ work_dzeata5onzf7rp26j2quaotjza 132 6 process process NN work_dzeata5onzf7rp26j2quaotjza 132 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 132 8 used use VBD work_dzeata5onzf7rp26j2quaotjza 132 9 to to TO work_dzeata5onzf7rp26j2quaotjza 132 10 define define VB work_dzeata5onzf7rp26j2quaotjza 132 11 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 132 12 questions question NNS work_dzeata5onzf7rp26j2quaotjza 132 13 , , , work_dzeata5onzf7rp26j2quaotjza 132 14 pick pick VB work_dzeata5onzf7rp26j2quaotjza 132 15 and and CC work_dzeata5onzf7rp26j2quaotjza 132 16 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 132 17 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 132 18 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 132 19 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 132 20 Picking picking NN work_dzeata5onzf7rp26j2quaotjza 132 21 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 132 22 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 132 23 and and CC work_dzeata5onzf7rp26j2quaotjza 132 24 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 132 25 Categorizing categorize VBG work_dzeata5onzf7rp26j2quaotjza 132 26 the the DT work_dzeata5onzf7rp26j2quaotjza 132 27 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 132 28 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 132 29 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 132 30 , , , work_dzeata5onzf7rp26j2quaotjza 132 31 and and CC work_dzeata5onzf7rp26j2quaotjza 132 32 develop develop VB work_dzeata5onzf7rp26j2quaotjza 132 33 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 132 34 results result NNS work_dzeata5onzf7rp26j2quaotjza 132 35 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 132 36 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 132 37 Analyzing analyze VBG work_dzeata5onzf7rp26j2quaotjza 132 38 the the DT work_dzeata5onzf7rp26j2quaotjza 132 39 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 132 40 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 132 41 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 132 42 . . . work_dzeata5onzf7rp26j2quaotjza 133 1 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 133 2 goes go VBZ work_dzeata5onzf7rp26j2quaotjza 133 3 well well RB work_dzeata5onzf7rp26j2quaotjza 133 4 beyond beyond IN work_dzeata5onzf7rp26j2quaotjza 133 5 a a DT work_dzeata5onzf7rp26j2quaotjza 133 6 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 133 7 literature literature NN work_dzeata5onzf7rp26j2quaotjza 133 8 review review NN work_dzeata5onzf7rp26j2quaotjza 133 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 133 10 Budgen Budgen NNP work_dzeata5onzf7rp26j2quaotjza 133 11 & & CC work_dzeata5onzf7rp26j2quaotjza 133 12 Brereton Brereton NNP work_dzeata5onzf7rp26j2quaotjza 133 13 , , , work_dzeata5onzf7rp26j2quaotjza 133 14 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 133 15 ; ; : work_dzeata5onzf7rp26j2quaotjza 133 16 Kitchenham Kitchenham NNP work_dzeata5onzf7rp26j2quaotjza 133 17 et et NNP work_dzeata5onzf7rp26j2quaotjza 133 18 al al NNP work_dzeata5onzf7rp26j2quaotjza 133 19 . . NNP work_dzeata5onzf7rp26j2quaotjza 133 20 , , , work_dzeata5onzf7rp26j2quaotjza 133 21 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 133 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 133 23 . . . work_dzeata5onzf7rp26j2quaotjza 134 1 While while IN work_dzeata5onzf7rp26j2quaotjza 134 2 both both DT work_dzeata5onzf7rp26j2quaotjza 134 3 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 134 4 and and CC work_dzeata5onzf7rp26j2quaotjza 134 5 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 134 6 reviews review NNS work_dzeata5onzf7rp26j2quaotjza 134 7 require require VBP work_dzeata5onzf7rp26j2quaotjza 134 8 the the DT work_dzeata5onzf7rp26j2quaotjza 134 9 definition definition NN work_dzeata5onzf7rp26j2quaotjza 134 10 of of IN work_dzeata5onzf7rp26j2quaotjza 134 11 research research NN work_dzeata5onzf7rp26j2quaotjza 134 12 questions question NNS work_dzeata5onzf7rp26j2quaotjza 134 13 and and CC work_dzeata5onzf7rp26j2quaotjza 134 14 repeatable repeatable JJ work_dzeata5onzf7rp26j2quaotjza 134 15 processes process NNS work_dzeata5onzf7rp26j2quaotjza 134 16 for for IN work_dzeata5onzf7rp26j2quaotjza 134 17 collecting collect VBG work_dzeata5onzf7rp26j2quaotjza 134 18 source source NN work_dzeata5onzf7rp26j2quaotjza 134 19 material material NN work_dzeata5onzf7rp26j2quaotjza 134 20 , , , work_dzeata5onzf7rp26j2quaotjza 134 21 reviews review NNS work_dzeata5onzf7rp26j2quaotjza 134 22 stop stop VBP work_dzeata5onzf7rp26j2quaotjza 134 23 short short RB work_dzeata5onzf7rp26j2quaotjza 134 24 of of IN work_dzeata5onzf7rp26j2quaotjza 134 25 detailed detailed JJ work_dzeata5onzf7rp26j2quaotjza 134 26 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 134 27 . . . work_dzeata5onzf7rp26j2quaotjza 135 1 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 135 2 carries carry VBZ work_dzeata5onzf7rp26j2quaotjza 135 3 on on IN work_dzeata5onzf7rp26j2quaotjza 135 4 where where WRB work_dzeata5onzf7rp26j2quaotjza 135 5 reviews review NNS work_dzeata5onzf7rp26j2quaotjza 135 6 end end VBP work_dzeata5onzf7rp26j2quaotjza 135 7 . . . work_dzeata5onzf7rp26j2quaotjza 136 1 When when WRB work_dzeata5onzf7rp26j2quaotjza 136 2 performing perform VBG work_dzeata5onzf7rp26j2quaotjza 136 3 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 136 4 , , , work_dzeata5onzf7rp26j2quaotjza 136 5 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 136 6 define define VBP work_dzeata5onzf7rp26j2quaotjza 136 7 coding code VBG work_dzeata5onzf7rp26j2quaotjza 136 8 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 136 9 to to TO work_dzeata5onzf7rp26j2quaotjza 136 10 clearly clearly RB work_dzeata5onzf7rp26j2quaotjza 136 11 and and CC work_dzeata5onzf7rp26j2quaotjza 136 12 repeatably repeatably RB work_dzeata5onzf7rp26j2quaotjza 136 13 establish establish VB work_dzeata5onzf7rp26j2quaotjza 136 14 how how WRB work_dzeata5onzf7rp26j2quaotjza 136 15 the the DT work_dzeata5onzf7rp26j2quaotjza 136 16 source source NN work_dzeata5onzf7rp26j2quaotjza 136 17 material material NN work_dzeata5onzf7rp26j2quaotjza 136 18 will will MD work_dzeata5onzf7rp26j2quaotjza 136 19 be be VB work_dzeata5onzf7rp26j2quaotjza 136 20 interpreted interpret VBN work_dzeata5onzf7rp26j2quaotjza 136 21 to to TO work_dzeata5onzf7rp26j2quaotjza 136 22 answer answer VB work_dzeata5onzf7rp26j2quaotjza 136 23 the the DT work_dzeata5onzf7rp26j2quaotjza 136 24 research research NN work_dzeata5onzf7rp26j2quaotjza 136 25 questions question NNS work_dzeata5onzf7rp26j2quaotjza 136 26 . . . work_dzeata5onzf7rp26j2quaotjza 137 1 The the DT work_dzeata5onzf7rp26j2quaotjza 137 2 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 137 3 contain contain VBP work_dzeata5onzf7rp26j2quaotjza 137 4 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 137 5 et et NNP work_dzeata5onzf7rp26j2quaotjza 137 6 al al NNP work_dzeata5onzf7rp26j2quaotjza 137 7 . . . work_dzeata5onzf7rp26j2quaotjza 138 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 138 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 138 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 138 4 , , , work_dzeata5onzf7rp26j2quaotjza 138 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 138 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 138 7 . . . work_dzeata5onzf7rp26j2quaotjza 139 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 139 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 139 3 , , , work_dzeata5onzf7rp26j2quaotjza 139 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 139 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 139 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 139 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 139 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 139 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 139 10 6/36 6/36 NNP work_dzeata5onzf7rp26j2quaotjza 139 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_dzeata5onzf7rp26j2quaotjza 139 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 139 13 Figure figure NN work_dzeata5onzf7rp26j2quaotjza 139 14 1 1 CD work_dzeata5onzf7rp26j2quaotjza 139 15 The the DT work_dzeata5onzf7rp26j2quaotjza 139 16 iterative iterative JJ work_dzeata5onzf7rp26j2quaotjza 139 17 process process NN work_dzeata5onzf7rp26j2quaotjza 139 18 used use VBD work_dzeata5onzf7rp26j2quaotjza 139 19 to to TO work_dzeata5onzf7rp26j2quaotjza 139 20 define define VB work_dzeata5onzf7rp26j2quaotjza 139 21 research research NN work_dzeata5onzf7rp26j2quaotjza 139 22 questions question NNS work_dzeata5onzf7rp26j2quaotjza 139 23 , , , work_dzeata5onzf7rp26j2quaotjza 139 24 build build VB work_dzeata5onzf7rp26j2quaotjza 139 25 a a DT work_dzeata5onzf7rp26j2quaotjza 139 26 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 139 27 , , , work_dzeata5onzf7rp26j2quaotjza 139 28 and and CC work_dzeata5onzf7rp26j2quaotjza 139 29 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 139 30 the the DT work_dzeata5onzf7rp26j2quaotjza 139 31 set set NN work_dzeata5onzf7rp26j2quaotjza 139 32 to to TO work_dzeata5onzf7rp26j2quaotjza 139 33 answer answer VB work_dzeata5onzf7rp26j2quaotjza 139 34 the the DT work_dzeata5onzf7rp26j2quaotjza 139 35 questions question NNS work_dzeata5onzf7rp26j2quaotjza 139 36 . . . work_dzeata5onzf7rp26j2quaotjza 140 1 This this DT work_dzeata5onzf7rp26j2quaotjza 140 2 process process NN work_dzeata5onzf7rp26j2quaotjza 140 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 140 4 inspired inspire VBN work_dzeata5onzf7rp26j2quaotjza 140 5 by by IN work_dzeata5onzf7rp26j2quaotjza 140 6 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 140 7 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 140 8 Schreier Schreier NNP work_dzeata5onzf7rp26j2quaotjza 140 9 , , , work_dzeata5onzf7rp26j2quaotjza 140 10 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 140 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 140 12 . . . work_dzeata5onzf7rp26j2quaotjza 141 1 codes code NNS work_dzeata5onzf7rp26j2quaotjza 141 2 that that WDT work_dzeata5onzf7rp26j2quaotjza 141 3 summarize summarize VBP work_dzeata5onzf7rp26j2quaotjza 141 4 blocks block NNS work_dzeata5onzf7rp26j2quaotjza 141 5 of of IN work_dzeata5onzf7rp26j2quaotjza 141 6 data datum NNS work_dzeata5onzf7rp26j2quaotjza 141 7 and and CC work_dzeata5onzf7rp26j2quaotjza 141 8 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 141 9 for for IN work_dzeata5onzf7rp26j2quaotjza 141 10 each each DT work_dzeata5onzf7rp26j2quaotjza 141 11 code code NN work_dzeata5onzf7rp26j2quaotjza 141 12 . . . work_dzeata5onzf7rp26j2quaotjza 142 1 Furthermore furthermore RB work_dzeata5onzf7rp26j2quaotjza 142 2 , , , work_dzeata5onzf7rp26j2quaotjza 142 3 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 142 4 methodologies methodology NNS work_dzeata5onzf7rp26j2quaotjza 142 5 dictate dictate VBP work_dzeata5onzf7rp26j2quaotjza 142 6 how how WRB work_dzeata5onzf7rp26j2quaotjza 142 7 the the DT work_dzeata5onzf7rp26j2quaotjza 142 8 coding code VBG work_dzeata5onzf7rp26j2quaotjza 142 9 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 142 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 142 11 to to TO work_dzeata5onzf7rp26j2quaotjza 142 12 be be VB work_dzeata5onzf7rp26j2quaotjza 142 13 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 142 14 , , , work_dzeata5onzf7rp26j2quaotjza 142 15 by by IN work_dzeata5onzf7rp26j2quaotjza 142 16 segmenting segment VBG work_dzeata5onzf7rp26j2quaotjza 142 17 the the DT work_dzeata5onzf7rp26j2quaotjza 142 18 entirety entirety NN work_dzeata5onzf7rp26j2quaotjza 142 19 of of IN work_dzeata5onzf7rp26j2quaotjza 142 20 the the DT work_dzeata5onzf7rp26j2quaotjza 142 21 data datum NNS work_dzeata5onzf7rp26j2quaotjza 142 22 such such JJ work_dzeata5onzf7rp26j2quaotjza 142 23 that that IN work_dzeata5onzf7rp26j2quaotjza 142 24 each each DT work_dzeata5onzf7rp26j2quaotjza 142 25 segment segment NN work_dzeata5onzf7rp26j2quaotjza 142 26 can can MD work_dzeata5onzf7rp26j2quaotjza 142 27 labeled label VBN work_dzeata5onzf7rp26j2quaotjza 142 28 with with IN work_dzeata5onzf7rp26j2quaotjza 142 29 at at RB work_dzeata5onzf7rp26j2quaotjza 142 30 most most RBS work_dzeata5onzf7rp26j2quaotjza 142 31 one one CD work_dzeata5onzf7rp26j2quaotjza 142 32 code code NN work_dzeata5onzf7rp26j2quaotjza 142 33 . . . work_dzeata5onzf7rp26j2quaotjza 143 1 This this DT work_dzeata5onzf7rp26j2quaotjza 143 2 ensures ensure VBZ work_dzeata5onzf7rp26j2quaotjza 143 3 that that IN work_dzeata5onzf7rp26j2quaotjza 143 4 the the DT work_dzeata5onzf7rp26j2quaotjza 143 5 data data NN work_dzeata5onzf7rp26j2quaotjza 143 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 143 7 coded code VBN work_dzeata5onzf7rp26j2quaotjza 143 8 without without IN work_dzeata5onzf7rp26j2quaotjza 143 9 missing miss VBG work_dzeata5onzf7rp26j2quaotjza 143 10 relevant relevant JJ work_dzeata5onzf7rp26j2quaotjza 143 11 data datum NNS work_dzeata5onzf7rp26j2quaotjza 143 12 and and CC work_dzeata5onzf7rp26j2quaotjza 143 13 while while IN work_dzeata5onzf7rp26j2quaotjza 143 14 reducing reduce VBG work_dzeata5onzf7rp26j2quaotjza 143 15 the the DT work_dzeata5onzf7rp26j2quaotjza 143 16 researcher researcher NN work_dzeata5onzf7rp26j2quaotjza 143 17 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 143 18 bias bias NN work_dzeata5onzf7rp26j2quaotjza 143 19 towards towards IN work_dzeata5onzf7rp26j2quaotjza 143 20 some some DT work_dzeata5onzf7rp26j2quaotjza 143 21 bits bit NNS work_dzeata5onzf7rp26j2quaotjza 143 22 of of IN work_dzeata5onzf7rp26j2quaotjza 143 23 data datum NNS work_dzeata5onzf7rp26j2quaotjza 143 24 . . . work_dzeata5onzf7rp26j2quaotjza 144 1 Finally finally RB work_dzeata5onzf7rp26j2quaotjza 144 2 , , , work_dzeata5onzf7rp26j2quaotjza 144 3 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 144 4 requires require VBZ work_dzeata5onzf7rp26j2quaotjza 144 5 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 144 6 to to TO work_dzeata5onzf7rp26j2quaotjza 144 7 test test VB work_dzeata5onzf7rp26j2quaotjza 144 8 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 144 9 full full JJ work_dzeata5onzf7rp26j2quaotjza 144 10 process process NN work_dzeata5onzf7rp26j2quaotjza 144 11 before before IN work_dzeata5onzf7rp26j2quaotjza 144 12 carrying carry VBG work_dzeata5onzf7rp26j2quaotjza 144 13 out out RP work_dzeata5onzf7rp26j2quaotjza 144 14 the the DT work_dzeata5onzf7rp26j2quaotjza 144 15 analysis.2 analysis.2 CC work_dzeata5onzf7rp26j2quaotjza 144 16 Together together RB work_dzeata5onzf7rp26j2quaotjza 144 17 , , , work_dzeata5onzf7rp26j2quaotjza 144 18 these these DT work_dzeata5onzf7rp26j2quaotjza 144 19 steps step NNS work_dzeata5onzf7rp26j2quaotjza 144 20 allow allow VBP work_dzeata5onzf7rp26j2quaotjza 144 21 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 144 22 to to IN work_dzeata5onzf7rp26j2quaotjza 144 23 reliably reliably RB work_dzeata5onzf7rp26j2quaotjza 144 24 and and CC work_dzeata5onzf7rp26j2quaotjza 144 25 effectively effectively RB work_dzeata5onzf7rp26j2quaotjza 144 26 2 2 CD work_dzeata5onzf7rp26j2quaotjza 144 27 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 144 28 followed follow VBD work_dzeata5onzf7rp26j2quaotjza 144 29 the the DT work_dzeata5onzf7rp26j2quaotjza 144 30 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 144 31 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 144 32 specified specify VBN work_dzeata5onzf7rp26j2quaotjza 144 33 by by IN work_dzeata5onzf7rp26j2quaotjza 144 34 Schreier Schreier NNP work_dzeata5onzf7rp26j2quaotjza 144 35 with with IN work_dzeata5onzf7rp26j2quaotjza 144 36 one one CD work_dzeata5onzf7rp26j2quaotjza 144 37 major major JJ work_dzeata5onzf7rp26j2quaotjza 144 38 deviation deviation NN work_dzeata5onzf7rp26j2quaotjza 144 39 . . . work_dzeata5onzf7rp26j2quaotjza 145 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 145 2 did do VBD work_dzeata5onzf7rp26j2quaotjza 145 3 not not RB work_dzeata5onzf7rp26j2quaotjza 145 4 segment segment VB work_dzeata5onzf7rp26j2quaotjza 145 5 the the DT work_dzeata5onzf7rp26j2quaotjza 145 6 text text NN work_dzeata5onzf7rp26j2quaotjza 145 7 because because IN work_dzeata5onzf7rp26j2quaotjza 145 8 the the DT work_dzeata5onzf7rp26j2quaotjza 145 9 vast vast JJ work_dzeata5onzf7rp26j2quaotjza 145 10 majority majority NN work_dzeata5onzf7rp26j2quaotjza 145 11 of of IN work_dzeata5onzf7rp26j2quaotjza 145 12 the the DT work_dzeata5onzf7rp26j2quaotjza 145 13 content content NN work_dzeata5onzf7rp26j2quaotjza 145 14 in in IN work_dzeata5onzf7rp26j2quaotjza 145 15 the the DT work_dzeata5onzf7rp26j2quaotjza 145 16 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 145 17 is be VBZ work_dzeata5onzf7rp26j2quaotjza 145 18 irrelevant irrelevant JJ work_dzeata5onzf7rp26j2quaotjza 145 19 to to IN work_dzeata5onzf7rp26j2quaotjza 145 20 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 145 21 needs need NNS work_dzeata5onzf7rp26j2quaotjza 145 22 . . . work_dzeata5onzf7rp26j2quaotjza 146 1 Most Most JJS work_dzeata5onzf7rp26j2quaotjza 146 2 uses use NNS work_dzeata5onzf7rp26j2quaotjza 146 3 of of IN work_dzeata5onzf7rp26j2quaotjza 146 4 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 146 5 attempt attempt NN work_dzeata5onzf7rp26j2quaotjza 146 6 to to TO work_dzeata5onzf7rp26j2quaotjza 146 7 capture capture VB work_dzeata5onzf7rp26j2quaotjza 146 8 content content NN work_dzeata5onzf7rp26j2quaotjza 146 9 of of IN work_dzeata5onzf7rp26j2quaotjza 146 10 a a DT work_dzeata5onzf7rp26j2quaotjza 146 11 text text NN work_dzeata5onzf7rp26j2quaotjza 146 12 in in IN work_dzeata5onzf7rp26j2quaotjza 146 13 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 146 14 entirety entirety NN work_dzeata5onzf7rp26j2quaotjza 146 15 . . . work_dzeata5onzf7rp26j2quaotjza 147 1 This this DT work_dzeata5onzf7rp26j2quaotjza 147 2 was be VBD work_dzeata5onzf7rp26j2quaotjza 147 3 not not RB work_dzeata5onzf7rp26j2quaotjza 147 4 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 147 5 goal goal NN work_dzeata5onzf7rp26j2quaotjza 147 6 so so RB work_dzeata5onzf7rp26j2quaotjza 147 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 147 8 analyzed analyze VBD work_dzeata5onzf7rp26j2quaotjza 147 9 text text NN work_dzeata5onzf7rp26j2quaotjza 147 10 more more RBR work_dzeata5onzf7rp26j2quaotjza 147 11 selectively selectively RB work_dzeata5onzf7rp26j2quaotjza 147 12 . . . work_dzeata5onzf7rp26j2quaotjza 148 1 interpret interpret NNP work_dzeata5onzf7rp26j2quaotjza 148 2 text text NN work_dzeata5onzf7rp26j2quaotjza 148 3 to to TO work_dzeata5onzf7rp26j2quaotjza 148 4 answer answer VB work_dzeata5onzf7rp26j2quaotjza 148 5 research research NN work_dzeata5onzf7rp26j2quaotjza 148 6 questions question NNS work_dzeata5onzf7rp26j2quaotjza 148 7 that that WDT work_dzeata5onzf7rp26j2quaotjza 148 8 are be VBP work_dzeata5onzf7rp26j2quaotjza 148 9 not not RB work_dzeata5onzf7rp26j2quaotjza 148 10 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 148 11 to to TO work_dzeata5onzf7rp26j2quaotjza 148 12 answer answer VB work_dzeata5onzf7rp26j2quaotjza 148 13 using use VBG work_dzeata5onzf7rp26j2quaotjza 148 14 a a DT work_dzeata5onzf7rp26j2quaotjza 148 15 purely purely RB work_dzeata5onzf7rp26j2quaotjza 148 16 quantitative quantitative JJ work_dzeata5onzf7rp26j2quaotjza 148 17 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 148 18 . . . work_dzeata5onzf7rp26j2quaotjza 149 1 For for IN work_dzeata5onzf7rp26j2quaotjza 149 2 example example NN work_dzeata5onzf7rp26j2quaotjza 149 3 , , , work_dzeata5onzf7rp26j2quaotjza 149 4 Schreier Schreier NNP work_dzeata5onzf7rp26j2quaotjza 149 5 points point VBZ work_dzeata5onzf7rp26j2quaotjza 149 6 out out RP work_dzeata5onzf7rp26j2quaotjza 149 7 that that IN work_dzeata5onzf7rp26j2quaotjza 149 8 a a DT work_dzeata5onzf7rp26j2quaotjza 149 9 quantitative quantitative JJ work_dzeata5onzf7rp26j2quaotjza 149 10 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 149 11 can can MD work_dzeata5onzf7rp26j2quaotjza 149 12 determine determine VB work_dzeata5onzf7rp26j2quaotjza 149 13 how how WRB work_dzeata5onzf7rp26j2quaotjza 149 14 many many JJ work_dzeata5onzf7rp26j2quaotjza 149 15 women woman NNS work_dzeata5onzf7rp26j2quaotjza 149 16 appear appear VBP work_dzeata5onzf7rp26j2quaotjza 149 17 in in IN work_dzeata5onzf7rp26j2quaotjza 149 18 magazine magazine NN work_dzeata5onzf7rp26j2quaotjza 149 19 advertisements advertisement NNS work_dzeata5onzf7rp26j2quaotjza 149 20 relative relative JJ work_dzeata5onzf7rp26j2quaotjza 149 21 to to IN work_dzeata5onzf7rp26j2quaotjza 149 22 men man NNS work_dzeata5onzf7rp26j2quaotjza 149 23 , , , work_dzeata5onzf7rp26j2quaotjza 149 24 but but CC work_dzeata5onzf7rp26j2quaotjza 149 25 a a DT work_dzeata5onzf7rp26j2quaotjza 149 26 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 149 27 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 149 28 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 149 29 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 149 30 , , , work_dzeata5onzf7rp26j2quaotjza 149 31 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 149 32 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 149 33 is be VBZ work_dzeata5onzf7rp26j2quaotjza 149 34 required require VBN work_dzeata5onzf7rp26j2quaotjza 149 35 to to TO work_dzeata5onzf7rp26j2quaotjza 149 36 determine determine VB work_dzeata5onzf7rp26j2quaotjza 149 37 whether whether IN work_dzeata5onzf7rp26j2quaotjza 149 38 or or CC work_dzeata5onzf7rp26j2quaotjza 149 39 not not RB work_dzeata5onzf7rp26j2quaotjza 149 40 women woman NNS work_dzeata5onzf7rp26j2quaotjza 149 41 are be VBP work_dzeata5onzf7rp26j2quaotjza 149 42 more more RBR work_dzeata5onzf7rp26j2quaotjza 149 43 likely likely JJ work_dzeata5onzf7rp26j2quaotjza 149 44 to to TO work_dzeata5onzf7rp26j2quaotjza 149 45 be be VB work_dzeata5onzf7rp26j2quaotjza 149 46 placed place VBN work_dzeata5onzf7rp26j2quaotjza 149 47 within within IN work_dzeata5onzf7rp26j2quaotjza 149 48 trivial trivial JJ work_dzeata5onzf7rp26j2quaotjza 149 49 contexts contexts NN work_dzeata5onzf7rp26j2quaotjza 149 50 than than IN work_dzeata5onzf7rp26j2quaotjza 149 51 men man NNS work_dzeata5onzf7rp26j2quaotjza 149 52 in in IN work_dzeata5onzf7rp26j2quaotjza 149 53 those those DT work_dzeata5onzf7rp26j2quaotjza 149 54 ads ad NNS work_dzeata5onzf7rp26j2quaotjza 149 55 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 149 56 Schreier schrei JJR work_dzeata5onzf7rp26j2quaotjza 149 57 , , , work_dzeata5onzf7rp26j2quaotjza 149 58 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 149 59 , , , work_dzeata5onzf7rp26j2quaotjza 149 60 p. p. NN work_dzeata5onzf7rp26j2quaotjza 149 61 2 2 CD work_dzeata5onzf7rp26j2quaotjza 149 62 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 149 63 . . . work_dzeata5onzf7rp26j2quaotjza 150 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 150 2 et et FW work_dzeata5onzf7rp26j2quaotjza 150 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 150 4 . . . work_dzeata5onzf7rp26j2quaotjza 151 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 151 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 151 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 151 4 , , , work_dzeata5onzf7rp26j2quaotjza 151 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 151 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 151 7 . . . work_dzeata5onzf7rp26j2quaotjza 152 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 152 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 152 3 , , , work_dzeata5onzf7rp26j2quaotjza 152 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 152 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 152 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 152 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 152 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 152 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 152 10 7/36 7/36 NNP work_dzeata5onzf7rp26j2quaotjza 152 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 152 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 152 13 The the DT work_dzeata5onzf7rp26j2quaotjza 152 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 152 15 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 152 16 describe describe VBP work_dzeata5onzf7rp26j2quaotjza 152 17 in in IN work_dzeata5onzf7rp26j2quaotjza 152 18 this this DT work_dzeata5onzf7rp26j2quaotjza 152 19 paper paper NN work_dzeata5onzf7rp26j2quaotjza 152 20 were be VBD work_dzeata5onzf7rp26j2quaotjza 152 21 selected select VBN work_dzeata5onzf7rp26j2quaotjza 152 22 from from IN work_dzeata5onzf7rp26j2quaotjza 152 23 the the DT work_dzeata5onzf7rp26j2quaotjza 152 24 proceedings proceeding NNS work_dzeata5onzf7rp26j2quaotjza 152 25 of of IN work_dzeata5onzf7rp26j2quaotjza 152 26 five five CD work_dzeata5onzf7rp26j2quaotjza 152 27 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 152 28 : : : work_dzeata5onzf7rp26j2quaotjza 152 29 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 152 30 Symposium Symposium NNP work_dzeata5onzf7rp26j2quaotjza 152 31 on on IN work_dzeata5onzf7rp26j2quaotjza 152 32 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 152 33 and and CC work_dzeata5onzf7rp26j2quaotjza 152 34 Privacy Privacy NNP work_dzeata5onzf7rp26j2quaotjza 152 35 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 152 36 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 152 37 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 152 38 , , , work_dzeata5onzf7rp26j2quaotjza 152 39 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 152 40 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 152 41 , , , work_dzeata5onzf7rp26j2quaotjza 152 42 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 152 43 Conference Conference NNP work_dzeata5onzf7rp26j2quaotjza 152 44 on on IN work_dzeata5onzf7rp26j2quaotjza 152 45 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 152 46 and and CC work_dzeata5onzf7rp26j2quaotjza 152 47 Communications Communications NNPS work_dzeata5onzf7rp26j2quaotjza 152 48 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 152 49 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 152 50 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 152 51 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 152 52 , , , work_dzeata5onzf7rp26j2quaotjza 152 53 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 152 54 Symposium Symposium NNP work_dzeata5onzf7rp26j2quaotjza 152 55 on on IN work_dzeata5onzf7rp26j2quaotjza 152 56 Operating Operating NNP work_dzeata5onzf7rp26j2quaotjza 152 57 System system NN work_dzeata5onzf7rp26j2quaotjza 152 58 Principles Principles NNPS work_dzeata5onzf7rp26j2quaotjza 152 59 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 152 60 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 152 61 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 152 62 , , , work_dzeata5onzf7rp26j2quaotjza 152 63 and and CC work_dzeata5onzf7rp26j2quaotjza 152 64 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 152 65 Symposium Symposium NNP work_dzeata5onzf7rp26j2quaotjza 152 66 on on IN work_dzeata5onzf7rp26j2quaotjza 152 67 Operating operate VBG work_dzeata5onzf7rp26j2quaotjza 152 68 System system NN work_dzeata5onzf7rp26j2quaotjza 152 69 Design design NN work_dzeata5onzf7rp26j2quaotjza 152 70 and and CC work_dzeata5onzf7rp26j2quaotjza 152 71 Implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 152 72 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 152 73 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 152 74 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 152 75 . . . work_dzeata5onzf7rp26j2quaotjza 153 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 153 2 restricted restrict VBD work_dzeata5onzf7rp26j2quaotjza 153 3 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 153 4 selection selection NN work_dzeata5onzf7rp26j2quaotjza 153 5 to to IN work_dzeata5onzf7rp26j2quaotjza 153 6 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 153 7 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 153 8 to to TO work_dzeata5onzf7rp26j2quaotjza 153 9 improve improve VB work_dzeata5onzf7rp26j2quaotjza 153 10 reproducibility reproducibility NN work_dzeata5onzf7rp26j2quaotjza 153 11 — — : work_dzeata5onzf7rp26j2quaotjza 153 12 because because IN work_dzeata5onzf7rp26j2quaotjza 153 13 of of IN work_dzeata5onzf7rp26j2quaotjza 153 14 this this DT work_dzeata5onzf7rp26j2quaotjza 153 15 choice choice NN work_dzeata5onzf7rp26j2quaotjza 153 16 , , , work_dzeata5onzf7rp26j2quaotjza 153 17 the the DT work_dzeata5onzf7rp26j2quaotjza 153 18 set set NN work_dzeata5onzf7rp26j2quaotjza 153 19 of of IN work_dzeata5onzf7rp26j2quaotjza 153 20 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 153 21 evaluated evaluate VBN work_dzeata5onzf7rp26j2quaotjza 153 22 against against IN work_dzeata5onzf7rp26j2quaotjza 153 23 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 153 24 inclusion inclusion NN work_dzeata5onzf7rp26j2quaotjza 153 25 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 153 26 is be VBZ work_dzeata5onzf7rp26j2quaotjza 153 27 very very RB work_dzeata5onzf7rp26j2quaotjza 153 28 well well RB work_dzeata5onzf7rp26j2quaotjza 153 29 defined define VBN work_dzeata5onzf7rp26j2quaotjza 153 30 . . . work_dzeata5onzf7rp26j2quaotjza 154 1 To to TO work_dzeata5onzf7rp26j2quaotjza 154 2 select select VB work_dzeata5onzf7rp26j2quaotjza 154 3 these these DT work_dzeata5onzf7rp26j2quaotjza 154 4 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 154 5 , , , work_dzeata5onzf7rp26j2quaotjza 154 6 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 154 7 collected collect VBD work_dzeata5onzf7rp26j2quaotjza 154 8 all all DT work_dzeata5onzf7rp26j2quaotjza 154 9 of of IN work_dzeata5onzf7rp26j2quaotjza 154 10 the the DT work_dzeata5onzf7rp26j2quaotjza 154 11 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 154 12 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 154 13 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 154 14 were be VBD work_dzeata5onzf7rp26j2quaotjza 154 15 aware aware JJ work_dzeata5onzf7rp26j2quaotjza 154 16 of of IN work_dzeata5onzf7rp26j2quaotjza 154 17 and and CC work_dzeata5onzf7rp26j2quaotjza 154 18 the the DT work_dzeata5onzf7rp26j2quaotjza 154 19 selected selected JJ work_dzeata5onzf7rp26j2quaotjza 154 20 five five CD work_dzeata5onzf7rp26j2quaotjza 154 21 venues venue NNS work_dzeata5onzf7rp26j2quaotjza 154 22 contained contain VBD work_dzeata5onzf7rp26j2quaotjza 154 23 far far RB work_dzeata5onzf7rp26j2quaotjza 154 24 more more JJR work_dzeata5onzf7rp26j2quaotjza 154 25 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 154 26 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 154 27 than than IN work_dzeata5onzf7rp26j2quaotjza 154 28 any any DT work_dzeata5onzf7rp26j2quaotjza 154 29 other other JJ work_dzeata5onzf7rp26j2quaotjza 154 30 venue.3 venue.3 CD work_dzeata5onzf7rp26j2quaotjza 154 31 3 3 CD work_dzeata5onzf7rp26j2quaotjza 154 32 Based base VBN work_dzeata5onzf7rp26j2quaotjza 154 33 on on IN work_dzeata5onzf7rp26j2quaotjza 154 34 earlier early JJR work_dzeata5onzf7rp26j2quaotjza 154 35 criticism criticism NN work_dzeata5onzf7rp26j2quaotjza 154 36 of of IN work_dzeata5onzf7rp26j2quaotjza 154 37 this this DT work_dzeata5onzf7rp26j2quaotjza 154 38 paper paper NN work_dzeata5onzf7rp26j2quaotjza 154 39 , , , work_dzeata5onzf7rp26j2quaotjza 154 40 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 154 41 reevaluated reevaluate VBD work_dzeata5onzf7rp26j2quaotjza 154 42 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 154 43 data datum NNS work_dzeata5onzf7rp26j2quaotjza 154 44 set set VBN work_dzeata5onzf7rp26j2quaotjza 154 45 by by IN work_dzeata5onzf7rp26j2quaotjza 154 46 looking look VBG work_dzeata5onzf7rp26j2quaotjza 154 47 at at IN work_dzeata5onzf7rp26j2quaotjza 154 48 the the DT work_dzeata5onzf7rp26j2quaotjza 154 49 past past JJ work_dzeata5onzf7rp26j2quaotjza 154 50 four four CD work_dzeata5onzf7rp26j2quaotjza 154 51 years year NNS work_dzeata5onzf7rp26j2quaotjza 154 52 of of IN work_dzeata5onzf7rp26j2quaotjza 154 53 proceedings proceeding NNS work_dzeata5onzf7rp26j2quaotjza 154 54 at at IN work_dzeata5onzf7rp26j2quaotjza 154 55 unselected unselected JJ work_dzeata5onzf7rp26j2quaotjza 154 56 venues venue NNS work_dzeata5onzf7rp26j2quaotjza 154 57 such such JJ work_dzeata5onzf7rp26j2quaotjza 154 58 as as IN work_dzeata5onzf7rp26j2quaotjza 154 59 the the DT work_dzeata5onzf7rp26j2quaotjza 154 60 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 154 61 Annual Annual NNP work_dzeata5onzf7rp26j2quaotjza 154 62 Technical Technical NNP work_dzeata5onzf7rp26j2quaotjza 154 63 Conference Conference NNP work_dzeata5onzf7rp26j2quaotjza 154 64 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 154 65 ATC ATC NNP work_dzeata5onzf7rp26j2quaotjza 154 66 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 154 67 , , , work_dzeata5onzf7rp26j2quaotjza 154 68 Programming Programming NNP work_dzeata5onzf7rp26j2quaotjza 154 69 Language Language NNP work_dzeata5onzf7rp26j2quaotjza 154 70 Design Design NNP work_dzeata5onzf7rp26j2quaotjza 154 71 and and CC work_dzeata5onzf7rp26j2quaotjza 154 72 Implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 154 73 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 154 74 PLDI PLDI NNP work_dzeata5onzf7rp26j2quaotjza 154 75 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 154 76 , , , work_dzeata5onzf7rp26j2quaotjza 154 77 and and CC work_dzeata5onzf7rp26j2quaotjza 154 78 Object object NN work_dzeata5onzf7rp26j2quaotjza 154 79 - - HYPH work_dzeata5onzf7rp26j2quaotjza 154 80 Oriented orient VBN work_dzeata5onzf7rp26j2quaotjza 154 81 Programming Programming NNP work_dzeata5onzf7rp26j2quaotjza 154 82 , , , work_dzeata5onzf7rp26j2quaotjza 154 83 Systems Systems NNPS work_dzeata5onzf7rp26j2quaotjza 154 84 , , , work_dzeata5onzf7rp26j2quaotjza 154 85 Languages Languages NNPS work_dzeata5onzf7rp26j2quaotjza 154 86 and and CC work_dzeata5onzf7rp26j2quaotjza 154 87 Applications Applications NNPS work_dzeata5onzf7rp26j2quaotjza 154 88 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 154 89 OOPSLA OOPSLA NNP work_dzeata5onzf7rp26j2quaotjza 154 90 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 154 91 . . . work_dzeata5onzf7rp26j2quaotjza 155 1 These these DT work_dzeata5onzf7rp26j2quaotjza 155 2 venues venue NNS work_dzeata5onzf7rp26j2quaotjza 155 3 contained contain VBD work_dzeata5onzf7rp26j2quaotjza 155 4 fewer few JJR work_dzeata5onzf7rp26j2quaotjza 155 5 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 155 6 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 155 7 than than IN work_dzeata5onzf7rp26j2quaotjza 155 8 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 155 9 selected select VBN work_dzeata5onzf7rp26j2quaotjza 155 10 venues venue NNS work_dzeata5onzf7rp26j2quaotjza 155 11 , , , work_dzeata5onzf7rp26j2quaotjza 155 12 and and CC work_dzeata5onzf7rp26j2quaotjza 155 13 those those DT work_dzeata5onzf7rp26j2quaotjza 155 14 that that WDT work_dzeata5onzf7rp26j2quaotjza 155 15 appeared appear VBD work_dzeata5onzf7rp26j2quaotjza 155 16 were be VBD work_dzeata5onzf7rp26j2quaotjza 155 17 not not RB work_dzeata5onzf7rp26j2quaotjza 155 18 significantly significantly RB work_dzeata5onzf7rp26j2quaotjza 155 19 different different JJ work_dzeata5onzf7rp26j2quaotjza 155 20 in in IN work_dzeata5onzf7rp26j2quaotjza 155 21 form form NN work_dzeata5onzf7rp26j2quaotjza 155 22 or or CC work_dzeata5onzf7rp26j2quaotjza 155 23 content content NN work_dzeata5onzf7rp26j2quaotjza 155 24 from from IN work_dzeata5onzf7rp26j2quaotjza 155 25 those those DT work_dzeata5onzf7rp26j2quaotjza 155 26 in in IN work_dzeata5onzf7rp26j2quaotjza 155 27 selected select VBN work_dzeata5onzf7rp26j2quaotjza 155 28 venues venue NNS work_dzeata5onzf7rp26j2quaotjza 155 29 . . . work_dzeata5onzf7rp26j2quaotjza 156 1 In in IN work_dzeata5onzf7rp26j2quaotjza 156 2 fact fact NN work_dzeata5onzf7rp26j2quaotjza 156 3 , , , work_dzeata5onzf7rp26j2quaotjza 156 4 with with IN work_dzeata5onzf7rp26j2quaotjza 156 5 rare rare JJ work_dzeata5onzf7rp26j2quaotjza 156 6 exceptions exception NNS work_dzeata5onzf7rp26j2quaotjza 156 7 , , , work_dzeata5onzf7rp26j2quaotjza 156 8 the the DT work_dzeata5onzf7rp26j2quaotjza 156 9 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 156 10 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 156 11 at at IN work_dzeata5onzf7rp26j2quaotjza 156 12 the the DT work_dzeata5onzf7rp26j2quaotjza 156 13 unselected unselected JJ work_dzeata5onzf7rp26j2quaotjza 156 14 venues venue NNS work_dzeata5onzf7rp26j2quaotjza 156 15 were be VBD work_dzeata5onzf7rp26j2quaotjza 156 16 written write VBN work_dzeata5onzf7rp26j2quaotjza 156 17 by by IN work_dzeata5onzf7rp26j2quaotjza 156 18 the the DT work_dzeata5onzf7rp26j2quaotjza 156 19 same same JJ work_dzeata5onzf7rp26j2quaotjza 156 20 authors author NNS work_dzeata5onzf7rp26j2quaotjza 156 21 as as IN work_dzeata5onzf7rp26j2quaotjza 156 22 one one CD work_dzeata5onzf7rp26j2quaotjza 156 23 or or CC work_dzeata5onzf7rp26j2quaotjza 156 24 more more JJR work_dzeata5onzf7rp26j2quaotjza 156 25 paper paper NN work_dzeata5onzf7rp26j2quaotjza 156 26 in in IN work_dzeata5onzf7rp26j2quaotjza 156 27 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 156 28 data data NN work_dzeata5onzf7rp26j2quaotjza 156 29 set set NN work_dzeata5onzf7rp26j2quaotjza 156 30 . . . work_dzeata5onzf7rp26j2quaotjza 157 1 The the DT work_dzeata5onzf7rp26j2quaotjza 157 2 selected selected JJ work_dzeata5onzf7rp26j2quaotjza 157 3 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 157 4 are be VBP work_dzeata5onzf7rp26j2quaotjza 157 5 widely widely RB work_dzeata5onzf7rp26j2quaotjza 157 6 regarded regard VBN work_dzeata5onzf7rp26j2quaotjza 157 7 as as IN work_dzeata5onzf7rp26j2quaotjza 157 8 the the DT work_dzeata5onzf7rp26j2quaotjza 157 9 top top JJ work_dzeata5onzf7rp26j2quaotjza 157 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 157 11 tier tier NN work_dzeata5onzf7rp26j2quaotjza 157 12 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 157 13 in in IN work_dzeata5onzf7rp26j2quaotjza 157 14 software software NN work_dzeata5onzf7rp26j2quaotjza 157 15 security security NN work_dzeata5onzf7rp26j2quaotjza 157 16 and and CC work_dzeata5onzf7rp26j2quaotjza 157 17 operating operating NN work_dzeata5onzf7rp26j2quaotjza 157 18 systems system NNS work_dzeata5onzf7rp26j2quaotjza 157 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 157 20 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 157 21 , , , work_dzeata5onzf7rp26j2quaotjza 157 22 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 157 23 , , , work_dzeata5onzf7rp26j2quaotjza 157 24 http://faculty.cs.tamu.edu/ http://faculty.cs.tamu.edu/ NNP work_dzeata5onzf7rp26j2quaotjza 157 25 guofei guofei NNP work_dzeata5onzf7rp26j2quaotjza 157 26 / / SYM work_dzeata5onzf7rp26j2quaotjza 157 27 sec sec NNP work_dzeata5onzf7rp26j2quaotjza 157 28 conf conf NNP work_dzeata5onzf7rp26j2quaotjza 157 29 stat.htm stat.htm NNP work_dzeata5onzf7rp26j2quaotjza 157 30 , , , work_dzeata5onzf7rp26j2quaotjza 157 31 http://webdocs.cs.ualberta.ca/∼zaiane/htmldocs/ConfRanking http://webdocs.cs.ualberta.ca/∼zaiane/htmldocs/confranking NN work_dzeata5onzf7rp26j2quaotjza 157 32 . . . work_dzeata5onzf7rp26j2quaotjza 158 1 html html NNP work_dzeata5onzf7rp26j2quaotjza 158 2 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 158 3 . . . work_dzeata5onzf7rp26j2quaotjza 159 1 Therefore therefore RB work_dzeata5onzf7rp26j2quaotjza 159 2 , , , work_dzeata5onzf7rp26j2quaotjza 159 3 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 159 4 data datum NNS work_dzeata5onzf7rp26j2quaotjza 159 5 reflects reflect VBZ work_dzeata5onzf7rp26j2quaotjza 159 6 the the DT work_dzeata5onzf7rp26j2quaotjza 159 7 consensus consensus NN work_dzeata5onzf7rp26j2quaotjza 159 8 of of IN work_dzeata5onzf7rp26j2quaotjza 159 9 large large JJ work_dzeata5onzf7rp26j2quaotjza 159 10 communities community NNS work_dzeata5onzf7rp26j2quaotjza 159 11 . . . work_dzeata5onzf7rp26j2quaotjza 160 1 Table table NN work_dzeata5onzf7rp26j2quaotjza 160 2 3 3 CD work_dzeata5onzf7rp26j2quaotjza 160 3 presents present VBZ work_dzeata5onzf7rp26j2quaotjza 160 4 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 160 5 twelve twelve CD work_dzeata5onzf7rp26j2quaotjza 160 6 research research NN work_dzeata5onzf7rp26j2quaotjza 160 7 questions question NNS work_dzeata5onzf7rp26j2quaotjza 160 8 , , , work_dzeata5onzf7rp26j2quaotjza 160 9 the the DT work_dzeata5onzf7rp26j2quaotjza 160 10 areas area NNS work_dzeata5onzf7rp26j2quaotjza 160 11 each each DT work_dzeata5onzf7rp26j2quaotjza 160 12 question question NN work_dzeata5onzf7rp26j2quaotjza 160 13 attempts attempt VBZ work_dzeata5onzf7rp26j2quaotjza 160 14 to to TO work_dzeata5onzf7rp26j2quaotjza 160 15 illuminate illuminate VB work_dzeata5onzf7rp26j2quaotjza 160 16 , , , work_dzeata5onzf7rp26j2quaotjza 160 17 and and CC work_dzeata5onzf7rp26j2quaotjza 160 18 a a DT work_dzeata5onzf7rp26j2quaotjza 160 19 comprehensive comprehensive JJ work_dzeata5onzf7rp26j2quaotjza 160 20 list list NN work_dzeata5onzf7rp26j2quaotjza 160 21 of of IN work_dzeata5onzf7rp26j2quaotjza 160 22 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 160 23 answers answer NNS work_dzeata5onzf7rp26j2quaotjza 160 24 as as IN work_dzeata5onzf7rp26j2quaotjza 160 25 manifested manifest VBN work_dzeata5onzf7rp26j2quaotjza 160 26 by by IN work_dzeata5onzf7rp26j2quaotjza 160 27 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 160 28 paper paper NN work_dzeata5onzf7rp26j2quaotjza 160 29 corpus corpus NN work_dzeata5onzf7rp26j2quaotjza 160 30 . . . work_dzeata5onzf7rp26j2quaotjza 161 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 161 2 derived derive VBD work_dzeata5onzf7rp26j2quaotjza 161 3 an an DT work_dzeata5onzf7rp26j2quaotjza 161 4 initial initial JJ work_dzeata5onzf7rp26j2quaotjza 161 5 set set NN work_dzeata5onzf7rp26j2quaotjza 161 6 of of IN work_dzeata5onzf7rp26j2quaotjza 161 7 questions question NNS work_dzeata5onzf7rp26j2quaotjza 161 8 by by IN work_dzeata5onzf7rp26j2quaotjza 161 9 considering consider VBG work_dzeata5onzf7rp26j2quaotjza 161 10 which which WDT work_dzeata5onzf7rp26j2quaotjza 161 11 broad broad JJ work_dzeata5onzf7rp26j2quaotjza 161 12 aspects aspect NNS work_dzeata5onzf7rp26j2quaotjza 161 13 of of IN work_dzeata5onzf7rp26j2quaotjza 161 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 161 15 are be VBP work_dzeata5onzf7rp26j2quaotjza 161 16 poorly poorly RB work_dzeata5onzf7rp26j2quaotjza 161 17 understood understand VBN work_dzeata5onzf7rp26j2quaotjza 161 18 and and CC work_dzeata5onzf7rp26j2quaotjza 161 19 where where WRB work_dzeata5onzf7rp26j2quaotjza 161 20 better well JJR work_dzeata5onzf7rp26j2quaotjza 161 21 understanding understanding NN work_dzeata5onzf7rp26j2quaotjza 161 22 may may MD work_dzeata5onzf7rp26j2quaotjza 161 23 change change VB work_dzeata5onzf7rp26j2quaotjza 161 24 how how WRB work_dzeata5onzf7rp26j2quaotjza 161 25 the the DT work_dzeata5onzf7rp26j2quaotjza 161 26 community community NN work_dzeata5onzf7rp26j2quaotjza 161 27 performs perform VBZ work_dzeata5onzf7rp26j2quaotjza 161 28 research research NN work_dzeata5onzf7rp26j2quaotjza 161 29 in in IN work_dzeata5onzf7rp26j2quaotjza 161 30 this this DT work_dzeata5onzf7rp26j2quaotjza 161 31 space space NN work_dzeata5onzf7rp26j2quaotjza 161 32 . . . work_dzeata5onzf7rp26j2quaotjza 162 1 As as IN work_dzeata5onzf7rp26j2quaotjza 162 2 a a DT work_dzeata5onzf7rp26j2quaotjza 162 3 result result NN work_dzeata5onzf7rp26j2quaotjza 162 4 , , , work_dzeata5onzf7rp26j2quaotjza 162 5 the the DT work_dzeata5onzf7rp26j2quaotjza 162 6 questions question NNS work_dzeata5onzf7rp26j2quaotjza 162 7 are be VBP work_dzeata5onzf7rp26j2quaotjza 162 8 necessarily necessarily RB work_dzeata5onzf7rp26j2quaotjza 162 9 biased bias VBN work_dzeata5onzf7rp26j2quaotjza 162 10 by by IN work_dzeata5onzf7rp26j2quaotjza 162 11 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 162 12 own own JJ work_dzeata5onzf7rp26j2quaotjza 162 13 backgrounds background NNS work_dzeata5onzf7rp26j2quaotjza 162 14 and and CC work_dzeata5onzf7rp26j2quaotjza 162 15 personal personal JJ work_dzeata5onzf7rp26j2quaotjza 162 16 experiences experience NNS work_dzeata5onzf7rp26j2quaotjza 162 17 . . . work_dzeata5onzf7rp26j2quaotjza 163 1 In in IN work_dzeata5onzf7rp26j2quaotjza 163 2 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 163 3 , , , work_dzeata5onzf7rp26j2quaotjza 163 4 this this DT work_dzeata5onzf7rp26j2quaotjza 163 5 led lead VBD work_dzeata5onzf7rp26j2quaotjza 163 6 to to IN work_dzeata5onzf7rp26j2quaotjza 163 7 an an DT work_dzeata5onzf7rp26j2quaotjza 163 8 emphasis emphasis NN work_dzeata5onzf7rp26j2quaotjza 163 9 on on IN work_dzeata5onzf7rp26j2quaotjza 163 10 questions question NNS work_dzeata5onzf7rp26j2quaotjza 163 11 about about IN work_dzeata5onzf7rp26j2quaotjza 163 12 how how WRB work_dzeata5onzf7rp26j2quaotjza 163 13 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 163 14 and and CC work_dzeata5onzf7rp26j2quaotjza 163 15 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 163 16 are be VBP work_dzeata5onzf7rp26j2quaotjza 163 17 derived derive VBN work_dzeata5onzf7rp26j2quaotjza 163 18 , , , work_dzeata5onzf7rp26j2quaotjza 163 19 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 163 20 , , , work_dzeata5onzf7rp26j2quaotjza 163 21 and and CC work_dzeata5onzf7rp26j2quaotjza 163 22 evaluated evaluate VBD work_dzeata5onzf7rp26j2quaotjza 163 23 . . . work_dzeata5onzf7rp26j2quaotjza 164 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 164 2 added add VBD work_dzeata5onzf7rp26j2quaotjza 164 3 questions question NNS work_dzeata5onzf7rp26j2quaotjza 164 4 while while IN work_dzeata5onzf7rp26j2quaotjza 164 5 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 164 6 performed perform VBD work_dzeata5onzf7rp26j2quaotjza 164 7 the the DT work_dzeata5onzf7rp26j2quaotjza 164 8 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 164 9 when when WRB work_dzeata5onzf7rp26j2quaotjza 164 10 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 164 11 found find VBD work_dzeata5onzf7rp26j2quaotjza 164 12 that that IN work_dzeata5onzf7rp26j2quaotjza 164 13 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 164 14 had have VBD work_dzeata5onzf7rp26j2quaotjza 164 15 the the DT work_dzeata5onzf7rp26j2quaotjza 164 16 data datum NNS work_dzeata5onzf7rp26j2quaotjza 164 17 to to TO work_dzeata5onzf7rp26j2quaotjza 164 18 answer answer VB work_dzeata5onzf7rp26j2quaotjza 164 19 new new JJ work_dzeata5onzf7rp26j2quaotjza 164 20 and and CC work_dzeata5onzf7rp26j2quaotjza 164 21 interesting interesting JJ work_dzeata5onzf7rp26j2quaotjza 164 22 questions question NNS work_dzeata5onzf7rp26j2quaotjza 164 23 . . . work_dzeata5onzf7rp26j2quaotjza 165 1 Overall overall RB work_dzeata5onzf7rp26j2quaotjza 165 2 , , , work_dzeata5onzf7rp26j2quaotjza 165 3 these these DT work_dzeata5onzf7rp26j2quaotjza 165 4 questions question NNS work_dzeata5onzf7rp26j2quaotjza 165 5 aim aim VBP work_dzeata5onzf7rp26j2quaotjza 165 6 to to TO work_dzeata5onzf7rp26j2quaotjza 165 7 capture capture VB work_dzeata5onzf7rp26j2quaotjza 165 8 a a DT work_dzeata5onzf7rp26j2quaotjza 165 9 comprehensive comprehensive JJ work_dzeata5onzf7rp26j2quaotjza 165 10 snapshot snapshot NN work_dzeata5onzf7rp26j2quaotjza 165 11 of of IN work_dzeata5onzf7rp26j2quaotjza 165 12 the the DT work_dzeata5onzf7rp26j2quaotjza 165 13 current current JJ work_dzeata5onzf7rp26j2quaotjza 165 14 state state NN work_dzeata5onzf7rp26j2quaotjza 165 15 of of IN work_dzeata5onzf7rp26j2quaotjza 165 16 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 165 17 research research NN work_dzeata5onzf7rp26j2quaotjza 165 18 , , , work_dzeata5onzf7rp26j2quaotjza 165 19 with with IN work_dzeata5onzf7rp26j2quaotjza 165 20 an an DT work_dzeata5onzf7rp26j2quaotjza 165 21 emphasis emphasis NN work_dzeata5onzf7rp26j2quaotjza 165 22 on on IN work_dzeata5onzf7rp26j2quaotjza 165 23 where where WRB work_dzeata5onzf7rp26j2quaotjza 165 24 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 165 25 fit fit VBP work_dzeata5onzf7rp26j2quaotjza 165 26 into into IN work_dzeata5onzf7rp26j2quaotjza 165 27 the the DT work_dzeata5onzf7rp26j2quaotjza 165 28 process process NN work_dzeata5onzf7rp26j2quaotjza 165 29 of of IN work_dzeata5onzf7rp26j2quaotjza 165 30 securing secure VBG work_dzeata5onzf7rp26j2quaotjza 165 31 software software NN work_dzeata5onzf7rp26j2quaotjza 165 32 systems system NNS work_dzeata5onzf7rp26j2quaotjza 165 33 , , , work_dzeata5onzf7rp26j2quaotjza 165 34 what what WP work_dzeata5onzf7rp26j2quaotjza 165 35 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 165 36 are be VBP work_dzeata5onzf7rp26j2quaotjza 165 37 enforced enforce VBN work_dzeata5onzf7rp26j2quaotjza 165 38 and and CC work_dzeata5onzf7rp26j2quaotjza 165 39 how how WRB work_dzeata5onzf7rp26j2quaotjza 165 40 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 165 41 are be VBP work_dzeata5onzf7rp26j2quaotjza 165 42 defined define VBN work_dzeata5onzf7rp26j2quaotjza 165 43 and and CC work_dzeata5onzf7rp26j2quaotjza 165 44 constructed construct VBN work_dzeata5onzf7rp26j2quaotjza 165 45 , , , work_dzeata5onzf7rp26j2quaotjza 165 46 and and CC work_dzeata5onzf7rp26j2quaotjza 165 47 what what WDT work_dzeata5onzf7rp26j2quaotjza 165 48 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 165 49 are be VBP work_dzeata5onzf7rp26j2quaotjza 165 50 made make VBN work_dzeata5onzf7rp26j2quaotjza 165 51 about about IN work_dzeata5onzf7rp26j2quaotjza 165 52 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 165 53 and and CC work_dzeata5onzf7rp26j2quaotjza 165 54 how how WRB work_dzeata5onzf7rp26j2quaotjza 165 55 those those DT work_dzeata5onzf7rp26j2quaotjza 165 56 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 165 57 are be VBP work_dzeata5onzf7rp26j2quaotjza 165 58 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 165 59 . . . work_dzeata5onzf7rp26j2quaotjza 166 1 Picking pick VBG work_dzeata5onzf7rp26j2quaotjza 166 2 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 166 3 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 166 4 selected select VBD work_dzeata5onzf7rp26j2quaotjza 166 5 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 166 6 from from IN work_dzeata5onzf7rp26j2quaotjza 166 7 10 10 CD work_dzeata5onzf7rp26j2quaotjza 166 8 years year NNS work_dzeata5onzf7rp26j2quaotjza 166 9 worth worth JJ work_dzeata5onzf7rp26j2quaotjza 166 10 of of IN work_dzeata5onzf7rp26j2quaotjza 166 11 proceedings proceeding NNS work_dzeata5onzf7rp26j2quaotjza 166 12 at at IN work_dzeata5onzf7rp26j2quaotjza 166 13 the the DT work_dzeata5onzf7rp26j2quaotjza 166 14 five five CD work_dzeata5onzf7rp26j2quaotjza 166 15 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 166 16 mentioned mention VBN work_dzeata5onzf7rp26j2quaotjza 166 17 above above RB work_dzeata5onzf7rp26j2quaotjza 166 18 . . . work_dzeata5onzf7rp26j2quaotjza 167 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 167 2 decided decide VBD work_dzeata5onzf7rp26j2quaotjza 167 3 whether whether IN work_dzeata5onzf7rp26j2quaotjza 167 4 a a DT work_dzeata5onzf7rp26j2quaotjza 167 5 paper paper NN work_dzeata5onzf7rp26j2quaotjza 167 6 was be VBD work_dzeata5onzf7rp26j2quaotjza 167 7 included include VBN work_dzeata5onzf7rp26j2quaotjza 167 8 in in IN work_dzeata5onzf7rp26j2quaotjza 167 9 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 167 10 sample sample NN work_dzeata5onzf7rp26j2quaotjza 167 11 based base VBN work_dzeata5onzf7rp26j2quaotjza 167 12 on on IN work_dzeata5onzf7rp26j2quaotjza 167 13 rigorous rigorous JJ work_dzeata5onzf7rp26j2quaotjza 167 14 inclusion inclusion NN work_dzeata5onzf7rp26j2quaotjza 167 15 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 167 16 so so IN work_dzeata5onzf7rp26j2quaotjza 167 17 the the DT work_dzeata5onzf7rp26j2quaotjza 167 18 process process NN work_dzeata5onzf7rp26j2quaotjza 167 19 of of IN work_dzeata5onzf7rp26j2quaotjza 167 20 including include VBG work_dzeata5onzf7rp26j2quaotjza 167 21 / / SYM work_dzeata5onzf7rp26j2quaotjza 167 22 excluding exclude VBG work_dzeata5onzf7rp26j2quaotjza 167 23 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 167 24 is be VBZ work_dzeata5onzf7rp26j2quaotjza 167 25 repeatable repeatable JJ work_dzeata5onzf7rp26j2quaotjza 167 26 . . . work_dzeata5onzf7rp26j2quaotjza 168 1 The the DT work_dzeata5onzf7rp26j2quaotjza 168 2 most most RBS work_dzeata5onzf7rp26j2quaotjza 168 3 important important JJ work_dzeata5onzf7rp26j2quaotjza 168 4 criterion criterion NN work_dzeata5onzf7rp26j2quaotjza 168 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 168 6 that that IN work_dzeata5onzf7rp26j2quaotjza 168 7 the the DT work_dzeata5onzf7rp26j2quaotjza 168 8 paper paper NN work_dzeata5onzf7rp26j2quaotjza 168 9 describes describe VBZ work_dzeata5onzf7rp26j2quaotjza 168 10 a a DT work_dzeata5onzf7rp26j2quaotjza 168 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 168 12 that that WDT work_dzeata5onzf7rp26j2quaotjza 168 13 meets meet VBZ work_dzeata5onzf7rp26j2quaotjza 168 14 the the DT work_dzeata5onzf7rp26j2quaotjza 168 15 definition definition NN work_dzeata5onzf7rp26j2quaotjza 168 16 given give VBN work_dzeata5onzf7rp26j2quaotjza 168 17 in in IN work_dzeata5onzf7rp26j2quaotjza 168 18 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 168 19 What what WP work_dzeata5onzf7rp26j2quaotjza 168 20 is be VBZ work_dzeata5onzf7rp26j2quaotjza 168 21 a a DT work_dzeata5onzf7rp26j2quaotjza 168 22 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 168 23 ? ? . work_dzeata5onzf7rp26j2quaotjza 168 24 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 168 25 . . . work_dzeata5onzf7rp26j2quaotjza 169 1 The the DT work_dzeata5onzf7rp26j2quaotjza 169 2 remaining remain VBG work_dzeata5onzf7rp26j2quaotjza 169 3 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 169 4 were be VBD work_dzeata5onzf7rp26j2quaotjza 169 5 added add VBN work_dzeata5onzf7rp26j2quaotjza 169 6 as as IN work_dzeata5onzf7rp26j2quaotjza 169 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 169 8 carried carry VBD work_dzeata5onzf7rp26j2quaotjza 169 9 out out RP work_dzeata5onzf7rp26j2quaotjza 169 10 the the DT work_dzeata5onzf7rp26j2quaotjza 169 11 study study NN work_dzeata5onzf7rp26j2quaotjza 169 12 to to TO work_dzeata5onzf7rp26j2quaotjza 169 13 exclude exclude VB work_dzeata5onzf7rp26j2quaotjza 169 14 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 169 15 that that WDT work_dzeata5onzf7rp26j2quaotjza 169 16 are be VBP work_dzeata5onzf7rp26j2quaotjza 169 17 incapable incapable JJ work_dzeata5onzf7rp26j2quaotjza 169 18 of of IN work_dzeata5onzf7rp26j2quaotjza 169 19 answering answer VBG work_dzeata5onzf7rp26j2quaotjza 169 20 the the DT work_dzeata5onzf7rp26j2quaotjza 169 21 research research NN work_dzeata5onzf7rp26j2quaotjza 169 22 questions question NNS work_dzeata5onzf7rp26j2quaotjza 169 23 and and CC work_dzeata5onzf7rp26j2quaotjza 169 24 to to TO work_dzeata5onzf7rp26j2quaotjza 169 25 clarify clarify VB work_dzeata5onzf7rp26j2quaotjza 169 26 relevant relevant JJ work_dzeata5onzf7rp26j2quaotjza 169 27 nuances nuance NNS work_dzeata5onzf7rp26j2quaotjza 169 28 in in IN work_dzeata5onzf7rp26j2quaotjza 169 29 the the DT work_dzeata5onzf7rp26j2quaotjza 169 30 definition definition NN work_dzeata5onzf7rp26j2quaotjza 169 31 . . . work_dzeata5onzf7rp26j2quaotjza 170 1 Papers paper NNS work_dzeata5onzf7rp26j2quaotjza 170 2 were be VBD work_dzeata5onzf7rp26j2quaotjza 170 3 included include VBN work_dzeata5onzf7rp26j2quaotjza 170 4 if if IN work_dzeata5onzf7rp26j2quaotjza 170 5 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 170 6 met meet VBD work_dzeata5onzf7rp26j2quaotjza 170 7 the the DT work_dzeata5onzf7rp26j2quaotjza 170 8 following follow VBG work_dzeata5onzf7rp26j2quaotjza 170 9 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 170 10 : : : work_dzeata5onzf7rp26j2quaotjza 170 11 • • VB work_dzeata5onzf7rp26j2quaotjza 170 12 The the DT work_dzeata5onzf7rp26j2quaotjza 170 13 paper paper NN work_dzeata5onzf7rp26j2quaotjza 170 14 documents document VBZ work_dzeata5onzf7rp26j2quaotjza 170 15 the the DT work_dzeata5onzf7rp26j2quaotjza 170 16 design design NN work_dzeata5onzf7rp26j2quaotjza 170 17 of of IN work_dzeata5onzf7rp26j2quaotjza 170 18 a a DT work_dzeata5onzf7rp26j2quaotjza 170 19 novel novel JJ work_dzeata5onzf7rp26j2quaotjza 170 20 tool tool NN work_dzeata5onzf7rp26j2quaotjza 170 21 or or CC work_dzeata5onzf7rp26j2quaotjza 170 22 technique technique NN work_dzeata5onzf7rp26j2quaotjza 170 23 that that WDT work_dzeata5onzf7rp26j2quaotjza 170 24 falls fall VBZ work_dzeata5onzf7rp26j2quaotjza 170 25 under under IN work_dzeata5onzf7rp26j2quaotjza 170 26 the the DT work_dzeata5onzf7rp26j2quaotjza 170 27 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 170 28 definition definition NN work_dzeata5onzf7rp26j2quaotjza 170 29 • • NN work_dzeata5onzf7rp26j2quaotjza 170 30 The the DT work_dzeata5onzf7rp26j2quaotjza 170 31 paper paper NN work_dzeata5onzf7rp26j2quaotjza 170 32 is be VBZ work_dzeata5onzf7rp26j2quaotjza 170 33 a a DT work_dzeata5onzf7rp26j2quaotjza 170 34 full full JJ work_dzeata5onzf7rp26j2quaotjza 170 35 conference conference NN work_dzeata5onzf7rp26j2quaotjza 170 36 paper paper NN work_dzeata5onzf7rp26j2quaotjza 170 37 • • VBP work_dzeata5onzf7rp26j2quaotjza 170 38 The the DT work_dzeata5onzf7rp26j2quaotjza 170 39 paper paper NN work_dzeata5onzf7rp26j2quaotjza 170 40 is be VBZ work_dzeata5onzf7rp26j2quaotjza 170 41 about about RB work_dzeata5onzf7rp26j2quaotjza 170 42 an an DT work_dzeata5onzf7rp26j2quaotjza 170 43 instance instance NN work_dzeata5onzf7rp26j2quaotjza 170 44 of of IN work_dzeata5onzf7rp26j2quaotjza 170 45 a a DT work_dzeata5onzf7rp26j2quaotjza 170 46 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 170 47 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 170 48 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 170 49 , , , work_dzeata5onzf7rp26j2quaotjza 170 50 not not RB work_dzeata5onzf7rp26j2quaotjza 170 51 a a DT work_dzeata5onzf7rp26j2quaotjza 170 52 component component NN work_dzeata5onzf7rp26j2quaotjza 170 53 for for IN work_dzeata5onzf7rp26j2quaotjza 170 54 building build VBG work_dzeata5onzf7rp26j2quaotjza 170 55 new new JJ work_dzeata5onzf7rp26j2quaotjza 170 56 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 170 57 tools tool NNS work_dzeata5onzf7rp26j2quaotjza 170 58 , , , work_dzeata5onzf7rp26j2quaotjza 170 59 theoretical theoretical JJ work_dzeata5onzf7rp26j2quaotjza 170 60 constructs construct NNS work_dzeata5onzf7rp26j2quaotjza 170 61 for for IN work_dzeata5onzf7rp26j2quaotjza 170 62 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 170 63 , , , work_dzeata5onzf7rp26j2quaotjza 170 64 etc etc FW work_dzeata5onzf7rp26j2quaotjza 170 65 . . . work_dzeata5onzf7rp26j2quaotjza 170 66 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 171 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 171 2 et et FW work_dzeata5onzf7rp26j2quaotjza 171 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 171 4 . . . work_dzeata5onzf7rp26j2quaotjza 172 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 172 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 172 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 172 4 , , , work_dzeata5onzf7rp26j2quaotjza 172 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 172 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 172 7 . . . work_dzeata5onzf7rp26j2quaotjza 173 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 173 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 173 3 , , , work_dzeata5onzf7rp26j2quaotjza 173 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 173 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 173 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 173 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 173 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 173 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 173 10 8/36 8/36 NNP work_dzeata5onzf7rp26j2quaotjza 173 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 173 12 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking VBZ work_dzeata5onzf7rp26j2quaotjza 173 13 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking VBZ work_dzeata5onzf7rp26j2quaotjza 173 14 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 15 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 16 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 17 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 18 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 19 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 20 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 21 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 22 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 23 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 24 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 25 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 26 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 27 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 28 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 29 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 30 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 31 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 32 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 33 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 34 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 35 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 36 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 37 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 38 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 39 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 40 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 41 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 42 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 43 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 44 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 45 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 46 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 47 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 48 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 49 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 50 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 51 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 52 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 53 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 54 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 55 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 56 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 57 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 58 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 59 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 60 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 61 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 62 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 63 http://www.core.edu.au/index.php/conference-rankings http://www.core.edu.au/index.php/conference-ranking NNS work_dzeata5onzf7rp26j2quaotjza 173 64 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html CD work_dzeata5onzf7rp26j2quaotjza 173 65 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 66 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 67 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 68 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 69 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 70 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 71 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 72 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 73 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 74 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 75 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 76 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 77 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 78 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 79 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 80 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 81 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 82 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 83 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 84 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 85 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 86 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 87 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 88 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 89 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 90 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 91 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 92 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 93 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 94 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 95 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 96 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 97 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 98 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 99 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 100 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 101 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 102 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 103 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 104 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 105 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 106 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 107 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 108 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 109 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 110 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 111 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 112 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 113 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 114 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 115 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 116 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 117 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 118 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 119 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 120 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 121 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html NNP work_dzeata5onzf7rp26j2quaotjza 173 122 https://personal.cis.strath.ac.uk/changyu.dong/ranking.html https://personal.cis.strath.ac.uk/changyu.dong/ranking.html CD work_dzeata5onzf7rp26j2quaotjza 173 123 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm JJ work_dzeata5onzf7rp26j2quaotjza 173 124 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm JJ work_dzeata5onzf7rp26j2quaotjza 173 125 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 126 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 127 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 128 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 129 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 130 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 131 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 132 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 133 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 134 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 135 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 136 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 137 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 138 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 139 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 140 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 141 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 142 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 143 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 144 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 145 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 146 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 147 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 148 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 149 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 150 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 151 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 152 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 153 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 154 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 155 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 156 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 157 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 158 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 159 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 160 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 161 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 162 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 163 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 164 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 165 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 166 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 167 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 168 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 169 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 170 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 171 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 172 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 173 http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm FW work_dzeata5onzf7rp26j2quaotjza 173 174 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VBP work_dzeata5onzf7rp26j2quaotjza 173 175 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 176 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 177 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 178 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 179 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 180 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 181 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 182 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 183 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 184 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 185 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 186 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 187 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 188 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 189 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 190 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 191 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 192 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 193 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 194 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 195 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 196 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 197 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 198 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 199 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 200 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 201 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 202 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 203 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 204 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 205 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 206 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 207 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 208 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 209 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 210 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 211 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 212 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 213 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 214 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 215 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 216 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 217 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 218 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 219 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 220 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 221 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 222 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 223 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 224 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 225 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 226 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 227 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 228 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 229 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 230 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 231 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 232 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 233 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 234 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 235 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html VB work_dzeata5onzf7rp26j2quaotjza 173 236 http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/ConfRanking.html http://webdocs.cs.ualberta.ca/~zaiane/htmldocs/confranking.html UH work_dzeata5onzf7rp26j2quaotjza 173 237 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 173 238 Table table NN work_dzeata5onzf7rp26j2quaotjza 173 239 3 3 CD work_dzeata5onzf7rp26j2quaotjza 173 240 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 173 241 research research NN work_dzeata5onzf7rp26j2quaotjza 173 242 questions question NNS work_dzeata5onzf7rp26j2quaotjza 173 243 , , , work_dzeata5onzf7rp26j2quaotjza 173 244 the the DT work_dzeata5onzf7rp26j2quaotjza 173 245 areas area NNS work_dzeata5onzf7rp26j2quaotjza 173 246 each each DT work_dzeata5onzf7rp26j2quaotjza 173 247 question question NN work_dzeata5onzf7rp26j2quaotjza 173 248 attempts attempt VBZ work_dzeata5onzf7rp26j2quaotjza 173 249 to to TO work_dzeata5onzf7rp26j2quaotjza 173 250 illuminate illuminate VB work_dzeata5onzf7rp26j2quaotjza 173 251 , , , work_dzeata5onzf7rp26j2quaotjza 173 252 and and CC work_dzeata5onzf7rp26j2quaotjza 173 253 potential potential JJ work_dzeata5onzf7rp26j2quaotjza 173 254 answers answer NNS work_dzeata5onzf7rp26j2quaotjza 173 255 . . . work_dzeata5onzf7rp26j2quaotjza 174 1 The the DT work_dzeata5onzf7rp26j2quaotjza 174 2 answers answer NNS work_dzeata5onzf7rp26j2quaotjza 174 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 174 4 codes code NNS work_dzeata5onzf7rp26j2quaotjza 174 5 in in IN work_dzeata5onzf7rp26j2quaotjza 174 6 the the DT work_dzeata5onzf7rp26j2quaotjza 174 7 content content NN work_dzeata5onzf7rp26j2quaotjza 174 8 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 174 9 process process NN work_dzeata5onzf7rp26j2quaotjza 174 10 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 174 11 apply apply VBP work_dzeata5onzf7rp26j2quaotjza 174 12 . . . work_dzeata5onzf7rp26j2quaotjza 175 1 Answers answer NNS work_dzeata5onzf7rp26j2quaotjza 175 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 175 3 not not RB work_dzeata5onzf7rp26j2quaotjza 175 4 necessarily necessarily RB work_dzeata5onzf7rp26j2quaotjza 175 5 mutually mutually RB work_dzeata5onzf7rp26j2quaotjza 175 6 exclusive exclusive JJ work_dzeata5onzf7rp26j2quaotjza 175 7 . . . work_dzeata5onzf7rp26j2quaotjza 176 1 Definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 176 2 for for IN work_dzeata5onzf7rp26j2quaotjza 176 3 the the DT work_dzeata5onzf7rp26j2quaotjza 176 4 terms term NNS work_dzeata5onzf7rp26j2quaotjza 176 5 in in IN work_dzeata5onzf7rp26j2quaotjza 176 6 this this DT work_dzeata5onzf7rp26j2quaotjza 176 7 table table NN work_dzeata5onzf7rp26j2quaotjza 176 8 appear appear VBP work_dzeata5onzf7rp26j2quaotjza 176 9 in in IN work_dzeata5onzf7rp26j2quaotjza 176 10 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 176 11 coding code VBG work_dzeata5onzf7rp26j2quaotjza 176 12 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 176 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 176 14 see see VB work_dzeata5onzf7rp26j2quaotjza 176 15 Supplemental Supplemental NNP work_dzeata5onzf7rp26j2quaotjza 176 16 Information Information NNP work_dzeata5onzf7rp26j2quaotjza 176 17 1 1 CD work_dzeata5onzf7rp26j2quaotjza 176 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 176 19 with with IN work_dzeata5onzf7rp26j2quaotjza 176 20 examples example NNS work_dzeata5onzf7rp26j2quaotjza 176 21 . . . work_dzeata5onzf7rp26j2quaotjza 177 1 Question question NN work_dzeata5onzf7rp26j2quaotjza 177 2 area area NN work_dzeata5onzf7rp26j2quaotjza 177 3 Question Question NNP work_dzeata5onzf7rp26j2quaotjza 177 4 Possible possible JJ work_dzeata5onzf7rp26j2quaotjza 177 5 answers answer NNS work_dzeata5onzf7rp26j2quaotjza 177 6 Where where WRB work_dzeata5onzf7rp26j2quaotjza 177 7 in in IN work_dzeata5onzf7rp26j2quaotjza 177 8 the the DT work_dzeata5onzf7rp26j2quaotjza 177 9 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 177 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 177 11 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 177 12 enforced enforce VBN work_dzeata5onzf7rp26j2quaotjza 177 13 ? ? . work_dzeata5onzf7rp26j2quaotjza 178 1 Component component NN work_dzeata5onzf7rp26j2quaotjza 178 2 , , , work_dzeata5onzf7rp26j2quaotjza 178 3 application application NN work_dzeata5onzf7rp26j2quaotjza 178 4 , , , work_dzeata5onzf7rp26j2quaotjza 178 5 host host NN work_dzeata5onzf7rp26j2quaotjza 178 6 Sandbox Sandbox NNP work_dzeata5onzf7rp26j2quaotjza 178 7 lifecycle lifecycle NN work_dzeata5onzf7rp26j2quaotjza 178 8 How how WRB work_dzeata5onzf7rp26j2quaotjza 178 9 and and CC work_dzeata5onzf7rp26j2quaotjza 178 10 when when WRB work_dzeata5onzf7rp26j2quaotjza 178 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 178 12 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 178 13 imposed impose VBN work_dzeata5onzf7rp26j2quaotjza 178 14 ? ? . work_dzeata5onzf7rp26j2quaotjza 179 1 Statically statically RB work_dzeata5onzf7rp26j2quaotjza 179 2 , , , work_dzeata5onzf7rp26j2quaotjza 179 3 dynamically dynamically RB work_dzeata5onzf7rp26j2quaotjza 179 4 , , , work_dzeata5onzf7rp26j2quaotjza 179 5 hybrid hybrid JJ work_dzeata5onzf7rp26j2quaotjza 179 6 What what WDT work_dzeata5onzf7rp26j2quaotjza 179 7 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 179 8 do do VBP work_dzeata5onzf7rp26j2quaotjza 179 9 the the DT work_dzeata5onzf7rp26j2quaotjza 179 10 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 179 11 protect protect VB work_dzeata5onzf7rp26j2quaotjza 179 12 ? ? . work_dzeata5onzf7rp26j2quaotjza 180 1 Memory memory NN work_dzeata5onzf7rp26j2quaotjza 180 2 , , , work_dzeata5onzf7rp26j2quaotjza 180 3 code code NN work_dzeata5onzf7rp26j2quaotjza 180 4 / / SYM work_dzeata5onzf7rp26j2quaotjza 180 5 instructions instruction NNS work_dzeata5onzf7rp26j2quaotjza 180 6 , , , work_dzeata5onzf7rp26j2quaotjza 180 7 files file NNS work_dzeata5onzf7rp26j2quaotjza 180 8 , , , work_dzeata5onzf7rp26j2quaotjza 180 9 user user NN work_dzeata5onzf7rp26j2quaotjza 180 10 data datum NNS work_dzeata5onzf7rp26j2quaotjza 180 11 , , , work_dzeata5onzf7rp26j2quaotjza 180 12 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 180 13 Which which WDT work_dzeata5onzf7rp26j2quaotjza 180 14 components component NNS work_dzeata5onzf7rp26j2quaotjza 180 15 do do VBP work_dzeata5onzf7rp26j2quaotjza 180 16 the the DT work_dzeata5onzf7rp26j2quaotjza 180 17 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 180 18 protect protect VB work_dzeata5onzf7rp26j2quaotjza 180 19 ? ? . work_dzeata5onzf7rp26j2quaotjza 181 1 Component component NN work_dzeata5onzf7rp26j2quaotjza 181 2 , , , work_dzeata5onzf7rp26j2quaotjza 181 3 application application NN work_dzeata5onzf7rp26j2quaotjza 181 4 , , , work_dzeata5onzf7rp26j2quaotjza 181 5 application application NN work_dzeata5onzf7rp26j2quaotjza 181 6 classSecurity classsecurity NN work_dzeata5onzf7rp26j2quaotjza 181 7 outcomes outcome NNS work_dzeata5onzf7rp26j2quaotjza 181 8 At at IN work_dzeata5onzf7rp26j2quaotjza 181 9 what what WDT work_dzeata5onzf7rp26j2quaotjza 181 10 point point NN work_dzeata5onzf7rp26j2quaotjza 181 11 will will MD work_dzeata5onzf7rp26j2quaotjza 181 12 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 181 13 catch catch VB work_dzeata5onzf7rp26j2quaotjza 181 14 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 181 15 ? ? . work_dzeata5onzf7rp26j2quaotjza 182 1 Pre pre JJ work_dzeata5onzf7rp26j2quaotjza 182 2 - - JJ work_dzeata5onzf7rp26j2quaotjza 182 3 exploit exploit NNP work_dzeata5onzf7rp26j2quaotjza 182 4 , , , work_dzeata5onzf7rp26j2quaotjza 182 5 post post NN work_dzeata5onzf7rp26j2quaotjza 182 6 - - JJ work_dzeata5onzf7rp26j2quaotjza 182 7 exploit exploit VB work_dzeata5onzf7rp26j2quaotjza 182 8 What what WP work_dzeata5onzf7rp26j2quaotjza 182 9 must must MD work_dzeata5onzf7rp26j2quaotjza 182 10 be be VB work_dzeata5onzf7rp26j2quaotjza 182 11 done do VBN work_dzeata5onzf7rp26j2quaotjza 182 12 to to TO work_dzeata5onzf7rp26j2quaotjza 182 13 apply apply VB work_dzeata5onzf7rp26j2quaotjza 182 14 the the DT work_dzeata5onzf7rp26j2quaotjza 182 15 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 182 16 ? ? . work_dzeata5onzf7rp26j2quaotjza 183 1 Nothing nothing NN work_dzeata5onzf7rp26j2quaotjza 183 2 , , , work_dzeata5onzf7rp26j2quaotjza 183 3 select select VB work_dzeata5onzf7rp26j2quaotjza 183 4 pre pre JJ work_dzeata5onzf7rp26j2quaotjza 183 5 - - JJ work_dzeata5onzf7rp26j2quaotjza 183 6 made make VBN work_dzeata5onzf7rp26j2quaotjza 183 7 policy policy NN work_dzeata5onzf7rp26j2quaotjza 183 8 , , , work_dzeata5onzf7rp26j2quaotjza 183 9 write write VB work_dzeata5onzf7rp26j2quaotjza 183 10 policy policy NN work_dzeata5onzf7rp26j2quaotjza 183 11 , , , work_dzeata5onzf7rp26j2quaotjza 183 12 run run VB work_dzeata5onzf7rp26j2quaotjza 183 13 tool tool NN work_dzeata5onzf7rp26j2quaotjza 183 14 , , , work_dzeata5onzf7rp26j2quaotjza 183 15 install install VB work_dzeata5onzf7rp26j2quaotjza 183 16 tool tool NN work_dzeata5onzf7rp26j2quaotjza 183 17 Effort effort NN work_dzeata5onzf7rp26j2quaotjza 183 18 and and CC work_dzeata5onzf7rp26j2quaotjza 183 19 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 183 20 What what WP work_dzeata5onzf7rp26j2quaotjza 183 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 183 22 the the DT work_dzeata5onzf7rp26j2quaotjza 183 23 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 183 24 on on IN work_dzeata5onzf7rp26j2quaotjza 183 25 sandboxed sandboxed JJ work_dzeata5onzf7rp26j2quaotjza 183 26 components component NNS work_dzeata5onzf7rp26j2quaotjza 183 27 ? ? . work_dzeata5onzf7rp26j2quaotjza 184 1 None none NN work_dzeata5onzf7rp26j2quaotjza 184 2 , , , work_dzeata5onzf7rp26j2quaotjza 184 3 source source NN work_dzeata5onzf7rp26j2quaotjza 184 4 code code NN work_dzeata5onzf7rp26j2quaotjza 184 5 , , , work_dzeata5onzf7rp26j2quaotjza 184 6 annotated annotate VBD work_dzeata5onzf7rp26j2quaotjza 184 7 source source NN work_dzeata5onzf7rp26j2quaotjza 184 8 code code NN work_dzeata5onzf7rp26j2quaotjza 184 9 , , , work_dzeata5onzf7rp26j2quaotjza 184 10 special special JJ work_dzeata5onzf7rp26j2quaotjza 184 11 compiler compiler NN work_dzeata5onzf7rp26j2quaotjza 184 12 , , , work_dzeata5onzf7rp26j2quaotjza 184 13 compiler compiler NN work_dzeata5onzf7rp26j2quaotjza 184 14 - - HYPH work_dzeata5onzf7rp26j2quaotjza 184 15 introduced introduce VBN work_dzeata5onzf7rp26j2quaotjza 184 16 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 184 17 , , , work_dzeata5onzf7rp26j2quaotjza 184 18 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 184 19 framework framework NN work_dzeata5onzf7rp26j2quaotjza 184 20 / / SYM work_dzeata5onzf7rp26j2quaotjza 184 21 library library NN work_dzeata5onzf7rp26j2quaotjza 184 22 components component NNS work_dzeata5onzf7rp26j2quaotjza 184 23 Who who WP work_dzeata5onzf7rp26j2quaotjza 184 24 defines define VBZ work_dzeata5onzf7rp26j2quaotjza 184 25 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 184 26 ? ? . work_dzeata5onzf7rp26j2quaotjza 185 1 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 185 2 developer developer NN work_dzeata5onzf7rp26j2quaotjza 185 3 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 185 4 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 185 5 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 185 6 , , , work_dzeata5onzf7rp26j2quaotjza 185 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 185 8 user user NN work_dzeata5onzf7rp26j2quaotjza 185 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 185 10 user user NN work_dzeata5onzf7rp26j2quaotjza 185 11 - - HYPH work_dzeata5onzf7rp26j2quaotjza 185 12 defined define VBN work_dzeata5onzf7rp26j2quaotjza 185 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 185 14 , , , work_dzeata5onzf7rp26j2quaotjza 185 15 application application NN work_dzeata5onzf7rp26j2quaotjza 185 16 developer developer NN work_dzeata5onzf7rp26j2quaotjza 185 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 185 18 application application NN work_dzeata5onzf7rp26j2quaotjza 185 19 - - HYPH work_dzeata5onzf7rp26j2quaotjza 185 20 defined define VBN work_dzeata5onzf7rp26j2quaotjza 185 21 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 185 22 How how WRB work_dzeata5onzf7rp26j2quaotjza 185 23 are be VBP work_dzeata5onzf7rp26j2quaotjza 185 24 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 185 25 managed manage VBN work_dzeata5onzf7rp26j2quaotjza 185 26 ? ? . work_dzeata5onzf7rp26j2quaotjza 186 1 Central central JJ work_dzeata5onzf7rp26j2quaotjza 186 2 policy policy NN work_dzeata5onzf7rp26j2quaotjza 186 3 repository repository NN work_dzeata5onzf7rp26j2quaotjza 186 4 , , , work_dzeata5onzf7rp26j2quaotjza 186 5 no no DT work_dzeata5onzf7rp26j2quaotjza 186 6 managementPolicy managementpolicy JJ work_dzeata5onzf7rp26j2quaotjza 186 7 provenance provenance NN work_dzeata5onzf7rp26j2quaotjza 186 8 and and CC work_dzeata5onzf7rp26j2quaotjza 186 9 manifestation manifestation NN work_dzeata5onzf7rp26j2quaotjza 186 10 How how WRB work_dzeata5onzf7rp26j2quaotjza 186 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 186 12 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 186 13 constructed construct VBN work_dzeata5onzf7rp26j2quaotjza 186 14 ? ? . work_dzeata5onzf7rp26j2quaotjza 187 1 Encoded encode VBN work_dzeata5onzf7rp26j2quaotjza 187 2 in in IN work_dzeata5onzf7rp26j2quaotjza 187 3 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 187 4 logic logic NN work_dzeata5onzf7rp26j2quaotjza 187 5 , , , work_dzeata5onzf7rp26j2quaotjza 187 6 encoded encode VBN work_dzeata5onzf7rp26j2quaotjza 187 7 in in IN work_dzeata5onzf7rp26j2quaotjza 187 8 application application NN work_dzeata5onzf7rp26j2quaotjza 187 9 logic logic NN work_dzeata5onzf7rp26j2quaotjza 187 10 , , , work_dzeata5onzf7rp26j2quaotjza 187 11 user user NN work_dzeata5onzf7rp26j2quaotjza 187 12 written write VBN work_dzeata5onzf7rp26j2quaotjza 187 13 What what WDT work_dzeata5onzf7rp26j2quaotjza 187 14 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 187 15 are be VBP work_dzeata5onzf7rp26j2quaotjza 187 16 made make VBN work_dzeata5onzf7rp26j2quaotjza 187 17 about about IN work_dzeata5onzf7rp26j2quaotjza 187 18 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 187 19 ? ? . work_dzeata5onzf7rp26j2quaotjza 188 1 Performance performance NN work_dzeata5onzf7rp26j2quaotjza 188 2 , , , work_dzeata5onzf7rp26j2quaotjza 188 3 security security NN work_dzeata5onzf7rp26j2quaotjza 188 4 , , , work_dzeata5onzf7rp26j2quaotjza 188 5 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 188 6 How how WRB work_dzeata5onzf7rp26j2quaotjza 188 7 are be VBP work_dzeata5onzf7rp26j2quaotjza 188 8 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 188 9 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 188 10 ? ? . work_dzeata5onzf7rp26j2quaotjza 189 1 Proof proof NN work_dzeata5onzf7rp26j2quaotjza 189 2 , , , work_dzeata5onzf7rp26j2quaotjza 189 3 analytical analytical JJ work_dzeata5onzf7rp26j2quaotjza 189 4 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 189 5 , , , work_dzeata5onzf7rp26j2quaotjza 189 6 benchmark benchmark NN work_dzeata5onzf7rp26j2quaotjza 189 7 suite suite NN work_dzeata5onzf7rp26j2quaotjza 189 8 , , , work_dzeata5onzf7rp26j2quaotjza 189 9 case case NN work_dzeata5onzf7rp26j2quaotjza 189 10 studies study NNS work_dzeata5onzf7rp26j2quaotjza 189 11 , , , work_dzeata5onzf7rp26j2quaotjza 189 12 argumentation argumentation NN work_dzeata5onzf7rp26j2quaotjza 189 13 , , , work_dzeata5onzf7rp26j2quaotjza 189 14 using use VBG work_dzeata5onzf7rp26j2quaotjza 189 15 public public JJ work_dzeata5onzf7rp26j2quaotjza 189 16 dataResearch dataresearch NN work_dzeata5onzf7rp26j2quaotjza 189 17 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 189 18 and and CC work_dzeata5onzf7rp26j2quaotjza 189 19 validation validation NN work_dzeata5onzf7rp26j2quaotjza 189 20 How how WRB work_dzeata5onzf7rp26j2quaotjza 189 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 189 22 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 189 23 released release VBN work_dzeata5onzf7rp26j2quaotjza 189 24 for for IN work_dzeata5onzf7rp26j2quaotjza 189 25 review review NN work_dzeata5onzf7rp26j2quaotjza 189 26 ? ? . work_dzeata5onzf7rp26j2quaotjza 190 1 Source source NN work_dzeata5onzf7rp26j2quaotjza 190 2 code code NN work_dzeata5onzf7rp26j2quaotjza 190 3 , , , work_dzeata5onzf7rp26j2quaotjza 190 4 binaries binary NNS work_dzeata5onzf7rp26j2quaotjza 190 5 , , , work_dzeata5onzf7rp26j2quaotjza 190 6 not not RB work_dzeata5onzf7rp26j2quaotjza 190 7 available available JJ work_dzeata5onzf7rp26j2quaotjza 190 8 • • NN work_dzeata5onzf7rp26j2quaotjza 190 9 Techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 190 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 190 11 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 190 12 using use VBG work_dzeata5onzf7rp26j2quaotjza 190 13 some some DT work_dzeata5onzf7rp26j2quaotjza 190 14 form form NN work_dzeata5onzf7rp26j2quaotjza 190 15 of of IN work_dzeata5onzf7rp26j2quaotjza 190 16 automation automation NN work_dzeata5onzf7rp26j2quaotjza 190 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 190 18 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 190 19 , , , work_dzeata5onzf7rp26j2quaotjza 190 20 not not RB work_dzeata5onzf7rp26j2quaotjza 190 21 through through IN work_dzeata5onzf7rp26j2quaotjza 190 22 entirely entirely RB work_dzeata5onzf7rp26j2quaotjza 190 23 manual manual JJ work_dzeata5onzf7rp26j2quaotjza 190 24 re re NN work_dzeata5onzf7rp26j2quaotjza 190 25 - - NN work_dzeata5onzf7rp26j2quaotjza 190 26 architecting architecting JJ work_dzeata5onzf7rp26j2quaotjza 190 27 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 190 28 • • NNP work_dzeata5onzf7rp26j2quaotjza 190 29 A a DT work_dzeata5onzf7rp26j2quaotjza 190 30 policy policy NN work_dzeata5onzf7rp26j2quaotjza 190 31 is be VBZ work_dzeata5onzf7rp26j2quaotjza 190 32 imposed impose VBN work_dzeata5onzf7rp26j2quaotjza 190 33 on on IN work_dzeata5onzf7rp26j2quaotjza 190 34 an an DT work_dzeata5onzf7rp26j2quaotjza 190 35 identifiable identifiable JJ work_dzeata5onzf7rp26j2quaotjza 190 36 category category NN work_dzeata5onzf7rp26j2quaotjza 190 37 of of IN work_dzeata5onzf7rp26j2quaotjza 190 38 applications application NNS work_dzeata5onzf7rp26j2quaotjza 190 39 or or CC work_dzeata5onzf7rp26j2quaotjza 190 40 application application NN work_dzeata5onzf7rp26j2quaotjza 190 41 subsets subset NNS work_dzeata5onzf7rp26j2quaotjza 190 42 - - : work_dzeata5onzf7rp26j2quaotjza 190 43 The the DT work_dzeata5onzf7rp26j2quaotjza 190 44 policy policy NN work_dzeata5onzf7rp26j2quaotjza 190 45 is be VBZ work_dzeata5onzf7rp26j2quaotjza 190 46 imposed impose VBN work_dzeata5onzf7rp26j2quaotjza 190 47 locally locally RB work_dzeata5onzf7rp26j2quaotjza 190 48 on on IN work_dzeata5onzf7rp26j2quaotjza 190 49 an an DT work_dzeata5onzf7rp26j2quaotjza 190 50 application application NN work_dzeata5onzf7rp26j2quaotjza 190 51 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 190 52 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 190 53 , , , work_dzeata5onzf7rp26j2quaotjza 190 54 not not RB work_dzeata5onzf7rp26j2quaotjza 190 55 on on IN work_dzeata5onzf7rp26j2quaotjza 190 56 the the DT work_dzeata5onzf7rp26j2quaotjza 190 57 principal principal NN work_dzeata5onzf7rp26j2quaotjza 190 58 the the DT work_dzeata5onzf7rp26j2quaotjza 190 59 application application NN work_dzeata5onzf7rp26j2quaotjza 190 60 executes execute VBZ work_dzeata5onzf7rp26j2quaotjza 190 61 as as IN work_dzeata5onzf7rp26j2quaotjza 190 62 , , , work_dzeata5onzf7rp26j2quaotjza 190 63 not not RB work_dzeata5onzf7rp26j2quaotjza 190 64 on on IN work_dzeata5onzf7rp26j2quaotjza 190 65 network network NN work_dzeata5onzf7rp26j2quaotjza 190 66 packets packet NNS work_dzeata5onzf7rp26j2quaotjza 190 67 in in IN work_dzeata5onzf7rp26j2quaotjza 190 68 - - HYPH work_dzeata5onzf7rp26j2quaotjza 190 69 transit transit NN work_dzeata5onzf7rp26j2quaotjza 190 70 , , , work_dzeata5onzf7rp26j2quaotjza 190 71 etc etc FW work_dzeata5onzf7rp26j2quaotjza 190 72 . . . work_dzeata5onzf7rp26j2quaotjza 190 73 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 191 1 - - : work_dzeata5onzf7rp26j2quaotjza 191 2 The the DT work_dzeata5onzf7rp26j2quaotjza 191 3 category category NN work_dzeata5onzf7rp26j2quaotjza 191 4 encompasses encompass VBZ work_dzeata5onzf7rp26j2quaotjza 191 5 a a DT work_dzeata5onzf7rp26j2quaotjza 191 6 reasonable reasonable JJ work_dzeata5onzf7rp26j2quaotjza 191 7 number number NN work_dzeata5onzf7rp26j2quaotjza 191 8 of of IN work_dzeata5onzf7rp26j2quaotjza 191 9 real real JJ work_dzeata5onzf7rp26j2quaotjza 191 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 191 11 world world NN work_dzeata5onzf7rp26j2quaotjza 191 12 applications application NNS work_dzeata5onzf7rp26j2quaotjza 191 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 191 14 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 191 15 , , , work_dzeata5onzf7rp26j2quaotjza 191 16 does do VBZ work_dzeata5onzf7rp26j2quaotjza 191 17 n’t not RB work_dzeata5onzf7rp26j2quaotjza 191 18 require require VB work_dzeata5onzf7rp26j2quaotjza 191 19 the the DT work_dzeata5onzf7rp26j2quaotjza 191 20 use use NN work_dzeata5onzf7rp26j2quaotjza 191 21 of of IN work_dzeata5onzf7rp26j2quaotjza 191 22 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 191 23 1 1 LS work_dzeata5onzf7rp26j2quaotjza 191 24 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 191 25 a a DT work_dzeata5onzf7rp26j2quaotjza 191 26 research research NN work_dzeata5onzf7rp26j2quaotjza 191 27 programming programming NN work_dzeata5onzf7rp26j2quaotjza 191 28 language language NN work_dzeata5onzf7rp26j2quaotjza 191 29 , , , work_dzeata5onzf7rp26j2quaotjza 191 30 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 191 31 2 2 LS work_dzeata5onzf7rp26j2quaotjza 191 32 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 191 33 extensive extensive JJ work_dzeata5onzf7rp26j2quaotjza 191 34 annotations annotation NNS work_dzeata5onzf7rp26j2quaotjza 191 35 , , , work_dzeata5onzf7rp26j2quaotjza 191 36 or or CC work_dzeata5onzf7rp26j2quaotjza 191 37 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 191 38 3 3 LS work_dzeata5onzf7rp26j2quaotjza 191 39 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 191 40 non non JJ work_dzeata5onzf7rp26j2quaotjza 191 41 - - JJ work_dzeata5onzf7rp26j2quaotjza 191 42 standard standard JJ work_dzeata5onzf7rp26j2quaotjza 191 43 hardware hardware NN work_dzeata5onzf7rp26j2quaotjza 191 44 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 191 45 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 191 46 gathered gather VBD work_dzeata5onzf7rp26j2quaotjza 191 47 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 191 48 by by IN work_dzeata5onzf7rp26j2quaotjza 191 49 reading read VBG work_dzeata5onzf7rp26j2quaotjza 191 50 each each DT work_dzeata5onzf7rp26j2quaotjza 191 51 title title NN work_dzeata5onzf7rp26j2quaotjza 191 52 in in IN work_dzeata5onzf7rp26j2quaotjza 191 53 the the DT work_dzeata5onzf7rp26j2quaotjza 191 54 conference conference NN work_dzeata5onzf7rp26j2quaotjza 191 55 proceedings proceeding NNS work_dzeata5onzf7rp26j2quaotjza 191 56 for for IN work_dzeata5onzf7rp26j2quaotjza 191 57 a a DT work_dzeata5onzf7rp26j2quaotjza 191 58 given give VBN work_dzeata5onzf7rp26j2quaotjza 191 59 year year NN work_dzeata5onzf7rp26j2quaotjza 191 60 . . . work_dzeata5onzf7rp26j2quaotjza 192 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 192 2 included include VBD work_dzeata5onzf7rp26j2quaotjza 192 3 a a DT work_dzeata5onzf7rp26j2quaotjza 192 4 paper paper NN work_dzeata5onzf7rp26j2quaotjza 192 5 in in IN work_dzeata5onzf7rp26j2quaotjza 192 6 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 192 7 initial initial JJ work_dzeata5onzf7rp26j2quaotjza 192 8 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 192 9 if if IN work_dzeata5onzf7rp26j2quaotjza 192 10 the the DT work_dzeata5onzf7rp26j2quaotjza 192 11 title title NN work_dzeata5onzf7rp26j2quaotjza 192 12 gave give VBD work_dzeata5onzf7rp26j2quaotjza 192 13 any any DT work_dzeata5onzf7rp26j2quaotjza 192 14 indication indication NN work_dzeata5onzf7rp26j2quaotjza 192 15 that that IN work_dzeata5onzf7rp26j2quaotjza 192 16 the the DT work_dzeata5onzf7rp26j2quaotjza 192 17 paper paper NN work_dzeata5onzf7rp26j2quaotjza 192 18 could could MD work_dzeata5onzf7rp26j2quaotjza 192 19 meet meet VB work_dzeata5onzf7rp26j2quaotjza 192 20 the the DT work_dzeata5onzf7rp26j2quaotjza 192 21 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 192 22 . . . work_dzeata5onzf7rp26j2quaotjza 193 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 193 2 refined refine VBD work_dzeata5onzf7rp26j2quaotjza 193 3 the the DT work_dzeata5onzf7rp26j2quaotjza 193 4 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 193 5 by by IN work_dzeata5onzf7rp26j2quaotjza 193 6 reviewing review VBG work_dzeata5onzf7rp26j2quaotjza 193 7 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 193 8 in in IN work_dzeata5onzf7rp26j2quaotjza 193 9 the the DT work_dzeata5onzf7rp26j2quaotjza 193 10 initial initial JJ work_dzeata5onzf7rp26j2quaotjza 193 11 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 193 12 from from IN work_dzeata5onzf7rp26j2quaotjza 193 13 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 193 14 before before IN work_dzeata5onzf7rp26j2quaotjza 193 15 inspecting inspect VBG work_dzeata5onzf7rp26j2quaotjza 193 16 the the DT work_dzeata5onzf7rp26j2quaotjza 193 17 proceedings proceeding NNS work_dzeata5onzf7rp26j2quaotjza 193 18 from from IN work_dzeata5onzf7rp26j2quaotjza 193 19 other other JJ work_dzeata5onzf7rp26j2quaotjza 193 20 venues venue NNS work_dzeata5onzf7rp26j2quaotjza 193 21 . . . work_dzeata5onzf7rp26j2quaotjza 194 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 194 2 read read VBP work_dzeata5onzf7rp26j2quaotjza 194 3 the the DT work_dzeata5onzf7rp26j2quaotjza 194 4 remaining remain VBG work_dzeata5onzf7rp26j2quaotjza 194 5 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 194 6 ’ ’ POS work_dzeata5onzf7rp26j2quaotjza 194 7 abstracts abstract NNS work_dzeata5onzf7rp26j2quaotjza 194 8 , , , work_dzeata5onzf7rp26j2quaotjza 194 9 introductions introduction NNS work_dzeata5onzf7rp26j2quaotjza 194 10 , , , work_dzeata5onzf7rp26j2quaotjza 194 11 and and CC work_dzeata5onzf7rp26j2quaotjza 194 12 conclusions conclusion NNS work_dzeata5onzf7rp26j2quaotjza 194 13 and and CC work_dzeata5onzf7rp26j2quaotjza 194 14 excluded exclude VBN work_dzeata5onzf7rp26j2quaotjza 194 15 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 194 16 as as IN work_dzeata5onzf7rp26j2quaotjza 194 17 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 194 18 were be VBD work_dzeata5onzf7rp26j2quaotjza 194 19 being be VBG work_dzeata5onzf7rp26j2quaotjza 194 20 interpreted interpret VBN work_dzeata5onzf7rp26j2quaotjza 194 21 if if IN work_dzeata5onzf7rp26j2quaotjza 194 22 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 194 23 did do VBD work_dzeata5onzf7rp26j2quaotjza 194 24 not not RB work_dzeata5onzf7rp26j2quaotjza 194 25 meet meet VB work_dzeata5onzf7rp26j2quaotjza 194 26 the the DT work_dzeata5onzf7rp26j2quaotjza 194 27 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 194 28 . . . work_dzeata5onzf7rp26j2quaotjza 195 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 195 2 maintained maintain VBD work_dzeata5onzf7rp26j2quaotjza 195 3 notes note NNS work_dzeata5onzf7rp26j2quaotjza 195 4 about about IN work_dzeata5onzf7rp26j2quaotjza 195 5 why why WRB work_dzeata5onzf7rp26j2quaotjza 195 6 individual individual JJ work_dzeata5onzf7rp26j2quaotjza 195 7 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 195 8 were be VBD work_dzeata5onzf7rp26j2quaotjza 195 9 excluded exclude VBN work_dzeata5onzf7rp26j2quaotjza 195 10 from from IN work_dzeata5onzf7rp26j2quaotjza 195 11 the the DT work_dzeata5onzf7rp26j2quaotjza 195 12 final final JJ work_dzeata5onzf7rp26j2quaotjza 195 13 set.4 set.4 NN work_dzeata5onzf7rp26j2quaotjza 195 14 4 4 CD work_dzeata5onzf7rp26j2quaotjza 195 15 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 195 16 full full JJ work_dzeata5onzf7rp26j2quaotjza 195 17 list list NN work_dzeata5onzf7rp26j2quaotjza 195 18 of of IN work_dzeata5onzf7rp26j2quaotjza 195 19 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 195 20 with with IN work_dzeata5onzf7rp26j2quaotjza 195 21 exclusion exclusion NN work_dzeata5onzf7rp26j2quaotjza 195 22 notes note NNS work_dzeata5onzf7rp26j2quaotjza 195 23 is be VBZ work_dzeata5onzf7rp26j2quaotjza 195 24 available available JJ work_dzeata5onzf7rp26j2quaotjza 195 25 in in IN work_dzeata5onzf7rp26j2quaotjza 195 26 Supplemental Supplemental NNP work_dzeata5onzf7rp26j2quaotjza 195 27 Information Information NNP work_dzeata5onzf7rp26j2quaotjza 195 28 2 2 CD work_dzeata5onzf7rp26j2quaotjza 195 29 . . . work_dzeata5onzf7rp26j2quaotjza 196 1 Categorizing categorize VBG work_dzeata5onzf7rp26j2quaotjza 196 2 the the DT work_dzeata5onzf7rp26j2quaotjza 196 3 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 196 4 To to TO work_dzeata5onzf7rp26j2quaotjza 196 5 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 196 6 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 196 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 196 8 developed develop VBD work_dzeata5onzf7rp26j2quaotjza 196 9 coding code VBG work_dzeata5onzf7rp26j2quaotjza 196 10 frames5 frames5 NNP work_dzeata5onzf7rp26j2quaotjza 196 11 where where WRB work_dzeata5onzf7rp26j2quaotjza 196 12 a a DT work_dzeata5onzf7rp26j2quaotjza 196 13 category category NN work_dzeata5onzf7rp26j2quaotjza 196 14 is be VBZ work_dzeata5onzf7rp26j2quaotjza 196 15 a a DT work_dzeata5onzf7rp26j2quaotjza 196 16 research research NN work_dzeata5onzf7rp26j2quaotjza 196 17 question question NN work_dzeata5onzf7rp26j2quaotjza 196 18 5 5 CD work_dzeata5onzf7rp26j2quaotjza 196 19 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 196 20 full full JJ work_dzeata5onzf7rp26j2quaotjza 196 21 coding code VBG work_dzeata5onzf7rp26j2quaotjza 196 22 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 196 23 are be VBP work_dzeata5onzf7rp26j2quaotjza 196 24 available available JJ work_dzeata5onzf7rp26j2quaotjza 196 25 in in IN work_dzeata5onzf7rp26j2quaotjza 196 26 Supplemental Supplemental NNP work_dzeata5onzf7rp26j2quaotjza 196 27 Information Information NNP work_dzeata5onzf7rp26j2quaotjza 196 28 1 1 CD work_dzeata5onzf7rp26j2quaotjza 196 29 . . . work_dzeata5onzf7rp26j2quaotjza 196 30 and and CC work_dzeata5onzf7rp26j2quaotjza 196 31 a a DT work_dzeata5onzf7rp26j2quaotjza 196 32 code code NN work_dzeata5onzf7rp26j2quaotjza 196 33 is be VBZ work_dzeata5onzf7rp26j2quaotjza 196 34 a a DT work_dzeata5onzf7rp26j2quaotjza 196 35 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 196 36 answer answer NN work_dzeata5onzf7rp26j2quaotjza 196 37 to to IN work_dzeata5onzf7rp26j2quaotjza 196 38 the the DT work_dzeata5onzf7rp26j2quaotjza 196 39 question question NN work_dzeata5onzf7rp26j2quaotjza 196 40 . . . work_dzeata5onzf7rp26j2quaotjza 197 1 To to TO work_dzeata5onzf7rp26j2quaotjza 197 2 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 197 3 consistency consistency NN work_dzeata5onzf7rp26j2quaotjza 197 4 in in IN work_dzeata5onzf7rp26j2quaotjza 197 5 coding code VBG work_dzeata5onzf7rp26j2quaotjza 197 6 , , , work_dzeata5onzf7rp26j2quaotjza 197 7 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 197 8 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 197 9 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 197 10 et et NNP work_dzeata5onzf7rp26j2quaotjza 197 11 al al NNP work_dzeata5onzf7rp26j2quaotjza 197 12 . . . work_dzeata5onzf7rp26j2quaotjza 198 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 198 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 198 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 198 4 , , , work_dzeata5onzf7rp26j2quaotjza 198 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 198 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 198 7 . . . work_dzeata5onzf7rp26j2quaotjza 199 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 199 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 199 3 , , , work_dzeata5onzf7rp26j2quaotjza 199 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 199 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 199 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 199 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 199 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 199 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 199 10 9/36 9/36 CD work_dzeata5onzf7rp26j2quaotjza 199 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 199 12 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 ADD work_dzeata5onzf7rp26j2quaotjza 199 13 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 XX work_dzeata5onzf7rp26j2quaotjza 199 14 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 ADD work_dzeata5onzf7rp26j2quaotjza 199 15 http://dx.doi.org/10.7717/peerj-cs.43/supp-2 http://dx.doi.org/10.7717/peerj-cs.43/supp-2 ADD work_dzeata5onzf7rp26j2quaotjza 199 16 http://dx.doi.org/10.7717/peerj-cs.43/supp-2 http://dx.doi.org/10.7717/peerj-cs.43/supp-2 ADD work_dzeata5onzf7rp26j2quaotjza 199 17 http://dx.doi.org/10.7717/peerj-cs.43/supp-2 http://dx.doi.org/10.7717/peerj-cs.43/supp-2 ADD work_dzeata5onzf7rp26j2quaotjza 199 18 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 ADD work_dzeata5onzf7rp26j2quaotjza 199 19 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 ADD work_dzeata5onzf7rp26j2quaotjza 199 20 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 http://dx.doi.org/10.7717/peerj-cs.43/supp-1 ADD work_dzeata5onzf7rp26j2quaotjza 199 21 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 199 22 include include VBP work_dzeata5onzf7rp26j2quaotjza 199 23 detailed detailed JJ work_dzeata5onzf7rp26j2quaotjza 199 24 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 199 25 and and CC work_dzeata5onzf7rp26j2quaotjza 199 26 examples example NNS work_dzeata5onzf7rp26j2quaotjza 199 27 for for IN work_dzeata5onzf7rp26j2quaotjza 199 28 each each DT work_dzeata5onzf7rp26j2quaotjza 199 29 category category NN work_dzeata5onzf7rp26j2quaotjza 199 30 and and CC work_dzeata5onzf7rp26j2quaotjza 199 31 code code NN work_dzeata5onzf7rp26j2quaotjza 199 32 . . . work_dzeata5onzf7rp26j2quaotjza 200 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 200 2 codes code NNS work_dzeata5onzf7rp26j2quaotjza 200 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 200 4 not not RB work_dzeata5onzf7rp26j2quaotjza 200 5 mutually mutually RB work_dzeata5onzf7rp26j2quaotjza 200 6 exclusive exclusive JJ work_dzeata5onzf7rp26j2quaotjza 200 7 : : : work_dzeata5onzf7rp26j2quaotjza 200 8 a a DT work_dzeata5onzf7rp26j2quaotjza 200 9 question question NN work_dzeata5onzf7rp26j2quaotjza 200 10 may may MD work_dzeata5onzf7rp26j2quaotjza 200 11 have have VB work_dzeata5onzf7rp26j2quaotjza 200 12 multiple multiple JJ work_dzeata5onzf7rp26j2quaotjza 200 13 answers answer NNS work_dzeata5onzf7rp26j2quaotjza 200 14 . . . work_dzeata5onzf7rp26j2quaotjza 201 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 201 2 developed develop VBD work_dzeata5onzf7rp26j2quaotjza 201 3 the the DT work_dzeata5onzf7rp26j2quaotjza 201 4 majority majority NN work_dzeata5onzf7rp26j2quaotjza 201 5 of of IN work_dzeata5onzf7rp26j2quaotjza 201 6 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 201 7 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 201 8 before before IN work_dzeata5onzf7rp26j2quaotjza 201 9 performing perform VBG work_dzeata5onzf7rp26j2quaotjza 201 10 a a DT work_dzeata5onzf7rp26j2quaotjza 201 11 detailed detailed JJ work_dzeata5onzf7rp26j2quaotjza 201 12 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 201 13 of of IN work_dzeata5onzf7rp26j2quaotjza 201 14 the the DT work_dzeata5onzf7rp26j2quaotjza 201 15 data datum NNS work_dzeata5onzf7rp26j2quaotjza 201 16 , , , work_dzeata5onzf7rp26j2quaotjza 201 17 but but CC work_dzeata5onzf7rp26j2quaotjza 201 18 with with IN work_dzeata5onzf7rp26j2quaotjza 201 19 consideration consideration NN work_dzeata5onzf7rp26j2quaotjza 201 20 for for IN work_dzeata5onzf7rp26j2quaotjza 201 21 what what WP work_dzeata5onzf7rp26j2quaotjza 201 22 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 201 23 learned learn VBD work_dzeata5onzf7rp26j2quaotjza 201 24 about about IN work_dzeata5onzf7rp26j2quaotjza 201 25 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 201 26 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 201 27 while while IN work_dzeata5onzf7rp26j2quaotjza 201 28 testing test VBG work_dzeata5onzf7rp26j2quaotjza 201 29 the the DT work_dzeata5onzf7rp26j2quaotjza 201 30 inclusion inclusion NN work_dzeata5onzf7rp26j2quaotjza 201 31 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 201 32 above above RB work_dzeata5onzf7rp26j2quaotjza 201 33 on on IN work_dzeata5onzf7rp26j2quaotjza 201 34 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 201 35 data data NN work_dzeata5onzf7rp26j2quaotjza 201 36 from from IN work_dzeata5onzf7rp26j2quaotjza 201 37 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 201 38 . . . work_dzeata5onzf7rp26j2quaotjza 202 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 202 2 learned learn VBD work_dzeata5onzf7rp26j2quaotjza 202 3 that that IN work_dzeata5onzf7rp26j2quaotjza 202 4 evaluative evaluative JJ work_dzeata5onzf7rp26j2quaotjza 202 5 questions question NNS work_dzeata5onzf7rp26j2quaotjza 202 6 were be VBD work_dzeata5onzf7rp26j2quaotjza 202 7 quite quite RB work_dzeata5onzf7rp26j2quaotjza 202 8 interesting interesting JJ work_dzeata5onzf7rp26j2quaotjza 202 9 while while IN work_dzeata5onzf7rp26j2quaotjza 202 10 cod- cod- RB work_dzeata5onzf7rp26j2quaotjza 202 11 ing ing NN work_dzeata5onzf7rp26j2quaotjza 202 12 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 202 13 , , , work_dzeata5onzf7rp26j2quaotjza 202 14 thus thus RB work_dzeata5onzf7rp26j2quaotjza 202 15 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 202 16 concerning concern VBG work_dzeata5onzf7rp26j2quaotjza 202 17 what what WP work_dzeata5onzf7rp26j2quaotjza 202 18 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 202 19 were be VBD work_dzeata5onzf7rp26j2quaotjza 202 20 made make VBN work_dzeata5onzf7rp26j2quaotjza 202 21 about about IN work_dzeata5onzf7rp26j2quaotjza 202 22 a a DT work_dzeata5onzf7rp26j2quaotjza 202 23 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 202 24 and and CC work_dzeata5onzf7rp26j2quaotjza 202 25 how how WRB work_dzeata5onzf7rp26j2quaotjza 202 26 those those DT work_dzeata5onzf7rp26j2quaotjza 202 27 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 202 28 were be VBD work_dzeata5onzf7rp26j2quaotjza 202 29 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 202 30 became become VBD work_dzeata5onzf7rp26j2quaotjza 202 31 more more RBR work_dzeata5onzf7rp26j2quaotjza 202 32 fine fine RB work_dzeata5onzf7rp26j2quaotjza 202 33 - - HYPH work_dzeata5onzf7rp26j2quaotjza 202 34 grained grain VBN work_dzeata5onzf7rp26j2quaotjza 202 35 as as IN work_dzeata5onzf7rp26j2quaotjza 202 36 the the DT work_dzeata5onzf7rp26j2quaotjza 202 37 process process NN work_dzeata5onzf7rp26j2quaotjza 202 38 progressed progress VBD work_dzeata5onzf7rp26j2quaotjza 202 39 . . . work_dzeata5onzf7rp26j2quaotjza 203 1 Whenever whenever WRB work_dzeata5onzf7rp26j2quaotjza 203 2 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 203 3 modified modify VBD work_dzeata5onzf7rp26j2quaotjza 203 4 a a DT work_dzeata5onzf7rp26j2quaotjza 203 5 frame frame NN work_dzeata5onzf7rp26j2quaotjza 203 6 , , , work_dzeata5onzf7rp26j2quaotjza 203 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 203 8 updated update VBD work_dzeata5onzf7rp26j2quaotjza 203 9 the the DT work_dzeata5onzf7rp26j2quaotjza 203 10 interpretations interpretation NNS work_dzeata5onzf7rp26j2quaotjza 203 11 of of IN work_dzeata5onzf7rp26j2quaotjza 203 12 all all DT work_dzeata5onzf7rp26j2quaotjza 203 13 previously previously RB work_dzeata5onzf7rp26j2quaotjza 203 14 coded code VBN work_dzeata5onzf7rp26j2quaotjza 203 15 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 203 16 . . . work_dzeata5onzf7rp26j2quaotjza 204 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 204 2 tested test VBD work_dzeata5onzf7rp26j2quaotjza 204 3 the the DT work_dzeata5onzf7rp26j2quaotjza 204 4 frames frame NNS work_dzeata5onzf7rp26j2quaotjza 204 5 by by IN work_dzeata5onzf7rp26j2quaotjza 204 6 having have VBG work_dzeata5onzf7rp26j2quaotjza 204 7 two two CD work_dzeata5onzf7rp26j2quaotjza 204 8 coders coder NNS work_dzeata5onzf7rp26j2quaotjza 204 9 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 204 10 different different JJ work_dzeata5onzf7rp26j2quaotjza 204 11 subsets subset NNS work_dzeata5onzf7rp26j2quaotjza 204 12 of of IN work_dzeata5onzf7rp26j2quaotjza 204 13 the the DT work_dzeata5onzf7rp26j2quaotjza 204 14 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 204 15 segment segment NN work_dzeata5onzf7rp26j2quaotjza 204 16 of of IN work_dzeata5onzf7rp26j2quaotjza 204 17 the the DT work_dzeata5onzf7rp26j2quaotjza 204 18 initial initial JJ work_dzeata5onzf7rp26j2quaotjza 204 19 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 204 20 . . . work_dzeata5onzf7rp26j2quaotjza 205 1 To to TO work_dzeata5onzf7rp26j2quaotjza 205 2 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 205 3 a a DT work_dzeata5onzf7rp26j2quaotjza 205 4 paper paper NN work_dzeata5onzf7rp26j2quaotjza 205 5 , , , work_dzeata5onzf7rp26j2quaotjza 205 6 each each DT work_dzeata5onzf7rp26j2quaotjza 205 7 category category NN work_dzeata5onzf7rp26j2quaotjza 205 8 was be VBD work_dzeata5onzf7rp26j2quaotjza 205 9 assigned assign VBN work_dzeata5onzf7rp26j2quaotjza 205 10 the the DT work_dzeata5onzf7rp26j2quaotjza 205 11 appropriate appropriate JJ work_dzeata5onzf7rp26j2quaotjza 205 12 code(s code(s NN work_dzeata5onzf7rp26j2quaotjza 205 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 205 14 and and CC work_dzeata5onzf7rp26j2quaotjza 205 15 a a DT work_dzeata5onzf7rp26j2quaotjza 205 16 quote quote NN work_dzeata5onzf7rp26j2quaotjza 205 17 justifying justify VBG work_dzeata5onzf7rp26j2quaotjza 205 18 each each DT work_dzeata5onzf7rp26j2quaotjza 205 19 code code NN work_dzeata5onzf7rp26j2quaotjza 205 20 selection selection NN work_dzeata5onzf7rp26j2quaotjza 205 21 was be VBD work_dzeata5onzf7rp26j2quaotjza 205 22 highlighted highlight VBN work_dzeata5onzf7rp26j2quaotjza 205 23 and and CC work_dzeata5onzf7rp26j2quaotjza 205 24 tagged tag VBN work_dzeata5onzf7rp26j2quaotjza 205 25 in in IN work_dzeata5onzf7rp26j2quaotjza 205 26 the the DT work_dzeata5onzf7rp26j2quaotjza 205 27 paper paper NN work_dzeata5onzf7rp26j2quaotjza 205 28 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 205 29 PDF.6 PDF.6 NNP work_dzeata5onzf7rp26j2quaotjza 205 30 While while IN work_dzeata5onzf7rp26j2quaotjza 205 31 testing testing NN work_dzeata5onzf7rp26j2quaotjza 205 32 , , , work_dzeata5onzf7rp26j2quaotjza 205 33 the the DT work_dzeata5onzf7rp26j2quaotjza 205 34 coders coder NNS work_dzeata5onzf7rp26j2quaotjza 205 35 swapped swap VBD work_dzeata5onzf7rp26j2quaotjza 205 36 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 205 37 sans sans NNPS work_dzeata5onzf7rp26j2quaotjza 205 38 codes code NNS work_dzeata5onzf7rp26j2quaotjza 205 39 and and CC work_dzeata5onzf7rp26j2quaotjza 205 40 6 6 CD work_dzeata5onzf7rp26j2quaotjza 205 41 A a DT work_dzeata5onzf7rp26j2quaotjza 205 42 full full JJ work_dzeata5onzf7rp26j2quaotjza 205 43 list list NN work_dzeata5onzf7rp26j2quaotjza 205 44 of of IN work_dzeata5onzf7rp26j2quaotjza 205 45 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 205 46 with with IN work_dzeata5onzf7rp26j2quaotjza 205 47 code code NN work_dzeata5onzf7rp26j2quaotjza 205 48 assign- assign- NN work_dzeata5onzf7rp26j2quaotjza 205 49 ments ment NNS work_dzeata5onzf7rp26j2quaotjza 205 50 is be VBZ work_dzeata5onzf7rp26j2quaotjza 205 51 available available JJ work_dzeata5onzf7rp26j2quaotjza 205 52 in in IN work_dzeata5onzf7rp26j2quaotjza 205 53 Supplemental Supplemental NNP work_dzeata5onzf7rp26j2quaotjza 205 54 Information Information NNP work_dzeata5onzf7rp26j2quaotjza 205 55 3 3 CD work_dzeata5onzf7rp26j2quaotjza 205 56 . . . work_dzeata5onzf7rp26j2quaotjza 205 57 independently independently RB work_dzeata5onzf7rp26j2quaotjza 205 58 re re VB work_dzeata5onzf7rp26j2quaotjza 205 59 - - JJ work_dzeata5onzf7rp26j2quaotjza 205 60 assigned assign VBN work_dzeata5onzf7rp26j2quaotjza 205 61 codes code NNS work_dzeata5onzf7rp26j2quaotjza 205 62 to to TO work_dzeata5onzf7rp26j2quaotjza 205 63 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 205 64 consistency consistency NN work_dzeata5onzf7rp26j2quaotjza 205 65 , , , work_dzeata5onzf7rp26j2quaotjza 205 66 but but CC work_dzeata5onzf7rp26j2quaotjza 205 67 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 205 68 did do VBD work_dzeata5onzf7rp26j2quaotjza 205 69 not not RB work_dzeata5onzf7rp26j2quaotjza 205 70 measure measure VB work_dzeata5onzf7rp26j2quaotjza 205 71 inter inter JJ work_dzeata5onzf7rp26j2quaotjza 205 72 - - JJ work_dzeata5onzf7rp26j2quaotjza 205 73 rater rater JJ work_dzeata5onzf7rp26j2quaotjza 205 74 reliability reliability NN work_dzeata5onzf7rp26j2quaotjza 205 75 . . . work_dzeata5onzf7rp26j2quaotjza 206 1 Code code NN work_dzeata5onzf7rp26j2quaotjza 206 2 definitions definition NNS work_dzeata5onzf7rp26j2quaotjza 206 3 were be VBD work_dzeata5onzf7rp26j2quaotjza 206 4 revised revise VBN work_dzeata5onzf7rp26j2quaotjza 206 5 where where WRB work_dzeata5onzf7rp26j2quaotjza 206 6 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 206 7 were be VBD work_dzeata5onzf7rp26j2quaotjza 206 8 ambiguous ambiguous JJ work_dzeata5onzf7rp26j2quaotjza 206 9 . . . work_dzeata5onzf7rp26j2quaotjza 207 1 While while IN work_dzeata5onzf7rp26j2quaotjza 207 2 there there EX work_dzeata5onzf7rp26j2quaotjza 207 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 207 4 still still RB work_dzeata5onzf7rp26j2quaotjza 207 5 some some DT work_dzeata5onzf7rp26j2quaotjza 207 6 risk risk NN work_dzeata5onzf7rp26j2quaotjza 207 7 that that IN work_dzeata5onzf7rp26j2quaotjza 207 8 different different JJ work_dzeata5onzf7rp26j2quaotjza 207 9 coders coder NNS work_dzeata5onzf7rp26j2quaotjza 207 10 would would MD work_dzeata5onzf7rp26j2quaotjza 207 11 select select VB work_dzeata5onzf7rp26j2quaotjza 207 12 different different JJ work_dzeata5onzf7rp26j2quaotjza 207 13 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 207 14 or or CC work_dzeata5onzf7rp26j2quaotjza 207 15 assign assign JJ work_dzeata5onzf7rp26j2quaotjza 207 16 codes code NNS work_dzeata5onzf7rp26j2quaotjza 207 17 to to IN work_dzeata5onzf7rp26j2quaotjza 207 18 the the DT work_dzeata5onzf7rp26j2quaotjza 207 19 same same JJ work_dzeata5onzf7rp26j2quaotjza 207 20 quote quote NN work_dzeata5onzf7rp26j2quaotjza 207 21 , , , work_dzeata5onzf7rp26j2quaotjza 207 22 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 207 23 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 207 24 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 207 25 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 207 26 sufficiently sufficiently RB work_dzeata5onzf7rp26j2quaotjza 207 27 mitigated mitigate VBD work_dzeata5onzf7rp26j2quaotjza 207 28 the the DT work_dzeata5onzf7rp26j2quaotjza 207 29 risk risk NN work_dzeata5onzf7rp26j2quaotjza 207 30 without without IN work_dzeata5onzf7rp26j2quaotjza 207 31 substantially substantially RB work_dzeata5onzf7rp26j2quaotjza 207 32 burdening burden VBG work_dzeata5onzf7rp26j2quaotjza 207 33 the the DT work_dzeata5onzf7rp26j2quaotjza 207 34 process process NN work_dzeata5onzf7rp26j2quaotjza 207 35 given give VBN work_dzeata5onzf7rp26j2quaotjza 207 36 the the DT work_dzeata5onzf7rp26j2quaotjza 207 37 large large JJ work_dzeata5onzf7rp26j2quaotjza 207 38 scope scope NN work_dzeata5onzf7rp26j2quaotjza 207 39 of of IN work_dzeata5onzf7rp26j2quaotjza 207 40 this this DT work_dzeata5onzf7rp26j2quaotjza 207 41 effort effort NN work_dzeata5onzf7rp26j2quaotjza 207 42 . . . work_dzeata5onzf7rp26j2quaotjza 208 1 After after IN work_dzeata5onzf7rp26j2quaotjza 208 2 coding code VBG work_dzeata5onzf7rp26j2quaotjza 208 3 every every DT work_dzeata5onzf7rp26j2quaotjza 208 4 paper paper NN work_dzeata5onzf7rp26j2quaotjza 208 5 , , , work_dzeata5onzf7rp26j2quaotjza 208 6 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 208 7 organized organize VBD work_dzeata5onzf7rp26j2quaotjza 208 8 the the DT work_dzeata5onzf7rp26j2quaotjza 208 9 codes code NNS work_dzeata5onzf7rp26j2quaotjza 208 10 for for IN work_dzeata5onzf7rp26j2quaotjza 208 11 each each DT work_dzeata5onzf7rp26j2quaotjza 208 12 paper paper NN work_dzeata5onzf7rp26j2quaotjza 208 13 by by IN work_dzeata5onzf7rp26j2quaotjza 208 14 category category NN work_dzeata5onzf7rp26j2quaotjza 208 15 in in IN work_dzeata5onzf7rp26j2quaotjza 208 16 a a DT work_dzeata5onzf7rp26j2quaotjza 208 17 unified unified JJ work_dzeata5onzf7rp26j2quaotjza 208 18 machine machine NN work_dzeata5onzf7rp26j2quaotjza 208 19 - - HYPH work_dzeata5onzf7rp26j2quaotjza 208 20 readable readable JJ work_dzeata5onzf7rp26j2quaotjza 208 21 file7 file7 NN work_dzeata5onzf7rp26j2quaotjza 208 22 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 208 23 hereafter hereafter RB work_dzeata5onzf7rp26j2quaotjza 208 24 referred refer VBN work_dzeata5onzf7rp26j2quaotjza 208 25 to to IN work_dzeata5onzf7rp26j2quaotjza 208 26 as as IN work_dzeata5onzf7rp26j2quaotjza 208 27 the the DT work_dzeata5onzf7rp26j2quaotjza 208 28 summary summary NN work_dzeata5onzf7rp26j2quaotjza 208 29 of of IN work_dzeata5onzf7rp26j2quaotjza 208 30 coded code VBN work_dzeata5onzf7rp26j2quaotjza 208 31 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 208 32 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 208 33 for for IN work_dzeata5onzf7rp26j2quaotjza 208 34 further further JJ work_dzeata5onzf7rp26j2quaotjza 208 35 7 7 CD work_dzeata5onzf7rp26j2quaotjza 208 36 The the DT work_dzeata5onzf7rp26j2quaotjza 208 37 summarized summarize VBN work_dzeata5onzf7rp26j2quaotjza 208 38 version version NN work_dzeata5onzf7rp26j2quaotjza 208 39 of of IN work_dzeata5onzf7rp26j2quaotjza 208 40 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 208 41 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 208 42 is be VBZ work_dzeata5onzf7rp26j2quaotjza 208 43 available available JJ work_dzeata5onzf7rp26j2quaotjza 208 44 as as IN work_dzeata5onzf7rp26j2quaotjza 208 45 Supplemental Supplemental NNP work_dzeata5onzf7rp26j2quaotjza 208 46 Information Information NNP work_dzeata5onzf7rp26j2quaotjza 208 47 4 4 CD work_dzeata5onzf7rp26j2quaotjza 208 48 . . . work_dzeata5onzf7rp26j2quaotjza 209 1 This this DT work_dzeata5onzf7rp26j2quaotjza 209 2 spreadsheet spreadsheet NN work_dzeata5onzf7rp26j2quaotjza 209 3 was be VBD work_dzeata5onzf7rp26j2quaotjza 209 4 converted convert VBN work_dzeata5onzf7rp26j2quaotjza 209 5 to to IN work_dzeata5onzf7rp26j2quaotjza 209 6 a a DT work_dzeata5onzf7rp26j2quaotjza 209 7 CSV csv NN work_dzeata5onzf7rp26j2quaotjza 209 8 file file NN work_dzeata5onzf7rp26j2quaotjza 209 9 to to TO work_dzeata5onzf7rp26j2quaotjza 209 10 perform perform VB work_dzeata5onzf7rp26j2quaotjza 209 11 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 209 12 and and CC work_dzeata5onzf7rp26j2quaotjza 209 13 graph graph NN work_dzeata5onzf7rp26j2quaotjza 209 14 - - HYPH work_dzeata5onzf7rp26j2quaotjza 209 15 based base VBN work_dzeata5onzf7rp26j2quaotjza 209 16 analyses analysis NNS work_dzeata5onzf7rp26j2quaotjza 209 17 . . . work_dzeata5onzf7rp26j2quaotjza 210 1 processing processing NN work_dzeata5onzf7rp26j2quaotjza 210 2 . . . work_dzeata5onzf7rp26j2quaotjza 211 1 Analyzing analyze VBG work_dzeata5onzf7rp26j2quaotjza 211 2 the the DT work_dzeata5onzf7rp26j2quaotjza 211 3 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 211 4 To to TO work_dzeata5onzf7rp26j2quaotjza 211 5 summarize summarize VB work_dzeata5onzf7rp26j2quaotjza 211 6 the the DT work_dzeata5onzf7rp26j2quaotjza 211 7 differences difference NNS work_dzeata5onzf7rp26j2quaotjza 211 8 and and CC work_dzeata5onzf7rp26j2quaotjza 211 9 similarities similarity NNS work_dzeata5onzf7rp26j2quaotjza 211 10 between between IN work_dzeata5onzf7rp26j2quaotjza 211 11 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 211 12 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 211 13 , , , work_dzeata5onzf7rp26j2quaotjza 211 14 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 211 15 attempted attempt VBD work_dzeata5onzf7rp26j2quaotjza 211 16 to to TO work_dzeata5onzf7rp26j2quaotjza 211 17 identify identify VB work_dzeata5onzf7rp26j2quaotjza 211 18 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 211 19 of of IN work_dzeata5onzf7rp26j2quaotjza 211 20 similar similar JJ work_dzeata5onzf7rp26j2quaotjza 211 21 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 211 22 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 211 23 . . . work_dzeata5onzf7rp26j2quaotjza 212 1 To to TO work_dzeata5onzf7rp26j2quaotjza 212 2 do do VB work_dzeata5onzf7rp26j2quaotjza 212 3 so so RB work_dzeata5onzf7rp26j2quaotjza 212 4 , , , work_dzeata5onzf7rp26j2quaotjza 212 5 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 212 6 first first RB work_dzeata5onzf7rp26j2quaotjza 212 7 calculated calculate VBD work_dzeata5onzf7rp26j2quaotjza 212 8 a a DT work_dzeata5onzf7rp26j2quaotjza 212 9 dissimilarity dissimilarity NN work_dzeata5onzf7rp26j2quaotjza 212 10 matrix matrix NN work_dzeata5onzf7rp26j2quaotjza 212 11 for for IN work_dzeata5onzf7rp26j2quaotjza 212 12 the the DT work_dzeata5onzf7rp26j2quaotjza 212 13 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 212 14 . . . work_dzeata5onzf7rp26j2quaotjza 213 1 For for IN work_dzeata5onzf7rp26j2quaotjza 213 2 category category NN work_dzeata5onzf7rp26j2quaotjza 213 3 k k NNS work_dzeata5onzf7rp26j2quaotjza 213 4 , , , work_dzeata5onzf7rp26j2quaotjza 213 5 let let VB work_dzeata5onzf7rp26j2quaotjza 213 6 pijk pijk NN work_dzeata5onzf7rp26j2quaotjza 213 7 be be VB work_dzeata5onzf7rp26j2quaotjza 213 8 the the DT work_dzeata5onzf7rp26j2quaotjza 213 9 number number NN work_dzeata5onzf7rp26j2quaotjza 213 10 of of IN work_dzeata5onzf7rp26j2quaotjza 213 11 codes code NNS work_dzeata5onzf7rp26j2quaotjza 213 12 that that WDT work_dzeata5onzf7rp26j2quaotjza 213 13 sandboxes sandboxe VBZ work_dzeata5onzf7rp26j2quaotjza 213 14 i i PRP work_dzeata5onzf7rp26j2quaotjza 213 15 and and CC work_dzeata5onzf7rp26j2quaotjza 213 16 j j NNP work_dzeata5onzf7rp26j2quaotjza 213 17 share share NN work_dzeata5onzf7rp26j2quaotjza 213 18 , , , work_dzeata5onzf7rp26j2quaotjza 213 19 divided divide VBN work_dzeata5onzf7rp26j2quaotjza 213 20 by by IN work_dzeata5onzf7rp26j2quaotjza 213 21 the the DT work_dzeata5onzf7rp26j2quaotjza 213 22 total total JJ work_dzeata5onzf7rp26j2quaotjza 213 23 number number NN work_dzeata5onzf7rp26j2quaotjza 213 24 of of IN work_dzeata5onzf7rp26j2quaotjza 213 25 codes code NNS work_dzeata5onzf7rp26j2quaotjza 213 26 in in IN work_dzeata5onzf7rp26j2quaotjza 213 27 that that DT work_dzeata5onzf7rp26j2quaotjza 213 28 category category NN work_dzeata5onzf7rp26j2quaotjza 213 29 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 213 30 could could MD work_dzeata5onzf7rp26j2quaotjza 213 31 share share VB work_dzeata5onzf7rp26j2quaotjza 213 32 . . . work_dzeata5onzf7rp26j2quaotjza 214 1 For for IN work_dzeata5onzf7rp26j2quaotjza 214 2 categories category NNS work_dzeata5onzf7rp26j2quaotjza 214 3 in in IN work_dzeata5onzf7rp26j2quaotjza 214 4 which which WDT work_dzeata5onzf7rp26j2quaotjza 214 5 each each DT work_dzeata5onzf7rp26j2quaotjza 214 6 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 214 7 is be VBZ work_dzeata5onzf7rp26j2quaotjza 214 8 interpreted interpret VBN work_dzeata5onzf7rp26j2quaotjza 214 9 with with IN work_dzeata5onzf7rp26j2quaotjza 214 10 one one CD work_dzeata5onzf7rp26j2quaotjza 214 11 and and CC work_dzeata5onzf7rp26j2quaotjza 214 12 only only RB work_dzeata5onzf7rp26j2quaotjza 214 13 one one CD work_dzeata5onzf7rp26j2quaotjza 214 14 code code NN work_dzeata5onzf7rp26j2quaotjza 214 15 , , , work_dzeata5onzf7rp26j2quaotjza 214 16 pijk pijk JJ work_dzeata5onzf7rp26j2quaotjza 214 17 is be VBZ work_dzeata5onzf7rp26j2quaotjza 214 18 either either CC work_dzeata5onzf7rp26j2quaotjza 214 19 1 1 CD work_dzeata5onzf7rp26j2quaotjza 214 20 or or CC work_dzeata5onzf7rp26j2quaotjza 214 21 0 0 CD work_dzeata5onzf7rp26j2quaotjza 214 22 ; ; : work_dzeata5onzf7rp26j2quaotjza 214 23 for for IN work_dzeata5onzf7rp26j2quaotjza 214 24 other other JJ work_dzeata5onzf7rp26j2quaotjza 214 25 categories category NNS work_dzeata5onzf7rp26j2quaotjza 214 26 , , , work_dzeata5onzf7rp26j2quaotjza 214 27 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 214 28 falls fall VBZ work_dzeata5onzf7rp26j2quaotjza 214 29 in in IN work_dzeata5onzf7rp26j2quaotjza 214 30 the the DT work_dzeata5onzf7rp26j2quaotjza 214 31 interval interval NN work_dzeata5onzf7rp26j2quaotjza 214 32 [ [ -LRB- work_dzeata5onzf7rp26j2quaotjza 214 33 0,1 0,1 NFP work_dzeata5onzf7rp26j2quaotjza 214 34 ] ] -RRB- work_dzeata5onzf7rp26j2quaotjza 214 35 . . . work_dzeata5onzf7rp26j2quaotjza 215 1 Then then RB work_dzeata5onzf7rp26j2quaotjza 215 2 the the DT work_dzeata5onzf7rp26j2quaotjza 215 3 dissimilarity dissimilarity NN work_dzeata5onzf7rp26j2quaotjza 215 4 between between IN work_dzeata5onzf7rp26j2quaotjza 215 5 i i PRP work_dzeata5onzf7rp26j2quaotjza 215 6 and and CC work_dzeata5onzf7rp26j2quaotjza 215 7 j j NNP work_dzeata5onzf7rp26j2quaotjza 215 8 is be VBZ work_dzeata5onzf7rp26j2quaotjza 215 9 dij dij NNP work_dzeata5onzf7rp26j2quaotjza 215 10 = = SYM work_dzeata5onzf7rp26j2quaotjza 215 11   XX work_dzeata5onzf7rp26j2quaotjza 215 12 k(1 k(1 NNP work_dzeata5onzf7rp26j2quaotjza 215 13 − − NNP work_dzeata5onzf7rp26j2quaotjza 215 14 pijk pijk NN work_dzeata5onzf7rp26j2quaotjza 215 15 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 215 16 . . . work_dzeata5onzf7rp26j2quaotjza 216 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 216 2 fed feed VBD work_dzeata5onzf7rp26j2quaotjza 216 3 the the DT work_dzeata5onzf7rp26j2quaotjza 216 4 resulting result VBG work_dzeata5onzf7rp26j2quaotjza 216 5 dissimilarity dissimilarity NN work_dzeata5onzf7rp26j2quaotjza 216 6 matrix matrix NN work_dzeata5onzf7rp26j2quaotjza 216 7 into into IN work_dzeata5onzf7rp26j2quaotjza 216 8 a a DT work_dzeata5onzf7rp26j2quaotjza 216 9 hierarchical hierarchical JJ work_dzeata5onzf7rp26j2quaotjza 216 10 agglomerative agglomerative JJ work_dzeata5onzf7rp26j2quaotjza 216 11 clustering cluster VBG work_dzeata5onzf7rp26j2quaotjza 216 12 algorithm algorithm NN work_dzeata5onzf7rp26j2quaotjza 216 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 216 14 Kaufman Kaufman NNP work_dzeata5onzf7rp26j2quaotjza 216 15 & & CC work_dzeata5onzf7rp26j2quaotjza 216 16 Rousseeuw Rousseeuw NNP work_dzeata5onzf7rp26j2quaotjza 216 17 , , , work_dzeata5onzf7rp26j2quaotjza 216 18 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 216 19 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 216 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 216 21 implemented implement VBN work_dzeata5onzf7rp26j2quaotjza 216 22 in in IN work_dzeata5onzf7rp26j2quaotjza 216 23 R r NN work_dzeata5onzf7rp26j2quaotjza 216 24 with with IN work_dzeata5onzf7rp26j2quaotjza 216 25 the the DT work_dzeata5onzf7rp26j2quaotjza 216 26 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 216 27 package package NN work_dzeata5onzf7rp26j2quaotjza 216 28 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 216 29 R R NNP work_dzeata5onzf7rp26j2quaotjza 216 30 Core Core NNP work_dzeata5onzf7rp26j2quaotjza 216 31 Team Team NNP work_dzeata5onzf7rp26j2quaotjza 216 32 , , , work_dzeata5onzf7rp26j2quaotjza 216 33 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 216 34 ; ; : work_dzeata5onzf7rp26j2quaotjza 216 35 Maechler Maechler NNP work_dzeata5onzf7rp26j2quaotjza 216 36 et et FW work_dzeata5onzf7rp26j2quaotjza 216 37 al al NNP work_dzeata5onzf7rp26j2quaotjza 216 38 . . NNP work_dzeata5onzf7rp26j2quaotjza 216 39 , , , work_dzeata5onzf7rp26j2quaotjza 216 40 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 216 41 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 216 42 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 216 43 . . . work_dzeata5onzf7rp26j2quaotjza 217 1 This this DT work_dzeata5onzf7rp26j2quaotjza 217 2 algorithm algorithm NN work_dzeata5onzf7rp26j2quaotjza 217 3 begins begin VBZ work_dzeata5onzf7rp26j2quaotjza 217 4 by by IN work_dzeata5onzf7rp26j2quaotjza 217 5 treating treat VBG work_dzeata5onzf7rp26j2quaotjza 217 6 each each DT work_dzeata5onzf7rp26j2quaotjza 217 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 217 8 as as IN work_dzeata5onzf7rp26j2quaotjza 217 9 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 217 10 own own JJ work_dzeata5onzf7rp26j2quaotjza 217 11 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 217 12 , , , work_dzeata5onzf7rp26j2quaotjza 217 13 and and CC work_dzeata5onzf7rp26j2quaotjza 217 14 then then RB work_dzeata5onzf7rp26j2quaotjza 217 15 iteratively iteratively RB work_dzeata5onzf7rp26j2quaotjza 217 16 merges merge VBZ work_dzeata5onzf7rp26j2quaotjza 217 17 the the DT work_dzeata5onzf7rp26j2quaotjza 217 18 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 217 19 that that WDT work_dzeata5onzf7rp26j2quaotjza 217 20 are be VBP work_dzeata5onzf7rp26j2quaotjza 217 21 nearest near JJS work_dzeata5onzf7rp26j2quaotjza 217 22 to to IN work_dzeata5onzf7rp26j2quaotjza 217 23 each each DT work_dzeata5onzf7rp26j2quaotjza 217 24 other other JJ work_dzeata5onzf7rp26j2quaotjza 217 25 , , , work_dzeata5onzf7rp26j2quaotjza 217 26 where where WRB work_dzeata5onzf7rp26j2quaotjza 217 27 distance distance NN work_dzeata5onzf7rp26j2quaotjza 217 28 between between IN work_dzeata5onzf7rp26j2quaotjza 217 29 two two CD work_dzeata5onzf7rp26j2quaotjza 217 30 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 217 31 is be VBZ work_dzeata5onzf7rp26j2quaotjza 217 32 defined define VBN work_dzeata5onzf7rp26j2quaotjza 217 33 as as IN work_dzeata5onzf7rp26j2quaotjza 217 34 the the DT work_dzeata5onzf7rp26j2quaotjza 217 35 average average JJ work_dzeata5onzf7rp26j2quaotjza 217 36 dissimilarity dissimilarity NN work_dzeata5onzf7rp26j2quaotjza 217 37 between between IN work_dzeata5onzf7rp26j2quaotjza 217 38 the the DT work_dzeata5onzf7rp26j2quaotjza 217 39 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 217 40 ’ ’ POS work_dzeata5onzf7rp26j2quaotjza 217 41 members member NNS work_dzeata5onzf7rp26j2quaotjza 217 42 . . . work_dzeata5onzf7rp26j2quaotjza 218 1 The the DT work_dzeata5onzf7rp26j2quaotjza 218 2 agglomerative agglomerative JJ work_dzeata5onzf7rp26j2quaotjza 218 3 clustering clustering NN work_dzeata5onzf7rp26j2quaotjza 218 4 process process NN work_dzeata5onzf7rp26j2quaotjza 218 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 218 6 displayed display VBN work_dzeata5onzf7rp26j2quaotjza 218 7 in in IN work_dzeata5onzf7rp26j2quaotjza 218 8 dendrograms dendrogram NNS work_dzeata5onzf7rp26j2quaotjza 218 9 . . . work_dzeata5onzf7rp26j2quaotjza 219 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 219 2 stopped stop VBD work_dzeata5onzf7rp26j2quaotjza 219 3 the the DT work_dzeata5onzf7rp26j2quaotjza 219 4 agglomerative agglomerative JJ work_dzeata5onzf7rp26j2quaotjza 219 5 process process NN work_dzeata5onzf7rp26j2quaotjza 219 6 at at IN work_dzeata5onzf7rp26j2quaotjza 219 7 the the DT work_dzeata5onzf7rp26j2quaotjza 219 8 point point NN work_dzeata5onzf7rp26j2quaotjza 219 9 at at IN work_dzeata5onzf7rp26j2quaotjza 219 10 which which WDT work_dzeata5onzf7rp26j2quaotjza 219 11 there there EX work_dzeata5onzf7rp26j2quaotjza 219 12 were be VBD work_dzeata5onzf7rp26j2quaotjza 219 13 two two CD work_dzeata5onzf7rp26j2quaotjza 219 14 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 219 15 remaining remain VBG work_dzeata5onzf7rp26j2quaotjza 219 16 , , , work_dzeata5onzf7rp26j2quaotjza 219 17 producing produce VBG work_dzeata5onzf7rp26j2quaotjza 219 18 two two CD work_dzeata5onzf7rp26j2quaotjza 219 19 lists list NNS work_dzeata5onzf7rp26j2quaotjza 219 20 of of IN work_dzeata5onzf7rp26j2quaotjza 219 21 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 219 22 , , , work_dzeata5onzf7rp26j2quaotjza 219 23 one one CD work_dzeata5onzf7rp26j2quaotjza 219 24 list list NN work_dzeata5onzf7rp26j2quaotjza 219 25 for for IN work_dzeata5onzf7rp26j2quaotjza 219 26 each each DT work_dzeata5onzf7rp26j2quaotjza 219 27 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 219 28 . . . work_dzeata5onzf7rp26j2quaotjza 220 1 To to TO work_dzeata5onzf7rp26j2quaotjza 220 2 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 220 3 the the DT work_dzeata5onzf7rp26j2quaotjza 220 4 resulting result VBG work_dzeata5onzf7rp26j2quaotjza 220 5 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 220 6 , , , work_dzeata5onzf7rp26j2quaotjza 220 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 220 8 produced produce VBD work_dzeata5onzf7rp26j2quaotjza 220 9 bar bar NN work_dzeata5onzf7rp26j2quaotjza 220 10 charts chart NNS work_dzeata5onzf7rp26j2quaotjza 220 11 displaying display VBG work_dzeata5onzf7rp26j2quaotjza 220 12 the the DT work_dzeata5onzf7rp26j2quaotjza 220 13 code code NN work_dzeata5onzf7rp26j2quaotjza 220 14 membership membership NN work_dzeata5onzf7rp26j2quaotjza 220 15 by by IN work_dzeata5onzf7rp26j2quaotjza 220 16 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 220 17 . . . work_dzeata5onzf7rp26j2quaotjza 221 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 221 2 conducted conduct VBD work_dzeata5onzf7rp26j2quaotjza 221 3 this this DT work_dzeata5onzf7rp26j2quaotjza 221 4 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 221 5 three three CD work_dzeata5onzf7rp26j2quaotjza 221 6 times time NNS work_dzeata5onzf7rp26j2quaotjza 221 7 : : : work_dzeata5onzf7rp26j2quaotjza 221 8 once once IN work_dzeata5onzf7rp26j2quaotjza 221 9 using use VBG work_dzeata5onzf7rp26j2quaotjza 221 10 all all DT work_dzeata5onzf7rp26j2quaotjza 221 11 of of IN work_dzeata5onzf7rp26j2quaotjza 221 12 the the DT work_dzeata5onzf7rp26j2quaotjza 221 13 categories category NNS work_dzeata5onzf7rp26j2quaotjza 221 14 to to TO work_dzeata5onzf7rp26j2quaotjza 221 15 define define VB work_dzeata5onzf7rp26j2quaotjza 221 16 dissimilarity dissimilarity NN work_dzeata5onzf7rp26j2quaotjza 221 17 , , , work_dzeata5onzf7rp26j2quaotjza 221 18 once once IN work_dzeata5onzf7rp26j2quaotjza 221 19 using use VBG work_dzeata5onzf7rp26j2quaotjza 221 20 all all DT work_dzeata5onzf7rp26j2quaotjza 221 21 categories category NNS work_dzeata5onzf7rp26j2quaotjza 221 22 except except IN work_dzeata5onzf7rp26j2quaotjza 221 23 those those DT work_dzeata5onzf7rp26j2quaotjza 221 24 for for IN work_dzeata5onzf7rp26j2quaotjza 221 25 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 221 26 , , , work_dzeata5onzf7rp26j2quaotjza 221 27 validation validation NN work_dzeata5onzf7rp26j2quaotjza 221 28 , , , work_dzeata5onzf7rp26j2quaotjza 221 29 and and CC work_dzeata5onzf7rp26j2quaotjza 221 30 availability availability NN work_dzeata5onzf7rp26j2quaotjza 221 31 , , , work_dzeata5onzf7rp26j2quaotjza 221 32 and and CC work_dzeata5onzf7rp26j2quaotjza 221 33 once once RB work_dzeata5onzf7rp26j2quaotjza 221 34 using use VBG work_dzeata5onzf7rp26j2quaotjza 221 35 the the DT work_dzeata5onzf7rp26j2quaotjza 221 36 validation validation NN work_dzeata5onzf7rp26j2quaotjza 221 37 categories category NNS work_dzeata5onzf7rp26j2quaotjza 221 38 . . . work_dzeata5onzf7rp26j2quaotjza 222 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 222 2 do do VBP work_dzeata5onzf7rp26j2quaotjza 222 3 not not RB work_dzeata5onzf7rp26j2quaotjza 222 4 present present VB work_dzeata5onzf7rp26j2quaotjza 222 5 the the DT work_dzeata5onzf7rp26j2quaotjza 222 6 plots plot NNS work_dzeata5onzf7rp26j2quaotjza 222 7 from from IN work_dzeata5onzf7rp26j2quaotjza 222 8 the the DT work_dzeata5onzf7rp26j2quaotjza 222 9 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 222 10 that that WDT work_dzeata5onzf7rp26j2quaotjza 222 11 ignored ignore VBD work_dzeata5onzf7rp26j2quaotjza 222 12 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 222 13 , , , work_dzeata5onzf7rp26j2quaotjza 222 14 validation validation NN work_dzeata5onzf7rp26j2quaotjza 222 15 , , , work_dzeata5onzf7rp26j2quaotjza 222 16 and and CC work_dzeata5onzf7rp26j2quaotjza 222 17 availability availability NN work_dzeata5onzf7rp26j2quaotjza 222 18 because because IN work_dzeata5onzf7rp26j2quaotjza 222 19 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 222 20 did do VBD work_dzeata5onzf7rp26j2quaotjza 222 21 not not RB work_dzeata5onzf7rp26j2quaotjza 222 22 produce produce VB work_dzeata5onzf7rp26j2quaotjza 222 23 results result NNS work_dzeata5onzf7rp26j2quaotjza 222 24 different different JJ work_dzeata5onzf7rp26j2quaotjza 222 25 from from IN work_dzeata5onzf7rp26j2quaotjza 222 26 those those DT work_dzeata5onzf7rp26j2quaotjza 222 27 generated generate VBN work_dzeata5onzf7rp26j2quaotjza 222 28 using use VBG work_dzeata5onzf7rp26j2quaotjza 222 29 all all DT work_dzeata5onzf7rp26j2quaotjza 222 30 categories category NNS work_dzeata5onzf7rp26j2quaotjza 222 31 . . . work_dzeata5onzf7rp26j2quaotjza 223 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 223 2 et et FW work_dzeata5onzf7rp26j2quaotjza 223 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 223 4 . . . work_dzeata5onzf7rp26j2quaotjza 224 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 224 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 224 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 224 4 , , , work_dzeata5onzf7rp26j2quaotjza 224 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 224 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 224 7 . . . work_dzeata5onzf7rp26j2quaotjza 225 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 225 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 225 3 , , , work_dzeata5onzf7rp26j2quaotjza 225 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 225 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 225 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 225 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 225 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 225 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 225 10 10/36 10/36 CD work_dzeata5onzf7rp26j2quaotjza 225 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 225 12 http://dx.doi.org/10.7717/peerj-cs.43/supp-3 http://dx.doi.org/10.7717/peerj-cs.43/supp-3 -LRB- work_dzeata5onzf7rp26j2quaotjza 225 13 http://dx.doi.org/10.7717/peerj-cs.43/supp-3 http://dx.doi.org/10.7717/peerj-cs.43/supp-3 -LRB- work_dzeata5onzf7rp26j2quaotjza 225 14 http://dx.doi.org/10.7717/peerj-cs.43/supp-3 http://dx.doi.org/10.7717/peerj-cs.43/supp-3 -LRB- work_dzeata5onzf7rp26j2quaotjza 225 15 http://dx.doi.org/10.7717/peerj-cs.43/supp-4 http://dx.doi.org/10.7717/peerj-cs.43/supp-4 ADD work_dzeata5onzf7rp26j2quaotjza 225 16 http://dx.doi.org/10.7717/peerj-cs.43/supp-4 http://dx.doi.org/10.7717/peerj-cs.43/supp-4 RBR work_dzeata5onzf7rp26j2quaotjza 225 17 http://dx.doi.org/10.7717/peerj-cs.43/supp-4 http://dx.doi.org/10.7717/peerj-cs.43/supp-4 UH work_dzeata5onzf7rp26j2quaotjza 225 18 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 225 19 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 225 20 conducted conduct VBD work_dzeata5onzf7rp26j2quaotjza 225 21 correlational correlational JJ work_dzeata5onzf7rp26j2quaotjza 225 22 analyses analysis NNS work_dzeata5onzf7rp26j2quaotjza 225 23 to to TO work_dzeata5onzf7rp26j2quaotjza 225 24 learn learn VB work_dzeata5onzf7rp26j2quaotjza 225 25 whether whether IN work_dzeata5onzf7rp26j2quaotjza 225 26 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 225 27 validation validation NN work_dzeata5onzf7rp26j2quaotjza 225 28 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 225 29 have have VBP work_dzeata5onzf7rp26j2quaotjza 225 30 improved improve VBN work_dzeata5onzf7rp26j2quaotjza 225 31 or or CC work_dzeata5onzf7rp26j2quaotjza 225 32 worsened worsen VBN work_dzeata5onzf7rp26j2quaotjza 225 33 over over IN work_dzeata5onzf7rp26j2quaotjza 225 34 time time NN work_dzeata5onzf7rp26j2quaotjza 225 35 , , , work_dzeata5onzf7rp26j2quaotjza 225 36 or or CC work_dzeata5onzf7rp26j2quaotjza 225 37 whether whether IN work_dzeata5onzf7rp26j2quaotjza 225 38 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 225 39 publications publication NNS work_dzeata5onzf7rp26j2quaotjza 225 40 with with IN work_dzeata5onzf7rp26j2quaotjza 225 41 better well JJR work_dzeata5onzf7rp26j2quaotjza 225 42 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 225 43 or or CC work_dzeata5onzf7rp26j2quaotjza 225 44 worse bad JJR work_dzeata5onzf7rp26j2quaotjza 225 45 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 225 46 validation validation NN work_dzeata5onzf7rp26j2quaotjza 225 47 received receive VBD work_dzeata5onzf7rp26j2quaotjza 225 48 more more JJR work_dzeata5onzf7rp26j2quaotjza 225 49 citations citation NNS work_dzeata5onzf7rp26j2quaotjza 225 50 . . . work_dzeata5onzf7rp26j2quaotjza 226 1 The the DT work_dzeata5onzf7rp26j2quaotjza 226 2 validation validation NN work_dzeata5onzf7rp26j2quaotjza 226 3 codes code NNS work_dzeata5onzf7rp26j2quaotjza 226 4 were be VBD work_dzeata5onzf7rp26j2quaotjza 226 5 ordered order VBN work_dzeata5onzf7rp26j2quaotjza 226 6 in in IN work_dzeata5onzf7rp26j2quaotjza 226 7 the the DT work_dzeata5onzf7rp26j2quaotjza 226 8 following following JJ work_dzeata5onzf7rp26j2quaotjza 226 9 way way NN work_dzeata5onzf7rp26j2quaotjza 226 10 : : : work_dzeata5onzf7rp26j2quaotjza 226 11 proof proof NNP work_dzeata5onzf7rp26j2quaotjza 226 12 > > XX work_dzeata5onzf7rp26j2quaotjza 226 13 analytical analytical NNP work_dzeata5onzf7rp26j2quaotjza 226 14 analysis analysis NNP work_dzeata5onzf7rp26j2quaotjza 226 15 > > XX work_dzeata5onzf7rp26j2quaotjza 226 16 benchmarks benchmarks NNP work_dzeata5onzf7rp26j2quaotjza 226 17 > > XX work_dzeata5onzf7rp26j2quaotjza 226 18 case case NNP work_dzeata5onzf7rp26j2quaotjza 226 19 study study NNP work_dzeata5onzf7rp26j2quaotjza 226 20 > > NNP work_dzeata5onzf7rp26j2quaotjza 226 21 argumentation argumentation NNP work_dzeata5onzf7rp26j2quaotjza 226 22 > > XX work_dzeata5onzf7rp26j2quaotjza 226 23 none none NN work_dzeata5onzf7rp26j2quaotjza 226 24 . . . work_dzeata5onzf7rp26j2quaotjza 227 1 This this DT work_dzeata5onzf7rp26j2quaotjza 227 2 ordering order VBG work_dzeata5onzf7rp26j2quaotjza 227 3 favors favor NNS work_dzeata5onzf7rp26j2quaotjza 227 4 validation validation NN work_dzeata5onzf7rp26j2quaotjza 227 5 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 227 6 that that WDT work_dzeata5onzf7rp26j2quaotjza 227 7 are be VBP work_dzeata5onzf7rp26j2quaotjza 227 8 less less RBR work_dzeata5onzf7rp26j2quaotjza 227 9 subjective subjective JJ work_dzeata5onzf7rp26j2quaotjza 227 10 . . . work_dzeata5onzf7rp26j2quaotjza 228 1 While while IN work_dzeata5onzf7rp26j2quaotjza 228 2 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 228 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 228 4 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 228 5 for for IN work_dzeata5onzf7rp26j2quaotjza 228 6 a a DT work_dzeata5onzf7rp26j2quaotjza 228 7 highly highly RB work_dzeata5onzf7rp26j2quaotjza 228 8 ranked rank VBN work_dzeata5onzf7rp26j2quaotjza 228 9 technique technique NN work_dzeata5onzf7rp26j2quaotjza 228 10 to to TO work_dzeata5onzf7rp26j2quaotjza 228 11 be be VB work_dzeata5onzf7rp26j2quaotjza 228 12 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 228 13 less less RBR work_dzeata5onzf7rp26j2quaotjza 228 14 effectively effectively RB work_dzeata5onzf7rp26j2quaotjza 228 15 than than IN work_dzeata5onzf7rp26j2quaotjza 228 16 a a DT work_dzeata5onzf7rp26j2quaotjza 228 17 lower low JJR work_dzeata5onzf7rp26j2quaotjza 228 18 ranked rank VBN work_dzeata5onzf7rp26j2quaotjza 228 19 technique technique NN work_dzeata5onzf7rp26j2quaotjza 228 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 228 21 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 228 22 , , , work_dzeata5onzf7rp26j2quaotjza 228 23 a a DT work_dzeata5onzf7rp26j2quaotjza 228 24 proof proof NN work_dzeata5onzf7rp26j2quaotjza 228 25 that that WDT work_dzeata5onzf7rp26j2quaotjza 228 26 relies rely VBZ work_dzeata5onzf7rp26j2quaotjza 228 27 on on IN work_dzeata5onzf7rp26j2quaotjza 228 28 unrealistic unrealistic JJ work_dzeata5onzf7rp26j2quaotjza 228 29 assumptions assumption NNS work_dzeata5onzf7rp26j2quaotjza 228 30 relative relative JJ work_dzeata5onzf7rp26j2quaotjza 228 31 to to IN work_dzeata5onzf7rp26j2quaotjza 228 32 a a DT work_dzeata5onzf7rp26j2quaotjza 228 33 thorough thorough JJ work_dzeata5onzf7rp26j2quaotjza 228 34 case case NN work_dzeata5onzf7rp26j2quaotjza 228 35 study study NN work_dzeata5onzf7rp26j2quaotjza 228 36 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 228 37 this this DT work_dzeata5onzf7rp26j2quaotjza 228 38 ranking ranking NN work_dzeata5onzf7rp26j2quaotjza 228 39 was be VBD work_dzeata5onzf7rp26j2quaotjza 228 40 devised devise VBN work_dzeata5onzf7rp26j2quaotjza 228 41 after after IN work_dzeata5onzf7rp26j2quaotjza 228 42 coding code VBG work_dzeata5onzf7rp26j2quaotjza 228 43 the the DT work_dzeata5onzf7rp26j2quaotjza 228 44 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 228 45 and and CC work_dzeata5onzf7rp26j2quaotjza 228 46 is be VBZ work_dzeata5onzf7rp26j2quaotjza 228 47 motivated motivate VBN work_dzeata5onzf7rp26j2quaotjza 228 48 by by IN work_dzeata5onzf7rp26j2quaotjza 228 49 the the DT work_dzeata5onzf7rp26j2quaotjza 228 50 real real JJ work_dzeata5onzf7rp26j2quaotjza 228 51 world world NN work_dzeata5onzf7rp26j2quaotjza 228 52 applications application NNS work_dzeata5onzf7rp26j2quaotjza 228 53 of of IN work_dzeata5onzf7rp26j2quaotjza 228 54 each each DT work_dzeata5onzf7rp26j2quaotjza 228 55 technique technique NN work_dzeata5onzf7rp26j2quaotjza 228 56 in in IN work_dzeata5onzf7rp26j2quaotjza 228 57 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 228 58 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 228 59 . . . work_dzeata5onzf7rp26j2quaotjza 229 1 Each each DT work_dzeata5onzf7rp26j2quaotjza 229 2 claim claim NN work_dzeata5onzf7rp26j2quaotjza 229 3 type type NN work_dzeata5onzf7rp26j2quaotjza 229 4 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 229 5 security security NN work_dzeata5onzf7rp26j2quaotjza 229 6 , , , work_dzeata5onzf7rp26j2quaotjza 229 7 performance performance NN work_dzeata5onzf7rp26j2quaotjza 229 8 , , , work_dzeata5onzf7rp26j2quaotjza 229 9 and and CC work_dzeata5onzf7rp26j2quaotjza 229 10 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 229 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 229 12 , , , work_dzeata5onzf7rp26j2quaotjza 229 13 then then RB work_dzeata5onzf7rp26j2quaotjza 229 14 , , , work_dzeata5onzf7rp26j2quaotjza 229 15 was be VBD work_dzeata5onzf7rp26j2quaotjza 229 16 an an DT work_dzeata5onzf7rp26j2quaotjza 229 17 ordinal ordinal JJ work_dzeata5onzf7rp26j2quaotjza 229 18 random random JJ work_dzeata5onzf7rp26j2quaotjza 229 19 variable variable NN work_dzeata5onzf7rp26j2quaotjza 229 20 , , , work_dzeata5onzf7rp26j2quaotjza 229 21 so so RB work_dzeata5onzf7rp26j2quaotjza 229 22 rank rank NN work_dzeata5onzf7rp26j2quaotjza 229 23 - - HYPH work_dzeata5onzf7rp26j2quaotjza 229 24 based base VBN work_dzeata5onzf7rp26j2quaotjza 229 25 methods method NNS work_dzeata5onzf7rp26j2quaotjza 229 26 were be VBD work_dzeata5onzf7rp26j2quaotjza 229 27 appropriate appropriate JJ work_dzeata5onzf7rp26j2quaotjza 229 28 . . . work_dzeata5onzf7rp26j2quaotjza 230 1 When when WRB work_dzeata5onzf7rp26j2quaotjza 230 2 a a DT work_dzeata5onzf7rp26j2quaotjza 230 3 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 230 4 paper paper NN work_dzeata5onzf7rp26j2quaotjza 230 5 belonged belong VBD work_dzeata5onzf7rp26j2quaotjza 230 6 to to IN work_dzeata5onzf7rp26j2quaotjza 230 7 two two CD work_dzeata5onzf7rp26j2quaotjza 230 8 codes code NNS work_dzeata5onzf7rp26j2quaotjza 230 9 in in IN work_dzeata5onzf7rp26j2quaotjza 230 10 a a DT work_dzeata5onzf7rp26j2quaotjza 230 11 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 230 12 validation validation NN work_dzeata5onzf7rp26j2quaotjza 230 13 category category NN work_dzeata5onzf7rp26j2quaotjza 230 14 , , , work_dzeata5onzf7rp26j2quaotjza 230 15 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 230 16 used use VBD work_dzeata5onzf7rp26j2quaotjza 230 17 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 230 18 highest highest RBS work_dzeata5onzf7rp26j2quaotjza 230 19 - - HYPH work_dzeata5onzf7rp26j2quaotjza 230 20 ordered order VBN work_dzeata5onzf7rp26j2quaotjza 230 21 code code NN work_dzeata5onzf7rp26j2quaotjza 230 22 to to TO work_dzeata5onzf7rp26j2quaotjza 230 23 define define VB work_dzeata5onzf7rp26j2quaotjza 230 24 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 230 25 rank rank NN work_dzeata5onzf7rp26j2quaotjza 230 26 , , , work_dzeata5onzf7rp26j2quaotjza 230 27 and and CC work_dzeata5onzf7rp26j2quaotjza 230 28 lower lower RBR work_dzeata5onzf7rp26j2quaotjza 230 29 - - HYPH work_dzeata5onzf7rp26j2quaotjza 230 30 ordered order VBN work_dzeata5onzf7rp26j2quaotjza 230 31 codes code NNS work_dzeata5onzf7rp26j2quaotjza 230 32 to to TO work_dzeata5onzf7rp26j2quaotjza 230 33 break break VB work_dzeata5onzf7rp26j2quaotjza 230 34 ties tie NNS work_dzeata5onzf7rp26j2quaotjza 230 35 . . . work_dzeata5onzf7rp26j2quaotjza 231 1 So so RB work_dzeata5onzf7rp26j2quaotjza 231 2 , , , work_dzeata5onzf7rp26j2quaotjza 231 3 for for IN work_dzeata5onzf7rp26j2quaotjza 231 4 instance instance NN work_dzeata5onzf7rp26j2quaotjza 231 5 , , , work_dzeata5onzf7rp26j2quaotjza 231 6 if if IN work_dzeata5onzf7rp26j2quaotjza 231 7 paper paper NN work_dzeata5onzf7rp26j2quaotjza 231 8 A a NN work_dzeata5onzf7rp26j2quaotjza 231 9 and and CC work_dzeata5onzf7rp26j2quaotjza 231 10 paper paper NN work_dzeata5onzf7rp26j2quaotjza 231 11 B b NN work_dzeata5onzf7rp26j2quaotjza 231 12 both both DT work_dzeata5onzf7rp26j2quaotjza 231 13 included include VBD work_dzeata5onzf7rp26j2quaotjza 231 14 proofs proof NNS work_dzeata5onzf7rp26j2quaotjza 231 15 , , , work_dzeata5onzf7rp26j2quaotjza 231 16 and and CC work_dzeata5onzf7rp26j2quaotjza 231 17 paper paper NN work_dzeata5onzf7rp26j2quaotjza 231 18 A A NNP work_dzeata5onzf7rp26j2quaotjza 231 19 also also RB work_dzeata5onzf7rp26j2quaotjza 231 20 included include VBD work_dzeata5onzf7rp26j2quaotjza 231 21 benchmarks benchmark NNS work_dzeata5onzf7rp26j2quaotjza 231 22 , , , work_dzeata5onzf7rp26j2quaotjza 231 23 paper paper NN work_dzeata5onzf7rp26j2quaotjza 231 24 A a DT work_dzeata5onzf7rp26j2quaotjza 231 25 would would MD work_dzeata5onzf7rp26j2quaotjza 231 26 be be VB work_dzeata5onzf7rp26j2quaotjza 231 27 ranked rank VBN work_dzeata5onzf7rp26j2quaotjza 231 28 higher higher RBR work_dzeata5onzf7rp26j2quaotjza 231 29 than than IN work_dzeata5onzf7rp26j2quaotjza 231 30 paper paper NN work_dzeata5onzf7rp26j2quaotjza 231 31 B. B. NNP work_dzeata5onzf7rp26j2quaotjza 232 1 To to TO work_dzeata5onzf7rp26j2quaotjza 232 2 test test VB work_dzeata5onzf7rp26j2quaotjza 232 3 if if IN work_dzeata5onzf7rp26j2quaotjza 232 4 a a DT work_dzeata5onzf7rp26j2quaotjza 232 5 claim claim NN work_dzeata5onzf7rp26j2quaotjza 232 6 type type NN work_dzeata5onzf7rp26j2quaotjza 232 7 was be VBD work_dzeata5onzf7rp26j2quaotjza 232 8 improving improve VBG work_dzeata5onzf7rp26j2quaotjza 232 9 over over IN work_dzeata5onzf7rp26j2quaotjza 232 10 time time NN work_dzeata5onzf7rp26j2quaotjza 232 11 , , , work_dzeata5onzf7rp26j2quaotjza 232 12 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 232 13 estimated estimate VBD work_dzeata5onzf7rp26j2quaotjza 232 14 the the DT work_dzeata5onzf7rp26j2quaotjza 232 15 Spearman Spearman NNP work_dzeata5onzf7rp26j2quaotjza 232 16 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 232 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 232 18 Spearman Spearman NNP work_dzeata5onzf7rp26j2quaotjza 232 19 , , , work_dzeata5onzf7rp26j2quaotjza 232 20 1904 1904 CD work_dzeata5onzf7rp26j2quaotjza 232 21 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 232 22 between between IN work_dzeata5onzf7rp26j2quaotjza 232 23 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 232 24 codes code NNS work_dzeata5onzf7rp26j2quaotjza 232 25 and and CC work_dzeata5onzf7rp26j2quaotjza 232 26 the the DT work_dzeata5onzf7rp26j2quaotjza 232 27 year year NN work_dzeata5onzf7rp26j2quaotjza 232 28 of of IN work_dzeata5onzf7rp26j2quaotjza 232 29 publication publication NN work_dzeata5onzf7rp26j2quaotjza 232 30 , , , work_dzeata5onzf7rp26j2quaotjza 232 31 and and CC work_dzeata5onzf7rp26j2quaotjza 232 32 hence hence RB work_dzeata5onzf7rp26j2quaotjza 232 33 tested test VBN work_dzeata5onzf7rp26j2quaotjza 232 34 for for IN work_dzeata5onzf7rp26j2quaotjza 232 35 a a DT work_dzeata5onzf7rp26j2quaotjza 232 36 monotonic monotonic JJ work_dzeata5onzf7rp26j2quaotjza 232 37 trend trend NN work_dzeata5onzf7rp26j2quaotjza 232 38 . . . work_dzeata5onzf7rp26j2quaotjza 233 1 Testing testing NN work_dzeata5onzf7rp26j2quaotjza 233 2 if if IN work_dzeata5onzf7rp26j2quaotjza 233 3 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 233 4 with with IN work_dzeata5onzf7rp26j2quaotjza 233 5 better well JJR work_dzeata5onzf7rp26j2quaotjza 233 6 validation validation NN work_dzeata5onzf7rp26j2quaotjza 233 7 , , , work_dzeata5onzf7rp26j2quaotjza 233 8 in in IN work_dzeata5onzf7rp26j2quaotjza 233 9 a a DT work_dzeata5onzf7rp26j2quaotjza 233 10 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 233 11 category category NN work_dzeata5onzf7rp26j2quaotjza 233 12 , , , work_dzeata5onzf7rp26j2quaotjza 233 13 received receive VBD work_dzeata5onzf7rp26j2quaotjza 233 14 more more JJR work_dzeata5onzf7rp26j2quaotjza 233 15 citations citation NNS work_dzeata5onzf7rp26j2quaotjza 233 16 necessitated necessitate VBD work_dzeata5onzf7rp26j2quaotjza 233 17 accounting account VBG work_dzeata5onzf7rp26j2quaotjza 233 18 for for IN work_dzeata5onzf7rp26j2quaotjza 233 19 year year NN work_dzeata5onzf7rp26j2quaotjza 233 20 of of IN work_dzeata5onzf7rp26j2quaotjza 233 21 publication publication NN work_dzeata5onzf7rp26j2quaotjza 233 22 , , , work_dzeata5onzf7rp26j2quaotjza 233 23 since since IN work_dzeata5onzf7rp26j2quaotjza 233 24 earlier early JJR work_dzeata5onzf7rp26j2quaotjza 233 25 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 233 26 typically typically RB work_dzeata5onzf7rp26j2quaotjza 233 27 have have VBP work_dzeata5onzf7rp26j2quaotjza 233 28 higher high JJR work_dzeata5onzf7rp26j2quaotjza 233 29 citation citation NN work_dzeata5onzf7rp26j2quaotjza 233 30 counts count NNS work_dzeata5onzf7rp26j2quaotjza 233 31 . . . work_dzeata5onzf7rp26j2quaotjza 234 1 To to TO work_dzeata5onzf7rp26j2quaotjza 234 2 do do VB work_dzeata5onzf7rp26j2quaotjza 234 3 so so RB work_dzeata5onzf7rp26j2quaotjza 234 4 , , , work_dzeata5onzf7rp26j2quaotjza 234 5 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 234 6 regressed regress VBD work_dzeata5onzf7rp26j2quaotjza 234 7 paper paper NN work_dzeata5onzf7rp26j2quaotjza 234 8 citation citation NN work_dzeata5onzf7rp26j2quaotjza 234 9 rank rank NN work_dzeata5onzf7rp26j2quaotjza 234 10 against against IN work_dzeata5onzf7rp26j2quaotjza 234 11 both both DT work_dzeata5onzf7rp26j2quaotjza 234 12 publication publication NN work_dzeata5onzf7rp26j2quaotjza 234 13 year year NN work_dzeata5onzf7rp26j2quaotjza 234 14 and and CC work_dzeata5onzf7rp26j2quaotjza 234 15 category category NN work_dzeata5onzf7rp26j2quaotjza 234 16 rank rank NN work_dzeata5onzf7rp26j2quaotjza 234 17 . . . work_dzeata5onzf7rp26j2quaotjza 235 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 235 2 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 235 3 used use VBD work_dzeata5onzf7rp26j2quaotjza 235 4 the the DT work_dzeata5onzf7rp26j2quaotjza 235 5 rank rank NN work_dzeata5onzf7rp26j2quaotjza 235 6 of of IN work_dzeata5onzf7rp26j2quaotjza 235 7 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 235 8 ’ ’ POS work_dzeata5onzf7rp26j2quaotjza 235 9 citation citation NN work_dzeata5onzf7rp26j2quaotjza 235 10 counts count NNS work_dzeata5onzf7rp26j2quaotjza 235 11 as as IN work_dzeata5onzf7rp26j2quaotjza 235 12 the the DT work_dzeata5onzf7rp26j2quaotjza 235 13 dependent dependent JJ work_dzeata5onzf7rp26j2quaotjza 235 14 variable variable NN work_dzeata5onzf7rp26j2quaotjza 235 15 , , , work_dzeata5onzf7rp26j2quaotjza 235 16 as as IN work_dzeata5onzf7rp26j2quaotjza 235 17 opposed oppose VBN work_dzeata5onzf7rp26j2quaotjza 235 18 to to IN work_dzeata5onzf7rp26j2quaotjza 235 19 the the DT work_dzeata5onzf7rp26j2quaotjza 235 20 citation citation NN work_dzeata5onzf7rp26j2quaotjza 235 21 counts count VBZ work_dzeata5onzf7rp26j2quaotjza 235 22 themselves -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 235 23 , , , work_dzeata5onzf7rp26j2quaotjza 235 24 due due IN work_dzeata5onzf7rp26j2quaotjza 235 25 to to IN work_dzeata5onzf7rp26j2quaotjza 235 26 the the DT work_dzeata5onzf7rp26j2quaotjza 235 27 presence presence NN work_dzeata5onzf7rp26j2quaotjza 235 28 of of IN work_dzeata5onzf7rp26j2quaotjza 235 29 an an DT work_dzeata5onzf7rp26j2quaotjza 235 30 influential influential JJ work_dzeata5onzf7rp26j2quaotjza 235 31 outlier outlier NN work_dzeata5onzf7rp26j2quaotjza 235 32 — — : work_dzeata5onzf7rp26j2quaotjza 235 33 Terra Terra NNP work_dzeata5onzf7rp26j2quaotjza 235 34 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 235 35 Garfinkel Garfinkel NNP work_dzeata5onzf7rp26j2quaotjza 235 36 et et NNP work_dzeata5onzf7rp26j2quaotjza 235 37 al al NNP work_dzeata5onzf7rp26j2quaotjza 235 38 . . NNP work_dzeata5onzf7rp26j2quaotjza 235 39 , , , work_dzeata5onzf7rp26j2quaotjza 235 40 2003 2003 CD work_dzeata5onzf7rp26j2quaotjza 235 41 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 235 42 . . . work_dzeata5onzf7rp26j2quaotjza 236 1 Scatterplots scatterplot NNS work_dzeata5onzf7rp26j2quaotjza 236 2 show show VBP work_dzeata5onzf7rp26j2quaotjza 236 3 the the DT work_dzeata5onzf7rp26j2quaotjza 236 4 relationship relationship NN work_dzeata5onzf7rp26j2quaotjza 236 5 between between IN work_dzeata5onzf7rp26j2quaotjza 236 6 citation citation NN work_dzeata5onzf7rp26j2quaotjza 236 7 ranks rank NNS work_dzeata5onzf7rp26j2quaotjza 236 8 and and CC work_dzeata5onzf7rp26j2quaotjza 236 9 publication publication NN work_dzeata5onzf7rp26j2quaotjza 236 10 year year NN work_dzeata5onzf7rp26j2quaotjza 236 11 to to TO work_dzeata5onzf7rp26j2quaotjza 236 12 be be VB work_dzeata5onzf7rp26j2quaotjza 236 13 approximately approximately RB work_dzeata5onzf7rp26j2quaotjza 236 14 linear linear JJ work_dzeata5onzf7rp26j2quaotjza 236 15 , , , work_dzeata5onzf7rp26j2quaotjza 236 16 so so IN work_dzeata5onzf7rp26j2quaotjza 236 17 a a DT work_dzeata5onzf7rp26j2quaotjza 236 18 linear linear JJ work_dzeata5onzf7rp26j2quaotjza 236 19 adjustment adjustment NN work_dzeata5onzf7rp26j2quaotjza 236 20 should should MD work_dzeata5onzf7rp26j2quaotjza 236 21 suffice suffice VB work_dzeata5onzf7rp26j2quaotjza 236 22 . . . work_dzeata5onzf7rp26j2quaotjza 236 23 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 237 1 There there EX work_dzeata5onzf7rp26j2quaotjza 237 2 was be VBD work_dzeata5onzf7rp26j2quaotjza 237 3 a a DT work_dzeata5onzf7rp26j2quaotjza 237 4 “ " `` work_dzeata5onzf7rp26j2quaotjza 237 5 validation validation NN work_dzeata5onzf7rp26j2quaotjza 237 6 effect effect NN work_dzeata5onzf7rp26j2quaotjza 237 7 ” " '' work_dzeata5onzf7rp26j2quaotjza 237 8 if if IN work_dzeata5onzf7rp26j2quaotjza 237 9 the the DT work_dzeata5onzf7rp26j2quaotjza 237 10 coefficient coefficient NN work_dzeata5onzf7rp26j2quaotjza 237 11 on on IN work_dzeata5onzf7rp26j2quaotjza 237 12 the the DT work_dzeata5onzf7rp26j2quaotjza 237 13 validation validation NN work_dzeata5onzf7rp26j2quaotjza 237 14 measure measure NN work_dzeata5onzf7rp26j2quaotjza 237 15 was be VBD work_dzeata5onzf7rp26j2quaotjza 237 16 significantly significantly RB work_dzeata5onzf7rp26j2quaotjza 237 17 different different JJ work_dzeata5onzf7rp26j2quaotjza 237 18 from from IN work_dzeata5onzf7rp26j2quaotjza 237 19 zero zero CD work_dzeata5onzf7rp26j2quaotjza 237 20 . . . work_dzeata5onzf7rp26j2quaotjza 238 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 238 2 conducted conduct VBD work_dzeata5onzf7rp26j2quaotjza 238 3 four four CD work_dzeata5onzf7rp26j2quaotjza 238 4 separate separate JJ work_dzeata5onzf7rp26j2quaotjza 238 5 regression regression NN work_dzeata5onzf7rp26j2quaotjza 238 6 analyses analysis NNS work_dzeata5onzf7rp26j2quaotjza 238 7 : : : work_dzeata5onzf7rp26j2quaotjza 238 8 one one CD work_dzeata5onzf7rp26j2quaotjza 238 9 in in IN work_dzeata5onzf7rp26j2quaotjza 238 10 which which WDT work_dzeata5onzf7rp26j2quaotjza 238 11 citation citation NN work_dzeata5onzf7rp26j2quaotjza 238 12 ranks rank NNS work_dzeata5onzf7rp26j2quaotjza 238 13 were be VBD work_dzeata5onzf7rp26j2quaotjza 238 14 regressed regress VBN work_dzeata5onzf7rp26j2quaotjza 238 15 on on IN work_dzeata5onzf7rp26j2quaotjza 238 16 publication publication NN work_dzeata5onzf7rp26j2quaotjza 238 17 year year NN work_dzeata5onzf7rp26j2quaotjza 238 18 and and CC work_dzeata5onzf7rp26j2quaotjza 238 19 category category NN work_dzeata5onzf7rp26j2quaotjza 238 20 ranks rank NNS work_dzeata5onzf7rp26j2quaotjza 238 21 of of IN work_dzeata5onzf7rp26j2quaotjza 238 22 all all DT work_dzeata5onzf7rp26j2quaotjza 238 23 three three CD work_dzeata5onzf7rp26j2quaotjza 238 24 validation validation NN work_dzeata5onzf7rp26j2quaotjza 238 25 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 238 26 , , , work_dzeata5onzf7rp26j2quaotjza 238 27 and and CC work_dzeata5onzf7rp26j2quaotjza 238 28 one one CD work_dzeata5onzf7rp26j2quaotjza 238 29 in in IN work_dzeata5onzf7rp26j2quaotjza 238 30 which which WDT work_dzeata5onzf7rp26j2quaotjza 238 31 citation citation NN work_dzeata5onzf7rp26j2quaotjza 238 32 ranks rank NNS work_dzeata5onzf7rp26j2quaotjza 238 33 were be VBD work_dzeata5onzf7rp26j2quaotjza 238 34 regressed regress VBN work_dzeata5onzf7rp26j2quaotjza 238 35 on on IN work_dzeata5onzf7rp26j2quaotjza 238 36 publication publication NN work_dzeata5onzf7rp26j2quaotjza 238 37 year year NN work_dzeata5onzf7rp26j2quaotjza 238 38 and and CC work_dzeata5onzf7rp26j2quaotjza 238 39 security security NN work_dzeata5onzf7rp26j2quaotjza 238 40 validation validation NN work_dzeata5onzf7rp26j2quaotjza 238 41 only only RB work_dzeata5onzf7rp26j2quaotjza 238 42 , , , work_dzeata5onzf7rp26j2quaotjza 238 43 one one CD work_dzeata5onzf7rp26j2quaotjza 238 44 in in IN work_dzeata5onzf7rp26j2quaotjza 238 45 which which WDT work_dzeata5onzf7rp26j2quaotjza 238 46 citation citation NN work_dzeata5onzf7rp26j2quaotjza 238 47 ranks rank NNS work_dzeata5onzf7rp26j2quaotjza 238 48 were be VBD work_dzeata5onzf7rp26j2quaotjza 238 49 regressed regress VBN work_dzeata5onzf7rp26j2quaotjza 238 50 on on IN work_dzeata5onzf7rp26j2quaotjza 238 51 publication publication NN work_dzeata5onzf7rp26j2quaotjza 238 52 year year NN work_dzeata5onzf7rp26j2quaotjza 238 53 and and CC work_dzeata5onzf7rp26j2quaotjza 238 54 performance performance NN work_dzeata5onzf7rp26j2quaotjza 238 55 validation validation NN work_dzeata5onzf7rp26j2quaotjza 238 56 only only RB work_dzeata5onzf7rp26j2quaotjza 238 57 , , , work_dzeata5onzf7rp26j2quaotjza 238 58 and and CC work_dzeata5onzf7rp26j2quaotjza 238 59 one one CD work_dzeata5onzf7rp26j2quaotjza 238 60 in in IN work_dzeata5onzf7rp26j2quaotjza 238 61 which which WDT work_dzeata5onzf7rp26j2quaotjza 238 62 citation citation NN work_dzeata5onzf7rp26j2quaotjza 238 63 ranks rank NNS work_dzeata5onzf7rp26j2quaotjza 238 64 were be VBD work_dzeata5onzf7rp26j2quaotjza 238 65 regressed regress VBN work_dzeata5onzf7rp26j2quaotjza 238 66 on on IN work_dzeata5onzf7rp26j2quaotjza 238 67 publication publication NN work_dzeata5onzf7rp26j2quaotjza 238 68 year year NN work_dzeata5onzf7rp26j2quaotjza 238 69 and and CC work_dzeata5onzf7rp26j2quaotjza 238 70 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 238 71 validation validation NN work_dzeata5onzf7rp26j2quaotjza 238 72 only only RB work_dzeata5onzf7rp26j2quaotjza 238 73 . . . work_dzeata5onzf7rp26j2quaotjza 239 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 239 2 constructed construct VBD work_dzeata5onzf7rp26j2quaotjza 239 3 a a DT work_dzeata5onzf7rp26j2quaotjza 239 4 citation citation NN work_dzeata5onzf7rp26j2quaotjza 239 5 graph graph NN work_dzeata5onzf7rp26j2quaotjza 239 6 using use VBG work_dzeata5onzf7rp26j2quaotjza 239 7 the the DT work_dzeata5onzf7rp26j2quaotjza 239 8 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 239 9 in in IN work_dzeata5onzf7rp26j2quaotjza 239 10 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 239 11 set set NN work_dzeata5onzf7rp26j2quaotjza 239 12 as as IN work_dzeata5onzf7rp26j2quaotjza 239 13 nodes node NNS work_dzeata5onzf7rp26j2quaotjza 239 14 and and CC work_dzeata5onzf7rp26j2quaotjza 239 15 citations citation NNS work_dzeata5onzf7rp26j2quaotjza 239 16 as as IN work_dzeata5onzf7rp26j2quaotjza 239 17 edges edge NNS work_dzeata5onzf7rp26j2quaotjza 239 18 as as IN work_dzeata5onzf7rp26j2quaotjza 239 19 a a DT work_dzeata5onzf7rp26j2quaotjza 239 20 final final JJ work_dzeata5onzf7rp26j2quaotjza 239 21 means means NN work_dzeata5onzf7rp26j2quaotjza 239 22 of of IN work_dzeata5onzf7rp26j2quaotjza 239 23 better well JJR work_dzeata5onzf7rp26j2quaotjza 239 24 understanding understand VBG work_dzeata5onzf7rp26j2quaotjza 239 25 the the DT work_dzeata5onzf7rp26j2quaotjza 239 26 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 239 27 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 239 28 . . . work_dzeata5onzf7rp26j2quaotjza 240 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 240 2 clustered cluster VBD work_dzeata5onzf7rp26j2quaotjza 240 3 the the DT work_dzeata5onzf7rp26j2quaotjza 240 4 nodes node NNS work_dzeata5onzf7rp26j2quaotjza 240 5 in in IN work_dzeata5onzf7rp26j2quaotjza 240 6 this this DT work_dzeata5onzf7rp26j2quaotjza 240 7 graph graph NN work_dzeata5onzf7rp26j2quaotjza 240 8 using use VBG work_dzeata5onzf7rp26j2quaotjza 240 9 the the DT work_dzeata5onzf7rp26j2quaotjza 240 10 same same JJ work_dzeata5onzf7rp26j2quaotjza 240 11 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 240 12 found find VBD work_dzeata5onzf7rp26j2quaotjza 240 13 statistically statistically RB work_dzeata5onzf7rp26j2quaotjza 240 14 , , , work_dzeata5onzf7rp26j2quaotjza 240 15 using use VBG work_dzeata5onzf7rp26j2quaotjza 240 16 the the DT work_dzeata5onzf7rp26j2quaotjza 240 17 process process NN work_dzeata5onzf7rp26j2quaotjza 240 18 describe describe VB work_dzeata5onzf7rp26j2quaotjza 240 19 above above RB work_dzeata5onzf7rp26j2quaotjza 240 20 , , , work_dzeata5onzf7rp26j2quaotjza 240 21 and and CC work_dzeata5onzf7rp26j2quaotjza 240 22 using use VBG work_dzeata5onzf7rp26j2quaotjza 240 23 common common JJ work_dzeata5onzf7rp26j2quaotjza 240 24 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 240 25 of of IN work_dzeata5onzf7rp26j2quaotjza 240 26 interest interest NN work_dzeata5onzf7rp26j2quaotjza 240 27 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 240 28 observed observe VBD work_dzeata5onzf7rp26j2quaotjza 240 29 . . . work_dzeata5onzf7rp26j2quaotjza 241 1 The the DT work_dzeata5onzf7rp26j2quaotjza 241 2 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 241 3 of of IN work_dzeata5onzf7rp26j2quaotjza 241 4 interest interest NN work_dzeata5onzf7rp26j2quaotjza 241 5 are be VBP work_dzeata5onzf7rp26j2quaotjza 241 6 typically typically RB work_dzeata5onzf7rp26j2quaotjza 241 7 based base VBN work_dzeata5onzf7rp26j2quaotjza 241 8 on on IN work_dzeata5onzf7rp26j2quaotjza 241 9 the the DT work_dzeata5onzf7rp26j2quaotjza 241 10 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 241 11 the the DT work_dzeata5onzf7rp26j2quaotjza 241 12 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 241 13 apply apply VBP work_dzeata5onzf7rp26j2quaotjza 241 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 241 15 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 241 16 , , , work_dzeata5onzf7rp26j2quaotjza 241 17 Control Control NNP work_dzeata5onzf7rp26j2quaotjza 241 18 Flow Flow NNP work_dzeata5onzf7rp26j2quaotjza 241 19 Integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 241 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 241 21 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 241 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 241 23 , , , work_dzeata5onzf7rp26j2quaotjza 241 24 artificial artificial JJ work_dzeata5onzf7rp26j2quaotjza 241 25 diversity diversity NN work_dzeata5onzf7rp26j2quaotjza 241 26 , , , work_dzeata5onzf7rp26j2quaotjza 241 27 etc etc FW work_dzeata5onzf7rp26j2quaotjza 241 28 . . . work_dzeata5onzf7rp26j2quaotjza 241 29 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 241 30 . . . work_dzeata5onzf7rp26j2quaotjza 242 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 242 2 evaluate evaluate VBP work_dzeata5onzf7rp26j2quaotjza 242 3 these these DT work_dzeata5onzf7rp26j2quaotjza 242 4 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 242 5 using use VBG work_dzeata5onzf7rp26j2quaotjza 242 6 the the DT work_dzeata5onzf7rp26j2quaotjza 242 7 modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 242 8 metric metric NN work_dzeata5onzf7rp26j2quaotjza 242 9 , , , work_dzeata5onzf7rp26j2quaotjza 242 10 which which WDT work_dzeata5onzf7rp26j2quaotjza 242 11 enables enable VBZ work_dzeata5onzf7rp26j2quaotjza 242 12 us -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 242 13 to to TO work_dzeata5onzf7rp26j2quaotjza 242 14 compare compare VB work_dzeata5onzf7rp26j2quaotjza 242 15 the the DT work_dzeata5onzf7rp26j2quaotjza 242 16 quality quality NN work_dzeata5onzf7rp26j2quaotjza 242 17 of of IN work_dzeata5onzf7rp26j2quaotjza 242 18 the the DT work_dzeata5onzf7rp26j2quaotjza 242 19 different different JJ work_dzeata5onzf7rp26j2quaotjza 242 20 categorizations categorization NNS work_dzeata5onzf7rp26j2quaotjza 242 21 . . . work_dzeata5onzf7rp26j2quaotjza 243 1 Modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 243 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 243 3 the the DT work_dzeata5onzf7rp26j2quaotjza 243 4 fraction fraction NN work_dzeata5onzf7rp26j2quaotjza 243 5 of of IN work_dzeata5onzf7rp26j2quaotjza 243 6 edges edge NNS work_dzeata5onzf7rp26j2quaotjza 243 7 that that WDT work_dzeata5onzf7rp26j2quaotjza 243 8 lie lie VBP work_dzeata5onzf7rp26j2quaotjza 243 9 within within IN work_dzeata5onzf7rp26j2quaotjza 243 10 a a DT work_dzeata5onzf7rp26j2quaotjza 243 11 partition partition NN work_dzeata5onzf7rp26j2quaotjza 243 12 , , , work_dzeata5onzf7rp26j2quaotjza 243 13 above above IN work_dzeata5onzf7rp26j2quaotjza 243 14 the the DT work_dzeata5onzf7rp26j2quaotjza 243 15 number number NN work_dzeata5onzf7rp26j2quaotjza 243 16 that that WDT work_dzeata5onzf7rp26j2quaotjza 243 17 would would MD work_dzeata5onzf7rp26j2quaotjza 243 18 be be VB work_dzeata5onzf7rp26j2quaotjza 243 19 expected expect VBN work_dzeata5onzf7rp26j2quaotjza 243 20 if if IN work_dzeata5onzf7rp26j2quaotjza 243 21 edges edge NNS work_dzeata5onzf7rp26j2quaotjza 243 22 were be VBD work_dzeata5onzf7rp26j2quaotjza 243 23 distributed distribute VBN work_dzeata5onzf7rp26j2quaotjza 243 24 randomly randomly RB work_dzeata5onzf7rp26j2quaotjza 243 25 . . . work_dzeata5onzf7rp26j2quaotjza 244 1 RESULTS RESULTS NNP work_dzeata5onzf7rp26j2quaotjza 244 2 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 244 3 derived derive VBD work_dzeata5onzf7rp26j2quaotjza 244 4 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 244 5 results result NNS work_dzeata5onzf7rp26j2quaotjza 244 6 from from IN work_dzeata5onzf7rp26j2quaotjza 244 7 the the DT work_dzeata5onzf7rp26j2quaotjza 244 8 various various JJ work_dzeata5onzf7rp26j2quaotjza 244 9 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 244 10 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 244 11 of of IN work_dzeata5onzf7rp26j2quaotjza 244 12 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 244 13 summary summary NN work_dzeata5onzf7rp26j2quaotjza 244 14 of of IN work_dzeata5onzf7rp26j2quaotjza 244 15 coded code VBN work_dzeata5onzf7rp26j2quaotjza 244 16 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 244 17 , , , work_dzeata5onzf7rp26j2quaotjza 244 18 trends trend NNS work_dzeata5onzf7rp26j2quaotjza 244 19 explicit explicit JJ work_dzeata5onzf7rp26j2quaotjza 244 20 in in IN work_dzeata5onzf7rp26j2quaotjza 244 21 this this DT work_dzeata5onzf7rp26j2quaotjza 244 22 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 244 23 , , , work_dzeata5onzf7rp26j2quaotjza 244 24 and and CC work_dzeata5onzf7rp26j2quaotjza 244 25 observations observation NNS work_dzeata5onzf7rp26j2quaotjza 244 26 made make VBN work_dzeata5onzf7rp26j2quaotjza 244 27 while while IN work_dzeata5onzf7rp26j2quaotjza 244 28 reading read VBG work_dzeata5onzf7rp26j2quaotjza 244 29 the the DT work_dzeata5onzf7rp26j2quaotjza 244 30 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 244 31 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 244 32 et et NNP work_dzeata5onzf7rp26j2quaotjza 244 33 al al NNP work_dzeata5onzf7rp26j2quaotjza 244 34 . . . work_dzeata5onzf7rp26j2quaotjza 245 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 245 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 245 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 245 4 , , , work_dzeata5onzf7rp26j2quaotjza 245 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 245 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 245 7 . . . work_dzeata5onzf7rp26j2quaotjza 246 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 246 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 246 3 , , , work_dzeata5onzf7rp26j2quaotjza 246 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 246 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 246 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 246 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 246 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 246 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 246 10 11/36 11/36 CD work_dzeata5onzf7rp26j2quaotjza 246 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NN work_dzeata5onzf7rp26j2quaotjza 246 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NN work_dzeata5onzf7rp26j2quaotjza 246 13 or or CC work_dzeata5onzf7rp26j2quaotjza 246 14 analyzing analyze VBG work_dzeata5onzf7rp26j2quaotjza 246 15 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 246 16 summarized summarize VBN work_dzeata5onzf7rp26j2quaotjza 246 17 data datum NNS work_dzeata5onzf7rp26j2quaotjza 246 18 . . . work_dzeata5onzf7rp26j2quaotjza 247 1 As as IN work_dzeata5onzf7rp26j2quaotjza 247 2 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 247 3 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 247 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 247 5 public public JJ work_dzeata5onzf7rp26j2quaotjza 247 6 , , , work_dzeata5onzf7rp26j2quaotjza 247 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 247 8 encourage encourage VBP work_dzeata5onzf7rp26j2quaotjza 247 9 readers reader NNS work_dzeata5onzf7rp26j2quaotjza 247 10 to to TO work_dzeata5onzf7rp26j2quaotjza 247 11 explore explore VB work_dzeata5onzf7rp26j2quaotjza 247 12 the the DT work_dzeata5onzf7rp26j2quaotjza 247 13 data datum NNS work_dzeata5onzf7rp26j2quaotjza 247 14 themselves -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 247 15 . . . work_dzeata5onzf7rp26j2quaotjza 248 1 Note note VB work_dzeata5onzf7rp26j2quaotjza 248 2 while while IN work_dzeata5onzf7rp26j2quaotjza 248 3 interpreting interpret VBG work_dzeata5onzf7rp26j2quaotjza 248 4 the the DT work_dzeata5onzf7rp26j2quaotjza 248 5 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 248 6 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 248 7 that that IN work_dzeata5onzf7rp26j2quaotjza 248 8 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 248 9 are be VBP work_dzeata5onzf7rp26j2quaotjza 248 10 not not RB work_dzeata5onzf7rp26j2quaotjza 248 11 representative representative JJ work_dzeata5onzf7rp26j2quaotjza 248 12 of of IN work_dzeata5onzf7rp26j2quaotjza 248 13 how how WRB work_dzeata5onzf7rp26j2quaotjza 248 14 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 248 15 are be VBP work_dzeata5onzf7rp26j2quaotjza 248 16 related relate VBN work_dzeata5onzf7rp26j2quaotjza 248 17 in in IN work_dzeata5onzf7rp26j2quaotjza 248 18 terms term NNS work_dzeata5onzf7rp26j2quaotjza 248 19 of of IN work_dzeata5onzf7rp26j2quaotjza 248 20 broad broad JJ work_dzeata5onzf7rp26j2quaotjza 248 21 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 248 22 of of IN work_dzeata5onzf7rp26j2quaotjza 248 23 interest interest NN work_dzeata5onzf7rp26j2quaotjza 248 24 . . . work_dzeata5onzf7rp26j2quaotjza 249 1 When when WRB work_dzeata5onzf7rp26j2quaotjza 249 2 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 249 3 applied apply VBD work_dzeata5onzf7rp26j2quaotjza 249 4 the the DT work_dzeata5onzf7rp26j2quaotjza 249 5 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 249 6 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 249 7 to to IN work_dzeata5onzf7rp26j2quaotjza 249 8 the the DT work_dzeata5onzf7rp26j2quaotjza 249 9 citation citation NN work_dzeata5onzf7rp26j2quaotjza 249 10 graph graph NN work_dzeata5onzf7rp26j2quaotjza 249 11 of of IN work_dzeata5onzf7rp26j2quaotjza 249 12 the the DT work_dzeata5onzf7rp26j2quaotjza 249 13 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 249 14 in in IN work_dzeata5onzf7rp26j2quaotjza 249 15 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 249 16 set set NN work_dzeata5onzf7rp26j2quaotjza 249 17 the the DT work_dzeata5onzf7rp26j2quaotjza 249 18 modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 249 19 scores score NNS work_dzeata5onzf7rp26j2quaotjza 249 20 were be VBD work_dzeata5onzf7rp26j2quaotjza 249 21 −0.04 −0.04 NNP work_dzeata5onzf7rp26j2quaotjza 249 22 and and CC work_dzeata5onzf7rp26j2quaotjza 249 23 0.02 0.02 CD work_dzeata5onzf7rp26j2quaotjza 249 24 when when WRB work_dzeata5onzf7rp26j2quaotjza 249 25 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 249 26 were be VBD work_dzeata5onzf7rp26j2quaotjza 249 27 clustered cluster VBN work_dzeata5onzf7rp26j2quaotjza 249 28 based base VBN work_dzeata5onzf7rp26j2quaotjza 249 29 on on IN work_dzeata5onzf7rp26j2quaotjza 249 30 all all DT work_dzeata5onzf7rp26j2quaotjza 249 31 of of IN work_dzeata5onzf7rp26j2quaotjza 249 32 the the DT work_dzeata5onzf7rp26j2quaotjza 249 33 attributes attribute NNS work_dzeata5onzf7rp26j2quaotjza 249 34 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 249 35 coded code VBD work_dzeata5onzf7rp26j2quaotjza 249 36 and and CC work_dzeata5onzf7rp26j2quaotjza 249 37 just just RB work_dzeata5onzf7rp26j2quaotjza 249 38 validation validation NN work_dzeata5onzf7rp26j2quaotjza 249 39 attributes attribute VBZ work_dzeata5onzf7rp26j2quaotjza 249 40 respectively respectively RB work_dzeata5onzf7rp26j2quaotjza 249 41 . . . work_dzeata5onzf7rp26j2quaotjza 250 1 These these DT work_dzeata5onzf7rp26j2quaotjza 250 2 modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 250 3 scores score NNS work_dzeata5onzf7rp26j2quaotjza 250 4 mean mean VBP work_dzeata5onzf7rp26j2quaotjza 250 5 that that IN work_dzeata5onzf7rp26j2quaotjza 250 6 the the DT work_dzeata5onzf7rp26j2quaotjza 250 7 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 250 8 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 250 9 are be VBP work_dzeata5onzf7rp26j2quaotjza 250 10 no no RB work_dzeata5onzf7rp26j2quaotjza 250 11 better well JJR work_dzeata5onzf7rp26j2quaotjza 250 12 than than IN work_dzeata5onzf7rp26j2quaotjza 250 13 randomly randomly RB work_dzeata5onzf7rp26j2quaotjza 250 14 clustering cluster VBG work_dzeata5onzf7rp26j2quaotjza 250 15 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 250 16 when when WRB work_dzeata5onzf7rp26j2quaotjza 250 17 considering consider VBG work_dzeata5onzf7rp26j2quaotjza 250 18 how how WRB work_dzeata5onzf7rp26j2quaotjza 250 19 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 250 20 cite cite VBP work_dzeata5onzf7rp26j2quaotjza 250 21 each each DT work_dzeata5onzf7rp26j2quaotjza 250 22 other other JJ work_dzeata5onzf7rp26j2quaotjza 250 23 . . . work_dzeata5onzf7rp26j2quaotjza 251 1 These these DT work_dzeata5onzf7rp26j2quaotjza 251 2 poor poor JJ work_dzeata5onzf7rp26j2quaotjza 251 3 modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 251 4 scores score NNS work_dzeata5onzf7rp26j2quaotjza 251 5 make make VBP work_dzeata5onzf7rp26j2quaotjza 251 6 sense sense NN work_dzeata5onzf7rp26j2quaotjza 251 7 because because IN work_dzeata5onzf7rp26j2quaotjza 251 8 authors author NNS work_dzeata5onzf7rp26j2quaotjza 251 9 are be VBP work_dzeata5onzf7rp26j2quaotjza 251 10 much much RB work_dzeata5onzf7rp26j2quaotjza 251 11 more more RBR work_dzeata5onzf7rp26j2quaotjza 251 12 likely likely JJ work_dzeata5onzf7rp26j2quaotjza 251 13 to to TO work_dzeata5onzf7rp26j2quaotjza 251 14 cite cite VB work_dzeata5onzf7rp26j2quaotjza 251 15 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 251 16 that that WDT work_dzeata5onzf7rp26j2quaotjza 251 17 use use VBP work_dzeata5onzf7rp26j2quaotjza 251 18 similar similar JJ work_dzeata5onzf7rp26j2quaotjza 251 19 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 251 20 or or CC work_dzeata5onzf7rp26j2quaotjza 251 21 tackle tackle VB work_dzeata5onzf7rp26j2quaotjza 251 22 similar similar JJ work_dzeata5onzf7rp26j2quaotjza 251 23 problems problem NNS work_dzeata5onzf7rp26j2quaotjza 251 24 than than IN work_dzeata5onzf7rp26j2quaotjza 251 25 use use VB work_dzeata5onzf7rp26j2quaotjza 251 26 similar similar JJ work_dzeata5onzf7rp26j2quaotjza 251 27 validation validation NN work_dzeata5onzf7rp26j2quaotjza 251 28 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 251 29 . . . work_dzeata5onzf7rp26j2quaotjza 252 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 252 2 confirmed confirm VBD work_dzeata5onzf7rp26j2quaotjza 252 3 the the DT work_dzeata5onzf7rp26j2quaotjza 252 4 latter latter JJ work_dzeata5onzf7rp26j2quaotjza 252 5 observation observation NN work_dzeata5onzf7rp26j2quaotjza 252 6 by by IN work_dzeata5onzf7rp26j2quaotjza 252 7 computing compute VBG work_dzeata5onzf7rp26j2quaotjza 252 8 that that IN work_dzeata5onzf7rp26j2quaotjza 252 9 the the DT work_dzeata5onzf7rp26j2quaotjza 252 10 modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 252 11 for for IN work_dzeata5onzf7rp26j2quaotjza 252 12 overlapping overlap VBG work_dzeata5onzf7rp26j2quaotjza 252 13 groups group NNS work_dzeata5onzf7rp26j2quaotjza 252 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 252 15 Lázár Lázár NNP work_dzeata5onzf7rp26j2quaotjza 252 16 , , , work_dzeata5onzf7rp26j2quaotjza 252 17 Ábel Ábel NNP work_dzeata5onzf7rp26j2quaotjza 252 18 & & CC work_dzeata5onzf7rp26j2quaotjza 252 19 Vicsek Vicsek NNP work_dzeata5onzf7rp26j2quaotjza 252 20 , , , work_dzeata5onzf7rp26j2quaotjza 252 21 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 252 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 252 23 based base VBN work_dzeata5onzf7rp26j2quaotjza 252 24 on on IN work_dzeata5onzf7rp26j2quaotjza 252 25 validation validation NN work_dzeata5onzf7rp26j2quaotjza 252 26 is be VBZ work_dzeata5onzf7rp26j2quaotjza 252 27 −0.198 −0.198 NNP work_dzeata5onzf7rp26j2quaotjza 252 28 , , , work_dzeata5onzf7rp26j2quaotjza 252 29 which which WDT work_dzeata5onzf7rp26j2quaotjza 252 30 confirms confirm VBZ work_dzeata5onzf7rp26j2quaotjza 252 31 that that IN work_dzeata5onzf7rp26j2quaotjza 252 32 partitions partition NNS work_dzeata5onzf7rp26j2quaotjza 252 33 built build VBN work_dzeata5onzf7rp26j2quaotjza 252 34 from from IN work_dzeata5onzf7rp26j2quaotjza 252 35 the the DT work_dzeata5onzf7rp26j2quaotjza 252 36 validation validation NN work_dzeata5onzf7rp26j2quaotjza 252 37 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 252 38 do do VBP work_dzeata5onzf7rp26j2quaotjza 252 39 not not RB work_dzeata5onzf7rp26j2quaotjza 252 40 direct direct VB work_dzeata5onzf7rp26j2quaotjza 252 41 citation citation NN work_dzeata5onzf7rp26j2quaotjza 252 42 graph graph NN work_dzeata5onzf7rp26j2quaotjza 252 43 structure structure NN work_dzeata5onzf7rp26j2quaotjza 252 44 . . . work_dzeata5onzf7rp26j2quaotjza 253 1 Indeed indeed RB work_dzeata5onzf7rp26j2quaotjza 253 2 , , , work_dzeata5onzf7rp26j2quaotjza 253 3 when when WRB work_dzeata5onzf7rp26j2quaotjza 253 4 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 253 5 clustered cluster VBD work_dzeata5onzf7rp26j2quaotjza 253 6 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 253 7 in in IN work_dzeata5onzf7rp26j2quaotjza 253 8 the the DT work_dzeata5onzf7rp26j2quaotjza 253 9 citation citation NNP work_dzeata5onzf7rp26j2quaotjza 253 10 graph graph NN work_dzeata5onzf7rp26j2quaotjza 253 11 based base VBN work_dzeata5onzf7rp26j2quaotjza 253 12 on on IN work_dzeata5onzf7rp26j2quaotjza 253 13 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 253 14 of of IN work_dzeata5onzf7rp26j2quaotjza 253 15 inter- inter- NN work_dzeata5onzf7rp26j2quaotjza 253 16 est est VBD work_dzeata5onzf7rp26j2quaotjza 253 17 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 253 18 observed observe VBD work_dzeata5onzf7rp26j2quaotjza 253 19 while while IN work_dzeata5onzf7rp26j2quaotjza 253 20 interpreting interpret VBG work_dzeata5onzf7rp26j2quaotjza 253 21 the the DT work_dzeata5onzf7rp26j2quaotjza 253 22 set set NN work_dzeata5onzf7rp26j2quaotjza 253 23 , , , work_dzeata5onzf7rp26j2quaotjza 253 24 the the DT work_dzeata5onzf7rp26j2quaotjza 253 25 modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 253 26 score score NN work_dzeata5onzf7rp26j2quaotjza 253 27 , , , work_dzeata5onzf7rp26j2quaotjza 253 28 0.33 0.33 CD work_dzeata5onzf7rp26j2quaotjza 253 29 , , , work_dzeata5onzf7rp26j2quaotjza 253 30 is be VBZ work_dzeata5onzf7rp26j2quaotjza 253 31 significantly significantly RB work_dzeata5onzf7rp26j2quaotjza 253 32 better well JJR work_dzeata5onzf7rp26j2quaotjza 253 33 than than IN work_dzeata5onzf7rp26j2quaotjza 253 34 a a DT work_dzeata5onzf7rp26j2quaotjza 253 35 random random JJ work_dzeata5onzf7rp26j2quaotjza 253 36 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 253 37 . . . work_dzeata5onzf7rp26j2quaotjza 254 1 The the DT work_dzeata5onzf7rp26j2quaotjza 254 2 citation citation NN work_dzeata5onzf7rp26j2quaotjza 254 3 graph graph NN work_dzeata5onzf7rp26j2quaotjza 254 4 with with IN work_dzeata5onzf7rp26j2quaotjza 254 5 topic topic NN work_dzeata5onzf7rp26j2quaotjza 254 6 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 254 7 is be VBZ work_dzeata5onzf7rp26j2quaotjza 254 8 shown show VBN work_dzeata5onzf7rp26j2quaotjza 254 9 in in IN work_dzeata5onzf7rp26j2quaotjza 254 10 Fig Fig NNP work_dzeata5onzf7rp26j2quaotjza 254 11 . . . work_dzeata5onzf7rp26j2quaotjza 255 1 2 2 LS work_dzeata5onzf7rp26j2quaotjza 255 2 . . . work_dzeata5onzf7rp26j2quaotjza 256 1 While while IN work_dzeata5onzf7rp26j2quaotjza 256 2 these these DT work_dzeata5onzf7rp26j2quaotjza 256 3 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 256 4 are be VBP work_dzeata5onzf7rp26j2quaotjza 256 5 potentially potentially RB work_dzeata5onzf7rp26j2quaotjza 256 6 of of IN work_dzeata5onzf7rp26j2quaotjza 256 7 sociotechnical sociotechnical JJ work_dzeata5onzf7rp26j2quaotjza 256 8 interest interest NN work_dzeata5onzf7rp26j2quaotjza 256 9 to to IN work_dzeata5onzf7rp26j2quaotjza 256 10 the the DT work_dzeata5onzf7rp26j2quaotjza 256 11 community community NN work_dzeata5onzf7rp26j2quaotjza 256 12 , , , work_dzeata5onzf7rp26j2quaotjza 256 13 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 256 14 must must MD work_dzeata5onzf7rp26j2quaotjza 256 15 look look VB work_dzeata5onzf7rp26j2quaotjza 256 16 at at IN work_dzeata5onzf7rp26j2quaotjza 256 17 lower low JJR work_dzeata5onzf7rp26j2quaotjza 256 18 - - HYPH work_dzeata5onzf7rp26j2quaotjza 256 19 level level NN work_dzeata5onzf7rp26j2quaotjza 256 20 attributes attribute NNS work_dzeata5onzf7rp26j2quaotjza 256 21 to to TO work_dzeata5onzf7rp26j2quaotjza 256 22 understand understand VB work_dzeata5onzf7rp26j2quaotjza 256 23 how how WRB work_dzeata5onzf7rp26j2quaotjza 256 24 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 256 25 are be VBP work_dzeata5onzf7rp26j2quaotjza 256 26 to to TO work_dzeata5onzf7rp26j2quaotjza 256 27 be be VB work_dzeata5onzf7rp26j2quaotjza 256 28 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 256 29 in in IN work_dzeata5onzf7rp26j2quaotjza 256 30 practice practice NN work_dzeata5onzf7rp26j2quaotjza 256 31 and and CC work_dzeata5onzf7rp26j2quaotjza 256 32 how how WRB work_dzeata5onzf7rp26j2quaotjza 256 33 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 256 34 improve improve VBP work_dzeata5onzf7rp26j2quaotjza 256 35 the the DT work_dzeata5onzf7rp26j2quaotjza 256 36 security security NN work_dzeata5onzf7rp26j2quaotjza 256 37 posture posture NN work_dzeata5onzf7rp26j2quaotjza 256 38 of of IN work_dzeata5onzf7rp26j2quaotjza 256 39 real real JJ work_dzeata5onzf7rp26j2quaotjza 256 40 systems system NNS work_dzeata5onzf7rp26j2quaotjza 256 41 . . . work_dzeata5onzf7rp26j2quaotjza 257 1 The the DT work_dzeata5onzf7rp26j2quaotjza 257 2 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 257 3 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 257 4 fill fill VBP work_dzeata5onzf7rp26j2quaotjza 257 5 that that DT work_dzeata5onzf7rp26j2quaotjza 257 6 role role NN work_dzeata5onzf7rp26j2quaotjza 257 7 . . . work_dzeata5onzf7rp26j2quaotjza 258 1 Figures figure NNS work_dzeata5onzf7rp26j2quaotjza 258 2 3 3 CD work_dzeata5onzf7rp26j2quaotjza 258 3 and and CC work_dzeata5onzf7rp26j2quaotjza 258 4 4 4 CD work_dzeata5onzf7rp26j2quaotjza 258 5 show show VBP work_dzeata5onzf7rp26j2quaotjza 258 6 the the DT work_dzeata5onzf7rp26j2quaotjza 258 7 codes code NNS work_dzeata5onzf7rp26j2quaotjza 258 8 that that WDT work_dzeata5onzf7rp26j2quaotjza 258 9 are be VBP work_dzeata5onzf7rp26j2quaotjza 258 10 members member NNS work_dzeata5onzf7rp26j2quaotjza 258 11 of of IN work_dzeata5onzf7rp26j2quaotjza 258 12 the the DT work_dzeata5onzf7rp26j2quaotjza 258 13 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 258 14 policy policy NN work_dzeata5onzf7rp26j2quaotjza 258 15 and and CC work_dzeata5onzf7rp26j2quaotjza 258 16 user user NN work_dzeata5onzf7rp26j2quaotjza 258 17 - - HYPH work_dzeata5onzf7rp26j2quaotjza 258 18 defined define VBN work_dzeata5onzf7rp26j2quaotjza 258 19 policy policy NN work_dzeata5onzf7rp26j2quaotjza 258 20 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 258 21 respectively respectively RB work_dzeata5onzf7rp26j2quaotjza 258 22 when when WRB work_dzeata5onzf7rp26j2quaotjza 258 23 all all DT work_dzeata5onzf7rp26j2quaotjza 258 24 categories category NNS work_dzeata5onzf7rp26j2quaotjza 258 25 are be VBP work_dzeata5onzf7rp26j2quaotjza 258 26 considered consider VBN work_dzeata5onzf7rp26j2quaotjza 258 27 . . . work_dzeata5onzf7rp26j2quaotjza 259 1 The the DT work_dzeata5onzf7rp26j2quaotjza 259 2 dendrogram dendrogram NN work_dzeata5onzf7rp26j2quaotjza 259 3 for for IN work_dzeata5onzf7rp26j2quaotjza 259 4 these these DT work_dzeata5onzf7rp26j2quaotjza 259 5 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 259 6 appears appear VBZ work_dzeata5onzf7rp26j2quaotjza 259 7 in in IN work_dzeata5onzf7rp26j2quaotjza 259 8 Fig Fig NNP work_dzeata5onzf7rp26j2quaotjza 259 9 . . . work_dzeata5onzf7rp26j2quaotjza 260 1 5 5 CD work_dzeata5onzf7rp26j2quaotjza 260 2 . . . work_dzeata5onzf7rp26j2quaotjza 261 1 Many many JJ work_dzeata5onzf7rp26j2quaotjza 261 2 of of IN work_dzeata5onzf7rp26j2quaotjza 261 3 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 261 4 results result NNS work_dzeata5onzf7rp26j2quaotjza 261 5 are be VBP work_dzeata5onzf7rp26j2quaotjza 261 6 interpretations interpretation NNS work_dzeata5onzf7rp26j2quaotjza 261 7 of of IN work_dzeata5onzf7rp26j2quaotjza 261 8 these these DT work_dzeata5onzf7rp26j2quaotjza 261 9 charts chart NNS work_dzeata5onzf7rp26j2quaotjza 261 10 . . . work_dzeata5onzf7rp26j2quaotjza 262 1 Table table NN work_dzeata5onzf7rp26j2quaotjza 262 2 4 4 CD work_dzeata5onzf7rp26j2quaotjza 262 3 succinctly succinctly RB work_dzeata5onzf7rp26j2quaotjza 262 4 describes describe VBZ work_dzeata5onzf7rp26j2quaotjza 262 5 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 262 6 results result NNS work_dzeata5onzf7rp26j2quaotjza 262 7 per per IN work_dzeata5onzf7rp26j2quaotjza 262 8 research research NN work_dzeata5onzf7rp26j2quaotjza 262 9 question question NN work_dzeata5onzf7rp26j2quaotjza 262 10 and and CC work_dzeata5onzf7rp26j2quaotjza 262 11 references reference NNS work_dzeata5onzf7rp26j2quaotjza 262 12 later later JJ work_dzeata5onzf7rp26j2quaotjza 262 13 sections section NNS work_dzeata5onzf7rp26j2quaotjza 262 14 where where WRB work_dzeata5onzf7rp26j2quaotjza 262 15 more more JJR work_dzeata5onzf7rp26j2quaotjza 262 16 details detail NNS work_dzeata5onzf7rp26j2quaotjza 262 17 are be VBP work_dzeata5onzf7rp26j2quaotjza 262 18 found find VBN work_dzeata5onzf7rp26j2quaotjza 262 19 . . . work_dzeata5onzf7rp26j2quaotjza 263 1 The the DT work_dzeata5onzf7rp26j2quaotjza 263 2 remainder remainder NN work_dzeata5onzf7rp26j2quaotjza 263 3 of of IN work_dzeata5onzf7rp26j2quaotjza 263 4 this this DT work_dzeata5onzf7rp26j2quaotjza 263 5 section section NN work_dzeata5onzf7rp26j2quaotjza 263 6 presents present VBZ work_dzeata5onzf7rp26j2quaotjza 263 7 those those DT work_dzeata5onzf7rp26j2quaotjza 263 8 details detail NNS work_dzeata5onzf7rp26j2quaotjza 263 9 . . . work_dzeata5onzf7rp26j2quaotjza 264 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 264 2 : : : work_dzeata5onzf7rp26j2quaotjza 264 3 building building NN work_dzeata5onzf7rp26j2quaotjza 264 4 materials material NNS work_dzeata5onzf7rp26j2quaotjza 264 5 for for IN work_dzeata5onzf7rp26j2quaotjza 264 6 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 264 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 264 8 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 264 9 are be VBP work_dzeata5onzf7rp26j2quaotjza 264 10 flexible flexible JJ work_dzeata5onzf7rp26j2quaotjza 264 11 security security NN work_dzeata5onzf7rp26j2quaotjza 264 12 layers layer NNS work_dzeata5onzf7rp26j2quaotjza 264 13 ready ready JJ work_dzeata5onzf7rp26j2quaotjza 264 14 to to TO work_dzeata5onzf7rp26j2quaotjza 264 15 improve improve VB work_dzeata5onzf7rp26j2quaotjza 264 16 the the DT work_dzeata5onzf7rp26j2quaotjza 264 17 security security NN work_dzeata5onzf7rp26j2quaotjza 264 18 posture posture NN work_dzeata5onzf7rp26j2quaotjza 264 19 of of IN work_dzeata5onzf7rp26j2quaotjza 264 20 nearly nearly RB work_dzeata5onzf7rp26j2quaotjza 264 21 any any DT work_dzeata5onzf7rp26j2quaotjza 264 22 type type NN work_dzeata5onzf7rp26j2quaotjza 264 23 of of IN work_dzeata5onzf7rp26j2quaotjza 264 24 application application NN work_dzeata5onzf7rp26j2quaotjza 264 25 . . . work_dzeata5onzf7rp26j2quaotjza 265 1 While while IN work_dzeata5onzf7rp26j2quaotjza 265 2 the the DT work_dzeata5onzf7rp26j2quaotjza 265 3 deployment deployment NN work_dzeata5onzf7rp26j2quaotjza 265 4 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 265 5 and and CC work_dzeata5onzf7rp26j2quaotjza 265 6 details detail NNS work_dzeata5onzf7rp26j2quaotjza 265 7 vary vary VBP work_dzeata5onzf7rp26j2quaotjza 265 8 from from IN work_dzeata5onzf7rp26j2quaotjza 265 9 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 265 10 to to IN work_dzeata5onzf7rp26j2quaotjza 265 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 265 12 , , , work_dzeata5onzf7rp26j2quaotjza 265 13 collectively collectively RB work_dzeata5onzf7rp26j2quaotjza 265 14 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 265 15 can can MD work_dzeata5onzf7rp26j2quaotjza 265 16 be be VB work_dzeata5onzf7rp26j2quaotjza 265 17 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 265 18 at at IN work_dzeata5onzf7rp26j2quaotjza 265 19 many many JJ work_dzeata5onzf7rp26j2quaotjza 265 20 different different JJ work_dzeata5onzf7rp26j2quaotjza 265 21 points point NNS work_dzeata5onzf7rp26j2quaotjza 265 22 in in IN work_dzeata5onzf7rp26j2quaotjza 265 23 a a DT work_dzeata5onzf7rp26j2quaotjza 265 24 system system NN work_dzeata5onzf7rp26j2quaotjza 265 25 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 265 26 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 265 27 and and CC work_dzeata5onzf7rp26j2quaotjza 265 28 may may MD work_dzeata5onzf7rp26j2quaotjza 265 29 be be VB work_dzeata5onzf7rp26j2quaotjza 265 30 introduced introduce VBN work_dzeata5onzf7rp26j2quaotjza 265 31 at at IN work_dzeata5onzf7rp26j2quaotjza 265 32 any any DT work_dzeata5onzf7rp26j2quaotjza 265 33 phase phase NN work_dzeata5onzf7rp26j2quaotjza 265 34 in in IN work_dzeata5onzf7rp26j2quaotjza 265 35 an an DT work_dzeata5onzf7rp26j2quaotjza 265 36 application application NN work_dzeata5onzf7rp26j2quaotjza 265 37 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 265 38 development development NN work_dzeata5onzf7rp26j2quaotjza 265 39 lifecycle lifecycle NN work_dzeata5onzf7rp26j2quaotjza 265 40 , , , work_dzeata5onzf7rp26j2quaotjza 265 41 starting start VBG work_dzeata5onzf7rp26j2quaotjza 265 42 with with IN work_dzeata5onzf7rp26j2quaotjza 265 43 the the DT work_dzeata5onzf7rp26j2quaotjza 265 44 initial initial JJ work_dzeata5onzf7rp26j2quaotjza 265 45 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 265 46 . . . work_dzeata5onzf7rp26j2quaotjza 266 1 In in IN work_dzeata5onzf7rp26j2quaotjza 266 2 fact fact NN work_dzeata5onzf7rp26j2quaotjza 266 3 , , , work_dzeata5onzf7rp26j2quaotjza 266 4 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 266 5 can can MD work_dzeata5onzf7rp26j2quaotjza 266 6 even even RB work_dzeata5onzf7rp26j2quaotjza 266 7 be be VB work_dzeata5onzf7rp26j2quaotjza 266 8 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 266 9 well well RB work_dzeata5onzf7rp26j2quaotjza 266 10 after after IN work_dzeata5onzf7rp26j2quaotjza 266 11 an an DT work_dzeata5onzf7rp26j2quaotjza 266 12 application application NN work_dzeata5onzf7rp26j2quaotjza 266 13 has have VBZ work_dzeata5onzf7rp26j2quaotjza 266 14 been be VBN work_dzeata5onzf7rp26j2quaotjza 266 15 abandoned abandon VBN work_dzeata5onzf7rp26j2quaotjza 266 16 by by IN work_dzeata5onzf7rp26j2quaotjza 266 17 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 266 18 maintainer maintainer NN work_dzeata5onzf7rp26j2quaotjza 266 19 to to TO work_dzeata5onzf7rp26j2quaotjza 266 20 secure secure VB work_dzeata5onzf7rp26j2quaotjza 266 21 legacy legacy NN work_dzeata5onzf7rp26j2quaotjza 266 22 systems system NNS work_dzeata5onzf7rp26j2quaotjza 266 23 . . . work_dzeata5onzf7rp26j2quaotjza 267 1 In in IN work_dzeata5onzf7rp26j2quaotjza 267 2 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 267 3 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 267 4 , , , work_dzeata5onzf7rp26j2quaotjza 267 5 the the DT work_dzeata5onzf7rp26j2quaotjza 267 6 policy policy NN work_dzeata5onzf7rp26j2quaotjza 267 7 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 267 8 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 267 9 for for IN work_dzeata5onzf7rp26j2quaotjza 267 10 a a DT work_dzeata5onzf7rp26j2quaotjza 267 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 267 12 is be VBZ work_dzeata5onzf7rp26j2quaotjza 267 13 always always RB work_dzeata5onzf7rp26j2quaotjza 267 14 deployed deploy VBN work_dzeata5onzf7rp26j2quaotjza 267 15 as as IN work_dzeata5onzf7rp26j2quaotjza 267 16 a a DT work_dzeata5onzf7rp26j2quaotjza 267 17 system system NN work_dzeata5onzf7rp26j2quaotjza 267 18 component component NN work_dzeata5onzf7rp26j2quaotjza 267 19 , , , work_dzeata5onzf7rp26j2quaotjza 267 20 as as IN work_dzeata5onzf7rp26j2quaotjza 267 21 a a DT work_dzeata5onzf7rp26j2quaotjza 267 22 component component NN work_dzeata5onzf7rp26j2quaotjza 267 23 of of IN work_dzeata5onzf7rp26j2quaotjza 267 24 an an DT work_dzeata5onzf7rp26j2quaotjza 267 25 application application NN work_dzeata5onzf7rp26j2quaotjza 267 26 host host NN work_dzeata5onzf7rp26j2quaotjza 267 27 , , , work_dzeata5onzf7rp26j2quaotjza 267 28 or or CC work_dzeata5onzf7rp26j2quaotjza 267 29 by by IN work_dzeata5onzf7rp26j2quaotjza 267 30 insertion insertion NN work_dzeata5onzf7rp26j2quaotjza 267 31 directly directly RB work_dzeata5onzf7rp26j2quaotjza 267 32 into into IN work_dzeata5onzf7rp26j2quaotjza 267 33 the the DT work_dzeata5onzf7rp26j2quaotjza 267 34 component component NN work_dzeata5onzf7rp26j2quaotjza 267 35 that that WDT work_dzeata5onzf7rp26j2quaotjza 267 36 is be VBZ work_dzeata5onzf7rp26j2quaotjza 267 37 being be VBG work_dzeata5onzf7rp26j2quaotjza 267 38 encapsulated encapsulate VBN work_dzeata5onzf7rp26j2quaotjza 267 39 . . . work_dzeata5onzf7rp26j2quaotjza 268 1 While while IN work_dzeata5onzf7rp26j2quaotjza 268 2 application application NN work_dzeata5onzf7rp26j2quaotjza 268 3 hosts host NNS work_dzeata5onzf7rp26j2quaotjza 268 4 are be VBP work_dzeata5onzf7rp26j2quaotjza 268 5 becoming become VBG work_dzeata5onzf7rp26j2quaotjza 268 6 more more RBR work_dzeata5onzf7rp26j2quaotjza 268 7 popular popular JJ work_dzeata5onzf7rp26j2quaotjza 268 8 as as IN work_dzeata5onzf7rp26j2quaotjza 268 9 many many JJ work_dzeata5onzf7rp26j2quaotjza 268 10 applications application NNS work_dzeata5onzf7rp26j2quaotjza 268 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 268 12 moved move VBN work_dzeata5onzf7rp26j2quaotjza 268 13 into into IN work_dzeata5onzf7rp26j2quaotjza 268 14 web web NN work_dzeata5onzf7rp26j2quaotjza 268 15 browsers browser NNS work_dzeata5onzf7rp26j2quaotjza 268 16 and and CC work_dzeata5onzf7rp26j2quaotjza 268 17 mobile mobile JJ work_dzeata5onzf7rp26j2quaotjza 268 18 environments environment NNS work_dzeata5onzf7rp26j2quaotjza 268 19 , , , work_dzeata5onzf7rp26j2quaotjza 268 20 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 268 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 268 22 currently currently RB work_dzeata5onzf7rp26j2quaotjza 268 23 the the DT work_dzeata5onzf7rp26j2quaotjza 268 24 least least JJS work_dzeata5onzf7rp26j2quaotjza 268 25 popular popular JJ work_dzeata5onzf7rp26j2quaotjza 268 26 place place NN work_dzeata5onzf7rp26j2quaotjza 268 27 to to TO work_dzeata5onzf7rp26j2quaotjza 268 28 deploy deploy VB work_dzeata5onzf7rp26j2quaotjza 268 29 policy policy NN work_dzeata5onzf7rp26j2quaotjza 268 30 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 268 31 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 268 32 for for IN work_dzeata5onzf7rp26j2quaotjza 268 33 research research NN work_dzeata5onzf7rp26j2quaotjza 268 34 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 268 35 . . . work_dzeata5onzf7rp26j2quaotjza 269 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 269 2 set set NN work_dzeata5onzf7rp26j2quaotjza 269 3 includes include VBZ work_dzeata5onzf7rp26j2quaotjza 269 4 ten ten CD work_dzeata5onzf7rp26j2quaotjza 269 5 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 269 6 where where WRB work_dzeata5onzf7rp26j2quaotjza 269 7 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 269 8 are be VBP work_dzeata5onzf7rp26j2quaotjza 269 9 enforced enforce VBN work_dzeata5onzf7rp26j2quaotjza 269 10 in in IN work_dzeata5onzf7rp26j2quaotjza 269 11 the the DT work_dzeata5onzf7rp26j2quaotjza 269 12 application application NN work_dzeata5onzf7rp26j2quaotjza 269 13 host host NN work_dzeata5onzf7rp26j2quaotjza 269 14 , , , work_dzeata5onzf7rp26j2quaotjza 269 15 twenty twenty CD work_dzeata5onzf7rp26j2quaotjza 269 16 - - HYPH work_dzeata5onzf7rp26j2quaotjza 269 17 six six CD work_dzeata5onzf7rp26j2quaotjza 269 18 in in IN work_dzeata5onzf7rp26j2quaotjza 269 19 the the DT work_dzeata5onzf7rp26j2quaotjza 269 20 component component NN work_dzeata5onzf7rp26j2quaotjza 269 21 being be VBG work_dzeata5onzf7rp26j2quaotjza 269 22 encapsulated,8 encapsulated,8 CD work_dzeata5onzf7rp26j2quaotjza 269 23 and and CC work_dzeata5onzf7rp26j2quaotjza 269 24 thirty thirty CD work_dzeata5onzf7rp26j2quaotjza 269 25 - - HYPH work_dzeata5onzf7rp26j2quaotjza 269 26 two two CD work_dzeata5onzf7rp26j2quaotjza 269 27 in in IN work_dzeata5onzf7rp26j2quaotjza 269 28 a a DT work_dzeata5onzf7rp26j2quaotjza 269 29 8 8 CD work_dzeata5onzf7rp26j2quaotjza 269 30 Sehr Sehr NNP work_dzeata5onzf7rp26j2quaotjza 269 31 et et NN work_dzeata5onzf7rp26j2quaotjza 269 32 al al NNP work_dzeata5onzf7rp26j2quaotjza 269 33 . . . work_dzeata5onzf7rp26j2quaotjza 270 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 270 2 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 270 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 270 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 270 5 counted count VBN work_dzeata5onzf7rp26j2quaotjza 270 6 twice twice RB work_dzeata5onzf7rp26j2quaotjza 270 7 because because IN work_dzeata5onzf7rp26j2quaotjza 270 8 the the DT work_dzeata5onzf7rp26j2quaotjza 270 9 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 270 10 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 270 11 is be VBZ work_dzeata5onzf7rp26j2quaotjza 270 12 spread spread VBN work_dzeata5onzf7rp26j2quaotjza 270 13 across across IN work_dzeata5onzf7rp26j2quaotjza 270 14 the the DT work_dzeata5onzf7rp26j2quaotjza 270 15 application application NN work_dzeata5onzf7rp26j2quaotjza 270 16 and and CC work_dzeata5onzf7rp26j2quaotjza 270 17 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 270 18 host host NN work_dzeata5onzf7rp26j2quaotjza 270 19 . . . work_dzeata5onzf7rp26j2quaotjza 271 1 system system NN work_dzeata5onzf7rp26j2quaotjza 271 2 component component NN work_dzeata5onzf7rp26j2quaotjza 271 3 . . . work_dzeata5onzf7rp26j2quaotjza 272 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 272 2 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 272 3 that that IN work_dzeata5onzf7rp26j2quaotjza 272 4 application application NN work_dzeata5onzf7rp26j2quaotjza 272 5 hosts host NNS work_dzeata5onzf7rp26j2quaotjza 272 6 are be VBP work_dzeata5onzf7rp26j2quaotjza 272 7 less less RBR work_dzeata5onzf7rp26j2quaotjza 272 8 represented represented JJ work_dzeata5onzf7rp26j2quaotjza 272 9 because because IN work_dzeata5onzf7rp26j2quaotjza 272 10 many many JJ work_dzeata5onzf7rp26j2quaotjza 272 11 existing existing JJ work_dzeata5onzf7rp26j2quaotjza 272 12 hosts host NNS work_dzeata5onzf7rp26j2quaotjza 272 13 come come VBP work_dzeata5onzf7rp26j2quaotjza 272 14 with with IN work_dzeata5onzf7rp26j2quaotjza 272 15 a a DT work_dzeata5onzf7rp26j2quaotjza 272 16 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 272 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 272 18 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 272 19 , , , work_dzeata5onzf7rp26j2quaotjza 272 20 the the DT work_dzeata5onzf7rp26j2quaotjza 272 21 Java Java NNP work_dzeata5onzf7rp26j2quaotjza 272 22 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 272 23 , , , work_dzeata5onzf7rp26j2quaotjza 272 24 Android Android NNP work_dzeata5onzf7rp26j2quaotjza 272 25 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 272 26 application application NN work_dzeata5onzf7rp26j2quaotjza 272 27 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 272 28 , , , work_dzeata5onzf7rp26j2quaotjza 272 29 NaCl NaCl NNP work_dzeata5onzf7rp26j2quaotjza 272 30 in in IN work_dzeata5onzf7rp26j2quaotjza 272 31 Google Google NNP work_dzeata5onzf7rp26j2quaotjza 272 32 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 272 33 et et NNP work_dzeata5onzf7rp26j2quaotjza 272 34 al al NNP work_dzeata5onzf7rp26j2quaotjza 272 35 . . . work_dzeata5onzf7rp26j2quaotjza 273 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 273 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 273 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 273 4 , , , work_dzeata5onzf7rp26j2quaotjza 273 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 273 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 273 7 . . . work_dzeata5onzf7rp26j2quaotjza 274 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 274 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 274 3 , , , work_dzeata5onzf7rp26j2quaotjza 274 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 274 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 274 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 274 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 274 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 274 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 274 10 12/36 12/36 CD work_dzeata5onzf7rp26j2quaotjza 274 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 274 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 274 13 Table table NN work_dzeata5onzf7rp26j2quaotjza 274 14 4 4 CD work_dzeata5onzf7rp26j2quaotjza 274 15 Summary Summary NNP work_dzeata5onzf7rp26j2quaotjza 274 16 of of IN work_dzeata5onzf7rp26j2quaotjza 274 17 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 274 18 research research NN work_dzeata5onzf7rp26j2quaotjza 274 19 questions question NNS work_dzeata5onzf7rp26j2quaotjza 274 20 and and CC work_dzeata5onzf7rp26j2quaotjza 274 21 results result NNS work_dzeata5onzf7rp26j2quaotjza 274 22 . . . work_dzeata5onzf7rp26j2quaotjza 275 1 Research research NN work_dzeata5onzf7rp26j2quaotjza 275 2 question question NN work_dzeata5onzf7rp26j2quaotjza 275 3 Results result NNS work_dzeata5onzf7rp26j2quaotjza 275 4 Section Section NNP work_dzeata5onzf7rp26j2quaotjza 275 5 Where where WRB work_dzeata5onzf7rp26j2quaotjza 275 6 in in IN work_dzeata5onzf7rp26j2quaotjza 275 7 a a DT work_dzeata5onzf7rp26j2quaotjza 275 8 system system NN work_dzeata5onzf7rp26j2quaotjza 275 9 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 275 10 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 275 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 275 12 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 275 13 enforced enforce VBN work_dzeata5onzf7rp26j2quaotjza 275 14 ? ? . work_dzeata5onzf7rp26j2quaotjza 276 1 There there EX work_dzeata5onzf7rp26j2quaotjza 276 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 276 3 an an DT work_dzeata5onzf7rp26j2quaotjza 276 4 emphasis emphasis NN work_dzeata5onzf7rp26j2quaotjza 276 5 on on IN work_dzeata5onzf7rp26j2quaotjza 276 6 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 276 7 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 276 8 in in IN work_dzeata5onzf7rp26j2quaotjza 276 9 the the DT work_dzeata5onzf7rp26j2quaotjza 276 10 operating operating NN work_dzeata5onzf7rp26j2quaotjza 276 11 system system NN work_dzeata5onzf7rp26j2quaotjza 276 12 or or CC work_dzeata5onzf7rp26j2quaotjza 276 13 transforming transforming NN work_dzeata5onzf7rp26j2quaotjza 276 14 applications application NNS work_dzeata5onzf7rp26j2quaotjza 276 15 to to TO work_dzeata5onzf7rp26j2quaotjza 276 16 enforce enforce VB work_dzeata5onzf7rp26j2quaotjza 276 17 a a DT work_dzeata5onzf7rp26j2quaotjza 276 18 policy policy NN work_dzeata5onzf7rp26j2quaotjza 276 19 over over IN work_dzeata5onzf7rp26j2quaotjza 276 20 using use VBG work_dzeata5onzf7rp26j2quaotjza 276 21 application application NN work_dzeata5onzf7rp26j2quaotjza 276 22 hosts host NNS work_dzeata5onzf7rp26j2quaotjza 276 23 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 276 24 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 276 25 , , , work_dzeata5onzf7rp26j2quaotjza 276 26 language language NN work_dzeata5onzf7rp26j2quaotjza 276 27 - - HYPH work_dzeata5onzf7rp26j2quaotjza 276 28 hosting host VBG work_dzeata5onzf7rp26j2quaotjza 276 29 virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 276 30 machines machine NNS work_dzeata5onzf7rp26j2quaotjza 276 31 , , , work_dzeata5onzf7rp26j2quaotjza 276 32 browsers browser NNS work_dzeata5onzf7rp26j2quaotjza 276 33 , , , work_dzeata5onzf7rp26j2quaotjza 276 34 etc etc FW work_dzeata5onzf7rp26j2quaotjza 276 35 . . . work_dzeata5onzf7rp26j2quaotjza 276 36 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 276 37 . . . work_dzeata5onzf7rp26j2quaotjza 277 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 277 2 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 277 3 : : : work_dzeata5onzf7rp26j2quaotjza 277 4 building building NN work_dzeata5onzf7rp26j2quaotjza 277 5 materials material NNS work_dzeata5onzf7rp26j2quaotjza 277 6 for for IN work_dzeata5onzf7rp26j2quaotjza 277 7 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 277 8 systems system NNS work_dzeata5onzf7rp26j2quaotjza 277 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 277 10 When when WRB work_dzeata5onzf7rp26j2quaotjza 277 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 277 12 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 277 13 imposed impose VBN work_dzeata5onzf7rp26j2quaotjza 277 14 ? ? . work_dzeata5onzf7rp26j2quaotjza 278 1 Static static JJ work_dzeata5onzf7rp26j2quaotjza 278 2 , , , work_dzeata5onzf7rp26j2quaotjza 278 3 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 278 4 , , , work_dzeata5onzf7rp26j2quaotjza 278 5 and and CC work_dzeata5onzf7rp26j2quaotjza 278 6 hybrid hybrid JJ work_dzeata5onzf7rp26j2quaotjza 278 7 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 278 8 are be VBP work_dzeata5onzf7rp26j2quaotjza 278 9 roughly roughly RB work_dzeata5onzf7rp26j2quaotjza 278 10 equally equally RB work_dzeata5onzf7rp26j2quaotjza 278 11 favored favor VBN work_dzeata5onzf7rp26j2quaotjza 278 12 in in IN work_dzeata5onzf7rp26j2quaotjza 278 13 all all DT work_dzeata5onzf7rp26j2quaotjza 278 14 domains domain NNS work_dzeata5onzf7rp26j2quaotjza 278 15 but but CC work_dzeata5onzf7rp26j2quaotjza 278 16 with with IN work_dzeata5onzf7rp26j2quaotjza 278 17 a a DT work_dzeata5onzf7rp26j2quaotjza 278 18 slight slight JJ work_dzeata5onzf7rp26j2quaotjza 278 19 preference preference NN work_dzeata5onzf7rp26j2quaotjza 278 20 for for IN work_dzeata5onzf7rp26j2quaotjza 278 21 strictly strictly RB work_dzeata5onzf7rp26j2quaotjza 278 22 static static JJ work_dzeata5onzf7rp26j2quaotjza 278 23 or or CC work_dzeata5onzf7rp26j2quaotjza 278 24 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 278 25 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 278 26 . . . work_dzeata5onzf7rp26j2quaotjza 279 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 279 2 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 279 3 : : : work_dzeata5onzf7rp26j2quaotjza 279 4 building building NN work_dzeata5onzf7rp26j2quaotjza 279 5 materials material NNS work_dzeata5onzf7rp26j2quaotjza 279 6 for for IN work_dzeata5onzf7rp26j2quaotjza 279 7 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 279 8 systems system NNS work_dzeata5onzf7rp26j2quaotjza 279 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 279 10 What what WDT work_dzeata5onzf7rp26j2quaotjza 279 11 application application NN work_dzeata5onzf7rp26j2quaotjza 279 12 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 279 13 are be VBP work_dzeata5onzf7rp26j2quaotjza 279 14 protected protect VBN work_dzeata5onzf7rp26j2quaotjza 279 15 by by IN work_dzeata5onzf7rp26j2quaotjza 279 16 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 279 17 ? ? . work_dzeata5onzf7rp26j2quaotjza 280 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 280 2 with with IN work_dzeata5onzf7rp26j2quaotjza 280 3 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 280 4 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 280 5 tend tend VBP work_dzeata5onzf7rp26j2quaotjza 280 6 to to TO work_dzeata5onzf7rp26j2quaotjza 280 7 prevent prevent VB work_dzeata5onzf7rp26j2quaotjza 280 8 memory memory NN work_dzeata5onzf7rp26j2quaotjza 280 9 corrup- corrup- XX work_dzeata5onzf7rp26j2quaotjza 280 10 tion tion NN work_dzeata5onzf7rp26j2quaotjza 280 11 or or CC work_dzeata5onzf7rp26j2quaotjza 280 12 protect protect VB work_dzeata5onzf7rp26j2quaotjza 280 13 properties property NNS work_dzeata5onzf7rp26j2quaotjza 280 14 of of IN work_dzeata5onzf7rp26j2quaotjza 280 15 application application NN work_dzeata5onzf7rp26j2quaotjza 280 16 code code NN work_dzeata5onzf7rp26j2quaotjza 280 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 280 18 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 280 19 , , , work_dzeata5onzf7rp26j2quaotjza 280 20 control control NN work_dzeata5onzf7rp26j2quaotjza 280 21 flow flow NN work_dzeata5onzf7rp26j2quaotjza 280 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 280 23 . . . work_dzeata5onzf7rp26j2quaotjza 281 1 User user NN work_dzeata5onzf7rp26j2quaotjza 281 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 281 3 defined define VBN work_dzeata5onzf7rp26j2quaotjza 281 4 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 281 5 are be VBP work_dzeata5onzf7rp26j2quaotjza 281 6 correlated correlate VBN work_dzeata5onzf7rp26j2quaotjza 281 7 with with IN work_dzeata5onzf7rp26j2quaotjza 281 8 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 281 9 that that WDT work_dzeata5onzf7rp26j2quaotjza 281 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 281 11 more more RBR work_dzeata5onzf7rp26j2quaotjza 281 12 diverse diverse JJ work_dzeata5onzf7rp26j2quaotjza 281 13 and and CC work_dzeata5onzf7rp26j2quaotjza 281 14 cover cover VB work_dzeata5onzf7rp26j2quaotjza 281 15 the the DT work_dzeata5onzf7rp26j2quaotjza 281 16 gamut gamut NN work_dzeata5onzf7rp26j2quaotjza 281 17 of of IN work_dzeata5onzf7rp26j2quaotjza 281 18 application application NN work_dzeata5onzf7rp26j2quaotjza 281 19 - - HYPH work_dzeata5onzf7rp26j2quaotjza 281 20 managed manage VBN work_dzeata5onzf7rp26j2quaotjza 281 21 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 281 22 . . . work_dzeata5onzf7rp26j2quaotjza 282 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 282 2 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 282 3 : : : work_dzeata5onzf7rp26j2quaotjza 282 4 building building NN work_dzeata5onzf7rp26j2quaotjza 282 5 materials material NNS work_dzeata5onzf7rp26j2quaotjza 282 6 for for IN work_dzeata5onzf7rp26j2quaotjza 282 7 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 282 8 systems system NNS work_dzeata5onzf7rp26j2quaotjza 282 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 282 10 What what WDT work_dzeata5onzf7rp26j2quaotjza 282 11 types type NNS work_dzeata5onzf7rp26j2quaotjza 282 12 of of IN work_dzeata5onzf7rp26j2quaotjza 282 13 components component NNS work_dzeata5onzf7rp26j2quaotjza 282 14 are be VBP work_dzeata5onzf7rp26j2quaotjza 282 15 protected protect VBN work_dzeata5onzf7rp26j2quaotjza 282 16 by by IN work_dzeata5onzf7rp26j2quaotjza 282 17 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 282 18 ? ? . work_dzeata5onzf7rp26j2quaotjza 283 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 283 2 that that WDT work_dzeata5onzf7rp26j2quaotjza 283 3 use use VBP work_dzeata5onzf7rp26j2quaotjza 283 4 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 283 5 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 283 6 tend tend VBP work_dzeata5onzf7rp26j2quaotjza 283 7 to to TO work_dzeata5onzf7rp26j2quaotjza 283 8 require require VB work_dzeata5onzf7rp26j2quaotjza 283 9 the the DT work_dzeata5onzf7rp26j2quaotjza 283 10 user user NN work_dzeata5onzf7rp26j2quaotjza 283 11 to to TO work_dzeata5onzf7rp26j2quaotjza 283 12 target target VB work_dzeata5onzf7rp26j2quaotjza 283 13 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 283 14 components component NNS work_dzeata5onzf7rp26j2quaotjza 283 15 , , , work_dzeata5onzf7rp26j2quaotjza 283 16 while while IN work_dzeata5onzf7rp26j2quaotjza 283 17 those those DT work_dzeata5onzf7rp26j2quaotjza 283 18 with with IN work_dzeata5onzf7rp26j2quaotjza 283 19 user user NN work_dzeata5onzf7rp26j2quaotjza 283 20 - - HYPH work_dzeata5onzf7rp26j2quaotjza 283 21 defined define VBN work_dzeata5onzf7rp26j2quaotjza 283 22 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 283 23 tend tend VBP work_dzeata5onzf7rp26j2quaotjza 283 24 to to TO work_dzeata5onzf7rp26j2quaotjza 283 25 allow allow VB work_dzeata5onzf7rp26j2quaotjza 283 26 for for IN work_dzeata5onzf7rp26j2quaotjza 283 27 broader broad JJR work_dzeata5onzf7rp26j2quaotjza 283 28 targeting targeting NN work_dzeata5onzf7rp26j2quaotjza 283 29 . . . work_dzeata5onzf7rp26j2quaotjza 284 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 284 2 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 284 3 : : : work_dzeata5onzf7rp26j2quaotjza 284 4 building building NN work_dzeata5onzf7rp26j2quaotjza 284 5 materials material NNS work_dzeata5onzf7rp26j2quaotjza 284 6 for for IN work_dzeata5onzf7rp26j2quaotjza 284 7 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 284 8 systems system NNS work_dzeata5onzf7rp26j2quaotjza 284 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 284 10 At at IN work_dzeata5onzf7rp26j2quaotjza 284 11 what what WDT work_dzeata5onzf7rp26j2quaotjza 284 12 point point NN work_dzeata5onzf7rp26j2quaotjza 284 13 in in IN work_dzeata5onzf7rp26j2quaotjza 284 14 the the DT work_dzeata5onzf7rp26j2quaotjza 284 15 process process NN work_dzeata5onzf7rp26j2quaotjza 284 16 of of IN work_dzeata5onzf7rp26j2quaotjza 284 17 an an DT work_dzeata5onzf7rp26j2quaotjza 284 18 attack attack NN work_dzeata5onzf7rp26j2quaotjza 284 19 will will MD work_dzeata5onzf7rp26j2quaotjza 284 20 an an DT work_dzeata5onzf7rp26j2quaotjza 284 21 exploit exploit NN work_dzeata5onzf7rp26j2quaotjza 284 22 violate violate NN work_dzeata5onzf7rp26j2quaotjza 284 23 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 284 24 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 284 25 ? ? . work_dzeata5onzf7rp26j2quaotjza 285 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 285 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 285 3 primarily primarily RB work_dzeata5onzf7rp26j2quaotjza 285 4 pro pro JJ work_dzeata5onzf7rp26j2quaotjza 285 5 - - JJ work_dzeata5onzf7rp26j2quaotjza 285 6 active active JJ work_dzeata5onzf7rp26j2quaotjza 285 7 by by IN work_dzeata5onzf7rp26j2quaotjza 285 8 disrupting disrupt VBG work_dzeata5onzf7rp26j2quaotjza 285 9 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 285 10 before before IN work_dzeata5onzf7rp26j2quaotjza 285 11 a a DT work_dzeata5onzf7rp26j2quaotjza 285 12 payload payload NN work_dzeata5onzf7rp26j2quaotjza 285 13 can can MD work_dzeata5onzf7rp26j2quaotjza 285 14 be be VB work_dzeata5onzf7rp26j2quaotjza 285 15 executed execute VBN work_dzeata5onzf7rp26j2quaotjza 285 16 . . . work_dzeata5onzf7rp26j2quaotjza 286 1 Where where WRB work_dzeata5onzf7rp26j2quaotjza 286 2 users user NNS work_dzeata5onzf7rp26j2quaotjza 286 3 must must MD work_dzeata5onzf7rp26j2quaotjza 286 4 define define VB work_dzeata5onzf7rp26j2quaotjza 286 5 a a DT work_dzeata5onzf7rp26j2quaotjza 286 6 policy policy NN work_dzeata5onzf7rp26j2quaotjza 286 7 , , , work_dzeata5onzf7rp26j2quaotjza 286 8 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 286 9 tend tend VBP work_dzeata5onzf7rp26j2quaotjza 286 10 to to TO work_dzeata5onzf7rp26j2quaotjza 286 11 be be VB work_dzeata5onzf7rp26j2quaotjza 286 12 pro pro JJ work_dzeata5onzf7rp26j2quaotjza 286 13 - - JJ work_dzeata5onzf7rp26j2quaotjza 286 14 active active JJ work_dzeata5onzf7rp26j2quaotjza 286 15 in in IN work_dzeata5onzf7rp26j2quaotjza 286 16 attempting attempt VBG work_dzeata5onzf7rp26j2quaotjza 286 17 to to TO work_dzeata5onzf7rp26j2quaotjza 286 18 stop stop VB work_dzeata5onzf7rp26j2quaotjza 286 19 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 286 20 , , , work_dzeata5onzf7rp26j2quaotjza 286 21 but but CC work_dzeata5onzf7rp26j2quaotjza 286 22 also also RB work_dzeata5onzf7rp26j2quaotjza 286 23 limit limit VB work_dzeata5onzf7rp26j2quaotjza 286 24 the the DT work_dzeata5onzf7rp26j2quaotjza 286 25 range range NN work_dzeata5onzf7rp26j2quaotjza 286 26 of of IN work_dzeata5onzf7rp26j2quaotjza 286 27 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 286 28 behaviors behavior NNS work_dzeata5onzf7rp26j2quaotjza 286 29 a a DT work_dzeata5onzf7rp26j2quaotjza 286 30 payload payload NN work_dzeata5onzf7rp26j2quaotjza 286 31 can can MD work_dzeata5onzf7rp26j2quaotjza 286 32 exhibit exhibit VB work_dzeata5onzf7rp26j2quaotjza 286 33 . . . work_dzeata5onzf7rp26j2quaotjza 287 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 287 2 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 287 3 : : : work_dzeata5onzf7rp26j2quaotjza 287 4 building building NN work_dzeata5onzf7rp26j2quaotjza 287 5 materials material NNS work_dzeata5onzf7rp26j2quaotjza 287 6 for for IN work_dzeata5onzf7rp26j2quaotjza 287 7 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 287 8 systems system NNS work_dzeata5onzf7rp26j2quaotjza 287 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 287 10 What what WP work_dzeata5onzf7rp26j2quaotjza 287 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 287 12 the the DT work_dzeata5onzf7rp26j2quaotjza 287 13 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 287 14 of of IN work_dzeata5onzf7rp26j2quaotjza 287 15 people people NNS work_dzeata5onzf7rp26j2quaotjza 287 16 applying apply VBG work_dzeata5onzf7rp26j2quaotjza 287 17 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 287 18 ? ? . work_dzeata5onzf7rp26j2quaotjza 288 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 288 2 that that WDT work_dzeata5onzf7rp26j2quaotjza 288 3 have have VBP work_dzeata5onzf7rp26j2quaotjza 288 4 fewer few JJR work_dzeata5onzf7rp26j2quaotjza 288 5 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 288 6 for for IN work_dzeata5onzf7rp26j2quaotjza 288 7 peo- peo- DT work_dzeata5onzf7rp26j2quaotjza 288 8 ple ple NN work_dzeata5onzf7rp26j2quaotjza 288 9 tend tend VBP work_dzeata5onzf7rp26j2quaotjza 288 10 to to TO work_dzeata5onzf7rp26j2quaotjza 288 11 have have VB work_dzeata5onzf7rp26j2quaotjza 288 12 more more JJR work_dzeata5onzf7rp26j2quaotjza 288 13 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 288 14 for for IN work_dzeata5onzf7rp26j2quaotjza 288 15 the the DT work_dzeata5onzf7rp26j2quaotjza 288 16 appli- appli- NNP work_dzeata5onzf7rp26j2quaotjza 288 17 cation cation NNP work_dzeata5onzf7rp26j2quaotjza 288 18 . . . work_dzeata5onzf7rp26j2quaotjza 289 1 Similarly similarly RB work_dzeata5onzf7rp26j2quaotjza 289 2 , , , work_dzeata5onzf7rp26j2quaotjza 289 3 having have VBG work_dzeata5onzf7rp26j2quaotjza 289 4 a a DT work_dzeata5onzf7rp26j2quaotjza 289 5 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 289 6 policy policy NN work_dzeata5onzf7rp26j2quaotjza 289 7 is be VBZ work_dzeata5onzf7rp26j2quaotjza 289 8 correlated correlate VBN work_dzeata5onzf7rp26j2quaotjza 289 9 with with IN work_dzeata5onzf7rp26j2quaotjza 289 10 more more JJR work_dzeata5onzf7rp26j2quaotjza 289 11 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 289 12 of of IN work_dzeata5onzf7rp26j2quaotjza 289 13 the the DT work_dzeata5onzf7rp26j2quaotjza 289 14 application application NN work_dzeata5onzf7rp26j2quaotjza 289 15 , , , work_dzeata5onzf7rp26j2quaotjza 289 16 while while IN work_dzeata5onzf7rp26j2quaotjza 289 17 user user NN work_dzeata5onzf7rp26j2quaotjza 289 18 - - HYPH work_dzeata5onzf7rp26j2quaotjza 289 19 defined define VBN work_dzeata5onzf7rp26j2quaotjza 289 20 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 289 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 289 22 correlated correlate VBN work_dzeata5onzf7rp26j2quaotjza 289 23 with with IN work_dzeata5onzf7rp26j2quaotjza 289 24 more more JJR work_dzeata5onzf7rp26j2quaotjza 289 25 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 289 26 of of IN work_dzeata5onzf7rp26j2quaotjza 289 27 the the DT work_dzeata5onzf7rp26j2quaotjza 289 28 user user NN work_dzeata5onzf7rp26j2quaotjza 289 29 . . . work_dzeata5onzf7rp26j2quaotjza 290 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 290 2 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 290 3 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 290 4 as as IN work_dzeata5onzf7rp26j2quaotjza 290 5 a a DT work_dzeata5onzf7rp26j2quaotjza 290 6 usability usability NN work_dzeata5onzf7rp26j2quaotjza 290 7 bellwether bellwether NN work_dzeata5onzf7rp26j2quaotjza 290 8 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 290 9 What what WP work_dzeata5onzf7rp26j2quaotjza 290 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 290 11 the the DT work_dzeata5onzf7rp26j2quaotjza 290 12 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 290 13 of of IN work_dzeata5onzf7rp26j2quaotjza 290 14 compo- compo- NN work_dzeata5onzf7rp26j2quaotjza 290 15 nents nent NNS work_dzeata5onzf7rp26j2quaotjza 290 16 being be VBG work_dzeata5onzf7rp26j2quaotjza 290 17 sandboxed sandboxe VBN work_dzeata5onzf7rp26j2quaotjza 290 18 ? ? . work_dzeata5onzf7rp26j2quaotjza 291 1 Sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 291 2 with with IN work_dzeata5onzf7rp26j2quaotjza 291 3 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 291 4 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 291 5 most most RBS work_dzeata5onzf7rp26j2quaotjza 291 6 - - : work_dzeata5onzf7rp26j2quaotjza 291 7 often often RB work_dzeata5onzf7rp26j2quaotjza 291 8 require require VBP work_dzeata5onzf7rp26j2quaotjza 291 9 that that IN work_dzeata5onzf7rp26j2quaotjza 291 10 applications application NNS work_dzeata5onzf7rp26j2quaotjza 291 11 be be VB work_dzeata5onzf7rp26j2quaotjza 291 12 compiled compile VBN work_dzeata5onzf7rp26j2quaotjza 291 13 using use VBG work_dzeata5onzf7rp26j2quaotjza 291 14 a a DT work_dzeata5onzf7rp26j2quaotjza 291 15 special special JJ work_dzeata5onzf7rp26j2quaotjza 291 16 compiler compiler NN work_dzeata5onzf7rp26j2quaotjza 291 17 . . . work_dzeata5onzf7rp26j2quaotjza 292 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 292 2 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 292 3 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 292 4 as as IN work_dzeata5onzf7rp26j2quaotjza 292 5 a a DT work_dzeata5onzf7rp26j2quaotjza 292 6 usability usability NN work_dzeata5onzf7rp26j2quaotjza 292 7 bellwether bellwether NN work_dzeata5onzf7rp26j2quaotjza 292 8 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 292 9 Who who WP work_dzeata5onzf7rp26j2quaotjza 292 10 defines define VBZ work_dzeata5onzf7rp26j2quaotjza 292 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 292 12 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 292 13 ? ? . work_dzeata5onzf7rp26j2quaotjza 293 1 Policies policy NNS work_dzeata5onzf7rp26j2quaotjza 293 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 293 3 most most RBS work_dzeata5onzf7rp26j2quaotjza 293 4 often often RB work_dzeata5onzf7rp26j2quaotjza 293 5 defined define VBN work_dzeata5onzf7rp26j2quaotjza 293 6 by by IN work_dzeata5onzf7rp26j2quaotjza 293 7 the the DT work_dzeata5onzf7rp26j2quaotjza 293 8 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 293 9 developer developer NN work_dzeata5onzf7rp26j2quaotjza 293 10 at at IN work_dzeata5onzf7rp26j2quaotjza 293 11 design design NN work_dzeata5onzf7rp26j2quaotjza 293 12 time time NN work_dzeata5onzf7rp26j2quaotjza 293 13 . . . work_dzeata5onzf7rp26j2quaotjza 294 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 294 2 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 294 3 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 294 4 as as IN work_dzeata5onzf7rp26j2quaotjza 294 5 a a DT work_dzeata5onzf7rp26j2quaotjza 294 6 usability usability NN work_dzeata5onzf7rp26j2quaotjza 294 7 bellwether bellwether NN work_dzeata5onzf7rp26j2quaotjza 294 8 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 294 9 How how WRB work_dzeata5onzf7rp26j2quaotjza 294 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 294 11 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 294 12 managed manage VBN work_dzeata5onzf7rp26j2quaotjza 294 13 ? ? . work_dzeata5onzf7rp26j2quaotjza 295 1 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 295 2 management management NN work_dzeata5onzf7rp26j2quaotjza 295 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 295 4 largely largely RB work_dzeata5onzf7rp26j2quaotjza 295 5 ignored ignore VBN work_dzeata5onzf7rp26j2quaotjza 295 6 , , , work_dzeata5onzf7rp26j2quaotjza 295 7 even even RB work_dzeata5onzf7rp26j2quaotjza 295 8 where where WRB work_dzeata5onzf7rp26j2quaotjza 295 9 users user NNS work_dzeata5onzf7rp26j2quaotjza 295 10 must must MD work_dzeata5onzf7rp26j2quaotjza 295 11 write write VB work_dzeata5onzf7rp26j2quaotjza 295 12 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 295 13 own own JJ work_dzeata5onzf7rp26j2quaotjza 295 14 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 295 15 . . . work_dzeata5onzf7rp26j2quaotjza 296 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 296 2 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 296 3 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 296 4 as as IN work_dzeata5onzf7rp26j2quaotjza 296 5 a a DT work_dzeata5onzf7rp26j2quaotjza 296 6 usability usability NN work_dzeata5onzf7rp26j2quaotjza 296 7 bellwether bellwether NN work_dzeata5onzf7rp26j2quaotjza 296 8 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 296 9 How how WRB work_dzeata5onzf7rp26j2quaotjza 296 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 296 11 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 296 12 constructed construct VBN work_dzeata5onzf7rp26j2quaotjza 296 13 ? ? . work_dzeata5onzf7rp26j2quaotjza 297 1 Most Most JJS work_dzeata5onzf7rp26j2quaotjza 297 2 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 297 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 297 4 hardcoded hardcode VBN work_dzeata5onzf7rp26j2quaotjza 297 5 in in IN work_dzeata5onzf7rp26j2quaotjza 297 6 the the DT work_dzeata5onzf7rp26j2quaotjza 297 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 297 8 . . . work_dzeata5onzf7rp26j2quaotjza 298 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 298 2 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 298 3 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 298 4 as as IN work_dzeata5onzf7rp26j2quaotjza 298 5 a a DT work_dzeata5onzf7rp26j2quaotjza 298 6 usability usability NN work_dzeata5onzf7rp26j2quaotjza 298 7 bellwether bellwether NN work_dzeata5onzf7rp26j2quaotjza 298 8 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 298 9 What what WP work_dzeata5onzf7rp26j2quaotjza 298 10 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 298 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 298 12 made make VBN work_dzeata5onzf7rp26j2quaotjza 298 13 about about IN work_dzeata5onzf7rp26j2quaotjza 298 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 298 15 ? ? . work_dzeata5onzf7rp26j2quaotjza 299 1 Applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 299 2 to to IN work_dzeata5onzf7rp26j2quaotjza 299 3 new new JJ work_dzeata5onzf7rp26j2quaotjza 299 4 cases case NNS work_dzeata5onzf7rp26j2quaotjza 299 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 299 6 often often RB work_dzeata5onzf7rp26j2quaotjza 299 7 the the DT work_dzeata5onzf7rp26j2quaotjza 299 8 impetus impetus NN work_dzeata5onzf7rp26j2quaotjza 299 9 for for IN work_dzeata5onzf7rp26j2quaotjza 299 10 im- im- JJ work_dzeata5onzf7rp26j2quaotjza 299 11 proving prove VBG work_dzeata5onzf7rp26j2quaotjza 299 12 existing exist VBG work_dzeata5onzf7rp26j2quaotjza 299 13 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 299 14 , , , work_dzeata5onzf7rp26j2quaotjza 299 15 but but CC work_dzeata5onzf7rp26j2quaotjza 299 16 strong strong JJ work_dzeata5onzf7rp26j2quaotjza 299 17 security security NN work_dzeata5onzf7rp26j2quaotjza 299 18 and and CC work_dzeata5onzf7rp26j2quaotjza 299 19 better well JJR work_dzeata5onzf7rp26j2quaotjza 299 20 performance performance NN work_dzeata5onzf7rp26j2quaotjza 299 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 299 22 more more RBR work_dzeata5onzf7rp26j2quaotjza 299 23 often often RB work_dzeata5onzf7rp26j2quaotjza 299 24 claimed claim VBN work_dzeata5onzf7rp26j2quaotjza 299 25 . . . work_dzeata5onzf7rp26j2quaotjza 300 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 300 2 The the DT work_dzeata5onzf7rp26j2quaotjza 300 3 state state NN work_dzeata5onzf7rp26j2quaotjza 300 4 of of IN work_dzeata5onzf7rp26j2quaotjza 300 5 practice practice NN work_dzeata5onzf7rp26j2quaotjza 300 6 in in IN work_dzeata5onzf7rp26j2quaotjza 300 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 300 8 validation validation NN work_dzeata5onzf7rp26j2quaotjza 300 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 300 10 How how WRB work_dzeata5onzf7rp26j2quaotjza 300 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 300 12 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 300 13 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 300 14 ? ? . work_dzeata5onzf7rp26j2quaotjza 301 1 Benchmarks Benchmarks NNP work_dzeata5onzf7rp26j2quaotjza 301 2 and and CC work_dzeata5onzf7rp26j2quaotjza 301 3 case case NN work_dzeata5onzf7rp26j2quaotjza 301 4 studies study NNS work_dzeata5onzf7rp26j2quaotjza 301 5 are be VBP work_dzeata5onzf7rp26j2quaotjza 301 6 the the DT work_dzeata5onzf7rp26j2quaotjza 301 7 most most RBS work_dzeata5onzf7rp26j2quaotjza 301 8 favored favor VBN work_dzeata5onzf7rp26j2quaotjza 301 9 validation validation NN work_dzeata5onzf7rp26j2quaotjza 301 10 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 301 11 for for IN work_dzeata5onzf7rp26j2quaotjza 301 12 all all DT work_dzeata5onzf7rp26j2quaotjza 301 13 types type NNS work_dzeata5onzf7rp26j2quaotjza 301 14 of of IN work_dzeata5onzf7rp26j2quaotjza 301 15 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 301 16 . . . work_dzeata5onzf7rp26j2quaotjza 302 1 Where where WRB work_dzeata5onzf7rp26j2quaotjza 302 2 security security NN work_dzeata5onzf7rp26j2quaotjza 302 3 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 302 4 are be VBP work_dzeata5onzf7rp26j2quaotjza 302 5 not not RB work_dzeata5onzf7rp26j2quaotjza 302 6 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 302 7 using use VBG work_dzeata5onzf7rp26j2quaotjza 302 8 both both DT work_dzeata5onzf7rp26j2quaotjza 302 9 benchmarks benchmark NNS work_dzeata5onzf7rp26j2quaotjza 302 10 and and CC work_dzeata5onzf7rp26j2quaotjza 302 11 case case NN work_dzeata5onzf7rp26j2quaotjza 302 12 studies study NNS work_dzeata5onzf7rp26j2quaotjza 302 13 , , , work_dzeata5onzf7rp26j2quaotjza 302 14 ad ad FW work_dzeata5onzf7rp26j2quaotjza 302 15 - - HYPH work_dzeata5onzf7rp26j2quaotjza 302 16 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 302 17 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 302 18 are be VBP work_dzeata5onzf7rp26j2quaotjza 302 19 heavily heavily RB work_dzeata5onzf7rp26j2quaotjza 302 20 favored favor VBN work_dzeata5onzf7rp26j2quaotjza 302 21 . . . work_dzeata5onzf7rp26j2quaotjza 303 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 303 2 The the DT work_dzeata5onzf7rp26j2quaotjza 303 3 state state NN work_dzeata5onzf7rp26j2quaotjza 303 4 of of IN work_dzeata5onzf7rp26j2quaotjza 303 5 practice practice NN work_dzeata5onzf7rp26j2quaotjza 303 6 in in IN work_dzeata5onzf7rp26j2quaotjza 303 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 303 8 validation validation NN work_dzeata5onzf7rp26j2quaotjza 303 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 303 10 In in IN work_dzeata5onzf7rp26j2quaotjza 303 11 what what WDT work_dzeata5onzf7rp26j2quaotjza 303 12 forms form NNS work_dzeata5onzf7rp26j2quaotjza 303 13 are be VBP work_dzeata5onzf7rp26j2quaotjza 303 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 303 15 made make VBN work_dzeata5onzf7rp26j2quaotjza 303 16 available available JJ work_dzeata5onzf7rp26j2quaotjza 303 17 for for IN work_dzeata5onzf7rp26j2quaotjza 303 18 review review NN work_dzeata5onzf7rp26j2quaotjza 303 19 ? ? . work_dzeata5onzf7rp26j2quaotjza 304 1 There there EX work_dzeata5onzf7rp26j2quaotjza 304 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 304 3 a a DT work_dzeata5onzf7rp26j2quaotjza 304 4 recent recent JJ work_dzeata5onzf7rp26j2quaotjza 304 5 slight slight JJ work_dzeata5onzf7rp26j2quaotjza 304 6 increase increase NN work_dzeata5onzf7rp26j2quaotjza 304 7 in in IN work_dzeata5onzf7rp26j2quaotjza 304 8 the the DT work_dzeata5onzf7rp26j2quaotjza 304 9 release release NN work_dzeata5onzf7rp26j2quaotjza 304 10 of of IN work_dzeata5onzf7rp26j2quaotjza 304 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 304 12 source source NN work_dzeata5onzf7rp26j2quaotjza 304 13 code code NN work_dzeata5onzf7rp26j2quaotjza 304 14 , , , work_dzeata5onzf7rp26j2quaotjza 304 15 but but CC work_dzeata5onzf7rp26j2quaotjza 304 16 generally generally RB work_dzeata5onzf7rp26j2quaotjza 304 17 no no DT work_dzeata5onzf7rp26j2quaotjza 304 18 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 304 19 artifacts artifact NNS work_dzeata5onzf7rp26j2quaotjza 304 20 are be VBP work_dzeata5onzf7rp26j2quaotjza 304 21 made make VBN work_dzeata5onzf7rp26j2quaotjza 304 22 available available JJ work_dzeata5onzf7rp26j2quaotjza 304 23 for for IN work_dzeata5onzf7rp26j2quaotjza 304 24 review review NN work_dzeata5onzf7rp26j2quaotjza 304 25 . . . work_dzeata5onzf7rp26j2quaotjza 305 1 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 305 2 The the DT work_dzeata5onzf7rp26j2quaotjza 305 3 state state NN work_dzeata5onzf7rp26j2quaotjza 305 4 of of IN work_dzeata5onzf7rp26j2quaotjza 305 5 practice practice NN work_dzeata5onzf7rp26j2quaotjza 305 6 in in IN work_dzeata5onzf7rp26j2quaotjza 305 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 305 8 validation validation NN work_dzeata5onzf7rp26j2quaotjza 305 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 305 10 Chrome Chrome NNP work_dzeata5onzf7rp26j2quaotjza 305 11 , , , work_dzeata5onzf7rp26j2quaotjza 305 12 etc etc FW work_dzeata5onzf7rp26j2quaotjza 305 13 . . . work_dzeata5onzf7rp26j2quaotjza 305 14 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 305 15 . . . work_dzeata5onzf7rp26j2quaotjza 306 1 Indeed indeed RB work_dzeata5onzf7rp26j2quaotjza 306 2 , , , work_dzeata5onzf7rp26j2quaotjza 306 3 all all DT work_dzeata5onzf7rp26j2quaotjza 306 4 but but IN work_dzeata5onzf7rp26j2quaotjza 306 5 one one CD work_dzeata5onzf7rp26j2quaotjza 306 6 of of IN work_dzeata5onzf7rp26j2quaotjza 306 7 the the DT work_dzeata5onzf7rp26j2quaotjza 306 8 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 306 9 deployed deploy VBN work_dzeata5onzf7rp26j2quaotjza 306 10 in in IN work_dzeata5onzf7rp26j2quaotjza 306 11 application application NN work_dzeata5onzf7rp26j2quaotjza 306 12 hosts host NNS work_dzeata5onzf7rp26j2quaotjza 306 13 are be VBP work_dzeata5onzf7rp26j2quaotjza 306 14 for for IN work_dzeata5onzf7rp26j2quaotjza 306 15 the the DT work_dzeata5onzf7rp26j2quaotjza 306 16 web web NN work_dzeata5onzf7rp26j2quaotjza 306 17 , , , work_dzeata5onzf7rp26j2quaotjza 306 18 where where WRB work_dzeata5onzf7rp26j2quaotjza 306 19 applications application NNS work_dzeata5onzf7rp26j2quaotjza 306 20 can can MD work_dzeata5onzf7rp26j2quaotjza 306 21 gain gain VB work_dzeata5onzf7rp26j2quaotjza 306 22 substantial substantial JJ work_dzeata5onzf7rp26j2quaotjza 306 23 benefits benefit NNS work_dzeata5onzf7rp26j2quaotjza 306 24 from from IN work_dzeata5onzf7rp26j2quaotjza 306 25 further further JJ work_dzeata5onzf7rp26j2quaotjza 306 26 encapsulation encapsulation NN work_dzeata5onzf7rp26j2quaotjza 306 27 and and CC work_dzeata5onzf7rp26j2quaotjza 306 28 there there EX work_dzeata5onzf7rp26j2quaotjza 306 29 is be VBZ work_dzeata5onzf7rp26j2quaotjza 306 30 currently currently RB work_dzeata5onzf7rp26j2quaotjza 306 31 no no DT work_dzeata5onzf7rp26j2quaotjza 306 32 de de FW work_dzeata5onzf7rp26j2quaotjza 306 33 facto facto FW work_dzeata5onzf7rp26j2quaotjza 306 34 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 306 35 . . . work_dzeata5onzf7rp26j2quaotjza 307 1 The the DT work_dzeata5onzf7rp26j2quaotjza 307 2 one one CD work_dzeata5onzf7rp26j2quaotjza 307 3 exception exception NN work_dzeata5onzf7rp26j2quaotjza 307 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 307 5 Robusta Robusta NNP work_dzeata5onzf7rp26j2quaotjza 307 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 307 7 Siefers Siefers NNP work_dzeata5onzf7rp26j2quaotjza 307 8 , , , work_dzeata5onzf7rp26j2quaotjza 307 9 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 307 10 & & CC work_dzeata5onzf7rp26j2quaotjza 307 11 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 307 12 , , , work_dzeata5onzf7rp26j2quaotjza 307 13 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 307 14 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 307 15 , , , work_dzeata5onzf7rp26j2quaotjza 307 16 which which WDT work_dzeata5onzf7rp26j2quaotjza 307 17 enhances enhance VBZ work_dzeata5onzf7rp26j2quaotjza 307 18 the the DT work_dzeata5onzf7rp26j2quaotjza 307 19 Java Java NNP work_dzeata5onzf7rp26j2quaotjza 307 20 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 307 21 to to TO work_dzeata5onzf7rp26j2quaotjza 307 22 encapsulate encapsulate VB work_dzeata5onzf7rp26j2quaotjza 307 23 additional additional JJ work_dzeata5onzf7rp26j2quaotjza 307 24 non non JJ work_dzeata5onzf7rp26j2quaotjza 307 25 - - JJ work_dzeata5onzf7rp26j2quaotjza 307 26 web web JJ work_dzeata5onzf7rp26j2quaotjza 307 27 computations computation NNS work_dzeata5onzf7rp26j2quaotjza 307 28 . . . work_dzeata5onzf7rp26j2quaotjza 308 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 308 2 et et FW work_dzeata5onzf7rp26j2quaotjza 308 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 308 4 . . . work_dzeata5onzf7rp26j2quaotjza 309 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 309 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 309 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 309 4 , , , work_dzeata5onzf7rp26j2quaotjza 309 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 309 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 309 7 . . . work_dzeata5onzf7rp26j2quaotjza 310 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 310 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 310 3 , , , work_dzeata5onzf7rp26j2quaotjza 310 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 310 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 310 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 310 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 310 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 310 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 310 10 13/36 13/36 CD work_dzeata5onzf7rp26j2quaotjza 310 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 310 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 310 13 Figure Figure NNP work_dzeata5onzf7rp26j2quaotjza 310 14 2 2 CD work_dzeata5onzf7rp26j2quaotjza 310 15 The the DT work_dzeata5onzf7rp26j2quaotjza 310 16 citation citation NN work_dzeata5onzf7rp26j2quaotjza 310 17 graph graph NN work_dzeata5onzf7rp26j2quaotjza 310 18 for for IN work_dzeata5onzf7rp26j2quaotjza 310 19 the the DT work_dzeata5onzf7rp26j2quaotjza 310 20 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 310 21 in in IN work_dzeata5onzf7rp26j2quaotjza 310 22 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 310 23 set set NN work_dzeata5onzf7rp26j2quaotjza 310 24 . . . work_dzeata5onzf7rp26j2quaotjza 311 1 The the DT work_dzeata5onzf7rp26j2quaotjza 311 2 colors color NNS work_dzeata5onzf7rp26j2quaotjza 311 3 represent represent VBP work_dzeata5onzf7rp26j2quaotjza 311 4 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 311 5 based base VBN work_dzeata5onzf7rp26j2quaotjza 311 6 on on IN work_dzeata5onzf7rp26j2quaotjza 311 7 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 311 8 of of IN work_dzeata5onzf7rp26j2quaotjza 311 9 interest interest NN work_dzeata5onzf7rp26j2quaotjza 311 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 311 11 modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 311 12 = = SYM work_dzeata5onzf7rp26j2quaotjza 311 13 0.33 0.33 CD work_dzeata5onzf7rp26j2quaotjza 311 14 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 311 15 . . . work_dzeata5onzf7rp26j2quaotjza 312 1 Papers paper NNS work_dzeata5onzf7rp26j2quaotjza 312 2 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 312 3 based base VBN work_dzeata5onzf7rp26j2quaotjza 312 4 on on IN work_dzeata5onzf7rp26j2quaotjza 312 5 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 312 6 of of IN work_dzeata5onzf7rp26j2quaotjza 312 7 interest interest NN work_dzeata5onzf7rp26j2quaotjza 312 8 , , , work_dzeata5onzf7rp26j2quaotjza 312 9 not not RB work_dzeata5onzf7rp26j2quaotjza 312 10 necessarily necessarily RB work_dzeata5onzf7rp26j2quaotjza 312 11 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 312 12 technical technical JJ work_dzeata5onzf7rp26j2quaotjza 312 13 attributes attribute NNS work_dzeata5onzf7rp26j2quaotjza 312 14 or or CC work_dzeata5onzf7rp26j2quaotjza 312 15 validation validation NN work_dzeata5onzf7rp26j2quaotjza 312 16 stratgies stratgie NNS work_dzeata5onzf7rp26j2quaotjza 312 17 , , , work_dzeata5onzf7rp26j2quaotjza 312 18 thus thus RB work_dzeata5onzf7rp26j2quaotjza 312 19 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 312 20 must must MD work_dzeata5onzf7rp26j2quaotjza 312 21 look look VB work_dzeata5onzf7rp26j2quaotjza 312 22 at at IN work_dzeata5onzf7rp26j2quaotjza 312 23 lower low JJR work_dzeata5onzf7rp26j2quaotjza 312 24 level level NN work_dzeata5onzf7rp26j2quaotjza 312 25 attributes attribute NNS work_dzeata5onzf7rp26j2quaotjza 312 26 to to TO work_dzeata5onzf7rp26j2quaotjza 312 27 gain gain VB work_dzeata5onzf7rp26j2quaotjza 312 28 a a DT work_dzeata5onzf7rp26j2quaotjza 312 29 broad broad JJ work_dzeata5onzf7rp26j2quaotjza 312 30 understanding understanding NN work_dzeata5onzf7rp26j2quaotjza 312 31 of of IN work_dzeata5onzf7rp26j2quaotjza 312 32 the the DT work_dzeata5onzf7rp26j2quaotjza 312 33 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 312 34 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 312 35 . . . work_dzeata5onzf7rp26j2quaotjza 313 1 Papers paper NNS work_dzeata5onzf7rp26j2quaotjza 313 2 that that WDT work_dzeata5onzf7rp26j2quaotjza 313 3 were be VBD work_dzeata5onzf7rp26j2quaotjza 313 4 not not RB work_dzeata5onzf7rp26j2quaotjza 313 5 linked link VBN work_dzeata5onzf7rp26j2quaotjza 313 6 to to IN work_dzeata5onzf7rp26j2quaotjza 313 7 any any DT work_dzeata5onzf7rp26j2quaotjza 313 8 of of IN work_dzeata5onzf7rp26j2quaotjza 313 9 the the DT work_dzeata5onzf7rp26j2quaotjza 313 10 other other JJ work_dzeata5onzf7rp26j2quaotjza 313 11 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 313 12 in in IN work_dzeata5onzf7rp26j2quaotjza 313 13 the the DT work_dzeata5onzf7rp26j2quaotjza 313 14 set set NN work_dzeata5onzf7rp26j2quaotjza 313 15 are be VBP work_dzeata5onzf7rp26j2quaotjza 313 16 not not RB work_dzeata5onzf7rp26j2quaotjza 313 17 shown show VBN work_dzeata5onzf7rp26j2quaotjza 313 18 . . . work_dzeata5onzf7rp26j2quaotjza 314 1 Categories category NNS work_dzeata5onzf7rp26j2quaotjza 314 2 bridging bridge VBG work_dzeata5onzf7rp26j2quaotjza 314 3 Mandatory mandatory JJ work_dzeata5onzf7rp26j2quaotjza 314 4 Integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 314 5 and and CC work_dzeata5onzf7rp26j2quaotjza 314 6 Access Access NNP work_dzeata5onzf7rp26j2quaotjza 314 7 Control Control NNP work_dzeata5onzf7rp26j2quaotjza 314 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 314 9 MI MI NNP work_dzeata5onzf7rp26j2quaotjza 314 10 / / SYM work_dzeata5onzf7rp26j2quaotjza 314 11 AC AC NNP work_dzeata5onzf7rp26j2quaotjza 314 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 314 13 were be VBD work_dzeata5onzf7rp26j2quaotjza 314 14 collapsed collapse VBN work_dzeata5onzf7rp26j2quaotjza 314 15 to to TO work_dzeata5onzf7rp26j2quaotjza 314 16 simply simply RB work_dzeata5onzf7rp26j2quaotjza 314 17 Mandatory Mandatory NNP work_dzeata5onzf7rp26j2quaotjza 314 18 Access Access NNP work_dzeata5onzf7rp26j2quaotjza 314 19 Control Control NNP work_dzeata5onzf7rp26j2quaotjza 314 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 314 21 MAC MAC NNP work_dzeata5onzf7rp26j2quaotjza 314 22 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 314 23 for for IN work_dzeata5onzf7rp26j2quaotjza 314 24 this this DT work_dzeata5onzf7rp26j2quaotjza 314 25 graph graph NN work_dzeata5onzf7rp26j2quaotjza 314 26 . . . work_dzeata5onzf7rp26j2quaotjza 315 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 315 2 citation citation NN work_dzeata5onzf7rp26j2quaotjza 315 3 data datum NNS work_dzeata5onzf7rp26j2quaotjza 315 4 can can MD work_dzeata5onzf7rp26j2quaotjza 315 5 be be VB work_dzeata5onzf7rp26j2quaotjza 315 6 found find VBN work_dzeata5onzf7rp26j2quaotjza 315 7 in in IN work_dzeata5onzf7rp26j2quaotjza 315 8 Supplemental Supplemental NNP work_dzeata5onzf7rp26j2quaotjza 315 9 Information Information NNP work_dzeata5onzf7rp26j2quaotjza 315 10 5 5 CD work_dzeata5onzf7rp26j2quaotjza 315 11 . . . work_dzeata5onzf7rp26j2quaotjza 316 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 316 2 et et FW work_dzeata5onzf7rp26j2quaotjza 316 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 316 4 . . . work_dzeata5onzf7rp26j2quaotjza 317 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 317 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 317 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 317 4 , , , work_dzeata5onzf7rp26j2quaotjza 317 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 317 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 317 7 . . . work_dzeata5onzf7rp26j2quaotjza 318 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 318 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 318 3 , , , work_dzeata5onzf7rp26j2quaotjza 318 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 318 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 318 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 318 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 318 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 318 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 318 10 14/36 14/36 CD work_dzeata5onzf7rp26j2quaotjza 318 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 318 12 http://dx.doi.org/10.7717/peerj-cs.43/supp-5 http://dx.doi.org/10.7717/peerj-cs.43/supp-5 ADD work_dzeata5onzf7rp26j2quaotjza 318 13 http://dx.doi.org/10.7717/peerj-cs.43/supp-5 http://dx.doi.org/10.7717/peerj-cs.43/supp-5 ADD work_dzeata5onzf7rp26j2quaotjza 318 14 http://dx.doi.org/10.7717/peerj-cs.43/supp-5 http://dx.doi.org/10.7717/peerj-cs.43/supp-5 ADD work_dzeata5onzf7rp26j2quaotjza 318 15 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 318 16 Figure Figure NNP work_dzeata5onzf7rp26j2quaotjza 318 17 3 3 CD work_dzeata5onzf7rp26j2quaotjza 318 18 Breakdown breakdown NN work_dzeata5onzf7rp26j2quaotjza 318 19 of of IN work_dzeata5onzf7rp26j2quaotjza 318 20 the the DT work_dzeata5onzf7rp26j2quaotjza 318 21 representation representation NN work_dzeata5onzf7rp26j2quaotjza 318 22 of of IN work_dzeata5onzf7rp26j2quaotjza 318 23 all all DT work_dzeata5onzf7rp26j2quaotjza 318 24 codes code NNS work_dzeata5onzf7rp26j2quaotjza 318 25 for for IN work_dzeata5onzf7rp26j2quaotjza 318 26 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 318 27 that that WDT work_dzeata5onzf7rp26j2quaotjza 318 28 emphasize emphasize VBP work_dzeata5onzf7rp26j2quaotjza 318 29 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 318 30 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 318 31 . . . work_dzeata5onzf7rp26j2quaotjza 319 1 Cases case NNS work_dzeata5onzf7rp26j2quaotjza 319 2 where where WRB work_dzeata5onzf7rp26j2quaotjza 319 3 a a DT work_dzeata5onzf7rp26j2quaotjza 319 4 claim claim NN work_dzeata5onzf7rp26j2quaotjza 319 5 was be VBD work_dzeata5onzf7rp26j2quaotjza 319 6 made make VBN work_dzeata5onzf7rp26j2quaotjza 319 7 but but CC work_dzeata5onzf7rp26j2quaotjza 319 8 not not RB work_dzeata5onzf7rp26j2quaotjza 319 9 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 319 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 319 11 labeled label VBN work_dzeata5onzf7rp26j2quaotjza 319 12 with with IN work_dzeata5onzf7rp26j2quaotjza 319 13 an an DT work_dzeata5onzf7rp26j2quaotjza 319 14 “ " `` work_dzeata5onzf7rp26j2quaotjza 319 15 x x NN work_dzeata5onzf7rp26j2quaotjza 319 16 ” " '' work_dzeata5onzf7rp26j2quaotjza 319 17 . . . work_dzeata5onzf7rp26j2quaotjza 320 1 System system NN work_dzeata5onzf7rp26j2quaotjza 320 2 components component NNS work_dzeata5onzf7rp26j2quaotjza 320 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 320 4 heavily heavily RB work_dzeata5onzf7rp26j2quaotjza 320 5 represented represent VBN work_dzeata5onzf7rp26j2quaotjza 320 6 because because IN work_dzeata5onzf7rp26j2quaotjza 320 7 any any DT work_dzeata5onzf7rp26j2quaotjza 320 8 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 320 9 that that WDT work_dzeata5onzf7rp26j2quaotjza 320 10 is be VBZ work_dzeata5onzf7rp26j2quaotjza 320 11 to to TO work_dzeata5onzf7rp26j2quaotjza 320 12 encapsulate encapsulate VB work_dzeata5onzf7rp26j2quaotjza 320 13 a a DT work_dzeata5onzf7rp26j2quaotjza 320 14 kernel kernel NN work_dzeata5onzf7rp26j2quaotjza 320 15 , , , work_dzeata5onzf7rp26j2quaotjza 320 16 driver driver NN work_dzeata5onzf7rp26j2quaotjza 320 17 , , , work_dzeata5onzf7rp26j2quaotjza 320 18 or or CC work_dzeata5onzf7rp26j2quaotjza 320 19 other other JJ work_dzeata5onzf7rp26j2quaotjza 320 20 system system NN work_dzeata5onzf7rp26j2quaotjza 320 21 component component NN work_dzeata5onzf7rp26j2quaotjza 320 22 must must MD work_dzeata5onzf7rp26j2quaotjza 320 23 necessarily necessarily RB work_dzeata5onzf7rp26j2quaotjza 320 24 enforce enforce VB work_dzeata5onzf7rp26j2quaotjza 320 25 the the DT work_dzeata5onzf7rp26j2quaotjza 320 26 policy policy NN work_dzeata5onzf7rp26j2quaotjza 320 27 in in IN work_dzeata5onzf7rp26j2quaotjza 320 28 a a DT work_dzeata5onzf7rp26j2quaotjza 320 29 system system NN work_dzeata5onzf7rp26j2quaotjza 320 30 component component NN work_dzeata5onzf7rp26j2quaotjza 320 31 . . . work_dzeata5onzf7rp26j2quaotjza 321 1 Fifteen fifteen CD work_dzeata5onzf7rp26j2quaotjza 321 2 of of IN work_dzeata5onzf7rp26j2quaotjza 321 3 the the DT work_dzeata5onzf7rp26j2quaotjza 321 4 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 321 5 fall fall VBP work_dzeata5onzf7rp26j2quaotjza 321 6 into into IN work_dzeata5onzf7rp26j2quaotjza 321 7 this this DT work_dzeata5onzf7rp26j2quaotjza 321 8 category category NN work_dzeata5onzf7rp26j2quaotjza 321 9 because because IN work_dzeata5onzf7rp26j2quaotjza 321 10 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 321 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 321 12 encapsulating encapsulate VBG work_dzeata5onzf7rp26j2quaotjza 321 13 either either CC work_dzeata5onzf7rp26j2quaotjza 321 14 a a DT work_dzeata5onzf7rp26j2quaotjza 321 15 kernel kernel NN work_dzeata5onzf7rp26j2quaotjza 321 16 or or CC work_dzeata5onzf7rp26j2quaotjza 321 17 hypervisor hypervisor NN work_dzeata5onzf7rp26j2quaotjza 321 18 . . . work_dzeata5onzf7rp26j2quaotjza 322 1 The the DT work_dzeata5onzf7rp26j2quaotjza 322 2 remainder remainder NN work_dzeata5onzf7rp26j2quaotjza 322 3 could could MD work_dzeata5onzf7rp26j2quaotjza 322 4 potentially potentially RB work_dzeata5onzf7rp26j2quaotjza 322 5 enforce enforce VB work_dzeata5onzf7rp26j2quaotjza 322 6 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 322 7 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 322 8 from from IN work_dzeata5onzf7rp26j2quaotjza 322 9 a a DT work_dzeata5onzf7rp26j2quaotjza 322 10 less less RBR work_dzeata5onzf7rp26j2quaotjza 322 11 privileged privileged JJ work_dzeata5onzf7rp26j2quaotjza 322 12 position position NN work_dzeata5onzf7rp26j2quaotjza 322 13 , , , work_dzeata5onzf7rp26j2quaotjza 322 14 but but CC work_dzeata5onzf7rp26j2quaotjza 322 15 take take VB work_dzeata5onzf7rp26j2quaotjza 322 16 advantage advantage NN work_dzeata5onzf7rp26j2quaotjza 322 17 of of IN work_dzeata5onzf7rp26j2quaotjza 322 18 the the DT work_dzeata5onzf7rp26j2quaotjza 322 19 full full JJ work_dzeata5onzf7rp26j2quaotjza 322 20 access access NN work_dzeata5onzf7rp26j2quaotjza 322 21 to to IN work_dzeata5onzf7rp26j2quaotjza 322 22 data datum NNS work_dzeata5onzf7rp26j2quaotjza 322 23 and and CC work_dzeata5onzf7rp26j2quaotjza 322 24 transparency transparency NN work_dzeata5onzf7rp26j2quaotjza 322 25 to to TO work_dzeata5onzf7rp26j2quaotjza 322 26 user user VB work_dzeata5onzf7rp26j2quaotjza 322 27 - - HYPH work_dzeata5onzf7rp26j2quaotjza 322 28 mode mode NN work_dzeata5onzf7rp26j2quaotjza 322 29 applications application NNS work_dzeata5onzf7rp26j2quaotjza 322 30 available available JJ work_dzeata5onzf7rp26j2quaotjza 322 31 to to IN work_dzeata5onzf7rp26j2quaotjza 322 32 system system NN work_dzeata5onzf7rp26j2quaotjza 322 33 components component NNS work_dzeata5onzf7rp26j2quaotjza 322 34 . . . work_dzeata5onzf7rp26j2quaotjza 323 1 This this DT work_dzeata5onzf7rp26j2quaotjza 323 2 power power NN work_dzeata5onzf7rp26j2quaotjza 323 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 323 4 useful useful JJ work_dzeata5onzf7rp26j2quaotjza 323 5 when when WRB work_dzeata5onzf7rp26j2quaotjza 323 6 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 323 7 information information NN work_dzeata5onzf7rp26j2quaotjza 323 8 flow flow NN work_dzeata5onzf7rp26j2quaotjza 323 9 across across IN work_dzeata5onzf7rp26j2quaotjza 323 10 applications application NNS work_dzeata5onzf7rp26j2quaotjza 323 11 , , , work_dzeata5onzf7rp26j2quaotjza 323 12 when when WRB work_dzeata5onzf7rp26j2quaotjza 323 13 preventing prevent VBG work_dzeata5onzf7rp26j2quaotjza 323 14 memory memory NN work_dzeata5onzf7rp26j2quaotjza 323 15 corruption corruption NN work_dzeata5onzf7rp26j2quaotjza 323 16 , , , work_dzeata5onzf7rp26j2quaotjza 323 17 or or CC work_dzeata5onzf7rp26j2quaotjza 323 18 when when WRB work_dzeata5onzf7rp26j2quaotjza 323 19 otherwise otherwise RB work_dzeata5onzf7rp26j2quaotjza 323 20 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 323 21 the the DT work_dzeata5onzf7rp26j2quaotjza 323 22 same same JJ work_dzeata5onzf7rp26j2quaotjza 323 23 policy policy NN work_dzeata5onzf7rp26j2quaotjza 323 24 on on IN work_dzeata5onzf7rp26j2quaotjza 323 25 every every DT work_dzeata5onzf7rp26j2quaotjza 323 26 user user NN work_dzeata5onzf7rp26j2quaotjza 323 27 - - HYPH work_dzeata5onzf7rp26j2quaotjza 323 28 mode mode NN work_dzeata5onzf7rp26j2quaotjza 323 29 application application NN work_dzeata5onzf7rp26j2quaotjza 323 30 . . . work_dzeata5onzf7rp26j2quaotjza 324 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 324 2 et et FW work_dzeata5onzf7rp26j2quaotjza 324 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 324 4 . . . work_dzeata5onzf7rp26j2quaotjza 325 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 325 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 325 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 325 4 , , , work_dzeata5onzf7rp26j2quaotjza 325 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 325 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 325 7 . . . work_dzeata5onzf7rp26j2quaotjza 326 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 326 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 326 3 , , , work_dzeata5onzf7rp26j2quaotjza 326 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 326 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 326 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 326 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 326 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 326 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 326 10 15/36 15/36 CD work_dzeata5onzf7rp26j2quaotjza 326 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 326 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 326 13 Figure Figure NNP work_dzeata5onzf7rp26j2quaotjza 326 14 4 4 CD work_dzeata5onzf7rp26j2quaotjza 326 15 Breakdown breakdown NN work_dzeata5onzf7rp26j2quaotjza 326 16 of of IN work_dzeata5onzf7rp26j2quaotjza 326 17 the the DT work_dzeata5onzf7rp26j2quaotjza 326 18 representation representation NN work_dzeata5onzf7rp26j2quaotjza 326 19 of of IN work_dzeata5onzf7rp26j2quaotjza 326 20 all all DT work_dzeata5onzf7rp26j2quaotjza 326 21 codes code NNS work_dzeata5onzf7rp26j2quaotjza 326 22 for for IN work_dzeata5onzf7rp26j2quaotjza 326 23 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 326 24 that that WDT work_dzeata5onzf7rp26j2quaotjza 326 25 emphasize emphasize VBP work_dzeata5onzf7rp26j2quaotjza 326 26 user user NN work_dzeata5onzf7rp26j2quaotjza 326 27 - - HYPH work_dzeata5onzf7rp26j2quaotjza 326 28 defined define VBN work_dzeata5onzf7rp26j2quaotjza 326 29 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 326 30 . . . work_dzeata5onzf7rp26j2quaotjza 327 1 Some some DT work_dzeata5onzf7rp26j2quaotjza 327 2 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 327 3 support support VBP work_dzeata5onzf7rp26j2quaotjza 327 4 a a DT work_dzeata5onzf7rp26j2quaotjza 327 5 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 327 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 327 7 policy policy NN work_dzeata5onzf7rp26j2quaotjza 327 8 with with IN work_dzeata5onzf7rp26j2quaotjza 327 9 an an DT work_dzeata5onzf7rp26j2quaotjza 327 10 optional optional JJ work_dzeata5onzf7rp26j2quaotjza 327 11 user user NN work_dzeata5onzf7rp26j2quaotjza 327 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 327 13 defined define VBN work_dzeata5onzf7rp26j2quaotjza 327 14 policy policy NN work_dzeata5onzf7rp26j2quaotjza 327 15 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 327 16 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 327 17 , , , work_dzeata5onzf7rp26j2quaotjza 327 18 Siefers Siefers NNP work_dzeata5onzf7rp26j2quaotjza 327 19 , , , work_dzeata5onzf7rp26j2quaotjza 327 20 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 327 21 & & CC work_dzeata5onzf7rp26j2quaotjza 327 22 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 327 23 , , , work_dzeata5onzf7rp26j2quaotjza 327 24 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 327 25 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 327 26 . . . work_dzeata5onzf7rp26j2quaotjza 328 1 Cases case NNS work_dzeata5onzf7rp26j2quaotjza 328 2 where where WRB work_dzeata5onzf7rp26j2quaotjza 328 3 a a DT work_dzeata5onzf7rp26j2quaotjza 328 4 claim claim NN work_dzeata5onzf7rp26j2quaotjza 328 5 was be VBD work_dzeata5onzf7rp26j2quaotjza 328 6 made make VBN work_dzeata5onzf7rp26j2quaotjza 328 7 but but CC work_dzeata5onzf7rp26j2quaotjza 328 8 not not RB work_dzeata5onzf7rp26j2quaotjza 328 9 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 328 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 328 11 labeled label VBN work_dzeata5onzf7rp26j2quaotjza 328 12 with with IN work_dzeata5onzf7rp26j2quaotjza 328 13 an an DT work_dzeata5onzf7rp26j2quaotjza 328 14 “ " `` work_dzeata5onzf7rp26j2quaotjza 328 15 x x NN work_dzeata5onzf7rp26j2quaotjza 328 16 ” " '' work_dzeata5onzf7rp26j2quaotjza 328 17 . . . work_dzeata5onzf7rp26j2quaotjza 329 1 Research research NN work_dzeata5onzf7rp26j2quaotjza 329 2 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 329 3 almost almost RB work_dzeata5onzf7rp26j2quaotjza 329 4 universally universally RB work_dzeata5onzf7rp26j2quaotjza 329 5 embed embe VBD work_dzeata5onzf7rp26j2quaotjza 329 6 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 329 7 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 329 8 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 329 9 in in IN work_dzeata5onzf7rp26j2quaotjza 329 10 the the DT work_dzeata5onzf7rp26j2quaotjza 329 11 application application NN work_dzeata5onzf7rp26j2quaotjza 329 12 that that WDT work_dzeata5onzf7rp26j2quaotjza 329 13 is be VBZ work_dzeata5onzf7rp26j2quaotjza 329 14 being be VBG work_dzeata5onzf7rp26j2quaotjza 329 15 encapsulated encapsulate VBN work_dzeata5onzf7rp26j2quaotjza 329 16 when when WRB work_dzeata5onzf7rp26j2quaotjza 329 17 the the DT work_dzeata5onzf7rp26j2quaotjza 329 18 application application NN work_dzeata5onzf7rp26j2quaotjza 329 19 runs run VBZ work_dzeata5onzf7rp26j2quaotjza 329 20 in in IN work_dzeata5onzf7rp26j2quaotjza 329 21 user user NN work_dzeata5onzf7rp26j2quaotjza 329 22 - - HYPH work_dzeata5onzf7rp26j2quaotjza 329 23 mode mode NN work_dzeata5onzf7rp26j2quaotjza 329 24 . . . work_dzeata5onzf7rp26j2quaotjza 330 1 Application application NN work_dzeata5onzf7rp26j2quaotjza 330 2 deployment deployment NN work_dzeata5onzf7rp26j2quaotjza 330 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 330 4 correlated correlate VBN work_dzeata5onzf7rp26j2quaotjza 330 5 with with IN work_dzeata5onzf7rp26j2quaotjza 330 6 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 330 7 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 330 8 where where WRB work_dzeata5onzf7rp26j2quaotjza 330 9 modifying modify VBG work_dzeata5onzf7rp26j2quaotjza 330 10 the the DT work_dzeata5onzf7rp26j2quaotjza 330 11 application application NN work_dzeata5onzf7rp26j2quaotjza 330 12 itself -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 330 13 can can MD work_dzeata5onzf7rp26j2quaotjza 330 14 lead lead VB work_dzeata5onzf7rp26j2quaotjza 330 15 to to IN work_dzeata5onzf7rp26j2quaotjza 330 16 higher high JJR work_dzeata5onzf7rp26j2quaotjza 330 17 performance performance NN work_dzeata5onzf7rp26j2quaotjza 330 18 and and CC work_dzeata5onzf7rp26j2quaotjza 330 19 where where WRB work_dzeata5onzf7rp26j2quaotjza 330 20 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 330 21 makes make VBZ work_dzeata5onzf7rp26j2quaotjza 330 22 sense sense NN work_dzeata5onzf7rp26j2quaotjza 330 23 to to TO work_dzeata5onzf7rp26j2quaotjza 330 24 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 330 25 the the DT work_dzeata5onzf7rp26j2quaotjza 330 26 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 330 27 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 330 28 exist exist VBP work_dzeata5onzf7rp26j2quaotjza 330 29 anywhere anywhere RB work_dzeata5onzf7rp26j2quaotjza 330 30 the the DT work_dzeata5onzf7rp26j2quaotjza 330 31 application application NN work_dzeata5onzf7rp26j2quaotjza 330 32 is be VBZ work_dzeata5onzf7rp26j2quaotjza 330 33 , , , work_dzeata5onzf7rp26j2quaotjza 330 34 even even RB work_dzeata5onzf7rp26j2quaotjza 330 35 if if IN work_dzeata5onzf7rp26j2quaotjza 330 36 the the DT work_dzeata5onzf7rp26j2quaotjza 330 37 application application NN work_dzeata5onzf7rp26j2quaotjza 330 38 moves move VBZ work_dzeata5onzf7rp26j2quaotjza 330 39 to to IN work_dzeata5onzf7rp26j2quaotjza 330 40 a a DT work_dzeata5onzf7rp26j2quaotjza 330 41 different different JJ work_dzeata5onzf7rp26j2quaotjza 330 42 environment environment NN work_dzeata5onzf7rp26j2quaotjza 330 43 . . . work_dzeata5onzf7rp26j2quaotjza 331 1 Fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 331 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 331 3 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 331 4 with with IN work_dzeata5onzf7rp26j2quaotjza 331 5 embedded embed VBN work_dzeata5onzf7rp26j2quaotjza 331 6 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 331 7 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 331 8 are be VBP work_dzeata5onzf7rp26j2quaotjza 331 9 correlated correlate VBN work_dzeata5onzf7rp26j2quaotjza 331 10 with with IN work_dzeata5onzf7rp26j2quaotjza 331 11 another another DT work_dzeata5onzf7rp26j2quaotjza 331 12 important important JJ work_dzeata5onzf7rp26j2quaotjza 331 13 deployment deployment NN work_dzeata5onzf7rp26j2quaotjza 331 14 concern concern NN work_dzeata5onzf7rp26j2quaotjza 331 15 : : : work_dzeata5onzf7rp26j2quaotjza 331 16 statically statically RB work_dzeata5onzf7rp26j2quaotjza 331 17 imposed impose VBN work_dzeata5onzf7rp26j2quaotjza 331 18 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 331 19 . . . work_dzeata5onzf7rp26j2quaotjza 332 1 Imposing impose VBG work_dzeata5onzf7rp26j2quaotjza 332 2 a a DT work_dzeata5onzf7rp26j2quaotjza 332 3 policy policy NN work_dzeata5onzf7rp26j2quaotjza 332 4 statically statically RB work_dzeata5onzf7rp26j2quaotjza 332 5 , , , work_dzeata5onzf7rp26j2quaotjza 332 6 most most RBS work_dzeata5onzf7rp26j2quaotjza 332 7 often often RB work_dzeata5onzf7rp26j2quaotjza 332 8 using use VBG work_dzeata5onzf7rp26j2quaotjza 332 9 a a DT work_dzeata5onzf7rp26j2quaotjza 332 10 special special JJ work_dzeata5onzf7rp26j2quaotjza 332 11 compiler compiler NN work_dzeata5onzf7rp26j2quaotjza 332 12 or or CC work_dzeata5onzf7rp26j2quaotjza 332 13 program program NN work_dzeata5onzf7rp26j2quaotjza 332 14 re re NN work_dzeata5onzf7rp26j2quaotjza 332 15 - - NN work_dzeata5onzf7rp26j2quaotjza 332 16 writer writer NN work_dzeata5onzf7rp26j2quaotjza 332 17 , , , work_dzeata5onzf7rp26j2quaotjza 332 18 is be VBZ work_dzeata5onzf7rp26j2quaotjza 332 19 advantageous advantageous JJ work_dzeata5onzf7rp26j2quaotjza 332 20 because because IN work_dzeata5onzf7rp26j2quaotjza 332 21 the the DT work_dzeata5onzf7rp26j2quaotjza 332 22 policy policy NN work_dzeata5onzf7rp26j2quaotjza 332 23 and and CC work_dzeata5onzf7rp26j2quaotjza 332 24 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 332 25 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 332 26 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 332 27 can can MD work_dzeata5onzf7rp26j2quaotjza 332 28 travel travel VB work_dzeata5onzf7rp26j2quaotjza 332 29 with with IN work_dzeata5onzf7rp26j2quaotjza 332 30 the the DT work_dzeata5onzf7rp26j2quaotjza 332 31 ap- ap- NN work_dzeata5onzf7rp26j2quaotjza 332 32 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 332 33 et et NNP work_dzeata5onzf7rp26j2quaotjza 332 34 al al NNP work_dzeata5onzf7rp26j2quaotjza 332 35 . . . work_dzeata5onzf7rp26j2quaotjza 333 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 333 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 333 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 333 4 , , , work_dzeata5onzf7rp26j2quaotjza 333 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 333 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 333 7 . . . work_dzeata5onzf7rp26j2quaotjza 334 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 334 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 334 3 , , , work_dzeata5onzf7rp26j2quaotjza 334 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 334 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 334 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 334 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 334 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 334 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 334 10 16/36 16/36 CD work_dzeata5onzf7rp26j2quaotjza 334 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 334 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 334 13 Figure Figure NNP work_dzeata5onzf7rp26j2quaotjza 334 14 5 5 CD work_dzeata5onzf7rp26j2quaotjza 334 15 A a DT work_dzeata5onzf7rp26j2quaotjza 334 16 dendrogram dendrogram NN work_dzeata5onzf7rp26j2quaotjza 334 17 displaying display VBG work_dzeata5onzf7rp26j2quaotjza 334 18 the the DT work_dzeata5onzf7rp26j2quaotjza 334 19 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 334 20 for for IN work_dzeata5onzf7rp26j2quaotjza 334 21 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 334 22 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 334 23 taking take VBG work_dzeata5onzf7rp26j2quaotjza 334 24 into into IN work_dzeata5onzf7rp26j2quaotjza 334 25 account account NN work_dzeata5onzf7rp26j2quaotjza 334 26 all all DT work_dzeata5onzf7rp26j2quaotjza 334 27 categories category NNS work_dzeata5onzf7rp26j2quaotjza 334 28 . . . work_dzeata5onzf7rp26j2quaotjza 335 1 At at IN work_dzeata5onzf7rp26j2quaotjza 335 2 the the DT work_dzeata5onzf7rp26j2quaotjza 335 3 topmost topmost JJS work_dzeata5onzf7rp26j2quaotjza 335 4 level level NN work_dzeata5onzf7rp26j2quaotjza 335 5 , , , work_dzeata5onzf7rp26j2quaotjza 335 6 where where WRB work_dzeata5onzf7rp26j2quaotjza 335 7 two two CD work_dzeata5onzf7rp26j2quaotjza 335 8 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 335 9 exist exist VBP work_dzeata5onzf7rp26j2quaotjza 335 10 , , , work_dzeata5onzf7rp26j2quaotjza 335 11 the the DT work_dzeata5onzf7rp26j2quaotjza 335 12 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 335 13 respectively respectively RB work_dzeata5onzf7rp26j2quaotjza 335 14 represent represent VBP work_dzeata5onzf7rp26j2quaotjza 335 15 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 335 16 that that WDT work_dzeata5onzf7rp26j2quaotjza 335 17 use use VBP work_dzeata5onzf7rp26j2quaotjza 335 18 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 335 19 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 335 20 and and CC work_dzeata5onzf7rp26j2quaotjza 335 21 those those DT work_dzeata5onzf7rp26j2quaotjza 335 22 that that WDT work_dzeata5onzf7rp26j2quaotjza 335 23 use use VBP work_dzeata5onzf7rp26j2quaotjza 335 24 user user NN work_dzeata5onzf7rp26j2quaotjza 335 25 - - HYPH work_dzeata5onzf7rp26j2quaotjza 335 26 defined define VBN work_dzeata5onzf7rp26j2quaotjza 335 27 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 335 28 . . . work_dzeata5onzf7rp26j2quaotjza 336 1 plication plication NN work_dzeata5onzf7rp26j2quaotjza 336 2 and and CC work_dzeata5onzf7rp26j2quaotjza 336 3 overhead overhead NN work_dzeata5onzf7rp26j2quaotjza 336 4 can can MD work_dzeata5onzf7rp26j2quaotjza 336 5 be be VB work_dzeata5onzf7rp26j2quaotjza 336 6 lower low JJR work_dzeata5onzf7rp26j2quaotjza 336 7 as as IN work_dzeata5onzf7rp26j2quaotjza 336 8 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 336 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 336 10 tailored tailor VBN work_dzeata5onzf7rp26j2quaotjza 336 11 to to IN work_dzeata5onzf7rp26j2quaotjza 336 12 the the DT work_dzeata5onzf7rp26j2quaotjza 336 13 targeted target VBN work_dzeata5onzf7rp26j2quaotjza 336 14 code code NN work_dzeata5onzf7rp26j2quaotjza 336 15 . . . work_dzeata5onzf7rp26j2quaotjza 337 1 There there EX work_dzeata5onzf7rp26j2quaotjza 337 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 337 3 some some DT work_dzeata5onzf7rp26j2quaotjza 337 4 cons con NNS work_dzeata5onzf7rp26j2quaotjza 337 5 to to IN work_dzeata5onzf7rp26j2quaotjza 337 6 this this DT work_dzeata5onzf7rp26j2quaotjza 337 7 approach approach NN work_dzeata5onzf7rp26j2quaotjza 337 8 . . . work_dzeata5onzf7rp26j2quaotjza 338 1 For for IN work_dzeata5onzf7rp26j2quaotjza 338 2 example example NN work_dzeata5onzf7rp26j2quaotjza 338 3 , , , work_dzeata5onzf7rp26j2quaotjza 338 4 the the DT work_dzeata5onzf7rp26j2quaotjza 338 5 process process NN work_dzeata5onzf7rp26j2quaotjza 338 6 of of IN work_dzeata5onzf7rp26j2quaotjza 338 7 imposing impose VBG work_dzeata5onzf7rp26j2quaotjza 338 8 the the DT work_dzeata5onzf7rp26j2quaotjza 338 9 policy policy NN work_dzeata5onzf7rp26j2quaotjza 338 10 can can MD work_dzeata5onzf7rp26j2quaotjza 338 11 not not RB work_dzeata5onzf7rp26j2quaotjza 338 12 be be VB work_dzeata5onzf7rp26j2quaotjza 338 13 dependent dependent JJ work_dzeata5onzf7rp26j2quaotjza 338 14 on on IN work_dzeata5onzf7rp26j2quaotjza 338 15 information information NN work_dzeata5onzf7rp26j2quaotjza 338 16 that that WDT work_dzeata5onzf7rp26j2quaotjza 338 17 is be VBZ work_dzeata5onzf7rp26j2quaotjza 338 18 only only RB work_dzeata5onzf7rp26j2quaotjza 338 19 available available JJ work_dzeata5onzf7rp26j2quaotjza 338 20 at at IN work_dzeata5onzf7rp26j2quaotjza 338 21 run run NN work_dzeata5onzf7rp26j2quaotjza 338 22 - - HYPH work_dzeata5onzf7rp26j2quaotjza 338 23 time time NN work_dzeata5onzf7rp26j2quaotjza 338 24 and and CC work_dzeata5onzf7rp26j2quaotjza 338 25 the the DT work_dzeata5onzf7rp26j2quaotjza 338 26 policy policy NN work_dzeata5onzf7rp26j2quaotjza 338 27 is be VBZ work_dzeata5onzf7rp26j2quaotjza 338 28 relatively relatively RB work_dzeata5onzf7rp26j2quaotjza 338 29 unadaptable unadaptable JJ work_dzeata5onzf7rp26j2quaotjza 338 30 after after IN work_dzeata5onzf7rp26j2quaotjza 338 31 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 338 32 is be VBZ work_dzeata5onzf7rp26j2quaotjza 338 33 set set VBN work_dzeata5onzf7rp26j2quaotjza 338 34 . . . work_dzeata5onzf7rp26j2quaotjza 339 1 Furthermore furthermore RB work_dzeata5onzf7rp26j2quaotjza 339 2 , , , work_dzeata5onzf7rp26j2quaotjza 339 3 because because IN work_dzeata5onzf7rp26j2quaotjza 339 4 the the DT work_dzeata5onzf7rp26j2quaotjza 339 5 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 339 6 are be VBP work_dzeata5onzf7rp26j2quaotjza 339 7 less less RBR work_dzeata5onzf7rp26j2quaotjza 339 8 adaptable adaptable JJ work_dzeata5onzf7rp26j2quaotjza 339 9 , , , work_dzeata5onzf7rp26j2quaotjza 339 10 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 339 11 that that WDT work_dzeata5onzf7rp26j2quaotjza 339 12 statically statically RB work_dzeata5onzf7rp26j2quaotjza 339 13 impose impose VBP work_dzeata5onzf7rp26j2quaotjza 339 14 security security NN work_dzeata5onzf7rp26j2quaotjza 339 15 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 339 16 typically typically RB work_dzeata5onzf7rp26j2quaotjza 339 17 only only RB work_dzeata5onzf7rp26j2quaotjza 339 18 encapsulate encapsulate VBP work_dzeata5onzf7rp26j2quaotjza 339 19 components component NNS work_dzeata5onzf7rp26j2quaotjza 339 20 that that WDT work_dzeata5onzf7rp26j2quaotjza 339 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 339 22 targeted target VBN work_dzeata5onzf7rp26j2quaotjza 339 23 by by IN work_dzeata5onzf7rp26j2quaotjza 339 24 the the DT work_dzeata5onzf7rp26j2quaotjza 339 25 person person NN work_dzeata5onzf7rp26j2quaotjza 339 26 applying apply VBG work_dzeata5onzf7rp26j2quaotjza 339 27 the the DT work_dzeata5onzf7rp26j2quaotjza 339 28 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 339 29 . . . work_dzeata5onzf7rp26j2quaotjza 340 1 These these DT work_dzeata5onzf7rp26j2quaotjza 340 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 340 3 cases case NNS work_dzeata5onzf7rp26j2quaotjza 340 4 where where WRB work_dzeata5onzf7rp26j2quaotjza 340 5 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 340 6 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 340 7 shine shine VBP work_dzeata5onzf7rp26j2quaotjza 340 8 . . . work_dzeata5onzf7rp26j2quaotjza 341 1 Given give VBN work_dzeata5onzf7rp26j2quaotjza 341 2 these these DT work_dzeata5onzf7rp26j2quaotjza 341 3 trade trade NN work_dzeata5onzf7rp26j2quaotjza 341 4 - - HYPH work_dzeata5onzf7rp26j2quaotjza 341 5 offs off NNS work_dzeata5onzf7rp26j2quaotjza 341 6 , , , work_dzeata5onzf7rp26j2quaotjza 341 7 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 341 8 makes make VBZ work_dzeata5onzf7rp26j2quaotjza 341 9 sense sense NN work_dzeata5onzf7rp26j2quaotjza 341 10 that that IN work_dzeata5onzf7rp26j2quaotjza 341 11 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 341 12 in in IN work_dzeata5onzf7rp26j2quaotjza 341 13 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 341 14 set set NN work_dzeata5onzf7rp26j2quaotjza 341 15 fall fall NN work_dzeata5onzf7rp26j2quaotjza 341 16 into into IN work_dzeata5onzf7rp26j2quaotjza 341 17 one one CD work_dzeata5onzf7rp26j2quaotjza 341 18 of of IN work_dzeata5onzf7rp26j2quaotjza 341 19 two two CD work_dzeata5onzf7rp26j2quaotjza 341 20 clus- clus- NN work_dzeata5onzf7rp26j2quaotjza 341 21 ters ter NNS work_dzeata5onzf7rp26j2quaotjza 341 22 when when WRB work_dzeata5onzf7rp26j2quaotjza 341 23 all all DT work_dzeata5onzf7rp26j2quaotjza 341 24 codes code NNS work_dzeata5onzf7rp26j2quaotjza 341 25 are be VBP work_dzeata5onzf7rp26j2quaotjza 341 26 considered consider VBN work_dzeata5onzf7rp26j2quaotjza 341 27 : : : work_dzeata5onzf7rp26j2quaotjza 341 28 those those DT work_dzeata5onzf7rp26j2quaotjza 341 29 that that WDT work_dzeata5onzf7rp26j2quaotjza 341 30 are be VBP work_dzeata5onzf7rp26j2quaotjza 341 31 protecting protect VBG work_dzeata5onzf7rp26j2quaotjza 341 32 memory memory NN work_dzeata5onzf7rp26j2quaotjza 341 33 and and CC work_dzeata5onzf7rp26j2quaotjza 341 34 software software NN work_dzeata5onzf7rp26j2quaotjza 341 35 code code NN work_dzeata5onzf7rp26j2quaotjza 341 36 , , , work_dzeata5onzf7rp26j2quaotjza 341 37 which which WDT work_dzeata5onzf7rp26j2quaotjza 341 38 are be VBP work_dzeata5onzf7rp26j2quaotjza 341 39 relatively relatively RB work_dzeata5onzf7rp26j2quaotjza 341 40 easy easy JJ work_dzeata5onzf7rp26j2quaotjza 341 41 to to TO work_dzeata5onzf7rp26j2quaotjza 341 42 encapsulate encapsulate VB work_dzeata5onzf7rp26j2quaotjza 341 43 with with IN work_dzeata5onzf7rp26j2quaotjza 341 44 a a DT work_dzeata5onzf7rp26j2quaotjza 341 45 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 341 46 policy policy NN work_dzeata5onzf7rp26j2quaotjza 341 47 , , , work_dzeata5onzf7rp26j2quaotjza 341 48 and and CC work_dzeata5onzf7rp26j2quaotjza 341 49 those those DT work_dzeata5onzf7rp26j2quaotjza 341 50 managing manage VBG work_dzeata5onzf7rp26j2quaotjza 341 51 behaviors behavior NNS work_dzeata5onzf7rp26j2quaotjza 341 52 manifested manifest VBN work_dzeata5onzf7rp26j2quaotjza 341 53 in in IN work_dzeata5onzf7rp26j2quaotjza 341 54 external external JJ work_dzeata5onzf7rp26j2quaotjza 341 55 application application NN work_dzeata5onzf7rp26j2quaotjza 341 56 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 341 57 or or CC work_dzeata5onzf7rp26j2quaotjza 341 58 interactions interaction NNS work_dzeata5onzf7rp26j2quaotjza 341 59 with with IN work_dzeata5onzf7rp26j2quaotjza 341 60 user user NN work_dzeata5onzf7rp26j2quaotjza 341 61 - - HYPH work_dzeata5onzf7rp26j2quaotjza 341 62 data datum NNS work_dzeata5onzf7rp26j2quaotjza 341 63 and and CC work_dzeata5onzf7rp26j2quaotjza 341 64 files file NNS work_dzeata5onzf7rp26j2quaotjza 341 65 that that WDT work_dzeata5onzf7rp26j2quaotjza 341 66 are be VBP work_dzeata5onzf7rp26j2quaotjza 341 67 more more RBR work_dzeata5onzf7rp26j2quaotjza 341 68 easily easily RB work_dzeata5onzf7rp26j2quaotjza 341 69 encapsulated encapsulate VBN work_dzeata5onzf7rp26j2quaotjza 341 70 with with IN work_dzeata5onzf7rp26j2quaotjza 341 71 an an DT work_dzeata5onzf7rp26j2quaotjza 341 72 adaptable adaptable JJ work_dzeata5onzf7rp26j2quaotjza 341 73 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 341 74 typically typically RB work_dzeata5onzf7rp26j2quaotjza 341 75 user user NN work_dzeata5onzf7rp26j2quaotjza 341 76 - - HYPH work_dzeata5onzf7rp26j2quaotjza 341 77 defined define VBN work_dzeata5onzf7rp26j2quaotjza 341 78 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 341 79 policy policy NN work_dzeata5onzf7rp26j2quaotjza 341 80 . . . work_dzeata5onzf7rp26j2quaotjza 342 1 Generally generally RB work_dzeata5onzf7rp26j2quaotjza 342 2 hybrid hybrid JJ work_dzeata5onzf7rp26j2quaotjza 342 3 deployments deployment NNS work_dzeata5onzf7rp26j2quaotjza 342 4 are be VBP work_dzeata5onzf7rp26j2quaotjza 342 5 used use VBN work_dzeata5onzf7rp26j2quaotjza 342 6 when when WRB work_dzeata5onzf7rp26j2quaotjza 342 7 the the DT work_dzeata5onzf7rp26j2quaotjza 342 8 approach approach NN work_dzeata5onzf7rp26j2quaotjza 342 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 342 10 necessarily necessarily RB work_dzeata5onzf7rp26j2quaotjza 342 11 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 342 12 but but CC work_dzeata5onzf7rp26j2quaotjza 342 13 static static JJ work_dzeata5onzf7rp26j2quaotjza 342 14 pre pre JJ work_dzeata5onzf7rp26j2quaotjza 342 15 - - JJ work_dzeata5onzf7rp26j2quaotjza 342 16 processing processing JJ work_dzeata5onzf7rp26j2quaotjza 342 17 lowers lower NNS work_dzeata5onzf7rp26j2quaotjza 342 18 overhead overhead RB work_dzeata5onzf7rp26j2quaotjza 342 19 . . . work_dzeata5onzf7rp26j2quaotjza 343 1 Sometimes sometimes RB work_dzeata5onzf7rp26j2quaotjza 343 2 , , , work_dzeata5onzf7rp26j2quaotjza 343 3 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 343 4 begin begin VBP work_dzeata5onzf7rp26j2quaotjza 343 5 as as IN work_dzeata5onzf7rp26j2quaotjza 343 6 hybrid hybrid JJ work_dzeata5onzf7rp26j2quaotjza 343 7 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 343 8 and and CC work_dzeata5onzf7rp26j2quaotjza 343 9 evolve evolve VB work_dzeata5onzf7rp26j2quaotjza 343 10 to to TO work_dzeata5onzf7rp26j2quaotjza 343 11 fully fully RB work_dzeata5onzf7rp26j2quaotjza 343 12 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 343 13 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 343 14 as as IN work_dzeata5onzf7rp26j2quaotjza 343 15 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 343 16 gain gain VBP work_dzeata5onzf7rp26j2quaotjza 343 17 traction traction NN work_dzeata5onzf7rp26j2quaotjza 343 18 . . . work_dzeata5onzf7rp26j2quaotjza 344 1 For for IN work_dzeata5onzf7rp26j2quaotjza 344 2 example example NN work_dzeata5onzf7rp26j2quaotjza 344 3 , , , work_dzeata5onzf7rp26j2quaotjza 344 4 early early JJ work_dzeata5onzf7rp26j2quaotjza 344 5 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 344 6 that that WDT work_dzeata5onzf7rp26j2quaotjza 344 7 introduce introduce VBP work_dzeata5onzf7rp26j2quaotjza 344 8 diversity diversity NN work_dzeata5onzf7rp26j2quaotjza 344 9 in in IN work_dzeata5onzf7rp26j2quaotjza 344 10 binaries binary NNS work_dzeata5onzf7rp26j2quaotjza 344 11 to to TO work_dzeata5onzf7rp26j2quaotjza 344 12 make make VB work_dzeata5onzf7rp26j2quaotjza 344 13 reliable reliable JJ work_dzeata5onzf7rp26j2quaotjza 344 14 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 344 15 harder hard JJR work_dzeata5onzf7rp26j2quaotjza 344 16 to to TO work_dzeata5onzf7rp26j2quaotjza 344 17 write write VB work_dzeata5onzf7rp26j2quaotjza 344 18 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 344 19 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 344 20 , , , work_dzeata5onzf7rp26j2quaotjza 344 21 code code NN work_dzeata5onzf7rp26j2quaotjza 344 22 randomization randomization NN work_dzeata5onzf7rp26j2quaotjza 344 23 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 344 24 , , , work_dzeata5onzf7rp26j2quaotjza 344 25 tend tend VBP work_dzeata5onzf7rp26j2quaotjza 344 26 to to TO work_dzeata5onzf7rp26j2quaotjza 344 27 rely rely VB work_dzeata5onzf7rp26j2quaotjza 344 28 on on IN work_dzeata5onzf7rp26j2quaotjza 344 29 compiler compiler NN work_dzeata5onzf7rp26j2quaotjza 344 30 - - HYPH work_dzeata5onzf7rp26j2quaotjza 344 31 introduced introduce VBN work_dzeata5onzf7rp26j2quaotjza 344 32 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 344 33 , , , work_dzeata5onzf7rp26j2quaotjza 344 34 while while IN work_dzeata5onzf7rp26j2quaotjza 344 35 later later JJ work_dzeata5onzf7rp26j2quaotjza 344 36 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 344 37 did do VBD work_dzeata5onzf7rp26j2quaotjza 344 38 not not RB work_dzeata5onzf7rp26j2quaotjza 344 39 need need VB work_dzeata5onzf7rp26j2quaotjza 344 40 the the DT work_dzeata5onzf7rp26j2quaotjza 344 41 extra extra JJ work_dzeata5onzf7rp26j2quaotjza 344 42 help help NN work_dzeata5onzf7rp26j2quaotjza 344 43 . . . work_dzeata5onzf7rp26j2quaotjza 345 1 This this DT work_dzeata5onzf7rp26j2quaotjza 345 2 evolution evolution NN work_dzeata5onzf7rp26j2quaotjza 345 3 broadens broaden VBZ work_dzeata5onzf7rp26j2quaotjza 345 4 the the DT work_dzeata5onzf7rp26j2quaotjza 345 5 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 345 6 of of IN work_dzeata5onzf7rp26j2quaotjza 345 7 the the DT work_dzeata5onzf7rp26j2quaotjza 345 8 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 345 9 technique technique NN work_dzeata5onzf7rp26j2quaotjza 345 10 . . . work_dzeata5onzf7rp26j2quaotjza 346 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 346 2 observed observe VBD work_dzeata5onzf7rp26j2quaotjza 346 3 other other JJ work_dzeata5onzf7rp26j2quaotjza 346 4 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 346 5 such such JJ work_dzeata5onzf7rp26j2quaotjza 346 6 as as IN work_dzeata5onzf7rp26j2quaotjza 346 7 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 346 8 and and CC work_dzeata5onzf7rp26j2quaotjza 346 9 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 346 10 evolve evolve VB work_dzeata5onzf7rp26j2quaotjza 346 11 by by IN work_dzeata5onzf7rp26j2quaotjza 346 12 reducing reduce VBG work_dzeata5onzf7rp26j2quaotjza 346 13 the the DT work_dzeata5onzf7rp26j2quaotjza 346 14 number number NN work_dzeata5onzf7rp26j2quaotjza 346 15 of of IN work_dzeata5onzf7rp26j2quaotjza 346 16 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 346 17 on on IN work_dzeata5onzf7rp26j2quaotjza 346 18 the the DT work_dzeata5onzf7rp26j2quaotjza 346 19 application application NN work_dzeata5onzf7rp26j2quaotjza 346 20 , , , work_dzeata5onzf7rp26j2quaotjza 346 21 the the DT work_dzeata5onzf7rp26j2quaotjza 346 22 person person NN work_dzeata5onzf7rp26j2quaotjza 346 23 applying apply VBG work_dzeata5onzf7rp26j2quaotjza 346 24 the the DT work_dzeata5onzf7rp26j2quaotjza 346 25 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 346 26 , , , work_dzeata5onzf7rp26j2quaotjza 346 27 or or CC work_dzeata5onzf7rp26j2quaotjza 346 28 both both DT work_dzeata5onzf7rp26j2quaotjza 346 29 . . . work_dzeata5onzf7rp26j2quaotjza 347 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 347 2 et et FW work_dzeata5onzf7rp26j2quaotjza 347 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 347 4 . . . work_dzeata5onzf7rp26j2quaotjza 348 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 348 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 348 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 348 4 , , , work_dzeata5onzf7rp26j2quaotjza 348 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 348 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 348 7 . . . work_dzeata5onzf7rp26j2quaotjza 349 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 349 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 349 3 , , , work_dzeata5onzf7rp26j2quaotjza 349 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 349 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 349 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 349 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 349 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 349 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 349 10 17/36 17/36 CD work_dzeata5onzf7rp26j2quaotjza 349 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 349 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 349 13 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 349 14 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 349 15 as as IN work_dzeata5onzf7rp26j2quaotjza 349 16 a a DT work_dzeata5onzf7rp26j2quaotjza 349 17 usability usability NN work_dzeata5onzf7rp26j2quaotjza 349 18 bellwether bellwether NN work_dzeata5onzf7rp26j2quaotjza 349 19 Requiring require VBG work_dzeata5onzf7rp26j2quaotjza 349 20 more more JJR work_dzeata5onzf7rp26j2quaotjza 349 21 work work NN work_dzeata5onzf7rp26j2quaotjza 349 22 out out IN work_dzeata5onzf7rp26j2quaotjza 349 23 of of IN work_dzeata5onzf7rp26j2quaotjza 349 24 the the DT work_dzeata5onzf7rp26j2quaotjza 349 25 user user NN work_dzeata5onzf7rp26j2quaotjza 349 26 or or CC work_dzeata5onzf7rp26j2quaotjza 349 27 more more RBR work_dzeata5onzf7rp26j2quaotjza 349 28 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 349 29 attributes attribute NNS work_dzeata5onzf7rp26j2quaotjza 349 30 of of IN work_dzeata5onzf7rp26j2quaotjza 349 31 an an DT work_dzeata5onzf7rp26j2quaotjza 349 32 application application NN work_dzeata5onzf7rp26j2quaotjza 349 33 lowers lower VBZ work_dzeata5onzf7rp26j2quaotjza 349 34 the the DT work_dzeata5onzf7rp26j2quaotjza 349 35 odds odd NNS work_dzeata5onzf7rp26j2quaotjza 349 36 that that WDT work_dzeata5onzf7rp26j2quaotjza 349 37 a a DT work_dzeata5onzf7rp26j2quaotjza 349 38 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 349 39 will will MD work_dzeata5onzf7rp26j2quaotjza 349 40 be be VB work_dzeata5onzf7rp26j2quaotjza 349 41 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 349 42 , , , work_dzeata5onzf7rp26j2quaotjza 349 43 thus thus RB work_dzeata5onzf7rp26j2quaotjza 349 44 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 349 45 is be VBZ work_dzeata5onzf7rp26j2quaotjza 349 46 natural natural JJ work_dzeata5onzf7rp26j2quaotjza 349 47 that that IN work_dzeata5onzf7rp26j2quaotjza 349 48 research research NN work_dzeata5onzf7rp26j2quaotjza 349 49 on on IN work_dzeata5onzf7rp26j2quaotjza 349 50 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 349 51 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 349 52 reduce reduce VBP work_dzeata5onzf7rp26j2quaotjza 349 53 these these DT work_dzeata5onzf7rp26j2quaotjza 349 54 burdens burden NNS work_dzeata5onzf7rp26j2quaotjza 349 55 over over IN work_dzeata5onzf7rp26j2quaotjza 349 56 time time NN work_dzeata5onzf7rp26j2quaotjza 349 57 . . . work_dzeata5onzf7rp26j2quaotjza 350 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 350 2 find find VBP work_dzeata5onzf7rp26j2quaotjza 350 3 that that IN work_dzeata5onzf7rp26j2quaotjza 350 4 the the DT work_dzeata5onzf7rp26j2quaotjza 350 5 nature nature NN work_dzeata5onzf7rp26j2quaotjza 350 6 of of IN work_dzeata5onzf7rp26j2quaotjza 350 7 the the DT work_dzeata5onzf7rp26j2quaotjza 350 8 policy policy NN work_dzeata5onzf7rp26j2quaotjza 350 9 has have VBZ work_dzeata5onzf7rp26j2quaotjza 350 10 an an DT work_dzeata5onzf7rp26j2quaotjza 350 11 influence influence NN work_dzeata5onzf7rp26j2quaotjza 350 12 on on IN work_dzeata5onzf7rp26j2quaotjza 350 13 how how WRB work_dzeata5onzf7rp26j2quaotjza 350 14 burdensome burdensome IN work_dzeata5onzf7rp26j2quaotjza 350 15 a a DT work_dzeata5onzf7rp26j2quaotjza 350 16 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 350 17 is be VBZ work_dzeata5onzf7rp26j2quaotjza 350 18 . . . work_dzeata5onzf7rp26j2quaotjza 351 1 About about IN work_dzeata5onzf7rp26j2quaotjza 351 2 half half NN work_dzeata5onzf7rp26j2quaotjza 351 3 of of IN work_dzeata5onzf7rp26j2quaotjza 351 4 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 351 5 with with IN work_dzeata5onzf7rp26j2quaotjza 351 6 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 351 7 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 351 8 require require VBP work_dzeata5onzf7rp26j2quaotjza 351 9 the the DT work_dzeata5onzf7rp26j2quaotjza 351 10 application application NN work_dzeata5onzf7rp26j2quaotjza 351 11 be be VB work_dzeata5onzf7rp26j2quaotjza 351 12 compiled compile VBN work_dzeata5onzf7rp26j2quaotjza 351 13 using use VBG work_dzeata5onzf7rp26j2quaotjza 351 14 a a DT work_dzeata5onzf7rp26j2quaotjza 351 15 special special JJ work_dzeata5onzf7rp26j2quaotjza 351 16 compiler compiler NN work_dzeata5onzf7rp26j2quaotjza 351 17 or or CC work_dzeata5onzf7rp26j2quaotjza 351 18 uses use VBZ work_dzeata5onzf7rp26j2quaotjza 351 19 a a DT work_dzeata5onzf7rp26j2quaotjza 351 20 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 351 21 - - HYPH work_dzeata5onzf7rp26j2quaotjza 351 22 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 351 23 framework framework NN work_dzeata5onzf7rp26j2quaotjza 351 24 or or CC work_dzeata5onzf7rp26j2quaotjza 351 25 library library NN work_dzeata5onzf7rp26j2quaotjza 351 26 . . . work_dzeata5onzf7rp26j2quaotjza 352 1 Many many JJ work_dzeata5onzf7rp26j2quaotjza 352 2 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 352 3 - - HYPH work_dzeata5onzf7rp26j2quaotjza 352 4 policy policy NN work_dzeata5onzf7rp26j2quaotjza 352 5 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 352 6 also also RB work_dzeata5onzf7rp26j2quaotjza 352 7 require require VBP work_dzeata5onzf7rp26j2quaotjza 352 8 the the DT work_dzeata5onzf7rp26j2quaotjza 352 9 user user NN work_dzeata5onzf7rp26j2quaotjza 352 10 to to TO work_dzeata5onzf7rp26j2quaotjza 352 11 run run VB work_dzeata5onzf7rp26j2quaotjza 352 12 a a DT work_dzeata5onzf7rp26j2quaotjza 352 13 tool tool NN work_dzeata5onzf7rp26j2quaotjza 352 14 , , , work_dzeata5onzf7rp26j2quaotjza 352 15 often often RB work_dzeata5onzf7rp26j2quaotjza 352 16 a a DT work_dzeata5onzf7rp26j2quaotjza 352 17 program program NN work_dzeata5onzf7rp26j2quaotjza 352 18 re re NN work_dzeata5onzf7rp26j2quaotjza 352 19 - - NN work_dzeata5onzf7rp26j2quaotjza 352 20 writer writer NN work_dzeata5onzf7rp26j2quaotjza 352 21 , , , work_dzeata5onzf7rp26j2quaotjza 352 22 or or CC work_dzeata5onzf7rp26j2quaotjza 352 23 to to TO work_dzeata5onzf7rp26j2quaotjza 352 24 install install VB work_dzeata5onzf7rp26j2quaotjza 352 25 some some DT work_dzeata5onzf7rp26j2quaotjza 352 26 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 352 27 component component NN work_dzeata5onzf7rp26j2quaotjza 352 28 . . . work_dzeata5onzf7rp26j2quaotjza 353 1 In in IN work_dzeata5onzf7rp26j2quaotjza 353 2 comparison comparison NN work_dzeata5onzf7rp26j2quaotjza 353 3 , , , work_dzeata5onzf7rp26j2quaotjza 353 4 nearly nearly RB work_dzeata5onzf7rp26j2quaotjza 353 5 all all DT work_dzeata5onzf7rp26j2quaotjza 353 6 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 353 7 with with IN work_dzeata5onzf7rp26j2quaotjza 353 8 flexible flexible JJ work_dzeata5onzf7rp26j2quaotjza 353 9 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 353 10 require require VBP work_dzeata5onzf7rp26j2quaotjza 353 11 the the DT work_dzeata5onzf7rp26j2quaotjza 353 12 user user NN work_dzeata5onzf7rp26j2quaotjza 353 13 to to TO work_dzeata5onzf7rp26j2quaotjza 353 14 write write VB work_dzeata5onzf7rp26j2quaotjza 353 15 a a DT work_dzeata5onzf7rp26j2quaotjza 353 16 policy policy NN work_dzeata5onzf7rp26j2quaotjza 353 17 manually manually RB work_dzeata5onzf7rp26j2quaotjza 353 18 , , , work_dzeata5onzf7rp26j2quaotjza 353 19 but but CC work_dzeata5onzf7rp26j2quaotjza 353 20 few few JJ work_dzeata5onzf7rp26j2quaotjza 353 21 have have VBP work_dzeata5onzf7rp26j2quaotjza 353 22 additional additional JJ work_dzeata5onzf7rp26j2quaotjza 353 23 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 353 24 for for IN work_dzeata5onzf7rp26j2quaotjza 353 25 the the DT work_dzeata5onzf7rp26j2quaotjza 353 26 application application NN work_dzeata5onzf7rp26j2quaotjza 353 27 . . . work_dzeata5onzf7rp26j2quaotjza 354 1 Given give VBN work_dzeata5onzf7rp26j2quaotjza 354 2 the the DT work_dzeata5onzf7rp26j2quaotjza 354 3 burdens burden NNS work_dzeata5onzf7rp26j2quaotjza 354 4 involved involve VBN work_dzeata5onzf7rp26j2quaotjza 354 5 in in IN work_dzeata5onzf7rp26j2quaotjza 354 6 manually manually RB work_dzeata5onzf7rp26j2quaotjza 354 7 writing write VBG work_dzeata5onzf7rp26j2quaotjza 354 8 a a DT work_dzeata5onzf7rp26j2quaotjza 354 9 security security NN work_dzeata5onzf7rp26j2quaotjza 354 10 policy policy NN work_dzeata5onzf7rp26j2quaotjza 354 11 , , , work_dzeata5onzf7rp26j2quaotjza 354 12 the the DT work_dzeata5onzf7rp26j2quaotjza 354 13 message message NN work_dzeata5onzf7rp26j2quaotjza 354 14 is be VBZ work_dzeata5onzf7rp26j2quaotjza 354 15 clear clear JJ work_dzeata5onzf7rp26j2quaotjza 354 16 — — : work_dzeata5onzf7rp26j2quaotjza 354 17 easy easy JJ work_dzeata5onzf7rp26j2quaotjza 354 18 to to TO work_dzeata5onzf7rp26j2quaotjza 354 19 use use VB work_dzeata5onzf7rp26j2quaotjza 354 20 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 354 21 reduce reduce VB work_dzeata5onzf7rp26j2quaotjza 354 22 the the DT work_dzeata5onzf7rp26j2quaotjza 354 23 user user NN work_dzeata5onzf7rp26j2quaotjza 354 24 - - HYPH work_dzeata5onzf7rp26j2quaotjza 354 25 facing face VBG work_dzeata5onzf7rp26j2quaotjza 354 26 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 354 27 of of IN work_dzeata5onzf7rp26j2quaotjza 354 28 the the DT work_dzeata5onzf7rp26j2quaotjza 354 29 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 354 30 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 354 31 impose impose VBP work_dzeata5onzf7rp26j2quaotjza 354 32 . . . work_dzeata5onzf7rp26j2quaotjza 355 1 Forty forty CD work_dzeata5onzf7rp26j2quaotjza 355 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 355 3 eight eight CD work_dzeata5onzf7rp26j2quaotjza 355 4 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 355 5 , , , work_dzeata5onzf7rp26j2quaotjza 355 6 more more JJR work_dzeata5onzf7rp26j2quaotjza 355 7 than than IN work_dzeata5onzf7rp26j2quaotjza 355 8 two two CD work_dzeata5onzf7rp26j2quaotjza 355 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 355 10 thirds third NNS work_dzeata5onzf7rp26j2quaotjza 355 11 of of IN work_dzeata5onzf7rp26j2quaotjza 355 12 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 355 13 sample sample NN work_dzeata5onzf7rp26j2quaotjza 355 14 , , , work_dzeata5onzf7rp26j2quaotjza 355 15 use use VB work_dzeata5onzf7rp26j2quaotjza 355 16 a a DT work_dzeata5onzf7rp26j2quaotjza 355 17 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 355 18 policy policy NN work_dzeata5onzf7rp26j2quaotjza 355 19 . . . work_dzeata5onzf7rp26j2quaotjza 356 1 In in IN work_dzeata5onzf7rp26j2quaotjza 356 2 all all DT work_dzeata5onzf7rp26j2quaotjza 356 3 of of IN work_dzeata5onzf7rp26j2quaotjza 356 4 these these DT work_dzeata5onzf7rp26j2quaotjza 356 5 cases case NNS work_dzeata5onzf7rp26j2quaotjza 356 6 the the DT work_dzeata5onzf7rp26j2quaotjza 356 7 policy policy NN work_dzeata5onzf7rp26j2quaotjza 356 8 itself -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 356 9 exists exist VBZ work_dzeata5onzf7rp26j2quaotjza 356 10 within within IN work_dzeata5onzf7rp26j2quaotjza 356 11 the the DT work_dzeata5onzf7rp26j2quaotjza 356 12 logic logic NN work_dzeata5onzf7rp26j2quaotjza 356 13 of of IN work_dzeata5onzf7rp26j2quaotjza 356 14 the the DT work_dzeata5onzf7rp26j2quaotjza 356 15 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 356 16 . . . work_dzeata5onzf7rp26j2quaotjza 357 1 In in IN work_dzeata5onzf7rp26j2quaotjza 357 2 the the DT work_dzeata5onzf7rp26j2quaotjza 357 3 remaining remain VBG work_dzeata5onzf7rp26j2quaotjza 357 4 cases case NNS work_dzeata5onzf7rp26j2quaotjza 357 5 , , , work_dzeata5onzf7rp26j2quaotjza 357 6 the the DT work_dzeata5onzf7rp26j2quaotjza 357 7 policy policy NN work_dzeata5onzf7rp26j2quaotjza 357 8 is be VBZ work_dzeata5onzf7rp26j2quaotjza 357 9 encoded encode VBN work_dzeata5onzf7rp26j2quaotjza 357 10 in in IN work_dzeata5onzf7rp26j2quaotjza 357 11 the the DT work_dzeata5onzf7rp26j2quaotjza 357 12 logic logic NN work_dzeata5onzf7rp26j2quaotjza 357 13 of of IN work_dzeata5onzf7rp26j2quaotjza 357 14 the the DT work_dzeata5onzf7rp26j2quaotjza 357 15 application application NN work_dzeata5onzf7rp26j2quaotjza 357 16 twice twice RB work_dzeata5onzf7rp26j2quaotjza 357 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 357 18 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 357 19 , , , work_dzeata5onzf7rp26j2quaotjza 357 20 through through IN work_dzeata5onzf7rp26j2quaotjza 357 21 the the DT work_dzeata5onzf7rp26j2quaotjza 357 22 use use NN work_dzeata5onzf7rp26j2quaotjza 357 23 of of IN work_dzeata5onzf7rp26j2quaotjza 357 24 the the DT work_dzeata5onzf7rp26j2quaotjza 357 25 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 357 26 as as IN work_dzeata5onzf7rp26j2quaotjza 357 27 a a DT work_dzeata5onzf7rp26j2quaotjza 357 28 framework framework NN work_dzeata5onzf7rp26j2quaotjza 357 29 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 357 30 , , , work_dzeata5onzf7rp26j2quaotjza 357 31 and and CC work_dzeata5onzf7rp26j2quaotjza 357 32 the the DT work_dzeata5onzf7rp26j2quaotjza 357 33 remaining remain VBG work_dzeata5onzf7rp26j2quaotjza 357 34 seventeen seventeen CD work_dzeata5onzf7rp26j2quaotjza 357 35 cases case NNS work_dzeata5onzf7rp26j2quaotjza 357 36 require require VBP work_dzeata5onzf7rp26j2quaotjza 357 37 the the DT work_dzeata5onzf7rp26j2quaotjza 357 38 user user NN work_dzeata5onzf7rp26j2quaotjza 357 39 to to TO work_dzeata5onzf7rp26j2quaotjza 357 40 manually manually RB work_dzeata5onzf7rp26j2quaotjza 357 41 write write VB work_dzeata5onzf7rp26j2quaotjza 357 42 a a DT work_dzeata5onzf7rp26j2quaotjza 357 43 policy policy NN work_dzeata5onzf7rp26j2quaotjza 357 44 . . . work_dzeata5onzf7rp26j2quaotjza 358 1 In in IN work_dzeata5onzf7rp26j2quaotjza 358 2 cases case NNS work_dzeata5onzf7rp26j2quaotjza 358 3 where where WRB work_dzeata5onzf7rp26j2quaotjza 358 4 the the DT work_dzeata5onzf7rp26j2quaotjza 358 5 user user NN work_dzeata5onzf7rp26j2quaotjza 358 6 must must MD work_dzeata5onzf7rp26j2quaotjza 358 7 manually manually RB work_dzeata5onzf7rp26j2quaotjza 358 8 write write VB work_dzeata5onzf7rp26j2quaotjza 358 9 the the DT work_dzeata5onzf7rp26j2quaotjza 358 10 policy policy NN work_dzeata5onzf7rp26j2quaotjza 358 11 , , , work_dzeata5onzf7rp26j2quaotjza 358 12 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 358 13 would would MD work_dzeata5onzf7rp26j2quaotjza 358 14 help help VB work_dzeata5onzf7rp26j2quaotjza 358 15 the the DT work_dzeata5onzf7rp26j2quaotjza 358 16 user user NN work_dzeata5onzf7rp26j2quaotjza 358 17 if if IN work_dzeata5onzf7rp26j2quaotjza 358 18 the the DT work_dzeata5onzf7rp26j2quaotjza 358 19 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 358 20 supported support VBD work_dzeata5onzf7rp26j2quaotjza 358 21 a a DT work_dzeata5onzf7rp26j2quaotjza 358 22 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 358 23 for for IN work_dzeata5onzf7rp26j2quaotjza 358 24 managing manage VBG work_dzeata5onzf7rp26j2quaotjza 358 25 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 358 26 — — : work_dzeata5onzf7rp26j2quaotjza 358 27 to to TO work_dzeata5onzf7rp26j2quaotjza 358 28 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 358 29 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 358 30 do do VBP work_dzeata5onzf7rp26j2quaotjza 358 31 not not RB work_dzeata5onzf7rp26j2quaotjza 358 32 have have VB work_dzeata5onzf7rp26j2quaotjza 358 33 to to TO work_dzeata5onzf7rp26j2quaotjza 358 34 be be VB work_dzeata5onzf7rp26j2quaotjza 358 35 duplicated duplicate VBN work_dzeata5onzf7rp26j2quaotjza 358 36 repeatedly repeatedly RB work_dzeata5onzf7rp26j2quaotjza 358 37 for for IN work_dzeata5onzf7rp26j2quaotjza 358 38 the the DT work_dzeata5onzf7rp26j2quaotjza 358 39 same same JJ work_dzeata5onzf7rp26j2quaotjza 358 40 application application NN work_dzeata5onzf7rp26j2quaotjza 358 41 , , , work_dzeata5onzf7rp26j2quaotjza 358 42 to to TO work_dzeata5onzf7rp26j2quaotjza 358 43 generate generate VB work_dzeata5onzf7rp26j2quaotjza 358 44 starter starter NN work_dzeata5onzf7rp26j2quaotjza 358 45 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 358 46 for for IN work_dzeata5onzf7rp26j2quaotjza 358 47 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 358 48 cases case NNS work_dzeata5onzf7rp26j2quaotjza 358 49 , , , work_dzeata5onzf7rp26j2quaotjza 358 50 to to TO work_dzeata5onzf7rp26j2quaotjza 358 51 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 358 52 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 358 53 can can MD work_dzeata5onzf7rp26j2quaotjza 358 54 apply apply VB work_dzeata5onzf7rp26j2quaotjza 358 55 to to IN work_dzeata5onzf7rp26j2quaotjza 358 56 multiple multiple JJ work_dzeata5onzf7rp26j2quaotjza 358 57 applications application NNS work_dzeata5onzf7rp26j2quaotjza 358 58 , , , work_dzeata5onzf7rp26j2quaotjza 358 59 etc etc FW work_dzeata5onzf7rp26j2quaotjza 358 60 . . . work_dzeata5onzf7rp26j2quaotjza 359 1 This this DT work_dzeata5onzf7rp26j2quaotjza 359 2 type type NN work_dzeata5onzf7rp26j2quaotjza 359 3 of of IN work_dzeata5onzf7rp26j2quaotjza 359 4 management management NN work_dzeata5onzf7rp26j2quaotjza 359 5 reduces reduce VBZ work_dzeata5onzf7rp26j2quaotjza 359 6 the the DT work_dzeata5onzf7rp26j2quaotjza 359 7 burden burden NN work_dzeata5onzf7rp26j2quaotjza 359 8 of of IN work_dzeata5onzf7rp26j2quaotjza 359 9 having have VBG work_dzeata5onzf7rp26j2quaotjza 359 10 to to TO work_dzeata5onzf7rp26j2quaotjza 359 11 manually manually RB work_dzeata5onzf7rp26j2quaotjza 359 12 write write VB work_dzeata5onzf7rp26j2quaotjza 359 13 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 359 14 in in IN work_dzeata5onzf7rp26j2quaotjza 359 15 potentially potentially RB work_dzeata5onzf7rp26j2quaotjza 359 16 complex complex JJ work_dzeata5onzf7rp26j2quaotjza 359 17 custom custom NN work_dzeata5onzf7rp26j2quaotjza 359 18 policy policy NN work_dzeata5onzf7rp26j2quaotjza 359 19 languages language NNS work_dzeata5onzf7rp26j2quaotjza 359 20 . . . work_dzeata5onzf7rp26j2quaotjza 360 1 Support support NN work_dzeata5onzf7rp26j2quaotjza 360 2 for for IN work_dzeata5onzf7rp26j2quaotjza 360 3 the the DT work_dzeata5onzf7rp26j2quaotjza 360 4 policy policy NN work_dzeata5onzf7rp26j2quaotjza 360 5 writer writer NN work_dzeata5onzf7rp26j2quaotjza 360 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 360 7 also also RB work_dzeata5onzf7rp26j2quaotjza 360 8 important important JJ work_dzeata5onzf7rp26j2quaotjza 360 9 because because IN work_dzeata5onzf7rp26j2quaotjza 360 10 the the DT work_dzeata5onzf7rp26j2quaotjza 360 11 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 360 12 them- them- NN work_dzeata5onzf7rp26j2quaotjza 360 13 selves self NNS work_dzeata5onzf7rp26j2quaotjza 360 14 can can MD work_dzeata5onzf7rp26j2quaotjza 360 15 be be VB work_dzeata5onzf7rp26j2quaotjza 360 16 a a DT work_dzeata5onzf7rp26j2quaotjza 360 17 source source NN work_dzeata5onzf7rp26j2quaotjza 360 18 of of IN work_dzeata5onzf7rp26j2quaotjza 360 19 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 360 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 360 21 Rosenberg Rosenberg NNP work_dzeata5onzf7rp26j2quaotjza 360 22 , , , work_dzeata5onzf7rp26j2quaotjza 360 23 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 360 24 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 360 25 . . . work_dzeata5onzf7rp26j2quaotjza 361 1 Eight eight CD work_dzeata5onzf7rp26j2quaotjza 361 2 out out IN work_dzeata5onzf7rp26j2quaotjza 361 3 of of IN work_dzeata5onzf7rp26j2quaotjza 361 4 twenty twenty CD work_dzeata5onzf7rp26j2quaotjza 361 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 361 6 six six CD work_dzeata5onzf7rp26j2quaotjza 361 7 cases case NNS work_dzeata5onzf7rp26j2quaotjza 361 8 where where WRB work_dzeata5onzf7rp26j2quaotjza 361 9 policy policy NN work_dzeata5onzf7rp26j2quaotjza 361 10 management management NN work_dzeata5onzf7rp26j2quaotjza 361 11 is be VBZ work_dzeata5onzf7rp26j2quaotjza 361 12 appropriate appropriate JJ work_dzeata5onzf7rp26j2quaotjza 361 13 offered offer VBD work_dzeata5onzf7rp26j2quaotjza 361 14 some some DT work_dzeata5onzf7rp26j2quaotjza 361 15 central central JJ work_dzeata5onzf7rp26j2quaotjza 361 16 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 361 17 for for IN work_dzeata5onzf7rp26j2quaotjza 361 18 storing store VBG work_dzeata5onzf7rp26j2quaotjza 361 19 ex- ex- XX work_dzeata5onzf7rp26j2quaotjza 361 20 isting iste VBG work_dzeata5onzf7rp26j2quaotjza 361 21 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 361 22 , , , work_dzeata5onzf7rp26j2quaotjza 361 23 where where WRB work_dzeata5onzf7rp26j2quaotjza 361 24 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 361 25 could could MD work_dzeata5onzf7rp26j2quaotjza 361 26 potentially potentially RB work_dzeata5onzf7rp26j2quaotjza 361 27 be be VB work_dzeata5onzf7rp26j2quaotjza 361 28 shared share VBN work_dzeata5onzf7rp26j2quaotjza 361 29 among among IN work_dzeata5onzf7rp26j2quaotjza 361 30 users user NNS work_dzeata5onzf7rp26j2quaotjza 361 31 . . . work_dzeata5onzf7rp26j2quaotjza 362 1 However however RB work_dzeata5onzf7rp26j2quaotjza 362 2 , , , work_dzeata5onzf7rp26j2quaotjza 362 3 none none NN work_dzeata5onzf7rp26j2quaotjza 362 4 of of IN work_dzeata5onzf7rp26j2quaotjza 362 5 the the DT work_dzeata5onzf7rp26j2quaotjza 362 6 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 362 7 in in IN work_dzeata5onzf7rp26j2quaotjza 362 8 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 362 9 sample sample NN work_dzeata5onzf7rp26j2quaotjza 362 10 list list NN work_dzeata5onzf7rp26j2quaotjza 362 11 policy policy NN work_dzeata5onzf7rp26j2quaotjza 362 12 management management NN work_dzeata5onzf7rp26j2quaotjza 362 13 as as IN work_dzeata5onzf7rp26j2quaotjza 362 14 a a DT work_dzeata5onzf7rp26j2quaotjza 362 15 contribution contribution NN work_dzeata5onzf7rp26j2quaotjza 362 16 , , , work_dzeata5onzf7rp26j2quaotjza 362 17 nor nor CC work_dzeata5onzf7rp26j2quaotjza 362 18 do do VBP work_dzeata5onzf7rp26j2quaotjza 362 19 any any DT work_dzeata5onzf7rp26j2quaotjza 362 20 of of IN work_dzeata5onzf7rp26j2quaotjza 362 21 the the DT work_dzeata5onzf7rp26j2quaotjza 362 22 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 362 23 at- at- XX work_dzeata5onzf7rp26j2quaotjza 362 24 tempt tempt VB work_dzeata5onzf7rp26j2quaotjza 362 25 to to TO work_dzeata5onzf7rp26j2quaotjza 362 26 validate validate VB work_dzeata5onzf7rp26j2quaotjza 362 27 any any DT work_dzeata5onzf7rp26j2quaotjza 362 28 management management NN work_dzeata5onzf7rp26j2quaotjza 362 29 constructs construct NNS work_dzeata5onzf7rp26j2quaotjza 362 30 that that WDT work_dzeata5onzf7rp26j2quaotjza 362 31 are be VBP work_dzeata5onzf7rp26j2quaotjza 362 32 present present JJ work_dzeata5onzf7rp26j2quaotjza 362 33 . . . work_dzeata5onzf7rp26j2quaotjza 363 1 However however RB work_dzeata5onzf7rp26j2quaotjza 363 2 , , , work_dzeata5onzf7rp26j2quaotjza 363 3 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 363 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 363 5 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 363 6 that that IN work_dzeata5onzf7rp26j2quaotjza 363 7 there there EX work_dzeata5onzf7rp26j2quaotjza 363 8 are be VBP work_dzeata5onzf7rp26j2quaotjza 363 9 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 363 10 outside outside IN work_dzeata5onzf7rp26j2quaotjza 363 11 of of IN work_dzeata5onzf7rp26j2quaotjza 363 12 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 363 13 target target NN work_dzeata5onzf7rp26j2quaotjza 363 14 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 363 15 that that WDT work_dzeata5onzf7rp26j2quaotjza 363 16 explicitly explicitly RB work_dzeata5onzf7rp26j2quaotjza 363 17 discuss discuss VBP work_dzeata5onzf7rp26j2quaotjza 363 18 management management NN work_dzeata5onzf7rp26j2quaotjza 363 19 . . . work_dzeata5onzf7rp26j2quaotjza 364 1 For for IN work_dzeata5onzf7rp26j2quaotjza 364 2 example example NN work_dzeata5onzf7rp26j2quaotjza 364 3 , , , work_dzeata5onzf7rp26j2quaotjza 364 4 programming programming NN work_dzeata5onzf7rp26j2quaotjza 364 5 languages language NNS work_dzeata5onzf7rp26j2quaotjza 364 6 and and CC work_dzeata5onzf7rp26j2quaotjza 364 7 software software NN work_dzeata5onzf7rp26j2quaotjza 364 8 engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 364 9 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 364 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 364 11 more more RBR work_dzeata5onzf7rp26j2quaotjza 364 12 focused focused JJ work_dzeata5onzf7rp26j2quaotjza 364 13 on on IN work_dzeata5onzf7rp26j2quaotjza 364 14 policy policy NN work_dzeata5onzf7rp26j2quaotjza 364 15 authoring author VBG work_dzeata5onzf7rp26j2quaotjza 364 16 concerns concern NNS work_dzeata5onzf7rp26j2quaotjza 364 17 and and CC work_dzeata5onzf7rp26j2quaotjza 364 18 management management NN work_dzeata5onzf7rp26j2quaotjza 364 19 may may MD work_dzeata5onzf7rp26j2quaotjza 364 20 therefore therefore RB work_dzeata5onzf7rp26j2quaotjza 364 21 be be VB work_dzeata5onzf7rp26j2quaotjza 364 22 the the DT work_dzeata5onzf7rp26j2quaotjza 364 23 focus focus NN work_dzeata5onzf7rp26j2quaotjza 364 24 of of IN work_dzeata5onzf7rp26j2quaotjza 364 25 a a DT work_dzeata5onzf7rp26j2quaotjza 364 26 paper paper NN work_dzeata5onzf7rp26j2quaotjza 364 27 that that WDT work_dzeata5onzf7rp26j2quaotjza 364 28 appears appear VBZ work_dzeata5onzf7rp26j2quaotjza 364 29 in in IN work_dzeata5onzf7rp26j2quaotjza 364 30 one one CD work_dzeata5onzf7rp26j2quaotjza 364 31 of of IN work_dzeata5onzf7rp26j2quaotjza 364 32 those those DT work_dzeata5onzf7rp26j2quaotjza 364 33 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 364 34 . . . work_dzeata5onzf7rp26j2quaotjza 365 1 However however RB work_dzeata5onzf7rp26j2quaotjza 365 2 , , , work_dzeata5onzf7rp26j2quaotjza 365 3 in in IN work_dzeata5onzf7rp26j2quaotjza 365 4 spite spite NN work_dzeata5onzf7rp26j2quaotjza 365 5 of of IN work_dzeata5onzf7rp26j2quaotjza 365 6 the the DT work_dzeata5onzf7rp26j2quaotjza 365 7 fact fact NN work_dzeata5onzf7rp26j2quaotjza 365 8 that that IN work_dzeata5onzf7rp26j2quaotjza 365 9 two two CD work_dzeata5onzf7rp26j2quaotjza 365 10 of of IN work_dzeata5onzf7rp26j2quaotjza 365 11 the the DT work_dzeata5onzf7rp26j2quaotjza 365 12 authors author NNS work_dzeata5onzf7rp26j2quaotjza 365 13 of of IN work_dzeata5onzf7rp26j2quaotjza 365 14 this this DT work_dzeata5onzf7rp26j2quaotjza 365 15 paper paper NN work_dzeata5onzf7rp26j2quaotjza 365 16 are be VBP work_dzeata5onzf7rp26j2quaotjza 365 17 active active JJ work_dzeata5onzf7rp26j2quaotjza 365 18 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 365 19 in in IN work_dzeata5onzf7rp26j2quaotjza 365 20 the the DT work_dzeata5onzf7rp26j2quaotjza 365 21 Programming Programming NNP work_dzeata5onzf7rp26j2quaotjza 365 22 Language Language NNP work_dzeata5onzf7rp26j2quaotjza 365 23 community community NN work_dzeata5onzf7rp26j2quaotjza 365 24 and and CC work_dzeata5onzf7rp26j2quaotjza 365 25 three three CD work_dzeata5onzf7rp26j2quaotjza 365 26 are be VBP work_dzeata5onzf7rp26j2quaotjza 365 27 active active JJ work_dzeata5onzf7rp26j2quaotjza 365 28 in in IN work_dzeata5onzf7rp26j2quaotjza 365 29 the the DT work_dzeata5onzf7rp26j2quaotjza 365 30 Software Software NNP work_dzeata5onzf7rp26j2quaotjza 365 31 Engineering Engineering NNP work_dzeata5onzf7rp26j2quaotjza 365 32 community community NN work_dzeata5onzf7rp26j2quaotjza 365 33 , , , work_dzeata5onzf7rp26j2quaotjza 365 34 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 365 35 are be VBP work_dzeata5onzf7rp26j2quaotjza 365 36 not not RB work_dzeata5onzf7rp26j2quaotjza 365 37 aware aware JJ work_dzeata5onzf7rp26j2quaotjza 365 38 of of IN work_dzeata5onzf7rp26j2quaotjza 365 39 any any DT work_dzeata5onzf7rp26j2quaotjza 365 40 such such JJ work_dzeata5onzf7rp26j2quaotjza 365 41 paper paper NN work_dzeata5onzf7rp26j2quaotjza 365 42 . . . work_dzeata5onzf7rp26j2quaotjza 366 1 The the DT work_dzeata5onzf7rp26j2quaotjza 366 2 state state NN work_dzeata5onzf7rp26j2quaotjza 366 3 of of IN work_dzeata5onzf7rp26j2quaotjza 366 4 practice practice NN work_dzeata5onzf7rp26j2quaotjza 366 5 in in IN work_dzeata5onzf7rp26j2quaotjza 366 6 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 366 7 validation validation NN work_dzeata5onzf7rp26j2quaotjza 366 8 There there EX work_dzeata5onzf7rp26j2quaotjza 366 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 366 10 little little JJ work_dzeata5onzf7rp26j2quaotjza 366 11 variation variation NN work_dzeata5onzf7rp26j2quaotjza 366 12 in in IN work_dzeata5onzf7rp26j2quaotjza 366 13 the the DT work_dzeata5onzf7rp26j2quaotjza 366 14 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 366 15 that that WDT work_dzeata5onzf7rp26j2quaotjza 366 16 are be VBP work_dzeata5onzf7rp26j2quaotjza 366 17 made make VBN work_dzeata5onzf7rp26j2quaotjza 366 18 about about IN work_dzeata5onzf7rp26j2quaotjza 366 19 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 366 20 . . . work_dzeata5onzf7rp26j2quaotjza 367 1 Most Most JJS work_dzeata5onzf7rp26j2quaotjza 367 2 claim claim VBP work_dzeata5onzf7rp26j2quaotjza 367 3 to to IN work_dzeata5onzf7rp26j2quaotjza 367 4 either either CC work_dzeata5onzf7rp26j2quaotjza 367 5 encapsulate encapsulate VB work_dzeata5onzf7rp26j2quaotjza 367 6 a a DT work_dzeata5onzf7rp26j2quaotjza 367 7 set set NN work_dzeata5onzf7rp26j2quaotjza 367 8 of of IN work_dzeata5onzf7rp26j2quaotjza 367 9 threats threat NNS work_dzeata5onzf7rp26j2quaotjza 367 10 or or CC work_dzeata5onzf7rp26j2quaotjza 367 11 to to TO work_dzeata5onzf7rp26j2quaotjza 367 12 increase increase VB work_dzeata5onzf7rp26j2quaotjza 367 13 the the DT work_dzeata5onzf7rp26j2quaotjza 367 14 difficulty difficulty NN work_dzeata5onzf7rp26j2quaotjza 367 15 of of IN work_dzeata5onzf7rp26j2quaotjza 367 16 writing write VBG work_dzeata5onzf7rp26j2quaotjza 367 17 successful successful JJ work_dzeata5onzf7rp26j2quaotjza 367 18 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 367 19 for for IN work_dzeata5onzf7rp26j2quaotjza 367 20 code code NN work_dzeata5onzf7rp26j2quaotjza 367 21 - - HYPH work_dzeata5onzf7rp26j2quaotjza 367 22 level level NN work_dzeata5onzf7rp26j2quaotjza 367 23 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 367 24 . . . work_dzeata5onzf7rp26j2quaotjza 368 1 All all DT work_dzeata5onzf7rp26j2quaotjza 368 2 but but IN work_dzeata5onzf7rp26j2quaotjza 368 3 four four CD work_dzeata5onzf7rp26j2quaotjza 368 4 measure measure NN work_dzeata5onzf7rp26j2quaotjza 368 5 the the DT work_dzeata5onzf7rp26j2quaotjza 368 6 performance performance NN work_dzeata5onzf7rp26j2quaotjza 368 7 overhead overhead RB work_dzeata5onzf7rp26j2quaotjza 368 8 introduced introduce VBN work_dzeata5onzf7rp26j2quaotjza 368 9 by by IN work_dzeata5onzf7rp26j2quaotjza 368 10 the the DT work_dzeata5onzf7rp26j2quaotjza 368 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 368 12 . . . work_dzeata5onzf7rp26j2quaotjza 369 1 Thirty thirty CD work_dzeata5onzf7rp26j2quaotjza 369 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 369 3 seven seven CD work_dzeata5onzf7rp26j2quaotjza 369 4 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 369 5 , , , work_dzeata5onzf7rp26j2quaotjza 369 6 more more JJR work_dzeata5onzf7rp26j2quaotjza 369 7 than than IN work_dzeata5onzf7rp26j2quaotjza 369 8 half half DT work_dzeata5onzf7rp26j2quaotjza 369 9 , , , work_dzeata5onzf7rp26j2quaotjza 369 10 make make VB work_dzeata5onzf7rp26j2quaotjza 369 11 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 369 12 about about IN work_dzeata5onzf7rp26j2quaotjza 369 13 the the DT work_dzeata5onzf7rp26j2quaotjza 369 14 types type NNS work_dzeata5onzf7rp26j2quaotjza 369 15 of of IN work_dzeata5onzf7rp26j2quaotjza 369 16 components component NNS work_dzeata5onzf7rp26j2quaotjza 369 17 the the DT work_dzeata5onzf7rp26j2quaotjza 369 18 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 369 19 applies apply VBZ work_dzeata5onzf7rp26j2quaotjza 369 20 to to TO work_dzeata5onzf7rp26j2quaotjza 369 21 , , , work_dzeata5onzf7rp26j2quaotjza 369 22 typically typically RB work_dzeata5onzf7rp26j2quaotjza 369 23 because because IN work_dzeata5onzf7rp26j2quaotjza 369 24 the the DT work_dzeata5onzf7rp26j2quaotjza 369 25 paper paper NN work_dzeata5onzf7rp26j2quaotjza 369 26 applies apply VBZ work_dzeata5onzf7rp26j2quaotjza 369 27 an an DT work_dzeata5onzf7rp26j2quaotjza 369 28 existing exist VBG work_dzeata5onzf7rp26j2quaotjza 369 29 technique technique NN work_dzeata5onzf7rp26j2quaotjza 369 30 to to IN work_dzeata5onzf7rp26j2quaotjza 369 31 a a DT work_dzeata5onzf7rp26j2quaotjza 369 32 different different JJ work_dzeata5onzf7rp26j2quaotjza 369 33 domain domain NN work_dzeata5onzf7rp26j2quaotjza 369 34 or or CC work_dzeata5onzf7rp26j2quaotjza 369 35 extends extend VBZ work_dzeata5onzf7rp26j2quaotjza 369 36 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 369 37 to to IN work_dzeata5onzf7rp26j2quaotjza 369 38 additional additional JJ work_dzeata5onzf7rp26j2quaotjza 369 39 components component NNS work_dzeata5onzf7rp26j2quaotjza 369 40 . . . work_dzeata5onzf7rp26j2quaotjza 370 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 370 2 et et FW work_dzeata5onzf7rp26j2quaotjza 370 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 370 4 . . . work_dzeata5onzf7rp26j2quaotjza 371 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 371 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 371 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 371 4 , , , work_dzeata5onzf7rp26j2quaotjza 371 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 371 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 371 7 . . . work_dzeata5onzf7rp26j2quaotjza 372 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 372 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 372 3 , , , work_dzeata5onzf7rp26j2quaotjza 372 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 372 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 372 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 372 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 372 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 372 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 372 10 18/36 18/36 CD work_dzeata5onzf7rp26j2quaotjza 372 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_dzeata5onzf7rp26j2quaotjza 372 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 372 13 While while IN work_dzeata5onzf7rp26j2quaotjza 372 14 there there EX work_dzeata5onzf7rp26j2quaotjza 372 15 is be VBZ work_dzeata5onzf7rp26j2quaotjza 372 16 wide wide JJ work_dzeata5onzf7rp26j2quaotjza 372 17 variety variety NN work_dzeata5onzf7rp26j2quaotjza 372 18 in in IN work_dzeata5onzf7rp26j2quaotjza 372 19 how how WRB work_dzeata5onzf7rp26j2quaotjza 372 20 these these DT work_dzeata5onzf7rp26j2quaotjza 372 21 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 372 22 are be VBP work_dzeata5onzf7rp26j2quaotjza 372 23 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 372 24 , , , work_dzeata5onzf7rp26j2quaotjza 372 25 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 372 26 observe observe VBP work_dzeata5onzf7rp26j2quaotjza 372 27 measurable measurable JJ work_dzeata5onzf7rp26j2quaotjza 372 28 patterns pattern NNS work_dzeata5onzf7rp26j2quaotjza 372 29 . . . work_dzeata5onzf7rp26j2quaotjza 373 1 In in IN work_dzeata5onzf7rp26j2quaotjza 373 2 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 373 3 data data NN work_dzeata5onzf7rp26j2quaotjza 373 4 set set NN work_dzeata5onzf7rp26j2quaotjza 373 5 , , , work_dzeata5onzf7rp26j2quaotjza 373 6 proof proof NN work_dzeata5onzf7rp26j2quaotjza 373 7 and and CC work_dzeata5onzf7rp26j2quaotjza 373 8 analytical analytical JJ work_dzeata5onzf7rp26j2quaotjza 373 9 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 373 10 were be VBD work_dzeata5onzf7rp26j2quaotjza 373 11 , , , work_dzeata5onzf7rp26j2quaotjza 373 12 by by IN work_dzeata5onzf7rp26j2quaotjza 373 13 far far RB work_dzeata5onzf7rp26j2quaotjza 373 14 , , , work_dzeata5onzf7rp26j2quaotjza 373 15 the the DT work_dzeata5onzf7rp26j2quaotjza 373 16 least least JJS work_dzeata5onzf7rp26j2quaotjza 373 17 used use VBN work_dzeata5onzf7rp26j2quaotjza 373 18 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 373 19 . . . work_dzeata5onzf7rp26j2quaotjza 374 1 The the DT work_dzeata5onzf7rp26j2quaotjza 374 2 lack lack NN work_dzeata5onzf7rp26j2quaotjza 374 3 of of IN work_dzeata5onzf7rp26j2quaotjza 374 4 analytical analytical JJ work_dzeata5onzf7rp26j2quaotjza 374 5 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 374 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 374 7 due due JJ work_dzeata5onzf7rp26j2quaotjza 374 8 to to IN work_dzeata5onzf7rp26j2quaotjza 374 9 the the DT work_dzeata5onzf7rp26j2quaotjza 374 10 fact fact NN work_dzeata5onzf7rp26j2quaotjza 374 11 that that IN work_dzeata5onzf7rp26j2quaotjza 374 12 the the DT work_dzeata5onzf7rp26j2quaotjza 374 13 technique technique NN work_dzeata5onzf7rp26j2quaotjza 374 14 is be VBZ work_dzeata5onzf7rp26j2quaotjza 374 15 primarily primarily RB work_dzeata5onzf7rp26j2quaotjza 374 16 useful useful JJ work_dzeata5onzf7rp26j2quaotjza 374 17 when when WRB work_dzeata5onzf7rp26j2quaotjza 374 18 the the DT work_dzeata5onzf7rp26j2quaotjza 374 19 security security NN work_dzeata5onzf7rp26j2quaotjza 374 20 of of IN work_dzeata5onzf7rp26j2quaotjza 374 21 the the DT work_dzeata5onzf7rp26j2quaotjza 374 22 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 374 23 depends depend VBZ work_dzeata5onzf7rp26j2quaotjza 374 24 on on IN work_dzeata5onzf7rp26j2quaotjza 374 25 randomness randomness NN work_dzeata5onzf7rp26j2quaotjza 374 26 , , , work_dzeata5onzf7rp26j2quaotjza 374 27 which which WDT work_dzeata5onzf7rp26j2quaotjza 374 28 is be VBZ work_dzeata5onzf7rp26j2quaotjza 374 29 true true JJ work_dzeata5onzf7rp26j2quaotjza 374 30 of of IN work_dzeata5onzf7rp26j2quaotjza 374 31 few few JJ work_dzeata5onzf7rp26j2quaotjza 374 32 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 374 33 in in IN work_dzeata5onzf7rp26j2quaotjza 374 34 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 374 35 set set NN work_dzeata5onzf7rp26j2quaotjza 374 36 . . . work_dzeata5onzf7rp26j2quaotjza 375 1 However however RB work_dzeata5onzf7rp26j2quaotjza 375 2 , , , work_dzeata5onzf7rp26j2quaotjza 375 3 proof proof NN work_dzeata5onzf7rp26j2quaotjza 375 4 appears appear VBZ work_dzeata5onzf7rp26j2quaotjza 375 5 in in IN work_dzeata5onzf7rp26j2quaotjza 375 6 two two CD work_dzeata5onzf7rp26j2quaotjza 375 7 cases case NNS work_dzeata5onzf7rp26j2quaotjza 375 8 : : : work_dzeata5onzf7rp26j2quaotjza 375 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 375 10 1 1 LS work_dzeata5onzf7rp26j2quaotjza 375 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 375 12 to to TO work_dzeata5onzf7rp26j2quaotjza 375 13 prove prove VB work_dzeata5onzf7rp26j2quaotjza 375 14 properties property NNS work_dzeata5onzf7rp26j2quaotjza 375 15 of of IN work_dzeata5onzf7rp26j2quaotjza 375 16 data datum NNS work_dzeata5onzf7rp26j2quaotjza 375 17 flows flow NNS work_dzeata5onzf7rp26j2quaotjza 375 18 and and CC work_dzeata5onzf7rp26j2quaotjza 375 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 375 20 2 2 LS work_dzeata5onzf7rp26j2quaotjza 375 21 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 375 22 six six CD work_dzeata5onzf7rp26j2quaotjza 375 23 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 375 24 prove prove VBP work_dzeata5onzf7rp26j2quaotjza 375 25 the the DT work_dzeata5onzf7rp26j2quaotjza 375 26 correctness correctness NN work_dzeata5onzf7rp26j2quaotjza 375 27 of of IN work_dzeata5onzf7rp26j2quaotjza 375 28 a a DT work_dzeata5onzf7rp26j2quaotjza 375 29 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 375 30 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 375 31 a a DT work_dzeata5onzf7rp26j2quaotjza 375 32 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 375 33 policy policy NN work_dzeata5onzf7rp26j2quaotjza 375 34 . . . work_dzeata5onzf7rp26j2quaotjza 376 1 The the DT work_dzeata5onzf7rp26j2quaotjza 376 2 rarity rarity NN work_dzeata5onzf7rp26j2quaotjza 376 3 of of IN work_dzeata5onzf7rp26j2quaotjza 376 4 proof proof NN work_dzeata5onzf7rp26j2quaotjza 376 5 in in IN work_dzeata5onzf7rp26j2quaotjza 376 6 the the DT work_dzeata5onzf7rp26j2quaotjza 376 7 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 376 8 domain domain NN work_dzeata5onzf7rp26j2quaotjza 376 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 376 10 not not RB work_dzeata5onzf7rp26j2quaotjza 376 11 surprising surprising JJ work_dzeata5onzf7rp26j2quaotjza 376 12 given give VBN work_dzeata5onzf7rp26j2quaotjza 376 13 the the DT work_dzeata5onzf7rp26j2quaotjza 376 14 difficulty difficulty NN work_dzeata5onzf7rp26j2quaotjza 376 15 involved involve VBN work_dzeata5onzf7rp26j2quaotjza 376 16 . . . work_dzeata5onzf7rp26j2quaotjza 377 1 Proof proof NN work_dzeata5onzf7rp26j2quaotjza 377 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 377 3 particularly particularly RB work_dzeata5onzf7rp26j2quaotjza 377 4 difficult difficult JJ work_dzeata5onzf7rp26j2quaotjza 377 5 in in IN work_dzeata5onzf7rp26j2quaotjza 377 6 cases case NNS work_dzeata5onzf7rp26j2quaotjza 377 7 where where WRB work_dzeata5onzf7rp26j2quaotjza 377 8 one one PRP work_dzeata5onzf7rp26j2quaotjza 377 9 would would MD work_dzeata5onzf7rp26j2quaotjza 377 10 ideally ideally RB work_dzeata5onzf7rp26j2quaotjza 377 11 prove prove VB work_dzeata5onzf7rp26j2quaotjza 377 12 that that IN work_dzeata5onzf7rp26j2quaotjza 377 13 a a DT work_dzeata5onzf7rp26j2quaotjza 377 14 policy policy NN work_dzeata5onzf7rp26j2quaotjza 377 15 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 377 16 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 377 17 is be VBZ work_dzeata5onzf7rp26j2quaotjza 377 18 capable capable JJ work_dzeata5onzf7rp26j2quaotjza 377 19 of of IN work_dzeata5onzf7rp26j2quaotjza 377 20 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 377 21 all all DT work_dzeata5onzf7rp26j2quaotjza 377 22 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 377 23 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 377 24 a a DT work_dzeata5onzf7rp26j2quaotjza 377 25 user user NN work_dzeata5onzf7rp26j2quaotjza 377 26 can can MD work_dzeata5onzf7rp26j2quaotjza 377 27 define define VB work_dzeata5onzf7rp26j2quaotjza 377 28 , , , work_dzeata5onzf7rp26j2quaotjza 377 29 which which WDT work_dzeata5onzf7rp26j2quaotjza 377 30 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 377 31 did do VBD work_dzeata5onzf7rp26j2quaotjza 377 32 not not RB work_dzeata5onzf7rp26j2quaotjza 377 33 see see VB work_dzeata5onzf7rp26j2quaotjza 377 34 attempted attempt VBN work_dzeata5onzf7rp26j2quaotjza 377 35 . . . work_dzeata5onzf7rp26j2quaotjza 378 1 Instead instead RB work_dzeata5onzf7rp26j2quaotjza 378 2 , , , work_dzeata5onzf7rp26j2quaotjza 378 3 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 378 4 are be VBP work_dzeata5onzf7rp26j2quaotjza 378 5 often often RB work_dzeata5onzf7rp26j2quaotjza 378 6 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 378 7 empirically empirically RB work_dzeata5onzf7rp26j2quaotjza 378 8 or or CC work_dzeata5onzf7rp26j2quaotjza 378 9 in in IN work_dzeata5onzf7rp26j2quaotjza 378 10 ways way NNS work_dzeata5onzf7rp26j2quaotjza 378 11 that that WDT work_dzeata5onzf7rp26j2quaotjza 378 12 are be VBP work_dzeata5onzf7rp26j2quaotjza 378 13 ad ad FW work_dzeata5onzf7rp26j2quaotjza 378 14 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 378 15 and and CC work_dzeata5onzf7rp26j2quaotjza 378 16 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 378 17 . . . work_dzeata5onzf7rp26j2quaotjza 379 1 In in IN work_dzeata5onzf7rp26j2quaotjza 379 2 empirical empirical JJ work_dzeata5onzf7rp26j2quaotjza 379 3 evaluations evaluation NNS work_dzeata5onzf7rp26j2quaotjza 379 4 , , , work_dzeata5onzf7rp26j2quaotjza 379 5 case case NN work_dzeata5onzf7rp26j2quaotjza 379 6 studies study NNS work_dzeata5onzf7rp26j2quaotjza 379 7 are be VBP work_dzeata5onzf7rp26j2quaotjza 379 8 the the DT work_dzeata5onzf7rp26j2quaotjza 379 9 most most RBS work_dzeata5onzf7rp26j2quaotjza 379 10 common common JJ work_dzeata5onzf7rp26j2quaotjza 379 11 technique technique NN work_dzeata5onzf7rp26j2quaotjza 379 12 for for IN work_dzeata5onzf7rp26j2quaotjza 379 13 all all DT work_dzeata5onzf7rp26j2quaotjza 379 14 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 379 15 , , , work_dzeata5onzf7rp26j2quaotjza 379 16 often often RB work_dzeata5onzf7rp26j2quaotjza 379 17 because because IN work_dzeata5onzf7rp26j2quaotjza 379 18 proof proof NN work_dzeata5onzf7rp26j2quaotjza 379 19 was be VBD work_dzeata5onzf7rp26j2quaotjza 379 20 not not RB work_dzeata5onzf7rp26j2quaotjza 379 21 attempted attempt VBN work_dzeata5onzf7rp26j2quaotjza 379 22 and and CC work_dzeata5onzf7rp26j2quaotjza 379 23 there there EX work_dzeata5onzf7rp26j2quaotjza 379 24 is be VBZ work_dzeata5onzf7rp26j2quaotjza 379 25 no no DT work_dzeata5onzf7rp26j2quaotjza 379 26 existing exist VBG work_dzeata5onzf7rp26j2quaotjza 379 27 benchmark benchmark JJ work_dzeata5onzf7rp26j2quaotjza 379 28 suite suite NN work_dzeata5onzf7rp26j2quaotjza 379 29 that that WDT work_dzeata5onzf7rp26j2quaotjza 379 30 highlights highlight VBZ work_dzeata5onzf7rp26j2quaotjza 379 31 the the DT work_dzeata5onzf7rp26j2quaotjza 379 32 novel novel JJ work_dzeata5onzf7rp26j2quaotjza 379 33 aspects aspect NNS work_dzeata5onzf7rp26j2quaotjza 379 34 of of IN work_dzeata5onzf7rp26j2quaotjza 379 35 the the DT work_dzeata5onzf7rp26j2quaotjza 379 36 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 379 37 . . . work_dzeata5onzf7rp26j2quaotjza 380 1 For for IN work_dzeata5onzf7rp26j2quaotjza 380 2 example example NN work_dzeata5onzf7rp26j2quaotjza 380 3 , , , work_dzeata5onzf7rp26j2quaotjza 380 4 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 380 5 for for IN work_dzeata5onzf7rp26j2quaotjza 380 6 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 380 7 with with IN work_dzeata5onzf7rp26j2quaotjza 380 8 fixed fix VBN work_dzeata5onzf7rp26j2quaotjza 380 9 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 380 10 often often RB work_dzeata5onzf7rp26j2quaotjza 380 11 want want VBP work_dzeata5onzf7rp26j2quaotjza 380 12 to to TO work_dzeata5onzf7rp26j2quaotjza 380 13 show show VB work_dzeata5onzf7rp26j2quaotjza 380 14 a a DT work_dzeata5onzf7rp26j2quaotjza 380 15 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 380 16 class class NN work_dzeata5onzf7rp26j2quaotjza 380 17 of of IN work_dzeata5onzf7rp26j2quaotjza 380 18 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 380 19 can can MD work_dzeata5onzf7rp26j2quaotjza 380 20 no no RB work_dzeata5onzf7rp26j2quaotjza 380 21 longer longer RB work_dzeata5onzf7rp26j2quaotjza 380 22 be be VB work_dzeata5onzf7rp26j2quaotjza 380 23 exploited exploit VBN work_dzeata5onzf7rp26j2quaotjza 380 24 in in IN work_dzeata5onzf7rp26j2quaotjza 380 25 sandboxed sandboxe VBN work_dzeata5onzf7rp26j2quaotjza 380 26 code code NN work_dzeata5onzf7rp26j2quaotjza 380 27 , , , work_dzeata5onzf7rp26j2quaotjza 380 28 thus thus RB work_dzeata5onzf7rp26j2quaotjza 380 29 examples example NNS work_dzeata5onzf7rp26j2quaotjza 380 30 of of IN work_dzeata5onzf7rp26j2quaotjza 380 31 vulnerable vulnerable JJ work_dzeata5onzf7rp26j2quaotjza 380 32 applications application NNS work_dzeata5onzf7rp26j2quaotjza 380 33 and and CC work_dzeata5onzf7rp26j2quaotjza 380 34 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 380 35 for for IN work_dzeata5onzf7rp26j2quaotjza 380 36 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 380 37 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 380 38 must must MD work_dzeata5onzf7rp26j2quaotjza 380 39 be be VB work_dzeata5onzf7rp26j2quaotjza 380 40 gathered gather VBN work_dzeata5onzf7rp26j2quaotjza 380 41 or or CC work_dzeata5onzf7rp26j2quaotjza 380 42 , , , work_dzeata5onzf7rp26j2quaotjza 380 43 very very RB work_dzeata5onzf7rp26j2quaotjza 380 44 rarely rarely RB work_dzeata5onzf7rp26j2quaotjza 380 45 , , , work_dzeata5onzf7rp26j2quaotjza 380 46 synthesized synthesize VBD work_dzeata5onzf7rp26j2quaotjza 380 47 . . . work_dzeata5onzf7rp26j2quaotjza 381 1 When when WRB work_dzeata5onzf7rp26j2quaotjza 381 2 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 381 3 were be VBD work_dzeata5onzf7rp26j2quaotjza 381 4 empirically empirically RB work_dzeata5onzf7rp26j2quaotjza 381 5 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 381 6 , , , work_dzeata5onzf7rp26j2quaotjza 381 7 the the DT work_dzeata5onzf7rp26j2quaotjza 381 8 results result NNS work_dzeata5onzf7rp26j2quaotjza 381 9 were be VBD work_dzeata5onzf7rp26j2quaotjza 381 10 not not RB work_dzeata5onzf7rp26j2quaotjza 381 11 comparable comparable JJ work_dzeata5onzf7rp26j2quaotjza 381 12 in in IN work_dzeata5onzf7rp26j2quaotjza 381 13 fifteen fifteen CD work_dzeata5onzf7rp26j2quaotjza 381 14 out out IN work_dzeata5onzf7rp26j2quaotjza 381 15 of of IN work_dzeata5onzf7rp26j2quaotjza 381 16 sixty sixty CD work_dzeata5onzf7rp26j2quaotjza 381 17 - - HYPH work_dzeata5onzf7rp26j2quaotjza 381 18 two two CD work_dzeata5onzf7rp26j2quaotjza 381 19 cases case NNS work_dzeata5onzf7rp26j2quaotjza 381 20 for for IN work_dzeata5onzf7rp26j2quaotjza 381 21 performance performance NN work_dzeata5onzf7rp26j2quaotjza 381 22 , , , work_dzeata5onzf7rp26j2quaotjza 381 23 twenty twenty CD work_dzeata5onzf7rp26j2quaotjza 381 24 - - HYPH work_dzeata5onzf7rp26j2quaotjza 381 25 two two CD work_dzeata5onzf7rp26j2quaotjza 381 26 out out IN work_dzeata5onzf7rp26j2quaotjza 381 27 of of IN work_dzeata5onzf7rp26j2quaotjza 381 28 forty forty CD work_dzeata5onzf7rp26j2quaotjza 381 29 - - HYPH work_dzeata5onzf7rp26j2quaotjza 381 30 two two CD work_dzeata5onzf7rp26j2quaotjza 381 31 cases case NNS work_dzeata5onzf7rp26j2quaotjza 381 32 for for IN work_dzeata5onzf7rp26j2quaotjza 381 33 security security NN work_dzeata5onzf7rp26j2quaotjza 381 34 , , , work_dzeata5onzf7rp26j2quaotjza 381 35 and and CC work_dzeata5onzf7rp26j2quaotjza 381 36 twenty twenty CD work_dzeata5onzf7rp26j2quaotjza 381 37 - - HYPH work_dzeata5onzf7rp26j2quaotjza 381 38 four four CD work_dzeata5onzf7rp26j2quaotjza 381 39 out out IN work_dzeata5onzf7rp26j2quaotjza 381 40 of of IN work_dzeata5onzf7rp26j2quaotjza 381 41 thirty thirty CD work_dzeata5onzf7rp26j2quaotjza 381 42 - - HYPH work_dzeata5onzf7rp26j2quaotjza 381 43 one one CD work_dzeata5onzf7rp26j2quaotjza 381 44 cases case NNS work_dzeata5onzf7rp26j2quaotjza 381 45 for for IN work_dzeata5onzf7rp26j2quaotjza 381 46 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 381 47 because because IN work_dzeata5onzf7rp26j2quaotjza 381 48 non non JJ work_dzeata5onzf7rp26j2quaotjza 381 49 - - JJ work_dzeata5onzf7rp26j2quaotjza 381 50 public public JJ work_dzeata5onzf7rp26j2quaotjza 381 51 data datum NNS work_dzeata5onzf7rp26j2quaotjza 381 52 was be VBD work_dzeata5onzf7rp26j2quaotjza 381 53 used use VBN work_dzeata5onzf7rp26j2quaotjza 381 54 in in IN work_dzeata5onzf7rp26j2quaotjza 381 55 the the DT work_dzeata5onzf7rp26j2quaotjza 381 56 discussed discuss VBN work_dzeata5onzf7rp26j2quaotjza 381 57 experiments experiment NNS work_dzeata5onzf7rp26j2quaotjza 381 58 . . . work_dzeata5onzf7rp26j2quaotjza 382 1 Non non JJ work_dzeata5onzf7rp26j2quaotjza 382 2 - - JJ work_dzeata5onzf7rp26j2quaotjza 382 3 public public JJ work_dzeata5onzf7rp26j2quaotjza 382 4 data data NN work_dzeata5onzf7rp26j2quaotjza 382 5 takes take VBZ work_dzeata5onzf7rp26j2quaotjza 382 6 the the DT work_dzeata5onzf7rp26j2quaotjza 382 7 form form NN work_dzeata5onzf7rp26j2quaotjza 382 8 of of IN work_dzeata5onzf7rp26j2quaotjza 382 9 unlabeled unlabeled JJ work_dzeata5onzf7rp26j2quaotjza 382 10 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 382 11 , , , work_dzeata5onzf7rp26j2quaotjza 382 12 undisclosed undisclosed JJ work_dzeata5onzf7rp26j2quaotjza 382 13 changes change NNS work_dzeata5onzf7rp26j2quaotjza 382 14 to to IN work_dzeata5onzf7rp26j2quaotjza 382 15 public public JJ work_dzeata5onzf7rp26j2quaotjza 382 16 applications application NNS work_dzeata5onzf7rp26j2quaotjza 382 17 , , , work_dzeata5onzf7rp26j2quaotjza 382 18 and and CC work_dzeata5onzf7rp26j2quaotjza 382 19 unreleased unrelease VBD work_dzeata5onzf7rp26j2quaotjza 382 20 custom custom NN work_dzeata5onzf7rp26j2quaotjza 382 21 example example NN work_dzeata5onzf7rp26j2quaotjza 382 22 cases case NNS work_dzeata5onzf7rp26j2quaotjza 382 23 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 382 24 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 382 25 , , , work_dzeata5onzf7rp26j2quaotjza 382 26 applications application NNS work_dzeata5onzf7rp26j2quaotjza 382 27 built build VBD work_dzeata5onzf7rp26j2quaotjza 382 28 using use VBG work_dzeata5onzf7rp26j2quaotjza 382 29 a a DT work_dzeata5onzf7rp26j2quaotjza 382 30 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 382 31 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 382 32 framework framework NN work_dzeata5onzf7rp26j2quaotjza 382 33 where where WRB work_dzeata5onzf7rp26j2quaotjza 382 34 the the DT work_dzeata5onzf7rp26j2quaotjza 382 35 examples example NNS work_dzeata5onzf7rp26j2quaotjza 382 36 were be VBD work_dzeata5onzf7rp26j2quaotjza 382 37 not not RB work_dzeata5onzf7rp26j2quaotjza 382 38 released release VBN work_dzeata5onzf7rp26j2quaotjza 382 39 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 382 40 . . . work_dzeata5onzf7rp26j2quaotjza 383 1 Security security NN work_dzeata5onzf7rp26j2quaotjza 383 2 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 383 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 383 4 notoriously notoriously RB work_dzeata5onzf7rp26j2quaotjza 383 5 difficult difficult JJ work_dzeata5onzf7rp26j2quaotjza 383 6 to to TO work_dzeata5onzf7rp26j2quaotjza 383 7 formalize formalize VB work_dzeata5onzf7rp26j2quaotjza 383 8 , , , work_dzeata5onzf7rp26j2quaotjza 383 9 hence hence RB work_dzeata5onzf7rp26j2quaotjza 383 10 the the DT work_dzeata5onzf7rp26j2quaotjza 383 11 pervasive pervasive JJ work_dzeata5onzf7rp26j2quaotjza 383 12 lack lack NN work_dzeata5onzf7rp26j2quaotjza 383 13 of of IN work_dzeata5onzf7rp26j2quaotjza 383 14 proof proof NN work_dzeata5onzf7rp26j2quaotjza 383 15 . . . work_dzeata5onzf7rp26j2quaotjza 384 1 Many many JJ work_dzeata5onzf7rp26j2quaotjza 384 2 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 384 3 instead instead RB work_dzeata5onzf7rp26j2quaotjza 384 4 vet vet VBP work_dzeata5onzf7rp26j2quaotjza 384 5 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 384 6 security security NN work_dzeata5onzf7rp26j2quaotjza 384 7 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 384 8 using use VBG work_dzeata5onzf7rp26j2quaotjza 384 9 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 384 10 - - JJ work_dzeata5onzf7rp26j2quaotjza 384 11 faceted faceted JJ work_dzeata5onzf7rp26j2quaotjza 384 12 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 384 13 , , , work_dzeata5onzf7rp26j2quaotjza 384 14 often often RB work_dzeata5onzf7rp26j2quaotjza 384 15 including include VBG work_dzeata5onzf7rp26j2quaotjza 384 16 both both DT work_dzeata5onzf7rp26j2quaotjza 384 17 common common JJ work_dzeata5onzf7rp26j2quaotjza 384 18 empirical empirical JJ work_dzeata5onzf7rp26j2quaotjza 384 19 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 384 20 : : : work_dzeata5onzf7rp26j2quaotjza 384 21 case case NN work_dzeata5onzf7rp26j2quaotjza 384 22 studies study NNS work_dzeata5onzf7rp26j2quaotjza 384 23 and and CC work_dzeata5onzf7rp26j2quaotjza 384 24 experiments experiment NNS work_dzeata5onzf7rp26j2quaotjza 384 25 using use VBG work_dzeata5onzf7rp26j2quaotjza 384 26 benchmark benchmark NN work_dzeata5onzf7rp26j2quaotjza 384 27 suites suite NNS work_dzeata5onzf7rp26j2quaotjza 384 28 . . . work_dzeata5onzf7rp26j2quaotjza 385 1 However however RB work_dzeata5onzf7rp26j2quaotjza 385 2 , , , work_dzeata5onzf7rp26j2quaotjza 385 3 Figs fig NNS work_dzeata5onzf7rp26j2quaotjza 385 4 . . . work_dzeata5onzf7rp26j2quaotjza 386 1 6 6 CD work_dzeata5onzf7rp26j2quaotjza 386 2 and and CC work_dzeata5onzf7rp26j2quaotjza 386 3 7 7 CD work_dzeata5onzf7rp26j2quaotjza 386 4 illustrate illustrate VBP work_dzeata5onzf7rp26j2quaotjza 386 5 an an DT work_dzeata5onzf7rp26j2quaotjza 386 6 interesting interesting JJ work_dzeata5onzf7rp26j2quaotjza 386 7 finding finding NN work_dzeata5onzf7rp26j2quaotjza 386 8 : : : work_dzeata5onzf7rp26j2quaotjza 386 9 in in IN work_dzeata5onzf7rp26j2quaotjza 386 10 twenty twenty CD work_dzeata5onzf7rp26j2quaotjza 386 11 - - HYPH work_dzeata5onzf7rp26j2quaotjza 386 12 nine nine CD work_dzeata5onzf7rp26j2quaotjza 386 13 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 386 14 where where WRB work_dzeata5onzf7rp26j2quaotjza 386 15 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 386 16 - - JJ work_dzeata5onzf7rp26j2quaotjza 386 17 faceted faceted JJ work_dzeata5onzf7rp26j2quaotjza 386 18 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 386 19 are be VBP work_dzeata5onzf7rp26j2quaotjza 386 20 not not RB work_dzeata5onzf7rp26j2quaotjza 386 21 used use VBN work_dzeata5onzf7rp26j2quaotjza 386 22 , , , work_dzeata5onzf7rp26j2quaotjza 386 23 authors author NNS work_dzeata5onzf7rp26j2quaotjza 386 24 pick pick VBP work_dzeata5onzf7rp26j2quaotjza 386 25 one one CD work_dzeata5onzf7rp26j2quaotjza 386 26 empirical empirical JJ work_dzeata5onzf7rp26j2quaotjza 386 27 tactic tactic NN work_dzeata5onzf7rp26j2quaotjza 386 28 and and CC work_dzeata5onzf7rp26j2quaotjza 386 29 argue argue VBP work_dzeata5onzf7rp26j2quaotjza 386 30 that that IN work_dzeata5onzf7rp26j2quaotjza 386 31 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 386 32 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 386 33 are be VBP work_dzeata5onzf7rp26j2quaotjza 386 34 true true JJ work_dzeata5onzf7rp26j2quaotjza 386 35 . . . work_dzeata5onzf7rp26j2quaotjza 387 1 Argumentation argumentation NN work_dzeata5onzf7rp26j2quaotjza 387 2 in in IN work_dzeata5onzf7rp26j2quaotjza 387 3 this this DT work_dzeata5onzf7rp26j2quaotjza 387 4 space space NN work_dzeata5onzf7rp26j2quaotjza 387 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 387 6 problematic problematic JJ work_dzeata5onzf7rp26j2quaotjza 387 7 because because IN work_dzeata5onzf7rp26j2quaotjza 387 8 all all DT work_dzeata5onzf7rp26j2quaotjza 387 9 of of IN work_dzeata5onzf7rp26j2quaotjza 387 10 the the DT work_dzeata5onzf7rp26j2quaotjza 387 11 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 387 12 are be VBP work_dzeata5onzf7rp26j2quaotjza 387 13 ad ad FW work_dzeata5onzf7rp26j2quaotjza 387 14 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 387 15 , , , work_dzeata5onzf7rp26j2quaotjza 387 16 which which WDT work_dzeata5onzf7rp26j2quaotjza 387 17 makes make VBZ work_dzeata5onzf7rp26j2quaotjza 387 18 evaluations evaluation NNS work_dzeata5onzf7rp26j2quaotjza 387 19 that that WDT work_dzeata5onzf7rp26j2quaotjza 387 20 should should MD work_dzeata5onzf7rp26j2quaotjza 387 21 be be VB work_dzeata5onzf7rp26j2quaotjza 387 22 comparable comparable JJ work_dzeata5onzf7rp26j2quaotjza 387 23 difficult difficult JJ work_dzeata5onzf7rp26j2quaotjza 387 24 to to TO work_dzeata5onzf7rp26j2quaotjza 387 25 compare compare VB work_dzeata5onzf7rp26j2quaotjza 387 26 at at IN work_dzeata5onzf7rp26j2quaotjza 387 27 best good JJS work_dzeata5onzf7rp26j2quaotjza 387 28 but but CC work_dzeata5onzf7rp26j2quaotjza 387 29 more more RBR work_dzeata5onzf7rp26j2quaotjza 387 30 often often RB work_dzeata5onzf7rp26j2quaotjza 387 31 incomparable incomparable JJ work_dzeata5onzf7rp26j2quaotjza 387 32 . . . work_dzeata5onzf7rp26j2quaotjza 388 1 Furthermore furthermore RB work_dzeata5onzf7rp26j2quaotjza 388 2 , , , work_dzeata5onzf7rp26j2quaotjza 388 3 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 388 4 observed observe VBD work_dzeata5onzf7rp26j2quaotjza 388 5 many many JJ work_dzeata5onzf7rp26j2quaotjza 388 6 cases case NNS work_dzeata5onzf7rp26j2quaotjza 388 7 where where WRB work_dzeata5onzf7rp26j2quaotjza 388 8 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 388 9 essentially essentially RB work_dzeata5onzf7rp26j2quaotjza 388 10 summarize summarize VBP work_dzeata5onzf7rp26j2quaotjza 388 11 as as IN work_dzeata5onzf7rp26j2quaotjza 388 12 , , , work_dzeata5onzf7rp26j2quaotjza 388 13 “ " `` work_dzeata5onzf7rp26j2quaotjza 388 14 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 388 15 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 388 16 is be VBZ work_dzeata5onzf7rp26j2quaotjza 388 17 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 388 18 because because IN work_dzeata5onzf7rp26j2quaotjza 388 19 the the DT work_dzeata5onzf7rp26j2quaotjza 388 20 design design NN work_dzeata5onzf7rp26j2quaotjza 388 21 is be VBZ work_dzeata5onzf7rp26j2quaotjza 388 22 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 388 23 , , , work_dzeata5onzf7rp26j2quaotjza 388 24 ” " '' work_dzeata5onzf7rp26j2quaotjza 388 25 with with IN work_dzeata5onzf7rp26j2quaotjza 388 26 details detail NNS work_dzeata5onzf7rp26j2quaotjza 388 27 of of IN work_dzeata5onzf7rp26j2quaotjza 388 28 the the DT work_dzeata5onzf7rp26j2quaotjza 388 29 design design NN work_dzeata5onzf7rp26j2quaotjza 388 30 occupying occupy VBG work_dzeata5onzf7rp26j2quaotjza 388 31 most most JJS work_dzeata5onzf7rp26j2quaotjza 388 32 of of IN work_dzeata5onzf7rp26j2quaotjza 388 33 the the DT work_dzeata5onzf7rp26j2quaotjza 388 34 paper paper NN work_dzeata5onzf7rp26j2quaotjza 388 35 in in IN work_dzeata5onzf7rp26j2quaotjza 388 36 entirely entirely RB work_dzeata5onzf7rp26j2quaotjza 388 37 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 388 38 form form NN work_dzeata5onzf7rp26j2quaotjza 388 39 . . . work_dzeata5onzf7rp26j2quaotjza 389 1 Not not RB work_dzeata5onzf7rp26j2quaotjza 389 2 only only RB work_dzeata5onzf7rp26j2quaotjza 389 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 389 4 these these DT work_dzeata5onzf7rp26j2quaotjza 389 5 types type NNS work_dzeata5onzf7rp26j2quaotjza 389 6 of of IN work_dzeata5onzf7rp26j2quaotjza 389 7 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 389 8 difficult difficult JJ work_dzeata5onzf7rp26j2quaotjza 389 9 to to TO work_dzeata5onzf7rp26j2quaotjza 389 10 compare compare VB work_dzeata5onzf7rp26j2quaotjza 389 11 in in IN work_dzeata5onzf7rp26j2quaotjza 389 12 cases case NNS work_dzeata5onzf7rp26j2quaotjza 389 13 where where WRB work_dzeata5onzf7rp26j2quaotjza 389 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 389 15 are be VBP work_dzeata5onzf7rp26j2quaotjza 389 16 otherwise otherwise RB work_dzeata5onzf7rp26j2quaotjza 389 17 quite quite RB work_dzeata5onzf7rp26j2quaotjza 389 18 similar similar JJ work_dzeata5onzf7rp26j2quaotjza 389 19 , , , work_dzeata5onzf7rp26j2quaotjza 389 20 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 389 21 is be VBZ work_dzeata5onzf7rp26j2quaotjza 389 22 even even RB work_dzeata5onzf7rp26j2quaotjza 389 23 harder hard JJR work_dzeata5onzf7rp26j2quaotjza 389 24 to to TO work_dzeata5onzf7rp26j2quaotjza 389 25 see see VB work_dzeata5onzf7rp26j2quaotjza 389 26 if if IN work_dzeata5onzf7rp26j2quaotjza 389 27 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 389 28 are be VBP work_dzeata5onzf7rp26j2quaotjza 389 29 complete complete JJ work_dzeata5onzf7rp26j2quaotjza 389 30 in in IN work_dzeata5onzf7rp26j2quaotjza 389 31 the the DT work_dzeata5onzf7rp26j2quaotjza 389 32 sense sense NN work_dzeata5onzf7rp26j2quaotjza 389 33 that that IN work_dzeata5onzf7rp26j2quaotjza 389 34 every every DT work_dzeata5onzf7rp26j2quaotjza 389 35 sub sub NN work_dzeata5onzf7rp26j2quaotjza 389 36 - - NN work_dzeata5onzf7rp26j2quaotjza 389 37 claim claim NN work_dzeata5onzf7rp26j2quaotjza 389 38 is be VBZ work_dzeata5onzf7rp26j2quaotjza 389 39 adequately adequately RB work_dzeata5onzf7rp26j2quaotjza 389 40 addressed address VBN work_dzeata5onzf7rp26j2quaotjza 389 41 . . . work_dzeata5onzf7rp26j2quaotjza 390 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 390 2 correlational correlational JJ work_dzeata5onzf7rp26j2quaotjza 390 3 analyses analysis NNS work_dzeata5onzf7rp26j2quaotjza 390 4 show show VBP work_dzeata5onzf7rp26j2quaotjza 390 5 no no DT work_dzeata5onzf7rp26j2quaotjza 390 6 significant significant JJ work_dzeata5onzf7rp26j2quaotjza 390 7 trends trend NNS work_dzeata5onzf7rp26j2quaotjza 390 8 in in IN work_dzeata5onzf7rp26j2quaotjza 390 9 security security NN work_dzeata5onzf7rp26j2quaotjza 390 10 or or CC work_dzeata5onzf7rp26j2quaotjza 390 11 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 390 12 analyses analysis NNS work_dzeata5onzf7rp26j2quaotjza 390 13 , , , work_dzeata5onzf7rp26j2quaotjza 390 14 however however RB work_dzeata5onzf7rp26j2quaotjza 390 15 performance performance NN work_dzeata5onzf7rp26j2quaotjza 390 16 validation validation NN work_dzeata5onzf7rp26j2quaotjza 390 17 has have VBZ work_dzeata5onzf7rp26j2quaotjza 390 18 improved improve VBN work_dzeata5onzf7rp26j2quaotjza 390 19 over over IN work_dzeata5onzf7rp26j2quaotjza 390 20 time time NN work_dzeata5onzf7rp26j2quaotjza 390 21 . . . work_dzeata5onzf7rp26j2quaotjza 391 1 Table table NN work_dzeata5onzf7rp26j2quaotjza 391 2 5 5 CD work_dzeata5onzf7rp26j2quaotjza 391 3 summarizes summarize VBZ work_dzeata5onzf7rp26j2quaotjza 391 4 the the DT work_dzeata5onzf7rp26j2quaotjza 391 5 Spearman Spearman NNP work_dzeata5onzf7rp26j2quaotjza 391 6 correlations correlation NNS work_dzeata5onzf7rp26j2quaotjza 391 7 and and CC work_dzeata5onzf7rp26j2quaotjza 391 8 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 391 9 p p NN work_dzeata5onzf7rp26j2quaotjza 391 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 391 11 values value NNS work_dzeata5onzf7rp26j2quaotjza 391 12 per per IN work_dzeata5onzf7rp26j2quaotjza 391 13 validation validation NN work_dzeata5onzf7rp26j2quaotjza 391 14 category category NN work_dzeata5onzf7rp26j2quaotjza 391 15 . . . work_dzeata5onzf7rp26j2quaotjza 392 1 Spearman spearman NN work_dzeata5onzf7rp26j2quaotjza 392 2 correlations correlation NNS work_dzeata5onzf7rp26j2quaotjza 392 3 fall fall VBP work_dzeata5onzf7rp26j2quaotjza 392 4 in in IN work_dzeata5onzf7rp26j2quaotjza 392 5 the the DT work_dzeata5onzf7rp26j2quaotjza 392 6 range range NN work_dzeata5onzf7rp26j2quaotjza 392 7 [ [ -LRB- work_dzeata5onzf7rp26j2quaotjza 392 8 −1 −1 NNP work_dzeata5onzf7rp26j2quaotjza 392 9 , , , work_dzeata5onzf7rp26j2quaotjza 392 10 1 1 CD work_dzeata5onzf7rp26j2quaotjza 392 11 ] ] -RRB- work_dzeata5onzf7rp26j2quaotjza 392 12 , , , work_dzeata5onzf7rp26j2quaotjza 392 13 where where WRB work_dzeata5onzf7rp26j2quaotjza 392 14 a a DT work_dzeata5onzf7rp26j2quaotjza 392 15 value value NN work_dzeata5onzf7rp26j2quaotjza 392 16 of of IN work_dzeata5onzf7rp26j2quaotjza 392 17 0 0 CD work_dzeata5onzf7rp26j2quaotjza 392 18 is be VBZ work_dzeata5onzf7rp26j2quaotjza 392 19 interpreted interpret VBN work_dzeata5onzf7rp26j2quaotjza 392 20 as as IN work_dzeata5onzf7rp26j2quaotjza 392 21 no no DT work_dzeata5onzf7rp26j2quaotjza 392 22 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 392 23 , , , work_dzeata5onzf7rp26j2quaotjza 392 24 positive positive JJ work_dzeata5onzf7rp26j2quaotjza 392 25 values value NNS work_dzeata5onzf7rp26j2quaotjza 392 26 show show VBP work_dzeata5onzf7rp26j2quaotjza 392 27 a a DT work_dzeata5onzf7rp26j2quaotjza 392 28 positive positive JJ work_dzeata5onzf7rp26j2quaotjza 392 29 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 392 30 , , , work_dzeata5onzf7rp26j2quaotjza 392 31 and and CC work_dzeata5onzf7rp26j2quaotjza 392 32 negative negative JJ work_dzeata5onzf7rp26j2quaotjza 392 33 values value NNS work_dzeata5onzf7rp26j2quaotjza 392 34 a a DT work_dzeata5onzf7rp26j2quaotjza 392 35 negative negative JJ work_dzeata5onzf7rp26j2quaotjza 392 36 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 392 37 . . . work_dzeata5onzf7rp26j2quaotjza 393 1 The the DT work_dzeata5onzf7rp26j2quaotjza 393 2 magnitude magnitude NN work_dzeata5onzf7rp26j2quaotjza 393 3 of of IN work_dzeata5onzf7rp26j2quaotjza 393 4 the the DT work_dzeata5onzf7rp26j2quaotjza 393 5 coefficient coefficient NN work_dzeata5onzf7rp26j2quaotjza 393 6 grows grow VBZ work_dzeata5onzf7rp26j2quaotjza 393 7 towards towards IN work_dzeata5onzf7rp26j2quaotjza 393 8 1 1 CD work_dzeata5onzf7rp26j2quaotjza 393 9 as as IN work_dzeata5onzf7rp26j2quaotjza 393 10 time time NN work_dzeata5onzf7rp26j2quaotjza 393 11 and and CC work_dzeata5onzf7rp26j2quaotjza 393 12 the the DT work_dzeata5onzf7rp26j2quaotjza 393 13 validation validation NN work_dzeata5onzf7rp26j2quaotjza 393 14 rank rank NN work_dzeata5onzf7rp26j2quaotjza 393 15 become become VBP work_dzeata5onzf7rp26j2quaotjza 393 16 closer close RBR work_dzeata5onzf7rp26j2quaotjza 393 17 to to TO work_dzeata5onzf7rp26j2quaotjza 393 18 perfect perfect VB work_dzeata5onzf7rp26j2quaotjza 393 19 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 393 20 et et NNP work_dzeata5onzf7rp26j2quaotjza 393 21 al al NNP work_dzeata5onzf7rp26j2quaotjza 393 22 . . . work_dzeata5onzf7rp26j2quaotjza 394 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 394 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 394 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 394 4 , , , work_dzeata5onzf7rp26j2quaotjza 394 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 394 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 394 7 . . . work_dzeata5onzf7rp26j2quaotjza 395 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 395 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 395 3 , , , work_dzeata5onzf7rp26j2quaotjza 395 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 395 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 395 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 395 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 395 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 395 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 395 10 19/36 19/36 CD work_dzeata5onzf7rp26j2quaotjza 395 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 395 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 395 13 Figure Figure NNP work_dzeata5onzf7rp26j2quaotjza 395 14 6 6 CD work_dzeata5onzf7rp26j2quaotjza 395 15 A a DT work_dzeata5onzf7rp26j2quaotjza 395 16 dendrogram dendrogram NN work_dzeata5onzf7rp26j2quaotjza 395 17 displaying display VBG work_dzeata5onzf7rp26j2quaotjza 395 18 the the DT work_dzeata5onzf7rp26j2quaotjza 395 19 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 395 20 for for IN work_dzeata5onzf7rp26j2quaotjza 395 21 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 395 22 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 395 23 taking take VBG work_dzeata5onzf7rp26j2quaotjza 395 24 into into IN work_dzeata5onzf7rp26j2quaotjza 395 25 account account NN work_dzeata5onzf7rp26j2quaotjza 395 26 validation validation NN work_dzeata5onzf7rp26j2quaotjza 395 27 categories category NNS work_dzeata5onzf7rp26j2quaotjza 395 28 . . . work_dzeata5onzf7rp26j2quaotjza 396 1 At at IN work_dzeata5onzf7rp26j2quaotjza 396 2 the the DT work_dzeata5onzf7rp26j2quaotjza 396 3 topmost topmost JJS work_dzeata5onzf7rp26j2quaotjza 396 4 level level NN work_dzeata5onzf7rp26j2quaotjza 396 5 , , , work_dzeata5onzf7rp26j2quaotjza 396 6 where where WRB work_dzeata5onzf7rp26j2quaotjza 396 7 two two CD work_dzeata5onzf7rp26j2quaotjza 396 8 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 396 9 exist exist VBP work_dzeata5onzf7rp26j2quaotjza 396 10 , , , work_dzeata5onzf7rp26j2quaotjza 396 11 the the DT work_dzeata5onzf7rp26j2quaotjza 396 12 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 396 13 respectively respectively RB work_dzeata5onzf7rp26j2quaotjza 396 14 represent represent VBP work_dzeata5onzf7rp26j2quaotjza 396 15 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 396 16 that that WDT work_dzeata5onzf7rp26j2quaotjza 396 17 emphasize emphasize VBP work_dzeata5onzf7rp26j2quaotjza 396 18 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 396 19 - - JJ work_dzeata5onzf7rp26j2quaotjza 396 20 faceted faceted JJ work_dzeata5onzf7rp26j2quaotjza 396 21 empirical empirical JJ work_dzeata5onzf7rp26j2quaotjza 396 22 security security NN work_dzeata5onzf7rp26j2quaotjza 396 23 validation validation NN work_dzeata5onzf7rp26j2quaotjza 396 24 and and CC work_dzeata5onzf7rp26j2quaotjza 396 25 those those DT work_dzeata5onzf7rp26j2quaotjza 396 26 that that WDT work_dzeata5onzf7rp26j2quaotjza 396 27 do do VBP work_dzeata5onzf7rp26j2quaotjza 396 28 not not RB work_dzeata5onzf7rp26j2quaotjza 396 29 . . . work_dzeata5onzf7rp26j2quaotjza 397 1 monotonic monotonic NNP work_dzeata5onzf7rp26j2quaotjza 397 2 functions functions NNP work_dzeata5onzf7rp26j2quaotjza 397 3 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 397 4 i.e. i.e. FW work_dzeata5onzf7rp26j2quaotjza 397 5 , , , work_dzeata5onzf7rp26j2quaotjza 397 6 when when WRB work_dzeata5onzf7rp26j2quaotjza 397 7 a a DT work_dzeata5onzf7rp26j2quaotjza 397 8 positive positive JJ work_dzeata5onzf7rp26j2quaotjza 397 9 and and CC work_dzeata5onzf7rp26j2quaotjza 397 10 perfect perfect JJ work_dzeata5onzf7rp26j2quaotjza 397 11 monotonic monotonic JJ work_dzeata5onzf7rp26j2quaotjza 397 12 relationship relationship NN work_dzeata5onzf7rp26j2quaotjza 397 13 exists exist VBZ work_dzeata5onzf7rp26j2quaotjza 397 14 , , , work_dzeata5onzf7rp26j2quaotjza 397 15 the the DT work_dzeata5onzf7rp26j2quaotjza 397 16 Spearman Spearman NNP work_dzeata5onzf7rp26j2quaotjza 397 17 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 397 18 is be VBZ work_dzeata5onzf7rp26j2quaotjza 397 19 1 1 CD work_dzeata5onzf7rp26j2quaotjza 397 20 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 397 21 . . . work_dzeata5onzf7rp26j2quaotjza 398 1 Performance performance NN work_dzeata5onzf7rp26j2quaotjza 398 2 validation validation NN work_dzeata5onzf7rp26j2quaotjza 398 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 398 4 positively positively RB work_dzeata5onzf7rp26j2quaotjza 398 5 , , , work_dzeata5onzf7rp26j2quaotjza 398 6 and and CC work_dzeata5onzf7rp26j2quaotjza 398 7 statistically statistically RB work_dzeata5onzf7rp26j2quaotjza 398 8 significantly significantly RB work_dzeata5onzf7rp26j2quaotjza 398 9 , , , work_dzeata5onzf7rp26j2quaotjza 398 10 correlated correlate VBD work_dzeata5onzf7rp26j2quaotjza 398 11 with with IN work_dzeata5onzf7rp26j2quaotjza 398 12 the the DT work_dzeata5onzf7rp26j2quaotjza 398 13 passage passage NN work_dzeata5onzf7rp26j2quaotjza 398 14 of of IN work_dzeata5onzf7rp26j2quaotjza 398 15 time time NN work_dzeata5onzf7rp26j2quaotjza 398 16 . . . work_dzeata5onzf7rp26j2quaotjza 399 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 399 2 observe observe VBP work_dzeata5onzf7rp26j2quaotjza 399 3 that that IN work_dzeata5onzf7rp26j2quaotjza 399 4 performance performance NN work_dzeata5onzf7rp26j2quaotjza 399 5 validation validation NN work_dzeata5onzf7rp26j2quaotjza 399 6 has have VBZ work_dzeata5onzf7rp26j2quaotjza 399 7 advanced advance VBN work_dzeata5onzf7rp26j2quaotjza 399 8 from from IN work_dzeata5onzf7rp26j2quaotjza 399 9 a a DT work_dzeata5onzf7rp26j2quaotjza 399 10 heavy heavy JJ work_dzeata5onzf7rp26j2quaotjza 399 11 reliance reliance NN work_dzeata5onzf7rp26j2quaotjza 399 12 on on IN work_dzeata5onzf7rp26j2quaotjza 399 13 benchmark benchmark JJ work_dzeata5onzf7rp26j2quaotjza 399 14 suites suite NNS work_dzeata5onzf7rp26j2quaotjza 399 15 to to IN work_dzeata5onzf7rp26j2quaotjza 399 16 the the DT work_dzeata5onzf7rp26j2quaotjza 399 17 use use NN work_dzeata5onzf7rp26j2quaotjza 399 18 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 399 19 - - JJ work_dzeata5onzf7rp26j2quaotjza 399 20 faceted faceted JJ work_dzeata5onzf7rp26j2quaotjza 399 21 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 399 22 that that WDT work_dzeata5onzf7rp26j2quaotjza 399 23 include include VBP work_dzeata5onzf7rp26j2quaotjza 399 24 the the DT work_dzeata5onzf7rp26j2quaotjza 399 25 use use NN work_dzeata5onzf7rp26j2quaotjza 399 26 of of IN work_dzeata5onzf7rp26j2quaotjza 399 27 benchmark benchmark JJ work_dzeata5onzf7rp26j2quaotjza 399 28 suites suite NNS work_dzeata5onzf7rp26j2quaotjza 399 29 and and CC work_dzeata5onzf7rp26j2quaotjza 399 30 case case NN work_dzeata5onzf7rp26j2quaotjza 399 31 studies study NNS work_dzeata5onzf7rp26j2quaotjza 399 32 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 399 33 typically typically RB work_dzeata5onzf7rp26j2quaotjza 399 34 to to TO work_dzeata5onzf7rp26j2quaotjza 399 35 perform perform VB work_dzeata5onzf7rp26j2quaotjza 399 36 micro micro JJ work_dzeata5onzf7rp26j2quaotjza 399 37 - - JJ work_dzeata5onzf7rp26j2quaotjza 399 38 benchmarks benchmarks NNP work_dzeata5onzf7rp26j2quaotjza 399 39 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 399 40 that that WDT work_dzeata5onzf7rp26j2quaotjza 399 41 make make VBP work_dzeata5onzf7rp26j2quaotjza 399 42 use use NN work_dzeata5onzf7rp26j2quaotjza 399 43 of of IN work_dzeata5onzf7rp26j2quaotjza 399 44 public public JJ work_dzeata5onzf7rp26j2quaotjza 399 45 data datum NNS work_dzeata5onzf7rp26j2quaotjza 399 46 — — : work_dzeata5onzf7rp26j2quaotjza 399 47 which which WDT work_dzeata5onzf7rp26j2quaotjza 399 48 ensures ensure VBZ work_dzeata5onzf7rp26j2quaotjza 399 49 the the DT work_dzeata5onzf7rp26j2quaotjza 399 50 results result NNS work_dzeata5onzf7rp26j2quaotjza 399 51 are be VBP work_dzeata5onzf7rp26j2quaotjza 399 52 comparable comparable JJ work_dzeata5onzf7rp26j2quaotjza 399 53 with with IN work_dzeata5onzf7rp26j2quaotjza 399 54 future future JJ work_dzeata5onzf7rp26j2quaotjza 399 55 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 399 56 . . . work_dzeata5onzf7rp26j2quaotjza 400 1 While while IN work_dzeata5onzf7rp26j2quaotjza 400 2 the the DT work_dzeata5onzf7rp26j2quaotjza 400 3 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 400 4 validation validation NN work_dzeata5onzf7rp26j2quaotjza 400 5 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 400 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 400 7 not not RB work_dzeata5onzf7rp26j2quaotjza 400 8 statistically statistically RB work_dzeata5onzf7rp26j2quaotjza 400 9 significant significant JJ work_dzeata5onzf7rp26j2quaotjza 400 10 , , , work_dzeata5onzf7rp26j2quaotjza 400 11 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 400 12 observe observe VBP work_dzeata5onzf7rp26j2quaotjza 400 13 that that DT work_dzeata5onzf7rp26j2quaotjza 400 14 argumentation argumentation NN work_dzeata5onzf7rp26j2quaotjza 400 15 was be VBD work_dzeata5onzf7rp26j2quaotjza 400 16 abandoned abandon VBN work_dzeata5onzf7rp26j2quaotjza 400 17 early early RB work_dzeata5onzf7rp26j2quaotjza 400 18 on on RB work_dzeata5onzf7rp26j2quaotjza 400 19 in in IN work_dzeata5onzf7rp26j2quaotjza 400 20 favor favor NN work_dzeata5onzf7rp26j2quaotjza 400 21 of of IN work_dzeata5onzf7rp26j2quaotjza 400 22 case case NN work_dzeata5onzf7rp26j2quaotjza 400 23 studies study NNS work_dzeata5onzf7rp26j2quaotjza 400 24 , , , work_dzeata5onzf7rp26j2quaotjza 400 25 with with IN work_dzeata5onzf7rp26j2quaotjza 400 26 some some DT work_dzeata5onzf7rp26j2quaotjza 400 27 emphasis emphasis NN work_dzeata5onzf7rp26j2quaotjza 400 28 on on IN work_dzeata5onzf7rp26j2quaotjza 400 29 including include VBG work_dzeata5onzf7rp26j2quaotjza 400 30 benchmark benchmark JJ work_dzeata5onzf7rp26j2quaotjza 400 31 suites suite NNS work_dzeata5onzf7rp26j2quaotjza 400 32 in in IN work_dzeata5onzf7rp26j2quaotjza 400 33 later late JJR work_dzeata5onzf7rp26j2quaotjza 400 34 years year NNS work_dzeata5onzf7rp26j2quaotjza 400 35 . . . work_dzeata5onzf7rp26j2quaotjza 401 1 There there EX work_dzeata5onzf7rp26j2quaotjza 401 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 401 3 no no DT work_dzeata5onzf7rp26j2quaotjza 401 4 apparent apparent JJ work_dzeata5onzf7rp26j2quaotjza 401 5 change change NN work_dzeata5onzf7rp26j2quaotjza 401 6 in in IN work_dzeata5onzf7rp26j2quaotjza 401 7 security security NN work_dzeata5onzf7rp26j2quaotjza 401 8 validation validation NN work_dzeata5onzf7rp26j2quaotjza 401 9 over over IN work_dzeata5onzf7rp26j2quaotjza 401 10 time time NN work_dzeata5onzf7rp26j2quaotjza 401 11 . . . work_dzeata5onzf7rp26j2quaotjza 402 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 402 2 fit fit VBP work_dzeata5onzf7rp26j2quaotjza 402 3 linear linear JJ work_dzeata5onzf7rp26j2quaotjza 402 4 models model NNS work_dzeata5onzf7rp26j2quaotjza 402 5 to to IN work_dzeata5onzf7rp26j2quaotjza 402 6 each each DT work_dzeata5onzf7rp26j2quaotjza 402 7 validation validation NN work_dzeata5onzf7rp26j2quaotjza 402 8 category category NN work_dzeata5onzf7rp26j2quaotjza 402 9 separately separately RB work_dzeata5onzf7rp26j2quaotjza 402 10 and and CC work_dzeata5onzf7rp26j2quaotjza 402 11 together together RB work_dzeata5onzf7rp26j2quaotjza 402 12 relative relative JJ work_dzeata5onzf7rp26j2quaotjza 402 13 to to IN work_dzeata5onzf7rp26j2quaotjza 402 14 ranked rank VBN work_dzeata5onzf7rp26j2quaotjza 402 15 citation citation NN work_dzeata5onzf7rp26j2quaotjza 402 16 counts count NNS work_dzeata5onzf7rp26j2quaotjza 402 17 to to TO work_dzeata5onzf7rp26j2quaotjza 402 18 see see VB work_dzeata5onzf7rp26j2quaotjza 402 19 if if IN work_dzeata5onzf7rp26j2quaotjza 402 20 validation validation NN work_dzeata5onzf7rp26j2quaotjza 402 21 practices practice NNS work_dzeata5onzf7rp26j2quaotjza 402 22 are be VBP work_dzeata5onzf7rp26j2quaotjza 402 23 predictive predictive JJ work_dzeata5onzf7rp26j2quaotjza 402 24 of of IN work_dzeata5onzf7rp26j2quaotjza 402 25 future future JJ work_dzeata5onzf7rp26j2quaotjza 402 26 citations citation NNS work_dzeata5onzf7rp26j2quaotjza 402 27 . . . work_dzeata5onzf7rp26j2quaotjza 403 1 All all DT work_dzeata5onzf7rp26j2quaotjza 403 2 of of IN work_dzeata5onzf7rp26j2quaotjza 403 3 the the DT work_dzeata5onzf7rp26j2quaotjza 403 4 models model NNS work_dzeata5onzf7rp26j2quaotjza 403 5 achieved achieve VBD work_dzeata5onzf7rp26j2quaotjza 403 6 an an DT work_dzeata5onzf7rp26j2quaotjza 403 7 R r NN work_dzeata5onzf7rp26j2quaotjza 403 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 403 9 squared squared JJ work_dzeata5onzf7rp26j2quaotjza 403 10 value value NN work_dzeata5onzf7rp26j2quaotjza 403 11 of of IN work_dzeata5onzf7rp26j2quaotjza 403 12 0.54 0.54 CD work_dzeata5onzf7rp26j2quaotjza 403 13 which which WDT work_dzeata5onzf7rp26j2quaotjza 403 14 suggests suggest VBZ work_dzeata5onzf7rp26j2quaotjza 403 15 that that IN work_dzeata5onzf7rp26j2quaotjza 403 16 passage passage NN work_dzeata5onzf7rp26j2quaotjza 403 17 of of IN work_dzeata5onzf7rp26j2quaotjza 403 18 time time NN work_dzeata5onzf7rp26j2quaotjza 403 19 and and CC work_dzeata5onzf7rp26j2quaotjza 403 20 validation validation NN work_dzeata5onzf7rp26j2quaotjza 403 21 practices practice NNS work_dzeata5onzf7rp26j2quaotjza 403 22 jointly jointly RB work_dzeata5onzf7rp26j2quaotjza 403 23 explain explain VBP work_dzeata5onzf7rp26j2quaotjza 403 24 about about IN work_dzeata5onzf7rp26j2quaotjza 403 25 half half NN work_dzeata5onzf7rp26j2quaotjza 403 26 of of IN work_dzeata5onzf7rp26j2quaotjza 403 27 the the DT work_dzeata5onzf7rp26j2quaotjza 403 28 variance variance NN work_dzeata5onzf7rp26j2quaotjza 403 29 in in IN work_dzeata5onzf7rp26j2quaotjza 403 30 citation citation NN work_dzeata5onzf7rp26j2quaotjza 403 31 count count NN work_dzeata5onzf7rp26j2quaotjza 403 32 ranks rank VBZ work_dzeata5onzf7rp26j2quaotjza 403 33 . . . work_dzeata5onzf7rp26j2quaotjza 404 1 Validation validation NN work_dzeata5onzf7rp26j2quaotjza 404 2 practices practice VBZ work_dzeata5onzf7rp26j2quaotjza 404 3 on on IN work_dzeata5onzf7rp26j2quaotjza 404 4 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 404 5 own own JJ work_dzeata5onzf7rp26j2quaotjza 404 6 are be VBP work_dzeata5onzf7rp26j2quaotjza 404 7 not not RB work_dzeata5onzf7rp26j2quaotjza 404 8 predictive predictive JJ work_dzeata5onzf7rp26j2quaotjza 404 9 of of IN work_dzeata5onzf7rp26j2quaotjza 404 10 how how WRB work_dzeata5onzf7rp26j2quaotjza 404 11 highly highly RB work_dzeata5onzf7rp26j2quaotjza 404 12 cited cite VBD work_dzeata5onzf7rp26j2quaotjza 404 13 a a DT work_dzeata5onzf7rp26j2quaotjza 404 14 paper paper NN work_dzeata5onzf7rp26j2quaotjza 404 15 will will MD work_dzeata5onzf7rp26j2quaotjza 404 16 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 404 17 et et NNP work_dzeata5onzf7rp26j2quaotjza 404 18 al al NNP work_dzeata5onzf7rp26j2quaotjza 404 19 . . . work_dzeata5onzf7rp26j2quaotjza 405 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 405 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 405 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 405 4 , , , work_dzeata5onzf7rp26j2quaotjza 405 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 405 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 405 7 . . . work_dzeata5onzf7rp26j2quaotjza 406 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 406 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 406 3 , , , work_dzeata5onzf7rp26j2quaotjza 406 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 406 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 406 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 406 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 406 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 406 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 406 10 20/36 20/36 CD work_dzeata5onzf7rp26j2quaotjza 406 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 406 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 406 13 Figure Figure NNP work_dzeata5onzf7rp26j2quaotjza 406 14 7 7 CD work_dzeata5onzf7rp26j2quaotjza 406 15 Breakdown breakdown NN work_dzeata5onzf7rp26j2quaotjza 406 16 of of IN work_dzeata5onzf7rp26j2quaotjza 406 17 the the DT work_dzeata5onzf7rp26j2quaotjza 406 18 representation representation NN work_dzeata5onzf7rp26j2quaotjza 406 19 of of IN work_dzeata5onzf7rp26j2quaotjza 406 20 validation validation NN work_dzeata5onzf7rp26j2quaotjza 406 21 codes code NNS work_dzeata5onzf7rp26j2quaotjza 406 22 per per IN work_dzeata5onzf7rp26j2quaotjza 406 23 claim claim NN work_dzeata5onzf7rp26j2quaotjza 406 24 type type NN work_dzeata5onzf7rp26j2quaotjza 406 25 for for IN work_dzeata5onzf7rp26j2quaotjza 406 26 the the DT work_dzeata5onzf7rp26j2quaotjza 406 27 three three CD work_dzeata5onzf7rp26j2quaotjza 406 28 validation validation NN work_dzeata5onzf7rp26j2quaotjza 406 29 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 406 30 found find VBN work_dzeata5onzf7rp26j2quaotjza 406 31 in in IN work_dzeata5onzf7rp26j2quaotjza 406 32 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 406 33 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 406 34 . . . work_dzeata5onzf7rp26j2quaotjza 407 1 Each each DT work_dzeata5onzf7rp26j2quaotjza 407 2 row row NN work_dzeata5onzf7rp26j2quaotjza 407 3 contains contain VBZ work_dzeata5onzf7rp26j2quaotjza 407 4 the the DT work_dzeata5onzf7rp26j2quaotjza 407 5 data datum NNS work_dzeata5onzf7rp26j2quaotjza 407 6 for for IN work_dzeata5onzf7rp26j2quaotjza 407 7 one one CD work_dzeata5onzf7rp26j2quaotjza 407 8 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 407 9 . . . work_dzeata5onzf7rp26j2quaotjza 408 1 The the DT work_dzeata5onzf7rp26j2quaotjza 408 2 bottom bottom JJ work_dzeata5onzf7rp26j2quaotjza 408 3 two two CD work_dzeata5onzf7rp26j2quaotjza 408 4 clusters cluster NNS work_dzeata5onzf7rp26j2quaotjza 408 5 include include VBP work_dzeata5onzf7rp26j2quaotjza 408 6 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 408 7 that that WDT work_dzeata5onzf7rp26j2quaotjza 408 8 do do VBP work_dzeata5onzf7rp26j2quaotjza 408 9 not not RB work_dzeata5onzf7rp26j2quaotjza 408 10 emphasize emphasize VB work_dzeata5onzf7rp26j2quaotjza 408 11 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 408 12 - - JJ work_dzeata5onzf7rp26j2quaotjza 408 13 faceted faceted JJ work_dzeata5onzf7rp26j2quaotjza 408 14 security security NN work_dzeata5onzf7rp26j2quaotjza 408 15 validation validation NN work_dzeata5onzf7rp26j2quaotjza 408 16 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 408 17 , , , work_dzeata5onzf7rp26j2quaotjza 408 18 instead instead RB work_dzeata5onzf7rp26j2quaotjza 408 19 relying rely VBG work_dzeata5onzf7rp26j2quaotjza 408 20 on on IN work_dzeata5onzf7rp26j2quaotjza 408 21 case case NN work_dzeata5onzf7rp26j2quaotjza 408 22 studies study NNS work_dzeata5onzf7rp26j2quaotjza 408 23 and and CC work_dzeata5onzf7rp26j2quaotjza 408 24 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 408 25 that that IN work_dzeata5onzf7rp26j2quaotjza 408 26 security security NN work_dzeata5onzf7rp26j2quaotjza 408 27 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 408 28 are be VBP work_dzeata5onzf7rp26j2quaotjza 408 29 true true JJ work_dzeata5onzf7rp26j2quaotjza 408 30 . . . work_dzeata5onzf7rp26j2quaotjza 409 1 Cases case NNS work_dzeata5onzf7rp26j2quaotjza 409 2 where where WRB work_dzeata5onzf7rp26j2quaotjza 409 3 a a DT work_dzeata5onzf7rp26j2quaotjza 409 4 claim claim NN work_dzeata5onzf7rp26j2quaotjza 409 5 was be VBD work_dzeata5onzf7rp26j2quaotjza 409 6 made make VBN work_dzeata5onzf7rp26j2quaotjza 409 7 but but CC work_dzeata5onzf7rp26j2quaotjza 409 8 not not RB work_dzeata5onzf7rp26j2quaotjza 409 9 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 409 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 409 11 labeled label VBN work_dzeata5onzf7rp26j2quaotjza 409 12 with with IN work_dzeata5onzf7rp26j2quaotjza 409 13 an an DT work_dzeata5onzf7rp26j2quaotjza 409 14 “ " `` work_dzeata5onzf7rp26j2quaotjza 409 15 x x NN work_dzeata5onzf7rp26j2quaotjza 409 16 ” " '' work_dzeata5onzf7rp26j2quaotjza 409 17 . . . work_dzeata5onzf7rp26j2quaotjza 410 1 become become VB work_dzeata5onzf7rp26j2quaotjza 410 2 . . . work_dzeata5onzf7rp26j2quaotjza 411 1 Table table NN work_dzeata5onzf7rp26j2quaotjza 411 2 6 6 CD work_dzeata5onzf7rp26j2quaotjza 411 3 summarizes summarize VBZ work_dzeata5onzf7rp26j2quaotjza 411 4 the the DT work_dzeata5onzf7rp26j2quaotjza 411 5 types type NNS work_dzeata5onzf7rp26j2quaotjza 411 6 of of IN work_dzeata5onzf7rp26j2quaotjza 411 7 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 411 8 and and CC work_dzeata5onzf7rp26j2quaotjza 411 9 the the DT work_dzeata5onzf7rp26j2quaotjza 411 10 validation validation NN work_dzeata5onzf7rp26j2quaotjza 411 11 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 411 12 employed employ VBN work_dzeata5onzf7rp26j2quaotjza 411 13 per per IN work_dzeata5onzf7rp26j2quaotjza 411 14 type type NN work_dzeata5onzf7rp26j2quaotjza 411 15 for for IN work_dzeata5onzf7rp26j2quaotjza 411 16 each each DT work_dzeata5onzf7rp26j2quaotjza 411 17 paper paper NN work_dzeata5onzf7rp26j2quaotjza 411 18 in in IN work_dzeata5onzf7rp26j2quaotjza 411 19 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 411 20 set set NN work_dzeata5onzf7rp26j2quaotjza 411 21 . . . work_dzeata5onzf7rp26j2quaotjza 412 1 STRENGTHENING strengthen VBG work_dzeata5onzf7rp26j2quaotjza 412 2 SANDBOXING sandboxing NN work_dzeata5onzf7rp26j2quaotjza 412 3 RESULTS results VBP work_dzeata5onzf7rp26j2quaotjza 412 4 The the DT work_dzeata5onzf7rp26j2quaotjza 412 5 existing exist VBG work_dzeata5onzf7rp26j2quaotjza 412 6 body body NN work_dzeata5onzf7rp26j2quaotjza 412 7 of of IN work_dzeata5onzf7rp26j2quaotjza 412 8 knowledge knowledge NN work_dzeata5onzf7rp26j2quaotjza 412 9 within within IN work_dzeata5onzf7rp26j2quaotjza 412 10 the the DT work_dzeata5onzf7rp26j2quaotjza 412 11 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 412 12 community community NN work_dzeata5onzf7rp26j2quaotjza 412 13 provides provide VBZ work_dzeata5onzf7rp26j2quaotjza 412 14 a a DT work_dzeata5onzf7rp26j2quaotjza 412 15 strong strong JJ work_dzeata5onzf7rp26j2quaotjza 412 16 basis basis NN work_dzeata5onzf7rp26j2quaotjza 412 17 for for IN work_dzeata5onzf7rp26j2quaotjza 412 18 securing secure VBG work_dzeata5onzf7rp26j2quaotjza 412 19 current current JJ work_dzeata5onzf7rp26j2quaotjza 412 20 and and CC work_dzeata5onzf7rp26j2quaotjza 412 21 future future JJ work_dzeata5onzf7rp26j2quaotjza 412 22 software software NN work_dzeata5onzf7rp26j2quaotjza 412 23 systems system NNS work_dzeata5onzf7rp26j2quaotjza 412 24 . . . work_dzeata5onzf7rp26j2quaotjza 413 1 However however RB work_dzeata5onzf7rp26j2quaotjza 413 2 , , , work_dzeata5onzf7rp26j2quaotjza 413 3 the the DT work_dzeata5onzf7rp26j2quaotjza 413 4 results result NNS work_dzeata5onzf7rp26j2quaotjza 413 5 in in IN work_dzeata5onzf7rp26j2quaotjza 413 6 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 413 7 Results result NNS work_dzeata5onzf7rp26j2quaotjza 413 8 ’ ’ POS work_dzeata5onzf7rp26j2quaotjza 413 9 highlight highlight NN work_dzeata5onzf7rp26j2quaotjza 413 10 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 413 11 et et NNP work_dzeata5onzf7rp26j2quaotjza 413 12 al al NNP work_dzeata5onzf7rp26j2quaotjza 413 13 . . . work_dzeata5onzf7rp26j2quaotjza 414 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 414 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 414 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 414 4 , , , work_dzeata5onzf7rp26j2quaotjza 414 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 414 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 414 7 . . . work_dzeata5onzf7rp26j2quaotjza 415 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 415 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 415 3 , , , work_dzeata5onzf7rp26j2quaotjza 415 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 415 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 415 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 415 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 415 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 415 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 415 10 21/36 21/36 CD work_dzeata5onzf7rp26j2quaotjza 415 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 415 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 415 13 Table table NN work_dzeata5onzf7rp26j2quaotjza 415 14 5 5 CD work_dzeata5onzf7rp26j2quaotjza 415 15 The the DT work_dzeata5onzf7rp26j2quaotjza 415 16 Spearman Spearman NNP work_dzeata5onzf7rp26j2quaotjza 415 17 correlations correlation NNS work_dzeata5onzf7rp26j2quaotjza 415 18 and and CC work_dzeata5onzf7rp26j2quaotjza 415 19 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 415 20 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 415 21 significances significance NNS work_dzeata5onzf7rp26j2quaotjza 415 22 per per IN work_dzeata5onzf7rp26j2quaotjza 415 23 validation validation NN work_dzeata5onzf7rp26j2quaotjza 415 24 category category NN work_dzeata5onzf7rp26j2quaotjza 415 25 . . . work_dzeata5onzf7rp26j2quaotjza 416 1 Data datum NNS work_dzeata5onzf7rp26j2quaotjza 416 2 with with IN work_dzeata5onzf7rp26j2quaotjza 416 3 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 416 4 coefficients coefficient NNS work_dzeata5onzf7rp26j2quaotjza 416 5 closer close RBR work_dzeata5onzf7rp26j2quaotjza 416 6 to to IN work_dzeata5onzf7rp26j2quaotjza 416 7 1 1 CD work_dzeata5onzf7rp26j2quaotjza 416 8 have have VB work_dzeata5onzf7rp26j2quaotjza 416 9 stronger strong JJR work_dzeata5onzf7rp26j2quaotjza 416 10 correlations correlation NNS work_dzeata5onzf7rp26j2quaotjza 416 11 . . . work_dzeata5onzf7rp26j2quaotjza 417 1 Correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 417 2 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 417 3 ρ ρ NN work_dzeata5onzf7rp26j2quaotjza 417 4 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 417 5 p p NN work_dzeata5onzf7rp26j2quaotjza 417 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 417 7 value value NN work_dzeata5onzf7rp26j2quaotjza 417 8 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 417 9 validation validation NN work_dzeata5onzf7rp26j2quaotjza 417 10 −0.02 −0.02 NNP work_dzeata5onzf7rp26j2quaotjza 417 11 0.894 0.894 CD work_dzeata5onzf7rp26j2quaotjza 417 12 Performance Performance NNP work_dzeata5onzf7rp26j2quaotjza 417 13 validation validation NN work_dzeata5onzf7rp26j2quaotjza 417 14 0.30 0.30 CD work_dzeata5onzf7rp26j2quaotjza 417 15 0.014 0.014 CD work_dzeata5onzf7rp26j2quaotjza 417 16 Applicability Applicability NNP work_dzeata5onzf7rp26j2quaotjza 417 17 validation validation NN work_dzeata5onzf7rp26j2quaotjza 417 18 0.20 0.20 CD work_dzeata5onzf7rp26j2quaotjza 417 19 0.105 0.105 CD work_dzeata5onzf7rp26j2quaotjza 417 20 several several JJ work_dzeata5onzf7rp26j2quaotjza 417 21 gaps gap NNS work_dzeata5onzf7rp26j2quaotjza 417 22 . . . work_dzeata5onzf7rp26j2quaotjza 418 1 In in IN work_dzeata5onzf7rp26j2quaotjza 418 2 this this DT work_dzeata5onzf7rp26j2quaotjza 418 3 section section NN work_dzeata5onzf7rp26j2quaotjza 418 4 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 418 5 discuss discuss VBP work_dzeata5onzf7rp26j2quaotjza 418 6 how how WRB work_dzeata5onzf7rp26j2quaotjza 418 7 structured structured JJ work_dzeata5onzf7rp26j2quaotjza 418 8 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 418 9 can can MD work_dzeata5onzf7rp26j2quaotjza 418 10 solve solve VB work_dzeata5onzf7rp26j2quaotjza 418 11 the the DT work_dzeata5onzf7rp26j2quaotjza 418 12 problems problem NNS work_dzeata5onzf7rp26j2quaotjza 418 13 presented present VBN work_dzeata5onzf7rp26j2quaotjza 418 14 by by IN work_dzeata5onzf7rp26j2quaotjza 418 15 incomparable incomparable JJ work_dzeata5onzf7rp26j2quaotjza 418 16 and and CC work_dzeata5onzf7rp26j2quaotjza 418 17 incomplete incomplete JJ work_dzeata5onzf7rp26j2quaotjza 418 18 ad ad FW work_dzeata5onzf7rp26j2quaotjza 418 19 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 418 20 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 418 21 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 418 22 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 418 23 Structured structured JJ work_dzeata5onzf7rp26j2quaotjza 418 24 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 418 25 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 418 26 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 418 27 and and CC work_dzeata5onzf7rp26j2quaotjza 418 28 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 418 29 ways way NNS work_dzeata5onzf7rp26j2quaotjza 418 30 to to TO work_dzeata5onzf7rp26j2quaotjza 418 31 enhance enhance VB work_dzeata5onzf7rp26j2quaotjza 418 32 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 418 33 and and CC work_dzeata5onzf7rp26j2quaotjza 418 34 policy policy NN work_dzeata5onzf7rp26j2quaotjza 418 35 usability usability NN work_dzeata5onzf7rp26j2quaotjza 418 36 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 418 37 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 418 38 and and CC work_dzeata5onzf7rp26j2quaotjza 418 39 policy policy NN work_dzeata5onzf7rp26j2quaotjza 418 40 usability usability NN work_dzeata5onzf7rp26j2quaotjza 418 41 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 418 42 . . . work_dzeata5onzf7rp26j2quaotjza 419 1 Structured structured JJ work_dzeata5onzf7rp26j2quaotjza 419 2 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 419 3 Sandboxes Sandboxes NNP work_dzeata5onzf7rp26j2quaotjza 419 4 are be VBP work_dzeata5onzf7rp26j2quaotjza 419 5 often often RB work_dzeata5onzf7rp26j2quaotjza 419 6 evaluated evaluate VBN work_dzeata5onzf7rp26j2quaotjza 419 7 against against IN work_dzeata5onzf7rp26j2quaotjza 419 8 coarse coarse JJ work_dzeata5onzf7rp26j2quaotjza 419 9 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 419 10 such such JJ work_dzeata5onzf7rp26j2quaotjza 419 11 as as IN work_dzeata5onzf7rp26j2quaotjza 419 12 the the DT work_dzeata5onzf7rp26j2quaotjza 419 13 ability ability NN work_dzeata5onzf7rp26j2quaotjza 419 14 to to TO work_dzeata5onzf7rp26j2quaotjza 419 15 stop stop VB work_dzeata5onzf7rp26j2quaotjza 419 16 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 419 17 against against IN work_dzeata5onzf7rp26j2quaotjza 419 18 certain certain JJ work_dzeata5onzf7rp26j2quaotjza 419 19 classes class NNS work_dzeata5onzf7rp26j2quaotjza 419 20 of of IN work_dzeata5onzf7rp26j2quaotjza 419 21 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 419 22 , , , work_dzeata5onzf7rp26j2quaotjza 419 23 to to TO work_dzeata5onzf7rp26j2quaotjza 419 24 encapsulate encapsulate VB work_dzeata5onzf7rp26j2quaotjza 419 25 certain certain JJ work_dzeata5onzf7rp26j2quaotjza 419 26 categories category NNS work_dzeata5onzf7rp26j2quaotjza 419 27 of of IN work_dzeata5onzf7rp26j2quaotjza 419 28 operations operation NNS work_dzeata5onzf7rp26j2quaotjza 419 29 , , , work_dzeata5onzf7rp26j2quaotjza 419 30 or or CC work_dzeata5onzf7rp26j2quaotjza 419 31 to to TO work_dzeata5onzf7rp26j2quaotjza 419 32 function function VB work_dzeata5onzf7rp26j2quaotjza 419 33 in in IN work_dzeata5onzf7rp26j2quaotjza 419 34 new new JJ work_dzeata5onzf7rp26j2quaotjza 419 35 environments environment NNS work_dzeata5onzf7rp26j2quaotjza 419 36 . . . work_dzeata5onzf7rp26j2quaotjza 420 1 However however RB work_dzeata5onzf7rp26j2quaotjza 420 2 , , , work_dzeata5onzf7rp26j2quaotjza 420 3 these these DT work_dzeata5onzf7rp26j2quaotjza 420 4 coarse coarse JJ work_dzeata5onzf7rp26j2quaotjza 420 5 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 420 6 typically typically RB work_dzeata5onzf7rp26j2quaotjza 420 7 require require VBP work_dzeata5onzf7rp26j2quaotjza 420 8 the the DT work_dzeata5onzf7rp26j2quaotjza 420 9 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 420 10 to to TO work_dzeata5onzf7rp26j2quaotjza 420 11 address address VB work_dzeata5onzf7rp26j2quaotjza 420 12 a a DT work_dzeata5onzf7rp26j2quaotjza 420 13 number number NN work_dzeata5onzf7rp26j2quaotjza 420 14 of of IN work_dzeata5onzf7rp26j2quaotjza 420 15 sub sub NN work_dzeata5onzf7rp26j2quaotjza 420 16 - - HYPH work_dzeata5onzf7rp26j2quaotjza 420 17 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 420 18 . . . work_dzeata5onzf7rp26j2quaotjza 421 1 For for IN work_dzeata5onzf7rp26j2quaotjza 421 2 example example NN work_dzeata5onzf7rp26j2quaotjza 421 3 , , , work_dzeata5onzf7rp26j2quaotjza 421 4 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 421 5 & & CC work_dzeata5onzf7rp26j2quaotjza 421 6 Sekar Sekar NNP work_dzeata5onzf7rp26j2quaotjza 421 7 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 421 8 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 421 9 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 421 10 provide provide VB work_dzeata5onzf7rp26j2quaotjza 421 11 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 421 12 without without IN work_dzeata5onzf7rp26j2quaotjza 421 13 requiring require VBG work_dzeata5onzf7rp26j2quaotjza 421 14 compiler compiler NN work_dzeata5onzf7rp26j2quaotjza 421 15 support support NN work_dzeata5onzf7rp26j2quaotjza 421 16 or or CC work_dzeata5onzf7rp26j2quaotjza 421 17 a a DT work_dzeata5onzf7rp26j2quaotjza 421 18 priori priori JJ work_dzeata5onzf7rp26j2quaotjza 421 19 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 421 20 , , , work_dzeata5onzf7rp26j2quaotjza 421 21 unlike unlike IN work_dzeata5onzf7rp26j2quaotjza 421 22 earlier early JJR work_dzeata5onzf7rp26j2quaotjza 421 23 implementations implementation NNS work_dzeata5onzf7rp26j2quaotjza 421 24 . . . work_dzeata5onzf7rp26j2quaotjza 422 1 To to TO work_dzeata5onzf7rp26j2quaotjza 422 2 ensure ensure VB work_dzeata5onzf7rp26j2quaotjza 422 3 the the DT work_dzeata5onzf7rp26j2quaotjza 422 4 technique technique NN work_dzeata5onzf7rp26j2quaotjza 422 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 422 6 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 422 7 , , , work_dzeata5onzf7rp26j2quaotjza 422 8 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 422 9 must must MD work_dzeata5onzf7rp26j2quaotjza 422 10 be be VB work_dzeata5onzf7rp26j2quaotjza 422 11 sure sure JJ work_dzeata5onzf7rp26j2quaotjza 422 12 that that IN work_dzeata5onzf7rp26j2quaotjza 422 13 independently independently RB work_dzeata5onzf7rp26j2quaotjza 422 14 transformed transform VBD work_dzeata5onzf7rp26j2quaotjza 422 15 program program NN work_dzeata5onzf7rp26j2quaotjza 422 16 modules module NNS work_dzeata5onzf7rp26j2quaotjza 422 17 maintain maintain VBP work_dzeata5onzf7rp26j2quaotjza 422 18 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 422 19 when when WRB work_dzeata5onzf7rp26j2quaotjza 422 20 composed compose VBN work_dzeata5onzf7rp26j2quaotjza 422 21 . . . work_dzeata5onzf7rp26j2quaotjza 423 1 Details detail NNS work_dzeata5onzf7rp26j2quaotjza 423 2 that that WDT work_dzeata5onzf7rp26j2quaotjza 423 3 clarify clarify VBP work_dzeata5onzf7rp26j2quaotjza 423 4 how how WRB work_dzeata5onzf7rp26j2quaotjza 423 5 an an DT work_dzeata5onzf7rp26j2quaotjza 423 6 individual individual JJ work_dzeata5onzf7rp26j2quaotjza 423 7 criterion criterion NN work_dzeata5onzf7rp26j2quaotjza 423 8 is be VBZ work_dzeata5onzf7rp26j2quaotjza 423 9 fulfilled fulfil VBN work_dzeata5onzf7rp26j2quaotjza 423 10 can can MD work_dzeata5onzf7rp26j2quaotjza 423 11 easily easily RB work_dzeata5onzf7rp26j2quaotjza 423 12 be be VB work_dzeata5onzf7rp26j2quaotjza 423 13 lost lose VBN work_dzeata5onzf7rp26j2quaotjza 423 14 when when WRB work_dzeata5onzf7rp26j2quaotjza 423 15 ad ad FW work_dzeata5onzf7rp26j2quaotjza 423 16 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 423 17 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 423 18 are be VBP work_dzeata5onzf7rp26j2quaotjza 423 19 used use VBN work_dzeata5onzf7rp26j2quaotjza 423 20 in in IN work_dzeata5onzf7rp26j2quaotjza 423 21 an an DT work_dzeata5onzf7rp26j2quaotjza 423 22 effort effort NN work_dzeata5onzf7rp26j2quaotjza 423 23 to to TO work_dzeata5onzf7rp26j2quaotjza 423 24 persuade persuade VB work_dzeata5onzf7rp26j2quaotjza 423 25 readers reader NNS work_dzeata5onzf7rp26j2quaotjza 423 26 that that IN work_dzeata5onzf7rp26j2quaotjza 423 27 the the DT work_dzeata5onzf7rp26j2quaotjza 423 28 criterion criterion NN work_dzeata5onzf7rp26j2quaotjza 423 29 has have VBZ work_dzeata5onzf7rp26j2quaotjza 423 30 been be VBN work_dzeata5onzf7rp26j2quaotjza 423 31 met meet VBN work_dzeata5onzf7rp26j2quaotjza 423 32 ; ; : work_dzeata5onzf7rp26j2quaotjza 423 33 particularly particularly RB work_dzeata5onzf7rp26j2quaotjza 423 34 in in IN work_dzeata5onzf7rp26j2quaotjza 423 35 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 423 36 with with IN work_dzeata5onzf7rp26j2quaotjza 423 37 non non JJ work_dzeata5onzf7rp26j2quaotjza 423 38 - - JJ work_dzeata5onzf7rp26j2quaotjza 423 39 trivial trivial JJ work_dzeata5onzf7rp26j2quaotjza 423 40 design design NN work_dzeata5onzf7rp26j2quaotjza 423 41 and and CC work_dzeata5onzf7rp26j2quaotjza 423 42 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 423 43 details detail NNS work_dzeata5onzf7rp26j2quaotjza 423 44 . . . work_dzeata5onzf7rp26j2quaotjza 424 1 This this DT work_dzeata5onzf7rp26j2quaotjza 424 2 can can MD work_dzeata5onzf7rp26j2quaotjza 424 3 leave leave VB work_dzeata5onzf7rp26j2quaotjza 424 4 the the DT work_dzeata5onzf7rp26j2quaotjza 424 5 reader reader NN work_dzeata5onzf7rp26j2quaotjza 424 6 unable unable JJ work_dzeata5onzf7rp26j2quaotjza 424 7 to to TO work_dzeata5onzf7rp26j2quaotjza 424 8 compare compare VB work_dzeata5onzf7rp26j2quaotjza 424 9 similar similar JJ work_dzeata5onzf7rp26j2quaotjza 424 10 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 424 11 or or CC work_dzeata5onzf7rp26j2quaotjza 424 12 confused confuse VBD work_dzeata5onzf7rp26j2quaotjza 424 13 about about IN work_dzeata5onzf7rp26j2quaotjza 424 14 whether whether IN work_dzeata5onzf7rp26j2quaotjza 424 15 or or CC work_dzeata5onzf7rp26j2quaotjza 424 16 not not RB work_dzeata5onzf7rp26j2quaotjza 424 17 contributions contribution NNS work_dzeata5onzf7rp26j2quaotjza 424 18 were be VBD work_dzeata5onzf7rp26j2quaotjza 424 19 validated validate VBN work_dzeata5onzf7rp26j2quaotjza 424 20 . . . work_dzeata5onzf7rp26j2quaotjza 425 1 Since since IN work_dzeata5onzf7rp26j2quaotjza 425 2 many many JJ work_dzeata5onzf7rp26j2quaotjza 425 3 of of IN work_dzeata5onzf7rp26j2quaotjza 425 4 the the DT work_dzeata5onzf7rp26j2quaotjza 425 5 security security NN work_dzeata5onzf7rp26j2quaotjza 425 6 criteria criterion NNS work_dzeata5onzf7rp26j2quaotjza 425 7 are be VBP work_dzeata5onzf7rp26j2quaotjza 425 8 repeated repeat VBN work_dzeata5onzf7rp26j2quaotjza 425 9 across across IN work_dzeata5onzf7rp26j2quaotjza 425 10 most most JJS work_dzeata5onzf7rp26j2quaotjza 425 11 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 425 12 , , , work_dzeata5onzf7rp26j2quaotjza 425 13 the the DT work_dzeata5onzf7rp26j2quaotjza 425 14 cost cost NN work_dzeata5onzf7rp26j2quaotjza 425 15 of of IN work_dzeata5onzf7rp26j2quaotjza 425 16 developing develop VBG work_dzeata5onzf7rp26j2quaotjza 425 17 substructure substructure NN work_dzeata5onzf7rp26j2quaotjza 425 18 can can MD work_dzeata5onzf7rp26j2quaotjza 425 19 be be VB work_dzeata5onzf7rp26j2quaotjza 425 20 amortized amortize VBN work_dzeata5onzf7rp26j2quaotjza 425 21 across across IN work_dzeata5onzf7rp26j2quaotjza 425 22 lots lot NNS work_dzeata5onzf7rp26j2quaotjza 425 23 of of IN work_dzeata5onzf7rp26j2quaotjza 425 24 communal communal JJ work_dzeata5onzf7rp26j2quaotjza 425 25 use use NN work_dzeata5onzf7rp26j2quaotjza 425 26 . . . work_dzeata5onzf7rp26j2quaotjza 426 1 There there EX work_dzeata5onzf7rp26j2quaotjza 426 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 426 3 many many JJ work_dzeata5onzf7rp26j2quaotjza 426 4 possible possible JJ work_dzeata5onzf7rp26j2quaotjza 426 5 ways way NNS work_dzeata5onzf7rp26j2quaotjza 426 6 to to TO work_dzeata5onzf7rp26j2quaotjza 426 7 structure structure NN work_dzeata5onzf7rp26j2quaotjza 426 8 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 426 9 in in IN work_dzeata5onzf7rp26j2quaotjza 426 10 support support NN work_dzeata5onzf7rp26j2quaotjza 426 11 to to IN work_dzeata5onzf7rp26j2quaotjza 426 12 security security NN work_dzeata5onzf7rp26j2quaotjza 426 13 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 426 14 : : : work_dzeata5onzf7rp26j2quaotjza 426 15 • • NNP work_dzeata5onzf7rp26j2quaotjza 426 16 Assurance assurance NN work_dzeata5onzf7rp26j2quaotjza 426 17 cases case NNS work_dzeata5onzf7rp26j2quaotjza 426 18 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 426 19 Weinstock Weinstock NNP work_dzeata5onzf7rp26j2quaotjza 426 20 , , , work_dzeata5onzf7rp26j2quaotjza 426 21 Lipson Lipson NNP work_dzeata5onzf7rp26j2quaotjza 426 22 & & CC work_dzeata5onzf7rp26j2quaotjza 426 23 Goodenough Goodenough NNP work_dzeata5onzf7rp26j2quaotjza 426 24 , , , work_dzeata5onzf7rp26j2quaotjza 426 25 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 426 26 ; ; : work_dzeata5onzf7rp26j2quaotjza 426 27 Kelly Kelly NNP work_dzeata5onzf7rp26j2quaotjza 426 28 , , , work_dzeata5onzf7rp26j2quaotjza 426 29 1999 1999 CD work_dzeata5onzf7rp26j2quaotjza 426 30 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 426 31 provide provide VBP work_dzeata5onzf7rp26j2quaotjza 426 32 graphical graphical JJ work_dzeata5onzf7rp26j2quaotjza 426 33 structures structure NNS work_dzeata5onzf7rp26j2quaotjza 426 34 that that WDT work_dzeata5onzf7rp26j2quaotjza 426 35 explicitly explicitly RB work_dzeata5onzf7rp26j2quaotjza 426 36 tie tie VBP work_dzeata5onzf7rp26j2quaotjza 426 37 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 426 38 together together RB work_dzeata5onzf7rp26j2quaotjza 426 39 in in IN work_dzeata5onzf7rp26j2quaotjza 426 40 trees tree NNS work_dzeata5onzf7rp26j2quaotjza 426 41 that that WDT work_dzeata5onzf7rp26j2quaotjza 426 42 show show VBP work_dzeata5onzf7rp26j2quaotjza 426 43 how how WRB work_dzeata5onzf7rp26j2quaotjza 426 44 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 426 45 are be VBP work_dzeata5onzf7rp26j2quaotjza 426 46 nar- nar- RB work_dzeata5onzf7rp26j2quaotjza 426 47 rowed row VBN work_dzeata5onzf7rp26j2quaotjza 426 48 . . . work_dzeata5onzf7rp26j2quaotjza 427 1 Knight Knight NNP work_dzeata5onzf7rp26j2quaotjza 427 2 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 427 3 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 427 4 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 427 5 provides provide VBZ work_dzeata5onzf7rp26j2quaotjza 427 6 a a DT work_dzeata5onzf7rp26j2quaotjza 427 7 concise concise JJ work_dzeata5onzf7rp26j2quaotjza 427 8 introduction introduction NN work_dzeata5onzf7rp26j2quaotjza 427 9 to to IN work_dzeata5onzf7rp26j2quaotjza 427 10 the the DT work_dzeata5onzf7rp26j2quaotjza 427 11 topic topic NN work_dzeata5onzf7rp26j2quaotjza 427 12 . . . work_dzeata5onzf7rp26j2quaotjza 428 1 These these DT work_dzeata5onzf7rp26j2quaotjza 428 2 structures structure NNS work_dzeata5onzf7rp26j2quaotjza 428 3 also also RB work_dzeata5onzf7rp26j2quaotjza 428 4 explicitly explicitly RB work_dzeata5onzf7rp26j2quaotjza 428 5 link link VBP work_dzeata5onzf7rp26j2quaotjza 428 6 leaf leaf NN work_dzeata5onzf7rp26j2quaotjza 428 7 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 428 8 to to IN work_dzeata5onzf7rp26j2quaotjza 428 9 the the DT work_dzeata5onzf7rp26j2quaotjza 428 10 evidence evidence NN work_dzeata5onzf7rp26j2quaotjza 428 11 that that WDT work_dzeata5onzf7rp26j2quaotjza 428 12 supports support VBZ work_dzeata5onzf7rp26j2quaotjza 428 13 the the DT work_dzeata5onzf7rp26j2quaotjza 428 14 claim claim NN work_dzeata5onzf7rp26j2quaotjza 428 15 . . . work_dzeata5onzf7rp26j2quaotjza 429 1 Assurance assurance NN work_dzeata5onzf7rp26j2quaotjza 429 2 cases case NNS work_dzeata5onzf7rp26j2quaotjza 429 3 were be VBD work_dzeata5onzf7rp26j2quaotjza 429 4 created create VBN work_dzeata5onzf7rp26j2quaotjza 429 5 in in IN work_dzeata5onzf7rp26j2quaotjza 429 6 response response NN work_dzeata5onzf7rp26j2quaotjza 429 7 to to IN work_dzeata5onzf7rp26j2quaotjza 429 8 several several JJ work_dzeata5onzf7rp26j2quaotjza 429 9 fatal fatal JJ work_dzeata5onzf7rp26j2quaotjza 429 10 accidents accident NNS work_dzeata5onzf7rp26j2quaotjza 429 11 resulting result VBG work_dzeata5onzf7rp26j2quaotjza 429 12 from from IN work_dzeata5onzf7rp26j2quaotjza 429 13 failures failure NNS work_dzeata5onzf7rp26j2quaotjza 429 14 to to IN work_dzeata5onzf7rp26j2quaotjza 429 15 systematically systematically RB work_dzeata5onzf7rp26j2quaotjza 429 16 and and CC work_dzeata5onzf7rp26j2quaotjza 429 17 thoroughly thoroughly RB work_dzeata5onzf7rp26j2quaotjza 429 18 understand understand VB work_dzeata5onzf7rp26j2quaotjza 429 19 safety safety NN work_dzeata5onzf7rp26j2quaotjza 429 20 concerns concern NNS work_dzeata5onzf7rp26j2quaotjza 429 21 in in IN work_dzeata5onzf7rp26j2quaotjza 429 22 physical physical JJ work_dzeata5onzf7rp26j2quaotjza 429 23 systems system NNS work_dzeata5onzf7rp26j2quaotjza 429 24 . . . work_dzeata5onzf7rp26j2quaotjza 430 1 Their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 430 2 use use NN work_dzeata5onzf7rp26j2quaotjza 430 3 has have VBZ work_dzeata5onzf7rp26j2quaotjza 430 4 spread spread VBN work_dzeata5onzf7rp26j2quaotjza 430 5 to to IN work_dzeata5onzf7rp26j2quaotjza 430 6 security security NN work_dzeata5onzf7rp26j2quaotjza 430 7 and and CC work_dzeata5onzf7rp26j2quaotjza 430 8 safety safety NN work_dzeata5onzf7rp26j2quaotjza 430 9 critical critical JJ work_dzeata5onzf7rp26j2quaotjza 430 10 systems system NNS work_dzeata5onzf7rp26j2quaotjza 430 11 of of IN work_dzeata5onzf7rp26j2quaotjza 430 12 nearly nearly RB work_dzeata5onzf7rp26j2quaotjza 430 13 every every DT work_dzeata5onzf7rp26j2quaotjza 430 14 variety variety NN work_dzeata5onzf7rp26j2quaotjza 430 15 in in IN work_dzeata5onzf7rp26j2quaotjza 430 16 recent recent JJ work_dzeata5onzf7rp26j2quaotjza 430 17 decades decade NNS work_dzeata5onzf7rp26j2quaotjza 430 18 with with IN work_dzeata5onzf7rp26j2quaotjza 430 19 case case NN work_dzeata5onzf7rp26j2quaotjza 430 20 studies study NNS work_dzeata5onzf7rp26j2quaotjza 430 21 from from IN work_dzeata5onzf7rp26j2quaotjza 430 22 aerospace aerospace NN work_dzeata5onzf7rp26j2quaotjza 430 23 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 430 24 Graydon Graydon NNP work_dzeata5onzf7rp26j2quaotjza 430 25 , , , work_dzeata5onzf7rp26j2quaotjza 430 26 Knight Knight NNP work_dzeata5onzf7rp26j2quaotjza 430 27 & & CC work_dzeata5onzf7rp26j2quaotjza 430 28 Strunk Strunk NNP work_dzeata5onzf7rp26j2quaotjza 430 29 , , , work_dzeata5onzf7rp26j2quaotjza 430 30 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 430 31 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 430 32 and and CC work_dzeata5onzf7rp26j2quaotjza 430 33 a a DT work_dzeata5onzf7rp26j2quaotjza 430 34 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 430 35 called call VBN work_dzeata5onzf7rp26j2quaotjza 430 36 S3 S3 NNP work_dzeata5onzf7rp26j2quaotjza 430 37 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 430 38 Rodes Rodes NNPS work_dzeata5onzf7rp26j2quaotjza 430 39 et et NNP work_dzeata5onzf7rp26j2quaotjza 430 40 al al NNP work_dzeata5onzf7rp26j2quaotjza 430 41 . . NNP work_dzeata5onzf7rp26j2quaotjza 430 42 , , , work_dzeata5onzf7rp26j2quaotjza 430 43 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 430 44 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 430 45 that that WDT work_dzeata5onzf7rp26j2quaotjza 430 46 was be VBD work_dzeata5onzf7rp26j2quaotjza 430 47 not not RB work_dzeata5onzf7rp26j2quaotjza 430 48 analyzed analyze VBN work_dzeata5onzf7rp26j2quaotjza 430 49 as as IN work_dzeata5onzf7rp26j2quaotjza 430 50 part part NN work_dzeata5onzf7rp26j2quaotjza 430 51 of of IN work_dzeata5onzf7rp26j2quaotjza 430 52 this this DT work_dzeata5onzf7rp26j2quaotjza 430 53 study study NN work_dzeata5onzf7rp26j2quaotjza 430 54 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 430 55 Nguyen Nguyen NNP work_dzeata5onzf7rp26j2quaotjza 430 56 - - HYPH work_dzeata5onzf7rp26j2quaotjza 430 57 Tuong Tuong NNP work_dzeata5onzf7rp26j2quaotjza 430 58 et et NNP work_dzeata5onzf7rp26j2quaotjza 430 59 al al NNP work_dzeata5onzf7rp26j2quaotjza 430 60 . . NNP work_dzeata5onzf7rp26j2quaotjza 430 61 , , , work_dzeata5onzf7rp26j2quaotjza 430 62 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 430 63 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 430 64 . . . work_dzeata5onzf7rp26j2quaotjza 431 1 Sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 431 2 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 431 3 can can MD work_dzeata5onzf7rp26j2quaotjza 431 4 use use VB work_dzeata5onzf7rp26j2quaotjza 431 5 assurance assurance NN work_dzeata5onzf7rp26j2quaotjza 431 6 cases case NNS work_dzeata5onzf7rp26j2quaotjza 431 7 to to TO work_dzeata5onzf7rp26j2quaotjza 431 8 decompose decompose VB work_dzeata5onzf7rp26j2quaotjza 431 9 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 431 10 to to IN work_dzeata5onzf7rp26j2quaotjza 431 11 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 431 12 most most RBS work_dzeata5onzf7rp26j2quaotjza 431 13 simple simple JJ work_dzeata5onzf7rp26j2quaotjza 431 14 components component NNS work_dzeata5onzf7rp26j2quaotjza 431 15 , , , work_dzeata5onzf7rp26j2quaotjza 431 16 then then RB work_dzeata5onzf7rp26j2quaotjza 431 17 link link VBP work_dzeata5onzf7rp26j2quaotjza 431 18 those those DT work_dzeata5onzf7rp26j2quaotjza 431 19 components component NNS work_dzeata5onzf7rp26j2quaotjza 431 20 to to IN work_dzeata5onzf7rp26j2quaotjza 431 21 relevant relevant JJ work_dzeata5onzf7rp26j2quaotjza 431 22 evidence evidence NN work_dzeata5onzf7rp26j2quaotjza 431 23 in in IN work_dzeata5onzf7rp26j2quaotjza 431 24 the the DT work_dzeata5onzf7rp26j2quaotjza 431 25 paper paper NN work_dzeata5onzf7rp26j2quaotjza 431 26 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 431 27 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 431 28 , , , work_dzeata5onzf7rp26j2quaotjza 431 29 a a DT work_dzeata5onzf7rp26j2quaotjza 431 30 summary summary NN work_dzeata5onzf7rp26j2quaotjza 431 31 of of IN work_dzeata5onzf7rp26j2quaotjza 431 32 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 431 33 results result NNS work_dzeata5onzf7rp26j2quaotjza 431 34 , , , work_dzeata5onzf7rp26j2quaotjza 431 35 a a DT work_dzeata5onzf7rp26j2quaotjza 431 36 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 431 37 section section NN work_dzeata5onzf7rp26j2quaotjza 431 38 reference reference NN work_dzeata5onzf7rp26j2quaotjza 431 39 , , , work_dzeata5onzf7rp26j2quaotjza 431 40 etc etc FW work_dzeata5onzf7rp26j2quaotjza 431 41 . . . work_dzeata5onzf7rp26j2quaotjza 431 42 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 431 43 . . . work_dzeata5onzf7rp26j2quaotjza 432 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 432 2 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 432 3 , , , work_dzeata5onzf7rp26j2quaotjza 432 4 Scherlis Scherlis NNP work_dzeata5onzf7rp26j2quaotjza 432 5 & & CC work_dzeata5onzf7rp26j2quaotjza 432 6 Aldrich Aldrich NNP work_dzeata5onzf7rp26j2quaotjza 432 7 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 432 8 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 432 9 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 432 10 use use VB work_dzeata5onzf7rp26j2quaotjza 432 11 a a DT work_dzeata5onzf7rp26j2quaotjza 432 12 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 432 13 framework framework NN work_dzeata5onzf7rp26j2quaotjza 432 14 to to TO work_dzeata5onzf7rp26j2quaotjza 432 15 compare compare VB work_dzeata5onzf7rp26j2quaotjza 432 16 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 432 17 based base VBN work_dzeata5onzf7rp26j2quaotjza 432 18 on on IN work_dzeata5onzf7rp26j2quaotjza 432 19 what what WP work_dzeata5onzf7rp26j2quaotjza 432 20 happens happen VBZ work_dzeata5onzf7rp26j2quaotjza 432 21 when when WRB work_dzeata5onzf7rp26j2quaotjza 432 22 a a DT work_dzeata5onzf7rp26j2quaotjza 432 23 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 432 24 fails fail VBZ work_dzeata5onzf7rp26j2quaotjza 432 25 , , , work_dzeata5onzf7rp26j2quaotjza 432 26 is be VBZ work_dzeata5onzf7rp26j2quaotjza 432 27 bypassed bypass VBN work_dzeata5onzf7rp26j2quaotjza 432 28 , , , work_dzeata5onzf7rp26j2quaotjza 432 29 or or CC work_dzeata5onzf7rp26j2quaotjza 432 30 holds hold VBZ work_dzeata5onzf7rp26j2quaotjza 432 31 . . . work_dzeata5onzf7rp26j2quaotjza 433 1 Authors author NNS work_dzeata5onzf7rp26j2quaotjza 433 2 could could MD work_dzeata5onzf7rp26j2quaotjza 433 3 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 433 4 et et NNP work_dzeata5onzf7rp26j2quaotjza 433 5 al al NNP work_dzeata5onzf7rp26j2quaotjza 433 6 . . . work_dzeata5onzf7rp26j2quaotjza 434 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 434 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 434 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 434 4 , , , work_dzeata5onzf7rp26j2quaotjza 434 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 434 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 434 7 . . . work_dzeata5onzf7rp26j2quaotjza 435 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 435 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 435 3 , , , work_dzeata5onzf7rp26j2quaotjza 435 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 435 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 435 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 435 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 435 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 435 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 435 10 22/36 22/36 CD work_dzeata5onzf7rp26j2quaotjza 435 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 435 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 435 13 Table Table NNP work_dzeata5onzf7rp26j2quaotjza 435 14 6 6 CD work_dzeata5onzf7rp26j2quaotjza 435 15 Claims Claims NNPS work_dzeata5onzf7rp26j2quaotjza 435 16 made make VBD work_dzeata5onzf7rp26j2quaotjza 435 17 about about IN work_dzeata5onzf7rp26j2quaotjza 435 18 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 435 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 435 20 : : : work_dzeata5onzf7rp26j2quaotjza 435 21 Security security NN work_dzeata5onzf7rp26j2quaotjza 435 22 , , , work_dzeata5onzf7rp26j2quaotjza 435 23 : : : work_dzeata5onzf7rp26j2quaotjza 435 24 Performance performance NN work_dzeata5onzf7rp26j2quaotjza 435 25 , , , work_dzeata5onzf7rp26j2quaotjza 435 26 and and CC work_dzeata5onzf7rp26j2quaotjza 435 27 : : : work_dzeata5onzf7rp26j2quaotjza 435 28 Applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 435 29 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 435 30 and and CC work_dzeata5onzf7rp26j2quaotjza 435 31 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 435 32 validation validation NN work_dzeata5onzf7rp26j2quaotjza 435 33 strategies strategy NNS work_dzeata5onzf7rp26j2quaotjza 435 34 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 435 35 : : : work_dzeata5onzf7rp26j2quaotjza 435 36 Proof Proof NNP work_dzeata5onzf7rp26j2quaotjza 435 37 , , , work_dzeata5onzf7rp26j2quaotjza 435 38 : : : work_dzeata5onzf7rp26j2quaotjza 435 39 An- an- CC work_dzeata5onzf7rp26j2quaotjza 435 40 alytical alytical JJ work_dzeata5onzf7rp26j2quaotjza 435 41 Analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 435 42 , , , work_dzeata5onzf7rp26j2quaotjza 435 43 : : : work_dzeata5onzf7rp26j2quaotjza 435 44 Benchmarks Benchmarks NNP work_dzeata5onzf7rp26j2quaotjza 435 45 , , , work_dzeata5onzf7rp26j2quaotjza 435 46 : : : work_dzeata5onzf7rp26j2quaotjza 435 47 Case Case NNP work_dzeata5onzf7rp26j2quaotjza 435 48 Studies Studies NNP work_dzeata5onzf7rp26j2quaotjza 435 49 , , , work_dzeata5onzf7rp26j2quaotjza 435 50 and and CC work_dzeata5onzf7rp26j2quaotjza 435 51 : : : work_dzeata5onzf7rp26j2quaotjza 435 52 Argumentation Argumentation NNP work_dzeata5onzf7rp26j2quaotjza 435 53 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 435 54 . . . work_dzeata5onzf7rp26j2quaotjza 436 1 Grayed gray VBN work_dzeata5onzf7rp26j2quaotjza 436 2 out out RP work_dzeata5onzf7rp26j2quaotjza 436 3 icons icon NNS work_dzeata5onzf7rp26j2quaotjza 436 4 mean mean VBP work_dzeata5onzf7rp26j2quaotjza 436 5 a a DT work_dzeata5onzf7rp26j2quaotjza 436 6 claim claim NN work_dzeata5onzf7rp26j2quaotjza 436 7 was be VBD work_dzeata5onzf7rp26j2quaotjza 436 8 not not RB work_dzeata5onzf7rp26j2quaotjza 436 9 made make VBN work_dzeata5onzf7rp26j2quaotjza 436 10 or or CC work_dzeata5onzf7rp26j2quaotjza 436 11 a a DT work_dzeata5onzf7rp26j2quaotjza 436 12 strategy strategy NN work_dzeata5onzf7rp26j2quaotjza 436 13 was be VBD work_dzeata5onzf7rp26j2quaotjza 436 14 not not RB work_dzeata5onzf7rp26j2quaotjza 436 15 used use VBN work_dzeata5onzf7rp26j2quaotjza 436 16 . . . work_dzeata5onzf7rp26j2quaotjza 437 1 Icons icon NNS work_dzeata5onzf7rp26j2quaotjza 437 2 made make VBN work_dzeata5onzf7rp26j2quaotjza 437 3 by by IN work_dzeata5onzf7rp26j2quaotjza 437 4 Freepik Freepik NNP work_dzeata5onzf7rp26j2quaotjza 437 5 from from IN work_dzeata5onzf7rp26j2quaotjza 437 6 www.flaticon.com www.flaticon.com ADD work_dzeata5onzf7rp26j2quaotjza 437 7 . . . work_dzeata5onzf7rp26j2quaotjza 438 1 Category Category NNP work_dzeata5onzf7rp26j2quaotjza 438 2 Citation Citation NNP work_dzeata5onzf7rp26j2quaotjza 438 3 Conference Conference NNP work_dzeata5onzf7rp26j2quaotjza 438 4 Claims Claims NNPS work_dzeata5onzf7rp26j2quaotjza 438 5 Val Val NNP work_dzeata5onzf7rp26j2quaotjza 438 6 . . . work_dzeata5onzf7rp26j2quaotjza 439 1 Val Val NNP work_dzeata5onzf7rp26j2quaotjza 439 2 . . . work_dzeata5onzf7rp26j2quaotjza 440 1 Val Val NNP work_dzeata5onzf7rp26j2quaotjza 440 2 . . . work_dzeata5onzf7rp26j2quaotjza 441 1 Other other JJ work_dzeata5onzf7rp26j2quaotjza 441 2 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 441 3 Syscall Syscall NNP work_dzeata5onzf7rp26j2quaotjza 441 4 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 441 5 Provos Provos NNP work_dzeata5onzf7rp26j2quaotjza 441 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 441 7 2003 2003 CD work_dzeata5onzf7rp26j2quaotjza 441 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 441 9 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 441 10 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 441 11 Garfinkel Garfinkel NNP work_dzeata5onzf7rp26j2quaotjza 441 12 et et NNP work_dzeata5onzf7rp26j2quaotjza 441 13 al al NNP work_dzeata5onzf7rp26j2quaotjza 441 14 . . . work_dzeata5onzf7rp26j2quaotjza 442 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 442 2 2003 2003 CD work_dzeata5onzf7rp26j2quaotjza 442 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 442 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 442 5 Diversity Diversity NNP work_dzeata5onzf7rp26j2quaotjza 442 6 Bhatkar Bhatkar NNP work_dzeata5onzf7rp26j2quaotjza 442 7 , , , work_dzeata5onzf7rp26j2quaotjza 442 8 Sekar Sekar NNP work_dzeata5onzf7rp26j2quaotjza 442 9 & & CC work_dzeata5onzf7rp26j2quaotjza 442 10 DuVarney DuVarney NNP work_dzeata5onzf7rp26j2quaotjza 442 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 442 12 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 442 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 442 14 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 442 15 Other Other NNP work_dzeata5onzf7rp26j2quaotjza 442 16 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 442 17 Syscall Syscall NNP work_dzeata5onzf7rp26j2quaotjza 442 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 442 19 Linn Linn NNP work_dzeata5onzf7rp26j2quaotjza 442 20 et et FW work_dzeata5onzf7rp26j2quaotjza 442 21 al al NNP work_dzeata5onzf7rp26j2quaotjza 442 22 . . . work_dzeata5onzf7rp26j2quaotjza 443 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 443 2 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 443 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 443 4 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 443 5 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 443 6 Abadi Abadi NNP work_dzeata5onzf7rp26j2quaotjza 443 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 443 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 443 9 . . . work_dzeata5onzf7rp26j2quaotjza 444 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 444 2 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 444 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 444 4 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 444 5 Other other JJ work_dzeata5onzf7rp26j2quaotjza 444 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 444 7 Memory Memory NNP work_dzeata5onzf7rp26j2quaotjza 444 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 444 9 Ringenburg Ringenburg NNP work_dzeata5onzf7rp26j2quaotjza 444 10 & & CC work_dzeata5onzf7rp26j2quaotjza 444 11 Grossman Grossman NNP work_dzeata5onzf7rp26j2quaotjza 444 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 444 13 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 444 14 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 444 15 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 444 16 MAC MAC NNP work_dzeata5onzf7rp26j2quaotjza 444 17 Efstathopoulos Efstathopoulos NNP work_dzeata5onzf7rp26j2quaotjza 444 18 et et NNP work_dzeata5onzf7rp26j2quaotjza 444 19 al al NNP work_dzeata5onzf7rp26j2quaotjza 444 20 . . . work_dzeata5onzf7rp26j2quaotjza 445 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 445 2 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 445 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 445 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 445 5 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 445 6 Cox Cox NNP work_dzeata5onzf7rp26j2quaotjza 445 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 445 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 445 9 . . . work_dzeata5onzf7rp26j2quaotjza 446 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 446 2 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 446 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 446 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 446 5 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 446 6 McCamant McCamant NNP work_dzeata5onzf7rp26j2quaotjza 446 7 & & CC work_dzeata5onzf7rp26j2quaotjza 446 8 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 446 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 446 10 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 446 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 446 12 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 446 13 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 446 14 , , , work_dzeata5onzf7rp26j2quaotjza 446 15 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 446 16 Erlingsson Erlingsson NNP work_dzeata5onzf7rp26j2quaotjza 446 17 et et FW work_dzeata5onzf7rp26j2quaotjza 446 18 al al NNP work_dzeata5onzf7rp26j2quaotjza 446 19 . . . work_dzeata5onzf7rp26j2quaotjza 447 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 447 2 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 447 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 447 4 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 447 5 Other other JJ work_dzeata5onzf7rp26j2quaotjza 447 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 447 7 DFI DFI NNP work_dzeata5onzf7rp26j2quaotjza 447 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 447 9 Castro Castro NNP work_dzeata5onzf7rp26j2quaotjza 447 10 , , , work_dzeata5onzf7rp26j2quaotjza 447 11 Costa Costa NNP work_dzeata5onzf7rp26j2quaotjza 447 12 & & CC work_dzeata5onzf7rp26j2quaotjza 447 13 Harris Harris NNP work_dzeata5onzf7rp26j2quaotjza 447 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 447 15 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 447 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 447 17 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 447 18 Web web NN work_dzeata5onzf7rp26j2quaotjza 447 19 Reis Reis NNP work_dzeata5onzf7rp26j2quaotjza 447 20 et et NNP work_dzeata5onzf7rp26j2quaotjza 447 21 al al NNP work_dzeata5onzf7rp26j2quaotjza 447 22 . . . work_dzeata5onzf7rp26j2quaotjza 448 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 448 2 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 448 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 448 4 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 448 5 Other other JJ work_dzeata5onzf7rp26j2quaotjza 448 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 448 7 InfoFlow InfoFlow NNP work_dzeata5onzf7rp26j2quaotjza 448 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 448 9 Zeldovich Zeldovich NNP work_dzeata5onzf7rp26j2quaotjza 448 10 et et NNP work_dzeata5onzf7rp26j2quaotjza 448 11 al al NNP work_dzeata5onzf7rp26j2quaotjza 448 12 . . . work_dzeata5onzf7rp26j2quaotjza 449 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 449 2 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 449 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 449 4 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 449 5 MI MI NNP work_dzeata5onzf7rp26j2quaotjza 449 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 449 7 AC AC NNP work_dzeata5onzf7rp26j2quaotjza 449 8 Li Li NNP work_dzeata5onzf7rp26j2quaotjza 449 9 , , , work_dzeata5onzf7rp26j2quaotjza 449 10 Mao Mao NNP work_dzeata5onzf7rp26j2quaotjza 449 11 & & CC work_dzeata5onzf7rp26j2quaotjza 449 12 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 449 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 449 14 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 449 15 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 449 16 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 449 17 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 449 18 Bandhakavi Bandhakavi NNP work_dzeata5onzf7rp26j2quaotjza 449 19 et et NNP work_dzeata5onzf7rp26j2quaotjza 449 20 al al NNP work_dzeata5onzf7rp26j2quaotjza 449 21 . . . work_dzeata5onzf7rp26j2quaotjza 450 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 450 2 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 450 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 450 4 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 450 5 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 450 6 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 450 7 , , , work_dzeata5onzf7rp26j2quaotjza 450 8 Ross Ross NNP work_dzeata5onzf7rp26j2quaotjza 450 9 & & CC work_dzeata5onzf7rp26j2quaotjza 450 10 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 450 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 450 12 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 450 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 450 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 450 15 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 450 16 Petroni Petroni NNP work_dzeata5onzf7rp26j2quaotjza 450 17 & & CC work_dzeata5onzf7rp26j2quaotjza 450 18 Hicks Hicks NNP work_dzeata5onzf7rp26j2quaotjza 450 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 450 20 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 450 21 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 450 22 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 450 23 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 450 24 Seshadri Seshadri NNP work_dzeata5onzf7rp26j2quaotjza 450 25 et et NNP work_dzeata5onzf7rp26j2quaotjza 450 26 al al NNP work_dzeata5onzf7rp26j2quaotjza 450 27 . . . work_dzeata5onzf7rp26j2quaotjza 451 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 451 2 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 451 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 451 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 451 5 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 451 6 Criswell Criswell NNP work_dzeata5onzf7rp26j2quaotjza 451 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 451 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 451 9 . . . work_dzeata5onzf7rp26j2quaotjza 452 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 452 2 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 452 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 452 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 452 5 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 452 6 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 452 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 452 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 452 9 . . . work_dzeata5onzf7rp26j2quaotjza 453 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 453 2 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 453 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 453 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 453 5 Other other JJ work_dzeata5onzf7rp26j2quaotjza 453 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 453 7 InfoFlow InfoFlow NNP work_dzeata5onzf7rp26j2quaotjza 453 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 453 9 Krohn Krohn NNP work_dzeata5onzf7rp26j2quaotjza 453 10 et et FW work_dzeata5onzf7rp26j2quaotjza 453 11 al al NNP work_dzeata5onzf7rp26j2quaotjza 453 12 . . . work_dzeata5onzf7rp26j2quaotjza 454 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 454 2 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 454 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 454 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 454 5 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 454 6 Akritidis Akritidis NNP work_dzeata5onzf7rp26j2quaotjza 454 7 et et FW work_dzeata5onzf7rp26j2quaotjza 454 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 454 9 . . . work_dzeata5onzf7rp26j2quaotjza 455 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 455 2 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 455 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 455 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 455 5 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 455 6 Payne Payne NNP work_dzeata5onzf7rp26j2quaotjza 455 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 455 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 455 9 . . . work_dzeata5onzf7rp26j2quaotjza 456 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 456 2 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 456 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 456 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 456 5 MI MI NNP work_dzeata5onzf7rp26j2quaotjza 456 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 456 7 AC AC NNP work_dzeata5onzf7rp26j2quaotjza 456 8 Sun Sun NNP work_dzeata5onzf7rp26j2quaotjza 456 9 et et NNP work_dzeata5onzf7rp26j2quaotjza 456 10 al al NNP work_dzeata5onzf7rp26j2quaotjza 456 11 . . . work_dzeata5onzf7rp26j2quaotjza 457 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 457 2 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 457 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 457 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 457 5 Other Other NNP work_dzeata5onzf7rp26j2quaotjza 457 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 457 7 TaintTrack TaintTrack NNP work_dzeata5onzf7rp26j2quaotjza 457 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 457 9 Chang Chang NNP work_dzeata5onzf7rp26j2quaotjza 457 10 , , , work_dzeata5onzf7rp26j2quaotjza 457 11 Streiff Streiff NNP work_dzeata5onzf7rp26j2quaotjza 457 12 & & CC work_dzeata5onzf7rp26j2quaotjza 457 13 Lin Lin NNP work_dzeata5onzf7rp26j2quaotjza 457 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 457 15 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 457 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 457 17 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 457 18 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 457 19 Oda Oda NNP work_dzeata5onzf7rp26j2quaotjza 457 20 et et NNP work_dzeata5onzf7rp26j2quaotjza 457 21 al al NNP work_dzeata5onzf7rp26j2quaotjza 457 22 . . . work_dzeata5onzf7rp26j2quaotjza 458 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 458 2 2008 2008 LS work_dzeata5onzf7rp26j2quaotjza 458 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 458 4 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 458 5 Other other JJ work_dzeata5onzf7rp26j2quaotjza 458 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 458 7 OS OS NNP work_dzeata5onzf7rp26j2quaotjza 458 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 458 9 Williams Williams NNP work_dzeata5onzf7rp26j2quaotjza 458 10 et et NNP work_dzeata5onzf7rp26j2quaotjza 458 11 al al NNP work_dzeata5onzf7rp26j2quaotjza 458 12 . . . work_dzeata5onzf7rp26j2quaotjza 459 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 459 2 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 459 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 459 4 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 459 5 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 459 6 Yee Yee NNP work_dzeata5onzf7rp26j2quaotjza 459 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 459 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 459 9 . . . work_dzeata5onzf7rp26j2quaotjza 460 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 460 2 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 460 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 460 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 460 5 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 460 6 Louw Louw NNP work_dzeata5onzf7rp26j2quaotjza 460 7 & & CC work_dzeata5onzf7rp26j2quaotjza 460 8 Venkatakrishnan Venkatakrishnan NNP work_dzeata5onzf7rp26j2quaotjza 460 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 460 10 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 460 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 460 12 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 460 13 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 460 14 Parno Parno NNP work_dzeata5onzf7rp26j2quaotjza 460 15 et et NNP work_dzeata5onzf7rp26j2quaotjza 460 16 al al NNP work_dzeata5onzf7rp26j2quaotjza 460 17 . . . work_dzeata5onzf7rp26j2quaotjza 461 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 461 2 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 461 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 461 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 461 5 Other Other NNP work_dzeata5onzf7rp26j2quaotjza 461 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 461 7 Memory memory NN work_dzeata5onzf7rp26j2quaotjza 461 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 461 9 Akritidis Akritidis NNP work_dzeata5onzf7rp26j2quaotjza 461 10 et et FW work_dzeata5onzf7rp26j2quaotjza 461 11 al al NNP work_dzeata5onzf7rp26j2quaotjza 461 12 . . . work_dzeata5onzf7rp26j2quaotjza 462 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 462 2 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 462 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 462 4 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 462 5 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 462 6 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 462 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 462 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 462 9 . . . work_dzeata5onzf7rp26j2quaotjza 463 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 463 2 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 463 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 463 4 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 463 5 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 463 6 Castro Castro NNP work_dzeata5onzf7rp26j2quaotjza 463 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 463 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 463 9 . . . work_dzeata5onzf7rp26j2quaotjza 464 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 464 2 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 464 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 464 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 464 5 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 464 6 McCune McCune NNP work_dzeata5onzf7rp26j2quaotjza 464 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 464 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 464 9 . . . work_dzeata5onzf7rp26j2quaotjza 465 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 465 2 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 465 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 465 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 465 5 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 465 6 Meyerovich Meyerovich NNP work_dzeata5onzf7rp26j2quaotjza 465 7 & & CC work_dzeata5onzf7rp26j2quaotjza 465 8 Livshits Livshits NNP work_dzeata5onzf7rp26j2quaotjza 465 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 465 10 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 465 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 465 12 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 465 13 Other Other NNP work_dzeata5onzf7rp26j2quaotjza 465 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 465 15 Memory memory NN work_dzeata5onzf7rp26j2quaotjza 465 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 465 17 Akritidis Akritidis NNP work_dzeata5onzf7rp26j2quaotjza 465 18 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 465 19 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 465 20 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 465 21 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 465 22 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 465 23 Sehr Sehr NNP work_dzeata5onzf7rp26j2quaotjza 465 24 et et NNP work_dzeata5onzf7rp26j2quaotjza 465 25 al al NNP work_dzeata5onzf7rp26j2quaotjza 465 26 . . . work_dzeata5onzf7rp26j2quaotjza 466 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 466 2 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 466 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 466 4 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 466 5 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 466 6 Louw Louw NNP work_dzeata5onzf7rp26j2quaotjza 466 7 , , , work_dzeata5onzf7rp26j2quaotjza 466 8 Ganesh Ganesh NNP work_dzeata5onzf7rp26j2quaotjza 466 9 & & CC work_dzeata5onzf7rp26j2quaotjza 466 10 Venkatakrishnan Venkatakrishnan NNP work_dzeata5onzf7rp26j2quaotjza 466 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 466 12 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 466 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 466 14 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 466 15 Other Other NNP work_dzeata5onzf7rp26j2quaotjza 466 16 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 466 17 OS OS NNP work_dzeata5onzf7rp26j2quaotjza 466 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 466 19 Wurster Wurster NNP work_dzeata5onzf7rp26j2quaotjza 466 20 & & CC work_dzeata5onzf7rp26j2quaotjza 466 21 van van NNP work_dzeata5onzf7rp26j2quaotjza 466 22 Oorschot Oorschot NNP work_dzeata5onzf7rp26j2quaotjza 466 23 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 466 24 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 466 25 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 466 26 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 466 27 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 466 28 , , , work_dzeata5onzf7rp26j2quaotjza 466 29 Other other JJ work_dzeata5onzf7rp26j2quaotjza 466 30 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 466 31 UserPolicy UserPolicy NNP work_dzeata5onzf7rp26j2quaotjza 466 32 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 466 33 Siefers Siefers NNP work_dzeata5onzf7rp26j2quaotjza 466 34 , , , work_dzeata5onzf7rp26j2quaotjza 466 35 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 466 36 & & CC work_dzeata5onzf7rp26j2quaotjza 466 37 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 466 38 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 466 39 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 466 40 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 466 41 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 466 42 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 466 43 continued continue VBN work_dzeata5onzf7rp26j2quaotjza 466 44 on on IN work_dzeata5onzf7rp26j2quaotjza 466 45 next next JJ work_dzeata5onzf7rp26j2quaotjza 466 46 page page NN work_dzeata5onzf7rp26j2quaotjza 466 47 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 466 48 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 466 49 et et NNP work_dzeata5onzf7rp26j2quaotjza 466 50 al al NNP work_dzeata5onzf7rp26j2quaotjza 466 51 . . . work_dzeata5onzf7rp26j2quaotjza 467 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 467 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 467 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 467 4 , , , work_dzeata5onzf7rp26j2quaotjza 467 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 467 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 467 7 . . . work_dzeata5onzf7rp26j2quaotjza 468 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 468 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 468 3 , , , work_dzeata5onzf7rp26j2quaotjza 468 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 468 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 468 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 468 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 468 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 468 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 468 10 23/36 23/36 CD work_dzeata5onzf7rp26j2quaotjza 468 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 468 12 http://www.flaticon.com http://www.flaticon.com `` work_dzeata5onzf7rp26j2quaotjza 468 13 http://www.flaticon.com http://www.flaticon.com VBZ work_dzeata5onzf7rp26j2quaotjza 468 14 http://www.flaticon.com http://www.flaticon.com VBZ work_dzeata5onzf7rp26j2quaotjza 468 15 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 16 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 17 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 18 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 19 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 20 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 21 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 22 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 23 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 24 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 25 http://www.flaticon.com http://www.flaticon.com NNS work_dzeata5onzf7rp26j2quaotjza 468 26 http://www.flaticon.com http://www.flaticon.com UH work_dzeata5onzf7rp26j2quaotjza 468 27 http://www.flaticon.com http://www.flaticon.com ADD work_dzeata5onzf7rp26j2quaotjza 468 28 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 468 29 Table table NN work_dzeata5onzf7rp26j2quaotjza 468 30 6 6 CD work_dzeata5onzf7rp26j2quaotjza 468 31 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 468 32 continued continued JJ work_dzeata5onzf7rp26j2quaotjza 468 33 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 468 34 Category Category NNP work_dzeata5onzf7rp26j2quaotjza 468 35 Citation Citation NNP work_dzeata5onzf7rp26j2quaotjza 468 36 Conference Conference NNP work_dzeata5onzf7rp26j2quaotjza 468 37 Claims Claims NNPS work_dzeata5onzf7rp26j2quaotjza 468 38 Val Val NNP work_dzeata5onzf7rp26j2quaotjza 468 39 . . . work_dzeata5onzf7rp26j2quaotjza 469 1 Val Val NNP work_dzeata5onzf7rp26j2quaotjza 469 2 . . . work_dzeata5onzf7rp26j2quaotjza 470 1 Val Val NNP work_dzeata5onzf7rp26j2quaotjza 470 2 . . . work_dzeata5onzf7rp26j2quaotjza 471 1 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 471 2 Feldman Feldman NNP work_dzeata5onzf7rp26j2quaotjza 471 3 et et NNP work_dzeata5onzf7rp26j2quaotjza 471 4 al al NNP work_dzeata5onzf7rp26j2quaotjza 471 5 . . . work_dzeata5onzf7rp26j2quaotjza 472 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 472 2 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 472 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 472 4 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 472 5 MI MI NNP work_dzeata5onzf7rp26j2quaotjza 472 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 472 7 AC AC NNP work_dzeata5onzf7rp26j2quaotjza 472 8 Owen Owen NNP work_dzeata5onzf7rp26j2quaotjza 472 9 et et FW work_dzeata5onzf7rp26j2quaotjza 472 10 al al NNP work_dzeata5onzf7rp26j2quaotjza 472 11 . . . work_dzeata5onzf7rp26j2quaotjza 473 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 473 2 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 473 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 473 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 473 5 Other Other NNP work_dzeata5onzf7rp26j2quaotjza 473 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 473 7 Transactions Transactions NNPS work_dzeata5onzf7rp26j2quaotjza 473 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 473 9 Jana Jana NNP work_dzeata5onzf7rp26j2quaotjza 473 10 , , , work_dzeata5onzf7rp26j2quaotjza 473 11 Porter Porter NNP work_dzeata5onzf7rp26j2quaotjza 473 12 & & CC work_dzeata5onzf7rp26j2quaotjza 473 13 Shmatikov Shmatikov NNP work_dzeata5onzf7rp26j2quaotjza 473 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 473 15 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 473 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 473 17 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 473 18 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 473 19 Zeng Zeng NNP work_dzeata5onzf7rp26j2quaotjza 473 20 , , , work_dzeata5onzf7rp26j2quaotjza 473 21 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 473 22 & & CC work_dzeata5onzf7rp26j2quaotjza 473 23 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 473 24 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 473 25 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 473 26 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 473 27 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 473 28 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 473 29 Saxena Saxena NNP work_dzeata5onzf7rp26j2quaotjza 473 30 , , , work_dzeata5onzf7rp26j2quaotjza 473 31 Molnar Molnar NNP work_dzeata5onzf7rp26j2quaotjza 473 32 & & CC work_dzeata5onzf7rp26j2quaotjza 473 33 Livshits Livshits NNP work_dzeata5onzf7rp26j2quaotjza 473 34 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 473 35 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 473 36 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 473 37 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 473 38 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 473 39 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 473 40 et et NNP work_dzeata5onzf7rp26j2quaotjza 473 41 al al NNP work_dzeata5onzf7rp26j2quaotjza 473 42 . . . work_dzeata5onzf7rp26j2quaotjza 474 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 474 2 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 474 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 474 4 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 474 5 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 474 6 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 474 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 474 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 474 9 . . . work_dzeata5onzf7rp26j2quaotjza 475 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 475 2 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 475 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 475 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 475 5 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 475 6 Mao Mao NNP work_dzeata5onzf7rp26j2quaotjza 475 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 475 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 475 9 . . . work_dzeata5onzf7rp26j2quaotjza 476 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 476 2 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 476 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 476 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 476 5 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 476 6 Andrus Andrus NNP work_dzeata5onzf7rp26j2quaotjza 476 7 et et FW work_dzeata5onzf7rp26j2quaotjza 476 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 476 9 . . . work_dzeata5onzf7rp26j2quaotjza 477 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 477 2 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 477 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 477 4 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 477 5 Diversity Diversity NNP work_dzeata5onzf7rp26j2quaotjza 477 6 Pappas Pappas NNP work_dzeata5onzf7rp26j2quaotjza 477 7 , , , work_dzeata5onzf7rp26j2quaotjza 477 8 Polychronakis Polychronakis NNP work_dzeata5onzf7rp26j2quaotjza 477 9 & & CC work_dzeata5onzf7rp26j2quaotjza 477 10 Keromytis Keromytis NNP work_dzeata5onzf7rp26j2quaotjza 477 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 477 12 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 477 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 477 14 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 477 15 Diversity Diversity NNP work_dzeata5onzf7rp26j2quaotjza 477 16 Hiser Hiser NNP work_dzeata5onzf7rp26j2quaotjza 477 17 et et NNP work_dzeata5onzf7rp26j2quaotjza 477 18 al al NNP work_dzeata5onzf7rp26j2quaotjza 477 19 . . . work_dzeata5onzf7rp26j2quaotjza 478 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 478 2 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 478 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 478 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 478 5 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 478 6 Payer Payer NNP work_dzeata5onzf7rp26j2quaotjza 478 7 , , , work_dzeata5onzf7rp26j2quaotjza 478 8 Hartmann Hartmann NNP work_dzeata5onzf7rp26j2quaotjza 478 9 & & CC work_dzeata5onzf7rp26j2quaotjza 478 10 Gross Gross NNP work_dzeata5onzf7rp26j2quaotjza 478 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 478 12 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 478 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 478 14 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 478 15 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 478 16 Kemerlis Kemerlis NNP work_dzeata5onzf7rp26j2quaotjza 478 17 , , , work_dzeata5onzf7rp26j2quaotjza 478 18 Portokalidis Portokalidis NNP work_dzeata5onzf7rp26j2quaotjza 478 19 & & CC work_dzeata5onzf7rp26j2quaotjza 478 20 Keromytis Keromytis NNP work_dzeata5onzf7rp26j2quaotjza 478 21 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 478 22 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 478 23 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 478 24 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 478 25 Diversity Diversity NNP work_dzeata5onzf7rp26j2quaotjza 478 26 Giuffrida Giuffrida NNP work_dzeata5onzf7rp26j2quaotjza 478 27 , , , work_dzeata5onzf7rp26j2quaotjza 478 28 Kuijsten Kuijsten NNP work_dzeata5onzf7rp26j2quaotjza 478 29 & & CC work_dzeata5onzf7rp26j2quaotjza 478 30 Tanenbaum Tanenbaum NNP work_dzeata5onzf7rp26j2quaotjza 478 31 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 478 32 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 478 33 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 478 34 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 478 35 MI MI NNP work_dzeata5onzf7rp26j2quaotjza 478 36 / / SYM work_dzeata5onzf7rp26j2quaotjza 478 37 AC AC NNP work_dzeata5onzf7rp26j2quaotjza 478 38 Xu Xu NNP work_dzeata5onzf7rp26j2quaotjza 478 39 , , , work_dzeata5onzf7rp26j2quaotjza 478 40 Saı̈di Saı̈di NNP work_dzeata5onzf7rp26j2quaotjza 478 41 & & CC work_dzeata5onzf7rp26j2quaotjza 478 42 Anderson Anderson NNP work_dzeata5onzf7rp26j2quaotjza 478 43 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 478 44 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 478 45 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 478 46 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 478 47 Diversity Diversity NNP work_dzeata5onzf7rp26j2quaotjza 478 48 Wartell Wartell NNP work_dzeata5onzf7rp26j2quaotjza 478 49 et et NNP work_dzeata5onzf7rp26j2quaotjza 478 50 al al NNP work_dzeata5onzf7rp26j2quaotjza 478 51 . . . work_dzeata5onzf7rp26j2quaotjza 479 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 479 2 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 479 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 479 4 CCS ccs NN work_dzeata5onzf7rp26j2quaotjza 479 5 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 479 6 , , , work_dzeata5onzf7rp26j2quaotjza 479 7 Other other JJ work_dzeata5onzf7rp26j2quaotjza 479 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 479 9 InfoFlow InfoFlow NNP work_dzeata5onzf7rp26j2quaotjza 479 10 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 479 11 De De NNP work_dzeata5onzf7rp26j2quaotjza 479 12 Groef Groef NNP work_dzeata5onzf7rp26j2quaotjza 479 13 et et FW work_dzeata5onzf7rp26j2quaotjza 479 14 al al NNP work_dzeata5onzf7rp26j2quaotjza 479 15 . . . work_dzeata5onzf7rp26j2quaotjza 480 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 480 2 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 480 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 480 4 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 480 5 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 480 6 Dunn Dunn NNP work_dzeata5onzf7rp26j2quaotjza 480 7 et et NNP work_dzeata5onzf7rp26j2quaotjza 480 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 480 9 . . . work_dzeata5onzf7rp26j2quaotjza 481 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 481 2 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 481 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 481 4 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 481 5 Web web NN work_dzeata5onzf7rp26j2quaotjza 481 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 481 7 MI MI NNP work_dzeata5onzf7rp26j2quaotjza 481 8 / / SYM work_dzeata5onzf7rp26j2quaotjza 481 9 AC AC NNP work_dzeata5onzf7rp26j2quaotjza 481 10 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 481 11 Giffin Giffin NNP work_dzeata5onzf7rp26j2quaotjza 481 12 et et NNP work_dzeata5onzf7rp26j2quaotjza 481 13 al al NNP work_dzeata5onzf7rp26j2quaotjza 481 14 . . . work_dzeata5onzf7rp26j2quaotjza 482 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 482 2 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 482 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 482 4 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 482 5 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 482 6 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 482 7 et et FW work_dzeata5onzf7rp26j2quaotjza 482 8 al al NNP work_dzeata5onzf7rp26j2quaotjza 482 9 . . . work_dzeata5onzf7rp26j2quaotjza 483 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 483 2 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 483 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 483 4 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 483 5 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 483 6 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 483 7 & & CC work_dzeata5onzf7rp26j2quaotjza 483 8 Sekar Sekar NNP work_dzeata5onzf7rp26j2quaotjza 483 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 483 10 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 483 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 483 12 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 483 13 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 483 14 , , , work_dzeata5onzf7rp26j2quaotjza 483 15 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 483 16 Niu Niu NNP work_dzeata5onzf7rp26j2quaotjza 483 17 & & CC work_dzeata5onzf7rp26j2quaotjza 483 18 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 483 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 483 20 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 483 21 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 483 22 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 483 23 Diversity Diversity NNP work_dzeata5onzf7rp26j2quaotjza 483 24 Homescu Homescu NNP work_dzeata5onzf7rp26j2quaotjza 483 25 et et NNP work_dzeata5onzf7rp26j2quaotjza 483 26 al al NNP work_dzeata5onzf7rp26j2quaotjza 483 27 . . . work_dzeata5onzf7rp26j2quaotjza 484 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 484 2 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 484 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 484 4 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 484 5 Other other JJ work_dzeata5onzf7rp26j2quaotjza 484 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 484 7 OS OS NNP work_dzeata5onzf7rp26j2quaotjza 484 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 484 9 Moshchuk Moshchuk NNP work_dzeata5onzf7rp26j2quaotjza 484 10 , , , work_dzeata5onzf7rp26j2quaotjza 484 11 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 484 12 & & CC work_dzeata5onzf7rp26j2quaotjza 484 13 Liu Liu NNP work_dzeata5onzf7rp26j2quaotjza 484 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 484 15 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 484 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 484 17 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 484 18 Virtualization Virtualization NNP work_dzeata5onzf7rp26j2quaotjza 484 19 Nikolaev Nikolaev NNP work_dzeata5onzf7rp26j2quaotjza 484 20 & & CC work_dzeata5onzf7rp26j2quaotjza 484 21 Back Back NNP work_dzeata5onzf7rp26j2quaotjza 484 22 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 484 23 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 484 24 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 484 25 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 484 26 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 484 27 Criswell Criswell NNP work_dzeata5onzf7rp26j2quaotjza 484 28 , , , work_dzeata5onzf7rp26j2quaotjza 484 29 Dautenhahn Dautenhahn NNP work_dzeata5onzf7rp26j2quaotjza 484 30 & & CC work_dzeata5onzf7rp26j2quaotjza 484 31 Adve Adve NNP work_dzeata5onzf7rp26j2quaotjza 484 32 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 484 33 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 484 34 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 484 35 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 484 36 Web Web NNP work_dzeata5onzf7rp26j2quaotjza 484 37 Mickens Mickens NNP work_dzeata5onzf7rp26j2quaotjza 484 38 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 484 39 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 484 40 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 484 41 Oakland Oakland NNP work_dzeata5onzf7rp26j2quaotjza 484 42 structure structure NN work_dzeata5onzf7rp26j2quaotjza 484 43 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 484 44 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 484 45 by by IN work_dzeata5onzf7rp26j2quaotjza 484 46 using use VBG work_dzeata5onzf7rp26j2quaotjza 484 47 the the DT work_dzeata5onzf7rp26j2quaotjza 484 48 framework framework NN work_dzeata5onzf7rp26j2quaotjza 484 49 to to TO work_dzeata5onzf7rp26j2quaotjza 484 50 describe describe VB work_dzeata5onzf7rp26j2quaotjza 484 51 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 484 52 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 484 53 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 484 54 without without IN work_dzeata5onzf7rp26j2quaotjza 484 55 performing perform VBG work_dzeata5onzf7rp26j2quaotjza 484 56 explicit explicit JJ work_dzeata5onzf7rp26j2quaotjza 484 57 comparisons comparison NNS work_dzeata5onzf7rp26j2quaotjza 484 58 . . . work_dzeata5onzf7rp26j2quaotjza 485 1 • • VB work_dzeata5onzf7rp26j2quaotjza 485 2 Structured structured JJ work_dzeata5onzf7rp26j2quaotjza 485 3 abstracts abstract NNS work_dzeata5onzf7rp26j2quaotjza 485 4 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 485 5 Hartley Hartley NNP work_dzeata5onzf7rp26j2quaotjza 485 6 , , , work_dzeata5onzf7rp26j2quaotjza 485 7 2004 2004 CD work_dzeata5onzf7rp26j2quaotjza 485 8 ; ; : work_dzeata5onzf7rp26j2quaotjza 485 9 Haynes Haynes NNP work_dzeata5onzf7rp26j2quaotjza 485 10 et et NNP work_dzeata5onzf7rp26j2quaotjza 485 11 al al NNP work_dzeata5onzf7rp26j2quaotjza 485 12 . . NNP work_dzeata5onzf7rp26j2quaotjza 485 13 , , , work_dzeata5onzf7rp26j2quaotjza 485 14 1990 1990 CD work_dzeata5onzf7rp26j2quaotjza 485 15 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 485 16 are be VBP work_dzeata5onzf7rp26j2quaotjza 485 17 used use VBN work_dzeata5onzf7rp26j2quaotjza 485 18 in in IN work_dzeata5onzf7rp26j2quaotjza 485 19 many many JJ work_dzeata5onzf7rp26j2quaotjza 485 20 medical medical JJ work_dzeata5onzf7rp26j2quaotjza 485 21 journals journal NNS work_dzeata5onzf7rp26j2quaotjza 485 22 to to TO work_dzeata5onzf7rp26j2quaotjza 485 23 summarize summarize VB work_dzeata5onzf7rp26j2quaotjza 485 24 key key JJ work_dzeata5onzf7rp26j2quaotjza 485 25 results result NNS work_dzeata5onzf7rp26j2quaotjza 485 26 and and CC work_dzeata5onzf7rp26j2quaotjza 485 27 how how WRB work_dzeata5onzf7rp26j2quaotjza 485 28 those those DT work_dzeata5onzf7rp26j2quaotjza 485 29 results result NNS work_dzeata5onzf7rp26j2quaotjza 485 30 were be VBD work_dzeata5onzf7rp26j2quaotjza 485 31 produced produce VBN work_dzeata5onzf7rp26j2quaotjza 485 32 . . . work_dzeata5onzf7rp26j2quaotjza 486 1 These these DT work_dzeata5onzf7rp26j2quaotjza 486 2 abstracts abstract NNS work_dzeata5onzf7rp26j2quaotjza 486 3 have have VBP work_dzeata5onzf7rp26j2quaotjza 486 4 the the DT work_dzeata5onzf7rp26j2quaotjza 486 5 benefit benefit NN work_dzeata5onzf7rp26j2quaotjza 486 6 of of IN work_dzeata5onzf7rp26j2quaotjza 486 7 being be VBG work_dzeata5onzf7rp26j2quaotjza 486 8 quick quick JJ work_dzeata5onzf7rp26j2quaotjza 486 9 to to TO work_dzeata5onzf7rp26j2quaotjza 486 10 read read VB work_dzeata5onzf7rp26j2quaotjza 486 11 while while IN work_dzeata5onzf7rp26j2quaotjza 486 12 increasing increase VBG work_dzeata5onzf7rp26j2quaotjza 486 13 the the DT work_dzeata5onzf7rp26j2quaotjza 486 14 retention retention NN work_dzeata5onzf7rp26j2quaotjza 486 15 of of IN work_dzeata5onzf7rp26j2quaotjza 486 16 information information NN work_dzeata5onzf7rp26j2quaotjza 486 17 , , , work_dzeata5onzf7rp26j2quaotjza 486 18 largely largely RB work_dzeata5onzf7rp26j2quaotjza 486 19 thanks thank NNS work_dzeata5onzf7rp26j2quaotjza 486 20 to to IN work_dzeata5onzf7rp26j2quaotjza 486 21 the the DT work_dzeata5onzf7rp26j2quaotjza 486 22 use use NN work_dzeata5onzf7rp26j2quaotjza 486 23 of of IN work_dzeata5onzf7rp26j2quaotjza 486 24 structure structure NN work_dzeata5onzf7rp26j2quaotjza 486 25 to to TO work_dzeata5onzf7rp26j2quaotjza 486 26 guide guide VB work_dzeata5onzf7rp26j2quaotjza 486 27 authors author NNS work_dzeata5onzf7rp26j2quaotjza 486 28 in in IN work_dzeata5onzf7rp26j2quaotjza 486 29 precisely precisely RB work_dzeata5onzf7rp26j2quaotjza 486 30 summarizing summarize VBG work_dzeata5onzf7rp26j2quaotjza 486 31 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 486 32 work work NN work_dzeata5onzf7rp26j2quaotjza 486 33 . . . work_dzeata5onzf7rp26j2quaotjza 487 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 487 2 Papers paper NNS work_dzeata5onzf7rp26j2quaotjza 487 3 could could MD work_dzeata5onzf7rp26j2quaotjza 487 4 provide provide VB work_dzeata5onzf7rp26j2quaotjza 487 5 a a DT work_dzeata5onzf7rp26j2quaotjza 487 6 table table NN work_dzeata5onzf7rp26j2quaotjza 487 7 summarizing summarize VBG work_dzeata5onzf7rp26j2quaotjza 487 8 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 487 9 contributions contribution NNS work_dzeata5onzf7rp26j2quaotjza 487 10 and and CC work_dzeata5onzf7rp26j2quaotjza 487 11 the the DT work_dzeata5onzf7rp26j2quaotjza 487 12 important important JJ work_dzeata5onzf7rp26j2quaotjza 487 13 design design NN work_dzeata5onzf7rp26j2quaotjza 487 14 or or CC work_dzeata5onzf7rp26j2quaotjza 487 15 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 487 16 details detail NNS work_dzeata5onzf7rp26j2quaotjza 487 17 that that WDT work_dzeata5onzf7rp26j2quaotjza 487 18 reflect reflect VBP work_dzeata5onzf7rp26j2quaotjza 487 19 the the DT work_dzeata5onzf7rp26j2quaotjza 487 20 contribution contribution NN work_dzeata5onzf7rp26j2quaotjza 487 21 . . . work_dzeata5onzf7rp26j2quaotjza 488 1 All all DT work_dzeata5onzf7rp26j2quaotjza 488 2 of of IN work_dzeata5onzf7rp26j2quaotjza 488 3 these these DT work_dzeata5onzf7rp26j2quaotjza 488 4 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 488 5 provide provide VBP work_dzeata5onzf7rp26j2quaotjza 488 6 the the DT work_dzeata5onzf7rp26j2quaotjza 488 7 reader reader NN work_dzeata5onzf7rp26j2quaotjza 488 8 with with IN work_dzeata5onzf7rp26j2quaotjza 488 9 data datum NNS work_dzeata5onzf7rp26j2quaotjza 488 10 missing miss VBG work_dzeata5onzf7rp26j2quaotjza 488 11 in in IN work_dzeata5onzf7rp26j2quaotjza 488 12 ad ad FW work_dzeata5onzf7rp26j2quaotjza 488 13 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 488 14 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 488 15 : : : work_dzeata5onzf7rp26j2quaotjza 488 16 a a DT work_dzeata5onzf7rp26j2quaotjza 488 17 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 488 18 map map NN work_dzeata5onzf7rp26j2quaotjza 488 19 from from IN work_dzeata5onzf7rp26j2quaotjza 488 20 the the DT work_dzeata5onzf7rp26j2quaotjza 488 21 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 488 22 made make VBN work_dzeata5onzf7rp26j2quaotjza 488 23 about about IN work_dzeata5onzf7rp26j2quaotjza 488 24 a a DT work_dzeata5onzf7rp26j2quaotjza 488 25 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 488 26 to to IN work_dzeata5onzf7rp26j2quaotjza 488 27 evidence evidence NN work_dzeata5onzf7rp26j2quaotjza 488 28 that that WDT work_dzeata5onzf7rp26j2quaotjza 488 29 justifies justify VBZ work_dzeata5onzf7rp26j2quaotjza 488 30 the the DT work_dzeata5onzf7rp26j2quaotjza 488 31 claim claim NN work_dzeata5onzf7rp26j2quaotjza 488 32 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 488 33 et et FW work_dzeata5onzf7rp26j2quaotjza 488 34 al al NNP work_dzeata5onzf7rp26j2quaotjza 488 35 . . . work_dzeata5onzf7rp26j2quaotjza 489 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 489 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 489 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 489 4 , , , work_dzeata5onzf7rp26j2quaotjza 489 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 489 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 489 7 . . . work_dzeata5onzf7rp26j2quaotjza 490 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 490 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 490 3 , , , work_dzeata5onzf7rp26j2quaotjza 490 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 490 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 490 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 490 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 490 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 490 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 490 10 24/36 24/36 CD work_dzeata5onzf7rp26j2quaotjza 490 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 490 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 490 13 has have VBZ work_dzeata5onzf7rp26j2quaotjza 490 14 been be VBN work_dzeata5onzf7rp26j2quaotjza 490 15 met meet VBN work_dzeata5onzf7rp26j2quaotjza 490 16 . . . work_dzeata5onzf7rp26j2quaotjza 491 1 They -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 491 2 are be VBP work_dzeata5onzf7rp26j2quaotjza 491 3 also also RB work_dzeata5onzf7rp26j2quaotjza 491 4 necessarily necessarily RB work_dzeata5onzf7rp26j2quaotjza 491 5 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 491 6 , , , work_dzeata5onzf7rp26j2quaotjza 491 7 but but CC work_dzeata5onzf7rp26j2quaotjza 491 8 as as IN work_dzeata5onzf7rp26j2quaotjza 491 9 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 491 10 saw see VBD work_dzeata5onzf7rp26j2quaotjza 491 11 earlier early RBR work_dzeata5onzf7rp26j2quaotjza 491 12 , , , work_dzeata5onzf7rp26j2quaotjza 491 13 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 491 14 are be VBP work_dzeata5onzf7rp26j2quaotjza 491 15 often often RB work_dzeata5onzf7rp26j2quaotjza 491 16 used use VBN work_dzeata5onzf7rp26j2quaotjza 491 17 where where WRB work_dzeata5onzf7rp26j2quaotjza 491 18 more more RBR work_dzeata5onzf7rp26j2quaotjza 491 19 rigorous rigorous JJ work_dzeata5onzf7rp26j2quaotjza 491 20 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 491 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 491 22 currently currently RB work_dzeata5onzf7rp26j2quaotjza 491 23 intractable intractable JJ work_dzeata5onzf7rp26j2quaotjza 491 24 . . . work_dzeata5onzf7rp26j2quaotjza 492 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 492 2 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 492 3 that that IN work_dzeata5onzf7rp26j2quaotjza 492 4 adding add VBG work_dzeata5onzf7rp26j2quaotjza 492 5 structure structure NN work_dzeata5onzf7rp26j2quaotjza 492 6 to to IN work_dzeata5onzf7rp26j2quaotjza 492 7 these these DT work_dzeata5onzf7rp26j2quaotjza 492 8 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 492 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 492 10 a a DT work_dzeata5onzf7rp26j2quaotjza 492 11 reasonable reasonable JJ work_dzeata5onzf7rp26j2quaotjza 492 12 advancement advancement NN work_dzeata5onzf7rp26j2quaotjza 492 13 of of IN work_dzeata5onzf7rp26j2quaotjza 492 14 the the DT work_dzeata5onzf7rp26j2quaotjza 492 15 state state NN work_dzeata5onzf7rp26j2quaotjza 492 16 of of IN work_dzeata5onzf7rp26j2quaotjza 492 17 practice practice NN work_dzeata5onzf7rp26j2quaotjza 492 18 in in IN work_dzeata5onzf7rp26j2quaotjza 492 19 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 492 20 validation validation NN work_dzeata5onzf7rp26j2quaotjza 492 21 . . . work_dzeata5onzf7rp26j2quaotjza 493 1 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 493 2 and and CC work_dzeata5onzf7rp26j2quaotjza 493 3 policy policy NN work_dzeata5onzf7rp26j2quaotjza 493 4 usability usability NN work_dzeata5onzf7rp26j2quaotjza 493 5 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 493 6 and and CC work_dzeata5onzf7rp26j2quaotjza 493 7 policy policy NN work_dzeata5onzf7rp26j2quaotjza 493 8 usability usability NN work_dzeata5onzf7rp26j2quaotjza 493 9 are be VBP work_dzeata5onzf7rp26j2quaotjza 493 10 concerns concern NNS work_dzeata5onzf7rp26j2quaotjza 493 11 of of IN work_dzeata5onzf7rp26j2quaotjza 493 12 interest interest NN work_dzeata5onzf7rp26j2quaotjza 493 13 to to IN work_dzeata5onzf7rp26j2quaotjza 493 14 the the DT work_dzeata5onzf7rp26j2quaotjza 493 15 following follow VBG work_dzeata5onzf7rp26j2quaotjza 493 16 stakeholders stakeholder NNS work_dzeata5onzf7rp26j2quaotjza 493 17 : : : work_dzeata5onzf7rp26j2quaotjza 493 18 practitioners practitioner NNS work_dzeata5onzf7rp26j2quaotjza 493 19 that that WDT work_dzeata5onzf7rp26j2quaotjza 493 20 must must MD work_dzeata5onzf7rp26j2quaotjza 493 21 correctly correctly RB work_dzeata5onzf7rp26j2quaotjza 493 22 use use VB work_dzeata5onzf7rp26j2quaotjza 493 23 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 493 24 to to TO work_dzeata5onzf7rp26j2quaotjza 493 25 improve improve VB work_dzeata5onzf7rp26j2quaotjza 493 26 the the DT work_dzeata5onzf7rp26j2quaotjza 493 27 security security NN work_dzeata5onzf7rp26j2quaotjza 493 28 postures posture NNS work_dzeata5onzf7rp26j2quaotjza 493 29 of of IN work_dzeata5onzf7rp26j2quaotjza 493 30 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 493 31 systems system NNS work_dzeata5onzf7rp26j2quaotjza 493 32 and and CC work_dzeata5onzf7rp26j2quaotjza 493 33 users user NNS work_dzeata5onzf7rp26j2quaotjza 493 34 that that WDT work_dzeata5onzf7rp26j2quaotjza 493 35 must must MD work_dzeata5onzf7rp26j2quaotjza 493 36 work work VB work_dzeata5onzf7rp26j2quaotjza 493 37 with with IN work_dzeata5onzf7rp26j2quaotjza 493 38 sandboxed sandboxed JJ work_dzeata5onzf7rp26j2quaotjza 493 39 applications application NNS work_dzeata5onzf7rp26j2quaotjza 493 40 . . . work_dzeata5onzf7rp26j2quaotjza 494 1 Some some DT work_dzeata5onzf7rp26j2quaotjza 494 2 security security NN work_dzeata5onzf7rp26j2quaotjza 494 3 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 494 4 do do VBP work_dzeata5onzf7rp26j2quaotjza 494 5 attempt attempt VB work_dzeata5onzf7rp26j2quaotjza 494 6 to to TO work_dzeata5onzf7rp26j2quaotjza 494 7 make make VB work_dzeata5onzf7rp26j2quaotjza 494 8 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 494 9 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 494 10 more more RBR work_dzeata5onzf7rp26j2quaotjza 494 11 usable usable JJ work_dzeata5onzf7rp26j2quaotjza 494 12 by by IN work_dzeata5onzf7rp26j2quaotjza 494 13 providing provide VBG work_dzeata5onzf7rp26j2quaotjza 494 14 policy policy NN work_dzeata5onzf7rp26j2quaotjza 494 15 management management NN work_dzeata5onzf7rp26j2quaotjza 494 16 or or CC work_dzeata5onzf7rp26j2quaotjza 494 17 reducing reduce VBG work_dzeata5onzf7rp26j2quaotjza 494 18 requirements requirement NNS work_dzeata5onzf7rp26j2quaotjza 494 19 on on IN work_dzeata5onzf7rp26j2quaotjza 494 20 the the DT work_dzeata5onzf7rp26j2quaotjza 494 21 user user NN work_dzeata5onzf7rp26j2quaotjza 494 22 , , , work_dzeata5onzf7rp26j2quaotjza 494 23 but but CC work_dzeata5onzf7rp26j2quaotjza 494 24 usability usability NN work_dzeata5onzf7rp26j2quaotjza 494 25 is be VBZ work_dzeata5onzf7rp26j2quaotjza 494 26 definitely definitely RB work_dzeata5onzf7rp26j2quaotjza 494 27 not not RB work_dzeata5onzf7rp26j2quaotjza 494 28 a a DT work_dzeata5onzf7rp26j2quaotjza 494 29 focus focus NN work_dzeata5onzf7rp26j2quaotjza 494 30 of of IN work_dzeata5onzf7rp26j2quaotjza 494 31 any any DT work_dzeata5onzf7rp26j2quaotjza 494 32 of of IN work_dzeata5onzf7rp26j2quaotjza 494 33 the the DT work_dzeata5onzf7rp26j2quaotjza 494 34 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 494 35 in in IN work_dzeata5onzf7rp26j2quaotjza 494 36 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 494 37 sample sample NN work_dzeata5onzf7rp26j2quaotjza 494 38 . . . work_dzeata5onzf7rp26j2quaotjza 495 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 495 2 data data NN work_dzeata5onzf7rp26j2quaotjza 495 3 shows show VBZ work_dzeata5onzf7rp26j2quaotjza 495 4 that that IN work_dzeata5onzf7rp26j2quaotjza 495 5 , , , work_dzeata5onzf7rp26j2quaotjza 495 6 with with IN work_dzeata5onzf7rp26j2quaotjza 495 7 very very RB work_dzeata5onzf7rp26j2quaotjza 495 8 few few JJ work_dzeata5onzf7rp26j2quaotjza 495 9 exceptions exception NNS work_dzeata5onzf7rp26j2quaotjza 495 10 , , , work_dzeata5onzf7rp26j2quaotjza 495 11 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 495 12 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 495 13 thoroughly thoroughly RB work_dzeata5onzf7rp26j2quaotjza 495 14 evaluate evaluate VBP work_dzeata5onzf7rp26j2quaotjza 495 15 the the DT work_dzeata5onzf7rp26j2quaotjza 495 16 performance performance NN work_dzeata5onzf7rp26j2quaotjza 495 17 of of IN work_dzeata5onzf7rp26j2quaotjza 495 18 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 495 19 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 495 20 . . . work_dzeata5onzf7rp26j2quaotjza 496 1 Why why WRB work_dzeata5onzf7rp26j2quaotjza 496 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 496 3 there there EX work_dzeata5onzf7rp26j2quaotjza 496 4 focus focus NN work_dzeata5onzf7rp26j2quaotjza 496 5 on on IN work_dzeata5onzf7rp26j2quaotjza 496 6 this this DT work_dzeata5onzf7rp26j2quaotjza 496 7 practical practical JJ work_dzeata5onzf7rp26j2quaotjza 496 8 concern concern NN work_dzeata5onzf7rp26j2quaotjza 496 9 but but CC work_dzeata5onzf7rp26j2quaotjza 496 10 not not RB work_dzeata5onzf7rp26j2quaotjza 496 11 on on IN work_dzeata5onzf7rp26j2quaotjza 496 12 usability usability NN work_dzeata5onzf7rp26j2quaotjza 496 13 ? ? . work_dzeata5onzf7rp26j2quaotjza 497 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 497 2 observe observe VBP work_dzeata5onzf7rp26j2quaotjza 497 3 that that IN work_dzeata5onzf7rp26j2quaotjza 497 4 a a DT work_dzeata5onzf7rp26j2quaotjza 497 5 focus focus NN work_dzeata5onzf7rp26j2quaotjza 497 6 on on IN work_dzeata5onzf7rp26j2quaotjza 497 7 performance performance NN work_dzeata5onzf7rp26j2quaotjza 497 8 evaluation evaluation NN work_dzeata5onzf7rp26j2quaotjza 497 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 497 10 partially partially RB work_dzeata5onzf7rp26j2quaotjza 497 11 motivated motivate VBN work_dzeata5onzf7rp26j2quaotjza 497 12 by by IN work_dzeata5onzf7rp26j2quaotjza 497 13 the the DT work_dzeata5onzf7rp26j2quaotjza 497 14 fact fact NN work_dzeata5onzf7rp26j2quaotjza 497 15 that that IN work_dzeata5onzf7rp26j2quaotjza 497 16 overhead overhead NN work_dzeata5onzf7rp26j2quaotjza 497 17 is be VBZ work_dzeata5onzf7rp26j2quaotjza 497 18 relatively relatively RB work_dzeata5onzf7rp26j2quaotjza 497 19 easy easy JJ work_dzeata5onzf7rp26j2quaotjza 497 20 to to TO work_dzeata5onzf7rp26j2quaotjza 497 21 quantify quantify VB work_dzeata5onzf7rp26j2quaotjza 497 22 , , , work_dzeata5onzf7rp26j2quaotjza 497 23 but but CC work_dzeata5onzf7rp26j2quaotjza 497 24 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 497 25 also also RB work_dzeata5onzf7rp26j2quaotjza 497 26 saw see VBD work_dzeata5onzf7rp26j2quaotjza 497 27 many many JJ work_dzeata5onzf7rp26j2quaotjza 497 28 cases case NNS work_dzeata5onzf7rp26j2quaotjza 497 29 where where WRB work_dzeata5onzf7rp26j2quaotjza 497 30 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 497 31 were be VBD work_dzeata5onzf7rp26j2quaotjza 497 32 explicitly explicitly RB work_dzeata5onzf7rp26j2quaotjza 497 33 concerned concern VBN work_dzeata5onzf7rp26j2quaotjza 497 34 with with IN work_dzeata5onzf7rp26j2quaotjza 497 35 whether whether IN work_dzeata5onzf7rp26j2quaotjza 497 36 or or CC work_dzeata5onzf7rp26j2quaotjza 497 37 not not RB work_dzeata5onzf7rp26j2quaotjza 497 38 a a DT work_dzeata5onzf7rp26j2quaotjza 497 39 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 497 40 was be VBD work_dzeata5onzf7rp26j2quaotjza 497 41 too too RB work_dzeata5onzf7rp26j2quaotjza 497 42 resource resource NN work_dzeata5onzf7rp26j2quaotjza 497 43 intensive intensive JJ work_dzeata5onzf7rp26j2quaotjza 497 44 for for IN work_dzeata5onzf7rp26j2quaotjza 497 45 adoption adoption NN work_dzeata5onzf7rp26j2quaotjza 497 46 . . . work_dzeata5onzf7rp26j2quaotjza 498 1 The the DT work_dzeata5onzf7rp26j2quaotjza 498 2 latter latter NN work_dzeata5onzf7rp26j2quaotjza 498 3 is be VBZ work_dzeata5onzf7rp26j2quaotjza 498 4 a a DT work_dzeata5onzf7rp26j2quaotjza 498 5 reasonable reasonable JJ work_dzeata5onzf7rp26j2quaotjza 498 6 concern concern NN work_dzeata5onzf7rp26j2quaotjza 498 7 ; ; : work_dzeata5onzf7rp26j2quaotjza 498 8 Szekeres Szekeres NNP work_dzeata5onzf7rp26j2quaotjza 498 9 et et NNP work_dzeata5onzf7rp26j2quaotjza 498 10 al al NNP work_dzeata5onzf7rp26j2quaotjza 498 11 . . . work_dzeata5onzf7rp26j2quaotjza 499 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 499 2 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 499 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 499 4 pointed point VBD work_dzeata5onzf7rp26j2quaotjza 499 5 out out RP work_dzeata5onzf7rp26j2quaotjza 499 6 that that IN work_dzeata5onzf7rp26j2quaotjza 499 7 many many JJ work_dzeata5onzf7rp26j2quaotjza 499 8 mitigations mitigation NNS work_dzeata5onzf7rp26j2quaotjza 499 9 for for IN work_dzeata5onzf7rp26j2quaotjza 499 10 memory memory NN work_dzeata5onzf7rp26j2quaotjza 499 11 corruption corruption NN work_dzeata5onzf7rp26j2quaotjza 499 12 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 499 13 are be VBP work_dzeata5onzf7rp26j2quaotjza 499 14 not not RB work_dzeata5onzf7rp26j2quaotjza 499 15 adopted adopt VBN work_dzeata5onzf7rp26j2quaotjza 499 16 because because IN work_dzeata5onzf7rp26j2quaotjza 499 17 performance performance NN work_dzeata5onzf7rp26j2quaotjza 499 18 concerns concern NNS work_dzeata5onzf7rp26j2quaotjza 499 19 outweigh outweigh JJ work_dzeata5onzf7rp26j2quaotjza 499 20 protection protection NN work_dzeata5onzf7rp26j2quaotjza 499 21 merits merit NNS work_dzeata5onzf7rp26j2quaotjza 499 22 . . . work_dzeata5onzf7rp26j2quaotjza 500 1 While while IN work_dzeata5onzf7rp26j2quaotjza 500 2 the the DT work_dzeata5onzf7rp26j2quaotjza 500 3 idea idea NN work_dzeata5onzf7rp26j2quaotjza 500 4 that that IN work_dzeata5onzf7rp26j2quaotjza 500 5 performance performance NN work_dzeata5onzf7rp26j2quaotjza 500 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 500 7 an an DT work_dzeata5onzf7rp26j2quaotjza 500 8 important important JJ work_dzeata5onzf7rp26j2quaotjza 500 9 adoption adoption NN work_dzeata5onzf7rp26j2quaotjza 500 10 concern concern NN work_dzeata5onzf7rp26j2quaotjza 500 11 is be VBZ work_dzeata5onzf7rp26j2quaotjza 500 12 compelling compelling JJ work_dzeata5onzf7rp26j2quaotjza 500 13 and and CC work_dzeata5onzf7rp26j2quaotjza 500 14 likely likely JJ work_dzeata5onzf7rp26j2quaotjza 500 15 reflects reflect VBZ work_dzeata5onzf7rp26j2quaotjza 500 16 reality reality NN work_dzeata5onzf7rp26j2quaotjza 500 17 , , , work_dzeata5onzf7rp26j2quaotjza 500 18 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 500 19 can can MD work_dzeata5onzf7rp26j2quaotjza 500 20 not not RB work_dzeata5onzf7rp26j2quaotjza 500 21 correlate correlate VB work_dzeata5onzf7rp26j2quaotjza 500 22 performance performance NN work_dzeata5onzf7rp26j2quaotjza 500 23 with with IN work_dzeata5onzf7rp26j2quaotjza 500 24 the the DT work_dzeata5onzf7rp26j2quaotjza 500 25 adoption adoption NN work_dzeata5onzf7rp26j2quaotjza 500 26 of of IN work_dzeata5onzf7rp26j2quaotjza 500 27 the the DT work_dzeata5onzf7rp26j2quaotjza 500 28 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 500 29 in in IN work_dzeata5onzf7rp26j2quaotjza 500 30 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 500 31 set set NN work_dzeata5onzf7rp26j2quaotjza 500 32 . . . work_dzeata5onzf7rp26j2quaotjza 501 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 501 2 can can MD work_dzeata5onzf7rp26j2quaotjza 501 3 not not RB work_dzeata5onzf7rp26j2quaotjza 501 4 find find VB work_dzeata5onzf7rp26j2quaotjza 501 5 a a DT work_dzeata5onzf7rp26j2quaotjza 501 6 correlation correlation NN work_dzeata5onzf7rp26j2quaotjza 501 7 because because IN work_dzeata5onzf7rp26j2quaotjza 501 8 the the DT work_dzeata5onzf7rp26j2quaotjza 501 9 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 501 10 and and CC work_dzeata5onzf7rp26j2quaotjza 501 11 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 501 12 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 501 13 in in IN work_dzeata5onzf7rp26j2quaotjza 501 14 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 501 15 set set NN work_dzeata5onzf7rp26j2quaotjza 501 16 remain remain VBP work_dzeata5onzf7rp26j2quaotjza 501 17 almost almost RB work_dzeata5onzf7rp26j2quaotjza 501 18 entirely entirely RB work_dzeata5onzf7rp26j2quaotjza 501 19 unadopted unadopted JJ work_dzeata5onzf7rp26j2quaotjza 501 20 . . . work_dzeata5onzf7rp26j2quaotjza 502 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 502 2 only only RB work_dzeata5onzf7rp26j2quaotjza 502 3 found find VBD work_dzeata5onzf7rp26j2quaotjza 502 4 four four CD work_dzeata5onzf7rp26j2quaotjza 502 5 cases case NNS work_dzeata5onzf7rp26j2quaotjza 502 6 where where WRB work_dzeata5onzf7rp26j2quaotjza 502 7 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 502 8 in in IN work_dzeata5onzf7rp26j2quaotjza 502 9 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 502 10 set set NN work_dzeata5onzf7rp26j2quaotjza 502 11 were be VBD work_dzeata5onzf7rp26j2quaotjza 502 12 either either RB work_dzeata5onzf7rp26j2quaotjza 502 13 directly directly RB work_dzeata5onzf7rp26j2quaotjza 502 14 adopted adopt VBN work_dzeata5onzf7rp26j2quaotjza 502 15 or or CC work_dzeata5onzf7rp26j2quaotjza 502 16 where where WRB work_dzeata5onzf7rp26j2quaotjza 502 17 the the DT work_dzeata5onzf7rp26j2quaotjza 502 18 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 502 19 they -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 502 20 evaluate evaluate VBP work_dzeata5onzf7rp26j2quaotjza 502 21 are be VBP work_dzeata5onzf7rp26j2quaotjza 502 22 clearly clearly RB work_dzeata5onzf7rp26j2quaotjza 502 23 implemented implement VBN work_dzeata5onzf7rp26j2quaotjza 502 24 in in IN work_dzeata5onzf7rp26j2quaotjza 502 25 a a DT work_dzeata5onzf7rp26j2quaotjza 502 26 different different JJ work_dzeata5onzf7rp26j2quaotjza 502 27 but but CC work_dzeata5onzf7rp26j2quaotjza 502 28 adopted adopt VBN work_dzeata5onzf7rp26j2quaotjza 502 29 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 502 30 . . . work_dzeata5onzf7rp26j2quaotjza 503 1 A a DT work_dzeata5onzf7rp26j2quaotjza 503 2 lack lack NN work_dzeata5onzf7rp26j2quaotjza 503 3 of of IN work_dzeata5onzf7rp26j2quaotjza 503 4 adoption adoption NN work_dzeata5onzf7rp26j2quaotjza 503 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 503 6 present present JJ work_dzeata5onzf7rp26j2quaotjza 503 7 even even RB work_dzeata5onzf7rp26j2quaotjza 503 8 for for IN work_dzeata5onzf7rp26j2quaotjza 503 9 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 503 10 where where WRB work_dzeata5onzf7rp26j2quaotjza 503 11 performance performance NN work_dzeata5onzf7rp26j2quaotjza 503 12 and and CC work_dzeata5onzf7rp26j2quaotjza 503 13 applicability applicability NN work_dzeata5onzf7rp26j2quaotjza 503 14 have have VBP work_dzeata5onzf7rp26j2quaotjza 503 15 been be VBN work_dzeata5onzf7rp26j2quaotjza 503 16 improved improve VBN work_dzeata5onzf7rp26j2quaotjza 503 17 over over IN work_dzeata5onzf7rp26j2quaotjza 503 18 multiple multiple JJ work_dzeata5onzf7rp26j2quaotjza 503 19 decades decade NNS work_dzeata5onzf7rp26j2quaotjza 503 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 503 21 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 503 22 , , , work_dzeata5onzf7rp26j2quaotjza 503 23 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 503 24 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 503 25 . . . work_dzeata5onzf7rp26j2quaotjza 504 1 Three three CD work_dzeata5onzf7rp26j2quaotjza 504 2 of of IN work_dzeata5onzf7rp26j2quaotjza 504 3 the the DT work_dzeata5onzf7rp26j2quaotjza 504 4 adopted adopt VBN work_dzeata5onzf7rp26j2quaotjza 504 5 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 504 6 were be VBD work_dzeata5onzf7rp26j2quaotjza 504 7 created create VBN work_dzeata5onzf7rp26j2quaotjza 504 8 by by IN work_dzeata5onzf7rp26j2quaotjza 504 9 the the DT work_dzeata5onzf7rp26j2quaotjza 504 10 industry industry NN work_dzeata5onzf7rp26j2quaotjza 504 11 itself -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 504 12 or or CC work_dzeata5onzf7rp26j2quaotjza 504 13 by by IN work_dzeata5onzf7rp26j2quaotjza 504 14 entities entity NNS work_dzeata5onzf7rp26j2quaotjza 504 15 very very RB work_dzeata5onzf7rp26j2quaotjza 504 16 closely closely RB work_dzeata5onzf7rp26j2quaotjza 504 17 tied tied JJ work_dzeata5onzf7rp26j2quaotjza 504 18 to to IN work_dzeata5onzf7rp26j2quaotjza 504 19 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 504 20 : : : work_dzeata5onzf7rp26j2quaotjza 504 21 Google Google NNP work_dzeata5onzf7rp26j2quaotjza 504 22 NaCl NaCl NNP work_dzeata5onzf7rp26j2quaotjza 504 23 was be VBD work_dzeata5onzf7rp26j2quaotjza 504 24 designed design VBN work_dzeata5onzf7rp26j2quaotjza 504 25 with with IN work_dzeata5onzf7rp26j2quaotjza 504 26 the the DT work_dzeata5onzf7rp26j2quaotjza 504 27 intention intention NN work_dzeata5onzf7rp26j2quaotjza 504 28 of of IN work_dzeata5onzf7rp26j2quaotjza 504 29 adopting adopt VBG work_dzeata5onzf7rp26j2quaotjza 504 30 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 504 31 in in IN work_dzeata5onzf7rp26j2quaotjza 504 32 Google Google NNP work_dzeata5onzf7rp26j2quaotjza 504 33 Chrome Chrome NNP work_dzeata5onzf7rp26j2quaotjza 504 34 in in IN work_dzeata5onzf7rp26j2quaotjza 504 35 the the DT work_dzeata5onzf7rp26j2quaotjza 504 36 short short JJ work_dzeata5onzf7rp26j2quaotjza 504 37 term term NN work_dzeata5onzf7rp26j2quaotjza 504 38 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 504 39 Yee Yee NNP work_dzeata5onzf7rp26j2quaotjza 504 40 et et NNP work_dzeata5onzf7rp26j2quaotjza 504 41 al al NNP work_dzeata5onzf7rp26j2quaotjza 504 42 . . NNP work_dzeata5onzf7rp26j2quaotjza 504 43 , , , work_dzeata5onzf7rp26j2quaotjza 504 44 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 504 45 ; ; : work_dzeata5onzf7rp26j2quaotjza 504 46 Sehr Sehr NNP work_dzeata5onzf7rp26j2quaotjza 504 47 et et NNP work_dzeata5onzf7rp26j2quaotjza 504 48 al al NNP work_dzeata5onzf7rp26j2quaotjza 504 49 . . NNP work_dzeata5onzf7rp26j2quaotjza 504 50 , , , work_dzeata5onzf7rp26j2quaotjza 504 51 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 504 52 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 504 53 and and CC work_dzeata5onzf7rp26j2quaotjza 504 54 the the DT work_dzeata5onzf7rp26j2quaotjza 504 55 paper paper NN work_dzeata5onzf7rp26j2quaotjza 504 56 on on IN work_dzeata5onzf7rp26j2quaotjza 504 57 systrace systrace NN work_dzeata5onzf7rp26j2quaotjza 504 58 was be VBD work_dzeata5onzf7rp26j2quaotjza 504 59 published publish VBN work_dzeata5onzf7rp26j2quaotjza 504 60 with with IN work_dzeata5onzf7rp26j2quaotjza 504 61 functioning function VBG work_dzeata5onzf7rp26j2quaotjza 504 62 open open JJ work_dzeata5onzf7rp26j2quaotjza 504 63 source source NN work_dzeata5onzf7rp26j2quaotjza 504 64 implementations implementation NNS work_dzeata5onzf7rp26j2quaotjza 504 65 for for IN work_dzeata5onzf7rp26j2quaotjza 504 66 most most JJS work_dzeata5onzf7rp26j2quaotjza 504 67 Unix Unix NNP work_dzeata5onzf7rp26j2quaotjza 504 68 - - HYPH work_dzeata5onzf7rp26j2quaotjza 504 69 like like JJ work_dzeata5onzf7rp26j2quaotjza 504 70 operating operating NN work_dzeata5onzf7rp26j2quaotjza 504 71 systems system NNS work_dzeata5onzf7rp26j2quaotjza 504 72 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 504 73 Provos Provos NNP work_dzeata5onzf7rp26j2quaotjza 504 74 , , , work_dzeata5onzf7rp26j2quaotjza 504 75 2003 2003 CD work_dzeata5onzf7rp26j2quaotjza 504 76 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 504 77 . . . work_dzeata5onzf7rp26j2quaotjza 505 1 While while IN work_dzeata5onzf7rp26j2quaotjza 505 2 the the DT work_dzeata5onzf7rp26j2quaotjza 505 3 case case NN work_dzeata5onzf7rp26j2quaotjza 505 4 for for IN work_dzeata5onzf7rp26j2quaotjza 505 5 adoption adoption NN work_dzeata5onzf7rp26j2quaotjza 505 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 505 7 weaker weak JJR work_dzeata5onzf7rp26j2quaotjza 505 8 , , , work_dzeata5onzf7rp26j2quaotjza 505 9 Cells Cells NNPS work_dzeata5onzf7rp26j2quaotjza 505 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 505 11 Andrus Andrus NNP work_dzeata5onzf7rp26j2quaotjza 505 12 et et FW work_dzeata5onzf7rp26j2quaotjza 505 13 al al NNP work_dzeata5onzf7rp26j2quaotjza 505 14 . . NNP work_dzeata5onzf7rp26j2quaotjza 505 15 , , , work_dzeata5onzf7rp26j2quaotjza 505 16 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 505 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 505 18 is be VBZ work_dzeata5onzf7rp26j2quaotjza 505 19 a a DT work_dzeata5onzf7rp26j2quaotjza 505 20 more more RBR work_dzeata5onzf7rp26j2quaotjza 505 21 advanced advanced JJ work_dzeata5onzf7rp26j2quaotjza 505 22 design design NN work_dzeata5onzf7rp26j2quaotjza 505 23 than than IN work_dzeata5onzf7rp26j2quaotjza 505 24 one one CD work_dzeata5onzf7rp26j2quaotjza 505 25 VMware VMware NNP work_dzeata5onzf7rp26j2quaotjza 505 26 developed develop VBD work_dzeata5onzf7rp26j2quaotjza 505 27 in in IN work_dzeata5onzf7rp26j2quaotjza 505 28 parallel parallel NN work_dzeata5onzf7rp26j2quaotjza 505 29 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 505 30 Berlind Berlind NNP work_dzeata5onzf7rp26j2quaotjza 505 31 , , , work_dzeata5onzf7rp26j2quaotjza 505 32 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 505 33 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 505 34 , , , work_dzeata5onzf7rp26j2quaotjza 505 35 although although IN work_dzeata5onzf7rp26j2quaotjza 505 36 the the DT work_dzeata5onzf7rp26j2quaotjza 505 37 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 505 38 both both DT work_dzeata5onzf7rp26j2quaotjza 505 39 aim aim VBP work_dzeata5onzf7rp26j2quaotjza 505 40 to to IN work_dzeata5onzf7rp26j2quaotjza 505 41 partition partition NN work_dzeata5onzf7rp26j2quaotjza 505 42 phones phone NNS work_dzeata5onzf7rp26j2quaotjza 505 43 into into IN work_dzeata5onzf7rp26j2quaotjza 505 44 isolated isolated JJ work_dzeata5onzf7rp26j2quaotjza 505 45 compartments compartment NNS work_dzeata5onzf7rp26j2quaotjza 505 46 using use VBG work_dzeata5onzf7rp26j2quaotjza 505 47 virtualization virtualization NN work_dzeata5onzf7rp26j2quaotjza 505 48 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 505 49 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 505 50 , , , work_dzeata5onzf7rp26j2quaotjza 505 51 one one CD work_dzeata5onzf7rp26j2quaotjza 505 52 for for IN work_dzeata5onzf7rp26j2quaotjza 505 53 work work NN work_dzeata5onzf7rp26j2quaotjza 505 54 and and CC work_dzeata5onzf7rp26j2quaotjza 505 55 one one CD work_dzeata5onzf7rp26j2quaotjza 505 56 for for IN work_dzeata5onzf7rp26j2quaotjza 505 57 personal personal JJ work_dzeata5onzf7rp26j2quaotjza 505 58 use use NN work_dzeata5onzf7rp26j2quaotjza 505 59 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 505 60 . . . work_dzeata5onzf7rp26j2quaotjza 506 1 More more RBR work_dzeata5onzf7rp26j2quaotjza 506 2 recently recently RB work_dzeata5onzf7rp26j2quaotjza 506 3 , , , work_dzeata5onzf7rp26j2quaotjza 506 4 Microsoft Microsoft NNP work_dzeata5onzf7rp26j2quaotjza 506 5 has have VBZ work_dzeata5onzf7rp26j2quaotjza 506 6 stated state VBN work_dzeata5onzf7rp26j2quaotjza 506 7 that that IN work_dzeata5onzf7rp26j2quaotjza 506 8 Visual Visual NNP work_dzeata5onzf7rp26j2quaotjza 506 9 Studio Studio NNP work_dzeata5onzf7rp26j2quaotjza 506 10 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 506 11 will will MD work_dzeata5onzf7rp26j2quaotjza 506 12 ship ship VB work_dzeata5onzf7rp26j2quaotjza 506 13 with with IN work_dzeata5onzf7rp26j2quaotjza 506 14 an an DT work_dzeata5onzf7rp26j2quaotjza 506 15 exploit exploit NN work_dzeata5onzf7rp26j2quaotjza 506 16 mitigation mitigation NN work_dzeata5onzf7rp26j2quaotjza 506 17 that that IN work_dzeata5onzf7rp26j2quaotjza 506 18 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 506 19 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 506 20 is be VBZ work_dzeata5onzf7rp26j2quaotjza 506 21 equivalent equivalent JJ work_dzeata5onzf7rp26j2quaotjza 506 22 to to IN work_dzeata5onzf7rp26j2quaotjza 506 23 what what WP work_dzeata5onzf7rp26j2quaotjza 506 24 the the DT work_dzeata5onzf7rp26j2quaotjza 506 25 research research NN work_dzeata5onzf7rp26j2quaotjza 506 26 community community NN work_dzeata5onzf7rp26j2quaotjza 506 27 calls call VBZ work_dzeata5onzf7rp26j2quaotjza 506 28 CFI CFI NNP work_dzeata5onzf7rp26j2quaotjza 506 29 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 506 30 Hogg Hogg NNP work_dzeata5onzf7rp26j2quaotjza 506 31 , , , work_dzeata5onzf7rp26j2quaotjza 506 32 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 506 33 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 506 34 . . . work_dzeata5onzf7rp26j2quaotjza 507 1 A a DT work_dzeata5onzf7rp26j2quaotjza 507 2 third third JJ work_dzeata5onzf7rp26j2quaotjza 507 3 party party NN work_dzeata5onzf7rp26j2quaotjza 507 4 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 507 5 supports support VBZ work_dzeata5onzf7rp26j2quaotjza 507 6 this this DT work_dzeata5onzf7rp26j2quaotjza 507 7 belief belief NN work_dzeata5onzf7rp26j2quaotjza 507 8 , , , work_dzeata5onzf7rp26j2quaotjza 507 9 however however RB work_dzeata5onzf7rp26j2quaotjza 507 10 the the DT work_dzeata5onzf7rp26j2quaotjza 507 11 uncovered uncovered JJ work_dzeata5onzf7rp26j2quaotjza 507 12 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 507 13 details detail NNS work_dzeata5onzf7rp26j2quaotjza 507 14 differ differ VBP work_dzeata5onzf7rp26j2quaotjza 507 15 from from IN work_dzeata5onzf7rp26j2quaotjza 507 16 the the DT work_dzeata5onzf7rp26j2quaotjza 507 17 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 507 18 implemented implement VBN work_dzeata5onzf7rp26j2quaotjza 507 19 in in IN work_dzeata5onzf7rp26j2quaotjza 507 20 published publish VBN work_dzeata5onzf7rp26j2quaotjza 507 21 research research NN work_dzeata5onzf7rp26j2quaotjza 507 22 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 507 23 Tang Tang NNP work_dzeata5onzf7rp26j2quaotjza 507 24 , , , work_dzeata5onzf7rp26j2quaotjza 507 25 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 507 26 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 507 27 . . . work_dzeata5onzf7rp26j2quaotjza 508 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 508 2 argue argue VBP work_dzeata5onzf7rp26j2quaotjza 508 3 that that IN work_dzeata5onzf7rp26j2quaotjza 508 4 the the DT work_dzeata5onzf7rp26j2quaotjza 508 5 need need NN work_dzeata5onzf7rp26j2quaotjza 508 6 to to TO work_dzeata5onzf7rp26j2quaotjza 508 7 evaluate evaluate VB work_dzeata5onzf7rp26j2quaotjza 508 8 the the DT work_dzeata5onzf7rp26j2quaotjza 508 9 usability usability NN work_dzeata5onzf7rp26j2quaotjza 508 10 of of IN work_dzeata5onzf7rp26j2quaotjza 508 11 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 508 12 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 508 13 is be VBZ work_dzeata5onzf7rp26j2quaotjza 508 14 evidenced evidence VBN work_dzeata5onzf7rp26j2quaotjza 508 15 by by IN work_dzeata5onzf7rp26j2quaotjza 508 16 the the DT work_dzeata5onzf7rp26j2quaotjza 508 17 observation observation NN work_dzeata5onzf7rp26j2quaotjza 508 18 that that DT work_dzeata5onzf7rp26j2quaotjza 508 19 performance performance NN work_dzeata5onzf7rp26j2quaotjza 508 20 and and CC work_dzeata5onzf7rp26j2quaotjza 508 21 security security NN work_dzeata5onzf7rp26j2quaotjza 508 22 evaluation evaluation NN work_dzeata5onzf7rp26j2quaotjza 508 23 are be VBP work_dzeata5onzf7rp26j2quaotjza 508 24 not not RB work_dzeata5onzf7rp26j2quaotjza 508 25 sufficient sufficient JJ work_dzeata5onzf7rp26j2quaotjza 508 26 to to TO work_dzeata5onzf7rp26j2quaotjza 508 27 drive drive VB work_dzeata5onzf7rp26j2quaotjza 508 28 adoption adoption NN work_dzeata5onzf7rp26j2quaotjza 508 29 . . . work_dzeata5onzf7rp26j2quaotjza 509 1 Usability usability NN work_dzeata5onzf7rp26j2quaotjza 509 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 509 3 of of IN work_dzeata5onzf7rp26j2quaotjza 509 4 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 509 5 concern concern NN work_dzeata5onzf7rp26j2quaotjza 509 6 in in IN work_dzeata5onzf7rp26j2quaotjza 509 7 cases case NNS work_dzeata5onzf7rp26j2quaotjza 509 8 where where WRB work_dzeata5onzf7rp26j2quaotjza 509 9 the the DT work_dzeata5onzf7rp26j2quaotjza 509 10 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 509 11 requires require VBZ work_dzeata5onzf7rp26j2quaotjza 509 12 developers developer NNS work_dzeata5onzf7rp26j2quaotjza 509 13 without without IN work_dzeata5onzf7rp26j2quaotjza 509 14 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 509 15 et et NNP work_dzeata5onzf7rp26j2quaotjza 509 16 al al NNP work_dzeata5onzf7rp26j2quaotjza 509 17 . . . work_dzeata5onzf7rp26j2quaotjza 510 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 510 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 510 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 510 4 , , , work_dzeata5onzf7rp26j2quaotjza 510 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 510 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 510 7 . . . work_dzeata5onzf7rp26j2quaotjza 511 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 511 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 511 3 , , , work_dzeata5onzf7rp26j2quaotjza 511 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 511 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 511 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 511 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 511 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 511 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 511 10 25/36 25/36 CD work_dzeata5onzf7rp26j2quaotjza 511 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 511 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 511 13 security security NN work_dzeata5onzf7rp26j2quaotjza 511 14 expertise expertise NN work_dzeata5onzf7rp26j2quaotjza 511 15 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 511 16 1 1 CD work_dzeata5onzf7rp26j2quaotjza 511 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 511 18 to to TO work_dzeata5onzf7rp26j2quaotjza 511 19 re re VB work_dzeata5onzf7rp26j2quaotjza 511 20 - - VB work_dzeata5onzf7rp26j2quaotjza 511 21 architect architect VB work_dzeata5onzf7rp26j2quaotjza 511 22 applications application NNS work_dzeata5onzf7rp26j2quaotjza 511 23 to to TO work_dzeata5onzf7rp26j2quaotjza 511 24 apply apply VB work_dzeata5onzf7rp26j2quaotjza 511 25 the the DT work_dzeata5onzf7rp26j2quaotjza 511 26 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 511 27 and/or and/or CC work_dzeata5onzf7rp26j2quaotjza 511 28 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 511 29 2 2 LS work_dzeata5onzf7rp26j2quaotjza 511 30 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 511 31 to to TO work_dzeata5onzf7rp26j2quaotjza 511 32 develop develop VB work_dzeata5onzf7rp26j2quaotjza 511 33 a a DT work_dzeata5onzf7rp26j2quaotjza 511 34 security security NN work_dzeata5onzf7rp26j2quaotjza 511 35 policy policy NN work_dzeata5onzf7rp26j2quaotjza 511 36 . . . work_dzeata5onzf7rp26j2quaotjza 512 1 In in IN work_dzeata5onzf7rp26j2quaotjza 512 2 practice practice NN work_dzeata5onzf7rp26j2quaotjza 512 3 , , , work_dzeata5onzf7rp26j2quaotjza 512 4 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 512 5 is be VBZ work_dzeata5onzf7rp26j2quaotjza 512 6 quite quite RB work_dzeata5onzf7rp26j2quaotjza 512 7 common common JJ work_dzeata5onzf7rp26j2quaotjza 512 8 for for IN work_dzeata5onzf7rp26j2quaotjza 512 9 developers developer NNS work_dzeata5onzf7rp26j2quaotjza 512 10 without without IN work_dzeata5onzf7rp26j2quaotjza 512 11 a a DT work_dzeata5onzf7rp26j2quaotjza 512 12 security security NN work_dzeata5onzf7rp26j2quaotjza 512 13 focus focus NN work_dzeata5onzf7rp26j2quaotjza 512 14 to to TO work_dzeata5onzf7rp26j2quaotjza 512 15 apply apply VB work_dzeata5onzf7rp26j2quaotjza 512 16 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 512 17 , , , work_dzeata5onzf7rp26j2quaotjza 512 18 particularly particularly RB work_dzeata5onzf7rp26j2quaotjza 512 19 Java Java NNP work_dzeata5onzf7rp26j2quaotjza 512 20 ’s ’ VBZ work_dzeata5onzf7rp26j2quaotjza 512 21 . . . work_dzeata5onzf7rp26j2quaotjza 513 1 In in IN work_dzeata5onzf7rp26j2quaotjza 513 2 fact fact NN work_dzeata5onzf7rp26j2quaotjza 513 3 , , , work_dzeata5onzf7rp26j2quaotjza 513 4 usability usability NN work_dzeata5onzf7rp26j2quaotjza 513 5 issues issue NNS work_dzeata5onzf7rp26j2quaotjza 513 6 have have VBP work_dzeata5onzf7rp26j2quaotjza 513 7 factored factor VBN work_dzeata5onzf7rp26j2quaotjza 513 8 into into IN work_dzeata5onzf7rp26j2quaotjza 513 9 widely widely RB work_dzeata5onzf7rp26j2quaotjza 513 10 publicized publicize VBN work_dzeata5onzf7rp26j2quaotjza 513 11 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 513 12 in in IN work_dzeata5onzf7rp26j2quaotjza 513 13 how how WRB work_dzeata5onzf7rp26j2quaotjza 513 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 513 15 were be VBD work_dzeata5onzf7rp26j2quaotjza 513 16 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 513 17 to to IN work_dzeata5onzf7rp26j2quaotjza 513 18 Google Google NNP work_dzeata5onzf7rp26j2quaotjza 513 19 Chrome Chrome NNP work_dzeata5onzf7rp26j2quaotjza 513 20 and and CC work_dzeata5onzf7rp26j2quaotjza 513 21 Adobe Adobe NNP work_dzeata5onzf7rp26j2quaotjza 513 22 Reader Reader NNP work_dzeata5onzf7rp26j2quaotjza 513 23 as as RB work_dzeata5onzf7rp26j2quaotjza 513 24 well well RB work_dzeata5onzf7rp26j2quaotjza 513 25 as as IN work_dzeata5onzf7rp26j2quaotjza 513 26 the the DT work_dzeata5onzf7rp26j2quaotjza 513 27 many many JJ work_dzeata5onzf7rp26j2quaotjza 513 28 vulnerable vulnerable JJ work_dzeata5onzf7rp26j2quaotjza 513 29 applications application NNS work_dzeata5onzf7rp26j2quaotjza 513 30 of of IN work_dzeata5onzf7rp26j2quaotjza 513 31 the the DT work_dzeata5onzf7rp26j2quaotjza 513 32 Java Java NNP work_dzeata5onzf7rp26j2quaotjza 513 33 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 513 34 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 513 35 Coker Coker NNP work_dzeata5onzf7rp26j2quaotjza 513 36 et et NNP work_dzeata5onzf7rp26j2quaotjza 513 37 al al NNP work_dzeata5onzf7rp26j2quaotjza 513 38 . . NNP work_dzeata5onzf7rp26j2quaotjza 513 39 , , , work_dzeata5onzf7rp26j2quaotjza 513 40 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 513 41 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 513 42 . . . work_dzeata5onzf7rp26j2quaotjza 514 1 In in IN work_dzeata5onzf7rp26j2quaotjza 514 2 all all DT work_dzeata5onzf7rp26j2quaotjza 514 3 of of IN work_dzeata5onzf7rp26j2quaotjza 514 4 these these DT work_dzeata5onzf7rp26j2quaotjza 514 5 cases case NNS work_dzeata5onzf7rp26j2quaotjza 514 6 applying apply VBG work_dzeata5onzf7rp26j2quaotjza 514 7 the the DT work_dzeata5onzf7rp26j2quaotjza 514 8 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 514 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 514 10 a a DT work_dzeata5onzf7rp26j2quaotjza 514 11 relatively relatively RB work_dzeata5onzf7rp26j2quaotjza 514 12 manual manual JJ work_dzeata5onzf7rp26j2quaotjza 514 13 process process NN work_dzeata5onzf7rp26j2quaotjza 514 14 where where WRB work_dzeata5onzf7rp26j2quaotjza 514 15 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 514 16 is be VBZ work_dzeata5onzf7rp26j2quaotjza 514 17 difficult difficult JJ work_dzeata5onzf7rp26j2quaotjza 514 18 for for IN work_dzeata5onzf7rp26j2quaotjza 514 19 the the DT work_dzeata5onzf7rp26j2quaotjza 514 20 applier applier NN work_dzeata5onzf7rp26j2quaotjza 514 21 to to TO work_dzeata5onzf7rp26j2quaotjza 514 22 be be VB work_dzeata5onzf7rp26j2quaotjza 514 23 sure sure JJ work_dzeata5onzf7rp26j2quaotjza 514 24 he -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 514 25 is be VBZ work_dzeata5onzf7rp26j2quaotjza 514 26 fully fully RB work_dzeata5onzf7rp26j2quaotjza 514 27 imposing impose VBG work_dzeata5onzf7rp26j2quaotjza 514 28 the the DT work_dzeata5onzf7rp26j2quaotjza 514 29 desired desire VBN work_dzeata5onzf7rp26j2quaotjza 514 30 policy policy NN work_dzeata5onzf7rp26j2quaotjza 514 31 and and CC work_dzeata5onzf7rp26j2quaotjza 514 32 without without IN work_dzeata5onzf7rp26j2quaotjza 514 33 missing miss VBG work_dzeata5onzf7rp26j2quaotjza 514 34 relevant relevant JJ work_dzeata5onzf7rp26j2quaotjza 514 35 attack attack NN work_dzeata5onzf7rp26j2quaotjza 514 36 surfaces surface NNS work_dzeata5onzf7rp26j2quaotjza 514 37 . . . work_dzeata5onzf7rp26j2quaotjza 515 1 These these DT work_dzeata5onzf7rp26j2quaotjza 515 2 usability usability NN work_dzeata5onzf7rp26j2quaotjza 515 3 issues issue NNS work_dzeata5onzf7rp26j2quaotjza 515 4 have have VBP work_dzeata5onzf7rp26j2quaotjza 515 5 caused cause VBN work_dzeata5onzf7rp26j2quaotjza 515 6 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 515 7 that that WDT work_dzeata5onzf7rp26j2quaotjza 515 8 have have VBP work_dzeata5onzf7rp26j2quaotjza 515 9 been be VBN work_dzeata5onzf7rp26j2quaotjza 515 10 widely widely RB work_dzeata5onzf7rp26j2quaotjza 515 11 exploited exploit VBN work_dzeata5onzf7rp26j2quaotjza 515 12 to to TO work_dzeata5onzf7rp26j2quaotjza 515 13 bypass bypass VB work_dzeata5onzf7rp26j2quaotjza 515 14 the the DT work_dzeata5onzf7rp26j2quaotjza 515 15 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 515 16 . . . work_dzeata5onzf7rp26j2quaotjza 516 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 516 2 call call VBP work_dzeata5onzf7rp26j2quaotjza 516 3 on on IN work_dzeata5onzf7rp26j2quaotjza 516 4 the the DT work_dzeata5onzf7rp26j2quaotjza 516 5 community community NN work_dzeata5onzf7rp26j2quaotjza 516 6 to to TO work_dzeata5onzf7rp26j2quaotjza 516 7 evaluate evaluate VB work_dzeata5onzf7rp26j2quaotjza 516 8 the the DT work_dzeata5onzf7rp26j2quaotjza 516 9 following follow VBG work_dzeata5onzf7rp26j2quaotjza 516 10 usability usability NN work_dzeata5onzf7rp26j2quaotjza 516 11 aspects aspect NNS work_dzeata5onzf7rp26j2quaotjza 516 12 of of IN work_dzeata5onzf7rp26j2quaotjza 516 13 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 516 14 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 516 15 where where WRB work_dzeata5onzf7rp26j2quaotjza 516 16 appropriate appropriate JJ work_dzeata5onzf7rp26j2quaotjza 516 17 : : : work_dzeata5onzf7rp26j2quaotjza 516 18 • • VB work_dzeata5onzf7rp26j2quaotjza 516 19 The the DT work_dzeata5onzf7rp26j2quaotjza 516 20 intended intended JJ work_dzeata5onzf7rp26j2quaotjza 516 21 users user NNS work_dzeata5onzf7rp26j2quaotjza 516 22 are be VBP work_dzeata5onzf7rp26j2quaotjza 516 23 capable capable JJ work_dzeata5onzf7rp26j2quaotjza 516 24 of of IN work_dzeata5onzf7rp26j2quaotjza 516 25 writing write VBG work_dzeata5onzf7rp26j2quaotjza 516 26 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 516 27 for for IN work_dzeata5onzf7rp26j2quaotjza 516 28 the the DT work_dzeata5onzf7rp26j2quaotjza 516 29 component(s component(s NNP work_dzeata5onzf7rp26j2quaotjza 516 30 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 516 31 to to TO work_dzeata5onzf7rp26j2quaotjza 516 32 be be VB work_dzeata5onzf7rp26j2quaotjza 516 33 sandboxed sandboxe VBN work_dzeata5onzf7rp26j2quaotjza 516 34 that that WDT work_dzeata5onzf7rp26j2quaotjza 516 35 are be VBP work_dzeata5onzf7rp26j2quaotjza 516 36 neither neither RB work_dzeata5onzf7rp26j2quaotjza 516 37 over- over- JJ work_dzeata5onzf7rp26j2quaotjza 516 38 or or CC work_dzeata5onzf7rp26j2quaotjza 516 39 under under RB work_dzeata5onzf7rp26j2quaotjza 516 40 - - HYPH work_dzeata5onzf7rp26j2quaotjza 516 41 privileged privileged JJ work_dzeata5onzf7rp26j2quaotjza 516 42 . . . work_dzeata5onzf7rp26j2quaotjza 517 1 • • NN work_dzeata5onzf7rp26j2quaotjza 517 2 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 517 3 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 517 4 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 517 5 can can MD work_dzeata5onzf7rp26j2quaotjza 517 6 be be VB work_dzeata5onzf7rp26j2quaotjza 517 7 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 517 8 without without IN work_dzeata5onzf7rp26j2quaotjza 517 9 missing miss VBG work_dzeata5onzf7rp26j2quaotjza 517 10 attack attack NN work_dzeata5onzf7rp26j2quaotjza 517 11 surfaces surface NNS work_dzeata5onzf7rp26j2quaotjza 517 12 that that WDT work_dzeata5onzf7rp26j2quaotjza 517 13 compromise compromise VBP work_dzeata5onzf7rp26j2quaotjza 517 14 the the DT work_dzeata5onzf7rp26j2quaotjza 517 15 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 517 16 in in IN work_dzeata5onzf7rp26j2quaotjza 517 17 the the DT work_dzeata5onzf7rp26j2quaotjza 517 18 targeted target VBN work_dzeata5onzf7rp26j2quaotjza 517 19 component(s component(s NNP work_dzeata5onzf7rp26j2quaotjza 517 20 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 517 21 . . . work_dzeata5onzf7rp26j2quaotjza 518 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 518 2 Source source NN work_dzeata5onzf7rp26j2quaotjza 518 3 code code NN work_dzeata5onzf7rp26j2quaotjza 518 4 transformations transformation NNS work_dzeata5onzf7rp26j2quaotjza 518 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 518 6 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 518 7 , , , work_dzeata5onzf7rp26j2quaotjza 518 8 code code NN work_dzeata5onzf7rp26j2quaotjza 518 9 re re NN work_dzeata5onzf7rp26j2quaotjza 518 10 - - NN work_dzeata5onzf7rp26j2quaotjza 518 11 writing writing NN work_dzeata5onzf7rp26j2quaotjza 518 12 or or CC work_dzeata5onzf7rp26j2quaotjza 518 13 annotations annotation NNS work_dzeata5onzf7rp26j2quaotjza 518 14 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 518 15 do do VBP work_dzeata5onzf7rp26j2quaotjza 518 16 not not RB work_dzeata5onzf7rp26j2quaotjza 518 17 substantially substantially RB work_dzeata5onzf7rp26j2quaotjza 518 18 burden burden VB work_dzeata5onzf7rp26j2quaotjza 518 19 future future JJ work_dzeata5onzf7rp26j2quaotjza 518 20 development development NN work_dzeata5onzf7rp26j2quaotjza 518 21 or or CC work_dzeata5onzf7rp26j2quaotjza 518 22 maintenance maintenance NN work_dzeata5onzf7rp26j2quaotjza 518 23 . . . work_dzeata5onzf7rp26j2quaotjza 519 1 • • VB work_dzeata5onzf7rp26j2quaotjza 519 2 The the DT work_dzeata5onzf7rp26j2quaotjza 519 3 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 519 4 , , , work_dzeata5onzf7rp26j2quaotjza 519 5 when when WRB work_dzeata5onzf7rp26j2quaotjza 519 6 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 519 7 to to IN work_dzeata5onzf7rp26j2quaotjza 519 8 a a DT work_dzeata5onzf7rp26j2quaotjza 519 9 component component NN work_dzeata5onzf7rp26j2quaotjza 519 10 , , , work_dzeata5onzf7rp26j2quaotjza 519 11 does do VBZ work_dzeata5onzf7rp26j2quaotjza 519 12 not not RB work_dzeata5onzf7rp26j2quaotjza 519 13 substantially substantially RB work_dzeata5onzf7rp26j2quaotjza 519 14 alter alter VB work_dzeata5onzf7rp26j2quaotjza 519 15 a a DT work_dzeata5onzf7rp26j2quaotjza 519 16 typical typical JJ work_dzeata5onzf7rp26j2quaotjza 519 17 user user NN work_dzeata5onzf7rp26j2quaotjza 519 18 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 519 19 interactions interaction NNS work_dzeata5onzf7rp26j2quaotjza 519 20 with with IN work_dzeata5onzf7rp26j2quaotjza 519 21 the the DT work_dzeata5onzf7rp26j2quaotjza 519 22 sandboxed sandboxed JJ work_dzeata5onzf7rp26j2quaotjza 519 23 component component NN work_dzeata5onzf7rp26j2quaotjza 519 24 . . . work_dzeata5onzf7rp26j2quaotjza 520 1 Ideally ideally RB work_dzeata5onzf7rp26j2quaotjza 520 2 many many JJ work_dzeata5onzf7rp26j2quaotjza 520 3 of of IN work_dzeata5onzf7rp26j2quaotjza 520 4 these these DT work_dzeata5onzf7rp26j2quaotjza 520 5 points point NNS work_dzeata5onzf7rp26j2quaotjza 520 6 would would MD work_dzeata5onzf7rp26j2quaotjza 520 7 be be VB work_dzeata5onzf7rp26j2quaotjza 520 8 evaluated evaluate VBN work_dzeata5onzf7rp26j2quaotjza 520 9 during during IN work_dzeata5onzf7rp26j2quaotjza 520 10 user user NN work_dzeata5onzf7rp26j2quaotjza 520 11 studies study NNS work_dzeata5onzf7rp26j2quaotjza 520 12 with with IN work_dzeata5onzf7rp26j2quaotjza 520 13 actual actual JJ work_dzeata5onzf7rp26j2quaotjza 520 14 stakeholders stakeholder NNS work_dzeata5onzf7rp26j2quaotjza 520 15 . . . work_dzeata5onzf7rp26j2quaotjza 521 1 However however RB work_dzeata5onzf7rp26j2quaotjza 521 2 , , , work_dzeata5onzf7rp26j2quaotjza 521 3 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 521 4 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 521 5 that that IN work_dzeata5onzf7rp26j2quaotjza 521 6 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 521 7 can can MD work_dzeata5onzf7rp26j2quaotjza 521 8 make make VB work_dzeata5onzf7rp26j2quaotjza 521 9 progress progress NN work_dzeata5onzf7rp26j2quaotjza 521 10 on on IN work_dzeata5onzf7rp26j2quaotjza 521 11 all all DT work_dzeata5onzf7rp26j2quaotjza 521 12 of of IN work_dzeata5onzf7rp26j2quaotjza 521 13 these these DT work_dzeata5onzf7rp26j2quaotjza 521 14 points point NNS work_dzeata5onzf7rp26j2quaotjza 521 15 without without IN work_dzeata5onzf7rp26j2quaotjza 521 16 the the DT work_dzeata5onzf7rp26j2quaotjza 521 17 overhead overhead NN work_dzeata5onzf7rp26j2quaotjza 521 18 of of IN work_dzeata5onzf7rp26j2quaotjza 521 19 a a DT work_dzeata5onzf7rp26j2quaotjza 521 20 full full JJ work_dzeata5onzf7rp26j2quaotjza 521 21 user user NN work_dzeata5onzf7rp26j2quaotjza 521 22 study study NN work_dzeata5onzf7rp26j2quaotjza 521 23 , , , work_dzeata5onzf7rp26j2quaotjza 521 24 particularly particularly RB work_dzeata5onzf7rp26j2quaotjza 521 25 because because IN work_dzeata5onzf7rp26j2quaotjza 521 26 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 521 27 are be VBP work_dzeata5onzf7rp26j2quaotjza 521 28 starting start VBG work_dzeata5onzf7rp26j2quaotjza 521 29 from from IN work_dzeata5onzf7rp26j2quaotjza 521 30 a a DT work_dzeata5onzf7rp26j2quaotjza 521 31 state state NN work_dzeata5onzf7rp26j2quaotjza 521 32 where where WRB work_dzeata5onzf7rp26j2quaotjza 521 33 no no DT work_dzeata5onzf7rp26j2quaotjza 521 34 usability usability NN work_dzeata5onzf7rp26j2quaotjza 521 35 evaluations evaluation NNS work_dzeata5onzf7rp26j2quaotjza 521 36 are be VBP work_dzeata5onzf7rp26j2quaotjza 521 37 performed perform VBN work_dzeata5onzf7rp26j2quaotjza 521 38 . . . work_dzeata5onzf7rp26j2quaotjza 522 1 For for IN work_dzeata5onzf7rp26j2quaotjza 522 2 example example NN work_dzeata5onzf7rp26j2quaotjza 522 3 , , , work_dzeata5onzf7rp26j2quaotjza 522 4 authors author NNS work_dzeata5onzf7rp26j2quaotjza 522 5 can can MD work_dzeata5onzf7rp26j2quaotjza 522 6 describe describe VB work_dzeata5onzf7rp26j2quaotjza 522 7 correct correct JJ work_dzeata5onzf7rp26j2quaotjza 522 8 ways way NNS work_dzeata5onzf7rp26j2quaotjza 522 9 to to TO work_dzeata5onzf7rp26j2quaotjza 522 10 determine determine VB work_dzeata5onzf7rp26j2quaotjza 522 11 what what WDT work_dzeata5onzf7rp26j2quaotjza 522 12 privileges privilege NNS work_dzeata5onzf7rp26j2quaotjza 522 13 in in IN work_dzeata5onzf7rp26j2quaotjza 522 14 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 522 15 policy policy NN work_dzeata5onzf7rp26j2quaotjza 522 16 language language NN work_dzeata5onzf7rp26j2quaotjza 522 17 a a DT work_dzeata5onzf7rp26j2quaotjza 522 18 component component NN work_dzeata5onzf7rp26j2quaotjza 522 19 needs need VBZ work_dzeata5onzf7rp26j2quaotjza 522 20 or or CC work_dzeata5onzf7rp26j2quaotjza 522 21 even even RB work_dzeata5onzf7rp26j2quaotjza 522 22 provide provide VB work_dzeata5onzf7rp26j2quaotjza 522 23 tools tool NNS work_dzeata5onzf7rp26j2quaotjza 522 24 to to TO work_dzeata5onzf7rp26j2quaotjza 522 25 generate generate VB work_dzeata5onzf7rp26j2quaotjza 522 26 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 522 27 to to TO work_dzeata5onzf7rp26j2quaotjza 522 28 mitigate mitigate VB work_dzeata5onzf7rp26j2quaotjza 522 29 the the DT work_dzeata5onzf7rp26j2quaotjza 522 30 risks risk NNS work_dzeata5onzf7rp26j2quaotjza 522 31 presented present VBN work_dzeata5onzf7rp26j2quaotjza 522 32 by by IN work_dzeata5onzf7rp26j2quaotjza 522 33 under- under- NNS work_dzeata5onzf7rp26j2quaotjza 522 34 and and CC work_dzeata5onzf7rp26j2quaotjza 522 35 over over IN work_dzeata5onzf7rp26j2quaotjza 522 36 - - HYPH work_dzeata5onzf7rp26j2quaotjza 522 37 privileged privileged JJ work_dzeata5onzf7rp26j2quaotjza 522 38 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 522 39 . . . work_dzeata5onzf7rp26j2quaotjza 523 1 Similarly similarly RB work_dzeata5onzf7rp26j2quaotjza 523 2 , , , work_dzeata5onzf7rp26j2quaotjza 523 3 tooling tooling NN work_dzeata5onzf7rp26j2quaotjza 523 4 can can MD work_dzeata5onzf7rp26j2quaotjza 523 5 be be VB work_dzeata5onzf7rp26j2quaotjza 523 6 provided provide VBN work_dzeata5onzf7rp26j2quaotjza 523 7 to to TO work_dzeata5onzf7rp26j2quaotjza 523 8 help help VB work_dzeata5onzf7rp26j2quaotjza 523 9 users user NNS work_dzeata5onzf7rp26j2quaotjza 523 10 install install VB work_dzeata5onzf7rp26j2quaotjza 523 11 policy policy NN work_dzeata5onzf7rp26j2quaotjza 523 12 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 523 13 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 523 14 or or CC work_dzeata5onzf7rp26j2quaotjza 523 15 check check VB work_dzeata5onzf7rp26j2quaotjza 523 16 that that IN work_dzeata5onzf7rp26j2quaotjza 523 17 manual manual JJ work_dzeata5onzf7rp26j2quaotjza 523 18 applications application NNS work_dzeata5onzf7rp26j2quaotjza 523 19 of of IN work_dzeata5onzf7rp26j2quaotjza 523 20 a a DT work_dzeata5onzf7rp26j2quaotjza 523 21 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 523 22 are be VBP work_dzeata5onzf7rp26j2quaotjza 523 23 correct correct JJ work_dzeata5onzf7rp26j2quaotjza 523 24 . . . work_dzeata5onzf7rp26j2quaotjza 524 1 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 524 2 developers developer NNS work_dzeata5onzf7rp26j2quaotjza 524 3 can can MD work_dzeata5onzf7rp26j2quaotjza 524 4 transform transform VB work_dzeata5onzf7rp26j2quaotjza 524 5 or or CC work_dzeata5onzf7rp26j2quaotjza 524 6 annotate annotate VB work_dzeata5onzf7rp26j2quaotjza 524 7 representative representative JJ work_dzeata5onzf7rp26j2quaotjza 524 8 open open JJ work_dzeata5onzf7rp26j2quaotjza 524 9 source source NN work_dzeata5onzf7rp26j2quaotjza 524 10 applications application NNS work_dzeata5onzf7rp26j2quaotjza 524 11 and and CC work_dzeata5onzf7rp26j2quaotjza 524 12 use use VB work_dzeata5onzf7rp26j2quaotjza 524 13 repository repository NN work_dzeata5onzf7rp26j2quaotjza 524 14 mining mining NN work_dzeata5onzf7rp26j2quaotjza 524 15 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 524 16 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 524 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 524 18 to to TO work_dzeata5onzf7rp26j2quaotjza 524 19 determine determine VB work_dzeata5onzf7rp26j2quaotjza 524 20 how how WRB work_dzeata5onzf7rp26j2quaotjza 524 21 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 524 22 alternations alternation NNS work_dzeata5onzf7rp26j2quaotjza 524 23 are be VBP work_dzeata5onzf7rp26j2quaotjza 524 24 affected affect VBN work_dzeata5onzf7rp26j2quaotjza 524 25 by by IN work_dzeata5onzf7rp26j2quaotjza 524 26 code code NN work_dzeata5onzf7rp26j2quaotjza 524 27 evolution evolution NN work_dzeata5onzf7rp26j2quaotjza 524 28 present present NN work_dzeata5onzf7rp26j2quaotjza 524 29 in in IN work_dzeata5onzf7rp26j2quaotjza 524 30 the the DT work_dzeata5onzf7rp26j2quaotjza 524 31 repository repository NN work_dzeata5onzf7rp26j2quaotjza 524 32 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 524 33 Kagdi Kagdi NNP work_dzeata5onzf7rp26j2quaotjza 524 34 , , , work_dzeata5onzf7rp26j2quaotjza 524 35 Collard Collard NNP work_dzeata5onzf7rp26j2quaotjza 524 36 & & CC work_dzeata5onzf7rp26j2quaotjza 524 37 Maletic Maletic NNP work_dzeata5onzf7rp26j2quaotjza 524 38 , , , work_dzeata5onzf7rp26j2quaotjza 524 39 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 524 40 ; ; : work_dzeata5onzf7rp26j2quaotjza 524 41 Yan Yan NNP work_dzeata5onzf7rp26j2quaotjza 524 42 , , , work_dzeata5onzf7rp26j2quaotjza 524 43 Menarini Menarini NNP work_dzeata5onzf7rp26j2quaotjza 524 44 & & CC work_dzeata5onzf7rp26j2quaotjza 524 45 Griswold Griswold NNP work_dzeata5onzf7rp26j2quaotjza 524 46 , , , work_dzeata5onzf7rp26j2quaotjza 524 47 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 524 48 ; ; : work_dzeata5onzf7rp26j2quaotjza 524 49 Mauczka Mauczka NNP work_dzeata5onzf7rp26j2quaotjza 524 50 et et NNP work_dzeata5onzf7rp26j2quaotjza 524 51 al al NNP work_dzeata5onzf7rp26j2quaotjza 524 52 . . NNP work_dzeata5onzf7rp26j2quaotjza 524 53 , , , work_dzeata5onzf7rp26j2quaotjza 524 54 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 524 55 ; ; : work_dzeata5onzf7rp26j2quaotjza 524 56 Stuckman Stuckman NNP work_dzeata5onzf7rp26j2quaotjza 524 57 & & CC work_dzeata5onzf7rp26j2quaotjza 524 58 Purtilo Purtilo NNP work_dzeata5onzf7rp26j2quaotjza 524 59 , , , work_dzeata5onzf7rp26j2quaotjza 524 60 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 524 61 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 524 62 . . . work_dzeata5onzf7rp26j2quaotjza 525 1 Finally finally RB work_dzeata5onzf7rp26j2quaotjza 525 2 , , , work_dzeata5onzf7rp26j2quaotjza 525 3 a a DT work_dzeata5onzf7rp26j2quaotjza 525 4 summary summary NN work_dzeata5onzf7rp26j2quaotjza 525 5 of of IN work_dzeata5onzf7rp26j2quaotjza 525 6 how how WRB work_dzeata5onzf7rp26j2quaotjza 525 7 the the DT work_dzeata5onzf7rp26j2quaotjza 525 8 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 525 9 qualitatively qualitatively RB work_dzeata5onzf7rp26j2quaotjza 525 10 changes change VBZ work_dzeata5onzf7rp26j2quaotjza 525 11 a a DT work_dzeata5onzf7rp26j2quaotjza 525 12 user user NN work_dzeata5onzf7rp26j2quaotjza 525 13 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 525 14 experience experience NN work_dzeata5onzf7rp26j2quaotjza 525 15 with with IN work_dzeata5onzf7rp26j2quaotjza 525 16 a a DT work_dzeata5onzf7rp26j2quaotjza 525 17 sandboxed sandboxed JJ work_dzeata5onzf7rp26j2quaotjza 525 18 component component NN work_dzeata5onzf7rp26j2quaotjza 525 19 would would MD work_dzeata5onzf7rp26j2quaotjza 525 20 provide provide VB work_dzeata5onzf7rp26j2quaotjza 525 21 a a DT work_dzeata5onzf7rp26j2quaotjza 525 22 gauge gauge NN work_dzeata5onzf7rp26j2quaotjza 525 23 for for IN work_dzeata5onzf7rp26j2quaotjza 525 24 how how WRB work_dzeata5onzf7rp26j2quaotjza 525 25 much much JJ work_dzeata5onzf7rp26j2quaotjza 525 26 the the DT work_dzeata5onzf7rp26j2quaotjza 525 27 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 525 28 burdens burden NNS work_dzeata5onzf7rp26j2quaotjza 525 29 end end NN work_dzeata5onzf7rp26j2quaotjza 525 30 - - HYPH work_dzeata5onzf7rp26j2quaotjza 525 31 users user NNS work_dzeata5onzf7rp26j2quaotjza 525 32 . . . work_dzeata5onzf7rp26j2quaotjza 526 1 ENABLING ENABLING NNP work_dzeata5onzf7rp26j2quaotjza 526 2 META META NNP work_dzeata5onzf7rp26j2quaotjza 526 3 - - : work_dzeata5onzf7rp26j2quaotjza 526 4 ANALYSIS ANALYSIS NNP work_dzeata5onzf7rp26j2quaotjza 526 5 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 526 6 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 526 7 a a DT work_dzeata5onzf7rp26j2quaotjza 526 8 key key JJ work_dzeata5onzf7rp26j2quaotjza 526 9 contribution contribution NN work_dzeata5onzf7rp26j2quaotjza 526 10 of of IN work_dzeata5onzf7rp26j2quaotjza 526 11 this this DT work_dzeata5onzf7rp26j2quaotjza 526 12 work work NN work_dzeata5onzf7rp26j2quaotjza 526 13 is be VBZ work_dzeata5onzf7rp26j2quaotjza 526 14 the the DT work_dzeata5onzf7rp26j2quaotjza 526 15 use use NN work_dzeata5onzf7rp26j2quaotjza 526 16 of of IN work_dzeata5onzf7rp26j2quaotjza 526 17 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 526 18 - - JJ work_dzeata5onzf7rp26j2quaotjza 526 19 disciplinary disciplinary JJ work_dzeata5onzf7rp26j2quaotjza 526 20 and and CC work_dzeata5onzf7rp26j2quaotjza 526 21 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 526 22 methodologies methodology NNS work_dzeata5onzf7rp26j2quaotjza 526 23 for for IN work_dzeata5onzf7rp26j2quaotjza 526 24 drawing draw VBG work_dzeata5onzf7rp26j2quaotjza 526 25 conclusions conclusion NNS work_dzeata5onzf7rp26j2quaotjza 526 26 about about IN work_dzeata5onzf7rp26j2quaotjza 526 27 a a DT work_dzeata5onzf7rp26j2quaotjza 526 28 large large JJ work_dzeata5onzf7rp26j2quaotjza 526 29 body body NN work_dzeata5onzf7rp26j2quaotjza 526 30 of of IN work_dzeata5onzf7rp26j2quaotjza 526 31 security security NN work_dzeata5onzf7rp26j2quaotjza 526 32 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 526 33 . . . work_dzeata5onzf7rp26j2quaotjza 527 1 In in IN work_dzeata5onzf7rp26j2quaotjza 527 2 this this DT work_dzeata5onzf7rp26j2quaotjza 527 3 section section NN work_dzeata5onzf7rp26j2quaotjza 527 4 , , , work_dzeata5onzf7rp26j2quaotjza 527 5 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 527 6 discuss discuss VBP work_dzeata5onzf7rp26j2quaotjza 527 7 the the DT work_dzeata5onzf7rp26j2quaotjza 527 8 generalizability generalizability NN work_dzeata5onzf7rp26j2quaotjza 527 9 of of IN work_dzeata5onzf7rp26j2quaotjza 527 10 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 527 11 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 527 12 and and CC work_dzeata5onzf7rp26j2quaotjza 527 13 suggest suggest VBP work_dzeata5onzf7rp26j2quaotjza 527 14 other other JJ work_dzeata5onzf7rp26j2quaotjza 527 15 areas area NNS work_dzeata5onzf7rp26j2quaotjza 527 16 to to TO work_dzeata5onzf7rp26j2quaotjza 527 17 which which WDT work_dzeata5onzf7rp26j2quaotjza 527 18 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 527 19 can can MD work_dzeata5onzf7rp26j2quaotjza 527 20 be be VB work_dzeata5onzf7rp26j2quaotjza 527 21 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 527 22 . . . work_dzeata5onzf7rp26j2quaotjza 528 1 Then then RB work_dzeata5onzf7rp26j2quaotjza 528 2 , , , work_dzeata5onzf7rp26j2quaotjza 528 3 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 528 4 discuss discuss VBP work_dzeata5onzf7rp26j2quaotjza 528 5 some some DT work_dzeata5onzf7rp26j2quaotjza 528 6 challenges challenge NNS work_dzeata5onzf7rp26j2quaotjza 528 7 that that WDT work_dzeata5onzf7rp26j2quaotjza 528 8 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 528 9 faced face VBD work_dzeata5onzf7rp26j2quaotjza 528 10 when when WRB work_dzeata5onzf7rp26j2quaotjza 528 11 doing do VBG work_dzeata5onzf7rp26j2quaotjza 528 12 this this DT work_dzeata5onzf7rp26j2quaotjza 528 13 research research NN work_dzeata5onzf7rp26j2quaotjza 528 14 and and CC work_dzeata5onzf7rp26j2quaotjza 528 15 suggest suggest VBP work_dzeata5onzf7rp26j2quaotjza 528 16 changes change NNS work_dzeata5onzf7rp26j2quaotjza 528 17 that that WDT work_dzeata5onzf7rp26j2quaotjza 528 18 would would MD work_dzeata5onzf7rp26j2quaotjza 528 19 address address VB work_dzeata5onzf7rp26j2quaotjza 528 20 these these DT work_dzeata5onzf7rp26j2quaotjza 528 21 challenges challenge NNS work_dzeata5onzf7rp26j2quaotjza 528 22 . . . work_dzeata5onzf7rp26j2quaotjza 529 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 529 2 et et FW work_dzeata5onzf7rp26j2quaotjza 529 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 529 4 . . . work_dzeata5onzf7rp26j2quaotjza 530 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 530 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 530 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 530 4 , , , work_dzeata5onzf7rp26j2quaotjza 530 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 530 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 530 7 . . . work_dzeata5onzf7rp26j2quaotjza 531 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 531 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 531 3 , , , work_dzeata5onzf7rp26j2quaotjza 531 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 531 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 531 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 531 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 531 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 531 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 531 10 26/36 26/36 CD work_dzeata5onzf7rp26j2quaotjza 531 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 531 12 http://msrconf.org http://msrconf.org NNP work_dzeata5onzf7rp26j2quaotjza 531 13 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 14 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 15 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 16 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 17 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 18 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 19 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 20 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 21 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 22 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 23 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 24 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 25 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 26 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 27 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 28 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 29 http://msrconf.org http://msrconf.org NN work_dzeata5onzf7rp26j2quaotjza 531 30 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 531 31 Generalizability Generalizability NNP work_dzeata5onzf7rp26j2quaotjza 531 32 of of IN work_dzeata5onzf7rp26j2quaotjza 531 33 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 531 34 The the DT work_dzeata5onzf7rp26j2quaotjza 531 35 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 531 36 employed employ VBN work_dzeata5onzf7rp26j2quaotjza 531 37 in in IN work_dzeata5onzf7rp26j2quaotjza 531 38 this this DT work_dzeata5onzf7rp26j2quaotjza 531 39 paper paper NN work_dzeata5onzf7rp26j2quaotjza 531 40 is be VBZ work_dzeata5onzf7rp26j2quaotjza 531 41 based base VBN work_dzeata5onzf7rp26j2quaotjza 531 42 on on IN work_dzeata5onzf7rp26j2quaotjza 531 43 two two CD work_dzeata5onzf7rp26j2quaotjza 531 44 research research NN work_dzeata5onzf7rp26j2quaotjza 531 45 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 531 46 : : : work_dzeata5onzf7rp26j2quaotjza 531 47 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 531 48 Content Content NNP work_dzeata5onzf7rp26j2quaotjza 531 49 Analysis Analysis NNP work_dzeata5onzf7rp26j2quaotjza 531 50 and and CC work_dzeata5onzf7rp26j2quaotjza 531 51 Systematic Systematic NNP work_dzeata5onzf7rp26j2quaotjza 531 52 Literature Literature NNP work_dzeata5onzf7rp26j2quaotjza 531 53 Reviews Reviews NNP work_dzeata5onzf7rp26j2quaotjza 531 54 . . . work_dzeata5onzf7rp26j2quaotjza 532 1 Qualitative Qualitative NNP work_dzeata5onzf7rp26j2quaotjza 532 2 Content Content NNP work_dzeata5onzf7rp26j2quaotjza 532 3 Analysis Analysis NNP work_dzeata5onzf7rp26j2quaotjza 532 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 532 5 primarily primarily RB work_dzeata5onzf7rp26j2quaotjza 532 6 used use VBN work_dzeata5onzf7rp26j2quaotjza 532 7 in in IN work_dzeata5onzf7rp26j2quaotjza 532 8 the the DT work_dzeata5onzf7rp26j2quaotjza 532 9 humanities humanity NNS work_dzeata5onzf7rp26j2quaotjza 532 10 and and CC work_dzeata5onzf7rp26j2quaotjza 532 11 social social JJ work_dzeata5onzf7rp26j2quaotjza 532 12 sciences science NNS work_dzeata5onzf7rp26j2quaotjza 532 13 . . . work_dzeata5onzf7rp26j2quaotjza 533 1 Systematic Systematic NNP work_dzeata5onzf7rp26j2quaotjza 533 2 Literature Literature NNP work_dzeata5onzf7rp26j2quaotjza 533 3 Reviews Reviews NNPS work_dzeata5onzf7rp26j2quaotjza 533 4 were be VBD work_dzeata5onzf7rp26j2quaotjza 533 5 first first RB work_dzeata5onzf7rp26j2quaotjza 533 6 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 533 7 to to IN work_dzeata5onzf7rp26j2quaotjza 533 8 medical medical JJ work_dzeata5onzf7rp26j2quaotjza 533 9 studies study NNS work_dzeata5onzf7rp26j2quaotjza 533 10 and and CC work_dzeata5onzf7rp26j2quaotjza 533 11 are be VBP work_dzeata5onzf7rp26j2quaotjza 533 12 used use VBN work_dzeata5onzf7rp26j2quaotjza 533 13 primarily primarily RB work_dzeata5onzf7rp26j2quaotjza 533 14 in in IN work_dzeata5onzf7rp26j2quaotjza 533 15 empirical empirical JJ work_dzeata5onzf7rp26j2quaotjza 533 16 fields field NNS work_dzeata5onzf7rp26j2quaotjza 533 17 . . . work_dzeata5onzf7rp26j2quaotjza 534 1 The the DT work_dzeata5onzf7rp26j2quaotjza 534 2 differences difference NNS work_dzeata5onzf7rp26j2quaotjza 534 3 between between IN work_dzeata5onzf7rp26j2quaotjza 534 4 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 534 5 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 534 6 are be VBP work_dzeata5onzf7rp26j2quaotjza 534 7 bigger big JJR work_dzeata5onzf7rp26j2quaotjza 534 8 than than IN work_dzeata5onzf7rp26j2quaotjza 534 9 the the DT work_dzeata5onzf7rp26j2quaotjza 534 10 differences difference NNS work_dzeata5onzf7rp26j2quaotjza 534 11 between between IN work_dzeata5onzf7rp26j2quaotjza 534 12 studies study NNS work_dzeata5onzf7rp26j2quaotjza 534 13 of of IN work_dzeata5onzf7rp26j2quaotjza 534 14 a a DT work_dzeata5onzf7rp26j2quaotjza 534 15 particular particular JJ work_dzeata5onzf7rp26j2quaotjza 534 16 cancer cancer NN work_dzeata5onzf7rp26j2quaotjza 534 17 treatment treatment NN work_dzeata5onzf7rp26j2quaotjza 534 18 . . . work_dzeata5onzf7rp26j2quaotjza 535 1 In in IN work_dzeata5onzf7rp26j2quaotjza 535 2 addition addition NN work_dzeata5onzf7rp26j2quaotjza 535 3 , , , work_dzeata5onzf7rp26j2quaotjza 535 4 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 535 5 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 535 6 do do VBP work_dzeata5onzf7rp26j2quaotjza 535 7 not not RB work_dzeata5onzf7rp26j2quaotjza 535 8 fit fit VB work_dzeata5onzf7rp26j2quaotjza 535 9 into into IN work_dzeata5onzf7rp26j2quaotjza 535 10 the the DT work_dzeata5onzf7rp26j2quaotjza 535 11 “ " `` work_dzeata5onzf7rp26j2quaotjza 535 12 native native JJ work_dzeata5onzf7rp26j2quaotjza 535 13 ” " '' work_dzeata5onzf7rp26j2quaotjza 535 14 domains domain NNS work_dzeata5onzf7rp26j2quaotjza 535 15 of of IN work_dzeata5onzf7rp26j2quaotjza 535 16 either either DT work_dzeata5onzf7rp26j2quaotjza 535 17 approach approach NN work_dzeata5onzf7rp26j2quaotjza 535 18 — — : work_dzeata5onzf7rp26j2quaotjza 535 19 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 535 20 primary primary JJ work_dzeata5onzf7rp26j2quaotjza 535 21 contributions contribution NNS work_dzeata5onzf7rp26j2quaotjza 535 22 are be VBP work_dzeata5onzf7rp26j2quaotjza 535 23 designs design NNS work_dzeata5onzf7rp26j2quaotjza 535 24 , , , work_dzeata5onzf7rp26j2quaotjza 535 25 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 535 26 , , , work_dzeata5onzf7rp26j2quaotjza 535 27 and and CC work_dzeata5onzf7rp26j2quaotjza 535 28 implementations implementation NNS work_dzeata5onzf7rp26j2quaotjza 535 29 . . . work_dzeata5onzf7rp26j2quaotjza 536 1 The the DT work_dzeata5onzf7rp26j2quaotjza 536 2 result result NN work_dzeata5onzf7rp26j2quaotjza 536 3 of of IN work_dzeata5onzf7rp26j2quaotjza 536 4 these these DT work_dzeata5onzf7rp26j2quaotjza 536 5 differences difference NNS work_dzeata5onzf7rp26j2quaotjza 536 6 is be VBZ work_dzeata5onzf7rp26j2quaotjza 536 7 that that IN work_dzeata5onzf7rp26j2quaotjza 536 8 most most JJS work_dzeata5onzf7rp26j2quaotjza 536 9 literature literature NN work_dzeata5onzf7rp26j2quaotjza 536 10 reviews review NNS work_dzeata5onzf7rp26j2quaotjza 536 11 and and CC work_dzeata5onzf7rp26j2quaotjza 536 12 systemizations systemization NNS work_dzeata5onzf7rp26j2quaotjza 536 13 in in IN work_dzeata5onzf7rp26j2quaotjza 536 14 computing computing NN work_dzeata5onzf7rp26j2quaotjza 536 15 are be VBP work_dzeata5onzf7rp26j2quaotjza 536 16 done do VBN work_dzeata5onzf7rp26j2quaotjza 536 17 in in IN work_dzeata5onzf7rp26j2quaotjza 536 18 an an DT work_dzeata5onzf7rp26j2quaotjza 536 19 ad ad FW work_dzeata5onzf7rp26j2quaotjza 536 20 hoc hoc FW work_dzeata5onzf7rp26j2quaotjza 536 21 manner manner NN work_dzeata5onzf7rp26j2quaotjza 536 22 . . . work_dzeata5onzf7rp26j2quaotjza 537 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 537 2 computing computing NN work_dzeata5onzf7rp26j2quaotjza 537 3 research research NN work_dzeata5onzf7rp26j2quaotjza 537 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 537 5 worthy worthy JJ work_dzeata5onzf7rp26j2quaotjza 537 6 of of IN work_dzeata5onzf7rp26j2quaotjza 537 7 a a DT work_dzeata5onzf7rp26j2quaotjza 537 8 more more RBR work_dzeata5onzf7rp26j2quaotjza 537 9 rigorous rigorous JJ work_dzeata5onzf7rp26j2quaotjza 537 10 approach approach NN work_dzeata5onzf7rp26j2quaotjza 537 11 and and CC work_dzeata5onzf7rp26j2quaotjza 537 12 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 537 13 think think VBP work_dzeata5onzf7rp26j2quaotjza 537 14 the the DT work_dzeata5onzf7rp26j2quaotjza 537 15 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 537 16 applied apply VBD work_dzeata5onzf7rp26j2quaotjza 537 17 in in IN work_dzeata5onzf7rp26j2quaotjza 537 18 this this DT work_dzeata5onzf7rp26j2quaotjza 537 19 paper paper NN work_dzeata5onzf7rp26j2quaotjza 537 20 can can MD work_dzeata5onzf7rp26j2quaotjza 537 21 and and CC work_dzeata5onzf7rp26j2quaotjza 537 22 should should MD work_dzeata5onzf7rp26j2quaotjza 537 23 be be VB work_dzeata5onzf7rp26j2quaotjza 537 24 applied apply VBN work_dzeata5onzf7rp26j2quaotjza 537 25 to to IN work_dzeata5onzf7rp26j2quaotjza 537 26 other other JJ work_dzeata5onzf7rp26j2quaotjza 537 27 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 537 28 . . . work_dzeata5onzf7rp26j2quaotjza 538 1 In in IN work_dzeata5onzf7rp26j2quaotjza 538 2 fact fact NN work_dzeata5onzf7rp26j2quaotjza 538 3 , , , work_dzeata5onzf7rp26j2quaotjza 538 4 any any DT work_dzeata5onzf7rp26j2quaotjza 538 5 topic topic NN work_dzeata5onzf7rp26j2quaotjza 538 6 of of IN work_dzeata5onzf7rp26j2quaotjza 538 7 active active JJ work_dzeata5onzf7rp26j2quaotjza 538 8 research research NN work_dzeata5onzf7rp26j2quaotjza 538 9 where where WRB work_dzeata5onzf7rp26j2quaotjza 538 10 the the DT work_dzeata5onzf7rp26j2quaotjza 538 11 primary primary JJ work_dzeata5onzf7rp26j2quaotjza 538 12 contributions contribution NNS work_dzeata5onzf7rp26j2quaotjza 538 13 is be VBZ work_dzeata5onzf7rp26j2quaotjza 538 14 an an DT work_dzeata5onzf7rp26j2quaotjza 538 15 engineered engineer VBN work_dzeata5onzf7rp26j2quaotjza 538 16 artifact artifact NN work_dzeata5onzf7rp26j2quaotjza 538 17 , , , work_dzeata5onzf7rp26j2quaotjza 538 18 but but CC work_dzeata5onzf7rp26j2quaotjza 538 19 without without IN work_dzeata5onzf7rp26j2quaotjza 538 20 a a DT work_dzeata5onzf7rp26j2quaotjza 538 21 clear clear JJ work_dzeata5onzf7rp26j2quaotjza 538 22 and and CC work_dzeata5onzf7rp26j2quaotjza 538 23 precise precise JJ work_dzeata5onzf7rp26j2quaotjza 538 24 definition definition NN work_dzeata5onzf7rp26j2quaotjza 538 25 , , , work_dzeata5onzf7rp26j2quaotjza 538 26 would would MD work_dzeata5onzf7rp26j2quaotjza 538 27 be be VB work_dzeata5onzf7rp26j2quaotjza 538 28 amenable amenable JJ work_dzeata5onzf7rp26j2quaotjza 538 29 to to IN work_dzeata5onzf7rp26j2quaotjza 538 30 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 538 31 approach approach NN work_dzeata5onzf7rp26j2quaotjza 538 32 . . . work_dzeata5onzf7rp26j2quaotjza 539 1 These these DT work_dzeata5onzf7rp26j2quaotjza 539 2 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 539 3 span span VBP work_dzeata5onzf7rp26j2quaotjza 539 4 computing compute VBG work_dzeata5onzf7rp26j2quaotjza 539 5 research research NN work_dzeata5onzf7rp26j2quaotjza 539 6 from from IN work_dzeata5onzf7rp26j2quaotjza 539 7 software software NN work_dzeata5onzf7rp26j2quaotjza 539 8 engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 539 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 539 10 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 539 11 , , , work_dzeata5onzf7rp26j2quaotjza 539 12 service service NN work_dzeata5onzf7rp26j2quaotjza 539 13 oriented orient VBD work_dzeata5onzf7rp26j2quaotjza 539 14 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 539 15 , , , work_dzeata5onzf7rp26j2quaotjza 539 16 concurrent concurrent JJ work_dzeata5onzf7rp26j2quaotjza 539 17 computation computation NN work_dzeata5onzf7rp26j2quaotjza 539 18 models model NNS work_dzeata5onzf7rp26j2quaotjza 539 19 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 539 20 to to IN work_dzeata5onzf7rp26j2quaotjza 539 21 systems system NNS work_dzeata5onzf7rp26j2quaotjza 539 22 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 539 23 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 539 24 , , , work_dzeata5onzf7rp26j2quaotjza 539 25 green green JJ work_dzeata5onzf7rp26j2quaotjza 539 26 computing computing NN work_dzeata5onzf7rp26j2quaotjza 539 27 , , , work_dzeata5onzf7rp26j2quaotjza 539 28 no no DT work_dzeata5onzf7rp26j2quaotjza 539 29 instruction instruction NN work_dzeata5onzf7rp26j2quaotjza 539 30 set set VBN work_dzeata5onzf7rp26j2quaotjza 539 31 computing compute VBG work_dzeata5onzf7rp26j2quaotjza 539 32 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 539 33 to to IN work_dzeata5onzf7rp26j2quaotjza 539 34 human human NN work_dzeata5onzf7rp26j2quaotjza 539 35 – – : work_dzeata5onzf7rp26j2quaotjza 539 36 computer computer NN work_dzeata5onzf7rp26j2quaotjza 539 37 interaction interaction NN work_dzeata5onzf7rp26j2quaotjza 539 38 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 539 39 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 539 40 , , , work_dzeata5onzf7rp26j2quaotjza 539 41 GUI GUI NNP work_dzeata5onzf7rp26j2quaotjza 539 42 toolkits toolkit NNS work_dzeata5onzf7rp26j2quaotjza 539 43 , , , work_dzeata5onzf7rp26j2quaotjza 539 44 warning warn VBG work_dzeata5onzf7rp26j2quaotjza 539 45 science science NN work_dzeata5onzf7rp26j2quaotjza 539 46 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 539 47 . . . work_dzeata5onzf7rp26j2quaotjza 540 1 Meta meta JJ work_dzeata5onzf7rp26j2quaotjza 540 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 540 3 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 540 4 challenges challenge NNS work_dzeata5onzf7rp26j2quaotjza 540 5 and and CC work_dzeata5onzf7rp26j2quaotjza 540 6 suggested suggest VBD work_dzeata5onzf7rp26j2quaotjza 540 7 solutions solution NNS work_dzeata5onzf7rp26j2quaotjza 540 8 In in IN work_dzeata5onzf7rp26j2quaotjza 540 9 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 540 10 experience experience NN work_dzeata5onzf7rp26j2quaotjza 540 11 , , , work_dzeata5onzf7rp26j2quaotjza 540 12 the the DT work_dzeata5onzf7rp26j2quaotjza 540 13 biggest big JJS work_dzeata5onzf7rp26j2quaotjza 540 14 roadblock roadblock NN work_dzeata5onzf7rp26j2quaotjza 540 15 standing stand VBG work_dzeata5onzf7rp26j2quaotjza 540 16 in in IN work_dzeata5onzf7rp26j2quaotjza 540 17 the the DT work_dzeata5onzf7rp26j2quaotjza 540 18 way way NN work_dzeata5onzf7rp26j2quaotjza 540 19 of of IN work_dzeata5onzf7rp26j2quaotjza 540 20 applying apply VBG work_dzeata5onzf7rp26j2quaotjza 540 21 the the DT work_dzeata5onzf7rp26j2quaotjza 540 22 same same JJ work_dzeata5onzf7rp26j2quaotjza 540 23 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 540 24 to to IN work_dzeata5onzf7rp26j2quaotjza 540 25 other other JJ work_dzeata5onzf7rp26j2quaotjza 540 26 segments segment NNS work_dzeata5onzf7rp26j2quaotjza 540 27 of of IN work_dzeata5onzf7rp26j2quaotjza 540 28 the the DT work_dzeata5onzf7rp26j2quaotjza 540 29 research research NN work_dzeata5onzf7rp26j2quaotjza 540 30 community community NN work_dzeata5onzf7rp26j2quaotjza 540 31 lies lie VBZ work_dzeata5onzf7rp26j2quaotjza 540 32 in in IN work_dzeata5onzf7rp26j2quaotjza 540 33 the the DT work_dzeata5onzf7rp26j2quaotjza 540 34 difficulty difficulty NN work_dzeata5onzf7rp26j2quaotjza 540 35 involved involve VBN work_dzeata5onzf7rp26j2quaotjza 540 36 in in IN work_dzeata5onzf7rp26j2quaotjza 540 37 collecting collect VBG work_dzeata5onzf7rp26j2quaotjza 540 38 analyzable analyzable JJ work_dzeata5onzf7rp26j2quaotjza 540 39 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 540 40 about about IN work_dzeata5onzf7rp26j2quaotjza 540 41 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 540 42 . . . work_dzeata5onzf7rp26j2quaotjza 541 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 541 2 experienced experience VBD work_dzeata5onzf7rp26j2quaotjza 541 3 several several JJ work_dzeata5onzf7rp26j2quaotjza 541 4 fixable fixable JJ work_dzeata5onzf7rp26j2quaotjza 541 5 issues issue NNS work_dzeata5onzf7rp26j2quaotjza 541 6 : : : work_dzeata5onzf7rp26j2quaotjza 541 7 • • VB work_dzeata5onzf7rp26j2quaotjza 541 8 The the DT work_dzeata5onzf7rp26j2quaotjza 541 9 major major JJ work_dzeata5onzf7rp26j2quaotjza 541 10 publishers publisher NNS work_dzeata5onzf7rp26j2quaotjza 541 11 in in IN work_dzeata5onzf7rp26j2quaotjza 541 12 computer computer NN work_dzeata5onzf7rp26j2quaotjza 541 13 science science NN work_dzeata5onzf7rp26j2quaotjza 541 14 — — : work_dzeata5onzf7rp26j2quaotjza 541 15 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 541 16 , , , work_dzeata5onzf7rp26j2quaotjza 541 17 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 541 18 , , , work_dzeata5onzf7rp26j2quaotjza 541 19 and and CC work_dzeata5onzf7rp26j2quaotjza 541 20 Usenix Usenix NNP work_dzeata5onzf7rp26j2quaotjza 541 21 — — : work_dzeata5onzf7rp26j2quaotjza 541 22 do do VB work_dzeata5onzf7rp26j2quaotjza 541 23 not not RB work_dzeata5onzf7rp26j2quaotjza 541 24 provide provide VB work_dzeata5onzf7rp26j2quaotjza 541 25 publicly publicly RB work_dzeata5onzf7rp26j2quaotjza 541 26 available available JJ work_dzeata5onzf7rp26j2quaotjza 541 27 mechanisms mechanism NNS work_dzeata5onzf7rp26j2quaotjza 541 28 to to TO work_dzeata5onzf7rp26j2quaotjza 541 29 collect collect VB work_dzeata5onzf7rp26j2quaotjza 541 30 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 541 31 and and CC work_dzeata5onzf7rp26j2quaotjza 541 32 either either CC work_dzeata5onzf7rp26j2quaotjza 541 33 rate rate NN work_dzeata5onzf7rp26j2quaotjza 541 34 limit limit NN work_dzeata5onzf7rp26j2quaotjza 541 35 or or CC work_dzeata5onzf7rp26j2quaotjza 541 36 outright outright JJ work_dzeata5onzf7rp26j2quaotjza 541 37 ban ban NN work_dzeata5onzf7rp26j2quaotjza 541 38 scraping scraping NN work_dzeata5onzf7rp26j2quaotjza 541 39 . . . work_dzeata5onzf7rp26j2quaotjza 542 1 9 9 CD work_dzeata5onzf7rp26j2quaotjza 542 2 In in IN work_dzeata5onzf7rp26j2quaotjza 542 3 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 542 4 case case NN work_dzeata5onzf7rp26j2quaotjza 542 5 , , , work_dzeata5onzf7rp26j2quaotjza 542 6 the the DT work_dzeata5onzf7rp26j2quaotjza 542 7 painstaking painstaking JJ work_dzeata5onzf7rp26j2quaotjza 542 8 process process NN work_dzeata5onzf7rp26j2quaotjza 542 9 of of IN work_dzeata5onzf7rp26j2quaotjza 542 10 collecting collect VBG work_dzeata5onzf7rp26j2quaotjza 542 11 and and CC work_dzeata5onzf7rp26j2quaotjza 542 12 curating curate VBG work_dzeata5onzf7rp26j2quaotjza 542 13 analyzable analyzable JJ work_dzeata5onzf7rp26j2quaotjza 542 14 9 9 CD work_dzeata5onzf7rp26j2quaotjza 542 15 In in IN work_dzeata5onzf7rp26j2quaotjza 542 16 at at RB work_dzeata5onzf7rp26j2quaotjza 542 17 least least RBS work_dzeata5onzf7rp26j2quaotjza 542 18 one one CD work_dzeata5onzf7rp26j2quaotjza 542 19 case case NN work_dzeata5onzf7rp26j2quaotjza 542 20 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 542 21 provided provide VBD work_dzeata5onzf7rp26j2quaotjza 542 22 a a DT work_dzeata5onzf7rp26j2quaotjza 542 23 copy copy NN work_dzeata5onzf7rp26j2quaotjza 542 24 of of IN work_dzeata5onzf7rp26j2quaotjza 542 25 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 542 26 digital digital JJ work_dzeata5onzf7rp26j2quaotjza 542 27 library library NN work_dzeata5onzf7rp26j2quaotjza 542 28 for for IN work_dzeata5onzf7rp26j2quaotjza 542 29 scraping scrape VBG work_dzeata5onzf7rp26j2quaotjza 542 30 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 542 31 Bergmark Bergmark NNP work_dzeata5onzf7rp26j2quaotjza 542 32 , , , work_dzeata5onzf7rp26j2quaotjza 542 33 Phempoonpanich Phempoonpanich NNP work_dzeata5onzf7rp26j2quaotjza 542 34 & & CC work_dzeata5onzf7rp26j2quaotjza 542 35 Zhao Zhao NNP work_dzeata5onzf7rp26j2quaotjza 542 36 , , , work_dzeata5onzf7rp26j2quaotjza 542 37 2001 2001 CD work_dzeata5onzf7rp26j2quaotjza 542 38 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 542 39 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 542 40 across across IN work_dzeata5onzf7rp26j2quaotjza 542 41 several several JJ work_dzeata5onzf7rp26j2quaotjza 542 42 sources source NNS work_dzeata5onzf7rp26j2quaotjza 542 43 limited limit VBD work_dzeata5onzf7rp26j2quaotjza 542 44 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 542 45 ability ability NN work_dzeata5onzf7rp26j2quaotjza 542 46 to to TO work_dzeata5onzf7rp26j2quaotjza 542 47 explore explore VB work_dzeata5onzf7rp26j2quaotjza 542 48 hypotheses hypothesis NNS work_dzeata5onzf7rp26j2quaotjza 542 49 about about IN work_dzeata5onzf7rp26j2quaotjza 542 50 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 542 51 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 542 52 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 542 53 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 542 54 and and CC work_dzeata5onzf7rp26j2quaotjza 542 55 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 542 56 relationships relationship NNS work_dzeata5onzf7rp26j2quaotjza 542 57 to to TO work_dzeata5onzf7rp26j2quaotjza 542 58 publications publication NNS work_dzeata5onzf7rp26j2quaotjza 542 59 not not RB work_dzeata5onzf7rp26j2quaotjza 542 60 in in IN work_dzeata5onzf7rp26j2quaotjza 542 61 the the DT work_dzeata5onzf7rp26j2quaotjza 542 62 set set NN work_dzeata5onzf7rp26j2quaotjza 542 63 . . . work_dzeata5onzf7rp26j2quaotjza 543 1 • • VB work_dzeata5onzf7rp26j2quaotjza 543 2 The the DT work_dzeata5onzf7rp26j2quaotjza 543 3 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 543 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 543 5 limited limit VBN work_dzeata5onzf7rp26j2quaotjza 543 6 and and CC work_dzeata5onzf7rp26j2quaotjza 543 7 contains contain VBZ work_dzeata5onzf7rp26j2quaotjza 543 8 little little JJ work_dzeata5onzf7rp26j2quaotjza 543 9 semantic semantic JJ work_dzeata5onzf7rp26j2quaotjza 543 10 content content NN work_dzeata5onzf7rp26j2quaotjza 543 11 — — : work_dzeata5onzf7rp26j2quaotjza 543 12 typically typically RB work_dzeata5onzf7rp26j2quaotjza 543 13 the the DT work_dzeata5onzf7rp26j2quaotjza 543 14 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 543 15 includes include VBZ work_dzeata5onzf7rp26j2quaotjza 543 16 the the DT work_dzeata5onzf7rp26j2quaotjza 543 17 authors author NNS work_dzeata5onzf7rp26j2quaotjza 543 18 , , , work_dzeata5onzf7rp26j2quaotjza 543 19 title title NN work_dzeata5onzf7rp26j2quaotjza 543 20 , , , work_dzeata5onzf7rp26j2quaotjza 543 21 data datum NNS work_dzeata5onzf7rp26j2quaotjza 543 22 , , , work_dzeata5onzf7rp26j2quaotjza 543 23 and and CC work_dzeata5onzf7rp26j2quaotjza 543 24 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 543 25 , , , work_dzeata5onzf7rp26j2quaotjza 543 26 but but CC work_dzeata5onzf7rp26j2quaotjza 543 27 little little JJ work_dzeata5onzf7rp26j2quaotjza 543 28 else else RB work_dzeata5onzf7rp26j2quaotjza 543 29 . . . work_dzeata5onzf7rp26j2quaotjza 544 1 If if IN work_dzeata5onzf7rp26j2quaotjza 544 2 abstracts abstract NNS work_dzeata5onzf7rp26j2quaotjza 544 3 and and CC work_dzeata5onzf7rp26j2quaotjza 544 4 keywords keyword NNS work_dzeata5onzf7rp26j2quaotjza 544 5 were be VBD work_dzeata5onzf7rp26j2quaotjza 544 6 easier easy JJR work_dzeata5onzf7rp26j2quaotjza 544 7 to to TO work_dzeata5onzf7rp26j2quaotjza 544 8 harvest harvest VB work_dzeata5onzf7rp26j2quaotjza 544 9 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 544 10 could could MD work_dzeata5onzf7rp26j2quaotjza 544 11 have have VB work_dzeata5onzf7rp26j2quaotjza 544 12 more more RBR work_dzeata5onzf7rp26j2quaotjza 544 13 systematically systematically RB work_dzeata5onzf7rp26j2quaotjza 544 14 derived derive VBN work_dzeata5onzf7rp26j2quaotjza 544 15 topics topic NNS work_dzeata5onzf7rp26j2quaotjza 544 16 of of IN work_dzeata5onzf7rp26j2quaotjza 544 17 interest interest NN work_dzeata5onzf7rp26j2quaotjza 544 18 within within IN work_dzeata5onzf7rp26j2quaotjza 544 19 the the DT work_dzeata5onzf7rp26j2quaotjza 544 20 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 544 21 community community NN work_dzeata5onzf7rp26j2quaotjza 544 22 . . . work_dzeata5onzf7rp26j2quaotjza 545 1 • • VB work_dzeata5onzf7rp26j2quaotjza 545 2 Links link NNS work_dzeata5onzf7rp26j2quaotjza 545 3 to to IN work_dzeata5onzf7rp26j2quaotjza 545 4 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 545 5 on on IN work_dzeata5onzf7rp26j2quaotjza 545 6 publisher publisher NN work_dzeata5onzf7rp26j2quaotjza 545 7 websites website NNS work_dzeata5onzf7rp26j2quaotjza 545 8 use use VBP work_dzeata5onzf7rp26j2quaotjza 545 9 internal internal JJ work_dzeata5onzf7rp26j2quaotjza 545 10 identifiers identifier NNS work_dzeata5onzf7rp26j2quaotjza 545 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 545 12 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 545 13 , , , work_dzeata5onzf7rp26j2quaotjza 545 14 http://dl.acm.org/ http://dl.acm.org/ VBZ work_dzeata5onzf7rp26j2quaotjza 545 15 citation.cfm?id=2498101 citation.cfm?id=2498101 IN work_dzeata5onzf7rp26j2quaotjza 545 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 545 17 instead instead RB work_dzeata5onzf7rp26j2quaotjza 545 18 of of IN work_dzeata5onzf7rp26j2quaotjza 545 19 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 545 20 . . . work_dzeata5onzf7rp26j2quaotjza 546 1 This this DT work_dzeata5onzf7rp26j2quaotjza 546 2 makes make VBZ work_dzeata5onzf7rp26j2quaotjza 546 3 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 546 4 difficult difficult JJ work_dzeata5onzf7rp26j2quaotjza 546 5 to to TO work_dzeata5onzf7rp26j2quaotjza 546 6 reference reference VB work_dzeata5onzf7rp26j2quaotjza 546 7 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 546 8 across across IN work_dzeata5onzf7rp26j2quaotjza 546 9 publisher publisher NN work_dzeata5onzf7rp26j2quaotjza 546 10 repositories repository NNS work_dzeata5onzf7rp26j2quaotjza 546 11 . . . work_dzeata5onzf7rp26j2quaotjza 547 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 547 2 Conference conference NN work_dzeata5onzf7rp26j2quaotjza 547 3 websites website NNS work_dzeata5onzf7rp26j2quaotjza 547 4 have have VBP work_dzeata5onzf7rp26j2quaotjza 547 5 inconsistent inconsistent JJ work_dzeata5onzf7rp26j2quaotjza 547 6 layouts layout NNS work_dzeata5onzf7rp26j2quaotjza 547 7 , , , work_dzeata5onzf7rp26j2quaotjza 547 8 which which WDT work_dzeata5onzf7rp26j2quaotjza 547 9 increases increase VBZ work_dzeata5onzf7rp26j2quaotjza 547 10 the the DT work_dzeata5onzf7rp26j2quaotjza 547 11 difficulty difficulty NN work_dzeata5onzf7rp26j2quaotjza 547 12 of of IN work_dzeata5onzf7rp26j2quaotjza 547 13 data datum NNS work_dzeata5onzf7rp26j2quaotjza 547 14 collection collection NN work_dzeata5onzf7rp26j2quaotjza 547 15 . . . work_dzeata5onzf7rp26j2quaotjza 548 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 548 2 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 548 3 easier easy JJR work_dzeata5onzf7rp26j2quaotjza 548 4 access access NN work_dzeata5onzf7rp26j2quaotjza 548 5 to to IN work_dzeata5onzf7rp26j2quaotjza 548 6 this this DT work_dzeata5onzf7rp26j2quaotjza 548 7 data data NN work_dzeata5onzf7rp26j2quaotjza 548 8 would would MD work_dzeata5onzf7rp26j2quaotjza 548 9 have have VB work_dzeata5onzf7rp26j2quaotjza 548 10 allowed allow VBN work_dzeata5onzf7rp26j2quaotjza 548 11 us -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 548 12 to to TO work_dzeata5onzf7rp26j2quaotjza 548 13 draw draw VB work_dzeata5onzf7rp26j2quaotjza 548 14 more more JJR work_dzeata5onzf7rp26j2quaotjza 548 15 conclusions conclusion NNS work_dzeata5onzf7rp26j2quaotjza 548 16 about about IN work_dzeata5onzf7rp26j2quaotjza 548 17 how how WRB work_dzeata5onzf7rp26j2quaotjza 548 18 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 548 19 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 548 20 are be VBP work_dzeata5onzf7rp26j2quaotjza 548 21 related relate VBN work_dzeata5onzf7rp26j2quaotjza 548 22 and and CC work_dzeata5onzf7rp26j2quaotjza 548 23 how how WRB work_dzeata5onzf7rp26j2quaotjza 548 24 the the DT work_dzeata5onzf7rp26j2quaotjza 548 25 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 548 26 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 548 27 has have VBZ work_dzeata5onzf7rp26j2quaotjza 548 28 evolved evolve VBN work_dzeata5onzf7rp26j2quaotjza 548 29 over over IN work_dzeata5onzf7rp26j2quaotjza 548 30 time time NN work_dzeata5onzf7rp26j2quaotjza 548 31 . . . work_dzeata5onzf7rp26j2quaotjza 549 1 For for IN work_dzeata5onzf7rp26j2quaotjza 549 2 example example NN work_dzeata5onzf7rp26j2quaotjza 549 3 , , , work_dzeata5onzf7rp26j2quaotjza 549 4 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 549 5 explored explore VBD work_dzeata5onzf7rp26j2quaotjza 549 6 the the DT work_dzeata5onzf7rp26j2quaotjza 549 7 idea idea NN work_dzeata5onzf7rp26j2quaotjza 549 8 of of IN work_dzeata5onzf7rp26j2quaotjza 549 9 using use VBG work_dzeata5onzf7rp26j2quaotjza 549 10 a a DT work_dzeata5onzf7rp26j2quaotjza 549 11 more more RBR work_dzeata5onzf7rp26j2quaotjza 549 12 developed developed JJ work_dzeata5onzf7rp26j2quaotjza 549 13 citation citation NN work_dzeata5onzf7rp26j2quaotjza 549 14 graph graph NN work_dzeata5onzf7rp26j2quaotjza 549 15 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 549 16 et et NNP work_dzeata5onzf7rp26j2quaotjza 549 17 al al NNP work_dzeata5onzf7rp26j2quaotjza 549 18 . . . work_dzeata5onzf7rp26j2quaotjza 550 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 550 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 550 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 550 4 , , , work_dzeata5onzf7rp26j2quaotjza 550 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 550 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 550 7 . . . work_dzeata5onzf7rp26j2quaotjza 551 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 551 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 551 3 , , , work_dzeata5onzf7rp26j2quaotjza 551 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 551 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 551 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 551 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 551 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 551 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 551 10 27/36 27/36 CD work_dzeata5onzf7rp26j2quaotjza 551 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 551 12 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 13 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 14 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 15 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 16 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 17 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 18 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 19 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 20 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 21 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 22 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 23 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 24 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 25 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 26 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 27 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 28 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 29 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 30 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 31 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 32 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 33 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 34 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 35 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 36 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 37 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 38 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 39 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 40 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 41 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 42 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 43 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 44 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 45 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 46 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 47 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 48 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 49 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 50 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 51 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 52 http://dl.acm.org/citation.cfm?id=2498101 http://dl.acm.org/citation.cfm?id=2498101 NNP work_dzeata5onzf7rp26j2quaotjza 551 53 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 551 54 than than IN work_dzeata5onzf7rp26j2quaotjza 551 55 Fig Fig NNP work_dzeata5onzf7rp26j2quaotjza 551 56 . . . work_dzeata5onzf7rp26j2quaotjza 552 1 2 2 CD work_dzeata5onzf7rp26j2quaotjza 552 2 to to TO work_dzeata5onzf7rp26j2quaotjza 552 3 trace trace VB work_dzeata5onzf7rp26j2quaotjza 552 4 the the DT work_dzeata5onzf7rp26j2quaotjza 552 5 lineage lineage NN work_dzeata5onzf7rp26j2quaotjza 552 6 of of IN work_dzeata5onzf7rp26j2quaotjza 552 7 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 552 8 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 552 9 , , , work_dzeata5onzf7rp26j2quaotjza 552 10 but but CC work_dzeata5onzf7rp26j2quaotjza 552 11 found find VBD work_dzeata5onzf7rp26j2quaotjza 552 12 the the DT work_dzeata5onzf7rp26j2quaotjza 552 13 required require VBN work_dzeata5onzf7rp26j2quaotjza 552 14 resource resource NN work_dzeata5onzf7rp26j2quaotjza 552 15 expenditures expenditure NNS work_dzeata5onzf7rp26j2quaotjza 552 16 were be VBD work_dzeata5onzf7rp26j2quaotjza 552 17 outside outside IN work_dzeata5onzf7rp26j2quaotjza 552 18 of of IN work_dzeata5onzf7rp26j2quaotjza 552 19 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 552 20 means mean NNS work_dzeata5onzf7rp26j2quaotjza 552 21 . . . work_dzeata5onzf7rp26j2quaotjza 553 1 This this DT work_dzeata5onzf7rp26j2quaotjza 553 2 data data NN work_dzeata5onzf7rp26j2quaotjza 553 3 may may MD work_dzeata5onzf7rp26j2quaotjza 553 4 provide provide VB work_dzeata5onzf7rp26j2quaotjza 553 5 support support NN work_dzeata5onzf7rp26j2quaotjza 553 6 for for IN work_dzeata5onzf7rp26j2quaotjza 553 7 explanations explanation NNS work_dzeata5onzf7rp26j2quaotjza 553 8 regarding regard VBG work_dzeata5onzf7rp26j2quaotjza 553 9 the the DT work_dzeata5onzf7rp26j2quaotjza 553 10 lack lack NN work_dzeata5onzf7rp26j2quaotjza 553 11 of of IN work_dzeata5onzf7rp26j2quaotjza 553 12 advancement advancement NN work_dzeata5onzf7rp26j2quaotjza 553 13 in in IN work_dzeata5onzf7rp26j2quaotjza 553 14 security security NN work_dzeata5onzf7rp26j2quaotjza 553 15 validation validation NN work_dzeata5onzf7rp26j2quaotjza 553 16 practices practice NNS work_dzeata5onzf7rp26j2quaotjza 553 17 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 553 18 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 553 19 , , , work_dzeata5onzf7rp26j2quaotjza 553 20 by by IN work_dzeata5onzf7rp26j2quaotjza 553 21 showing show VBG work_dzeata5onzf7rp26j2quaotjza 553 22 an an DT work_dzeata5onzf7rp26j2quaotjza 553 23 emphasis emphasis NN work_dzeata5onzf7rp26j2quaotjza 553 24 on on IN work_dzeata5onzf7rp26j2quaotjza 553 25 a a DT work_dzeata5onzf7rp26j2quaotjza 553 26 different different JJ work_dzeata5onzf7rp26j2quaotjza 553 27 but but CC work_dzeata5onzf7rp26j2quaotjza 553 28 important important JJ work_dzeata5onzf7rp26j2quaotjza 553 29 dimension dimension NN work_dzeata5onzf7rp26j2quaotjza 553 30 of of IN work_dzeata5onzf7rp26j2quaotjza 553 31 advancement advancement NN work_dzeata5onzf7rp26j2quaotjza 553 32 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 553 33 . . . work_dzeata5onzf7rp26j2quaotjza 554 1 These these DT work_dzeata5onzf7rp26j2quaotjza 554 2 points point NNS work_dzeata5onzf7rp26j2quaotjza 554 3 are be VBP work_dzeata5onzf7rp26j2quaotjza 554 4 important important JJ work_dzeata5onzf7rp26j2quaotjza 554 5 to to TO work_dzeata5onzf7rp26j2quaotjza 554 6 understand understand VB work_dzeata5onzf7rp26j2quaotjza 554 7 how how WRB work_dzeata5onzf7rp26j2quaotjza 554 8 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 554 9 got get VBD work_dzeata5onzf7rp26j2quaotjza 554 10 to to IN work_dzeata5onzf7rp26j2quaotjza 554 11 the the DT work_dzeata5onzf7rp26j2quaotjza 554 12 current current JJ work_dzeata5onzf7rp26j2quaotjza 554 13 state state NN work_dzeata5onzf7rp26j2quaotjza 554 14 of of IN work_dzeata5onzf7rp26j2quaotjza 554 15 practice practice NN work_dzeata5onzf7rp26j2quaotjza 554 16 , , , work_dzeata5onzf7rp26j2quaotjza 554 17 thus thus RB work_dzeata5onzf7rp26j2quaotjza 554 18 improving improve VBG work_dzeata5onzf7rp26j2quaotjza 554 19 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 554 20 ability ability NN work_dzeata5onzf7rp26j2quaotjza 554 21 to to TO work_dzeata5onzf7rp26j2quaotjza 554 22 recognize recognize VB work_dzeata5onzf7rp26j2quaotjza 554 23 and and CC work_dzeata5onzf7rp26j2quaotjza 554 24 advance advance NN work_dzeata5onzf7rp26j2quaotjza 554 25 means mean VBZ work_dzeata5onzf7rp26j2quaotjza 554 26 for for IN work_dzeata5onzf7rp26j2quaotjza 554 27 enhancing enhance VBG work_dzeata5onzf7rp26j2quaotjza 554 28 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 554 29 results result NNS work_dzeata5onzf7rp26j2quaotjza 554 30 . . . work_dzeata5onzf7rp26j2quaotjza 555 1 On on IN work_dzeata5onzf7rp26j2quaotjza 555 2 another another DT work_dzeata5onzf7rp26j2quaotjza 555 3 data datum NNS work_dzeata5onzf7rp26j2quaotjza 555 4 collection collection NN work_dzeata5onzf7rp26j2quaotjza 555 5 point point NN work_dzeata5onzf7rp26j2quaotjza 555 6 , , , work_dzeata5onzf7rp26j2quaotjza 555 7 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 555 8 averaged average VBD work_dzeata5onzf7rp26j2quaotjza 555 9 about about IN work_dzeata5onzf7rp26j2quaotjza 555 10 45 45 CD work_dzeata5onzf7rp26j2quaotjza 555 11 min min NN work_dzeata5onzf7rp26j2quaotjza 555 12 per per IN work_dzeata5onzf7rp26j2quaotjza 555 13 paper paper NN work_dzeata5onzf7rp26j2quaotjza 555 14 to to TO work_dzeata5onzf7rp26j2quaotjza 555 15 code code VB work_dzeata5onzf7rp26j2quaotjza 555 16 the the DT work_dzeata5onzf7rp26j2quaotjza 555 17 data datum NNS work_dzeata5onzf7rp26j2quaotjza 555 18 necessary necessary JJ work_dzeata5onzf7rp26j2quaotjza 555 19 to to TO work_dzeata5onzf7rp26j2quaotjza 555 20 answer answer VB work_dzeata5onzf7rp26j2quaotjza 555 21 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 555 22 research research NN work_dzeata5onzf7rp26j2quaotjza 555 23 questions question NNS work_dzeata5onzf7rp26j2quaotjza 555 24 . . . work_dzeata5onzf7rp26j2quaotjza 556 1 While while IN work_dzeata5onzf7rp26j2quaotjza 556 2 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 556 3 do do VBP work_dzeata5onzf7rp26j2quaotjza 556 4 not not RB work_dzeata5onzf7rp26j2quaotjza 556 5 claim claim VB work_dzeata5onzf7rp26j2quaotjza 556 6 that that IN work_dzeata5onzf7rp26j2quaotjza 556 7 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 556 8 research research NN work_dzeata5onzf7rp26j2quaotjza 556 9 questions question NNS work_dzeata5onzf7rp26j2quaotjza 556 10 are be VBP work_dzeata5onzf7rp26j2quaotjza 556 11 of of IN work_dzeata5onzf7rp26j2quaotjza 556 12 universal universal JJ work_dzeata5onzf7rp26j2quaotjza 556 13 interest interest NN work_dzeata5onzf7rp26j2quaotjza 556 14 to to IN work_dzeata5onzf7rp26j2quaotjza 556 15 the the DT work_dzeata5onzf7rp26j2quaotjza 556 16 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 556 17 community community NN work_dzeata5onzf7rp26j2quaotjza 556 18 , , , work_dzeata5onzf7rp26j2quaotjza 556 19 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 556 20 did do VBD work_dzeata5onzf7rp26j2quaotjza 556 21 observe observe VB work_dzeata5onzf7rp26j2quaotjza 556 22 that that IN work_dzeata5onzf7rp26j2quaotjza 556 23 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 556 24 that that WDT work_dzeata5onzf7rp26j2quaotjza 556 25 answer answer VBP work_dzeata5onzf7rp26j2quaotjza 556 26 all all DT work_dzeata5onzf7rp26j2quaotjza 556 27 or or CC work_dzeata5onzf7rp26j2quaotjza 556 28 most most JJS work_dzeata5onzf7rp26j2quaotjza 556 29 of of IN work_dzeata5onzf7rp26j2quaotjza 556 30 the the DT work_dzeata5onzf7rp26j2quaotjza 556 31 questions question NNS work_dzeata5onzf7rp26j2quaotjza 556 32 in in IN work_dzeata5onzf7rp26j2quaotjza 556 33 the the DT work_dzeata5onzf7rp26j2quaotjza 556 34 abstract abstract NN work_dzeata5onzf7rp26j2quaotjza 556 35 are be VBP work_dzeata5onzf7rp26j2quaotjza 556 36 often often RB work_dzeata5onzf7rp26j2quaotjza 556 37 clearly clearly RB work_dzeata5onzf7rp26j2quaotjza 556 38 written write VBN work_dzeata5onzf7rp26j2quaotjza 556 39 throughout throughout IN work_dzeata5onzf7rp26j2quaotjza 556 40 and and CC work_dzeata5onzf7rp26j2quaotjza 556 41 easy easy JJ work_dzeata5onzf7rp26j2quaotjza 556 42 to to TO work_dzeata5onzf7rp26j2quaotjza 556 43 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 556 44 . . . work_dzeata5onzf7rp26j2quaotjza 557 1 A a DT work_dzeata5onzf7rp26j2quaotjza 557 2 small small JJ work_dzeata5onzf7rp26j2quaotjza 557 3 minority minority NN work_dzeata5onzf7rp26j2quaotjza 557 4 of of IN work_dzeata5onzf7rp26j2quaotjza 557 5 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 557 6 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 557 7 have have VBP work_dzeata5onzf7rp26j2quaotjza 557 8 far far RB work_dzeata5onzf7rp26j2quaotjza 557 9 less less RBR work_dzeata5onzf7rp26j2quaotjza 557 10 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 557 11 abstracts abstract NNS work_dzeata5onzf7rp26j2quaotjza 557 12 . . . work_dzeata5onzf7rp26j2quaotjza 558 1 In in IN work_dzeata5onzf7rp26j2quaotjza 558 2 these these DT work_dzeata5onzf7rp26j2quaotjza 558 3 cases case NNS work_dzeata5onzf7rp26j2quaotjza 558 4 , , , work_dzeata5onzf7rp26j2quaotjza 558 5 the the DT work_dzeata5onzf7rp26j2quaotjza 558 6 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 558 7 often often RB work_dzeata5onzf7rp26j2quaotjza 558 8 took take VBD work_dzeata5onzf7rp26j2quaotjza 558 9 double double PDT work_dzeata5onzf7rp26j2quaotjza 558 10 the the DT work_dzeata5onzf7rp26j2quaotjza 558 11 average average JJ work_dzeata5onzf7rp26j2quaotjza 558 12 time time NN work_dzeata5onzf7rp26j2quaotjza 558 13 to to TO work_dzeata5onzf7rp26j2quaotjza 558 14 comprehend comprehend VB work_dzeata5onzf7rp26j2quaotjza 558 15 and and CC work_dzeata5onzf7rp26j2quaotjza 558 16 interpret interpret VB work_dzeata5onzf7rp26j2quaotjza 558 17 . . . work_dzeata5onzf7rp26j2quaotjza 559 1 It -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 559 2 may may MD work_dzeata5onzf7rp26j2quaotjza 559 3 be be VB work_dzeata5onzf7rp26j2quaotjza 559 4 useful useful JJ work_dzeata5onzf7rp26j2quaotjza 559 5 to to TO work_dzeata5onzf7rp26j2quaotjza 559 6 strive strive VB work_dzeata5onzf7rp26j2quaotjza 559 7 to to TO work_dzeata5onzf7rp26j2quaotjza 559 8 clearly clearly RB work_dzeata5onzf7rp26j2quaotjza 559 9 answer answer VB work_dzeata5onzf7rp26j2quaotjza 559 10 questions question NNS work_dzeata5onzf7rp26j2quaotjza 559 11 like like IN work_dzeata5onzf7rp26j2quaotjza 559 12 ours our NNS work_dzeata5onzf7rp26j2quaotjza 559 13 in in IN work_dzeata5onzf7rp26j2quaotjza 559 14 future future JJ work_dzeata5onzf7rp26j2quaotjza 559 15 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 559 16 to to TO work_dzeata5onzf7rp26j2quaotjza 559 17 show show VB work_dzeata5onzf7rp26j2quaotjza 559 18 practitioners practitioner NNS work_dzeata5onzf7rp26j2quaotjza 559 19 the the DT work_dzeata5onzf7rp26j2quaotjza 559 20 value value NN work_dzeata5onzf7rp26j2quaotjza 559 21 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 559 22 researchers researcher NNS work_dzeata5onzf7rp26j2quaotjza 559 23 bring bring VBP work_dzeata5onzf7rp26j2quaotjza 559 24 to to IN work_dzeata5onzf7rp26j2quaotjza 559 25 the the DT work_dzeata5onzf7rp26j2quaotjza 559 26 table table NN work_dzeata5onzf7rp26j2quaotjza 559 27 . . . work_dzeata5onzf7rp26j2quaotjza 560 1 THREATS threat NNS work_dzeata5onzf7rp26j2quaotjza 560 2 TO to IN work_dzeata5onzf7rp26j2quaotjza 560 3 VALIDITY VALIDITY NNP work_dzeata5onzf7rp26j2quaotjza 560 4 Due due IN work_dzeata5onzf7rp26j2quaotjza 560 5 to to IN work_dzeata5onzf7rp26j2quaotjza 560 6 the the DT work_dzeata5onzf7rp26j2quaotjza 560 7 complexity complexity NN work_dzeata5onzf7rp26j2quaotjza 560 8 of of IN work_dzeata5onzf7rp26j2quaotjza 560 9 the the DT work_dzeata5onzf7rp26j2quaotjza 560 10 text text NN work_dzeata5onzf7rp26j2quaotjza 560 11 and and CC work_dzeata5onzf7rp26j2quaotjza 560 12 concepts concept NNS work_dzeata5onzf7rp26j2quaotjza 560 13 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 560 14 are be VBP work_dzeata5onzf7rp26j2quaotjza 560 15 interpreting interpret VBG work_dzeata5onzf7rp26j2quaotjza 560 16 , , , work_dzeata5onzf7rp26j2quaotjza 560 17 there there EX work_dzeata5onzf7rp26j2quaotjza 560 18 is be VBZ work_dzeata5onzf7rp26j2quaotjza 560 19 some some DT work_dzeata5onzf7rp26j2quaotjza 560 20 risk risk NN work_dzeata5onzf7rp26j2quaotjza 560 21 that that IN work_dzeata5onzf7rp26j2quaotjza 560 22 other other JJ work_dzeata5onzf7rp26j2quaotjza 560 23 coders coder NNS work_dzeata5onzf7rp26j2quaotjza 560 24 would would MD work_dzeata5onzf7rp26j2quaotjza 560 25 assign assign VB work_dzeata5onzf7rp26j2quaotjza 560 26 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 560 27 to to IN work_dzeata5onzf7rp26j2quaotjza 560 28 different different JJ work_dzeata5onzf7rp26j2quaotjza 560 29 codes code NNS work_dzeata5onzf7rp26j2quaotjza 560 30 . . . work_dzeata5onzf7rp26j2quaotjza 561 1 Different different JJ work_dzeata5onzf7rp26j2quaotjza 561 2 codes code NNS work_dzeata5onzf7rp26j2quaotjza 561 3 will will MD work_dzeata5onzf7rp26j2quaotjza 561 4 change change VB work_dzeata5onzf7rp26j2quaotjza 561 5 the the DT work_dzeata5onzf7rp26j2quaotjza 561 6 results result NNS work_dzeata5onzf7rp26j2quaotjza 561 7 , , , work_dzeata5onzf7rp26j2quaotjza 561 8 but but CC work_dzeata5onzf7rp26j2quaotjza 561 9 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 561 10 believe believe VBP work_dzeata5onzf7rp26j2quaotjza 561 11 this this DT work_dzeata5onzf7rp26j2quaotjza 561 12 risk risk NN work_dzeata5onzf7rp26j2quaotjza 561 13 is be VBZ work_dzeata5onzf7rp26j2quaotjza 561 14 mitigated mitigate VBN work_dzeata5onzf7rp26j2quaotjza 561 15 through through IN work_dzeata5onzf7rp26j2quaotjza 561 16 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 561 17 tests test NNS work_dzeata5onzf7rp26j2quaotjza 561 18 of of IN work_dzeata5onzf7rp26j2quaotjza 561 19 the the DT work_dzeata5onzf7rp26j2quaotjza 561 20 coding code VBG work_dzeata5onzf7rp26j2quaotjza 561 21 frame frame NN work_dzeata5onzf7rp26j2quaotjza 561 22 and and CC work_dzeata5onzf7rp26j2quaotjza 561 23 by by IN work_dzeata5onzf7rp26j2quaotjza 561 24 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 561 25 efforts effort NNS work_dzeata5onzf7rp26j2quaotjza 561 26 to to TO work_dzeata5onzf7rp26j2quaotjza 561 27 select select VB work_dzeata5onzf7rp26j2quaotjza 561 28 clear clear JJ work_dzeata5onzf7rp26j2quaotjza 561 29 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 561 30 . . . work_dzeata5onzf7rp26j2quaotjza 562 1 Furthermore furthermore RB work_dzeata5onzf7rp26j2quaotjza 562 2 , , , work_dzeata5onzf7rp26j2quaotjza 562 3 the the DT work_dzeata5onzf7rp26j2quaotjza 562 4 correlative correlative JJ work_dzeata5onzf7rp26j2quaotjza 562 5 nature nature NN work_dzeata5onzf7rp26j2quaotjza 562 6 of of IN work_dzeata5onzf7rp26j2quaotjza 562 7 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 562 8 results result NNS work_dzeata5onzf7rp26j2quaotjza 562 9 ensures ensure VBZ work_dzeata5onzf7rp26j2quaotjza 562 10 that that IN work_dzeata5onzf7rp26j2quaotjza 562 11 a a DT work_dzeata5onzf7rp26j2quaotjza 562 12 few few JJ work_dzeata5onzf7rp26j2quaotjza 562 13 code code NN work_dzeata5onzf7rp26j2quaotjza 562 14 divergences divergence NNS work_dzeata5onzf7rp26j2quaotjza 562 15 will will MD work_dzeata5onzf7rp26j2quaotjza 562 16 not not RB work_dzeata5onzf7rp26j2quaotjza 562 17 dramatically dramatically RB work_dzeata5onzf7rp26j2quaotjza 562 18 change change VB work_dzeata5onzf7rp26j2quaotjza 562 19 the the DT work_dzeata5onzf7rp26j2quaotjza 562 20 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 562 21 ’s ’s POS work_dzeata5onzf7rp26j2quaotjza 562 22 outcomes outcome NNS work_dzeata5onzf7rp26j2quaotjza 562 23 . . . work_dzeata5onzf7rp26j2quaotjza 563 1 The the DT work_dzeata5onzf7rp26j2quaotjza 563 2 primary primary JJ work_dzeata5onzf7rp26j2quaotjza 563 3 risk risk NN work_dzeata5onzf7rp26j2quaotjza 563 4 is be VBZ work_dzeata5onzf7rp26j2quaotjza 563 5 that that IN work_dzeata5onzf7rp26j2quaotjza 563 6 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 563 7 are be VBP work_dzeata5onzf7rp26j2quaotjza 563 8 missing miss VBG work_dzeata5onzf7rp26j2quaotjza 563 9 relevant relevant JJ work_dzeata5onzf7rp26j2quaotjza 563 10 quotes quote NNS work_dzeata5onzf7rp26j2quaotjza 563 11 that that WDT work_dzeata5onzf7rp26j2quaotjza 563 12 add add VBP work_dzeata5onzf7rp26j2quaotjza 563 13 codes code NNS work_dzeata5onzf7rp26j2quaotjza 563 14 to to IN work_dzeata5onzf7rp26j2quaotjza 563 15 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 563 16 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 563 17 . . . work_dzeata5onzf7rp26j2quaotjza 564 1 This this DT work_dzeata5onzf7rp26j2quaotjza 564 2 is be VBZ work_dzeata5onzf7rp26j2quaotjza 564 3 typically typically RB work_dzeata5onzf7rp26j2quaotjza 564 4 mitigated mitigate VBN work_dzeata5onzf7rp26j2quaotjza 564 5 in in IN work_dzeata5onzf7rp26j2quaotjza 564 6 QCA QCA NNP work_dzeata5onzf7rp26j2quaotjza 564 7 by by IN work_dzeata5onzf7rp26j2quaotjza 564 8 fully fully RB work_dzeata5onzf7rp26j2quaotjza 564 9 segmenting segment VBG work_dzeata5onzf7rp26j2quaotjza 564 10 the the DT work_dzeata5onzf7rp26j2quaotjza 564 11 text text NN work_dzeata5onzf7rp26j2quaotjza 564 12 , , , work_dzeata5onzf7rp26j2quaotjza 564 13 but but CC work_dzeata5onzf7rp26j2quaotjza 564 14 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 564 15 decided decide VBD work_dzeata5onzf7rp26j2quaotjza 564 16 against against IN work_dzeata5onzf7rp26j2quaotjza 564 17 that that DT work_dzeata5onzf7rp26j2quaotjza 564 18 strategy strategy NN work_dzeata5onzf7rp26j2quaotjza 564 19 because because IN work_dzeata5onzf7rp26j2quaotjza 564 20 of of IN work_dzeata5onzf7rp26j2quaotjza 564 21 the the DT work_dzeata5onzf7rp26j2quaotjza 564 22 very very RB work_dzeata5onzf7rp26j2quaotjza 564 23 large large JJ work_dzeata5onzf7rp26j2quaotjza 564 24 data datum NNS work_dzeata5onzf7rp26j2quaotjza 564 25 set set VBN work_dzeata5onzf7rp26j2quaotjza 564 26 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 564 27 studied study VBD work_dzeata5onzf7rp26j2quaotjza 564 28 and and CC work_dzeata5onzf7rp26j2quaotjza 564 29 irrelevance irrelevance NN work_dzeata5onzf7rp26j2quaotjza 564 30 of of IN work_dzeata5onzf7rp26j2quaotjza 564 31 most most JJS work_dzeata5onzf7rp26j2quaotjza 564 32 of of IN work_dzeata5onzf7rp26j2quaotjza 564 33 the the DT work_dzeata5onzf7rp26j2quaotjza 564 34 text text NN work_dzeata5onzf7rp26j2quaotjza 564 35 to to IN work_dzeata5onzf7rp26j2quaotjza 564 36 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 564 37 goals goal NNS work_dzeata5onzf7rp26j2quaotjza 564 38 . . . work_dzeata5onzf7rp26j2quaotjza 565 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 565 2 did do VBD work_dzeata5onzf7rp26j2quaotjza 565 3 search search VB work_dzeata5onzf7rp26j2quaotjza 565 4 PDFs pdf NNS work_dzeata5onzf7rp26j2quaotjza 565 5 for for IN work_dzeata5onzf7rp26j2quaotjza 565 6 relevant relevant JJ work_dzeata5onzf7rp26j2quaotjza 565 7 keywords keyword NNS work_dzeata5onzf7rp26j2quaotjza 565 8 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 565 9 observed observe VBD work_dzeata5onzf7rp26j2quaotjza 565 10 were be VBD work_dzeata5onzf7rp26j2quaotjza 565 11 commonly commonly RB work_dzeata5onzf7rp26j2quaotjza 565 12 linked link VBN work_dzeata5onzf7rp26j2quaotjza 565 13 to to IN work_dzeata5onzf7rp26j2quaotjza 565 14 specific specific JJ work_dzeata5onzf7rp26j2quaotjza 565 15 codes code NNS work_dzeata5onzf7rp26j2quaotjza 565 16 throughout throughout IN work_dzeata5onzf7rp26j2quaotjza 565 17 the the DT work_dzeata5onzf7rp26j2quaotjza 565 18 process process NN work_dzeata5onzf7rp26j2quaotjza 565 19 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 565 20 e.g. e.g. RB work_dzeata5onzf7rp26j2quaotjza 565 21 , , , work_dzeata5onzf7rp26j2quaotjza 565 22 “ " `` work_dzeata5onzf7rp26j2quaotjza 565 23 proof proof NN work_dzeata5onzf7rp26j2quaotjza 565 24 ” " '' work_dzeata5onzf7rp26j2quaotjza 565 25 , , , work_dzeata5onzf7rp26j2quaotjza 565 26 “ " `` work_dzeata5onzf7rp26j2quaotjza 565 27 available available JJ work_dzeata5onzf7rp26j2quaotjza 565 28 ” " '' work_dzeata5onzf7rp26j2quaotjza 565 29 to to TO work_dzeata5onzf7rp26j2quaotjza 565 30 find find VB work_dzeata5onzf7rp26j2quaotjza 565 31 the the DT work_dzeata5onzf7rp26j2quaotjza 565 32 availability availability NN work_dzeata5onzf7rp26j2quaotjza 565 33 of of IN work_dzeata5onzf7rp26j2quaotjza 565 34 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 565 35 artifacts artifact NNS work_dzeata5onzf7rp26j2quaotjza 565 36 for for IN work_dzeata5onzf7rp26j2quaotjza 565 37 evaluation evaluation NN work_dzeata5onzf7rp26j2quaotjza 565 38 , , , work_dzeata5onzf7rp26j2quaotjza 565 39 “ " `` work_dzeata5onzf7rp26j2quaotjza 565 40 experiment experiment NN work_dzeata5onzf7rp26j2quaotjza 565 41 ” " '' work_dzeata5onzf7rp26j2quaotjza 565 42 to to TO work_dzeata5onzf7rp26j2quaotjza 565 43 signal signal VB work_dzeata5onzf7rp26j2quaotjza 565 44 a a DT work_dzeata5onzf7rp26j2quaotjza 565 45 case case NN work_dzeata5onzf7rp26j2quaotjza 565 46 study study NN work_dzeata5onzf7rp26j2quaotjza 565 47 or or CC work_dzeata5onzf7rp26j2quaotjza 565 48 benchmark benchmark NN work_dzeata5onzf7rp26j2quaotjza 565 49 , , , work_dzeata5onzf7rp26j2quaotjza 565 50 etc etc FW work_dzeata5onzf7rp26j2quaotjza 565 51 . . . work_dzeata5onzf7rp26j2quaotjza 565 52 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 566 1 to to TO work_dzeata5onzf7rp26j2quaotjza 566 2 decrease decrease VB work_dzeata5onzf7rp26j2quaotjza 566 3 the the DT work_dzeata5onzf7rp26j2quaotjza 566 4 odds odd NNS work_dzeata5onzf7rp26j2quaotjza 566 5 of of IN work_dzeata5onzf7rp26j2quaotjza 566 6 missing miss VBG work_dzeata5onzf7rp26j2quaotjza 566 7 a a DT work_dzeata5onzf7rp26j2quaotjza 566 8 code code NN work_dzeata5onzf7rp26j2quaotjza 566 9 . . . work_dzeata5onzf7rp26j2quaotjza 567 1 While while IN work_dzeata5onzf7rp26j2quaotjza 567 2 this this DT work_dzeata5onzf7rp26j2quaotjza 567 3 does do VBZ work_dzeata5onzf7rp26j2quaotjza 567 4 mitigate mitigate VB work_dzeata5onzf7rp26j2quaotjza 567 5 the the DT work_dzeata5onzf7rp26j2quaotjza 567 6 risk risk NN work_dzeata5onzf7rp26j2quaotjza 567 7 , , , work_dzeata5onzf7rp26j2quaotjza 567 8 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 567 9 is be VBZ work_dzeata5onzf7rp26j2quaotjza 567 10 still still RB work_dzeata5onzf7rp26j2quaotjza 567 11 likely likely JJ work_dzeata5onzf7rp26j2quaotjza 567 12 that that IN work_dzeata5onzf7rp26j2quaotjza 567 13 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 567 14 results result NNS work_dzeata5onzf7rp26j2quaotjza 567 15 under under RB work_dzeata5onzf7rp26j2quaotjza 567 16 - - HYPH work_dzeata5onzf7rp26j2quaotjza 567 17 approximate approximate VB work_dzeata5onzf7rp26j2quaotjza 567 18 the the DT work_dzeata5onzf7rp26j2quaotjza 567 19 state state NN work_dzeata5onzf7rp26j2quaotjza 567 20 of of IN work_dzeata5onzf7rp26j2quaotjza 567 21 the the DT work_dzeata5onzf7rp26j2quaotjza 567 22 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 567 23 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 567 24 . . . work_dzeata5onzf7rp26j2quaotjza 568 1 CONCLUSION CONCLUSION NNP work_dzeata5onzf7rp26j2quaotjza 568 2 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 568 3 systematically systematically RB work_dzeata5onzf7rp26j2quaotjza 568 4 analyzed analyze VBD work_dzeata5onzf7rp26j2quaotjza 568 5 the the DT work_dzeata5onzf7rp26j2quaotjza 568 6 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 568 7 landscape landscape NN work_dzeata5onzf7rp26j2quaotjza 568 8 as as IN work_dzeata5onzf7rp26j2quaotjza 568 9 it -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 568 10 is be VBZ work_dzeata5onzf7rp26j2quaotjza 568 11 represented represent VBN work_dzeata5onzf7rp26j2quaotjza 568 12 by by IN work_dzeata5onzf7rp26j2quaotjza 568 13 five five CD work_dzeata5onzf7rp26j2quaotjza 568 14 top top JJ work_dzeata5onzf7rp26j2quaotjza 568 15 - - HYPH work_dzeata5onzf7rp26j2quaotjza 568 16 tier tier NN work_dzeata5onzf7rp26j2quaotjza 568 17 security security NN work_dzeata5onzf7rp26j2quaotjza 568 18 and and CC work_dzeata5onzf7rp26j2quaotjza 568 19 systems system NNS work_dzeata5onzf7rp26j2quaotjza 568 20 conferences conference NNS work_dzeata5onzf7rp26j2quaotjza 568 21 . . . work_dzeata5onzf7rp26j2quaotjza 569 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 569 2 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 569 3 followed follow VBD work_dzeata5onzf7rp26j2quaotjza 569 4 a a DT work_dzeata5onzf7rp26j2quaotjza 569 5 multidisciplinary multidisciplinary JJ work_dzeata5onzf7rp26j2quaotjza 569 6 strategy strategy NN work_dzeata5onzf7rp26j2quaotjza 569 7 that that WDT work_dzeata5onzf7rp26j2quaotjza 569 8 allowed allow VBD work_dzeata5onzf7rp26j2quaotjza 569 9 us -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 569 10 to to TO work_dzeata5onzf7rp26j2quaotjza 569 11 draw draw VB work_dzeata5onzf7rp26j2quaotjza 569 12 conclusions conclusion NNS work_dzeata5onzf7rp26j2quaotjza 569 13 backed back VBN work_dzeata5onzf7rp26j2quaotjza 569 14 by by IN work_dzeata5onzf7rp26j2quaotjza 569 15 rigorous rigorous JJ work_dzeata5onzf7rp26j2quaotjza 569 16 interpretations interpretation NNS work_dzeata5onzf7rp26j2quaotjza 569 17 of of IN work_dzeata5onzf7rp26j2quaotjza 569 18 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 569 19 data datum NNS work_dzeata5onzf7rp26j2quaotjza 569 20 , , , work_dzeata5onzf7rp26j2quaotjza 569 21 statistics statistic NNS work_dzeata5onzf7rp26j2quaotjza 569 22 , , , work_dzeata5onzf7rp26j2quaotjza 569 23 and and CC work_dzeata5onzf7rp26j2quaotjza 569 24 graph graph NN work_dzeata5onzf7rp26j2quaotjza 569 25 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 569 26 . . . work_dzeata5onzf7rp26j2quaotjza 570 1 Based base VBN work_dzeata5onzf7rp26j2quaotjza 570 2 on on IN work_dzeata5onzf7rp26j2quaotjza 570 3 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 570 4 results result NNS work_dzeata5onzf7rp26j2quaotjza 570 5 , , , work_dzeata5onzf7rp26j2quaotjza 570 6 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 570 7 conclude conclude VBP work_dzeata5onzf7rp26j2quaotjza 570 8 that that IN work_dzeata5onzf7rp26j2quaotjza 570 9 the the DT work_dzeata5onzf7rp26j2quaotjza 570 10 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 570 11 research research NN work_dzeata5onzf7rp26j2quaotjza 570 12 community community NN work_dzeata5onzf7rp26j2quaotjza 570 13 will will MD work_dzeata5onzf7rp26j2quaotjza 570 14 benefit benefit VB work_dzeata5onzf7rp26j2quaotjza 570 15 from from IN work_dzeata5onzf7rp26j2quaotjza 570 16 the the DT work_dzeata5onzf7rp26j2quaotjza 570 17 use use NN work_dzeata5onzf7rp26j2quaotjza 570 18 of of IN work_dzeata5onzf7rp26j2quaotjza 570 19 structured structured JJ work_dzeata5onzf7rp26j2quaotjza 570 20 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 570 21 in in IN work_dzeata5onzf7rp26j2quaotjza 570 22 support support NN work_dzeata5onzf7rp26j2quaotjza 570 23 of of IN work_dzeata5onzf7rp26j2quaotjza 570 24 security security NN work_dzeata5onzf7rp26j2quaotjza 570 25 claims claim NNS work_dzeata5onzf7rp26j2quaotjza 570 26 and and CC work_dzeata5onzf7rp26j2quaotjza 570 27 the the DT work_dzeata5onzf7rp26j2quaotjza 570 28 validation validation NN work_dzeata5onzf7rp26j2quaotjza 570 29 of of IN work_dzeata5onzf7rp26j2quaotjza 570 30 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 570 31 and and CC work_dzeata5onzf7rp26j2quaotjza 570 32 policy policy NN work_dzeata5onzf7rp26j2quaotjza 570 33 usability usability NN work_dzeata5onzf7rp26j2quaotjza 570 34 . . . work_dzeata5onzf7rp26j2quaotjza 571 1 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 571 2 suggested suggest VBD work_dzeata5onzf7rp26j2quaotjza 571 3 lightweight lightweight JJ work_dzeata5onzf7rp26j2quaotjza 571 4 ways way NNS work_dzeata5onzf7rp26j2quaotjza 571 5 to to TO work_dzeata5onzf7rp26j2quaotjza 571 6 move move VB work_dzeata5onzf7rp26j2quaotjza 571 7 forward forward RB work_dzeata5onzf7rp26j2quaotjza 571 8 in in IN work_dzeata5onzf7rp26j2quaotjza 571 9 achieving achieve VBG work_dzeata5onzf7rp26j2quaotjza 571 10 these these DT work_dzeata5onzf7rp26j2quaotjza 571 11 goals goal NNS work_dzeata5onzf7rp26j2quaotjza 571 12 . . . work_dzeata5onzf7rp26j2quaotjza 572 1 Our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 572 2 data datum NNS work_dzeata5onzf7rp26j2quaotjza 572 3 also also RB work_dzeata5onzf7rp26j2quaotjza 572 4 shows show VBZ work_dzeata5onzf7rp26j2quaotjza 572 5 that that IN work_dzeata5onzf7rp26j2quaotjza 572 6 there there EX work_dzeata5onzf7rp26j2quaotjza 572 7 is be VBZ work_dzeata5onzf7rp26j2quaotjza 572 8 a a DT work_dzeata5onzf7rp26j2quaotjza 572 9 dearth dearth NN work_dzeata5onzf7rp26j2quaotjza 572 10 of of IN work_dzeata5onzf7rp26j2quaotjza 572 11 science science NN work_dzeata5onzf7rp26j2quaotjza 572 12 regarding regard VBG work_dzeata5onzf7rp26j2quaotjza 572 13 the the DT work_dzeata5onzf7rp26j2quaotjza 572 14 management management NN work_dzeata5onzf7rp26j2quaotjza 572 15 of of IN work_dzeata5onzf7rp26j2quaotjza 572 16 security security NN work_dzeata5onzf7rp26j2quaotjza 572 17 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 572 18 for for IN work_dzeata5onzf7rp26j2quaotjza 572 19 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 572 20 , , , work_dzeata5onzf7rp26j2quaotjza 572 21 although although IN work_dzeata5onzf7rp26j2quaotjza 572 22 we -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 572 23 did do VBD work_dzeata5onzf7rp26j2quaotjza 572 24 not not RB work_dzeata5onzf7rp26j2quaotjza 572 25 discuss discuss VB work_dzeata5onzf7rp26j2quaotjza 572 26 this this DT work_dzeata5onzf7rp26j2quaotjza 572 27 gap gap NN work_dzeata5onzf7rp26j2quaotjza 572 28 in in IN work_dzeata5onzf7rp26j2quaotjza 572 29 depth depth NN work_dzeata5onzf7rp26j2quaotjza 572 30 . . . work_dzeata5onzf7rp26j2quaotjza 573 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 573 2 et et FW work_dzeata5onzf7rp26j2quaotjza 573 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 573 4 . . . work_dzeata5onzf7rp26j2quaotjza 574 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 574 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 574 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 574 4 , , , work_dzeata5onzf7rp26j2quaotjza 574 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 574 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 574 7 . . . work_dzeata5onzf7rp26j2quaotjza 575 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 575 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 575 3 , , , work_dzeata5onzf7rp26j2quaotjza 575 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 575 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 575 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 575 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 575 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 575 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 575 10 28/36 28/36 CD work_dzeata5onzf7rp26j2quaotjza 575 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ CD work_dzeata5onzf7rp26j2quaotjza 575 12 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 575 13 ADDITIONAL ADDITIONAL NNP work_dzeata5onzf7rp26j2quaotjza 575 14 INFORMATION information NN work_dzeata5onzf7rp26j2quaotjza 575 15 AND and CC work_dzeata5onzf7rp26j2quaotjza 575 16 DECLARATIONS declaration NNS work_dzeata5onzf7rp26j2quaotjza 575 17 Funding Funding NNP work_dzeata5onzf7rp26j2quaotjza 575 18 This this DT work_dzeata5onzf7rp26j2quaotjza 575 19 material material NN work_dzeata5onzf7rp26j2quaotjza 575 20 is be VBZ work_dzeata5onzf7rp26j2quaotjza 575 21 based base VBN work_dzeata5onzf7rp26j2quaotjza 575 22 upon upon IN work_dzeata5onzf7rp26j2quaotjza 575 23 work work NN work_dzeata5onzf7rp26j2quaotjza 575 24 supported support VBN work_dzeata5onzf7rp26j2quaotjza 575 25 by by IN work_dzeata5onzf7rp26j2quaotjza 575 26 the the DT work_dzeata5onzf7rp26j2quaotjza 575 27 US US NNP work_dzeata5onzf7rp26j2quaotjza 575 28 Department Department NNP work_dzeata5onzf7rp26j2quaotjza 575 29 of of IN work_dzeata5onzf7rp26j2quaotjza 575 30 Defense Defense NNP work_dzeata5onzf7rp26j2quaotjza 575 31 through through IN work_dzeata5onzf7rp26j2quaotjza 575 32 the the DT work_dzeata5onzf7rp26j2quaotjza 575 33 Office Office NNP work_dzeata5onzf7rp26j2quaotjza 575 34 of of IN work_dzeata5onzf7rp26j2quaotjza 575 35 the the DT work_dzeata5onzf7rp26j2quaotjza 575 36 Assistant Assistant NNP work_dzeata5onzf7rp26j2quaotjza 575 37 Secretary Secretary NNP work_dzeata5onzf7rp26j2quaotjza 575 38 of of IN work_dzeata5onzf7rp26j2quaotjza 575 39 Defense Defense NNP work_dzeata5onzf7rp26j2quaotjza 575 40 for for IN work_dzeata5onzf7rp26j2quaotjza 575 41 Research Research NNP work_dzeata5onzf7rp26j2quaotjza 575 42 and and CC work_dzeata5onzf7rp26j2quaotjza 575 43 Engineering Engineering NNP work_dzeata5onzf7rp26j2quaotjza 575 44 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 575 45 ASD(R&E asd(r&e NN work_dzeata5onzf7rp26j2quaotjza 575 46 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 575 47 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 575 48 under under IN work_dzeata5onzf7rp26j2quaotjza 575 49 Contract contract NN work_dzeata5onzf7rp26j2quaotjza 575 50 HQ0034 hq0034 NN work_dzeata5onzf7rp26j2quaotjza 575 51 - - : work_dzeata5onzf7rp26j2quaotjza 575 52 13-D-0004 13-D-0004 NNP work_dzeata5onzf7rp26j2quaotjza 575 53 and and CC work_dzeata5onzf7rp26j2quaotjza 575 54 the the DT work_dzeata5onzf7rp26j2quaotjza 575 55 National National NNP work_dzeata5onzf7rp26j2quaotjza 575 56 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 575 57 Agency Agency NNP work_dzeata5onzf7rp26j2quaotjza 575 58 under under IN work_dzeata5onzf7rp26j2quaotjza 575 59 Lablet Lablet NNP work_dzeata5onzf7rp26j2quaotjza 575 60 Con- Con- NNP work_dzeata5onzf7rp26j2quaotjza 575 61 tract tract VBP work_dzeata5onzf7rp26j2quaotjza 575 62 H98230 h98230 NN work_dzeata5onzf7rp26j2quaotjza 575 63 - - HYPH work_dzeata5onzf7rp26j2quaotjza 575 64 14-C-0140 14-C-0140 NNP work_dzeata5onzf7rp26j2quaotjza 575 65 . . . work_dzeata5onzf7rp26j2quaotjza 576 1 Any any DT work_dzeata5onzf7rp26j2quaotjza 576 2 opinions opinion NNS work_dzeata5onzf7rp26j2quaotjza 576 3 , , , work_dzeata5onzf7rp26j2quaotjza 576 4 findings finding NNS work_dzeata5onzf7rp26j2quaotjza 576 5 , , , work_dzeata5onzf7rp26j2quaotjza 576 6 and and CC work_dzeata5onzf7rp26j2quaotjza 576 7 conclusions conclusion NNS work_dzeata5onzf7rp26j2quaotjza 576 8 or or CC work_dzeata5onzf7rp26j2quaotjza 576 9 recommendations recommendation NNS work_dzeata5onzf7rp26j2quaotjza 576 10 expressed express VBN work_dzeata5onzf7rp26j2quaotjza 576 11 in in IN work_dzeata5onzf7rp26j2quaotjza 576 12 this this DT work_dzeata5onzf7rp26j2quaotjza 576 13 material material NN work_dzeata5onzf7rp26j2quaotjza 576 14 are be VBP work_dzeata5onzf7rp26j2quaotjza 576 15 those those DT work_dzeata5onzf7rp26j2quaotjza 576 16 of of IN work_dzeata5onzf7rp26j2quaotjza 576 17 the the DT work_dzeata5onzf7rp26j2quaotjza 576 18 author(s author(s NN work_dzeata5onzf7rp26j2quaotjza 576 19 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 576 20 and and CC work_dzeata5onzf7rp26j2quaotjza 576 21 do do VBP work_dzeata5onzf7rp26j2quaotjza 576 22 not not RB work_dzeata5onzf7rp26j2quaotjza 576 23 necessarily necessarily RB work_dzeata5onzf7rp26j2quaotjza 576 24 reflect reflect VB work_dzeata5onzf7rp26j2quaotjza 576 25 the the DT work_dzeata5onzf7rp26j2quaotjza 576 26 views view NNS work_dzeata5onzf7rp26j2quaotjza 576 27 of of IN work_dzeata5onzf7rp26j2quaotjza 576 28 ASD ASD NNP work_dzeata5onzf7rp26j2quaotjza 576 29 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 576 30 R&E R&E NNP work_dzeata5onzf7rp26j2quaotjza 576 31 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 576 32 or or CC work_dzeata5onzf7rp26j2quaotjza 576 33 NSA NSA NNP work_dzeata5onzf7rp26j2quaotjza 576 34 . . . work_dzeata5onzf7rp26j2quaotjza 577 1 The the DT work_dzeata5onzf7rp26j2quaotjza 577 2 funders funder NNS work_dzeata5onzf7rp26j2quaotjza 577 3 had have VBD work_dzeata5onzf7rp26j2quaotjza 577 4 no no DT work_dzeata5onzf7rp26j2quaotjza 577 5 role role NN work_dzeata5onzf7rp26j2quaotjza 577 6 in in IN work_dzeata5onzf7rp26j2quaotjza 577 7 study study NN work_dzeata5onzf7rp26j2quaotjza 577 8 design design NN work_dzeata5onzf7rp26j2quaotjza 577 9 , , , work_dzeata5onzf7rp26j2quaotjza 577 10 data datum NNS work_dzeata5onzf7rp26j2quaotjza 577 11 collection collection NN work_dzeata5onzf7rp26j2quaotjza 577 12 and and CC work_dzeata5onzf7rp26j2quaotjza 577 13 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 577 14 , , , work_dzeata5onzf7rp26j2quaotjza 577 15 decision decision NN work_dzeata5onzf7rp26j2quaotjza 577 16 to to TO work_dzeata5onzf7rp26j2quaotjza 577 17 publish publish VB work_dzeata5onzf7rp26j2quaotjza 577 18 , , , work_dzeata5onzf7rp26j2quaotjza 577 19 or or CC work_dzeata5onzf7rp26j2quaotjza 577 20 preparation preparation NN work_dzeata5onzf7rp26j2quaotjza 577 21 of of IN work_dzeata5onzf7rp26j2quaotjza 577 22 the the DT work_dzeata5onzf7rp26j2quaotjza 577 23 manuscript manuscript NN work_dzeata5onzf7rp26j2quaotjza 577 24 . . . work_dzeata5onzf7rp26j2quaotjza 578 1 Grant Grant NNP work_dzeata5onzf7rp26j2quaotjza 578 2 Disclosures disclosure VBZ work_dzeata5onzf7rp26j2quaotjza 578 3 The the DT work_dzeata5onzf7rp26j2quaotjza 578 4 following follow VBG work_dzeata5onzf7rp26j2quaotjza 578 5 grant grant NN work_dzeata5onzf7rp26j2quaotjza 578 6 information information NN work_dzeata5onzf7rp26j2quaotjza 578 7 was be VBD work_dzeata5onzf7rp26j2quaotjza 578 8 disclosed disclose VBN work_dzeata5onzf7rp26j2quaotjza 578 9 by by IN work_dzeata5onzf7rp26j2quaotjza 578 10 the the DT work_dzeata5onzf7rp26j2quaotjza 578 11 authors author NNS work_dzeata5onzf7rp26j2quaotjza 578 12 : : : work_dzeata5onzf7rp26j2quaotjza 578 13 US US NNP work_dzeata5onzf7rp26j2quaotjza 578 14 Department Department NNP work_dzeata5onzf7rp26j2quaotjza 578 15 of of IN work_dzeata5onzf7rp26j2quaotjza 578 16 Defense Defense NNP work_dzeata5onzf7rp26j2quaotjza 578 17 : : : work_dzeata5onzf7rp26j2quaotjza 578 18 HQ0034 HQ0034 NNP work_dzeata5onzf7rp26j2quaotjza 578 19 - - : work_dzeata5onzf7rp26j2quaotjza 578 20 13-D-0004 13-d-0004 CD work_dzeata5onzf7rp26j2quaotjza 578 21 . . . work_dzeata5onzf7rp26j2quaotjza 579 1 National National NNP work_dzeata5onzf7rp26j2quaotjza 579 2 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 579 3 Agency Agency NNP work_dzeata5onzf7rp26j2quaotjza 579 4 : : : work_dzeata5onzf7rp26j2quaotjza 579 5 H98230 H98230 NNP work_dzeata5onzf7rp26j2quaotjza 579 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 579 7 14-C-0140 14-C-0140 NNP work_dzeata5onzf7rp26j2quaotjza 579 8 . . . work_dzeata5onzf7rp26j2quaotjza 580 1 Competing compete VBG work_dzeata5onzf7rp26j2quaotjza 580 2 Interests interest NNS work_dzeata5onzf7rp26j2quaotjza 580 3 The the DT work_dzeata5onzf7rp26j2quaotjza 580 4 authors author NNS work_dzeata5onzf7rp26j2quaotjza 580 5 declare declare VBP work_dzeata5onzf7rp26j2quaotjza 580 6 there there EX work_dzeata5onzf7rp26j2quaotjza 580 7 are be VBP work_dzeata5onzf7rp26j2quaotjza 580 8 no no DT work_dzeata5onzf7rp26j2quaotjza 580 9 competing compete VBG work_dzeata5onzf7rp26j2quaotjza 580 10 interests interest NNS work_dzeata5onzf7rp26j2quaotjza 580 11 . . . work_dzeata5onzf7rp26j2quaotjza 581 1 Author author NN work_dzeata5onzf7rp26j2quaotjza 581 2 Contributions contribution NNS work_dzeata5onzf7rp26j2quaotjza 581 3 • • VBP work_dzeata5onzf7rp26j2quaotjza 581 4 Michael Michael NNP work_dzeata5onzf7rp26j2quaotjza 581 5 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 581 6 conceived conceive VBD work_dzeata5onzf7rp26j2quaotjza 581 7 and and CC work_dzeata5onzf7rp26j2quaotjza 581 8 designed design VBD work_dzeata5onzf7rp26j2quaotjza 581 9 the the DT work_dzeata5onzf7rp26j2quaotjza 581 10 experiments experiment NNS work_dzeata5onzf7rp26j2quaotjza 581 11 , , , work_dzeata5onzf7rp26j2quaotjza 581 12 performed perform VBD work_dzeata5onzf7rp26j2quaotjza 581 13 the the DT work_dzeata5onzf7rp26j2quaotjza 581 14 experiments experiment NNS work_dzeata5onzf7rp26j2quaotjza 581 15 , , , work_dzeata5onzf7rp26j2quaotjza 581 16 contributed contribute VBN work_dzeata5onzf7rp26j2quaotjza 581 17 reagents reagent NNS work_dzeata5onzf7rp26j2quaotjza 581 18 / / SYM work_dzeata5onzf7rp26j2quaotjza 581 19 materials material NNS work_dzeata5onzf7rp26j2quaotjza 581 20 / / SYM work_dzeata5onzf7rp26j2quaotjza 581 21 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 581 22 tools tool NNS work_dzeata5onzf7rp26j2quaotjza 581 23 , , , work_dzeata5onzf7rp26j2quaotjza 581 24 wrote write VBD work_dzeata5onzf7rp26j2quaotjza 581 25 the the DT work_dzeata5onzf7rp26j2quaotjza 581 26 paper paper NN work_dzeata5onzf7rp26j2quaotjza 581 27 , , , work_dzeata5onzf7rp26j2quaotjza 581 28 prepared prepare VBN work_dzeata5onzf7rp26j2quaotjza 581 29 figures figure NNS work_dzeata5onzf7rp26j2quaotjza 581 30 and/or and/or CC work_dzeata5onzf7rp26j2quaotjza 581 31 tables table NNS work_dzeata5onzf7rp26j2quaotjza 581 32 , , , work_dzeata5onzf7rp26j2quaotjza 581 33 performed perform VBD work_dzeata5onzf7rp26j2quaotjza 581 34 the the DT work_dzeata5onzf7rp26j2quaotjza 581 35 computation computation NN work_dzeata5onzf7rp26j2quaotjza 581 36 work work NN work_dzeata5onzf7rp26j2quaotjza 581 37 , , , work_dzeata5onzf7rp26j2quaotjza 581 38 reviewed review VBN work_dzeata5onzf7rp26j2quaotjza 581 39 drafts draft NNS work_dzeata5onzf7rp26j2quaotjza 581 40 of of IN work_dzeata5onzf7rp26j2quaotjza 581 41 the the DT work_dzeata5onzf7rp26j2quaotjza 581 42 paper paper NN work_dzeata5onzf7rp26j2quaotjza 581 43 . . . work_dzeata5onzf7rp26j2quaotjza 582 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 582 2 Adam Adam NNP work_dzeata5onzf7rp26j2quaotjza 582 3 Sales sale NNS work_dzeata5onzf7rp26j2quaotjza 582 4 analyzed analyze VBD work_dzeata5onzf7rp26j2quaotjza 582 5 the the DT work_dzeata5onzf7rp26j2quaotjza 582 6 data datum NNS work_dzeata5onzf7rp26j2quaotjza 582 7 , , , work_dzeata5onzf7rp26j2quaotjza 582 8 contributed contribute VBD work_dzeata5onzf7rp26j2quaotjza 582 9 reagents reagent NNS work_dzeata5onzf7rp26j2quaotjza 582 10 / / SYM work_dzeata5onzf7rp26j2quaotjza 582 11 materials material NNS work_dzeata5onzf7rp26j2quaotjza 582 12 / / SYM work_dzeata5onzf7rp26j2quaotjza 582 13 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 582 14 tools tool NNS work_dzeata5onzf7rp26j2quaotjza 582 15 , , , work_dzeata5onzf7rp26j2quaotjza 582 16 performed perform VBD work_dzeata5onzf7rp26j2quaotjza 582 17 the the DT work_dzeata5onzf7rp26j2quaotjza 582 18 computation computation NN work_dzeata5onzf7rp26j2quaotjza 582 19 work work NN work_dzeata5onzf7rp26j2quaotjza 582 20 , , , work_dzeata5onzf7rp26j2quaotjza 582 21 reviewed review VBN work_dzeata5onzf7rp26j2quaotjza 582 22 drafts draft NNS work_dzeata5onzf7rp26j2quaotjza 582 23 of of IN work_dzeata5onzf7rp26j2quaotjza 582 24 the the DT work_dzeata5onzf7rp26j2quaotjza 582 25 paper paper NN work_dzeata5onzf7rp26j2quaotjza 582 26 . . . work_dzeata5onzf7rp26j2quaotjza 583 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 583 2 Benjamin Benjamin NNP work_dzeata5onzf7rp26j2quaotjza 583 3 Chung Chung NNP work_dzeata5onzf7rp26j2quaotjza 583 4 analyzed analyze VBD work_dzeata5onzf7rp26j2quaotjza 583 5 the the DT work_dzeata5onzf7rp26j2quaotjza 583 6 data datum NNS work_dzeata5onzf7rp26j2quaotjza 583 7 , , , work_dzeata5onzf7rp26j2quaotjza 583 8 performed perform VBD work_dzeata5onzf7rp26j2quaotjza 583 9 the the DT work_dzeata5onzf7rp26j2quaotjza 583 10 computation computation NN work_dzeata5onzf7rp26j2quaotjza 583 11 work work NN work_dzeata5onzf7rp26j2quaotjza 583 12 , , , work_dzeata5onzf7rp26j2quaotjza 583 13 reviewed review VBN work_dzeata5onzf7rp26j2quaotjza 583 14 drafts draft NNS work_dzeata5onzf7rp26j2quaotjza 583 15 of of IN work_dzeata5onzf7rp26j2quaotjza 583 16 the the DT work_dzeata5onzf7rp26j2quaotjza 583 17 paper paper NN work_dzeata5onzf7rp26j2quaotjza 583 18 . . . work_dzeata5onzf7rp26j2quaotjza 584 1 • • NNP work_dzeata5onzf7rp26j2quaotjza 584 2 Joshua Joshua NNP work_dzeata5onzf7rp26j2quaotjza 584 3 Sunshine Sunshine NNP work_dzeata5onzf7rp26j2quaotjza 584 4 conceived conceive VBD work_dzeata5onzf7rp26j2quaotjza 584 5 and and CC work_dzeata5onzf7rp26j2quaotjza 584 6 designed design VBD work_dzeata5onzf7rp26j2quaotjza 584 7 the the DT work_dzeata5onzf7rp26j2quaotjza 584 8 experiments experiment NNS work_dzeata5onzf7rp26j2quaotjza 584 9 , , , work_dzeata5onzf7rp26j2quaotjza 584 10 performed perform VBD work_dzeata5onzf7rp26j2quaotjza 584 11 the the DT work_dzeata5onzf7rp26j2quaotjza 584 12 experiments experiment NNS work_dzeata5onzf7rp26j2quaotjza 584 13 , , , work_dzeata5onzf7rp26j2quaotjza 584 14 wrote write VBD work_dzeata5onzf7rp26j2quaotjza 584 15 the the DT work_dzeata5onzf7rp26j2quaotjza 584 16 paper paper NN work_dzeata5onzf7rp26j2quaotjza 584 17 , , , work_dzeata5onzf7rp26j2quaotjza 584 18 reviewed review VBN work_dzeata5onzf7rp26j2quaotjza 584 19 drafts draft NNS work_dzeata5onzf7rp26j2quaotjza 584 20 of of IN work_dzeata5onzf7rp26j2quaotjza 584 21 the the DT work_dzeata5onzf7rp26j2quaotjza 584 22 paper paper NN work_dzeata5onzf7rp26j2quaotjza 584 23 . . . work_dzeata5onzf7rp26j2quaotjza 585 1 Data datum NNS work_dzeata5onzf7rp26j2quaotjza 585 2 Availability availability NN work_dzeata5onzf7rp26j2quaotjza 585 3 The the DT work_dzeata5onzf7rp26j2quaotjza 585 4 following follow VBG work_dzeata5onzf7rp26j2quaotjza 585 5 information information NN work_dzeata5onzf7rp26j2quaotjza 585 6 was be VBD work_dzeata5onzf7rp26j2quaotjza 585 7 supplied supply VBN work_dzeata5onzf7rp26j2quaotjza 585 8 regarding regard VBG work_dzeata5onzf7rp26j2quaotjza 585 9 data datum NNS work_dzeata5onzf7rp26j2quaotjza 585 10 availability availability NN work_dzeata5onzf7rp26j2quaotjza 585 11 : : : work_dzeata5onzf7rp26j2quaotjza 585 12 We -PRON- PRP work_dzeata5onzf7rp26j2quaotjza 585 13 have have VBP work_dzeata5onzf7rp26j2quaotjza 585 14 supplied supply VBN work_dzeata5onzf7rp26j2quaotjza 585 15 all all PDT work_dzeata5onzf7rp26j2quaotjza 585 16 our -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 585 17 data datum NNS work_dzeata5onzf7rp26j2quaotjza 585 18 in in IN work_dzeata5onzf7rp26j2quaotjza 585 19 the the DT work_dzeata5onzf7rp26j2quaotjza 585 20 Supplemental Supplemental NNP work_dzeata5onzf7rp26j2quaotjza 585 21 Dataset Dataset NNP work_dzeata5onzf7rp26j2quaotjza 585 22 files file NNS work_dzeata5onzf7rp26j2quaotjza 585 23 . . . work_dzeata5onzf7rp26j2quaotjza 586 1 Supplemental supplemental JJ work_dzeata5onzf7rp26j2quaotjza 586 2 Information information NN work_dzeata5onzf7rp26j2quaotjza 586 3 Supplemental supplemental JJ work_dzeata5onzf7rp26j2quaotjza 586 4 information information NN work_dzeata5onzf7rp26j2quaotjza 586 5 for for IN work_dzeata5onzf7rp26j2quaotjza 586 6 this this DT work_dzeata5onzf7rp26j2quaotjza 586 7 article article NN work_dzeata5onzf7rp26j2quaotjza 586 8 can can MD work_dzeata5onzf7rp26j2quaotjza 586 9 be be VB work_dzeata5onzf7rp26j2quaotjza 586 10 found find VBN work_dzeata5onzf7rp26j2quaotjza 586 11 online online RB work_dzeata5onzf7rp26j2quaotjza 586 12 at at IN work_dzeata5onzf7rp26j2quaotjza 586 13 http://dx.doi.org/ http://dx.doi.org/ NNP work_dzeata5onzf7rp26j2quaotjza 586 14 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 586 15 / / SYM work_dzeata5onzf7rp26j2quaotjza 586 16 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 586 17 - - HYPH work_dzeata5onzf7rp26j2quaotjza 586 18 cs.43#supplemental cs.43#supplemental NNP work_dzeata5onzf7rp26j2quaotjza 586 19 - - HYPH work_dzeata5onzf7rp26j2quaotjza 586 20 information information NN work_dzeata5onzf7rp26j2quaotjza 586 21 . . . work_dzeata5onzf7rp26j2quaotjza 587 1 REFERENCES REFERENCES NNP work_dzeata5onzf7rp26j2quaotjza 587 2 Abadi Abadi NNP work_dzeata5onzf7rp26j2quaotjza 587 3 M M NNP work_dzeata5onzf7rp26j2quaotjza 587 4 , , , work_dzeata5onzf7rp26j2quaotjza 587 5 Budiu Budiu NNP work_dzeata5onzf7rp26j2quaotjza 587 6 M M NNP work_dzeata5onzf7rp26j2quaotjza 587 7 , , , work_dzeata5onzf7rp26j2quaotjza 587 8 Erlingsson Erlingsson NNP work_dzeata5onzf7rp26j2quaotjza 587 9 Ú Ú NNP work_dzeata5onzf7rp26j2quaotjza 587 10 , , , work_dzeata5onzf7rp26j2quaotjza 587 11 Ligatti Ligatti NNP work_dzeata5onzf7rp26j2quaotjza 587 12 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 588 1 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 588 2 . . . work_dzeata5onzf7rp26j2quaotjza 589 1 Control control NN work_dzeata5onzf7rp26j2quaotjza 589 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 589 3 flow flow NN work_dzeata5onzf7rp26j2quaotjza 589 4 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 589 5 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 589 6 , , , work_dzeata5onzf7rp26j2quaotjza 589 7 implementations implementation NNS work_dzeata5onzf7rp26j2quaotjza 589 8 , , , work_dzeata5onzf7rp26j2quaotjza 589 9 and and CC work_dzeata5onzf7rp26j2quaotjza 589 10 applications application NNS work_dzeata5onzf7rp26j2quaotjza 589 11 . . . work_dzeata5onzf7rp26j2quaotjza 590 1 In in IN work_dzeata5onzf7rp26j2quaotjza 590 2 : : : work_dzeata5onzf7rp26j2quaotjza 590 3 Proceedings proceeding NNS work_dzeata5onzf7rp26j2quaotjza 590 4 of of IN work_dzeata5onzf7rp26j2quaotjza 590 5 the the DT work_dzeata5onzf7rp26j2quaotjza 590 6 12th 12th JJ work_dzeata5onzf7rp26j2quaotjza 590 7 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 590 8 conference conference NN work_dzeata5onzf7rp26j2quaotjza 590 9 on on IN work_dzeata5onzf7rp26j2quaotjza 590 10 computer computer NN work_dzeata5onzf7rp26j2quaotjza 590 11 and and CC work_dzeata5onzf7rp26j2quaotjza 590 12 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 590 13 security security NN work_dzeata5onzf7rp26j2quaotjza 590 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 590 15 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 590 16 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 590 17 05 05 CD work_dzeata5onzf7rp26j2quaotjza 590 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 590 19 . . . work_dzeata5onzf7rp26j2quaotjza 591 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 591 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 591 3 : : : work_dzeata5onzf7rp26j2quaotjza 591 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 591 5 , , , work_dzeata5onzf7rp26j2quaotjza 591 6 340–353 340–353 CD work_dzeata5onzf7rp26j2quaotjza 591 7 . . . work_dzeata5onzf7rp26j2quaotjza 592 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 592 2 et et FW work_dzeata5onzf7rp26j2quaotjza 592 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 592 4 . . . work_dzeata5onzf7rp26j2quaotjza 593 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 593 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 593 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 593 4 , , , work_dzeata5onzf7rp26j2quaotjza 593 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 593 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 593 7 . . . work_dzeata5onzf7rp26j2quaotjza 594 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 594 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 594 3 , , , work_dzeata5onzf7rp26j2quaotjza 594 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 594 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 594 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 594 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 594 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 594 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 594 10 29/36 29/36 CD work_dzeata5onzf7rp26j2quaotjza 594 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 594 12 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 13 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 14 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 15 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 16 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 17 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 18 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 19 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 20 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 21 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 22 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 23 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 24 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 25 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 26 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 27 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 28 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 29 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 30 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 31 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 32 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 33 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 34 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 35 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 36 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 37 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 38 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 39 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 40 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 41 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 42 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 43 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 44 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 45 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 46 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 47 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 48 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 49 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 50 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 51 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 52 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 53 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 54 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 55 http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information http://dx.doi.org/10.7717/peerj-cs.43#supplemental-information NN work_dzeata5onzf7rp26j2quaotjza 594 56 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 594 57 Akritidis Akritidis NNP work_dzeata5onzf7rp26j2quaotjza 594 58 P. P. NNP work_dzeata5onzf7rp26j2quaotjza 594 59 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 594 60 . . . work_dzeata5onzf7rp26j2quaotjza 595 1 Cling cle VBG work_dzeata5onzf7rp26j2quaotjza 595 2 : : : work_dzeata5onzf7rp26j2quaotjza 595 3 a a DT work_dzeata5onzf7rp26j2quaotjza 595 4 memory memory NN work_dzeata5onzf7rp26j2quaotjza 595 5 allocator allocator NN work_dzeata5onzf7rp26j2quaotjza 595 6 to to TO work_dzeata5onzf7rp26j2quaotjza 595 7 mitigate mitigate VB work_dzeata5onzf7rp26j2quaotjza 595 8 dangling dangling JJ work_dzeata5onzf7rp26j2quaotjza 595 9 pointers pointer NNS work_dzeata5onzf7rp26j2quaotjza 595 10 . . . work_dzeata5onzf7rp26j2quaotjza 596 1 In in IN work_dzeata5onzf7rp26j2quaotjza 596 2 : : : work_dzeata5onzf7rp26j2quaotjza 596 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 596 4 security security NN work_dzeata5onzf7rp26j2quaotjza 596 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 596 6 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 596 7 security’10 security’10 NNP work_dzeata5onzf7rp26j2quaotjza 596 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 596 9 . . . work_dzeata5onzf7rp26j2quaotjza 597 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 597 2 : : : work_dzeata5onzf7rp26j2quaotjza 597 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 597 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 597 5 , , , work_dzeata5onzf7rp26j2quaotjza 597 6 12–12 12–12 CD work_dzeata5onzf7rp26j2quaotjza 597 7 . . . work_dzeata5onzf7rp26j2quaotjza 598 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 598 2 at at IN work_dzeata5onzf7rp26j2quaotjza 598 3 http://dl.acm.org/ http://dl.acm.org/ NNP work_dzeata5onzf7rp26j2quaotjza 598 4 citation.cfm?id=1929820.1929836 citation.cfm?id=1929820.1929836 NNP work_dzeata5onzf7rp26j2quaotjza 598 5 . . . work_dzeata5onzf7rp26j2quaotjza 599 1 Akritidis Akritidis NNP work_dzeata5onzf7rp26j2quaotjza 599 2 P P NNP work_dzeata5onzf7rp26j2quaotjza 599 3 , , , work_dzeata5onzf7rp26j2quaotjza 599 4 Cadar Cadar NNP work_dzeata5onzf7rp26j2quaotjza 599 5 C C NNP work_dzeata5onzf7rp26j2quaotjza 599 6 , , , work_dzeata5onzf7rp26j2quaotjza 599 7 Raiciu Raiciu NNP work_dzeata5onzf7rp26j2quaotjza 599 8 C C NNP work_dzeata5onzf7rp26j2quaotjza 599 9 , , , work_dzeata5onzf7rp26j2quaotjza 599 10 Costa Costa NNP work_dzeata5onzf7rp26j2quaotjza 599 11 M M NNP work_dzeata5onzf7rp26j2quaotjza 599 12 , , , work_dzeata5onzf7rp26j2quaotjza 599 13 Castro Castro NNP work_dzeata5onzf7rp26j2quaotjza 599 14 M. M. NNP work_dzeata5onzf7rp26j2quaotjza 599 15 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 599 16 . . . work_dzeata5onzf7rp26j2quaotjza 600 1 Preventing prevent VBG work_dzeata5onzf7rp26j2quaotjza 600 2 memory memory NN work_dzeata5onzf7rp26j2quaotjza 600 3 error error NN work_dzeata5onzf7rp26j2quaotjza 600 4 exploits exploit VBZ work_dzeata5onzf7rp26j2quaotjza 600 5 with with IN work_dzeata5onzf7rp26j2quaotjza 600 6 WIT WIT NNP work_dzeata5onzf7rp26j2quaotjza 600 7 . . . work_dzeata5onzf7rp26j2quaotjza 601 1 In in IN work_dzeata5onzf7rp26j2quaotjza 601 2 : : : work_dzeata5onzf7rp26j2quaotjza 601 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 601 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 601 5 on on IN work_dzeata5onzf7rp26j2quaotjza 601 6 security security NN work_dzeata5onzf7rp26j2quaotjza 601 7 and and CC work_dzeata5onzf7rp26j2quaotjza 601 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 601 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 601 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 601 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 601 12 08 08 CD work_dzeata5onzf7rp26j2quaotjza 601 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 601 14 . . . work_dzeata5onzf7rp26j2quaotjza 602 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 602 2 , , , work_dzeata5onzf7rp26j2quaotjza 602 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 602 4 : : : work_dzeata5onzf7rp26j2quaotjza 602 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 602 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 602 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 602 8 , , , work_dzeata5onzf7rp26j2quaotjza 602 9 263–277 263–277 CD work_dzeata5onzf7rp26j2quaotjza 602 10 . . . work_dzeata5onzf7rp26j2quaotjza 603 1 Akritidis Akritidis NNP work_dzeata5onzf7rp26j2quaotjza 603 2 P P NNP work_dzeata5onzf7rp26j2quaotjza 603 3 , , , work_dzeata5onzf7rp26j2quaotjza 603 4 Costa Costa NNP work_dzeata5onzf7rp26j2quaotjza 603 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 603 6 , , , work_dzeata5onzf7rp26j2quaotjza 603 7 Castro Castro NNP work_dzeata5onzf7rp26j2quaotjza 603 8 M M NNP work_dzeata5onzf7rp26j2quaotjza 603 9 , , , work_dzeata5onzf7rp26j2quaotjza 603 10 Hand Hand NNP work_dzeata5onzf7rp26j2quaotjza 603 11 S. S. NNP work_dzeata5onzf7rp26j2quaotjza 603 12 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 603 13 . . . work_dzeata5onzf7rp26j2quaotjza 604 1 Baggy Baggy NNP work_dzeata5onzf7rp26j2quaotjza 604 2 bounds bound VBZ work_dzeata5onzf7rp26j2quaotjza 604 3 checking check VBG work_dzeata5onzf7rp26j2quaotjza 604 4 : : : work_dzeata5onzf7rp26j2quaotjza 604 5 an an DT work_dzeata5onzf7rp26j2quaotjza 604 6 efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 604 7 and and CC work_dzeata5onzf7rp26j2quaotjza 604 8 backwards backwards JJ work_dzeata5onzf7rp26j2quaotjza 604 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 604 10 compatible compatible JJ work_dzeata5onzf7rp26j2quaotjza 604 11 defense defense NN work_dzeata5onzf7rp26j2quaotjza 604 12 against against IN work_dzeata5onzf7rp26j2quaotjza 604 13 out out RB work_dzeata5onzf7rp26j2quaotjza 604 14 - - HYPH work_dzeata5onzf7rp26j2quaotjza 604 15 of of IN work_dzeata5onzf7rp26j2quaotjza 604 16 - - HYPH work_dzeata5onzf7rp26j2quaotjza 604 17 bounds bound NNS work_dzeata5onzf7rp26j2quaotjza 604 18 errors error NNS work_dzeata5onzf7rp26j2quaotjza 604 19 . . . work_dzeata5onzf7rp26j2quaotjza 605 1 In in IN work_dzeata5onzf7rp26j2quaotjza 605 2 : : : work_dzeata5onzf7rp26j2quaotjza 605 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 605 4 security security NN work_dzeata5onzf7rp26j2quaotjza 605 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 605 6 SSYM’09 ssym’09 NN work_dzeata5onzf7rp26j2quaotjza 605 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 605 8 . . . work_dzeata5onzf7rp26j2quaotjza 606 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 606 2 : : : work_dzeata5onzf7rp26j2quaotjza 606 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 606 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 606 5 , , , work_dzeata5onzf7rp26j2quaotjza 606 6 51–66 51–66 NNP work_dzeata5onzf7rp26j2quaotjza 606 7 . . . work_dzeata5onzf7rp26j2quaotjza 607 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 607 2 at at IN work_dzeata5onzf7rp26j2quaotjza 607 3 http://dl.acm.org/citation.cfm?id=1855768 http://dl.acm.org/citation.cfm?id=1855768 PRP work_dzeata5onzf7rp26j2quaotjza 607 4 . . . work_dzeata5onzf7rp26j2quaotjza 608 1 1855772 1855772 CD work_dzeata5onzf7rp26j2quaotjza 608 2 . . . work_dzeata5onzf7rp26j2quaotjza 609 1 Al Al NNP work_dzeata5onzf7rp26j2quaotjza 609 2 Ameiri Ameiri NNP work_dzeata5onzf7rp26j2quaotjza 609 3 F F NNP work_dzeata5onzf7rp26j2quaotjza 609 4 , , , work_dzeata5onzf7rp26j2quaotjza 609 5 Salah Salah NNP work_dzeata5onzf7rp26j2quaotjza 609 6 K. K. NNP work_dzeata5onzf7rp26j2quaotjza 609 7 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 609 8 . . . work_dzeata5onzf7rp26j2quaotjza 610 1 Evaluation evaluation NN work_dzeata5onzf7rp26j2quaotjza 610 2 of of IN work_dzeata5onzf7rp26j2quaotjza 610 3 popular popular JJ work_dzeata5onzf7rp26j2quaotjza 610 4 application application NN work_dzeata5onzf7rp26j2quaotjza 610 5 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 610 6 . . . work_dzeata5onzf7rp26j2quaotjza 611 1 In in IN work_dzeata5onzf7rp26j2quaotjza 611 2 : : : work_dzeata5onzf7rp26j2quaotjza 611 3 International international JJ work_dzeata5onzf7rp26j2quaotjza 611 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 611 5 for for IN work_dzeata5onzf7rp26j2quaotjza 611 6 internet internet NN work_dzeata5onzf7rp26j2quaotjza 611 7 technology technology NN work_dzeata5onzf7rp26j2quaotjza 611 8 and and CC work_dzeata5onzf7rp26j2quaotjza 611 9 secured secured JJ work_dzeata5onzf7rp26j2quaotjza 611 10 transactions transaction NNS work_dzeata5onzf7rp26j2quaotjza 611 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 611 12 ICITST ICITST NNP work_dzeata5onzf7rp26j2quaotjza 611 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 611 14 , , , work_dzeata5onzf7rp26j2quaotjza 611 15 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 611 16 . . . work_dzeata5onzf7rp26j2quaotjza 612 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 612 2 , , , work_dzeata5onzf7rp26j2quaotjza 612 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 612 4 : : : work_dzeata5onzf7rp26j2quaotjza 612 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 612 6 , , , work_dzeata5onzf7rp26j2quaotjza 612 7 358–362 358–362 CD work_dzeata5onzf7rp26j2quaotjza 612 8 . . . work_dzeata5onzf7rp26j2quaotjza 613 1 Andrus Andrus NNP work_dzeata5onzf7rp26j2quaotjza 613 2 J J NNP work_dzeata5onzf7rp26j2quaotjza 613 3 , , , work_dzeata5onzf7rp26j2quaotjza 613 4 Dall Dall NNP work_dzeata5onzf7rp26j2quaotjza 613 5 C C NNP work_dzeata5onzf7rp26j2quaotjza 613 6 , , , work_dzeata5onzf7rp26j2quaotjza 613 7 Van’t Van’t NNP work_dzeata5onzf7rp26j2quaotjza 613 8 Hof Hof NNP work_dzeata5onzf7rp26j2quaotjza 613 9 A A NNP work_dzeata5onzf7rp26j2quaotjza 613 10 , , , work_dzeata5onzf7rp26j2quaotjza 613 11 Laadan Laadan NNP work_dzeata5onzf7rp26j2quaotjza 613 12 O O NNP work_dzeata5onzf7rp26j2quaotjza 613 13 , , , work_dzeata5onzf7rp26j2quaotjza 613 14 Nieh Nieh NNP work_dzeata5onzf7rp26j2quaotjza 613 15 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 614 1 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 614 2 . . . work_dzeata5onzf7rp26j2quaotjza 615 1 Cells cell NNS work_dzeata5onzf7rp26j2quaotjza 615 2 : : : work_dzeata5onzf7rp26j2quaotjza 615 3 a a DT work_dzeata5onzf7rp26j2quaotjza 615 4 virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 615 5 mobile mobile JJ work_dzeata5onzf7rp26j2quaotjza 615 6 smartphone smartphone NN work_dzeata5onzf7rp26j2quaotjza 615 7 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 615 8 . . . work_dzeata5onzf7rp26j2quaotjza 616 1 In in IN work_dzeata5onzf7rp26j2quaotjza 616 2 : : : work_dzeata5onzf7rp26j2quaotjza 616 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 616 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 616 5 on on IN work_dzeata5onzf7rp26j2quaotjza 616 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 616 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 616 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 616 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 616 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 616 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 616 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 616 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 616 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 616 15 11 11 CD work_dzeata5onzf7rp26j2quaotjza 616 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 616 17 . . . work_dzeata5onzf7rp26j2quaotjza 617 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 617 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 617 3 : : : work_dzeata5onzf7rp26j2quaotjza 617 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 617 5 , , , work_dzeata5onzf7rp26j2quaotjza 617 6 173–187 173–187 CD work_dzeata5onzf7rp26j2quaotjza 617 7 . . . work_dzeata5onzf7rp26j2quaotjza 618 1 Bandhakavi Bandhakavi NNP work_dzeata5onzf7rp26j2quaotjza 618 2 S S NNP work_dzeata5onzf7rp26j2quaotjza 618 3 , , , work_dzeata5onzf7rp26j2quaotjza 618 4 Bisht Bisht NNP work_dzeata5onzf7rp26j2quaotjza 618 5 P P NNP work_dzeata5onzf7rp26j2quaotjza 618 6 , , , work_dzeata5onzf7rp26j2quaotjza 618 7 Madhusudan Madhusudan NNP work_dzeata5onzf7rp26j2quaotjza 618 8 P P NNP work_dzeata5onzf7rp26j2quaotjza 618 9 , , , work_dzeata5onzf7rp26j2quaotjza 618 10 Venkatakrishnan Venkatakrishnan NNP work_dzeata5onzf7rp26j2quaotjza 618 11 VN VN NNP work_dzeata5onzf7rp26j2quaotjza 618 12 . . . work_dzeata5onzf7rp26j2quaotjza 619 1 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 619 2 . . . work_dzeata5onzf7rp26j2quaotjza 620 1 CANDID CANDID NNP work_dzeata5onzf7rp26j2quaotjza 620 2 : : : work_dzeata5onzf7rp26j2quaotjza 620 3 preventing prevent VBG work_dzeata5onzf7rp26j2quaotjza 620 4 sql sql NNP work_dzeata5onzf7rp26j2quaotjza 620 5 injection injection NN work_dzeata5onzf7rp26j2quaotjza 620 6 attacks attack NNS work_dzeata5onzf7rp26j2quaotjza 620 7 using use VBG work_dzeata5onzf7rp26j2quaotjza 620 8 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 620 9 candidate candidate NN work_dzeata5onzf7rp26j2quaotjza 620 10 evaluations evaluation NNS work_dzeata5onzf7rp26j2quaotjza 620 11 . . . work_dzeata5onzf7rp26j2quaotjza 621 1 In in IN work_dzeata5onzf7rp26j2quaotjza 621 2 : : : work_dzeata5onzf7rp26j2quaotjza 621 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 621 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 621 5 on on IN work_dzeata5onzf7rp26j2quaotjza 621 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 621 7 and and CC work_dzeata5onzf7rp26j2quaotjza 621 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 621 9 security security NN work_dzeata5onzf7rp26j2quaotjza 621 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 621 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 621 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 621 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 621 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 621 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 621 16 07 07 CD work_dzeata5onzf7rp26j2quaotjza 621 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 621 18 . . . work_dzeata5onzf7rp26j2quaotjza 622 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 622 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 622 3 : : : work_dzeata5onzf7rp26j2quaotjza 622 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 622 5 , , , work_dzeata5onzf7rp26j2quaotjza 622 6 12–24 12–24 CD work_dzeata5onzf7rp26j2quaotjza 622 7 . . . work_dzeata5onzf7rp26j2quaotjza 623 1 Barnes barne NNS work_dzeata5onzf7rp26j2quaotjza 623 2 JM JM NNP work_dzeata5onzf7rp26j2quaotjza 623 3 . . . work_dzeata5onzf7rp26j2quaotjza 624 1 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 624 2 . . . work_dzeata5onzf7rp26j2quaotjza 625 1 Software software NN work_dzeata5onzf7rp26j2quaotjza 625 2 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 625 3 evolution evolution NN work_dzeata5onzf7rp26j2quaotjza 625 4 . . . work_dzeata5onzf7rp26j2quaotjza 626 1 PhD phd NN work_dzeata5onzf7rp26j2quaotjza 626 2 dissertation dissertation NN work_dzeata5onzf7rp26j2quaotjza 626 3 , , , work_dzeata5onzf7rp26j2quaotjza 626 4 Carnegie Carnegie NNP work_dzeata5onzf7rp26j2quaotjza 626 5 Mellon Mellon NNP work_dzeata5onzf7rp26j2quaotjza 626 6 University University NNP work_dzeata5onzf7rp26j2quaotjza 626 7 . . . work_dzeata5onzf7rp26j2quaotjza 627 1 Berelson Berelson NNP work_dzeata5onzf7rp26j2quaotjza 627 2 B. B. NNP work_dzeata5onzf7rp26j2quaotjza 628 1 1952 1952 CD work_dzeata5onzf7rp26j2quaotjza 628 2 . . . work_dzeata5onzf7rp26j2quaotjza 629 1 Content content JJ work_dzeata5onzf7rp26j2quaotjza 629 2 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 629 3 in in IN work_dzeata5onzf7rp26j2quaotjza 629 4 communication communication NN work_dzeata5onzf7rp26j2quaotjza 629 5 research research NN work_dzeata5onzf7rp26j2quaotjza 629 6 . . . work_dzeata5onzf7rp26j2quaotjza 630 1 Glencoe glencoe NN work_dzeata5onzf7rp26j2quaotjza 630 2 : : : work_dzeata5onzf7rp26j2quaotjza 630 3 Free Free NNP work_dzeata5onzf7rp26j2quaotjza 630 4 Press Press NNP work_dzeata5onzf7rp26j2quaotjza 630 5 . . . work_dzeata5onzf7rp26j2quaotjza 631 1 Bergmark Bergmark NNP work_dzeata5onzf7rp26j2quaotjza 631 2 D D NNP work_dzeata5onzf7rp26j2quaotjza 631 3 , , , work_dzeata5onzf7rp26j2quaotjza 631 4 Phempoonpanich Phempoonpanich NNP work_dzeata5onzf7rp26j2quaotjza 631 5 P P NNP work_dzeata5onzf7rp26j2quaotjza 631 6 , , , work_dzeata5onzf7rp26j2quaotjza 631 7 Zhao Zhao NNP work_dzeata5onzf7rp26j2quaotjza 631 8 S. S. NNP work_dzeata5onzf7rp26j2quaotjza 631 9 2001 2001 CD work_dzeata5onzf7rp26j2quaotjza 631 10 . . . work_dzeata5onzf7rp26j2quaotjza 632 1 Scraping scrape VBG work_dzeata5onzf7rp26j2quaotjza 632 2 the the DT work_dzeata5onzf7rp26j2quaotjza 632 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 632 4 digital digital JJ work_dzeata5onzf7rp26j2quaotjza 632 5 library library NN work_dzeata5onzf7rp26j2quaotjza 632 6 . . . work_dzeata5onzf7rp26j2quaotjza 633 1 In in IN work_dzeata5onzf7rp26j2quaotjza 633 2 : : : work_dzeata5onzf7rp26j2quaotjza 633 3 SIGIR SIGIR NNP work_dzeata5onzf7rp26j2quaotjza 633 4 forum forum NN work_dzeata5onzf7rp26j2quaotjza 633 5 . . . work_dzeata5onzf7rp26j2quaotjza 634 1 35 35 CD work_dzeata5onzf7rp26j2quaotjza 634 2 . . . work_dzeata5onzf7rp26j2quaotjza 635 1 1–7 1–7 LS work_dzeata5onzf7rp26j2quaotjza 635 2 . . . work_dzeata5onzf7rp26j2quaotjza 636 1 Berlind Berlind NNP work_dzeata5onzf7rp26j2quaotjza 636 2 D. D. NNP work_dzeata5onzf7rp26j2quaotjza 636 3 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 636 4 . . . work_dzeata5onzf7rp26j2quaotjza 637 1 VMware VMware NNP work_dzeata5onzf7rp26j2quaotjza 637 2 shows show VBZ work_dzeata5onzf7rp26j2quaotjza 637 3 Android Android NNP work_dzeata5onzf7rp26j2quaotjza 637 4 based base VBD work_dzeata5onzf7rp26j2quaotjza 637 5 virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 637 6 machines machine NNS work_dzeata5onzf7rp26j2quaotjza 637 7 . . . work_dzeata5onzf7rp26j2quaotjza 638 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 638 2 at at IN work_dzeata5onzf7rp26j2quaotjza 638 3 http://www http://www ADD work_dzeata5onzf7rp26j2quaotjza 638 4 . . . work_dzeata5onzf7rp26j2quaotjza 639 1 informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual- informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual- NNP work_dzeata5onzf7rp26j2quaotjza 639 2 machines machine NNS work_dzeata5onzf7rp26j2quaotjza 639 3 / / SYM work_dzeata5onzf7rp26j2quaotjza 639 4 d d NNP work_dzeata5onzf7rp26j2quaotjza 639 5 / / SYM work_dzeata5onzf7rp26j2quaotjza 639 6 d d NNP work_dzeata5onzf7rp26j2quaotjza 639 7 - - HYPH work_dzeata5onzf7rp26j2quaotjza 639 8 id/1102135 id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 639 9 ? ? . work_dzeata5onzf7rp26j2quaotjza 640 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 640 2 accessed access VBN work_dzeata5onzf7rp26j2quaotjza 640 3 30 30 CD work_dzeata5onzf7rp26j2quaotjza 640 4 April April NNP work_dzeata5onzf7rp26j2quaotjza 640 5 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 640 6 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 640 7 . . . work_dzeata5onzf7rp26j2quaotjza 641 1 Bhatkar Bhatkar NNP work_dzeata5onzf7rp26j2quaotjza 641 2 S S NNP work_dzeata5onzf7rp26j2quaotjza 641 3 , , , work_dzeata5onzf7rp26j2quaotjza 641 4 Sekar Sekar NNP work_dzeata5onzf7rp26j2quaotjza 641 5 R R NNP work_dzeata5onzf7rp26j2quaotjza 641 6 , , , work_dzeata5onzf7rp26j2quaotjza 641 7 DuVarney DuVarney NNP work_dzeata5onzf7rp26j2quaotjza 641 8 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 641 9 . . . work_dzeata5onzf7rp26j2quaotjza 642 1 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 642 2 . . . work_dzeata5onzf7rp26j2quaotjza 643 1 Efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 643 2 techniques technique NNS work_dzeata5onzf7rp26j2quaotjza 643 3 for for IN work_dzeata5onzf7rp26j2quaotjza 643 4 comprehensive comprehensive JJ work_dzeata5onzf7rp26j2quaotjza 643 5 protection protection NN work_dzeata5onzf7rp26j2quaotjza 643 6 from from IN work_dzeata5onzf7rp26j2quaotjza 643 7 memory memory NN work_dzeata5onzf7rp26j2quaotjza 643 8 error error NN work_dzeata5onzf7rp26j2quaotjza 643 9 exploits exploit NNS work_dzeata5onzf7rp26j2quaotjza 643 10 . . . work_dzeata5onzf7rp26j2quaotjza 644 1 In in IN work_dzeata5onzf7rp26j2quaotjza 644 2 : : : work_dzeata5onzf7rp26j2quaotjza 644 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 644 4 security security NN work_dzeata5onzf7rp26j2quaotjza 644 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 644 6 SSYM’05 SSYM’05 NNP work_dzeata5onzf7rp26j2quaotjza 644 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 644 8 . . . work_dzeata5onzf7rp26j2quaotjza 645 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 645 2 : : : work_dzeata5onzf7rp26j2quaotjza 645 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 645 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 645 5 , , , work_dzeata5onzf7rp26j2quaotjza 645 6 17–17 17–17 CD work_dzeata5onzf7rp26j2quaotjza 645 7 . . . work_dzeata5onzf7rp26j2quaotjza 646 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 646 2 at at IN work_dzeata5onzf7rp26j2quaotjza 646 3 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 NN work_dzeata5onzf7rp26j2quaotjza 646 4 . . . work_dzeata5onzf7rp26j2quaotjza 647 1 Budgen Budgen NNP work_dzeata5onzf7rp26j2quaotjza 647 2 D D NNP work_dzeata5onzf7rp26j2quaotjza 647 3 , , , work_dzeata5onzf7rp26j2quaotjza 647 4 Brereton Brereton NNP work_dzeata5onzf7rp26j2quaotjza 647 5 P. P. NNP work_dzeata5onzf7rp26j2quaotjza 647 6 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 647 7 . . . work_dzeata5onzf7rp26j2quaotjza 648 1 Performing perform VBG work_dzeata5onzf7rp26j2quaotjza 648 2 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 648 3 literature literature NN work_dzeata5onzf7rp26j2quaotjza 648 4 reviews review NNS work_dzeata5onzf7rp26j2quaotjza 648 5 in in IN work_dzeata5onzf7rp26j2quaotjza 648 6 software software NN work_dzeata5onzf7rp26j2quaotjza 648 7 engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 648 8 . . . work_dzeata5onzf7rp26j2quaotjza 649 1 In in IN work_dzeata5onzf7rp26j2quaotjza 649 2 : : : work_dzeata5onzf7rp26j2quaotjza 649 3 International international JJ work_dzeata5onzf7rp26j2quaotjza 649 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 649 5 on on IN work_dzeata5onzf7rp26j2quaotjza 649 6 software software NN work_dzeata5onzf7rp26j2quaotjza 649 7 engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 649 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 649 9 ICSE ICSE NNP work_dzeata5onzf7rp26j2quaotjza 649 10 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 649 11 06 06 CD work_dzeata5onzf7rp26j2quaotjza 649 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 649 13 . . . work_dzeata5onzf7rp26j2quaotjza 650 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 650 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 650 3 : : : work_dzeata5onzf7rp26j2quaotjza 650 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 650 5 , , , work_dzeata5onzf7rp26j2quaotjza 650 6 1051–1052 1051–1052 CD work_dzeata5onzf7rp26j2quaotjza 650 7 . . . work_dzeata5onzf7rp26j2quaotjza 651 1 Cappos Cappos NNP work_dzeata5onzf7rp26j2quaotjza 651 2 J J NNP work_dzeata5onzf7rp26j2quaotjza 651 3 , , , work_dzeata5onzf7rp26j2quaotjza 651 4 Dadgar Dadgar NNP work_dzeata5onzf7rp26j2quaotjza 651 5 A A NNP work_dzeata5onzf7rp26j2quaotjza 651 6 , , , work_dzeata5onzf7rp26j2quaotjza 651 7 Rasley Rasley NNP work_dzeata5onzf7rp26j2quaotjza 651 8 J J NNP work_dzeata5onzf7rp26j2quaotjza 651 9 , , , work_dzeata5onzf7rp26j2quaotjza 651 10 Samuel Samuel NNP work_dzeata5onzf7rp26j2quaotjza 651 11 J J NNP work_dzeata5onzf7rp26j2quaotjza 651 12 , , , work_dzeata5onzf7rp26j2quaotjza 651 13 Beschastnikh Beschastnikh NNP work_dzeata5onzf7rp26j2quaotjza 651 14 I I NNP work_dzeata5onzf7rp26j2quaotjza 651 15 , , , work_dzeata5onzf7rp26j2quaotjza 651 16 Barsan Barsan NNP work_dzeata5onzf7rp26j2quaotjza 651 17 C C NNP work_dzeata5onzf7rp26j2quaotjza 651 18 , , , work_dzeata5onzf7rp26j2quaotjza 651 19 Krishnamurthy Krishnamurthy NNP work_dzeata5onzf7rp26j2quaotjza 651 20 A A NNP work_dzeata5onzf7rp26j2quaotjza 651 21 , , , work_dzeata5onzf7rp26j2quaotjza 651 22 Anderson Anderson NNP work_dzeata5onzf7rp26j2quaotjza 651 23 T. T. NNP work_dzeata5onzf7rp26j2quaotjza 651 24 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 651 25 . . . work_dzeata5onzf7rp26j2quaotjza 652 1 Retaining retain VBG work_dzeata5onzf7rp26j2quaotjza 652 2 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 652 3 containment containment NN work_dzeata5onzf7rp26j2quaotjza 652 4 despite despite IN work_dzeata5onzf7rp26j2quaotjza 652 5 bugs bug NNS work_dzeata5onzf7rp26j2quaotjza 652 6 in in IN work_dzeata5onzf7rp26j2quaotjza 652 7 privileged privileged JJ work_dzeata5onzf7rp26j2quaotjza 652 8 memory memory NN work_dzeata5onzf7rp26j2quaotjza 652 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 652 10 safe safe JJ work_dzeata5onzf7rp26j2quaotjza 652 11 code code NN work_dzeata5onzf7rp26j2quaotjza 652 12 . . . work_dzeata5onzf7rp26j2quaotjza 653 1 In in IN work_dzeata5onzf7rp26j2quaotjza 653 2 : : : work_dzeata5onzf7rp26j2quaotjza 653 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 653 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 653 5 on on IN work_dzeata5onzf7rp26j2quaotjza 653 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 653 7 and and CC work_dzeata5onzf7rp26j2quaotjza 653 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 653 9 security security NN work_dzeata5onzf7rp26j2quaotjza 653 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 653 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 653 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 653 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 653 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 653 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 653 16 10 10 CD work_dzeata5onzf7rp26j2quaotjza 653 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 653 18 . . . work_dzeata5onzf7rp26j2quaotjza 654 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 654 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 654 3 : : : work_dzeata5onzf7rp26j2quaotjza 654 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 654 5 , , , work_dzeata5onzf7rp26j2quaotjza 654 6 212–223 212–223 CD work_dzeata5onzf7rp26j2quaotjza 654 7 . . . work_dzeata5onzf7rp26j2quaotjza 655 1 Castro Castro NNP work_dzeata5onzf7rp26j2quaotjza 655 2 M M NNP work_dzeata5onzf7rp26j2quaotjza 655 3 , , , work_dzeata5onzf7rp26j2quaotjza 655 4 Costa Costa NNP work_dzeata5onzf7rp26j2quaotjza 655 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 655 6 , , , work_dzeata5onzf7rp26j2quaotjza 655 7 Harris Harris NNP work_dzeata5onzf7rp26j2quaotjza 655 8 T. T. NNP work_dzeata5onzf7rp26j2quaotjza 655 9 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 655 10 . . . work_dzeata5onzf7rp26j2quaotjza 656 1 Securing secure VBG work_dzeata5onzf7rp26j2quaotjza 656 2 software software NN work_dzeata5onzf7rp26j2quaotjza 656 3 by by IN work_dzeata5onzf7rp26j2quaotjza 656 4 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 656 5 data data NN work_dzeata5onzf7rp26j2quaotjza 656 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 656 7 flow flow NN work_dzeata5onzf7rp26j2quaotjza 656 8 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 656 9 . . . work_dzeata5onzf7rp26j2quaotjza 657 1 In in IN work_dzeata5onzf7rp26j2quaotjza 657 2 : : : work_dzeata5onzf7rp26j2quaotjza 657 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 657 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 657 5 on on IN work_dzeata5onzf7rp26j2quaotjza 657 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 657 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 657 8 design design NN work_dzeata5onzf7rp26j2quaotjza 657 9 and and CC work_dzeata5onzf7rp26j2quaotjza 657 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 657 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 657 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 657 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 657 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 657 15 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 657 16 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 657 17 06 06 CD work_dzeata5onzf7rp26j2quaotjza 657 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 657 19 . . . work_dzeata5onzf7rp26j2quaotjza 658 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 658 2 : : : work_dzeata5onzf7rp26j2quaotjza 658 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 658 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 658 5 , , , work_dzeata5onzf7rp26j2quaotjza 658 6 147–160 147–160 CD work_dzeata5onzf7rp26j2quaotjza 658 7 . . . work_dzeata5onzf7rp26j2quaotjza 659 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 659 2 at at IN work_dzeata5onzf7rp26j2quaotjza 659 3 http://dl.acm.org/citation.cfm?id=1298455 http://dl.acm.org/citation.cfm?id=1298455 NN work_dzeata5onzf7rp26j2quaotjza 659 4 . . . work_dzeata5onzf7rp26j2quaotjza 660 1 1298470 1298470 CD work_dzeata5onzf7rp26j2quaotjza 660 2 . . . work_dzeata5onzf7rp26j2quaotjza 661 1 Castro Castro NNP work_dzeata5onzf7rp26j2quaotjza 661 2 M M NNP work_dzeata5onzf7rp26j2quaotjza 661 3 , , , work_dzeata5onzf7rp26j2quaotjza 661 4 Costa Costa NNP work_dzeata5onzf7rp26j2quaotjza 661 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 661 6 , , , work_dzeata5onzf7rp26j2quaotjza 661 7 Martin Martin NNP work_dzeata5onzf7rp26j2quaotjza 661 8 J J NNP work_dzeata5onzf7rp26j2quaotjza 661 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 661 10 P P NNP work_dzeata5onzf7rp26j2quaotjza 661 11 , , , work_dzeata5onzf7rp26j2quaotjza 661 12 Peinado Peinado NNP work_dzeata5onzf7rp26j2quaotjza 661 13 M M NNP work_dzeata5onzf7rp26j2quaotjza 661 14 , , , work_dzeata5onzf7rp26j2quaotjza 661 15 Akritidis Akritidis NNP work_dzeata5onzf7rp26j2quaotjza 661 16 P P NNP work_dzeata5onzf7rp26j2quaotjza 661 17 , , , work_dzeata5onzf7rp26j2quaotjza 661 18 Donnelly donnelly RB work_dzeata5onzf7rp26j2quaotjza 661 19 A A NNP work_dzeata5onzf7rp26j2quaotjza 661 20 , , , work_dzeata5onzf7rp26j2quaotjza 661 21 Barham Barham NNP work_dzeata5onzf7rp26j2quaotjza 661 22 P P NNP work_dzeata5onzf7rp26j2quaotjza 661 23 , , , work_dzeata5onzf7rp26j2quaotjza 661 24 Black Black NNP work_dzeata5onzf7rp26j2quaotjza 661 25 R. R. NNP work_dzeata5onzf7rp26j2quaotjza 661 26 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 661 27 . . . work_dzeata5onzf7rp26j2quaotjza 662 1 Fast fast JJ work_dzeata5onzf7rp26j2quaotjza 662 2 byte byte NN work_dzeata5onzf7rp26j2quaotjza 662 3 - - HYPH work_dzeata5onzf7rp26j2quaotjza 662 4 granularity granularity NN work_dzeata5onzf7rp26j2quaotjza 662 5 software software NN work_dzeata5onzf7rp26j2quaotjza 662 6 fault fault NN work_dzeata5onzf7rp26j2quaotjza 662 7 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 662 8 . . . work_dzeata5onzf7rp26j2quaotjza 663 1 In in IN work_dzeata5onzf7rp26j2quaotjza 663 2 : : : work_dzeata5onzf7rp26j2quaotjza 663 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 663 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 663 5 on on IN work_dzeata5onzf7rp26j2quaotjza 663 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 663 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 663 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 663 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 663 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 663 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 663 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 663 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 663 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 663 15 09 09 CD work_dzeata5onzf7rp26j2quaotjza 663 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 663 17 . . . work_dzeata5onzf7rp26j2quaotjza 664 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 664 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 664 3 : : : work_dzeata5onzf7rp26j2quaotjza 664 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 664 5 , , , work_dzeata5onzf7rp26j2quaotjza 664 6 45–58 45–58 CD work_dzeata5onzf7rp26j2quaotjza 664 7 . . . work_dzeata5onzf7rp26j2quaotjza 665 1 Chandra Chandra NNP work_dzeata5onzf7rp26j2quaotjza 665 2 R R NNP work_dzeata5onzf7rp26j2quaotjza 665 3 , , , work_dzeata5onzf7rp26j2quaotjza 665 4 Kim Kim NNP work_dzeata5onzf7rp26j2quaotjza 665 5 T T NNP work_dzeata5onzf7rp26j2quaotjza 665 6 , , , work_dzeata5onzf7rp26j2quaotjza 665 7 Shah Shah NNP work_dzeata5onzf7rp26j2quaotjza 665 8 M M NNP work_dzeata5onzf7rp26j2quaotjza 665 9 , , , work_dzeata5onzf7rp26j2quaotjza 665 10 Narula Narula NNP work_dzeata5onzf7rp26j2quaotjza 665 11 N N NNP work_dzeata5onzf7rp26j2quaotjza 665 12 , , , work_dzeata5onzf7rp26j2quaotjza 665 13 Zeldovich Zeldovich NNP work_dzeata5onzf7rp26j2quaotjza 665 14 N. N. NNP work_dzeata5onzf7rp26j2quaotjza 665 15 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 665 16 . . . work_dzeata5onzf7rp26j2quaotjza 666 1 Intrusion intrusion NN work_dzeata5onzf7rp26j2quaotjza 666 2 recovery recovery NN work_dzeata5onzf7rp26j2quaotjza 666 3 for for IN work_dzeata5onzf7rp26j2quaotjza 666 4 database database NN work_dzeata5onzf7rp26j2quaotjza 666 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 666 6 backed back VBN work_dzeata5onzf7rp26j2quaotjza 666 7 web web NN work_dzeata5onzf7rp26j2quaotjza 666 8 applications application NNS work_dzeata5onzf7rp26j2quaotjza 666 9 . . . work_dzeata5onzf7rp26j2quaotjza 667 1 In in IN work_dzeata5onzf7rp26j2quaotjza 667 2 : : : work_dzeata5onzf7rp26j2quaotjza 667 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 667 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 667 5 on on IN work_dzeata5onzf7rp26j2quaotjza 667 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 667 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 667 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 667 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 667 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 667 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 667 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 667 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 667 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 667 15 11 11 CD work_dzeata5onzf7rp26j2quaotjza 667 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 667 17 . . . work_dzeata5onzf7rp26j2quaotjza 668 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 668 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 668 3 : : : work_dzeata5onzf7rp26j2quaotjza 668 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 668 5 , , , work_dzeata5onzf7rp26j2quaotjza 668 6 101–114 101–114 CD work_dzeata5onzf7rp26j2quaotjza 668 7 . . . work_dzeata5onzf7rp26j2quaotjza 669 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 669 2 et et FW work_dzeata5onzf7rp26j2quaotjza 669 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 669 4 . . . work_dzeata5onzf7rp26j2quaotjza 670 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 670 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 670 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 670 4 , , , work_dzeata5onzf7rp26j2quaotjza 670 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 670 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 670 7 . . . work_dzeata5onzf7rp26j2quaotjza 671 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 671 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 671 3 , , , work_dzeata5onzf7rp26j2quaotjza 671 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 671 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 671 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 671 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 671 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 671 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 671 10 30/36 30/36 CD work_dzeata5onzf7rp26j2quaotjza 671 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 671 12 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 NNP work_dzeata5onzf7rp26j2quaotjza 671 13 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 14 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 15 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 16 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 17 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 18 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 19 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 20 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 21 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 22 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 23 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 24 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 25 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 26 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 27 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 28 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 29 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 30 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 31 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 32 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 33 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 34 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 35 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 36 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 37 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 38 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 39 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 40 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 41 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 42 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 43 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 44 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 45 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 46 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 47 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 48 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 49 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 50 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 51 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 52 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 53 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 54 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 55 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 56 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 57 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 58 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 59 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 60 http://dl.acm.org/citation.cfm?id=1929820.1929836 http://dl.acm.org/citation.cfm?id=1929820.1929836 UH work_dzeata5onzf7rp26j2quaotjza 671 61 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 ADD work_dzeata5onzf7rp26j2quaotjza 671 62 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 ADD work_dzeata5onzf7rp26j2quaotjza 671 63 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 VBZ work_dzeata5onzf7rp26j2quaotjza 671 64 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 65 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 66 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 67 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 68 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 69 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 70 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 71 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 72 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 73 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 74 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 75 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 76 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 77 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 78 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 79 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 80 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 81 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 82 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 83 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 84 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 85 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 86 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 87 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 88 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 89 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 90 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 91 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 92 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 93 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 94 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 95 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 96 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 97 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 98 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 99 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 100 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 101 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 102 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 103 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 104 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 105 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 106 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 107 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 PRP work_dzeata5onzf7rp26j2quaotjza 671 108 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 NNP work_dzeata5onzf7rp26j2quaotjza 671 109 http://dl.acm.org/citation.cfm?id=1855768.1855772 http://dl.acm.org/citation.cfm?id=1855768.1855772 NNP work_dzeata5onzf7rp26j2quaotjza 671 110 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 671 111 ? ? . work_dzeata5onzf7rp26j2quaotjza 672 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 672 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 673 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 673 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 674 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 674 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 675 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 675 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 676 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 676 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 677 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 677 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 678 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 678 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 679 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 679 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 680 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 680 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 681 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 681 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 682 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 682 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 683 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 683 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 684 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 684 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 685 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 685 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 686 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 686 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 687 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 687 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 688 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 688 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 689 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 689 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 690 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 690 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 691 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 691 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 692 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 692 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 693 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 693 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 694 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 694 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 695 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 695 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 696 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 696 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 697 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 697 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 698 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 698 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 699 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 699 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 700 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 700 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 701 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 701 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 702 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 702 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 703 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 703 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 704 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 704 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 705 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 705 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 706 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 706 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 707 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 707 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 708 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 708 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 709 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 709 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 710 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 710 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 711 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 711 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 712 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 712 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 713 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 713 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 714 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 714 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 715 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 715 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 716 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 716 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 717 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 717 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 718 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 718 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 719 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 719 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 720 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 720 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 721 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 721 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 722 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 722 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 723 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 723 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 724 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 724 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 725 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 725 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 726 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 726 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 727 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 727 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 728 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 728 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 729 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 729 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 730 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 730 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 731 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 731 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 732 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 732 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 733 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 733 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 734 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 734 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 735 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 735 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 736 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 736 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 737 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 737 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 738 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 738 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 739 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 739 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 740 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 740 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 741 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 741 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 742 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 742 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 743 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 743 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 744 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 744 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 745 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 745 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 746 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 746 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 747 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 747 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 748 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 748 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 749 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 749 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 750 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 750 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 751 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 751 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 752 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 752 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 753 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 753 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 754 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 754 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 755 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 755 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 756 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 756 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 757 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 757 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 758 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 758 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 759 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 759 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 760 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 760 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 761 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 761 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 762 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 762 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 763 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 763 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 764 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 764 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 765 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 765 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 766 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 766 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 767 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 767 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 768 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 768 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 769 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 769 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 770 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 770 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 771 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 771 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 772 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 772 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 773 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 773 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 774 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 774 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 775 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 775 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 776 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 776 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 777 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 777 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 778 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 778 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 779 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 779 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 780 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 780 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 781 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 781 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 782 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 782 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 783 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 783 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 784 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 784 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 785 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 785 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 786 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 786 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 787 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 787 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 788 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 788 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 789 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 789 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 790 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 790 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 791 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 791 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 792 1 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 http://www.informationweek.com/mobile/mobile-devices/ces-2012-vmware-shows-android-based-virtual-machines/d/d-id/1102135 NNP work_dzeata5onzf7rp26j2quaotjza 792 2 ? ? . work_dzeata5onzf7rp26j2quaotjza 793 1 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 2 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 3 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 4 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 5 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 6 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 7 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 8 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 9 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 10 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 11 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 12 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 13 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 14 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 15 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 16 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 17 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 18 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 19 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 20 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 21 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 22 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 23 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 24 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 25 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 26 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 27 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 28 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 29 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 30 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 31 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 32 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 33 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 34 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 35 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 36 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 37 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 38 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 39 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 40 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 41 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 42 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 43 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 44 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 45 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 46 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 47 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 48 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 49 http://dl.acm.org/citation.cfm?id=1251398.1251415 http://dl.acm.org/citation.cfm?id=1251398.1251415 UH work_dzeata5onzf7rp26j2quaotjza 793 50 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 51 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 52 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 53 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 54 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 55 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 56 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 57 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 58 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 59 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 60 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 61 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 62 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 63 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 64 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 65 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 66 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 67 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 68 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 69 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 70 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 71 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 72 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 73 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 74 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 75 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 76 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 77 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 78 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 79 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 80 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 81 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 82 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 83 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 84 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 85 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 86 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 87 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 88 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 89 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 90 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 91 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 92 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 93 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 94 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 95 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 96 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 97 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 98 http://dl.acm.org/citation.cfm?id=1298455.1298470 http://dl.acm.org/citation.cfm?id=1298455.1298470 UH work_dzeata5onzf7rp26j2quaotjza 793 99 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 793 100 Chang Chang NNP work_dzeata5onzf7rp26j2quaotjza 793 101 W W NNP work_dzeata5onzf7rp26j2quaotjza 793 102 , , , work_dzeata5onzf7rp26j2quaotjza 793 103 Streiff Streiff NNP work_dzeata5onzf7rp26j2quaotjza 793 104 B B NNP work_dzeata5onzf7rp26j2quaotjza 793 105 , , , work_dzeata5onzf7rp26j2quaotjza 793 106 Lin Lin NNP work_dzeata5onzf7rp26j2quaotjza 793 107 C. C. NNP work_dzeata5onzf7rp26j2quaotjza 793 108 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 793 109 . . . work_dzeata5onzf7rp26j2quaotjza 794 1 Efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 794 2 and and CC work_dzeata5onzf7rp26j2quaotjza 794 3 extensible extensible JJ work_dzeata5onzf7rp26j2quaotjza 794 4 security security NN work_dzeata5onzf7rp26j2quaotjza 794 5 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 794 6 using use VBG work_dzeata5onzf7rp26j2quaotjza 794 7 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 794 8 data datum NNS work_dzeata5onzf7rp26j2quaotjza 794 9 flow flow NN work_dzeata5onzf7rp26j2quaotjza 794 10 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 794 11 . . . work_dzeata5onzf7rp26j2quaotjza 795 1 In in IN work_dzeata5onzf7rp26j2quaotjza 795 2 : : : work_dzeata5onzf7rp26j2quaotjza 795 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 795 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 795 5 on on IN work_dzeata5onzf7rp26j2quaotjza 795 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 795 7 and and CC work_dzeata5onzf7rp26j2quaotjza 795 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 795 9 security security NN work_dzeata5onzf7rp26j2quaotjza 795 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 795 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 795 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 795 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 795 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 795 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 795 16 08 08 CD work_dzeata5onzf7rp26j2quaotjza 795 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 795 18 . . . work_dzeata5onzf7rp26j2quaotjza 796 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 796 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 796 3 : : : work_dzeata5onzf7rp26j2quaotjza 796 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 796 5 , , , work_dzeata5onzf7rp26j2quaotjza 796 6 39–50 39–50 CD work_dzeata5onzf7rp26j2quaotjza 796 7 . . . work_dzeata5onzf7rp26j2quaotjza 797 1 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 797 2 EY EY NNP work_dzeata5onzf7rp26j2quaotjza 797 3 , , , work_dzeata5onzf7rp26j2quaotjza 797 4 Bau Bau NNP work_dzeata5onzf7rp26j2quaotjza 797 5 J J NNP work_dzeata5onzf7rp26j2quaotjza 797 6 , , , work_dzeata5onzf7rp26j2quaotjza 797 7 Reis Reis NNP work_dzeata5onzf7rp26j2quaotjza 797 8 C C NNP work_dzeata5onzf7rp26j2quaotjza 797 9 , , , work_dzeata5onzf7rp26j2quaotjza 797 10 Barth Barth NNP work_dzeata5onzf7rp26j2quaotjza 797 11 A A NNP work_dzeata5onzf7rp26j2quaotjza 797 12 , , , work_dzeata5onzf7rp26j2quaotjza 797 13 Jackson Jackson NNP work_dzeata5onzf7rp26j2quaotjza 797 14 C. C. NNP work_dzeata5onzf7rp26j2quaotjza 797 15 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 797 16 . . . work_dzeata5onzf7rp26j2quaotjza 798 1 App App NNP work_dzeata5onzf7rp26j2quaotjza 798 2 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 798 3 : : : work_dzeata5onzf7rp26j2quaotjza 798 4 get get VB work_dzeata5onzf7rp26j2quaotjza 798 5 the the DT work_dzeata5onzf7rp26j2quaotjza 798 6 security security NN work_dzeata5onzf7rp26j2quaotjza 798 7 of of IN work_dzeata5onzf7rp26j2quaotjza 798 8 multiple multiple JJ work_dzeata5onzf7rp26j2quaotjza 798 9 browsers browser NNS work_dzeata5onzf7rp26j2quaotjza 798 10 with with IN work_dzeata5onzf7rp26j2quaotjza 798 11 just just RB work_dzeata5onzf7rp26j2quaotjza 798 12 one one CD work_dzeata5onzf7rp26j2quaotjza 798 13 . . . work_dzeata5onzf7rp26j2quaotjza 799 1 In in IN work_dzeata5onzf7rp26j2quaotjza 799 2 : : : work_dzeata5onzf7rp26j2quaotjza 799 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 799 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 799 5 on on IN work_dzeata5onzf7rp26j2quaotjza 799 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 799 7 and and CC work_dzeata5onzf7rp26j2quaotjza 799 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 799 9 security security NN work_dzeata5onzf7rp26j2quaotjza 799 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 799 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 799 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 799 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 799 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 799 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 799 16 11 11 CD work_dzeata5onzf7rp26j2quaotjza 799 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 799 18 . . . work_dzeata5onzf7rp26j2quaotjza 800 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 800 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 800 3 : : : work_dzeata5onzf7rp26j2quaotjza 800 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 800 5 , , , work_dzeata5onzf7rp26j2quaotjza 800 6 227–238 227–238 CD work_dzeata5onzf7rp26j2quaotjza 800 7 . . . work_dzeata5onzf7rp26j2quaotjza 801 1 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 801 2 S S NNP work_dzeata5onzf7rp26j2quaotjza 801 3 , , , work_dzeata5onzf7rp26j2quaotjza 801 4 Ross Ross NNP work_dzeata5onzf7rp26j2quaotjza 801 5 D D NNP work_dzeata5onzf7rp26j2quaotjza 801 6 , , , work_dzeata5onzf7rp26j2quaotjza 801 7 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 801 8 Y Y NNP work_dzeata5onzf7rp26j2quaotjza 801 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 801 10 M. M. NNP work_dzeata5onzf7rp26j2quaotjza 801 11 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 801 12 . . . work_dzeata5onzf7rp26j2quaotjza 802 1 An an DT work_dzeata5onzf7rp26j2quaotjza 802 2 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 802 3 of of IN work_dzeata5onzf7rp26j2quaotjza 802 4 browser browser NN work_dzeata5onzf7rp26j2quaotjza 802 5 domain domain NN work_dzeata5onzf7rp26j2quaotjza 802 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 802 7 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 802 8 bugs bug NNS work_dzeata5onzf7rp26j2quaotjza 802 9 and and CC work_dzeata5onzf7rp26j2quaotjza 802 10 a a DT work_dzeata5onzf7rp26j2quaotjza 802 11 light light JJ work_dzeata5onzf7rp26j2quaotjza 802 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 802 13 weight weight NN work_dzeata5onzf7rp26j2quaotjza 802 14 transparent transparent JJ work_dzeata5onzf7rp26j2quaotjza 802 15 defense defense NN work_dzeata5onzf7rp26j2quaotjza 802 16 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 802 17 . . . work_dzeata5onzf7rp26j2quaotjza 803 1 In in IN work_dzeata5onzf7rp26j2quaotjza 803 2 : : : work_dzeata5onzf7rp26j2quaotjza 803 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 803 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 803 5 on on IN work_dzeata5onzf7rp26j2quaotjza 803 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 803 7 and and CC work_dzeata5onzf7rp26j2quaotjza 803 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 803 9 security security NN work_dzeata5onzf7rp26j2quaotjza 803 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 803 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 803 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 803 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 803 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 803 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 803 16 07 07 CD work_dzeata5onzf7rp26j2quaotjza 803 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 803 18 . . . work_dzeata5onzf7rp26j2quaotjza 804 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 804 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 804 3 : : : work_dzeata5onzf7rp26j2quaotjza 804 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 804 5 , , , work_dzeata5onzf7rp26j2quaotjza 804 6 2–11 2–11 CD work_dzeata5onzf7rp26j2quaotjza 804 7 . . . work_dzeata5onzf7rp26j2quaotjza 805 1 Coker Coker NNP work_dzeata5onzf7rp26j2quaotjza 805 2 Z Z NNP work_dzeata5onzf7rp26j2quaotjza 805 3 , , , work_dzeata5onzf7rp26j2quaotjza 805 4 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 805 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 805 6 , , , work_dzeata5onzf7rp26j2quaotjza 805 7 Ding Ding NNP work_dzeata5onzf7rp26j2quaotjza 805 8 T T NNP work_dzeata5onzf7rp26j2quaotjza 805 9 , , , work_dzeata5onzf7rp26j2quaotjza 805 10 Le Le NNP work_dzeata5onzf7rp26j2quaotjza 805 11 Goues Goues NNP work_dzeata5onzf7rp26j2quaotjza 805 12 C C NNP work_dzeata5onzf7rp26j2quaotjza 805 13 , , , work_dzeata5onzf7rp26j2quaotjza 805 14 Sunshine Sunshine NNP work_dzeata5onzf7rp26j2quaotjza 805 15 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 806 1 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 806 2 . . . work_dzeata5onzf7rp26j2quaotjza 807 1 Evaluating evaluate VBG work_dzeata5onzf7rp26j2quaotjza 807 2 the the DT work_dzeata5onzf7rp26j2quaotjza 807 3 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 807 4 of of IN work_dzeata5onzf7rp26j2quaotjza 807 5 the the DT work_dzeata5onzf7rp26j2quaotjza 807 6 Java Java NNP work_dzeata5onzf7rp26j2quaotjza 807 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 807 8 . . . work_dzeata5onzf7rp26j2quaotjza 808 1 In in IN work_dzeata5onzf7rp26j2quaotjza 808 2 : : : work_dzeata5onzf7rp26j2quaotjza 808 3 Annual annual JJ work_dzeata5onzf7rp26j2quaotjza 808 4 computer computer NN work_dzeata5onzf7rp26j2quaotjza 808 5 security security NN work_dzeata5onzf7rp26j2quaotjza 808 6 applications application NNS work_dzeata5onzf7rp26j2quaotjza 808 7 conference conference NN work_dzeata5onzf7rp26j2quaotjza 808 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 808 9 ACSAC ACSAC NNP work_dzeata5onzf7rp26j2quaotjza 808 10 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 808 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 808 12 . . . work_dzeata5onzf7rp26j2quaotjza 809 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 809 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 809 3 : : : work_dzeata5onzf7rp26j2quaotjza 809 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 809 5 , , , work_dzeata5onzf7rp26j2quaotjza 809 6 1–10 1–10 CD work_dzeata5onzf7rp26j2quaotjza 809 7 . . . work_dzeata5onzf7rp26j2quaotjza 810 1 Cox Cox NNP work_dzeata5onzf7rp26j2quaotjza 810 2 RS RS NNP work_dzeata5onzf7rp26j2quaotjza 810 3 , , , work_dzeata5onzf7rp26j2quaotjza 810 4 Gribble Gribble NNP work_dzeata5onzf7rp26j2quaotjza 810 5 SD SD NNP work_dzeata5onzf7rp26j2quaotjza 810 6 , , , work_dzeata5onzf7rp26j2quaotjza 810 7 Levy Levy NNP work_dzeata5onzf7rp26j2quaotjza 810 8 HM HM NNP work_dzeata5onzf7rp26j2quaotjza 810 9 , , , work_dzeata5onzf7rp26j2quaotjza 810 10 Hansen Hansen NNP work_dzeata5onzf7rp26j2quaotjza 810 11 JG JG NNP work_dzeata5onzf7rp26j2quaotjza 810 12 . . . work_dzeata5onzf7rp26j2quaotjza 811 1 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 811 2 . . . work_dzeata5onzf7rp26j2quaotjza 812 1 A a DT work_dzeata5onzf7rp26j2quaotjza 812 2 safety safety NN work_dzeata5onzf7rp26j2quaotjza 812 3 - - HYPH work_dzeata5onzf7rp26j2quaotjza 812 4 oriented orient VBN work_dzeata5onzf7rp26j2quaotjza 812 5 platform platform NN work_dzeata5onzf7rp26j2quaotjza 812 6 for for IN work_dzeata5onzf7rp26j2quaotjza 812 7 web web NN work_dzeata5onzf7rp26j2quaotjza 812 8 applications application NNS work_dzeata5onzf7rp26j2quaotjza 812 9 . . . work_dzeata5onzf7rp26j2quaotjza 813 1 In in IN work_dzeata5onzf7rp26j2quaotjza 813 2 : : : work_dzeata5onzf7rp26j2quaotjza 813 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 813 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 813 5 on on IN work_dzeata5onzf7rp26j2quaotjza 813 6 security security NN work_dzeata5onzf7rp26j2quaotjza 813 7 and and CC work_dzeata5onzf7rp26j2quaotjza 813 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 813 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 813 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 813 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 813 12 06 06 CD work_dzeata5onzf7rp26j2quaotjza 813 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 813 14 . . . work_dzeata5onzf7rp26j2quaotjza 814 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 814 2 , , , work_dzeata5onzf7rp26j2quaotjza 814 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 814 4 : : : work_dzeata5onzf7rp26j2quaotjza 814 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 814 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 814 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 814 8 , , , work_dzeata5onzf7rp26j2quaotjza 814 9 350–364 350–364 CD work_dzeata5onzf7rp26j2quaotjza 814 10 . . . work_dzeata5onzf7rp26j2quaotjza 815 1 Criswell Criswell NNP work_dzeata5onzf7rp26j2quaotjza 815 2 J J NNP work_dzeata5onzf7rp26j2quaotjza 815 3 , , , work_dzeata5onzf7rp26j2quaotjza 815 4 Dautenhahn Dautenhahn NNP work_dzeata5onzf7rp26j2quaotjza 815 5 N N NNP work_dzeata5onzf7rp26j2quaotjza 815 6 , , , work_dzeata5onzf7rp26j2quaotjza 815 7 Adve Adve NNP work_dzeata5onzf7rp26j2quaotjza 815 8 V. V. NNP work_dzeata5onzf7rp26j2quaotjza 815 9 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 815 10 . . . work_dzeata5onzf7rp26j2quaotjza 816 1 KCoFI KCoFI NNS work_dzeata5onzf7rp26j2quaotjza 816 2 : : : work_dzeata5onzf7rp26j2quaotjza 816 3 complete complete JJ work_dzeata5onzf7rp26j2quaotjza 816 4 control control NN work_dzeata5onzf7rp26j2quaotjza 816 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 816 6 flow flow NN work_dzeata5onzf7rp26j2quaotjza 816 7 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 816 8 for for IN work_dzeata5onzf7rp26j2quaotjza 816 9 commodity commodity NN work_dzeata5onzf7rp26j2quaotjza 816 10 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 816 11 system system NN work_dzeata5onzf7rp26j2quaotjza 816 12 kernels kernel NNS work_dzeata5onzf7rp26j2quaotjza 816 13 . . . work_dzeata5onzf7rp26j2quaotjza 817 1 In in IN work_dzeata5onzf7rp26j2quaotjza 817 2 : : : work_dzeata5onzf7rp26j2quaotjza 817 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 817 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 817 5 on on IN work_dzeata5onzf7rp26j2quaotjza 817 6 security security NN work_dzeata5onzf7rp26j2quaotjza 817 7 and and CC work_dzeata5onzf7rp26j2quaotjza 817 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 817 9 . . . work_dzeata5onzf7rp26j2quaotjza 818 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 818 2 , , , work_dzeata5onzf7rp26j2quaotjza 818 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 818 4 : : : work_dzeata5onzf7rp26j2quaotjza 818 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 818 6 , , , work_dzeata5onzf7rp26j2quaotjza 818 7 292–307 292–307 CD work_dzeata5onzf7rp26j2quaotjza 818 8 . . . work_dzeata5onzf7rp26j2quaotjza 819 1 Criswell Criswell NNP work_dzeata5onzf7rp26j2quaotjza 819 2 J J NNP work_dzeata5onzf7rp26j2quaotjza 819 3 , , , work_dzeata5onzf7rp26j2quaotjza 819 4 Lenharth Lenharth NNP work_dzeata5onzf7rp26j2quaotjza 819 5 A A NNP work_dzeata5onzf7rp26j2quaotjza 819 6 , , , work_dzeata5onzf7rp26j2quaotjza 819 7 Dhurjati Dhurjati NNP work_dzeata5onzf7rp26j2quaotjza 819 8 D D NNP work_dzeata5onzf7rp26j2quaotjza 819 9 , , , work_dzeata5onzf7rp26j2quaotjza 819 10 Adve Adve NNP work_dzeata5onzf7rp26j2quaotjza 819 11 V. V. NNP work_dzeata5onzf7rp26j2quaotjza 819 12 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 819 13 . . . work_dzeata5onzf7rp26j2quaotjza 820 1 Secure secure JJ work_dzeata5onzf7rp26j2quaotjza 820 2 virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 820 3 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 820 4 : : : work_dzeata5onzf7rp26j2quaotjza 820 5 a a DT work_dzeata5onzf7rp26j2quaotjza 820 6 safe safe JJ work_dzeata5onzf7rp26j2quaotjza 820 7 execution execution NN work_dzeata5onzf7rp26j2quaotjza 820 8 environment environment NN work_dzeata5onzf7rp26j2quaotjza 820 9 for for IN work_dzeata5onzf7rp26j2quaotjza 820 10 commodity commodity NN work_dzeata5onzf7rp26j2quaotjza 820 11 operating operating NN work_dzeata5onzf7rp26j2quaotjza 820 12 systems system NNS work_dzeata5onzf7rp26j2quaotjza 820 13 . . . work_dzeata5onzf7rp26j2quaotjza 821 1 In in IN work_dzeata5onzf7rp26j2quaotjza 821 2 : : : work_dzeata5onzf7rp26j2quaotjza 821 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 821 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 821 5 on on IN work_dzeata5onzf7rp26j2quaotjza 821 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 821 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 821 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 821 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 821 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 821 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 821 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 821 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 821 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 821 15 07 07 CD work_dzeata5onzf7rp26j2quaotjza 821 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 821 17 . . . work_dzeata5onzf7rp26j2quaotjza 822 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 822 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 822 3 : : : work_dzeata5onzf7rp26j2quaotjza 822 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 822 5 , , , work_dzeata5onzf7rp26j2quaotjza 822 6 351–366 351–366 CD work_dzeata5onzf7rp26j2quaotjza 822 7 . . . work_dzeata5onzf7rp26j2quaotjza 823 1 De De NNP work_dzeata5onzf7rp26j2quaotjza 823 2 Groef Groef NNP work_dzeata5onzf7rp26j2quaotjza 823 3 W W NNP work_dzeata5onzf7rp26j2quaotjza 823 4 , , , work_dzeata5onzf7rp26j2quaotjza 823 5 Devriese Devriese NNP work_dzeata5onzf7rp26j2quaotjza 823 6 D d NN work_dzeata5onzf7rp26j2quaotjza 823 7 , , , work_dzeata5onzf7rp26j2quaotjza 823 8 Nikiforakis Nikiforakis NNP work_dzeata5onzf7rp26j2quaotjza 823 9 N N NNP work_dzeata5onzf7rp26j2quaotjza 823 10 , , , work_dzeata5onzf7rp26j2quaotjza 823 11 Piessens Piessens NNP work_dzeata5onzf7rp26j2quaotjza 823 12 F. F. NNP work_dzeata5onzf7rp26j2quaotjza 823 13 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 823 14 . . . work_dzeata5onzf7rp26j2quaotjza 824 1 FlowFox FlowFox NNP work_dzeata5onzf7rp26j2quaotjza 824 2 : : : work_dzeata5onzf7rp26j2quaotjza 824 3 a a DT work_dzeata5onzf7rp26j2quaotjza 824 4 web web NN work_dzeata5onzf7rp26j2quaotjza 824 5 browser browser NN work_dzeata5onzf7rp26j2quaotjza 824 6 with with IN work_dzeata5onzf7rp26j2quaotjza 824 7 flexible flexible JJ work_dzeata5onzf7rp26j2quaotjza 824 8 and and CC work_dzeata5onzf7rp26j2quaotjza 824 9 precise precise JJ work_dzeata5onzf7rp26j2quaotjza 824 10 information information NN work_dzeata5onzf7rp26j2quaotjza 824 11 flow flow NN work_dzeata5onzf7rp26j2quaotjza 824 12 control control NN work_dzeata5onzf7rp26j2quaotjza 824 13 . . . work_dzeata5onzf7rp26j2quaotjza 825 1 In in IN work_dzeata5onzf7rp26j2quaotjza 825 2 : : : work_dzeata5onzf7rp26j2quaotjza 825 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 825 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 825 5 on on IN work_dzeata5onzf7rp26j2quaotjza 825 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 825 7 and and CC work_dzeata5onzf7rp26j2quaotjza 825 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 825 9 security security NN work_dzeata5onzf7rp26j2quaotjza 825 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 825 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 825 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 825 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 825 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 825 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 825 16 12 12 CD work_dzeata5onzf7rp26j2quaotjza 825 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 825 18 . . . work_dzeata5onzf7rp26j2quaotjza 826 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 826 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 826 3 : : : work_dzeata5onzf7rp26j2quaotjza 826 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 826 5 , , , work_dzeata5onzf7rp26j2quaotjza 826 6 748–759 748–759 CD work_dzeata5onzf7rp26j2quaotjza 826 7 . . . work_dzeata5onzf7rp26j2quaotjza 827 1 Denzin Denzin NNP work_dzeata5onzf7rp26j2quaotjza 827 2 NK NK NNP work_dzeata5onzf7rp26j2quaotjza 827 3 , , , work_dzeata5onzf7rp26j2quaotjza 827 4 Lincoln Lincoln NNP work_dzeata5onzf7rp26j2quaotjza 827 5 YS YS NNP work_dzeata5onzf7rp26j2quaotjza 827 6 . . . work_dzeata5onzf7rp26j2quaotjza 828 1 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 828 2 . . . work_dzeata5onzf7rp26j2quaotjza 829 1 Introduction introduction NN work_dzeata5onzf7rp26j2quaotjza 829 2 : : : work_dzeata5onzf7rp26j2quaotjza 829 3 the the DT work_dzeata5onzf7rp26j2quaotjza 829 4 discipline discipline NN work_dzeata5onzf7rp26j2quaotjza 829 5 and and CC work_dzeata5onzf7rp26j2quaotjza 829 6 practice practice NN work_dzeata5onzf7rp26j2quaotjza 829 7 of of IN work_dzeata5onzf7rp26j2quaotjza 829 8 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 829 9 research research NN work_dzeata5onzf7rp26j2quaotjza 829 10 . . . work_dzeata5onzf7rp26j2quaotjza 830 1 In in IN work_dzeata5onzf7rp26j2quaotjza 830 2 : : : work_dzeata5onzf7rp26j2quaotjza 830 3 The the DT work_dzeata5onzf7rp26j2quaotjza 830 4 sage sage NN work_dzeata5onzf7rp26j2quaotjza 830 5 handbook handbook NN work_dzeata5onzf7rp26j2quaotjza 830 6 of of IN work_dzeata5onzf7rp26j2quaotjza 830 7 qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 830 8 research research NN work_dzeata5onzf7rp26j2quaotjza 830 9 . . . work_dzeata5onzf7rp26j2quaotjza 831 1 4th 4th JJ work_dzeata5onzf7rp26j2quaotjza 831 2 edition edition NNP work_dzeata5onzf7rp26j2quaotjza 831 3 . . . work_dzeata5onzf7rp26j2quaotjza 832 1 Thousand thousand CD work_dzeata5onzf7rp26j2quaotjza 832 2 Oaks Oaks NNPS work_dzeata5onzf7rp26j2quaotjza 832 3 : : : work_dzeata5onzf7rp26j2quaotjza 832 4 Sage sage NN work_dzeata5onzf7rp26j2quaotjza 832 5 . . . work_dzeata5onzf7rp26j2quaotjza 833 1 Dunn Dunn NNP work_dzeata5onzf7rp26j2quaotjza 833 2 AM AM NNP work_dzeata5onzf7rp26j2quaotjza 833 3 , , , work_dzeata5onzf7rp26j2quaotjza 833 4 Lee Lee NNP work_dzeata5onzf7rp26j2quaotjza 833 5 MZ MZ NNP work_dzeata5onzf7rp26j2quaotjza 833 6 , , , work_dzeata5onzf7rp26j2quaotjza 833 7 Jana Jana NNP work_dzeata5onzf7rp26j2quaotjza 833 8 S S NNP work_dzeata5onzf7rp26j2quaotjza 833 9 , , , work_dzeata5onzf7rp26j2quaotjza 833 10 Kim Kim NNP work_dzeata5onzf7rp26j2quaotjza 833 11 S S NNP work_dzeata5onzf7rp26j2quaotjza 833 12 , , , work_dzeata5onzf7rp26j2quaotjza 833 13 Silberstein Silberstein NNP work_dzeata5onzf7rp26j2quaotjza 833 14 M M NNP work_dzeata5onzf7rp26j2quaotjza 833 15 , , , work_dzeata5onzf7rp26j2quaotjza 833 16 Xu Xu NNP work_dzeata5onzf7rp26j2quaotjza 833 17 Y Y NNP work_dzeata5onzf7rp26j2quaotjza 833 18 , , , work_dzeata5onzf7rp26j2quaotjza 833 19 Shmatikov Shmatikov NNP work_dzeata5onzf7rp26j2quaotjza 833 20 V V NNP work_dzeata5onzf7rp26j2quaotjza 833 21 , , , work_dzeata5onzf7rp26j2quaotjza 833 22 Witchel Witchel NNP work_dzeata5onzf7rp26j2quaotjza 833 23 E. E. NNP work_dzeata5onzf7rp26j2quaotjza 833 24 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 833 25 . . . work_dzeata5onzf7rp26j2quaotjza 834 1 Eternal eternal JJ work_dzeata5onzf7rp26j2quaotjza 834 2 sunshine sunshine NN work_dzeata5onzf7rp26j2quaotjza 834 3 of of IN work_dzeata5onzf7rp26j2quaotjza 834 4 the the DT work_dzeata5onzf7rp26j2quaotjza 834 5 spotless spotless NN work_dzeata5onzf7rp26j2quaotjza 834 6 machine machine NN work_dzeata5onzf7rp26j2quaotjza 834 7 : : : work_dzeata5onzf7rp26j2quaotjza 834 8 protecting protect VBG work_dzeata5onzf7rp26j2quaotjza 834 9 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 834 10 with with IN work_dzeata5onzf7rp26j2quaotjza 834 11 ephemeral ephemeral JJ work_dzeata5onzf7rp26j2quaotjza 834 12 channels channel NNS work_dzeata5onzf7rp26j2quaotjza 834 13 . . . work_dzeata5onzf7rp26j2quaotjza 835 1 In in IN work_dzeata5onzf7rp26j2quaotjza 835 2 : : : work_dzeata5onzf7rp26j2quaotjza 835 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 835 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 835 5 on on IN work_dzeata5onzf7rp26j2quaotjza 835 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 835 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 835 8 design design NN work_dzeata5onzf7rp26j2quaotjza 835 9 and and CC work_dzeata5onzf7rp26j2quaotjza 835 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 835 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 835 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 835 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 835 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 835 15 OSDI’12 osdi’12 NN work_dzeata5onzf7rp26j2quaotjza 835 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 835 17 . . . work_dzeata5onzf7rp26j2quaotjza 836 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 836 2 : : : work_dzeata5onzf7rp26j2quaotjza 836 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 836 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 836 5 , , , work_dzeata5onzf7rp26j2quaotjza 836 6 61–75 61–75 CD work_dzeata5onzf7rp26j2quaotjza 836 7 . . . work_dzeata5onzf7rp26j2quaotjza 837 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 837 2 at at IN work_dzeata5onzf7rp26j2quaotjza 837 3 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 837 4 . . . work_dzeata5onzf7rp26j2quaotjza 838 1 Efstathopoulos Efstathopoulos NNP work_dzeata5onzf7rp26j2quaotjza 838 2 P p NN work_dzeata5onzf7rp26j2quaotjza 838 3 , , , work_dzeata5onzf7rp26j2quaotjza 838 4 Krohn Krohn NNP work_dzeata5onzf7rp26j2quaotjza 838 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 838 6 , , , work_dzeata5onzf7rp26j2quaotjza 838 7 VanDeBogart VanDeBogart NNP work_dzeata5onzf7rp26j2quaotjza 838 8 S S NNP work_dzeata5onzf7rp26j2quaotjza 838 9 , , , work_dzeata5onzf7rp26j2quaotjza 838 10 Frey Frey NNP work_dzeata5onzf7rp26j2quaotjza 838 11 C C NNP work_dzeata5onzf7rp26j2quaotjza 838 12 , , , work_dzeata5onzf7rp26j2quaotjza 838 13 Ziegler Ziegler NNP work_dzeata5onzf7rp26j2quaotjza 838 14 D D NNP work_dzeata5onzf7rp26j2quaotjza 838 15 , , , work_dzeata5onzf7rp26j2quaotjza 838 16 Kohler Kohler NNP work_dzeata5onzf7rp26j2quaotjza 838 17 E E NNP work_dzeata5onzf7rp26j2quaotjza 838 18 , , , work_dzeata5onzf7rp26j2quaotjza 838 19 Mazières mazières NN work_dzeata5onzf7rp26j2quaotjza 838 20 D d NN work_dzeata5onzf7rp26j2quaotjza 838 21 , , , work_dzeata5onzf7rp26j2quaotjza 838 22 Kaashoek Kaashoek NNP work_dzeata5onzf7rp26j2quaotjza 838 23 F F NNP work_dzeata5onzf7rp26j2quaotjza 838 24 , , , work_dzeata5onzf7rp26j2quaotjza 838 25 Morris Morris NNP work_dzeata5onzf7rp26j2quaotjza 838 26 R. R. NNP work_dzeata5onzf7rp26j2quaotjza 838 27 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 838 28 . . . work_dzeata5onzf7rp26j2quaotjza 839 1 Labels label NNS work_dzeata5onzf7rp26j2quaotjza 839 2 and and CC work_dzeata5onzf7rp26j2quaotjza 839 3 event event NN work_dzeata5onzf7rp26j2quaotjza 839 4 processes process NNS work_dzeata5onzf7rp26j2quaotjza 839 5 in in IN work_dzeata5onzf7rp26j2quaotjza 839 6 the the DT work_dzeata5onzf7rp26j2quaotjza 839 7 asbestos asbestos NN work_dzeata5onzf7rp26j2quaotjza 839 8 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 839 9 system system NN work_dzeata5onzf7rp26j2quaotjza 839 10 . . . work_dzeata5onzf7rp26j2quaotjza 840 1 In in IN work_dzeata5onzf7rp26j2quaotjza 840 2 : : : work_dzeata5onzf7rp26j2quaotjza 840 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 840 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 840 5 on on IN work_dzeata5onzf7rp26j2quaotjza 840 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 840 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 840 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 840 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 840 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 840 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 840 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 840 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 840 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 840 15 05 05 CD work_dzeata5onzf7rp26j2quaotjza 840 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 840 17 . . . work_dzeata5onzf7rp26j2quaotjza 841 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 841 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 841 3 : : : work_dzeata5onzf7rp26j2quaotjza 841 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 841 5 , , , work_dzeata5onzf7rp26j2quaotjza 841 6 17–30 17–30 CD work_dzeata5onzf7rp26j2quaotjza 841 7 . . . work_dzeata5onzf7rp26j2quaotjza 842 1 Erlingsson Erlingsson NNP work_dzeata5onzf7rp26j2quaotjza 842 2 Ú Ú NNP work_dzeata5onzf7rp26j2quaotjza 842 3 , , , work_dzeata5onzf7rp26j2quaotjza 842 4 Abadi Abadi NNP work_dzeata5onzf7rp26j2quaotjza 842 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 842 6 , , , work_dzeata5onzf7rp26j2quaotjza 842 7 Vrable Vrable NNP work_dzeata5onzf7rp26j2quaotjza 842 8 M M NNP work_dzeata5onzf7rp26j2quaotjza 842 9 , , , work_dzeata5onzf7rp26j2quaotjza 842 10 Budiu Budiu NNP work_dzeata5onzf7rp26j2quaotjza 842 11 M M NNP work_dzeata5onzf7rp26j2quaotjza 842 12 , , , work_dzeata5onzf7rp26j2quaotjza 842 13 Necula Necula NNP work_dzeata5onzf7rp26j2quaotjza 842 14 GC GC NNP work_dzeata5onzf7rp26j2quaotjza 842 15 . . . work_dzeata5onzf7rp26j2quaotjza 843 1 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 843 2 . . . work_dzeata5onzf7rp26j2quaotjza 844 1 XFI xfi NN work_dzeata5onzf7rp26j2quaotjza 844 2 : : : work_dzeata5onzf7rp26j2quaotjza 844 3 software software NN work_dzeata5onzf7rp26j2quaotjza 844 4 guards guard NNS work_dzeata5onzf7rp26j2quaotjza 844 5 for for IN work_dzeata5onzf7rp26j2quaotjza 844 6 system system NN work_dzeata5onzf7rp26j2quaotjza 844 7 address address NN work_dzeata5onzf7rp26j2quaotjza 844 8 spaces space NNS work_dzeata5onzf7rp26j2quaotjza 844 9 . . . work_dzeata5onzf7rp26j2quaotjza 845 1 In in IN work_dzeata5onzf7rp26j2quaotjza 845 2 : : : work_dzeata5onzf7rp26j2quaotjza 845 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 845 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 845 5 on on IN work_dzeata5onzf7rp26j2quaotjza 845 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 845 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 845 8 design design NN work_dzeata5onzf7rp26j2quaotjza 845 9 and and CC work_dzeata5onzf7rp26j2quaotjza 845 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 845 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 845 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 845 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 845 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 845 15 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 845 16 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 845 17 06 06 CD work_dzeata5onzf7rp26j2quaotjza 845 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 845 19 . . . work_dzeata5onzf7rp26j2quaotjza 846 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 846 2 : : : work_dzeata5onzf7rp26j2quaotjza 846 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 846 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 846 5 , , , work_dzeata5onzf7rp26j2quaotjza 846 6 75–88 75–88 CD work_dzeata5onzf7rp26j2quaotjza 846 7 . . . work_dzeata5onzf7rp26j2quaotjza 847 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 847 2 at at IN work_dzeata5onzf7rp26j2quaotjza 847 3 http://dl.acm.org/citation.cfm http://dl.acm.org/citation.cfm NNP work_dzeata5onzf7rp26j2quaotjza 847 4 ? ? . work_dzeata5onzf7rp26j2quaotjza 848 1 id=1298455.1298463 id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 848 2 . . . work_dzeata5onzf7rp26j2quaotjza 849 1 Feldman Feldman NNP work_dzeata5onzf7rp26j2quaotjza 849 2 AJ AJ NNP work_dzeata5onzf7rp26j2quaotjza 849 3 , , , work_dzeata5onzf7rp26j2quaotjza 849 4 Zeller Zeller NNP work_dzeata5onzf7rp26j2quaotjza 849 5 WP WP NNP work_dzeata5onzf7rp26j2quaotjza 849 6 , , , work_dzeata5onzf7rp26j2quaotjza 849 7 Freedman Freedman NNP work_dzeata5onzf7rp26j2quaotjza 849 8 MJ MJ NNP work_dzeata5onzf7rp26j2quaotjza 849 9 , , , work_dzeata5onzf7rp26j2quaotjza 849 10 Felten Felten NNP work_dzeata5onzf7rp26j2quaotjza 849 11 EW EW NNP work_dzeata5onzf7rp26j2quaotjza 849 12 . . . work_dzeata5onzf7rp26j2quaotjza 850 1 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 850 2 . . . work_dzeata5onzf7rp26j2quaotjza 851 1 SPORC SPORC NNP work_dzeata5onzf7rp26j2quaotjza 851 2 : : : work_dzeata5onzf7rp26j2quaotjza 851 3 group group NN work_dzeata5onzf7rp26j2quaotjza 851 4 collaboration collaboration NN work_dzeata5onzf7rp26j2quaotjza 851 5 using use VBG work_dzeata5onzf7rp26j2quaotjza 851 6 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 851 7 cloud cloud NN work_dzeata5onzf7rp26j2quaotjza 851 8 resources resource NNS work_dzeata5onzf7rp26j2quaotjza 851 9 . . . work_dzeata5onzf7rp26j2quaotjza 852 1 In in IN work_dzeata5onzf7rp26j2quaotjza 852 2 : : : work_dzeata5onzf7rp26j2quaotjza 852 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 852 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 852 5 on on IN work_dzeata5onzf7rp26j2quaotjza 852 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 852 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 852 8 design design NN work_dzeata5onzf7rp26j2quaotjza 852 9 and and CC work_dzeata5onzf7rp26j2quaotjza 852 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 852 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 852 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 852 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 852 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 852 15 OSDI’10 OSDI’10 NNP work_dzeata5onzf7rp26j2quaotjza 852 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 852 17 . . . work_dzeata5onzf7rp26j2quaotjza 853 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 853 2 : : : work_dzeata5onzf7rp26j2quaotjza 853 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 853 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 853 5 , , , work_dzeata5onzf7rp26j2quaotjza 853 6 1 1 CD work_dzeata5onzf7rp26j2quaotjza 853 7 . . . work_dzeata5onzf7rp26j2quaotjza 854 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 854 2 at at IN work_dzeata5onzf7rp26j2quaotjza 854 3 http://dl http://dl NN work_dzeata5onzf7rp26j2quaotjza 854 4 . . . work_dzeata5onzf7rp26j2quaotjza 855 1 acm.org/citation.cfm?id=1924943.1924967 acm.org/citation.cfm?id=1924943.1924967 RB work_dzeata5onzf7rp26j2quaotjza 855 2 . . . work_dzeata5onzf7rp26j2quaotjza 856 1 Garfinkel Garfinkel NNP work_dzeata5onzf7rp26j2quaotjza 856 2 T T NNP work_dzeata5onzf7rp26j2quaotjza 856 3 , , , work_dzeata5onzf7rp26j2quaotjza 856 4 Pfaff Pfaff NNP work_dzeata5onzf7rp26j2quaotjza 856 5 B B NNP work_dzeata5onzf7rp26j2quaotjza 856 6 , , , work_dzeata5onzf7rp26j2quaotjza 856 7 Chow Chow NNP work_dzeata5onzf7rp26j2quaotjza 856 8 J J NNP work_dzeata5onzf7rp26j2quaotjza 856 9 , , , work_dzeata5onzf7rp26j2quaotjza 856 10 Rosenblum Rosenblum NNP work_dzeata5onzf7rp26j2quaotjza 856 11 M M NNP work_dzeata5onzf7rp26j2quaotjza 856 12 , , , work_dzeata5onzf7rp26j2quaotjza 856 13 Boneh Boneh NNP work_dzeata5onzf7rp26j2quaotjza 856 14 D. D. NNP work_dzeata5onzf7rp26j2quaotjza 856 15 2003 2003 CD work_dzeata5onzf7rp26j2quaotjza 856 16 . . . work_dzeata5onzf7rp26j2quaotjza 857 1 Terra terra NN work_dzeata5onzf7rp26j2quaotjza 857 2 : : : work_dzeata5onzf7rp26j2quaotjza 857 3 a a DT work_dzeata5onzf7rp26j2quaotjza 857 4 virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 857 5 machine machine NN work_dzeata5onzf7rp26j2quaotjza 857 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 857 7 based base VBN work_dzeata5onzf7rp26j2quaotjza 857 8 platform platform NN work_dzeata5onzf7rp26j2quaotjza 857 9 for for IN work_dzeata5onzf7rp26j2quaotjza 857 10 trusted trusted JJ work_dzeata5onzf7rp26j2quaotjza 857 11 computing computing NN work_dzeata5onzf7rp26j2quaotjza 857 12 . . . work_dzeata5onzf7rp26j2quaotjza 858 1 In in IN work_dzeata5onzf7rp26j2quaotjza 858 2 : : : work_dzeata5onzf7rp26j2quaotjza 858 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 858 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 858 5 on on IN work_dzeata5onzf7rp26j2quaotjza 858 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 858 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 858 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 858 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 858 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 858 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 858 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 858 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 858 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 858 15 03 03 CD work_dzeata5onzf7rp26j2quaotjza 858 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 858 17 . . . work_dzeata5onzf7rp26j2quaotjza 859 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 859 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 859 3 : : : work_dzeata5onzf7rp26j2quaotjza 859 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 859 5 , , , work_dzeata5onzf7rp26j2quaotjza 859 6 193–206 193–206 CD work_dzeata5onzf7rp26j2quaotjza 859 7 . . . work_dzeata5onzf7rp26j2quaotjza 860 1 Geneiatakis Geneiatakis NNP work_dzeata5onzf7rp26j2quaotjza 860 2 D D NNP work_dzeata5onzf7rp26j2quaotjza 860 3 , , , work_dzeata5onzf7rp26j2quaotjza 860 4 Portokalidis Portokalidis NNP work_dzeata5onzf7rp26j2quaotjza 860 5 G G NNP work_dzeata5onzf7rp26j2quaotjza 860 6 , , , work_dzeata5onzf7rp26j2quaotjza 860 7 Kemerlis Kemerlis NNP work_dzeata5onzf7rp26j2quaotjza 860 8 VP VP NNP work_dzeata5onzf7rp26j2quaotjza 860 9 , , , work_dzeata5onzf7rp26j2quaotjza 860 10 Keromytis Keromytis NNP work_dzeata5onzf7rp26j2quaotjza 860 11 AD AD NNP work_dzeata5onzf7rp26j2quaotjza 860 12 . . . work_dzeata5onzf7rp26j2quaotjza 861 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 861 2 . . . work_dzeata5onzf7rp26j2quaotjza 862 1 Adaptive adaptive JJ work_dzeata5onzf7rp26j2quaotjza 862 2 defenses defense NNS work_dzeata5onzf7rp26j2quaotjza 862 3 for for IN work_dzeata5onzf7rp26j2quaotjza 862 4 commodity commodity NN work_dzeata5onzf7rp26j2quaotjza 862 5 software software NN work_dzeata5onzf7rp26j2quaotjza 862 6 through through IN work_dzeata5onzf7rp26j2quaotjza 862 7 virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 862 8 application application NN work_dzeata5onzf7rp26j2quaotjza 862 9 partitioning partitioning NN work_dzeata5onzf7rp26j2quaotjza 862 10 . . . work_dzeata5onzf7rp26j2quaotjza 863 1 In in IN work_dzeata5onzf7rp26j2quaotjza 863 2 : : : work_dzeata5onzf7rp26j2quaotjza 863 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 863 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 863 5 on on IN work_dzeata5onzf7rp26j2quaotjza 863 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 863 7 and and CC work_dzeata5onzf7rp26j2quaotjza 863 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 863 9 security security NN work_dzeata5onzf7rp26j2quaotjza 863 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 863 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 863 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 863 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 863 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 863 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 863 16 12 12 CD work_dzeata5onzf7rp26j2quaotjza 863 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 863 18 . . . work_dzeata5onzf7rp26j2quaotjza 864 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 864 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 864 3 : : : work_dzeata5onzf7rp26j2quaotjza 864 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 864 5 , , , work_dzeata5onzf7rp26j2quaotjza 864 6 133–144 133–144 CD work_dzeata5onzf7rp26j2quaotjza 864 7 . . . work_dzeata5onzf7rp26j2quaotjza 865 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 865 2 et et FW work_dzeata5onzf7rp26j2quaotjza 865 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 865 4 . . . work_dzeata5onzf7rp26j2quaotjza 866 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 866 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 866 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 866 4 , , , work_dzeata5onzf7rp26j2quaotjza 866 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 866 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 866 7 . . . work_dzeata5onzf7rp26j2quaotjza 867 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 867 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 867 3 , , , work_dzeata5onzf7rp26j2quaotjza 867 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 867 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 867 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 867 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 867 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 867 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 867 10 31/36 31/36 CD work_dzeata5onzf7rp26j2quaotjza 867 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ VBZ work_dzeata5onzf7rp26j2quaotjza 867 12 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 13 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 14 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 RB work_dzeata5onzf7rp26j2quaotjza 867 15 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 RB work_dzeata5onzf7rp26j2quaotjza 867 16 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 17 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 18 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 19 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 20 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 21 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 22 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 23 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 24 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 25 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 26 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 27 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 28 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 29 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 30 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 31 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 32 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 33 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 34 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 35 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 36 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 37 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 38 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 39 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 40 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 41 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 42 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 43 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 44 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 45 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 46 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 47 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 48 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 49 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 50 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 51 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 52 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 53 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 54 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 55 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 56 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 57 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 58 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 ADD work_dzeata5onzf7rp26j2quaotjza 867 59 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 RB work_dzeata5onzf7rp26j2quaotjza 867 60 http://dl.acm.org/citation.cfm?id=2387880.2387887 http://dl.acm.org/citation.cfm?id=2387880.2387887 RB work_dzeata5onzf7rp26j2quaotjza 867 61 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 JJ work_dzeata5onzf7rp26j2quaotjza 867 62 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 63 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 64 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 65 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 66 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 67 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 68 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 69 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 70 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 71 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 72 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 73 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 74 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 75 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 76 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 77 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 78 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 79 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 80 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 81 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 82 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 83 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 84 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 85 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 86 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 87 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 88 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 89 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 90 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 91 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 92 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 93 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 94 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 95 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 96 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 97 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 98 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 99 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 100 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 101 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 102 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 103 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 104 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 105 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 106 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 107 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 UH work_dzeata5onzf7rp26j2quaotjza 867 108 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 RB work_dzeata5onzf7rp26j2quaotjza 867 109 http://dl.acm.org/citation.cfm?id=1298455.1298463 http://dl.acm.org/citation.cfm?id=1298455.1298463 RB work_dzeata5onzf7rp26j2quaotjza 867 110 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 ADD work_dzeata5onzf7rp26j2quaotjza 867 111 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 112 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 113 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 114 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 115 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 116 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 117 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 118 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 119 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 120 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 121 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 122 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 123 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 124 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 125 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 126 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 127 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 128 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 129 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 130 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 131 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 132 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 133 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 134 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 135 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 136 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 137 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 138 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 139 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 140 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 141 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 142 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 143 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 144 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 145 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 146 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 147 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 148 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 149 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 150 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 151 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 152 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 153 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 154 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 155 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 156 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 157 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 CD work_dzeata5onzf7rp26j2quaotjza 867 158 http://dl.acm.org/citation.cfm?id=1924943.1924967 http://dl.acm.org/citation.cfm?id=1924943.1924967 NNS work_dzeata5onzf7rp26j2quaotjza 867 159 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 867 160 Giffin Giffin NNP work_dzeata5onzf7rp26j2quaotjza 867 161 DB DB NNP work_dzeata5onzf7rp26j2quaotjza 867 162 , , , work_dzeata5onzf7rp26j2quaotjza 867 163 Levy Levy NNP work_dzeata5onzf7rp26j2quaotjza 867 164 A A NNP work_dzeata5onzf7rp26j2quaotjza 867 165 , , , work_dzeata5onzf7rp26j2quaotjza 867 166 Stefan Stefan NNP work_dzeata5onzf7rp26j2quaotjza 867 167 D D NNP work_dzeata5onzf7rp26j2quaotjza 867 168 , , , work_dzeata5onzf7rp26j2quaotjza 867 169 Terei Terei NNP work_dzeata5onzf7rp26j2quaotjza 867 170 D d NN work_dzeata5onzf7rp26j2quaotjza 867 171 , , , work_dzeata5onzf7rp26j2quaotjza 867 172 Mazières mazières NN work_dzeata5onzf7rp26j2quaotjza 867 173 D d NN work_dzeata5onzf7rp26j2quaotjza 867 174 , , , work_dzeata5onzf7rp26j2quaotjza 867 175 Mitchell Mitchell NNP work_dzeata5onzf7rp26j2quaotjza 867 176 JC JC NNP work_dzeata5onzf7rp26j2quaotjza 867 177 , , , work_dzeata5onzf7rp26j2quaotjza 867 178 Russo Russo NNP work_dzeata5onzf7rp26j2quaotjza 867 179 A. A. NNP work_dzeata5onzf7rp26j2quaotjza 868 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 868 2 . . . work_dzeata5onzf7rp26j2quaotjza 869 1 Hails hail VBZ work_dzeata5onzf7rp26j2quaotjza 869 2 : : : work_dzeata5onzf7rp26j2quaotjza 869 3 protecting protect VBG work_dzeata5onzf7rp26j2quaotjza 869 4 data datum NNS work_dzeata5onzf7rp26j2quaotjza 869 5 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 869 6 in in IN work_dzeata5onzf7rp26j2quaotjza 869 7 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 869 8 web web NN work_dzeata5onzf7rp26j2quaotjza 869 9 applications application NNS work_dzeata5onzf7rp26j2quaotjza 869 10 . . . work_dzeata5onzf7rp26j2quaotjza 870 1 In in IN work_dzeata5onzf7rp26j2quaotjza 870 2 : : : work_dzeata5onzf7rp26j2quaotjza 870 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 870 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 870 5 on on IN work_dzeata5onzf7rp26j2quaotjza 870 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 870 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 870 8 design design NN work_dzeata5onzf7rp26j2quaotjza 870 9 and and CC work_dzeata5onzf7rp26j2quaotjza 870 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 870 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 870 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 870 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 870 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 870 15 OSDI’12 osdi’12 NN work_dzeata5onzf7rp26j2quaotjza 870 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 870 17 . . . work_dzeata5onzf7rp26j2quaotjza 871 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 871 2 : : : work_dzeata5onzf7rp26j2quaotjza 871 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 871 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 871 5 , , , work_dzeata5onzf7rp26j2quaotjza 871 6 47–60 47–60 CD work_dzeata5onzf7rp26j2quaotjza 871 7 . . . work_dzeata5onzf7rp26j2quaotjza 872 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 872 2 at at IN work_dzeata5onzf7rp26j2quaotjza 872 3 http http NNS work_dzeata5onzf7rp26j2quaotjza 872 4 : : : work_dzeata5onzf7rp26j2quaotjza 872 5 //dl.acm.org //dl.acm.org NNP work_dzeata5onzf7rp26j2quaotjza 872 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 872 7 citation.cfm?id=2387880.2387886 citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 872 8 . . . work_dzeata5onzf7rp26j2quaotjza 873 1 Giuffrida Giuffrida NNP work_dzeata5onzf7rp26j2quaotjza 873 2 C C NNP work_dzeata5onzf7rp26j2quaotjza 873 3 , , , work_dzeata5onzf7rp26j2quaotjza 873 4 Kuijsten Kuijsten NNP work_dzeata5onzf7rp26j2quaotjza 873 5 A A NNP work_dzeata5onzf7rp26j2quaotjza 873 6 , , , work_dzeata5onzf7rp26j2quaotjza 873 7 Tanenbaum Tanenbaum NNP work_dzeata5onzf7rp26j2quaotjza 873 8 AS as IN work_dzeata5onzf7rp26j2quaotjza 873 9 . . . work_dzeata5onzf7rp26j2quaotjza 874 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 874 2 . . . work_dzeata5onzf7rp26j2quaotjza 875 1 Enhanced enhanced JJ work_dzeata5onzf7rp26j2quaotjza 875 2 operating operating NN work_dzeata5onzf7rp26j2quaotjza 875 3 system system NN work_dzeata5onzf7rp26j2quaotjza 875 4 security security NN work_dzeata5onzf7rp26j2quaotjza 875 5 through through IN work_dzeata5onzf7rp26j2quaotjza 875 6 efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 875 7 and and CC work_dzeata5onzf7rp26j2quaotjza 875 8 fine fine JJ work_dzeata5onzf7rp26j2quaotjza 875 9 - - HYPH work_dzeata5onzf7rp26j2quaotjza 875 10 grained grain VBN work_dzeata5onzf7rp26j2quaotjza 875 11 address address NN work_dzeata5onzf7rp26j2quaotjza 875 12 space space NN work_dzeata5onzf7rp26j2quaotjza 875 13 randomization randomization NN work_dzeata5onzf7rp26j2quaotjza 875 14 . . . work_dzeata5onzf7rp26j2quaotjza 876 1 In in IN work_dzeata5onzf7rp26j2quaotjza 876 2 : : : work_dzeata5onzf7rp26j2quaotjza 876 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 876 4 security security NN work_dzeata5onzf7rp26j2quaotjza 876 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 876 6 Security’12 Security’12 NFP work_dzeata5onzf7rp26j2quaotjza 876 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 876 8 . . . work_dzeata5onzf7rp26j2quaotjza 877 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 877 2 : : : work_dzeata5onzf7rp26j2quaotjza 877 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 877 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 877 5 , , , work_dzeata5onzf7rp26j2quaotjza 877 6 40–40 40–40 CD work_dzeata5onzf7rp26j2quaotjza 877 7 . . . work_dzeata5onzf7rp26j2quaotjza 878 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 878 2 at at IN work_dzeata5onzf7rp26j2quaotjza 878 3 http://dl.acm.org/citation.cfm?id=2362793 http://dl.acm.org/citation.cfm?id=2362793 NNP work_dzeata5onzf7rp26j2quaotjza 878 4 . . . work_dzeata5onzf7rp26j2quaotjza 879 1 2362833 2362833 CD work_dzeata5onzf7rp26j2quaotjza 879 2 . . . work_dzeata5onzf7rp26j2quaotjza 880 1 Graydon Graydon NNP work_dzeata5onzf7rp26j2quaotjza 880 2 PJ PJ NNP work_dzeata5onzf7rp26j2quaotjza 880 3 , , , work_dzeata5onzf7rp26j2quaotjza 880 4 Knight Knight NNP work_dzeata5onzf7rp26j2quaotjza 880 5 JC JC NNP work_dzeata5onzf7rp26j2quaotjza 880 6 , , , work_dzeata5onzf7rp26j2quaotjza 880 7 Strunk Strunk NNP work_dzeata5onzf7rp26j2quaotjza 880 8 EA EA NNP work_dzeata5onzf7rp26j2quaotjza 880 9 . . . work_dzeata5onzf7rp26j2quaotjza 881 1 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 881 2 . . . work_dzeata5onzf7rp26j2quaotjza 882 1 Assurance assurance NN work_dzeata5onzf7rp26j2quaotjza 882 2 based base VBN work_dzeata5onzf7rp26j2quaotjza 882 3 development development NN work_dzeata5onzf7rp26j2quaotjza 882 4 of of IN work_dzeata5onzf7rp26j2quaotjza 882 5 critical critical JJ work_dzeata5onzf7rp26j2quaotjza 882 6 systems system NNS work_dzeata5onzf7rp26j2quaotjza 882 7 . . . work_dzeata5onzf7rp26j2quaotjza 883 1 In in IN work_dzeata5onzf7rp26j2quaotjza 883 2 : : : work_dzeata5onzf7rp26j2quaotjza 883 3 Dependable dependable JJ work_dzeata5onzf7rp26j2quaotjza 883 4 systems system NNS work_dzeata5onzf7rp26j2quaotjza 883 5 and and CC work_dzeata5onzf7rp26j2quaotjza 883 6 networks network NNS work_dzeata5onzf7rp26j2quaotjza 883 7 . . . work_dzeata5onzf7rp26j2quaotjza 884 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 884 2 , , , work_dzeata5onzf7rp26j2quaotjza 884 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 884 4 : : : work_dzeata5onzf7rp26j2quaotjza 884 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 884 6 , , , work_dzeata5onzf7rp26j2quaotjza 884 7 347–357 347–357 CD work_dzeata5onzf7rp26j2quaotjza 884 8 . . . work_dzeata5onzf7rp26j2quaotjza 885 1 Hartley Hartley NNP work_dzeata5onzf7rp26j2quaotjza 885 2 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 886 1 2004 2004 CD work_dzeata5onzf7rp26j2quaotjza 886 2 . . . work_dzeata5onzf7rp26j2quaotjza 887 1 Current current JJ work_dzeata5onzf7rp26j2quaotjza 887 2 findings finding NNS work_dzeata5onzf7rp26j2quaotjza 887 3 from from IN work_dzeata5onzf7rp26j2quaotjza 887 4 research research NN work_dzeata5onzf7rp26j2quaotjza 887 5 on on IN work_dzeata5onzf7rp26j2quaotjza 887 6 structured structured JJ work_dzeata5onzf7rp26j2quaotjza 887 7 abstracts abstract NNS work_dzeata5onzf7rp26j2quaotjza 887 8 . . . work_dzeata5onzf7rp26j2quaotjza 888 1 Journal Journal NNP work_dzeata5onzf7rp26j2quaotjza 888 2 of of IN work_dzeata5onzf7rp26j2quaotjza 888 3 the the DT work_dzeata5onzf7rp26j2quaotjza 888 4 Medical Medical NNP work_dzeata5onzf7rp26j2quaotjza 888 5 Library Library NNP work_dzeata5onzf7rp26j2quaotjza 888 6 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 888 7 92(3):368–371 92(3):368–371 CD work_dzeata5onzf7rp26j2quaotjza 888 8 . . . work_dzeata5onzf7rp26j2quaotjza 889 1 Haynes Haynes NNP work_dzeata5onzf7rp26j2quaotjza 889 2 RB RB NNP work_dzeata5onzf7rp26j2quaotjza 889 3 , , , work_dzeata5onzf7rp26j2quaotjza 889 4 Mulrow Mulrow NNP work_dzeata5onzf7rp26j2quaotjza 889 5 CD CD NNP work_dzeata5onzf7rp26j2quaotjza 889 6 , , , work_dzeata5onzf7rp26j2quaotjza 889 7 Huth Huth NNP work_dzeata5onzf7rp26j2quaotjza 889 8 EJ EJ NNP work_dzeata5onzf7rp26j2quaotjza 889 9 , , , work_dzeata5onzf7rp26j2quaotjza 889 10 Altman Altman NNP work_dzeata5onzf7rp26j2quaotjza 889 11 DG DG NNP work_dzeata5onzf7rp26j2quaotjza 889 12 , , , work_dzeata5onzf7rp26j2quaotjza 889 13 Gardner Gardner NNP work_dzeata5onzf7rp26j2quaotjza 889 14 MJ MJ NNP work_dzeata5onzf7rp26j2quaotjza 889 15 . . . work_dzeata5onzf7rp26j2quaotjza 890 1 1990 1990 CD work_dzeata5onzf7rp26j2quaotjza 890 2 . . . work_dzeata5onzf7rp26j2quaotjza 891 1 More more RBR work_dzeata5onzf7rp26j2quaotjza 891 2 informative informative JJ work_dzeata5onzf7rp26j2quaotjza 891 3 abstracts abstract NNS work_dzeata5onzf7rp26j2quaotjza 891 4 revisited revisit VBD work_dzeata5onzf7rp26j2quaotjza 891 5 . . . work_dzeata5onzf7rp26j2quaotjza 892 1 Annals Annals NNP work_dzeata5onzf7rp26j2quaotjza 892 2 of of IN work_dzeata5onzf7rp26j2quaotjza 892 3 Internal Internal NNP work_dzeata5onzf7rp26j2quaotjza 892 4 Medicine Medicine NNP work_dzeata5onzf7rp26j2quaotjza 892 5 113(1):69–76 113(1):69–76 CD work_dzeata5onzf7rp26j2quaotjza 892 6 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 892 7 10.7326/0003 10.7326/0003 CD work_dzeata5onzf7rp26j2quaotjza 892 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 892 9 4819 4819 CD work_dzeata5onzf7rp26j2quaotjza 892 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 892 11 113 113 CD work_dzeata5onzf7rp26j2quaotjza 892 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 892 13 1 1 CD work_dzeata5onzf7rp26j2quaotjza 892 14 - - SYM work_dzeata5onzf7rp26j2quaotjza 892 15 69 69 CD work_dzeata5onzf7rp26j2quaotjza 892 16 . . . work_dzeata5onzf7rp26j2quaotjza 893 1 Hiser Hiser NNP work_dzeata5onzf7rp26j2quaotjza 893 2 J J NNP work_dzeata5onzf7rp26j2quaotjza 893 3 , , , work_dzeata5onzf7rp26j2quaotjza 893 4 Nguyen Nguyen NNP work_dzeata5onzf7rp26j2quaotjza 893 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 893 6 Tuong Tuong NNP work_dzeata5onzf7rp26j2quaotjza 893 7 A A NNP work_dzeata5onzf7rp26j2quaotjza 893 8 , , , work_dzeata5onzf7rp26j2quaotjza 893 9 Co Co NNP work_dzeata5onzf7rp26j2quaotjza 893 10 M M NNP work_dzeata5onzf7rp26j2quaotjza 893 11 , , , work_dzeata5onzf7rp26j2quaotjza 893 12 Hall Hall NNP work_dzeata5onzf7rp26j2quaotjza 893 13 M M NNP work_dzeata5onzf7rp26j2quaotjza 893 14 , , , work_dzeata5onzf7rp26j2quaotjza 893 15 Davidson Davidson NNP work_dzeata5onzf7rp26j2quaotjza 893 16 JW JW NNP work_dzeata5onzf7rp26j2quaotjza 893 17 . . . work_dzeata5onzf7rp26j2quaotjza 894 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 894 2 . . . work_dzeata5onzf7rp26j2quaotjza 895 1 ILR ILR NNP work_dzeata5onzf7rp26j2quaotjza 895 2 : : : work_dzeata5onzf7rp26j2quaotjza 895 3 where where WRB work_dzeata5onzf7rp26j2quaotjza 895 4 ’d ’d NN work_dzeata5onzf7rp26j2quaotjza 895 5 my -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 895 6 gadgets gadget NNS work_dzeata5onzf7rp26j2quaotjza 895 7 go go VB work_dzeata5onzf7rp26j2quaotjza 895 8 ? ? . work_dzeata5onzf7rp26j2quaotjza 896 1 In in IN work_dzeata5onzf7rp26j2quaotjza 896 2 : : : work_dzeata5onzf7rp26j2quaotjza 896 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 896 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 896 5 on on IN work_dzeata5onzf7rp26j2quaotjza 896 6 security security NN work_dzeata5onzf7rp26j2quaotjza 896 7 and and CC work_dzeata5onzf7rp26j2quaotjza 896 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 896 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 896 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 896 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 896 12 12 12 CD work_dzeata5onzf7rp26j2quaotjza 896 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 896 14 . . . work_dzeata5onzf7rp26j2quaotjza 897 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 897 2 , , , work_dzeata5onzf7rp26j2quaotjza 897 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 897 4 : : : work_dzeata5onzf7rp26j2quaotjza 897 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 897 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 897 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 897 8 , , , work_dzeata5onzf7rp26j2quaotjza 897 9 571–585 571–585 CD work_dzeata5onzf7rp26j2quaotjza 897 10 . . . work_dzeata5onzf7rp26j2quaotjza 898 1 Hogg Hogg NNP work_dzeata5onzf7rp26j2quaotjza 898 2 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 899 1 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 899 2 . . . work_dzeata5onzf7rp26j2quaotjza 900 1 Control control NN work_dzeata5onzf7rp26j2quaotjza 900 2 flow flow NN work_dzeata5onzf7rp26j2quaotjza 900 3 guard guard NN work_dzeata5onzf7rp26j2quaotjza 900 4 . . . work_dzeata5onzf7rp26j2quaotjza 901 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 901 2 at at IN work_dzeata5onzf7rp26j2quaotjza 901 3 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/ http://blogs.msdn.com/b/vcblog/archive/2014/12/08/ NNP work_dzeata5onzf7rp26j2quaotjza 901 4 visual-studio-2015-preview-work-in-progress-security-feature.aspx visual-studio-2015-preview-work-in-progress-security-feature.aspx NNP work_dzeata5onzf7rp26j2quaotjza 901 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 901 6 accessed access VBN work_dzeata5onzf7rp26j2quaotjza 901 7 30 30 CD work_dzeata5onzf7rp26j2quaotjza 901 8 April April NNP work_dzeata5onzf7rp26j2quaotjza 901 9 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 901 10 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 901 11 . . . work_dzeata5onzf7rp26j2quaotjza 902 1 Homescu Homescu NNP work_dzeata5onzf7rp26j2quaotjza 902 2 A A NNP work_dzeata5onzf7rp26j2quaotjza 902 3 , , , work_dzeata5onzf7rp26j2quaotjza 902 4 Brunthaler Brunthaler NNP work_dzeata5onzf7rp26j2quaotjza 902 5 S S NNP work_dzeata5onzf7rp26j2quaotjza 902 6 , , , work_dzeata5onzf7rp26j2quaotjza 902 7 Larsen Larsen NNP work_dzeata5onzf7rp26j2quaotjza 902 8 P P NNP work_dzeata5onzf7rp26j2quaotjza 902 9 , , , work_dzeata5onzf7rp26j2quaotjza 902 10 Franz Franz NNP work_dzeata5onzf7rp26j2quaotjza 902 11 M. M. NNP work_dzeata5onzf7rp26j2quaotjza 902 12 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 902 13 . . . work_dzeata5onzf7rp26j2quaotjza 903 1 Librando Librando NNP work_dzeata5onzf7rp26j2quaotjza 903 2 : : : work_dzeata5onzf7rp26j2quaotjza 903 3 transparent transparent JJ work_dzeata5onzf7rp26j2quaotjza 903 4 code code NN work_dzeata5onzf7rp26j2quaotjza 903 5 randomization randomization NN work_dzeata5onzf7rp26j2quaotjza 903 6 for for IN work_dzeata5onzf7rp26j2quaotjza 903 7 just just RB work_dzeata5onzf7rp26j2quaotjza 903 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 903 9 in in IN work_dzeata5onzf7rp26j2quaotjza 903 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 903 11 time time NN work_dzeata5onzf7rp26j2quaotjza 903 12 compilers compiler NNS work_dzeata5onzf7rp26j2quaotjza 903 13 . . . work_dzeata5onzf7rp26j2quaotjza 904 1 In in IN work_dzeata5onzf7rp26j2quaotjza 904 2 : : : work_dzeata5onzf7rp26j2quaotjza 904 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 904 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 904 5 on on IN work_dzeata5onzf7rp26j2quaotjza 904 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 904 7 and and CC work_dzeata5onzf7rp26j2quaotjza 904 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 904 9 security security NN work_dzeata5onzf7rp26j2quaotjza 904 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 904 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 904 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 904 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 904 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 904 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 904 16 13 13 CD work_dzeata5onzf7rp26j2quaotjza 904 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 904 18 . . . work_dzeata5onzf7rp26j2quaotjza 905 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 905 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 905 3 : : : work_dzeata5onzf7rp26j2quaotjza 905 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 905 5 , , , work_dzeata5onzf7rp26j2quaotjza 905 6 993–1004 993–1004 CD work_dzeata5onzf7rp26j2quaotjza 905 7 . . . work_dzeata5onzf7rp26j2quaotjza 906 1 Jana Jana NNP work_dzeata5onzf7rp26j2quaotjza 906 2 S S NNP work_dzeata5onzf7rp26j2quaotjza 906 3 , , , work_dzeata5onzf7rp26j2quaotjza 906 4 Porter Porter NNP work_dzeata5onzf7rp26j2quaotjza 906 5 DE DE NNP work_dzeata5onzf7rp26j2quaotjza 906 6 , , , work_dzeata5onzf7rp26j2quaotjza 906 7 Shmatikov Shmatikov NNP work_dzeata5onzf7rp26j2quaotjza 906 8 V. V. NNP work_dzeata5onzf7rp26j2quaotjza 906 9 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 906 10 . . . work_dzeata5onzf7rp26j2quaotjza 907 1 TxBox TxBox NNP work_dzeata5onzf7rp26j2quaotjza 907 2 : : : work_dzeata5onzf7rp26j2quaotjza 907 3 bbuilding bbuilde VBG work_dzeata5onzf7rp26j2quaotjza 907 4 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 907 5 , , , work_dzeata5onzf7rp26j2quaotjza 907 6 efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 907 7 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 907 8 with with IN work_dzeata5onzf7rp26j2quaotjza 907 9 system system NN work_dzeata5onzf7rp26j2quaotjza 907 10 transactions transaction NNS work_dzeata5onzf7rp26j2quaotjza 907 11 . . . work_dzeata5onzf7rp26j2quaotjza 908 1 In in IN work_dzeata5onzf7rp26j2quaotjza 908 2 : : : work_dzeata5onzf7rp26j2quaotjza 908 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 908 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 908 5 on on IN work_dzeata5onzf7rp26j2quaotjza 908 6 security security NN work_dzeata5onzf7rp26j2quaotjza 908 7 and and CC work_dzeata5onzf7rp26j2quaotjza 908 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 908 9 . . . work_dzeata5onzf7rp26j2quaotjza 909 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 909 2 , , , work_dzeata5onzf7rp26j2quaotjza 909 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 909 4 : : : work_dzeata5onzf7rp26j2quaotjza 909 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 909 6 , , , work_dzeata5onzf7rp26j2quaotjza 909 7 329–344 329–344 CD work_dzeata5onzf7rp26j2quaotjza 909 8 . . . work_dzeata5onzf7rp26j2quaotjza 910 1 Kagdi Kagdi NNP work_dzeata5onzf7rp26j2quaotjza 910 2 H H NNP work_dzeata5onzf7rp26j2quaotjza 910 3 , , , work_dzeata5onzf7rp26j2quaotjza 910 4 Collard Collard NNP work_dzeata5onzf7rp26j2quaotjza 910 5 ML ML NNP work_dzeata5onzf7rp26j2quaotjza 910 6 , , , work_dzeata5onzf7rp26j2quaotjza 910 7 Maletic Maletic NNP work_dzeata5onzf7rp26j2quaotjza 910 8 JI JI NNP work_dzeata5onzf7rp26j2quaotjza 910 9 . . . work_dzeata5onzf7rp26j2quaotjza 911 1 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 911 2 . . . work_dzeata5onzf7rp26j2quaotjza 912 1 A a DT work_dzeata5onzf7rp26j2quaotjza 912 2 survey survey NN work_dzeata5onzf7rp26j2quaotjza 912 3 and and CC work_dzeata5onzf7rp26j2quaotjza 912 4 taxonomy taxonomy NN work_dzeata5onzf7rp26j2quaotjza 912 5 of of IN work_dzeata5onzf7rp26j2quaotjza 912 6 approaches approach NNS work_dzeata5onzf7rp26j2quaotjza 912 7 for for IN work_dzeata5onzf7rp26j2quaotjza 912 8 mining mining NN work_dzeata5onzf7rp26j2quaotjza 912 9 software software NN work_dzeata5onzf7rp26j2quaotjza 912 10 repositories repository NNS work_dzeata5onzf7rp26j2quaotjza 912 11 in in IN work_dzeata5onzf7rp26j2quaotjza 912 12 the the DT work_dzeata5onzf7rp26j2quaotjza 912 13 context context NN work_dzeata5onzf7rp26j2quaotjza 912 14 of of IN work_dzeata5onzf7rp26j2quaotjza 912 15 software software NN work_dzeata5onzf7rp26j2quaotjza 912 16 evolution evolution NN work_dzeata5onzf7rp26j2quaotjza 912 17 . . . work_dzeata5onzf7rp26j2quaotjza 913 1 Journal Journal NNP work_dzeata5onzf7rp26j2quaotjza 913 2 of of IN work_dzeata5onzf7rp26j2quaotjza 913 3 Software Software NNP work_dzeata5onzf7rp26j2quaotjza 913 4 Maintenance Maintenance NNP work_dzeata5onzf7rp26j2quaotjza 913 5 and and CC work_dzeata5onzf7rp26j2quaotjza 913 6 Evolution Evolution NNP work_dzeata5onzf7rp26j2quaotjza 913 7 : : : work_dzeata5onzf7rp26j2quaotjza 913 8 Research Research NNP work_dzeata5onzf7rp26j2quaotjza 913 9 and and CC work_dzeata5onzf7rp26j2quaotjza 913 10 Practice Practice NNP work_dzeata5onzf7rp26j2quaotjza 913 11 19(2):77–131 19(2):77–131 JJ work_dzeata5onzf7rp26j2quaotjza 913 12 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 913 13 10.1002 10.1002 CD work_dzeata5onzf7rp26j2quaotjza 913 14 / / SYM work_dzeata5onzf7rp26j2quaotjza 913 15 smr.344 smr.344 CD work_dzeata5onzf7rp26j2quaotjza 913 16 . . . work_dzeata5onzf7rp26j2quaotjza 914 1 Kaufman Kaufman NNP work_dzeata5onzf7rp26j2quaotjza 914 2 L L NNP work_dzeata5onzf7rp26j2quaotjza 914 3 , , , work_dzeata5onzf7rp26j2quaotjza 914 4 Rousseeuw Rousseeuw NNP work_dzeata5onzf7rp26j2quaotjza 914 5 PJ PJ NNP work_dzeata5onzf7rp26j2quaotjza 914 6 . . . work_dzeata5onzf7rp26j2quaotjza 915 1 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 915 2 . . . work_dzeata5onzf7rp26j2quaotjza 916 1 Finding find VBG work_dzeata5onzf7rp26j2quaotjza 916 2 groups group NNS work_dzeata5onzf7rp26j2quaotjza 916 3 in in IN work_dzeata5onzf7rp26j2quaotjza 916 4 data datum NNS work_dzeata5onzf7rp26j2quaotjza 916 5 : : : work_dzeata5onzf7rp26j2quaotjza 916 6 an an DT work_dzeata5onzf7rp26j2quaotjza 916 7 introduction introduction NN work_dzeata5onzf7rp26j2quaotjza 916 8 to to TO work_dzeata5onzf7rp26j2quaotjza 916 9 cluster cluster VB work_dzeata5onzf7rp26j2quaotjza 916 10 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 916 11 . . . work_dzeata5onzf7rp26j2quaotjza 917 1 Vol Vol NNP work_dzeata5onzf7rp26j2quaotjza 917 2 . . . work_dzeata5onzf7rp26j2quaotjza 918 1 344 344 CD work_dzeata5onzf7rp26j2quaotjza 918 2 . . . work_dzeata5onzf7rp26j2quaotjza 919 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 919 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 919 3 : : : work_dzeata5onzf7rp26j2quaotjza 919 4 John John NNP work_dzeata5onzf7rp26j2quaotjza 919 5 Wiley Wiley NNP work_dzeata5onzf7rp26j2quaotjza 919 6 & & CC work_dzeata5onzf7rp26j2quaotjza 919 7 Sons Sons NNP work_dzeata5onzf7rp26j2quaotjza 919 8 . . . work_dzeata5onzf7rp26j2quaotjza 920 1 Kelly Kelly NNP work_dzeata5onzf7rp26j2quaotjza 920 2 T. T. NNP work_dzeata5onzf7rp26j2quaotjza 920 3 1999 1999 CD work_dzeata5onzf7rp26j2quaotjza 920 4 . . . work_dzeata5onzf7rp26j2quaotjza 921 1 Arguing argue VBG work_dzeata5onzf7rp26j2quaotjza 921 2 safety safety NN work_dzeata5onzf7rp26j2quaotjza 921 3 — — : work_dzeata5onzf7rp26j2quaotjza 921 4 a a DT work_dzeata5onzf7rp26j2quaotjza 921 5 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 921 6 approach approach NN work_dzeata5onzf7rp26j2quaotjza 921 7 to to IN work_dzeata5onzf7rp26j2quaotjza 921 8 safety safety NN work_dzeata5onzf7rp26j2quaotjza 921 9 case case NN work_dzeata5onzf7rp26j2quaotjza 921 10 management management NN work_dzeata5onzf7rp26j2quaotjza 921 11 . . . work_dzeata5onzf7rp26j2quaotjza 922 1 PhD phd NN work_dzeata5onzf7rp26j2quaotjza 922 2 dissertation dissertation NN work_dzeata5onzf7rp26j2quaotjza 922 3 , , , work_dzeata5onzf7rp26j2quaotjza 922 4 Department Department NNP work_dzeata5onzf7rp26j2quaotjza 922 5 of of IN work_dzeata5onzf7rp26j2quaotjza 922 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 922 7 Science Science NNP work_dzeata5onzf7rp26j2quaotjza 922 8 , , , work_dzeata5onzf7rp26j2quaotjza 922 9 University University NNP work_dzeata5onzf7rp26j2quaotjza 922 10 of of IN work_dzeata5onzf7rp26j2quaotjza 922 11 York York NNP work_dzeata5onzf7rp26j2quaotjza 922 12 . . . work_dzeata5onzf7rp26j2quaotjza 923 1 Kemerlis Kemerlis NNP work_dzeata5onzf7rp26j2quaotjza 923 2 VP VP NNP work_dzeata5onzf7rp26j2quaotjza 923 3 , , , work_dzeata5onzf7rp26j2quaotjza 923 4 Portokalidis Portokalidis NNP work_dzeata5onzf7rp26j2quaotjza 923 5 G G NNP work_dzeata5onzf7rp26j2quaotjza 923 6 , , , work_dzeata5onzf7rp26j2quaotjza 923 7 Keromytis Keromytis NNP work_dzeata5onzf7rp26j2quaotjza 923 8 AD AD NNP work_dzeata5onzf7rp26j2quaotjza 923 9 . . . work_dzeata5onzf7rp26j2quaotjza 924 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 924 2 . . . work_dzeata5onzf7rp26j2quaotjza 924 3 kGuard kguard NN work_dzeata5onzf7rp26j2quaotjza 924 4 : : : work_dzeata5onzf7rp26j2quaotjza 924 5 lightweight lightweight JJ work_dzeata5onzf7rp26j2quaotjza 924 6 kernel kernel NN work_dzeata5onzf7rp26j2quaotjza 924 7 protection protection NN work_dzeata5onzf7rp26j2quaotjza 924 8 against against IN work_dzeata5onzf7rp26j2quaotjza 924 9 return return NN work_dzeata5onzf7rp26j2quaotjza 924 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 924 11 to to IN work_dzeata5onzf7rp26j2quaotjza 924 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 924 13 user user NN work_dzeata5onzf7rp26j2quaotjza 924 14 attacks attack NNS work_dzeata5onzf7rp26j2quaotjza 924 15 . . . work_dzeata5onzf7rp26j2quaotjza 925 1 In in IN work_dzeata5onzf7rp26j2quaotjza 925 2 : : : work_dzeata5onzf7rp26j2quaotjza 925 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 925 4 security security NN work_dzeata5onzf7rp26j2quaotjza 925 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 925 6 Security’12 Security’12 NFP work_dzeata5onzf7rp26j2quaotjza 925 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 925 8 . . . work_dzeata5onzf7rp26j2quaotjza 926 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 926 2 : : : work_dzeata5onzf7rp26j2quaotjza 926 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 926 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 926 5 , , , work_dzeata5onzf7rp26j2quaotjza 926 6 39–39 39–39 CD work_dzeata5onzf7rp26j2quaotjza 926 7 . . . work_dzeata5onzf7rp26j2quaotjza 927 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 927 2 at at IN work_dzeata5onzf7rp26j2quaotjza 927 3 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 927 4 . . . work_dzeata5onzf7rp26j2quaotjza 928 1 Kitchenham Kitchenham NNP work_dzeata5onzf7rp26j2quaotjza 928 2 B B NNP work_dzeata5onzf7rp26j2quaotjza 928 3 , , , work_dzeata5onzf7rp26j2quaotjza 928 4 Brereton Brereton NNP work_dzeata5onzf7rp26j2quaotjza 928 5 OP OP NNP work_dzeata5onzf7rp26j2quaotjza 928 6 , , , work_dzeata5onzf7rp26j2quaotjza 928 7 Budgen Budgen NNP work_dzeata5onzf7rp26j2quaotjza 928 8 D D NNP work_dzeata5onzf7rp26j2quaotjza 928 9 , , , work_dzeata5onzf7rp26j2quaotjza 928 10 Turner Turner NNP work_dzeata5onzf7rp26j2quaotjza 928 11 M M NNP work_dzeata5onzf7rp26j2quaotjza 928 12 , , , work_dzeata5onzf7rp26j2quaotjza 928 13 Bailey Bailey NNP work_dzeata5onzf7rp26j2quaotjza 928 14 J J NNP work_dzeata5onzf7rp26j2quaotjza 928 15 , , , work_dzeata5onzf7rp26j2quaotjza 928 16 Linkman Linkman NNP work_dzeata5onzf7rp26j2quaotjza 928 17 S. S. NNP work_dzeata5onzf7rp26j2quaotjza 928 18 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 928 19 . . . work_dzeata5onzf7rp26j2quaotjza 929 1 Systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 929 2 literature literature NN work_dzeata5onzf7rp26j2quaotjza 929 3 reviews review NNS work_dzeata5onzf7rp26j2quaotjza 929 4 in in IN work_dzeata5onzf7rp26j2quaotjza 929 5 software software NN work_dzeata5onzf7rp26j2quaotjza 929 6 engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 929 7 — — : work_dzeata5onzf7rp26j2quaotjza 929 8 a a DT work_dzeata5onzf7rp26j2quaotjza 929 9 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 929 10 literature literature NN work_dzeata5onzf7rp26j2quaotjza 929 11 review review NN work_dzeata5onzf7rp26j2quaotjza 929 12 . . . work_dzeata5onzf7rp26j2quaotjza 930 1 Information information NN work_dzeata5onzf7rp26j2quaotjza 930 2 and and CC work_dzeata5onzf7rp26j2quaotjza 930 3 Software Software NNP work_dzeata5onzf7rp26j2quaotjza 930 4 Technology Technology NNP work_dzeata5onzf7rp26j2quaotjza 930 5 51(1):7–15 51(1):7–15 CD work_dzeata5onzf7rp26j2quaotjza 930 6 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 930 7 10.1016 10.1016 CD work_dzeata5onzf7rp26j2quaotjza 930 8 / / SYM work_dzeata5onzf7rp26j2quaotjza 930 9 j.infsof.2008.09.009 j.infsof.2008.09.009 NNP work_dzeata5onzf7rp26j2quaotjza 930 10 . . . work_dzeata5onzf7rp26j2quaotjza 931 1 Knight Knight NNP work_dzeata5onzf7rp26j2quaotjza 931 2 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 932 1 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 932 2 . . . work_dzeata5onzf7rp26j2quaotjza 933 1 The the DT work_dzeata5onzf7rp26j2quaotjza 933 2 importance importance NN work_dzeata5onzf7rp26j2quaotjza 933 3 of of IN work_dzeata5onzf7rp26j2quaotjza 933 4 security security NN work_dzeata5onzf7rp26j2quaotjza 933 5 cases case NNS work_dzeata5onzf7rp26j2quaotjza 933 6 : : : work_dzeata5onzf7rp26j2quaotjza 933 7 proof proof NN work_dzeata5onzf7rp26j2quaotjza 933 8 is be VBZ work_dzeata5onzf7rp26j2quaotjza 933 9 good good JJ work_dzeata5onzf7rp26j2quaotjza 933 10 , , , work_dzeata5onzf7rp26j2quaotjza 933 11 but but CC work_dzeata5onzf7rp26j2quaotjza 933 12 not not RB work_dzeata5onzf7rp26j2quaotjza 933 13 enough enough RB work_dzeata5onzf7rp26j2quaotjza 933 14 . . . work_dzeata5onzf7rp26j2quaotjza 934 1 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 934 2 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 934 3 Privacy Privacy NNP work_dzeata5onzf7rp26j2quaotjza 934 4 Magazine Magazine NNP work_dzeata5onzf7rp26j2quaotjza 934 5 13(4):73–75 13(4):73–75 CD work_dzeata5onzf7rp26j2quaotjza 934 6 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 934 7 10.1109 10.1109 CD work_dzeata5onzf7rp26j2quaotjza 934 8 / / SYM work_dzeata5onzf7rp26j2quaotjza 934 9 MSP.2015.68 MSP.2015.68 NNS work_dzeata5onzf7rp26j2quaotjza 934 10 . . . work_dzeata5onzf7rp26j2quaotjza 935 1 Krippendorff Krippendorff NNP work_dzeata5onzf7rp26j2quaotjza 935 2 KH KH NNP work_dzeata5onzf7rp26j2quaotjza 935 3 . . . work_dzeata5onzf7rp26j2quaotjza 936 1 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 936 2 . . . work_dzeata5onzf7rp26j2quaotjza 937 1 Content content NN work_dzeata5onzf7rp26j2quaotjza 937 2 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 937 3 : : : work_dzeata5onzf7rp26j2quaotjza 937 4 an an DT work_dzeata5onzf7rp26j2quaotjza 937 5 introduction introduction NN work_dzeata5onzf7rp26j2quaotjza 937 6 to to IN work_dzeata5onzf7rp26j2quaotjza 937 7 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 937 8 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 937 9 . . . work_dzeata5onzf7rp26j2quaotjza 938 1 Thousand thousand CD work_dzeata5onzf7rp26j2quaotjza 938 2 Oaks Oaks NNPS work_dzeata5onzf7rp26j2quaotjza 938 3 : : : work_dzeata5onzf7rp26j2quaotjza 938 4 Sage sage NN work_dzeata5onzf7rp26j2quaotjza 938 5 . . . work_dzeata5onzf7rp26j2quaotjza 939 1 Krohn Krohn NNP work_dzeata5onzf7rp26j2quaotjza 939 2 M M NNP work_dzeata5onzf7rp26j2quaotjza 939 3 , , , work_dzeata5onzf7rp26j2quaotjza 939 4 Yip Yip NNP work_dzeata5onzf7rp26j2quaotjza 939 5 A A NNP work_dzeata5onzf7rp26j2quaotjza 939 6 , , , work_dzeata5onzf7rp26j2quaotjza 939 7 Brodsky Brodsky NNP work_dzeata5onzf7rp26j2quaotjza 939 8 M M NNP work_dzeata5onzf7rp26j2quaotjza 939 9 , , , work_dzeata5onzf7rp26j2quaotjza 939 10 Cliffer Cliffer NNP work_dzeata5onzf7rp26j2quaotjza 939 11 N N NNP work_dzeata5onzf7rp26j2quaotjza 939 12 , , , work_dzeata5onzf7rp26j2quaotjza 939 13 Kaashoek Kaashoek NNP work_dzeata5onzf7rp26j2quaotjza 939 14 MF MF NNP work_dzeata5onzf7rp26j2quaotjza 939 15 , , , work_dzeata5onzf7rp26j2quaotjza 939 16 Kohler Kohler NNP work_dzeata5onzf7rp26j2quaotjza 939 17 E E NNP work_dzeata5onzf7rp26j2quaotjza 939 18 , , , work_dzeata5onzf7rp26j2quaotjza 939 19 Morris Morris NNP work_dzeata5onzf7rp26j2quaotjza 939 20 R. R. NNP work_dzeata5onzf7rp26j2quaotjza 939 21 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 939 22 . . . work_dzeata5onzf7rp26j2quaotjza 940 1 Information information NN work_dzeata5onzf7rp26j2quaotjza 940 2 flow flow NN work_dzeata5onzf7rp26j2quaotjza 940 3 control control NN work_dzeata5onzf7rp26j2quaotjza 940 4 for for IN work_dzeata5onzf7rp26j2quaotjza 940 5 standard standard JJ work_dzeata5onzf7rp26j2quaotjza 940 6 OS OS NNP work_dzeata5onzf7rp26j2quaotjza 940 7 abstractions abstraction NNS work_dzeata5onzf7rp26j2quaotjza 940 8 . . . work_dzeata5onzf7rp26j2quaotjza 941 1 In in IN work_dzeata5onzf7rp26j2quaotjza 941 2 : : : work_dzeata5onzf7rp26j2quaotjza 941 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 941 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 941 5 on on IN work_dzeata5onzf7rp26j2quaotjza 941 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 941 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 941 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 941 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 941 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 941 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 941 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 941 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 941 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 941 15 07 07 CD work_dzeata5onzf7rp26j2quaotjza 941 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 941 17 . . . work_dzeata5onzf7rp26j2quaotjza 942 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 942 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 942 3 : : : work_dzeata5onzf7rp26j2quaotjza 942 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 942 5 , , , work_dzeata5onzf7rp26j2quaotjza 942 6 321–334 321–334 CD work_dzeata5onzf7rp26j2quaotjza 942 7 . . . work_dzeata5onzf7rp26j2quaotjza 943 1 Lázár Lázár NNP work_dzeata5onzf7rp26j2quaotjza 943 2 A A NNP work_dzeata5onzf7rp26j2quaotjza 943 3 , , , work_dzeata5onzf7rp26j2quaotjza 943 4 Ábel ábel NN work_dzeata5onzf7rp26j2quaotjza 943 5 D d NN work_dzeata5onzf7rp26j2quaotjza 943 6 , , , work_dzeata5onzf7rp26j2quaotjza 943 7 Vicsek Vicsek NNP work_dzeata5onzf7rp26j2quaotjza 943 8 T. T. NNP work_dzeata5onzf7rp26j2quaotjza 943 9 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 943 10 . . . work_dzeata5onzf7rp26j2quaotjza 944 1 Modularity modularity NN work_dzeata5onzf7rp26j2quaotjza 944 2 measure measure NN work_dzeata5onzf7rp26j2quaotjza 944 3 of of IN work_dzeata5onzf7rp26j2quaotjza 944 4 networks network NNS work_dzeata5onzf7rp26j2quaotjza 944 5 with with IN work_dzeata5onzf7rp26j2quaotjza 944 6 overlapping overlap VBG work_dzeata5onzf7rp26j2quaotjza 944 7 communities community NNS work_dzeata5onzf7rp26j2quaotjza 944 8 . . . work_dzeata5onzf7rp26j2quaotjza 945 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 945 2 et et FW work_dzeata5onzf7rp26j2quaotjza 945 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 945 4 . . . work_dzeata5onzf7rp26j2quaotjza 946 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 946 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 946 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 946 4 , , , work_dzeata5onzf7rp26j2quaotjza 946 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 946 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 946 7 . . . work_dzeata5onzf7rp26j2quaotjza 947 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 947 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 947 3 , , , work_dzeata5onzf7rp26j2quaotjza 947 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 947 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 947 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 947 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 947 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 947 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 947 10 32/36 32/36 CD work_dzeata5onzf7rp26j2quaotjza 947 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 947 12 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 13 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 14 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 15 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 16 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 17 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 18 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 19 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 20 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 21 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 22 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 23 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 24 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 25 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 26 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 27 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 28 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 29 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 30 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 31 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 32 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 33 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 34 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 35 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 36 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 37 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 38 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 39 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 40 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 41 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 42 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 43 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 44 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 45 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 46 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 47 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 48 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 49 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 50 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 51 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 52 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 53 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 54 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 55 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 56 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 57 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 58 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 59 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 60 http://dl.acm.org/citation.cfm?id=2387880.2387886 http://dl.acm.org/citation.cfm?id=2387880.2387886 NNP work_dzeata5onzf7rp26j2quaotjza 947 61 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 62 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 63 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 64 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 65 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 66 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 67 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 68 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 69 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 70 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 71 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 72 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 73 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 74 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 75 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 76 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 77 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 78 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 79 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 80 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 81 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 82 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 83 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 84 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 85 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 86 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 87 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 88 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 89 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 90 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 91 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 92 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 93 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 94 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 95 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 96 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 97 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 98 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 99 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 100 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 101 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 102 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 103 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 104 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 105 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 106 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 107 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 108 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 109 http://dl.acm.org/citation.cfm?id=2362793.2362833 http://dl.acm.org/citation.cfm?id=2362793.2362833 NNP work_dzeata5onzf7rp26j2quaotjza 947 110 http://dx.doi.org/10.7326/0003-4819-113-1-69 http://dx.doi.org/10.7326/0003-4819-113-1-69 VBN work_dzeata5onzf7rp26j2quaotjza 947 111 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NNP work_dzeata5onzf7rp26j2quaotjza 947 112 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 113 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 114 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 115 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 116 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 117 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 118 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 119 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 120 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 121 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 122 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 123 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 124 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 125 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 126 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 127 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 128 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 129 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 130 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 131 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 132 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 133 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 134 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 135 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 136 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 137 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 138 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 139 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 140 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 141 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 142 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 143 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 144 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 145 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 146 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 147 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 148 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 149 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 150 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 151 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 152 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 153 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 154 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 155 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 156 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 157 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 158 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 159 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 160 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 161 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 162 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 163 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 164 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 165 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 166 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 167 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 168 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 169 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 170 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 171 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 172 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 173 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 174 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 175 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 176 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 177 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 178 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 179 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 180 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 181 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 182 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 183 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 184 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 185 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 186 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 187 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 188 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 189 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 190 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 191 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 192 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 193 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 194 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 195 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 196 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 197 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 198 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 199 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 200 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 201 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 202 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 203 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 204 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 205 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 206 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 207 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 208 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 209 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 210 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 211 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 212 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 213 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 214 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 215 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 216 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 217 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 218 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 219 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 220 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 221 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 222 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 223 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 224 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NN work_dzeata5onzf7rp26j2quaotjza 947 225 http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx http://blogs.msdn.com/b/vcblog/archive/2014/12/08/visual-studio-2015-preview-work-in-progress-security-feature.aspx NNS work_dzeata5onzf7rp26j2quaotjza 947 226 http://dx.doi.org/10.1002/smr.344 http://dx.doi.org/10.1002/smr.344 JJ work_dzeata5onzf7rp26j2quaotjza 947 227 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 JJ work_dzeata5onzf7rp26j2quaotjza 947 228 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 JJ work_dzeata5onzf7rp26j2quaotjza 947 229 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 JJ work_dzeata5onzf7rp26j2quaotjza 947 230 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 231 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 232 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 233 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 234 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 235 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 236 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 237 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 238 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 239 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 240 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 241 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 242 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 243 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 244 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 245 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 246 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 247 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 248 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 249 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 250 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 251 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 252 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 253 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 254 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 255 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 256 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 257 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 258 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 259 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 260 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 261 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 262 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 263 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 264 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 265 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 266 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 267 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 268 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 269 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 270 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 271 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 272 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 273 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 274 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 275 http://dl.acm.org/citation.cfm?id=2362793.2362832 http://dl.acm.org/citation.cfm?id=2362793.2362832 NNP work_dzeata5onzf7rp26j2quaotjza 947 276 http://dx.doi.org/10.1016/j.infsof.2008.09.009 http://dx.doi.org/10.1016/j.infsof.2008.09.009 NNP work_dzeata5onzf7rp26j2quaotjza 947 277 http://dx.doi.org/10.1109/MSP.2015.68 http://dx.doi.org/10.1109/MSP.2015.68 NNP work_dzeata5onzf7rp26j2quaotjza 947 278 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 947 279 ArXiv ArXiv NNP work_dzeata5onzf7rp26j2quaotjza 947 280 preprint preprint NN work_dzeata5onzf7rp26j2quaotjza 947 281 . . . work_dzeata5onzf7rp26j2quaotjza 948 1 arXiv:0910.5072 arXiv:0910.5072 NNP work_dzeata5onzf7rp26j2quaotjza 948 2 . . . work_dzeata5onzf7rp26j2quaotjza 949 1 Li Li NNP work_dzeata5onzf7rp26j2quaotjza 949 2 N N NNP work_dzeata5onzf7rp26j2quaotjza 949 3 , , , work_dzeata5onzf7rp26j2quaotjza 949 4 Mao Mao NNP work_dzeata5onzf7rp26j2quaotjza 949 5 Z Z NNP work_dzeata5onzf7rp26j2quaotjza 949 6 , , , work_dzeata5onzf7rp26j2quaotjza 949 7 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 949 8 H. H. NNP work_dzeata5onzf7rp26j2quaotjza 949 9 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 949 10 . . . work_dzeata5onzf7rp26j2quaotjza 950 1 Usable usable JJ work_dzeata5onzf7rp26j2quaotjza 950 2 mandatory mandatory JJ work_dzeata5onzf7rp26j2quaotjza 950 3 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 950 4 protection protection NN work_dzeata5onzf7rp26j2quaotjza 950 5 for for IN work_dzeata5onzf7rp26j2quaotjza 950 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 950 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 950 8 . . . work_dzeata5onzf7rp26j2quaotjza 951 1 In in IN work_dzeata5onzf7rp26j2quaotjza 951 2 : : : work_dzeata5onzf7rp26j2quaotjza 951 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 951 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 951 5 on on IN work_dzeata5onzf7rp26j2quaotjza 951 6 security security NN work_dzeata5onzf7rp26j2quaotjza 951 7 and and CC work_dzeata5onzf7rp26j2quaotjza 951 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 951 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 951 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 951 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 951 12 07 07 CD work_dzeata5onzf7rp26j2quaotjza 951 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 951 14 . . . work_dzeata5onzf7rp26j2quaotjza 952 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 952 2 , , , work_dzeata5onzf7rp26j2quaotjza 952 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 952 4 : : : work_dzeata5onzf7rp26j2quaotjza 952 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 952 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 952 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 952 8 , , , work_dzeata5onzf7rp26j2quaotjza 952 9 164–178 164–178 CD work_dzeata5onzf7rp26j2quaotjza 952 10 . . . work_dzeata5onzf7rp26j2quaotjza 953 1 Li Li NNP work_dzeata5onzf7rp26j2quaotjza 953 2 Y Y NNP work_dzeata5onzf7rp26j2quaotjza 953 3 , , , work_dzeata5onzf7rp26j2quaotjza 953 4 McCune McCune NNP work_dzeata5onzf7rp26j2quaotjza 953 5 J J NNP work_dzeata5onzf7rp26j2quaotjza 953 6 , , , work_dzeata5onzf7rp26j2quaotjza 953 7 Newsome Newsome NNP work_dzeata5onzf7rp26j2quaotjza 953 8 J J NNP work_dzeata5onzf7rp26j2quaotjza 953 9 , , , work_dzeata5onzf7rp26j2quaotjza 953 10 Perrig Perrig NNP work_dzeata5onzf7rp26j2quaotjza 953 11 A A NNP work_dzeata5onzf7rp26j2quaotjza 953 12 , , , work_dzeata5onzf7rp26j2quaotjza 953 13 Baker Baker NNP work_dzeata5onzf7rp26j2quaotjza 953 14 B B NNP work_dzeata5onzf7rp26j2quaotjza 953 15 , , , work_dzeata5onzf7rp26j2quaotjza 953 16 Drewry Drewry NNP work_dzeata5onzf7rp26j2quaotjza 953 17 W. W. NNP work_dzeata5onzf7rp26j2quaotjza 953 18 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 953 19 . . . work_dzeata5onzf7rp26j2quaotjza 954 1 MiniBox MiniBox NNP work_dzeata5onzf7rp26j2quaotjza 954 2 : : : work_dzeata5onzf7rp26j2quaotjza 954 3 a a DT work_dzeata5onzf7rp26j2quaotjza 954 4 two two CD work_dzeata5onzf7rp26j2quaotjza 954 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 954 6 way way NN work_dzeata5onzf7rp26j2quaotjza 954 7 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 954 8 for for IN work_dzeata5onzf7rp26j2quaotjza 954 9 x86 x86 NNP work_dzeata5onzf7rp26j2quaotjza 954 10 native native NNP work_dzeata5onzf7rp26j2quaotjza 954 11 code code NNP work_dzeata5onzf7rp26j2quaotjza 954 12 . . . work_dzeata5onzf7rp26j2quaotjza 955 1 In in IN work_dzeata5onzf7rp26j2quaotjza 955 2 : : : work_dzeata5onzf7rp26j2quaotjza 955 3 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 955 4 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 955 5 annual annual JJ work_dzeata5onzf7rp26j2quaotjza 955 6 technical technical JJ work_dzeata5onzf7rp26j2quaotjza 955 7 conference conference NN work_dzeata5onzf7rp26j2quaotjza 955 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 955 9 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 955 10 ATC ATC NNP work_dzeata5onzf7rp26j2quaotjza 955 11 14 14 CD work_dzeata5onzf7rp26j2quaotjza 955 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 955 13 . . . work_dzeata5onzf7rp26j2quaotjza 956 1 Philadelphia Philadelphia NNP work_dzeata5onzf7rp26j2quaotjza 956 2 : : : work_dzeata5onzf7rp26j2quaotjza 956 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 956 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 956 5 , , , work_dzeata5onzf7rp26j2quaotjza 956 6 409–420 409–420 NNP work_dzeata5onzf7rp26j2quaotjza 956 7 Available available JJ work_dzeata5onzf7rp26j2quaotjza 956 8 at at IN work_dzeata5onzf7rp26j2quaotjza 956 9 https://www.usenix.org/conference/ https://www.usenix.org/conference/ NNP work_dzeata5onzf7rp26j2quaotjza 956 10 atc14 atc14 NNS work_dzeata5onzf7rp26j2quaotjza 956 11 / / SYM work_dzeata5onzf7rp26j2quaotjza 956 12 technical technical JJ work_dzeata5onzf7rp26j2quaotjza 956 13 - - HYPH work_dzeata5onzf7rp26j2quaotjza 956 14 sessions session NNS work_dzeata5onzf7rp26j2quaotjza 956 15 / / SYM work_dzeata5onzf7rp26j2quaotjza 956 16 presentation presentation NNP work_dzeata5onzf7rp26j2quaotjza 956 17 / / SYM work_dzeata5onzf7rp26j2quaotjza 956 18 li li NNP work_dzeata5onzf7rp26j2quaotjza 956 19 yanlin yanlin NNP work_dzeata5onzf7rp26j2quaotjza 956 20 . . . work_dzeata5onzf7rp26j2quaotjza 957 1 Linn Linn NNP work_dzeata5onzf7rp26j2quaotjza 957 2 CM CM NNP work_dzeata5onzf7rp26j2quaotjza 957 3 , , , work_dzeata5onzf7rp26j2quaotjza 957 4 Rajagopalan Rajagopalan NNP work_dzeata5onzf7rp26j2quaotjza 957 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 957 6 , , , work_dzeata5onzf7rp26j2quaotjza 957 7 Baker Baker NNP work_dzeata5onzf7rp26j2quaotjza 957 8 S S NNP work_dzeata5onzf7rp26j2quaotjza 957 9 , , , work_dzeata5onzf7rp26j2quaotjza 957 10 Collberg Collberg NNP work_dzeata5onzf7rp26j2quaotjza 957 11 C C NNP work_dzeata5onzf7rp26j2quaotjza 957 12 , , , work_dzeata5onzf7rp26j2quaotjza 957 13 Debray Debray NNP work_dzeata5onzf7rp26j2quaotjza 957 14 SK SK NNP work_dzeata5onzf7rp26j2quaotjza 957 15 , , , work_dzeata5onzf7rp26j2quaotjza 957 16 Hartman Hartman NNP work_dzeata5onzf7rp26j2quaotjza 957 17 JH JH NNP work_dzeata5onzf7rp26j2quaotjza 957 18 . . . work_dzeata5onzf7rp26j2quaotjza 958 1 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 958 2 . . . work_dzeata5onzf7rp26j2quaotjza 959 1 Protecting protect VBG work_dzeata5onzf7rp26j2quaotjza 959 2 against against IN work_dzeata5onzf7rp26j2quaotjza 959 3 unexpected unexpected JJ work_dzeata5onzf7rp26j2quaotjza 959 4 system system NN work_dzeata5onzf7rp26j2quaotjza 959 5 calls call NNS work_dzeata5onzf7rp26j2quaotjza 959 6 . . . work_dzeata5onzf7rp26j2quaotjza 960 1 In in IN work_dzeata5onzf7rp26j2quaotjza 960 2 : : : work_dzeata5onzf7rp26j2quaotjza 960 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 960 4 security security NN work_dzeata5onzf7rp26j2quaotjza 960 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 960 6 SSYM’05 SSYM’05 NNP work_dzeata5onzf7rp26j2quaotjza 960 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 960 8 . . . work_dzeata5onzf7rp26j2quaotjza 961 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 961 2 : : : work_dzeata5onzf7rp26j2quaotjza 961 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 961 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 961 5 , , , work_dzeata5onzf7rp26j2quaotjza 961 6 16–16 16–16 CD work_dzeata5onzf7rp26j2quaotjza 961 7 . . . work_dzeata5onzf7rp26j2quaotjza 962 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 962 2 at at IN work_dzeata5onzf7rp26j2quaotjza 962 3 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 CD work_dzeata5onzf7rp26j2quaotjza 962 4 . . . work_dzeata5onzf7rp26j2quaotjza 963 1 Louw Louw NNP work_dzeata5onzf7rp26j2quaotjza 963 2 MT MT NNP work_dzeata5onzf7rp26j2quaotjza 963 3 , , , work_dzeata5onzf7rp26j2quaotjza 963 4 Ganesh Ganesh NNP work_dzeata5onzf7rp26j2quaotjza 963 5 KT KT NNP work_dzeata5onzf7rp26j2quaotjza 963 6 , , , work_dzeata5onzf7rp26j2quaotjza 963 7 Venkatakrishnan Venkatakrishnan NNP work_dzeata5onzf7rp26j2quaotjza 963 8 VN VN NNP work_dzeata5onzf7rp26j2quaotjza 963 9 . . . work_dzeata5onzf7rp26j2quaotjza 964 1 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 964 2 . . . work_dzeata5onzf7rp26j2quaotjza 965 1 AdJail adjail NN work_dzeata5onzf7rp26j2quaotjza 965 2 : : : work_dzeata5onzf7rp26j2quaotjza 965 3 practical practical JJ work_dzeata5onzf7rp26j2quaotjza 965 4 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 965 5 of of IN work_dzeata5onzf7rp26j2quaotjza 965 6 confidentiality confidentiality NN work_dzeata5onzf7rp26j2quaotjza 965 7 and and CC work_dzeata5onzf7rp26j2quaotjza 965 8 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 965 9 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 965 10 on on IN work_dzeata5onzf7rp26j2quaotjza 965 11 web web NN work_dzeata5onzf7rp26j2quaotjza 965 12 advertisements advertisement NNS work_dzeata5onzf7rp26j2quaotjza 965 13 . . . work_dzeata5onzf7rp26j2quaotjza 966 1 In in IN work_dzeata5onzf7rp26j2quaotjza 966 2 : : : work_dzeata5onzf7rp26j2quaotjza 966 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 966 4 security security NN work_dzeata5onzf7rp26j2quaotjza 966 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 966 6 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 966 7 security’10 security’10 NNP work_dzeata5onzf7rp26j2quaotjza 966 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 966 9 . . . work_dzeata5onzf7rp26j2quaotjza 967 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 967 2 : : : work_dzeata5onzf7rp26j2quaotjza 967 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 967 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 967 5 , , , work_dzeata5onzf7rp26j2quaotjza 967 6 24–24 24–24 CD work_dzeata5onzf7rp26j2quaotjza 967 7 . . . work_dzeata5onzf7rp26j2quaotjza 968 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 968 2 at at IN work_dzeata5onzf7rp26j2quaotjza 968 3 http://dl.acm.org/citation.cfm http://dl.acm.org/citation.cfm NNP work_dzeata5onzf7rp26j2quaotjza 968 4 ? ? . work_dzeata5onzf7rp26j2quaotjza 969 1 id=1929820.1929852 id=1929820.1929852 NNP work_dzeata5onzf7rp26j2quaotjza 969 2 . . . work_dzeata5onzf7rp26j2quaotjza 970 1 Louw Louw NNP work_dzeata5onzf7rp26j2quaotjza 970 2 MT MT NNP work_dzeata5onzf7rp26j2quaotjza 970 3 , , , work_dzeata5onzf7rp26j2quaotjza 970 4 Venkatakrishnan Venkatakrishnan NNP work_dzeata5onzf7rp26j2quaotjza 970 5 VN VN NNP work_dzeata5onzf7rp26j2quaotjza 970 6 . . . work_dzeata5onzf7rp26j2quaotjza 971 1 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 971 2 . . . work_dzeata5onzf7rp26j2quaotjza 972 1 Blueprint blueprint NN work_dzeata5onzf7rp26j2quaotjza 972 2 : : : work_dzeata5onzf7rp26j2quaotjza 972 3 robust robust JJ work_dzeata5onzf7rp26j2quaotjza 972 4 prevention prevention NN work_dzeata5onzf7rp26j2quaotjza 972 5 of of IN work_dzeata5onzf7rp26j2quaotjza 972 6 cross cross JJ work_dzeata5onzf7rp26j2quaotjza 972 7 - - JJ work_dzeata5onzf7rp26j2quaotjza 972 8 site site NN work_dzeata5onzf7rp26j2quaotjza 972 9 scripting scripting NN work_dzeata5onzf7rp26j2quaotjza 972 10 attacks attack NNS work_dzeata5onzf7rp26j2quaotjza 972 11 for for IN work_dzeata5onzf7rp26j2quaotjza 972 12 existing exist VBG work_dzeata5onzf7rp26j2quaotjza 972 13 browsers browser NNS work_dzeata5onzf7rp26j2quaotjza 972 14 . . . work_dzeata5onzf7rp26j2quaotjza 973 1 In in IN work_dzeata5onzf7rp26j2quaotjza 973 2 : : : work_dzeata5onzf7rp26j2quaotjza 973 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 973 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 973 5 on on IN work_dzeata5onzf7rp26j2quaotjza 973 6 security security NN work_dzeata5onzf7rp26j2quaotjza 973 7 and and CC work_dzeata5onzf7rp26j2quaotjza 973 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 973 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 973 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 973 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 973 12 09 09 CD work_dzeata5onzf7rp26j2quaotjza 973 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 973 14 . . . work_dzeata5onzf7rp26j2quaotjza 974 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 974 2 , , , work_dzeata5onzf7rp26j2quaotjza 974 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 974 4 : : : work_dzeata5onzf7rp26j2quaotjza 974 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 974 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 974 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 974 8 , , , work_dzeata5onzf7rp26j2quaotjza 974 9 331–346 331–346 CD work_dzeata5onzf7rp26j2quaotjza 974 10 . . . work_dzeata5onzf7rp26j2quaotjza 975 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 975 2 M M NNP work_dzeata5onzf7rp26j2quaotjza 975 3 , , , work_dzeata5onzf7rp26j2quaotjza 975 4 Scherlis Scherlis NNP work_dzeata5onzf7rp26j2quaotjza 975 5 WL WL NNP work_dzeata5onzf7rp26j2quaotjza 975 6 , , , work_dzeata5onzf7rp26j2quaotjza 975 7 Aldrich Aldrich NNP work_dzeata5onzf7rp26j2quaotjza 975 8 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 976 1 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 976 2 . . . work_dzeata5onzf7rp26j2quaotjza 977 1 In in IN work_dzeata5onzf7rp26j2quaotjza 977 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 977 3 nimbo nimbo NN work_dzeata5onzf7rp26j2quaotjza 977 4 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 977 5 . . . work_dzeata5onzf7rp26j2quaotjza 978 1 In in IN work_dzeata5onzf7rp26j2quaotjza 978 2 : : : work_dzeata5onzf7rp26j2quaotjza 978 3 Symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 978 4 and and CC work_dzeata5onzf7rp26j2quaotjza 978 5 bootcamp bootcamp VB work_dzeata5onzf7rp26j2quaotjza 978 6 on on IN work_dzeata5onzf7rp26j2quaotjza 978 7 the the DT work_dzeata5onzf7rp26j2quaotjza 978 8 science science NN work_dzeata5onzf7rp26j2quaotjza 978 9 of of IN work_dzeata5onzf7rp26j2quaotjza 978 10 security security NN work_dzeata5onzf7rp26j2quaotjza 978 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 978 12 HotSoS HotSoS NNP work_dzeata5onzf7rp26j2quaotjza 978 13 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 978 14 14 14 CD work_dzeata5onzf7rp26j2quaotjza 978 15 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 978 16 . . . work_dzeata5onzf7rp26j2quaotjza 979 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 979 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 979 3 : : : work_dzeata5onzf7rp26j2quaotjza 979 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 979 5 , , , work_dzeata5onzf7rp26j2quaotjza 979 6 12 12 CD work_dzeata5onzf7rp26j2quaotjza 979 7 pages page NNS work_dzeata5onzf7rp26j2quaotjza 979 8 , , , work_dzeata5onzf7rp26j2quaotjza 979 9 Article article NN work_dzeata5onzf7rp26j2quaotjza 979 10 1 1 CD work_dzeata5onzf7rp26j2quaotjza 979 11 . . . work_dzeata5onzf7rp26j2quaotjza 980 1 Maechler Maechler NNP work_dzeata5onzf7rp26j2quaotjza 980 2 M M NNP work_dzeata5onzf7rp26j2quaotjza 980 3 , , , work_dzeata5onzf7rp26j2quaotjza 980 4 Rousseeuw Rousseeuw NNP work_dzeata5onzf7rp26j2quaotjza 980 5 P P NNP work_dzeata5onzf7rp26j2quaotjza 980 6 , , , work_dzeata5onzf7rp26j2quaotjza 980 7 Struyf Struyf NNP work_dzeata5onzf7rp26j2quaotjza 980 8 A A NNP work_dzeata5onzf7rp26j2quaotjza 980 9 , , , work_dzeata5onzf7rp26j2quaotjza 980 10 Hubert Hubert NNP work_dzeata5onzf7rp26j2quaotjza 980 11 M M NNP work_dzeata5onzf7rp26j2quaotjza 980 12 , , , work_dzeata5onzf7rp26j2quaotjza 980 13 Hornik Hornik NNP work_dzeata5onzf7rp26j2quaotjza 980 14 K. K. NNP work_dzeata5onzf7rp26j2quaotjza 980 15 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 980 16 . . . work_dzeata5onzf7rp26j2quaotjza 981 1 Cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 981 2 : : : work_dzeata5onzf7rp26j2quaotjza 981 3 cluster cluster NN work_dzeata5onzf7rp26j2quaotjza 981 4 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 981 5 basics basic NNS work_dzeata5onzf7rp26j2quaotjza 981 6 and and CC work_dzeata5onzf7rp26j2quaotjza 981 7 extensions extension NNS work_dzeata5onzf7rp26j2quaotjza 981 8 . . . work_dzeata5onzf7rp26j2quaotjza 982 1 R r NN work_dzeata5onzf7rp26j2quaotjza 982 2 package package NN work_dzeata5onzf7rp26j2quaotjza 982 3 version version NN work_dzeata5onzf7rp26j2quaotjza 982 4 1.15.2 1.15.2 CD work_dzeata5onzf7rp26j2quaotjza 982 5 . . . work_dzeata5onzf7rp26j2quaotjza 983 1 Vienna Vienna NNP work_dzeata5onzf7rp26j2quaotjza 983 2 : : : work_dzeata5onzf7rp26j2quaotjza 983 3 R R NNP work_dzeata5onzf7rp26j2quaotjza 983 4 Foundation Foundation NNP work_dzeata5onzf7rp26j2quaotjza 983 5 for for IN work_dzeata5onzf7rp26j2quaotjza 983 6 Statistical Statistical NNP work_dzeata5onzf7rp26j2quaotjza 983 7 Computing Computing NNP work_dzeata5onzf7rp26j2quaotjza 983 8 . . . work_dzeata5onzf7rp26j2quaotjza 984 1 For for IN work_dzeata5onzf7rp26j2quaotjza 984 2 new new JJ work_dzeata5onzf7rp26j2quaotjza 984 3 features feature NNS work_dzeata5onzf7rp26j2quaotjza 984 4 , , , work_dzeata5onzf7rp26j2quaotjza 984 5 see see VB work_dzeata5onzf7rp26j2quaotjza 984 6 the the DT work_dzeata5onzf7rp26j2quaotjza 984 7 ‘ ' `` work_dzeata5onzf7rp26j2quaotjza 984 8 Changelog Changelog NNP work_dzeata5onzf7rp26j2quaotjza 984 9 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 984 10 file file NN work_dzeata5onzf7rp26j2quaotjza 984 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 984 12 in in IN work_dzeata5onzf7rp26j2quaotjza 984 13 the the DT work_dzeata5onzf7rp26j2quaotjza 984 14 package package NN work_dzeata5onzf7rp26j2quaotjza 984 15 source source NN work_dzeata5onzf7rp26j2quaotjza 984 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 984 17 . . . work_dzeata5onzf7rp26j2quaotjza 985 1 Mao Mao NNP work_dzeata5onzf7rp26j2quaotjza 985 2 Y Y NNP work_dzeata5onzf7rp26j2quaotjza 985 3 , , , work_dzeata5onzf7rp26j2quaotjza 985 4 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 985 5 H H NNP work_dzeata5onzf7rp26j2quaotjza 985 6 , , , work_dzeata5onzf7rp26j2quaotjza 985 7 Zhou Zhou NNP work_dzeata5onzf7rp26j2quaotjza 985 8 D D NNP work_dzeata5onzf7rp26j2quaotjza 985 9 , , , work_dzeata5onzf7rp26j2quaotjza 985 10 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 985 11 X X NNP work_dzeata5onzf7rp26j2quaotjza 985 12 , , , work_dzeata5onzf7rp26j2quaotjza 985 13 Zeldovich Zeldovich NNP work_dzeata5onzf7rp26j2quaotjza 985 14 N N NNP work_dzeata5onzf7rp26j2quaotjza 985 15 , , , work_dzeata5onzf7rp26j2quaotjza 985 16 Kaashoek Kaashoek NNP work_dzeata5onzf7rp26j2quaotjza 985 17 MF MF NNP work_dzeata5onzf7rp26j2quaotjza 985 18 . . . work_dzeata5onzf7rp26j2quaotjza 986 1 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 986 2 . . . work_dzeata5onzf7rp26j2quaotjza 987 1 Software software NN work_dzeata5onzf7rp26j2quaotjza 987 2 fault fault NN work_dzeata5onzf7rp26j2quaotjza 987 3 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 987 4 with with IN work_dzeata5onzf7rp26j2quaotjza 987 5 API api NN work_dzeata5onzf7rp26j2quaotjza 987 6 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 987 7 and and CC work_dzeata5onzf7rp26j2quaotjza 987 8 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 987 9 - - JJ work_dzeata5onzf7rp26j2quaotjza 987 10 principal principal JJ work_dzeata5onzf7rp26j2quaotjza 987 11 modules module NNS work_dzeata5onzf7rp26j2quaotjza 987 12 . . . work_dzeata5onzf7rp26j2quaotjza 988 1 In in IN work_dzeata5onzf7rp26j2quaotjza 988 2 : : : work_dzeata5onzf7rp26j2quaotjza 988 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 988 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 988 5 on on IN work_dzeata5onzf7rp26j2quaotjza 988 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 988 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 988 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 988 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 988 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 988 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 988 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 988 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 988 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 988 15 11 11 CD work_dzeata5onzf7rp26j2quaotjza 988 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 988 17 . . . work_dzeata5onzf7rp26j2quaotjza 989 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 989 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 989 3 : : : work_dzeata5onzf7rp26j2quaotjza 989 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 989 5 , , , work_dzeata5onzf7rp26j2quaotjza 989 6 115–128 115–128 CD work_dzeata5onzf7rp26j2quaotjza 989 7 . . . work_dzeata5onzf7rp26j2quaotjza 990 1 Mauczka Mauczka NNP work_dzeata5onzf7rp26j2quaotjza 990 2 A A NNP work_dzeata5onzf7rp26j2quaotjza 990 3 , , , work_dzeata5onzf7rp26j2quaotjza 990 4 Schanes Schanes NNP work_dzeata5onzf7rp26j2quaotjza 990 5 C C NNP work_dzeata5onzf7rp26j2quaotjza 990 6 , , , work_dzeata5onzf7rp26j2quaotjza 990 7 Fankhauser Fankhauser NNP work_dzeata5onzf7rp26j2quaotjza 990 8 F F NNP work_dzeata5onzf7rp26j2quaotjza 990 9 , , , work_dzeata5onzf7rp26j2quaotjza 990 10 Bernhart Bernhart NNP work_dzeata5onzf7rp26j2quaotjza 990 11 M M NNP work_dzeata5onzf7rp26j2quaotjza 990 12 , , , work_dzeata5onzf7rp26j2quaotjza 990 13 Grechenig Grechenig NNP work_dzeata5onzf7rp26j2quaotjza 990 14 T. T. NNP work_dzeata5onzf7rp26j2quaotjza 990 15 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 990 16 . . . work_dzeata5onzf7rp26j2quaotjza 991 1 Mining mining NN work_dzeata5onzf7rp26j2quaotjza 991 2 security security NN work_dzeata5onzf7rp26j2quaotjza 991 3 changes change VBZ work_dzeata5onzf7rp26j2quaotjza 991 4 in in IN work_dzeata5onzf7rp26j2quaotjza 991 5 FreeBSD freebsd PRP work_dzeata5onzf7rp26j2quaotjza 991 6 . . . work_dzeata5onzf7rp26j2quaotjza 992 1 In in IN work_dzeata5onzf7rp26j2quaotjza 992 2 : : : work_dzeata5onzf7rp26j2quaotjza 992 3 Mining mining NN work_dzeata5onzf7rp26j2quaotjza 992 4 software software NN work_dzeata5onzf7rp26j2quaotjza 992 5 repositories repository NNS work_dzeata5onzf7rp26j2quaotjza 992 6 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 992 7 MSR MSR NNP work_dzeata5onzf7rp26j2quaotjza 992 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 992 9 . . . work_dzeata5onzf7rp26j2quaotjza 993 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 993 2 , , , work_dzeata5onzf7rp26j2quaotjza 993 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 993 4 : : : work_dzeata5onzf7rp26j2quaotjza 993 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 993 6 , , , work_dzeata5onzf7rp26j2quaotjza 993 7 90–93 90–93 CD work_dzeata5onzf7rp26j2quaotjza 993 8 . . . work_dzeata5onzf7rp26j2quaotjza 994 1 McCamant McCamant NNP work_dzeata5onzf7rp26j2quaotjza 994 2 S S NNP work_dzeata5onzf7rp26j2quaotjza 994 3 , , , work_dzeata5onzf7rp26j2quaotjza 994 4 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 994 5 G. G. NNP work_dzeata5onzf7rp26j2quaotjza 994 6 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 994 7 . . . work_dzeata5onzf7rp26j2quaotjza 995 1 Evaluating evaluate VBG work_dzeata5onzf7rp26j2quaotjza 995 2 SFI SFI NNP work_dzeata5onzf7rp26j2quaotjza 995 3 for for IN work_dzeata5onzf7rp26j2quaotjza 995 4 a a DT work_dzeata5onzf7rp26j2quaotjza 995 5 CISC cisc JJ work_dzeata5onzf7rp26j2quaotjza 995 6 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 995 7 . . . work_dzeata5onzf7rp26j2quaotjza 996 1 In in IN work_dzeata5onzf7rp26j2quaotjza 996 2 : : : work_dzeata5onzf7rp26j2quaotjza 996 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 996 4 security security NN work_dzeata5onzf7rp26j2quaotjza 996 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 996 6 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 996 7 - - HYPH work_dzeata5onzf7rp26j2quaotjza 996 8 SS’06 SS’06 NNP work_dzeata5onzf7rp26j2quaotjza 996 9 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 996 10 . . . work_dzeata5onzf7rp26j2quaotjza 997 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 997 2 : : : work_dzeata5onzf7rp26j2quaotjza 997 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 997 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 997 5 , , , work_dzeata5onzf7rp26j2quaotjza 997 6 16 16 CD work_dzeata5onzf7rp26j2quaotjza 997 7 pages page NNS work_dzeata5onzf7rp26j2quaotjza 997 8 , , , work_dzeata5onzf7rp26j2quaotjza 997 9 Article Article NNP work_dzeata5onzf7rp26j2quaotjza 997 10 15 15 CD work_dzeata5onzf7rp26j2quaotjza 997 11 . . . work_dzeata5onzf7rp26j2quaotjza 998 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 998 2 at at IN work_dzeata5onzf7rp26j2quaotjza 998 3 http://dl.acm http://dl.acm NN work_dzeata5onzf7rp26j2quaotjza 998 4 . . . work_dzeata5onzf7rp26j2quaotjza 999 1 org org NNP work_dzeata5onzf7rp26j2quaotjza 999 2 / / SYM work_dzeata5onzf7rp26j2quaotjza 999 3 citation.cfm?id=1267336.1267351 citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 999 4 . . . work_dzeata5onzf7rp26j2quaotjza 1000 1 McCune McCune NNP work_dzeata5onzf7rp26j2quaotjza 1000 2 JM JM NNP work_dzeata5onzf7rp26j2quaotjza 1000 3 , , , work_dzeata5onzf7rp26j2quaotjza 1000 4 Li Li NNP work_dzeata5onzf7rp26j2quaotjza 1000 5 Y Y NNP work_dzeata5onzf7rp26j2quaotjza 1000 6 , , , work_dzeata5onzf7rp26j2quaotjza 1000 7 Qu Qu NNP work_dzeata5onzf7rp26j2quaotjza 1000 8 N N NNP work_dzeata5onzf7rp26j2quaotjza 1000 9 , , , work_dzeata5onzf7rp26j2quaotjza 1000 10 Zhou Zhou NNP work_dzeata5onzf7rp26j2quaotjza 1000 11 Z Z NNP work_dzeata5onzf7rp26j2quaotjza 1000 12 , , , work_dzeata5onzf7rp26j2quaotjza 1000 13 Datta Datta NNP work_dzeata5onzf7rp26j2quaotjza 1000 14 A A NNP work_dzeata5onzf7rp26j2quaotjza 1000 15 , , , work_dzeata5onzf7rp26j2quaotjza 1000 16 Gligor Gligor NNP work_dzeata5onzf7rp26j2quaotjza 1000 17 V V NNP work_dzeata5onzf7rp26j2quaotjza 1000 18 , , , work_dzeata5onzf7rp26j2quaotjza 1000 19 Perrig Perrig NNP work_dzeata5onzf7rp26j2quaotjza 1000 20 A. A. NNP work_dzeata5onzf7rp26j2quaotjza 1001 1 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 1001 2 . . . work_dzeata5onzf7rp26j2quaotjza 1002 1 TrustVisor trustvisor VB work_dzeata5onzf7rp26j2quaotjza 1002 2 : : : work_dzeata5onzf7rp26j2quaotjza 1002 3 efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 1002 4 TCB TCB NNP work_dzeata5onzf7rp26j2quaotjza 1002 5 reduction reduction NN work_dzeata5onzf7rp26j2quaotjza 1002 6 and and CC work_dzeata5onzf7rp26j2quaotjza 1002 7 attestation attestation NN work_dzeata5onzf7rp26j2quaotjza 1002 8 . . . work_dzeata5onzf7rp26j2quaotjza 1003 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1003 2 : : : work_dzeata5onzf7rp26j2quaotjza 1003 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1003 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1003 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1003 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1003 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1003 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1003 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1003 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1003 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1003 12 10 10 CD work_dzeata5onzf7rp26j2quaotjza 1003 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1003 14 . . . work_dzeata5onzf7rp26j2quaotjza 1004 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1004 2 , , , work_dzeata5onzf7rp26j2quaotjza 1004 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 1004 4 : : : work_dzeata5onzf7rp26j2quaotjza 1004 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1004 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1004 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1004 8 , , , work_dzeata5onzf7rp26j2quaotjza 1004 9 143–158 143–158 CD work_dzeata5onzf7rp26j2quaotjza 1004 10 . . . work_dzeata5onzf7rp26j2quaotjza 1005 1 McLean McLean NNP work_dzeata5onzf7rp26j2quaotjza 1005 2 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 1006 1 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 1006 2 . . . work_dzeata5onzf7rp26j2quaotjza 1007 1 Is be VBZ work_dzeata5onzf7rp26j2quaotjza 1007 2 the the DT work_dzeata5onzf7rp26j2quaotjza 1007 3 trusted trust VBN work_dzeata5onzf7rp26j2quaotjza 1007 4 computing computing NN work_dzeata5onzf7rp26j2quaotjza 1007 5 base base NN work_dzeata5onzf7rp26j2quaotjza 1007 6 concept concept NN work_dzeata5onzf7rp26j2quaotjza 1007 7 fundamentally fundamentally RB work_dzeata5onzf7rp26j2quaotjza 1007 8 flawed flawed JJ work_dzeata5onzf7rp26j2quaotjza 1007 9 ? ? . work_dzeata5onzf7rp26j2quaotjza 1008 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1008 2 : : : work_dzeata5onzf7rp26j2quaotjza 1008 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1008 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1008 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1008 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1008 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1008 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1008 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1008 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1008 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1008 12 97 97 CD work_dzeata5onzf7rp26j2quaotjza 1008 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1008 14 . . . work_dzeata5onzf7rp26j2quaotjza 1009 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1009 2 , , , work_dzeata5onzf7rp26j2quaotjza 1009 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 1009 4 : : : work_dzeata5onzf7rp26j2quaotjza 1009 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1009 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1009 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1009 8 , , , work_dzeata5onzf7rp26j2quaotjza 1009 9 2 2 CD work_dzeata5onzf7rp26j2quaotjza 1009 10 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1009 11 at at IN work_dzeata5onzf7rp26j2quaotjza 1009 12 http:/ http:/ NNP work_dzeata5onzf7rp26j2quaotjza 1009 13 /dl.acm.org /dl.acm.org NNP work_dzeata5onzf7rp26j2quaotjza 1009 14 / / SYM work_dzeata5onzf7rp26j2quaotjza 1009 15 citation.cfm?id=882493.884390 citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1009 16 . . . work_dzeata5onzf7rp26j2quaotjza 1010 1 Meyerovich Meyerovich NNP work_dzeata5onzf7rp26j2quaotjza 1010 2 LA LA NNP work_dzeata5onzf7rp26j2quaotjza 1010 3 , , , work_dzeata5onzf7rp26j2quaotjza 1010 4 Livshits Livshits NNP work_dzeata5onzf7rp26j2quaotjza 1010 5 B. B. NNP work_dzeata5onzf7rp26j2quaotjza 1011 1 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 1011 2 . . . work_dzeata5onzf7rp26j2quaotjza 1012 1 Conscript conscript NN work_dzeata5onzf7rp26j2quaotjza 1012 2 : : : work_dzeata5onzf7rp26j2quaotjza 1012 3 specifying specify VBG work_dzeata5onzf7rp26j2quaotjza 1012 4 and and CC work_dzeata5onzf7rp26j2quaotjza 1012 5 enforcing enforce VBG work_dzeata5onzf7rp26j2quaotjza 1012 6 fine fine RB work_dzeata5onzf7rp26j2quaotjza 1012 7 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1012 8 grained grain VBN work_dzeata5onzf7rp26j2quaotjza 1012 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1012 10 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 1012 11 for for IN work_dzeata5onzf7rp26j2quaotjza 1012 12 javascript javascript NNP work_dzeata5onzf7rp26j2quaotjza 1012 13 in in IN work_dzeata5onzf7rp26j2quaotjza 1012 14 the the DT work_dzeata5onzf7rp26j2quaotjza 1012 15 browser browser NN work_dzeata5onzf7rp26j2quaotjza 1012 16 . . . work_dzeata5onzf7rp26j2quaotjza 1013 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1013 2 : : : work_dzeata5onzf7rp26j2quaotjza 1013 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1013 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1013 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1013 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1013 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1013 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1013 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1013 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1013 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1013 12 10 10 CD work_dzeata5onzf7rp26j2quaotjza 1013 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1013 14 . . . work_dzeata5onzf7rp26j2quaotjza 1014 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1014 2 , , , work_dzeata5onzf7rp26j2quaotjza 1014 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1014 4 : : : work_dzeata5onzf7rp26j2quaotjza 1014 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1014 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1014 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1014 8 , , , work_dzeata5onzf7rp26j2quaotjza 1014 9 481–496 481–496 CD work_dzeata5onzf7rp26j2quaotjza 1014 10 . . . work_dzeata5onzf7rp26j2quaotjza 1015 1 Mickens Mickens NNP work_dzeata5onzf7rp26j2quaotjza 1015 2 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 1016 1 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 1016 2 . . . work_dzeata5onzf7rp26j2quaotjza 1017 1 Pivot pivot NN work_dzeata5onzf7rp26j2quaotjza 1017 2 : : : work_dzeata5onzf7rp26j2quaotjza 1017 3 fast fast RB work_dzeata5onzf7rp26j2quaotjza 1017 4 , , , work_dzeata5onzf7rp26j2quaotjza 1017 5 synchronous synchronous JJ work_dzeata5onzf7rp26j2quaotjza 1017 6 mashup mashup JJ work_dzeata5onzf7rp26j2quaotjza 1017 7 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 1017 8 using use VBG work_dzeata5onzf7rp26j2quaotjza 1017 9 generator generator NN work_dzeata5onzf7rp26j2quaotjza 1017 10 chains chain NNS work_dzeata5onzf7rp26j2quaotjza 1017 11 . . . work_dzeata5onzf7rp26j2quaotjza 1018 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1018 2 : : : work_dzeata5onzf7rp26j2quaotjza 1018 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1018 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1018 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1018 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1018 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1018 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1018 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1018 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1018 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1018 12 14 14 CD work_dzeata5onzf7rp26j2quaotjza 1018 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1018 14 . . . work_dzeata5onzf7rp26j2quaotjza 1019 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1019 2 , , , work_dzeata5onzf7rp26j2quaotjza 1019 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1019 4 : : : work_dzeata5onzf7rp26j2quaotjza 1019 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1019 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1019 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1019 8 , , , work_dzeata5onzf7rp26j2quaotjza 1019 9 261–275 261–275 CD work_dzeata5onzf7rp26j2quaotjza 1019 10 . . . work_dzeata5onzf7rp26j2quaotjza 1020 1 Moshchuk Moshchuk NNP work_dzeata5onzf7rp26j2quaotjza 1020 2 A A NNP work_dzeata5onzf7rp26j2quaotjza 1020 3 , , , work_dzeata5onzf7rp26j2quaotjza 1020 4 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 1020 5 HJ HJ NNP work_dzeata5onzf7rp26j2quaotjza 1020 6 , , , work_dzeata5onzf7rp26j2quaotjza 1020 7 Liu Liu NNP work_dzeata5onzf7rp26j2quaotjza 1020 8 Y. Y. NNP work_dzeata5onzf7rp26j2quaotjza 1021 1 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1021 2 . . . work_dzeata5onzf7rp26j2quaotjza 1022 1 Content content NN work_dzeata5onzf7rp26j2quaotjza 1022 2 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1022 3 based base VBN work_dzeata5onzf7rp26j2quaotjza 1022 4 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 1022 5 : : : work_dzeata5onzf7rp26j2quaotjza 1022 6 rethinking rethink VBG work_dzeata5onzf7rp26j2quaotjza 1022 7 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 1022 8 policy policy NN work_dzeata5onzf7rp26j2quaotjza 1022 9 design design NN work_dzeata5onzf7rp26j2quaotjza 1022 10 on on IN work_dzeata5onzf7rp26j2quaotjza 1022 11 client client NN work_dzeata5onzf7rp26j2quaotjza 1022 12 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1022 13 . . . work_dzeata5onzf7rp26j2quaotjza 1023 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1023 2 : : : work_dzeata5onzf7rp26j2quaotjza 1023 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1023 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1023 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1023 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1023 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1023 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1023 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1023 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1023 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1023 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1023 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1023 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1023 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1023 16 13 13 CD work_dzeata5onzf7rp26j2quaotjza 1023 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1023 18 . . . work_dzeata5onzf7rp26j2quaotjza 1024 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1024 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1024 3 : : : work_dzeata5onzf7rp26j2quaotjza 1024 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1024 5 , , , work_dzeata5onzf7rp26j2quaotjza 1024 6 1167–1180 1167–1180 CD work_dzeata5onzf7rp26j2quaotjza 1024 7 . . . work_dzeata5onzf7rp26j2quaotjza 1025 1 Neumann Neumann NNP work_dzeata5onzf7rp26j2quaotjza 1025 2 PG PG NNP work_dzeata5onzf7rp26j2quaotjza 1025 3 . . . work_dzeata5onzf7rp26j2quaotjza 1026 1 1990 1990 CD work_dzeata5onzf7rp26j2quaotjza 1026 2 . . . work_dzeata5onzf7rp26j2quaotjza 1027 1 Inside inside IN work_dzeata5onzf7rp26j2quaotjza 1027 2 risks risk NNS work_dzeata5onzf7rp26j2quaotjza 1027 3 : : : work_dzeata5onzf7rp26j2quaotjza 1027 4 insecurity insecurity NN work_dzeata5onzf7rp26j2quaotjza 1027 5 about about IN work_dzeata5onzf7rp26j2quaotjza 1027 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1027 7 ? ? . work_dzeata5onzf7rp26j2quaotjza 1028 1 Communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1028 2 of of IN work_dzeata5onzf7rp26j2quaotjza 1028 3 the the DT work_dzeata5onzf7rp26j2quaotjza 1028 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1028 5 33:170–170 33:170–170 CD work_dzeata5onzf7rp26j2quaotjza 1028 6 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1028 7 10.1145/79173.79113 10.1145/79173.79113 CD work_dzeata5onzf7rp26j2quaotjza 1028 8 . . . work_dzeata5onzf7rp26j2quaotjza 1029 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 1029 2 et et FW work_dzeata5onzf7rp26j2quaotjza 1029 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 1029 4 . . . work_dzeata5onzf7rp26j2quaotjza 1030 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1030 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 1030 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1030 4 , , , work_dzeata5onzf7rp26j2quaotjza 1030 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 1030 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 1030 7 . . . work_dzeata5onzf7rp26j2quaotjza 1031 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 1031 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 1031 3 , , , work_dzeata5onzf7rp26j2quaotjza 1031 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1031 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 1031 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 1031 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 1031 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1031 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1031 10 33/36 33/36 CD work_dzeata5onzf7rp26j2quaotjza 1031 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ VBG work_dzeata5onzf7rp26j2quaotjza 1031 12 http://arxiv.org/abs/0910.5072 http://arxiv.org/abs/0910.5072 NNP work_dzeata5onzf7rp26j2quaotjza 1031 13 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 14 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 15 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 16 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 17 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 18 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 19 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 20 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 21 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 22 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 23 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 24 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 25 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 26 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 27 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 28 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 29 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 30 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 31 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 32 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 33 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 34 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 35 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 36 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 37 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 38 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 39 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 40 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 41 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 42 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 43 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 44 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 45 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 46 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 47 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 48 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 49 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 50 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 51 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 52 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 53 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 54 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 55 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 56 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 57 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 58 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 59 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 60 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 61 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 62 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 63 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 64 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 65 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 66 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 67 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 68 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 69 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 70 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 71 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 72 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 73 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 74 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 75 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 76 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 77 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 78 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 79 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 80 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 81 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 82 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 83 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 84 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 85 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 86 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 87 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 88 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 89 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 90 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 91 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 92 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 93 https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin https://www.usenix.org/conference/atc14/technical-sessions/presentation/li_yanlin NN work_dzeata5onzf7rp26j2quaotjza 1031 94 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 95 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 96 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 97 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 98 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 99 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 100 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 101 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 102 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 103 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 104 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 105 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 106 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 107 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 108 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 109 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 110 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 111 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 112 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 113 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 114 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 115 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 116 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 117 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 118 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 119 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 120 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 121 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 122 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 123 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 124 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 125 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 126 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 127 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 128 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 129 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 130 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 131 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 132 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 133 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 134 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 135 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 136 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 137 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 138 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 139 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 140 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 141 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 NN work_dzeata5onzf7rp26j2quaotjza 1031 142 http://dl.acm.org/citation.cfm?id=1251398.1251414 http://dl.acm.org/citation.cfm?id=1251398.1251414 FW work_dzeata5onzf7rp26j2quaotjza 1031 143 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 144 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 145 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 -LRB- work_dzeata5onzf7rp26j2quaotjza 1031 146 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 147 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 148 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 149 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 150 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 151 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 152 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 153 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 154 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 155 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 156 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 157 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 158 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 159 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 160 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 161 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 162 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 163 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 164 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 165 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 166 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 167 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 168 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 169 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 170 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 171 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 172 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 173 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 174 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 175 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 176 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 177 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 178 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 179 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 180 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 181 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 182 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 183 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 184 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 185 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 186 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 187 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 188 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 189 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 190 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 FW work_dzeata5onzf7rp26j2quaotjza 1031 191 http://dl.acm.org/citation.cfm?id=1929820.1929852 http://dl.acm.org/citation.cfm?id=1929820.1929852 -LRB- work_dzeata5onzf7rp26j2quaotjza 1031 192 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 193 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 194 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 195 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 196 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 197 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 198 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 199 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 200 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 201 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 202 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 203 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 204 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 205 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 206 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 207 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 208 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 209 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 210 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 211 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 212 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 213 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 214 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 215 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 216 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 217 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 218 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 219 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 220 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 221 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 222 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 223 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 224 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 225 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 226 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 227 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 228 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 229 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 230 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 231 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 232 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 233 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 234 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 235 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 236 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 237 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 238 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 239 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 NNP work_dzeata5onzf7rp26j2quaotjza 1031 240 http://dl.acm.org/citation.cfm?id=1267336.1267351 http://dl.acm.org/citation.cfm?id=1267336.1267351 UH work_dzeata5onzf7rp26j2quaotjza 1031 241 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 VB work_dzeata5onzf7rp26j2quaotjza 1031 242 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 243 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 244 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 245 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 246 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 247 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 248 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 249 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 250 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 251 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 252 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 253 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 254 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 255 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 256 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 257 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 258 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 259 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 260 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 261 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 262 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 263 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 264 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 265 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 266 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 267 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 268 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 269 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 270 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 271 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 272 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 273 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 274 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 275 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 276 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 277 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 278 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 279 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 280 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 281 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 282 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 283 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 284 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 285 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 286 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 287 http://dl.acm.org/citation.cfm?id=882493.884390 http://dl.acm.org/citation.cfm?id=882493.884390 NNP work_dzeata5onzf7rp26j2quaotjza 1031 288 http://dx.doi.org/10.1145/79173.79113 http://dx.doi.org/10.1145/79173.79113 NNP work_dzeata5onzf7rp26j2quaotjza 1031 289 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1031 290 Nguyen Nguyen NNP work_dzeata5onzf7rp26j2quaotjza 1031 291 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1031 292 Tuong Tuong NNP work_dzeata5onzf7rp26j2quaotjza 1031 293 A A NNP work_dzeata5onzf7rp26j2quaotjza 1031 294 , , , work_dzeata5onzf7rp26j2quaotjza 1031 295 Hiser Hiser NNP work_dzeata5onzf7rp26j2quaotjza 1031 296 J J NNP work_dzeata5onzf7rp26j2quaotjza 1031 297 , , , work_dzeata5onzf7rp26j2quaotjza 1031 298 Co Co NNP work_dzeata5onzf7rp26j2quaotjza 1031 299 M M NNP work_dzeata5onzf7rp26j2quaotjza 1031 300 , , , work_dzeata5onzf7rp26j2quaotjza 1031 301 Davidson Davidson NNP work_dzeata5onzf7rp26j2quaotjza 1031 302 JW JW NNP work_dzeata5onzf7rp26j2quaotjza 1031 303 , , , work_dzeata5onzf7rp26j2quaotjza 1031 304 Knight Knight NNP work_dzeata5onzf7rp26j2quaotjza 1031 305 JC JC NNP work_dzeata5onzf7rp26j2quaotjza 1031 306 , , , work_dzeata5onzf7rp26j2quaotjza 1031 307 Kennedy Kennedy NNP work_dzeata5onzf7rp26j2quaotjza 1031 308 N N NNP work_dzeata5onzf7rp26j2quaotjza 1031 309 , , , work_dzeata5onzf7rp26j2quaotjza 1031 310 Melski Melski NNP work_dzeata5onzf7rp26j2quaotjza 1031 311 D D NNP work_dzeata5onzf7rp26j2quaotjza 1031 312 , , , work_dzeata5onzf7rp26j2quaotjza 1031 313 Ella Ella NNP work_dzeata5onzf7rp26j2quaotjza 1031 314 W W NNP work_dzeata5onzf7rp26j2quaotjza 1031 315 , , , work_dzeata5onzf7rp26j2quaotjza 1031 316 Hyde Hyde NNP work_dzeata5onzf7rp26j2quaotjza 1031 317 D. D. NNP work_dzeata5onzf7rp26j2quaotjza 1031 318 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 1031 319 . . . work_dzeata5onzf7rp26j2quaotjza 1032 1 To to IN work_dzeata5onzf7rp26j2quaotjza 1032 2 B b NN work_dzeata5onzf7rp26j2quaotjza 1032 3 or or CC work_dzeata5onzf7rp26j2quaotjza 1032 4 not not RB work_dzeata5onzf7rp26j2quaotjza 1032 5 to to IN work_dzeata5onzf7rp26j2quaotjza 1032 6 B b NN work_dzeata5onzf7rp26j2quaotjza 1032 7 : : : work_dzeata5onzf7rp26j2quaotjza 1032 8 blessing blessing NN work_dzeata5onzf7rp26j2quaotjza 1032 9 OS OS NNP work_dzeata5onzf7rp26j2quaotjza 1032 10 commands command VBZ work_dzeata5onzf7rp26j2quaotjza 1032 11 with with IN work_dzeata5onzf7rp26j2quaotjza 1032 12 software software NN work_dzeata5onzf7rp26j2quaotjza 1032 13 DNA DNA NNP work_dzeata5onzf7rp26j2quaotjza 1032 14 shotgun shotgun NNP work_dzeata5onzf7rp26j2quaotjza 1032 15 sequencing sequencing NN work_dzeata5onzf7rp26j2quaotjza 1032 16 . . . work_dzeata5onzf7rp26j2quaotjza 1033 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1033 2 : : : work_dzeata5onzf7rp26j2quaotjza 1033 3 Dependable dependable JJ work_dzeata5onzf7rp26j2quaotjza 1033 4 computing computing NN work_dzeata5onzf7rp26j2quaotjza 1033 5 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1033 6 . . . work_dzeata5onzf7rp26j2quaotjza 1034 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1034 2 , , , work_dzeata5onzf7rp26j2quaotjza 1034 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1034 4 : : : work_dzeata5onzf7rp26j2quaotjza 1034 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1034 6 , , , work_dzeata5onzf7rp26j2quaotjza 1034 7 238–249 238–249 CD work_dzeata5onzf7rp26j2quaotjza 1034 8 . . . work_dzeata5onzf7rp26j2quaotjza 1035 1 Nikolaev Nikolaev NNP work_dzeata5onzf7rp26j2quaotjza 1035 2 R R NNP work_dzeata5onzf7rp26j2quaotjza 1035 3 , , , work_dzeata5onzf7rp26j2quaotjza 1035 4 Back back RB work_dzeata5onzf7rp26j2quaotjza 1035 5 G. G. NNP work_dzeata5onzf7rp26j2quaotjza 1035 6 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1035 7 . . . work_dzeata5onzf7rp26j2quaotjza 1036 1 VirtuOS VirtuOS NNP work_dzeata5onzf7rp26j2quaotjza 1036 2 : : : work_dzeata5onzf7rp26j2quaotjza 1036 3 an an DT work_dzeata5onzf7rp26j2quaotjza 1036 4 operating operating NN work_dzeata5onzf7rp26j2quaotjza 1036 5 system system NN work_dzeata5onzf7rp26j2quaotjza 1036 6 with with IN work_dzeata5onzf7rp26j2quaotjza 1036 7 kernel kernel NN work_dzeata5onzf7rp26j2quaotjza 1036 8 virtualization virtualization NN work_dzeata5onzf7rp26j2quaotjza 1036 9 . . . work_dzeata5onzf7rp26j2quaotjza 1037 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1037 2 : : : work_dzeata5onzf7rp26j2quaotjza 1037 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1037 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1037 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1037 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1037 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1037 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 1037 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1037 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1037 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1037 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1037 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1037 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1037 15 13 13 CD work_dzeata5onzf7rp26j2quaotjza 1037 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1037 17 . . . work_dzeata5onzf7rp26j2quaotjza 1038 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1038 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1038 3 : : : work_dzeata5onzf7rp26j2quaotjza 1038 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1038 5 , , , work_dzeata5onzf7rp26j2quaotjza 1038 6 116–132 116–132 CD work_dzeata5onzf7rp26j2quaotjza 1038 7 . . . work_dzeata5onzf7rp26j2quaotjza 1039 1 Niu Niu NNP work_dzeata5onzf7rp26j2quaotjza 1039 2 B B NNP work_dzeata5onzf7rp26j2quaotjza 1039 3 , , , work_dzeata5onzf7rp26j2quaotjza 1039 4 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 1039 5 G. G. NNP work_dzeata5onzf7rp26j2quaotjza 1039 6 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1039 7 . . . work_dzeata5onzf7rp26j2quaotjza 1040 1 Monitor monitor VB work_dzeata5onzf7rp26j2quaotjza 1040 2 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 1040 3 protection protection NN work_dzeata5onzf7rp26j2quaotjza 1040 4 with with IN work_dzeata5onzf7rp26j2quaotjza 1040 5 space space NN work_dzeata5onzf7rp26j2quaotjza 1040 6 efficiency efficiency NN work_dzeata5onzf7rp26j2quaotjza 1040 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1040 8 separate separate JJ work_dzeata5onzf7rp26j2quaotjza 1040 9 compilation compilation NN work_dzeata5onzf7rp26j2quaotjza 1040 10 . . . work_dzeata5onzf7rp26j2quaotjza 1041 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1041 2 : : : work_dzeata5onzf7rp26j2quaotjza 1041 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1041 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1041 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1041 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1041 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1041 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1041 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1041 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1041 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1041 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1041 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1041 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1041 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1041 16 13 13 CD work_dzeata5onzf7rp26j2quaotjza 1041 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1041 18 . . . work_dzeata5onzf7rp26j2quaotjza 1042 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1042 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1042 3 : : : work_dzeata5onzf7rp26j2quaotjza 1042 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1042 5 , , , work_dzeata5onzf7rp26j2quaotjza 1042 6 199–210 199–210 CD work_dzeata5onzf7rp26j2quaotjza 1042 7 . . . work_dzeata5onzf7rp26j2quaotjza 1043 1 Oda Oda NNP work_dzeata5onzf7rp26j2quaotjza 1043 2 T T NNP work_dzeata5onzf7rp26j2quaotjza 1043 3 , , , work_dzeata5onzf7rp26j2quaotjza 1043 4 Wurster Wurster NNP work_dzeata5onzf7rp26j2quaotjza 1043 5 G G NNP work_dzeata5onzf7rp26j2quaotjza 1043 6 , , , work_dzeata5onzf7rp26j2quaotjza 1043 7 Van Van NNP work_dzeata5onzf7rp26j2quaotjza 1043 8 Oorschot Oorschot NNP work_dzeata5onzf7rp26j2quaotjza 1043 9 PC PC NNP work_dzeata5onzf7rp26j2quaotjza 1043 10 , , , work_dzeata5onzf7rp26j2quaotjza 1043 11 Somayaji Somayaji NNP work_dzeata5onzf7rp26j2quaotjza 1043 12 A. A. NNP work_dzeata5onzf7rp26j2quaotjza 1044 1 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 1044 2 . . . work_dzeata5onzf7rp26j2quaotjza 1045 1 SOMA SOMA NNP work_dzeata5onzf7rp26j2quaotjza 1045 2 : : : work_dzeata5onzf7rp26j2quaotjza 1045 3 mutual mutual JJ work_dzeata5onzf7rp26j2quaotjza 1045 4 approval approval NN work_dzeata5onzf7rp26j2quaotjza 1045 5 for for IN work_dzeata5onzf7rp26j2quaotjza 1045 6 included include VBN work_dzeata5onzf7rp26j2quaotjza 1045 7 content content NN work_dzeata5onzf7rp26j2quaotjza 1045 8 in in IN work_dzeata5onzf7rp26j2quaotjza 1045 9 web web NN work_dzeata5onzf7rp26j2quaotjza 1045 10 pages page NNS work_dzeata5onzf7rp26j2quaotjza 1045 11 . . . work_dzeata5onzf7rp26j2quaotjza 1046 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1046 2 : : : work_dzeata5onzf7rp26j2quaotjza 1046 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1046 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1046 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1046 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1046 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1046 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1046 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1046 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1046 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1046 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1046 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1046 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1046 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1046 16 08 08 CD work_dzeata5onzf7rp26j2quaotjza 1046 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1046 18 . . . work_dzeata5onzf7rp26j2quaotjza 1047 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1047 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1047 3 : : : work_dzeata5onzf7rp26j2quaotjza 1047 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1047 5 , , , work_dzeata5onzf7rp26j2quaotjza 1047 6 89–98 89–98 CD work_dzeata5onzf7rp26j2quaotjza 1047 7 . . . work_dzeata5onzf7rp26j2quaotjza 1048 1 Owen Owen NNP work_dzeata5onzf7rp26j2quaotjza 1048 2 C C NNP work_dzeata5onzf7rp26j2quaotjza 1048 3 , , , work_dzeata5onzf7rp26j2quaotjza 1048 4 Grove Grove NNP work_dzeata5onzf7rp26j2quaotjza 1048 5 D D NNP work_dzeata5onzf7rp26j2quaotjza 1048 6 , , , work_dzeata5onzf7rp26j2quaotjza 1048 7 Newby Newby NNP work_dzeata5onzf7rp26j2quaotjza 1048 8 T T NNP work_dzeata5onzf7rp26j2quaotjza 1048 9 , , , work_dzeata5onzf7rp26j2quaotjza 1048 10 Murray Murray NNP work_dzeata5onzf7rp26j2quaotjza 1048 11 A A NNP work_dzeata5onzf7rp26j2quaotjza 1048 12 , , , work_dzeata5onzf7rp26j2quaotjza 1048 13 North North NNP work_dzeata5onzf7rp26j2quaotjza 1048 14 C C NNP work_dzeata5onzf7rp26j2quaotjza 1048 15 , , , work_dzeata5onzf7rp26j2quaotjza 1048 16 Pope Pope NNP work_dzeata5onzf7rp26j2quaotjza 1048 17 M. M. NNP work_dzeata5onzf7rp26j2quaotjza 1048 18 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 1048 19 . . . work_dzeata5onzf7rp26j2quaotjza 1049 1 PRISM PRISM NNP work_dzeata5onzf7rp26j2quaotjza 1049 2 : : : work_dzeata5onzf7rp26j2quaotjza 1049 3 program program NN work_dzeata5onzf7rp26j2quaotjza 1049 4 replication replication NN work_dzeata5onzf7rp26j2quaotjza 1049 5 and and CC work_dzeata5onzf7rp26j2quaotjza 1049 6 integration integration NN work_dzeata5onzf7rp26j2quaotjza 1049 7 for for IN work_dzeata5onzf7rp26j2quaotjza 1049 8 seamless seamless JJ work_dzeata5onzf7rp26j2quaotjza 1049 9 MILS mils NN work_dzeata5onzf7rp26j2quaotjza 1049 10 . . . work_dzeata5onzf7rp26j2quaotjza 1050 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1050 2 : : : work_dzeata5onzf7rp26j2quaotjza 1050 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1050 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1050 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1050 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1050 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1050 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1050 9 . . . work_dzeata5onzf7rp26j2quaotjza 1051 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1051 2 , , , work_dzeata5onzf7rp26j2quaotjza 1051 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1051 4 : : : work_dzeata5onzf7rp26j2quaotjza 1051 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1051 6 , , , work_dzeata5onzf7rp26j2quaotjza 1051 7 281–296 281–296 CD work_dzeata5onzf7rp26j2quaotjza 1051 8 . . . work_dzeata5onzf7rp26j2quaotjza 1052 1 Pappas Pappas NNP work_dzeata5onzf7rp26j2quaotjza 1052 2 V V NNP work_dzeata5onzf7rp26j2quaotjza 1052 3 , , , work_dzeata5onzf7rp26j2quaotjza 1052 4 Polychronakis Polychronakis NNP work_dzeata5onzf7rp26j2quaotjza 1052 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 1052 6 , , , work_dzeata5onzf7rp26j2quaotjza 1052 7 Keromytis Keromytis NNP work_dzeata5onzf7rp26j2quaotjza 1052 8 AD AD NNP work_dzeata5onzf7rp26j2quaotjza 1052 9 . . . work_dzeata5onzf7rp26j2quaotjza 1053 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 1053 2 . . . work_dzeata5onzf7rp26j2quaotjza 1054 1 Smashing smash VBG work_dzeata5onzf7rp26j2quaotjza 1054 2 the the DT work_dzeata5onzf7rp26j2quaotjza 1054 3 gadgets gadget NNS work_dzeata5onzf7rp26j2quaotjza 1054 4 : : : work_dzeata5onzf7rp26j2quaotjza 1054 5 hindering hinder VBG work_dzeata5onzf7rp26j2quaotjza 1054 6 return return NN work_dzeata5onzf7rp26j2quaotjza 1054 7 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1054 8 oriented orient VBN work_dzeata5onzf7rp26j2quaotjza 1054 9 programming programming NN work_dzeata5onzf7rp26j2quaotjza 1054 10 using use VBG work_dzeata5onzf7rp26j2quaotjza 1054 11 in in IN work_dzeata5onzf7rp26j2quaotjza 1054 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1054 13 place place NN work_dzeata5onzf7rp26j2quaotjza 1054 14 code code NN work_dzeata5onzf7rp26j2quaotjza 1054 15 randomization randomization NN work_dzeata5onzf7rp26j2quaotjza 1054 16 . . . work_dzeata5onzf7rp26j2quaotjza 1055 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1055 2 : : : work_dzeata5onzf7rp26j2quaotjza 1055 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1055 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1055 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1055 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1055 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1055 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1055 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1055 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1055 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1055 12 12 12 CD work_dzeata5onzf7rp26j2quaotjza 1055 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1055 14 . . . work_dzeata5onzf7rp26j2quaotjza 1056 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1056 2 , , , work_dzeata5onzf7rp26j2quaotjza 1056 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1056 4 : : : work_dzeata5onzf7rp26j2quaotjza 1056 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1056 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1056 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1056 8 , , , work_dzeata5onzf7rp26j2quaotjza 1056 9 601–615 601–615 CD work_dzeata5onzf7rp26j2quaotjza 1056 10 . . . work_dzeata5onzf7rp26j2quaotjza 1057 1 Parno Parno NNP work_dzeata5onzf7rp26j2quaotjza 1057 2 B B NNP work_dzeata5onzf7rp26j2quaotjza 1057 3 , , , work_dzeata5onzf7rp26j2quaotjza 1057 4 McCune McCune NNP work_dzeata5onzf7rp26j2quaotjza 1057 5 JM JM NNP work_dzeata5onzf7rp26j2quaotjza 1057 6 , , , work_dzeata5onzf7rp26j2quaotjza 1057 7 Wendlandt Wendlandt NNP work_dzeata5onzf7rp26j2quaotjza 1057 8 D D NNP work_dzeata5onzf7rp26j2quaotjza 1057 9 , , , work_dzeata5onzf7rp26j2quaotjza 1057 10 Andersen Andersen NNP work_dzeata5onzf7rp26j2quaotjza 1057 11 DG DG NNP work_dzeata5onzf7rp26j2quaotjza 1057 12 , , , work_dzeata5onzf7rp26j2quaotjza 1057 13 Perrig Perrig NNP work_dzeata5onzf7rp26j2quaotjza 1057 14 A. A. NNP work_dzeata5onzf7rp26j2quaotjza 1058 1 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 1058 2 . . . work_dzeata5onzf7rp26j2quaotjza 1059 1 CLAMP clamp NN work_dzeata5onzf7rp26j2quaotjza 1059 2 : : : work_dzeata5onzf7rp26j2quaotjza 1059 3 practical practical JJ work_dzeata5onzf7rp26j2quaotjza 1059 4 prevention prevention NN work_dzeata5onzf7rp26j2quaotjza 1059 5 of of IN work_dzeata5onzf7rp26j2quaotjza 1059 6 large large JJ work_dzeata5onzf7rp26j2quaotjza 1059 7 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1059 8 scale scale NN work_dzeata5onzf7rp26j2quaotjza 1059 9 data data NN work_dzeata5onzf7rp26j2quaotjza 1059 10 leaks leak NNS work_dzeata5onzf7rp26j2quaotjza 1059 11 . . . work_dzeata5onzf7rp26j2quaotjza 1060 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1060 2 : : : work_dzeata5onzf7rp26j2quaotjza 1060 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1060 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1060 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1060 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1060 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1060 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1060 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1060 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1060 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1060 12 09 09 CD work_dzeata5onzf7rp26j2quaotjza 1060 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1060 14 . . . work_dzeata5onzf7rp26j2quaotjza 1061 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1061 2 , , , work_dzeata5onzf7rp26j2quaotjza 1061 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1061 4 : : : work_dzeata5onzf7rp26j2quaotjza 1061 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1061 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1061 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1061 8 , , , work_dzeata5onzf7rp26j2quaotjza 1061 9 154–169 154–169 CD work_dzeata5onzf7rp26j2quaotjza 1061 10 . . . work_dzeata5onzf7rp26j2quaotjza 1062 1 Payer payer NN work_dzeata5onzf7rp26j2quaotjza 1062 2 M M NNP work_dzeata5onzf7rp26j2quaotjza 1062 3 , , , work_dzeata5onzf7rp26j2quaotjza 1062 4 Hartmann Hartmann NNP work_dzeata5onzf7rp26j2quaotjza 1062 5 T T NNP work_dzeata5onzf7rp26j2quaotjza 1062 6 , , , work_dzeata5onzf7rp26j2quaotjza 1062 7 Gross Gross NNP work_dzeata5onzf7rp26j2quaotjza 1062 8 TR TR NNP work_dzeata5onzf7rp26j2quaotjza 1062 9 . . . work_dzeata5onzf7rp26j2quaotjza 1063 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 1063 2 . . . work_dzeata5onzf7rp26j2quaotjza 1064 1 Safe safe JJ work_dzeata5onzf7rp26j2quaotjza 1064 2 loading loading NN work_dzeata5onzf7rp26j2quaotjza 1064 3 — — : work_dzeata5onzf7rp26j2quaotjza 1064 4 a a DT work_dzeata5onzf7rp26j2quaotjza 1064 5 foundation foundation NN work_dzeata5onzf7rp26j2quaotjza 1064 6 for for IN work_dzeata5onzf7rp26j2quaotjza 1064 7 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 1064 8 execution execution NN work_dzeata5onzf7rp26j2quaotjza 1064 9 of of IN work_dzeata5onzf7rp26j2quaotjza 1064 10 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 1064 11 programs program NNS work_dzeata5onzf7rp26j2quaotjza 1064 12 . . . work_dzeata5onzf7rp26j2quaotjza 1065 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1065 2 : : : work_dzeata5onzf7rp26j2quaotjza 1065 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1065 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1065 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1065 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1065 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1065 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1065 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1065 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1065 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1065 12 12 12 CD work_dzeata5onzf7rp26j2quaotjza 1065 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1065 14 . . . work_dzeata5onzf7rp26j2quaotjza 1066 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1066 2 , , , work_dzeata5onzf7rp26j2quaotjza 1066 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1066 4 : : : work_dzeata5onzf7rp26j2quaotjza 1066 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1066 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1066 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1066 8 , , , work_dzeata5onzf7rp26j2quaotjza 1066 9 18–32 18–32 CD work_dzeata5onzf7rp26j2quaotjza 1066 10 . . . work_dzeata5onzf7rp26j2quaotjza 1067 1 Payne Payne NNP work_dzeata5onzf7rp26j2quaotjza 1067 2 BD BD NNP work_dzeata5onzf7rp26j2quaotjza 1067 3 , , , work_dzeata5onzf7rp26j2quaotjza 1067 4 Carbone Carbone NNP work_dzeata5onzf7rp26j2quaotjza 1067 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 1067 6 , , , work_dzeata5onzf7rp26j2quaotjza 1067 7 Sharif Sharif NNP work_dzeata5onzf7rp26j2quaotjza 1067 8 M M NNP work_dzeata5onzf7rp26j2quaotjza 1067 9 , , , work_dzeata5onzf7rp26j2quaotjza 1067 10 Lee Lee NNP work_dzeata5onzf7rp26j2quaotjza 1067 11 W. W. NNP work_dzeata5onzf7rp26j2quaotjza 1067 12 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 1067 13 . . . work_dzeata5onzf7rp26j2quaotjza 1068 1 Lares lare NNS work_dzeata5onzf7rp26j2quaotjza 1068 2 : : : work_dzeata5onzf7rp26j2quaotjza 1068 3 an an DT work_dzeata5onzf7rp26j2quaotjza 1068 4 architecture architecture NN work_dzeata5onzf7rp26j2quaotjza 1068 5 for for IN work_dzeata5onzf7rp26j2quaotjza 1068 6 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 1068 7 active active JJ work_dzeata5onzf7rp26j2quaotjza 1068 8 monitoring monitoring NN work_dzeata5onzf7rp26j2quaotjza 1068 9 using use VBG work_dzeata5onzf7rp26j2quaotjza 1068 10 virtualization virtualization NN work_dzeata5onzf7rp26j2quaotjza 1068 11 . . . work_dzeata5onzf7rp26j2quaotjza 1069 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1069 2 : : : work_dzeata5onzf7rp26j2quaotjza 1069 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1069 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1069 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1069 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1069 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1069 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1069 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1069 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1069 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1069 12 08 08 CD work_dzeata5onzf7rp26j2quaotjza 1069 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1069 14 . . . work_dzeata5onzf7rp26j2quaotjza 1070 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1070 2 , , , work_dzeata5onzf7rp26j2quaotjza 1070 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1070 4 : : : work_dzeata5onzf7rp26j2quaotjza 1070 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1070 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1070 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1070 8 , , , work_dzeata5onzf7rp26j2quaotjza 1070 9 233–247 233–247 CD work_dzeata5onzf7rp26j2quaotjza 1070 10 . . . work_dzeata5onzf7rp26j2quaotjza 1071 1 Petroni Petroni NNP work_dzeata5onzf7rp26j2quaotjza 1071 2 Jr Jr NNP work_dzeata5onzf7rp26j2quaotjza 1071 3 NL NL NNP work_dzeata5onzf7rp26j2quaotjza 1071 4 , , , work_dzeata5onzf7rp26j2quaotjza 1071 5 Hicks Hicks NNP work_dzeata5onzf7rp26j2quaotjza 1071 6 M. M. NNP work_dzeata5onzf7rp26j2quaotjza 1071 7 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 1071 8 . . . work_dzeata5onzf7rp26j2quaotjza 1072 1 Automated automate VBN work_dzeata5onzf7rp26j2quaotjza 1072 2 detection detection NN work_dzeata5onzf7rp26j2quaotjza 1072 3 of of IN work_dzeata5onzf7rp26j2quaotjza 1072 4 persistent persistent JJ work_dzeata5onzf7rp26j2quaotjza 1072 5 kernel kernel NN work_dzeata5onzf7rp26j2quaotjza 1072 6 control control NN work_dzeata5onzf7rp26j2quaotjza 1072 7 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1072 8 flow flow NN work_dzeata5onzf7rp26j2quaotjza 1072 9 attacks attack NNS work_dzeata5onzf7rp26j2quaotjza 1072 10 . . . work_dzeata5onzf7rp26j2quaotjza 1073 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1073 2 : : : work_dzeata5onzf7rp26j2quaotjza 1073 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1073 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1073 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1073 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1073 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1073 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1073 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1073 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1073 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1073 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1073 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1073 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1073 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1073 16 07 07 CD work_dzeata5onzf7rp26j2quaotjza 1073 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1073 18 . . . work_dzeata5onzf7rp26j2quaotjza 1074 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1074 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1074 3 : : : work_dzeata5onzf7rp26j2quaotjza 1074 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1074 5 , , , work_dzeata5onzf7rp26j2quaotjza 1074 6 103–115 103–115 CD work_dzeata5onzf7rp26j2quaotjza 1074 7 . . . work_dzeata5onzf7rp26j2quaotjza 1075 1 Politz Politz NNP work_dzeata5onzf7rp26j2quaotjza 1075 2 JG JG NNP work_dzeata5onzf7rp26j2quaotjza 1075 3 , , , work_dzeata5onzf7rp26j2quaotjza 1075 4 Eliopoulos Eliopoulos NNP work_dzeata5onzf7rp26j2quaotjza 1075 5 SA SA NNP work_dzeata5onzf7rp26j2quaotjza 1075 6 , , , work_dzeata5onzf7rp26j2quaotjza 1075 7 Guha Guha NNP work_dzeata5onzf7rp26j2quaotjza 1075 8 A A NNP work_dzeata5onzf7rp26j2quaotjza 1075 9 , , , work_dzeata5onzf7rp26j2quaotjza 1075 10 Krishnamurthi Krishnamurthi NNP work_dzeata5onzf7rp26j2quaotjza 1075 11 S. S. NNP work_dzeata5onzf7rp26j2quaotjza 1075 12 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 1075 13 . . . work_dzeata5onzf7rp26j2quaotjza 1076 1 ADsafety adsafety NN work_dzeata5onzf7rp26j2quaotjza 1076 2 : : : work_dzeata5onzf7rp26j2quaotjza 1076 3 type type NN work_dzeata5onzf7rp26j2quaotjza 1076 4 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1076 5 based base VBN work_dzeata5onzf7rp26j2quaotjza 1076 6 verification verification NN work_dzeata5onzf7rp26j2quaotjza 1076 7 of of IN work_dzeata5onzf7rp26j2quaotjza 1076 8 javascript javascript NNP work_dzeata5onzf7rp26j2quaotjza 1076 9 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 1076 10 . . . work_dzeata5onzf7rp26j2quaotjza 1077 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1077 2 : : : work_dzeata5onzf7rp26j2quaotjza 1077 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1077 4 security security NN work_dzeata5onzf7rp26j2quaotjza 1077 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1077 6 SEC’11 SEC’11 NNP work_dzeata5onzf7rp26j2quaotjza 1077 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1077 8 . . . work_dzeata5onzf7rp26j2quaotjza 1078 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1078 2 : : : work_dzeata5onzf7rp26j2quaotjza 1078 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1078 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1078 5 , , , work_dzeata5onzf7rp26j2quaotjza 1078 6 12–12 12–12 CD work_dzeata5onzf7rp26j2quaotjza 1078 7 . . . work_dzeata5onzf7rp26j2quaotjza 1079 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1079 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1079 3 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 ADD work_dzeata5onzf7rp26j2quaotjza 1079 4 . . . work_dzeata5onzf7rp26j2quaotjza 1080 1 Provos Provos NNP work_dzeata5onzf7rp26j2quaotjza 1080 2 N. N. NNP work_dzeata5onzf7rp26j2quaotjza 1080 3 2003 2003 CD work_dzeata5onzf7rp26j2quaotjza 1080 4 . . . work_dzeata5onzf7rp26j2quaotjza 1081 1 Improving improve VBG work_dzeata5onzf7rp26j2quaotjza 1081 2 host host NN work_dzeata5onzf7rp26j2quaotjza 1081 3 security security NN work_dzeata5onzf7rp26j2quaotjza 1081 4 with with IN work_dzeata5onzf7rp26j2quaotjza 1081 5 system system NN work_dzeata5onzf7rp26j2quaotjza 1081 6 call call NN work_dzeata5onzf7rp26j2quaotjza 1081 7 policies policy NNS work_dzeata5onzf7rp26j2quaotjza 1081 8 . . . work_dzeata5onzf7rp26j2quaotjza 1082 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1082 2 : : : work_dzeata5onzf7rp26j2quaotjza 1082 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1082 4 security security NN work_dzeata5onzf7rp26j2quaotjza 1082 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1082 6 SSYM’03 SSYM’03 NNP work_dzeata5onzf7rp26j2quaotjza 1082 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1082 8 . . . work_dzeata5onzf7rp26j2quaotjza 1083 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1083 2 : : : work_dzeata5onzf7rp26j2quaotjza 1083 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1083 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1083 5 , , , work_dzeata5onzf7rp26j2quaotjza 1083 6 18–18 18–18 CD work_dzeata5onzf7rp26j2quaotjza 1083 7 . . . work_dzeata5onzf7rp26j2quaotjza 1084 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1084 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1084 3 http://dl.acm.org/citation.cfm?id=1251353 http://dl.acm.org/citation.cfm?id=1251353 NN work_dzeata5onzf7rp26j2quaotjza 1084 4 . . . work_dzeata5onzf7rp26j2quaotjza 1085 1 1251371 1251371 CD work_dzeata5onzf7rp26j2quaotjza 1085 2 . . . work_dzeata5onzf7rp26j2quaotjza 1086 1 R R NNP work_dzeata5onzf7rp26j2quaotjza 1086 2 Core Core NNP work_dzeata5onzf7rp26j2quaotjza 1086 3 Team Team NNP work_dzeata5onzf7rp26j2quaotjza 1086 4 . . . work_dzeata5onzf7rp26j2quaotjza 1087 1 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 1087 2 . . . work_dzeata5onzf7rp26j2quaotjza 1088 1 R r NN work_dzeata5onzf7rp26j2quaotjza 1088 2 : : : work_dzeata5onzf7rp26j2quaotjza 1088 3 a a DT work_dzeata5onzf7rp26j2quaotjza 1088 4 language language NN work_dzeata5onzf7rp26j2quaotjza 1088 5 and and CC work_dzeata5onzf7rp26j2quaotjza 1088 6 environment environment NN work_dzeata5onzf7rp26j2quaotjza 1088 7 for for IN work_dzeata5onzf7rp26j2quaotjza 1088 8 statistical statistical JJ work_dzeata5onzf7rp26j2quaotjza 1088 9 computing computing NN work_dzeata5onzf7rp26j2quaotjza 1088 10 . . . work_dzeata5onzf7rp26j2quaotjza 1089 1 Vienna Vienna NNP work_dzeata5onzf7rp26j2quaotjza 1089 2 : : : work_dzeata5onzf7rp26j2quaotjza 1089 3 R R NNP work_dzeata5onzf7rp26j2quaotjza 1089 4 Foundation Foundation NNP work_dzeata5onzf7rp26j2quaotjza 1089 5 for for IN work_dzeata5onzf7rp26j2quaotjza 1089 6 Statistical Statistical NNP work_dzeata5onzf7rp26j2quaotjza 1089 7 Computing Computing NNP work_dzeata5onzf7rp26j2quaotjza 1089 8 . . . work_dzeata5onzf7rp26j2quaotjza 1090 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1090 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1090 3 http://www.R-project.org/. http://www.R-project.org/. NNP work_dzeata5onzf7rp26j2quaotjza 1091 1 Reis Reis NNP work_dzeata5onzf7rp26j2quaotjza 1091 2 C C NNP work_dzeata5onzf7rp26j2quaotjza 1091 3 , , , work_dzeata5onzf7rp26j2quaotjza 1091 4 Dunagan Dunagan NNP work_dzeata5onzf7rp26j2quaotjza 1091 5 J J NNP work_dzeata5onzf7rp26j2quaotjza 1091 6 , , , work_dzeata5onzf7rp26j2quaotjza 1091 7 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 1091 8 HJ HJ NNP work_dzeata5onzf7rp26j2quaotjza 1091 9 , , , work_dzeata5onzf7rp26j2quaotjza 1091 10 Dubrovsky Dubrovsky NNP work_dzeata5onzf7rp26j2quaotjza 1091 11 O O NNP work_dzeata5onzf7rp26j2quaotjza 1091 12 , , , work_dzeata5onzf7rp26j2quaotjza 1091 13 Esmeir Esmeir NNP work_dzeata5onzf7rp26j2quaotjza 1091 14 S. S. NNP work_dzeata5onzf7rp26j2quaotjza 1091 15 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 1091 16 . . . work_dzeata5onzf7rp26j2quaotjza 1092 1 BrowserShield BrowserShield NNP work_dzeata5onzf7rp26j2quaotjza 1092 2 : : : work_dzeata5onzf7rp26j2quaotjza 1092 3 vulnerability vulnerability NN work_dzeata5onzf7rp26j2quaotjza 1092 4 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1092 5 driven drive VBN work_dzeata5onzf7rp26j2quaotjza 1092 6 filtering filtering NN work_dzeata5onzf7rp26j2quaotjza 1092 7 of of IN work_dzeata5onzf7rp26j2quaotjza 1092 8 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 1092 9 HTML html NN work_dzeata5onzf7rp26j2quaotjza 1092 10 . . . work_dzeata5onzf7rp26j2quaotjza 1093 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1093 2 : : : work_dzeata5onzf7rp26j2quaotjza 1093 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1093 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1093 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1093 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1093 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1093 8 design design NN work_dzeata5onzf7rp26j2quaotjza 1093 9 and and CC work_dzeata5onzf7rp26j2quaotjza 1093 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 1093 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1093 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 1093 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1093 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1093 15 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 1093 16 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1093 17 06 06 CD work_dzeata5onzf7rp26j2quaotjza 1093 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1093 19 . . . work_dzeata5onzf7rp26j2quaotjza 1094 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1094 2 : : : work_dzeata5onzf7rp26j2quaotjza 1094 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1094 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1094 5 , , , work_dzeata5onzf7rp26j2quaotjza 1094 6 61–74 61–74 CD work_dzeata5onzf7rp26j2quaotjza 1094 7 . . . work_dzeata5onzf7rp26j2quaotjza 1095 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1095 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1095 3 http http NNS work_dzeata5onzf7rp26j2quaotjza 1095 4 : : : work_dzeata5onzf7rp26j2quaotjza 1095 5 //dl.acm.org //dl.acm.org NNP work_dzeata5onzf7rp26j2quaotjza 1095 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 1095 7 citation.cfm?id=1298455.1298462 citation.cfm?id=1298455.1298462 NNP work_dzeata5onzf7rp26j2quaotjza 1095 8 . . . work_dzeata5onzf7rp26j2quaotjza 1096 1 Ringenburg Ringenburg NNP work_dzeata5onzf7rp26j2quaotjza 1096 2 MF MF NNP work_dzeata5onzf7rp26j2quaotjza 1096 3 , , , work_dzeata5onzf7rp26j2quaotjza 1096 4 Grossman Grossman NNP work_dzeata5onzf7rp26j2quaotjza 1096 5 D. D. NNP work_dzeata5onzf7rp26j2quaotjza 1096 6 2005 2005 CD work_dzeata5onzf7rp26j2quaotjza 1096 7 . . . work_dzeata5onzf7rp26j2quaotjza 1097 1 Preventing prevent VBG work_dzeata5onzf7rp26j2quaotjza 1097 2 format format NN work_dzeata5onzf7rp26j2quaotjza 1097 3 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1097 4 string string NN work_dzeata5onzf7rp26j2quaotjza 1097 5 attacks attack NNS work_dzeata5onzf7rp26j2quaotjza 1097 6 via via IN work_dzeata5onzf7rp26j2quaotjza 1097 7 automatic automatic JJ work_dzeata5onzf7rp26j2quaotjza 1097 8 and and CC work_dzeata5onzf7rp26j2quaotjza 1097 9 efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 1097 10 dynamic dynamic JJ work_dzeata5onzf7rp26j2quaotjza 1097 11 checking checking NN work_dzeata5onzf7rp26j2quaotjza 1097 12 . . . work_dzeata5onzf7rp26j2quaotjza 1098 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1098 2 : : : work_dzeata5onzf7rp26j2quaotjza 1098 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1098 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1098 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1098 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1098 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1098 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1098 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1098 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1098 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1098 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1098 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1098 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1098 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1098 16 05 05 CD work_dzeata5onzf7rp26j2quaotjza 1098 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1098 18 . . . work_dzeata5onzf7rp26j2quaotjza 1099 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1099 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1099 3 : : : work_dzeata5onzf7rp26j2quaotjza 1099 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1099 5 , , , work_dzeata5onzf7rp26j2quaotjza 1099 6 354–363 354–363 CD work_dzeata5onzf7rp26j2quaotjza 1099 7 . . . work_dzeata5onzf7rp26j2quaotjza 1100 1 Rodes rode VBZ work_dzeata5onzf7rp26j2quaotjza 1100 2 BD BD NNP work_dzeata5onzf7rp26j2quaotjza 1100 3 , , , work_dzeata5onzf7rp26j2quaotjza 1100 4 Knight Knight NNP work_dzeata5onzf7rp26j2quaotjza 1100 5 JC JC NNP work_dzeata5onzf7rp26j2quaotjza 1100 6 , , , work_dzeata5onzf7rp26j2quaotjza 1100 7 Nguyen Nguyen NNP work_dzeata5onzf7rp26j2quaotjza 1100 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1100 9 Tuong Tuong NNP work_dzeata5onzf7rp26j2quaotjza 1100 10 A A NNP work_dzeata5onzf7rp26j2quaotjza 1100 11 , , , work_dzeata5onzf7rp26j2quaotjza 1100 12 Hiser Hiser NNP work_dzeata5onzf7rp26j2quaotjza 1100 13 JD JD NNP work_dzeata5onzf7rp26j2quaotjza 1100 14 , , , work_dzeata5onzf7rp26j2quaotjza 1100 15 Co Co NNP work_dzeata5onzf7rp26j2quaotjza 1100 16 M M NNP work_dzeata5onzf7rp26j2quaotjza 1100 17 , , , work_dzeata5onzf7rp26j2quaotjza 1100 18 Davidson Davidson NNP work_dzeata5onzf7rp26j2quaotjza 1100 19 JW JW NNP work_dzeata5onzf7rp26j2quaotjza 1100 20 . . . work_dzeata5onzf7rp26j2quaotjza 1101 1 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 1101 2 . . . work_dzeata5onzf7rp26j2quaotjza 1102 1 A a DT work_dzeata5onzf7rp26j2quaotjza 1102 2 case case NN work_dzeata5onzf7rp26j2quaotjza 1102 3 study study NN work_dzeata5onzf7rp26j2quaotjza 1102 4 of of IN work_dzeata5onzf7rp26j2quaotjza 1102 5 security security NN work_dzeata5onzf7rp26j2quaotjza 1102 6 case case NN work_dzeata5onzf7rp26j2quaotjza 1102 7 development development NN work_dzeata5onzf7rp26j2quaotjza 1102 8 . . . work_dzeata5onzf7rp26j2quaotjza 1103 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1103 2 : : : work_dzeata5onzf7rp26j2quaotjza 1103 3 Engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 1103 4 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1103 5 for for IN work_dzeata5onzf7rp26j2quaotjza 1103 6 safety safety NN work_dzeata5onzf7rp26j2quaotjza 1103 7 . . . work_dzeata5onzf7rp26j2quaotjza 1104 1 Newcastle newcastle NN work_dzeata5onzf7rp26j2quaotjza 1104 2 upon upon IN work_dzeata5onzf7rp26j2quaotjza 1104 3 Tyne Tyne NNP work_dzeata5onzf7rp26j2quaotjza 1104 4 : : : work_dzeata5onzf7rp26j2quaotjza 1104 5 Safety Safety NNP work_dzeata5onzf7rp26j2quaotjza 1104 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1104 7 Critical Critical NNP work_dzeata5onzf7rp26j2quaotjza 1104 8 Systems Systems NNPS work_dzeata5onzf7rp26j2quaotjza 1104 9 Club Club NNP work_dzeata5onzf7rp26j2quaotjza 1104 10 , , , work_dzeata5onzf7rp26j2quaotjza 1104 11 187–204 187–204 CD work_dzeata5onzf7rp26j2quaotjza 1104 12 . . . work_dzeata5onzf7rp26j2quaotjza 1105 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 1105 2 et et FW work_dzeata5onzf7rp26j2quaotjza 1105 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 1105 4 . . . work_dzeata5onzf7rp26j2quaotjza 1106 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1106 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 1106 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1106 4 , , , work_dzeata5onzf7rp26j2quaotjza 1106 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 1106 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 1106 7 . . . work_dzeata5onzf7rp26j2quaotjza 1107 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 1107 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 1107 3 , , , work_dzeata5onzf7rp26j2quaotjza 1107 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1107 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 1107 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 1107 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 1107 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1107 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1107 10 34/36 34/36 CD work_dzeata5onzf7rp26j2quaotjza 1107 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 12 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 13 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 14 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 15 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 16 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 17 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 18 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 19 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 20 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 21 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 22 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 23 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 24 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 25 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 26 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 27 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 28 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 29 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 30 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 31 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 32 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 33 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 34 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 35 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 36 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 37 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 38 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 39 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 40 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 41 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 42 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 43 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 44 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 45 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 46 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 47 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 48 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 49 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 50 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 51 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 52 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 53 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 54 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 55 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 56 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 57 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 58 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 59 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 60 http://dl.acm.org/citation.cfm?id=2028067.2028079 http://dl.acm.org/citation.cfm?id=2028067.2028079 NNP work_dzeata5onzf7rp26j2quaotjza 1107 61 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 62 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 UH work_dzeata5onzf7rp26j2quaotjza 1107 63 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 UH work_dzeata5onzf7rp26j2quaotjza 1107 64 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 65 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 66 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 67 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 68 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 69 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 70 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 71 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 72 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 73 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 74 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 75 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 76 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 77 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 78 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 79 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 80 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 81 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 82 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 83 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 84 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 85 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 86 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 87 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 88 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 89 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 90 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 91 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 92 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 93 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 94 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 95 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 96 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 97 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 98 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 99 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 100 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 101 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 102 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 103 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 104 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 105 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 106 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 107 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 108 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 FW work_dzeata5onzf7rp26j2quaotjza 1107 109 http://dl.acm.org/citation.cfm?id=1251353.1251371 http://dl.acm.org/citation.cfm?id=1251353.1251371 UH work_dzeata5onzf7rp26j2quaotjza 1107 110 http://www.R-project.org/ http://www.r-project.org/ UH work_dzeata5onzf7rp26j2quaotjza 1107 111 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 112 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 113 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 114 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 115 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 116 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 117 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 118 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 119 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 120 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 121 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 122 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 123 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 124 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 125 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 126 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 127 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 128 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 129 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 130 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 131 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 132 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 133 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 134 http://www.R-project.org/ http://www.R-project.org/ NNP work_dzeata5onzf7rp26j2quaotjza 1107 135 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNP work_dzeata5onzf7rp26j2quaotjza 1107 136 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 137 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 138 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 139 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 140 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 141 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 142 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 143 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 144 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 145 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 146 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 147 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 148 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 149 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 150 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 151 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 152 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 153 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 154 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 155 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 156 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 157 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 158 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 159 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 160 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 161 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 162 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 163 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 164 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 165 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 166 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 167 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 168 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 169 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 170 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 171 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 172 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 173 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 174 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 175 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 176 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 177 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 178 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 179 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 180 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 181 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 182 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 NNS work_dzeata5onzf7rp26j2quaotjza 1107 183 http://dl.acm.org/citation.cfm?id=1298455.1298462 http://dl.acm.org/citation.cfm?id=1298455.1298462 VBZ work_dzeata5onzf7rp26j2quaotjza 1107 184 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1107 185 Rosenberg Rosenberg NNP work_dzeata5onzf7rp26j2quaotjza 1107 186 D. D. NNP work_dzeata5onzf7rp26j2quaotjza 1107 187 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 1107 188 . . . work_dzeata5onzf7rp26j2quaotjza 1108 1 Poking poke VBG work_dzeata5onzf7rp26j2quaotjza 1108 2 holes hole NNS work_dzeata5onzf7rp26j2quaotjza 1108 3 in in IN work_dzeata5onzf7rp26j2quaotjza 1108 4 AppArmor AppArmor NNP work_dzeata5onzf7rp26j2quaotjza 1108 5 profiles profile NNS work_dzeata5onzf7rp26j2quaotjza 1108 6 . . . work_dzeata5onzf7rp26j2quaotjza 1109 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1109 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1109 3 http://blog.azimuthsecurity http://blog.azimuthsecurity NN work_dzeata5onzf7rp26j2quaotjza 1109 4 . . . work_dzeata5onzf7rp26j2quaotjza 1110 1 com/2012/09 com/2012/09 NN work_dzeata5onzf7rp26j2quaotjza 1110 2 / / SYM work_dzeata5onzf7rp26j2quaotjza 1110 3 poking poke VBG work_dzeata5onzf7rp26j2quaotjza 1110 4 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1110 5 holes hole NNS work_dzeata5onzf7rp26j2quaotjza 1110 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1110 7 in in IN work_dzeata5onzf7rp26j2quaotjza 1110 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1110 9 apparmor apparmor NN work_dzeata5onzf7rp26j2quaotjza 1110 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1110 11 profiles.html profiles.html NNP work_dzeata5onzf7rp26j2quaotjza 1110 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1110 13 accessed access VBN work_dzeata5onzf7rp26j2quaotjza 1110 14 30 30 CD work_dzeata5onzf7rp26j2quaotjza 1110 15 April April NNP work_dzeata5onzf7rp26j2quaotjza 1110 16 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 1110 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1110 18 . . . work_dzeata5onzf7rp26j2quaotjza 1111 1 Saxena Saxena NNP work_dzeata5onzf7rp26j2quaotjza 1111 2 P P NNP work_dzeata5onzf7rp26j2quaotjza 1111 3 , , , work_dzeata5onzf7rp26j2quaotjza 1111 4 Molnar Molnar NNP work_dzeata5onzf7rp26j2quaotjza 1111 5 D D NNP work_dzeata5onzf7rp26j2quaotjza 1111 6 , , , work_dzeata5onzf7rp26j2quaotjza 1111 7 Livshits Livshits NNP work_dzeata5onzf7rp26j2quaotjza 1111 8 B. B. NNP work_dzeata5onzf7rp26j2quaotjza 1112 1 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 1112 2 . . . work_dzeata5onzf7rp26j2quaotjza 1113 1 SCRIPTGARD scriptgard NN work_dzeata5onzf7rp26j2quaotjza 1113 2 : : : work_dzeata5onzf7rp26j2quaotjza 1113 3 automatic automatic JJ work_dzeata5onzf7rp26j2quaotjza 1113 4 context context NN work_dzeata5onzf7rp26j2quaotjza 1113 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1113 6 sensitive sensitive JJ work_dzeata5onzf7rp26j2quaotjza 1113 7 sanitization sanitization NN work_dzeata5onzf7rp26j2quaotjza 1113 8 for for IN work_dzeata5onzf7rp26j2quaotjza 1113 9 large large JJ work_dzeata5onzf7rp26j2quaotjza 1113 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1113 11 scale scale NN work_dzeata5onzf7rp26j2quaotjza 1113 12 legacy legacy NN work_dzeata5onzf7rp26j2quaotjza 1113 13 web web NN work_dzeata5onzf7rp26j2quaotjza 1113 14 applications application NNS work_dzeata5onzf7rp26j2quaotjza 1113 15 . . . work_dzeata5onzf7rp26j2quaotjza 1114 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1114 2 : : : work_dzeata5onzf7rp26j2quaotjza 1114 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1114 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1114 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1114 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1114 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1114 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1114 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1114 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1114 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1114 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1114 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1114 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1114 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1114 16 11 11 CD work_dzeata5onzf7rp26j2quaotjza 1114 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1114 18 . . . work_dzeata5onzf7rp26j2quaotjza 1115 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1115 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1115 3 : : : work_dzeata5onzf7rp26j2quaotjza 1115 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1115 5 , , , work_dzeata5onzf7rp26j2quaotjza 1115 6 601–614 601–614 CD work_dzeata5onzf7rp26j2quaotjza 1115 7 . . . work_dzeata5onzf7rp26j2quaotjza 1116 1 Schneider Schneider NNP work_dzeata5onzf7rp26j2quaotjza 1116 2 FB FB NNP work_dzeata5onzf7rp26j2quaotjza 1116 3 . . . work_dzeata5onzf7rp26j2quaotjza 1117 1 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 1117 2 . . . work_dzeata5onzf7rp26j2quaotjza 1118 1 Towards towards IN work_dzeata5onzf7rp26j2quaotjza 1118 2 fault fault NN work_dzeata5onzf7rp26j2quaotjza 1118 3 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1118 4 tolerant tolerant NN work_dzeata5onzf7rp26j2quaotjza 1118 5 and and CC work_dzeata5onzf7rp26j2quaotjza 1118 6 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 1118 7 agentry agentry NN work_dzeata5onzf7rp26j2quaotjza 1118 8 . . . work_dzeata5onzf7rp26j2quaotjza 1119 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1119 2 : : : work_dzeata5onzf7rp26j2quaotjza 1119 3 International international JJ work_dzeata5onzf7rp26j2quaotjza 1119 4 workshop workshop NN work_dzeata5onzf7rp26j2quaotjza 1119 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1119 6 distributed distribute VBN work_dzeata5onzf7rp26j2quaotjza 1119 7 algorithms algorithm NNS work_dzeata5onzf7rp26j2quaotjza 1119 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1119 9 WDAG WDAG NNP work_dzeata5onzf7rp26j2quaotjza 1119 10 ’ ’ POS work_dzeata5onzf7rp26j2quaotjza 1119 11 97 97 CD work_dzeata5onzf7rp26j2quaotjza 1119 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1119 13 . . . work_dzeata5onzf7rp26j2quaotjza 1120 1 London London NNP work_dzeata5onzf7rp26j2quaotjza 1120 2 : : : work_dzeata5onzf7rp26j2quaotjza 1120 3 Springer Springer NNP work_dzeata5onzf7rp26j2quaotjza 1120 4 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1120 5 Verlag Verlag NNP work_dzeata5onzf7rp26j2quaotjza 1120 6 , , , work_dzeata5onzf7rp26j2quaotjza 1120 7 1–14 1–14 NNP work_dzeata5onzf7rp26j2quaotjza 1120 8 . . . work_dzeata5onzf7rp26j2quaotjza 1121 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1121 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1121 3 http://dl.acm http://dl.acm NN work_dzeata5onzf7rp26j2quaotjza 1121 4 . . . work_dzeata5onzf7rp26j2quaotjza 1122 1 org org NNP work_dzeata5onzf7rp26j2quaotjza 1122 2 / / SYM work_dzeata5onzf7rp26j2quaotjza 1122 3 citation.cfm?id=645954.675785 citation.cfm?id=645954.675785 NNS work_dzeata5onzf7rp26j2quaotjza 1122 4 . . . work_dzeata5onzf7rp26j2quaotjza 1123 1 Schreier Schreier NNP work_dzeata5onzf7rp26j2quaotjza 1123 2 M. M. NNP work_dzeata5onzf7rp26j2quaotjza 1123 3 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 1123 4 . . . work_dzeata5onzf7rp26j2quaotjza 1124 1 Qualitative qualitative JJ work_dzeata5onzf7rp26j2quaotjza 1124 2 content content NN work_dzeata5onzf7rp26j2quaotjza 1124 3 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 1124 4 in in IN work_dzeata5onzf7rp26j2quaotjza 1124 5 practice practice NN work_dzeata5onzf7rp26j2quaotjza 1124 6 . . . work_dzeata5onzf7rp26j2quaotjza 1125 1 1st 1st NNP work_dzeata5onzf7rp26j2quaotjza 1125 2 edition edition NNP work_dzeata5onzf7rp26j2quaotjza 1125 3 . . . work_dzeata5onzf7rp26j2quaotjza 1126 1 Thousand thousand CD work_dzeata5onzf7rp26j2quaotjza 1126 2 Oaks Oaks NNPS work_dzeata5onzf7rp26j2quaotjza 1126 3 : : : work_dzeata5onzf7rp26j2quaotjza 1126 4 SAGE SAGE NNP work_dzeata5onzf7rp26j2quaotjza 1126 5 Publications Publications NNPS work_dzeata5onzf7rp26j2quaotjza 1126 6 Ltd. Ltd. NNP work_dzeata5onzf7rp26j2quaotjza 1126 7 Schreuders Schreuders NNPS work_dzeata5onzf7rp26j2quaotjza 1126 8 ZC ZC NNP work_dzeata5onzf7rp26j2quaotjza 1126 9 , , , work_dzeata5onzf7rp26j2quaotjza 1126 10 McGill McGill NNP work_dzeata5onzf7rp26j2quaotjza 1126 11 T T NNP work_dzeata5onzf7rp26j2quaotjza 1126 12 , , , work_dzeata5onzf7rp26j2quaotjza 1126 13 Payne Payne NNP work_dzeata5onzf7rp26j2quaotjza 1126 14 C. C. NNP work_dzeata5onzf7rp26j2quaotjza 1126 15 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1126 16 . . . work_dzeata5onzf7rp26j2quaotjza 1127 1 The the DT work_dzeata5onzf7rp26j2quaotjza 1127 2 state state NN work_dzeata5onzf7rp26j2quaotjza 1127 3 of of IN work_dzeata5onzf7rp26j2quaotjza 1127 4 the the DT work_dzeata5onzf7rp26j2quaotjza 1127 5 art art NN work_dzeata5onzf7rp26j2quaotjza 1127 6 of of IN work_dzeata5onzf7rp26j2quaotjza 1127 7 application application NN work_dzeata5onzf7rp26j2quaotjza 1127 8 restrictions restriction NNS work_dzeata5onzf7rp26j2quaotjza 1127 9 and and CC work_dzeata5onzf7rp26j2quaotjza 1127 10 sandboxes sandbox NNS work_dzeata5onzf7rp26j2quaotjza 1127 11 : : : work_dzeata5onzf7rp26j2quaotjza 1127 12 a a DT work_dzeata5onzf7rp26j2quaotjza 1127 13 survey survey NN work_dzeata5onzf7rp26j2quaotjza 1127 14 of of IN work_dzeata5onzf7rp26j2quaotjza 1127 15 application application NN work_dzeata5onzf7rp26j2quaotjza 1127 16 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1127 17 oriented orient VBN work_dzeata5onzf7rp26j2quaotjza 1127 18 access access NN work_dzeata5onzf7rp26j2quaotjza 1127 19 controls control NNS work_dzeata5onzf7rp26j2quaotjza 1127 20 and and CC work_dzeata5onzf7rp26j2quaotjza 1127 21 their -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 1127 22 shortfalls shortfall NNS work_dzeata5onzf7rp26j2quaotjza 1127 23 . . . work_dzeata5onzf7rp26j2quaotjza 1128 1 Computers Computers NNP work_dzeata5onzf7rp26j2quaotjza 1128 2 & & CC work_dzeata5onzf7rp26j2quaotjza 1128 3 Security Security NNP work_dzeata5onzf7rp26j2quaotjza 1128 4 32:219–241 32:219–241 CD work_dzeata5onzf7rp26j2quaotjza 1128 5 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1128 6 10.1016 10.1016 CD work_dzeata5onzf7rp26j2quaotjza 1128 7 / / SYM work_dzeata5onzf7rp26j2quaotjza 1128 8 j.cose.2012.09.007 j.cose.2012.09.007 NN work_dzeata5onzf7rp26j2quaotjza 1128 9 . . . work_dzeata5onzf7rp26j2quaotjza 1129 1 Sehr sehr NN work_dzeata5onzf7rp26j2quaotjza 1129 2 D d NN work_dzeata5onzf7rp26j2quaotjza 1129 3 , , , work_dzeata5onzf7rp26j2quaotjza 1129 4 Muth Muth NNP work_dzeata5onzf7rp26j2quaotjza 1129 5 R R NNP work_dzeata5onzf7rp26j2quaotjza 1129 6 , , , work_dzeata5onzf7rp26j2quaotjza 1129 7 Biffle Biffle NNP work_dzeata5onzf7rp26j2quaotjza 1129 8 C C NNP work_dzeata5onzf7rp26j2quaotjza 1129 9 , , , work_dzeata5onzf7rp26j2quaotjza 1129 10 Khimenko Khimenko NNP work_dzeata5onzf7rp26j2quaotjza 1129 11 V V NNP work_dzeata5onzf7rp26j2quaotjza 1129 12 , , , work_dzeata5onzf7rp26j2quaotjza 1129 13 Pasko Pasko NNP work_dzeata5onzf7rp26j2quaotjza 1129 14 E e NN work_dzeata5onzf7rp26j2quaotjza 1129 15 , , , work_dzeata5onzf7rp26j2quaotjza 1129 16 Schimpf schimpf JJ work_dzeata5onzf7rp26j2quaotjza 1129 17 K K NNP work_dzeata5onzf7rp26j2quaotjza 1129 18 , , , work_dzeata5onzf7rp26j2quaotjza 1129 19 Yee Yee NNP work_dzeata5onzf7rp26j2quaotjza 1129 20 B B NNP work_dzeata5onzf7rp26j2quaotjza 1129 21 , , , work_dzeata5onzf7rp26j2quaotjza 1129 22 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 1129 23 B. B. NNP work_dzeata5onzf7rp26j2quaotjza 1130 1 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 1130 2 . . . work_dzeata5onzf7rp26j2quaotjza 1131 1 Adapting adapt VBG work_dzeata5onzf7rp26j2quaotjza 1131 2 software software NN work_dzeata5onzf7rp26j2quaotjza 1131 3 fault fault NN work_dzeata5onzf7rp26j2quaotjza 1131 4 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 1131 5 to to IN work_dzeata5onzf7rp26j2quaotjza 1131 6 contemporary contemporary JJ work_dzeata5onzf7rp26j2quaotjza 1131 7 CPU CPU NNP work_dzeata5onzf7rp26j2quaotjza 1131 8 architectures architecture NNS work_dzeata5onzf7rp26j2quaotjza 1131 9 . . . work_dzeata5onzf7rp26j2quaotjza 1132 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1132 2 : : : work_dzeata5onzf7rp26j2quaotjza 1132 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1132 4 security security NN work_dzeata5onzf7rp26j2quaotjza 1132 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1132 6 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1132 7 Security’10 Security’10 NNPS work_dzeata5onzf7rp26j2quaotjza 1132 8 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1132 9 . . . work_dzeata5onzf7rp26j2quaotjza 1133 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1133 2 : : : work_dzeata5onzf7rp26j2quaotjza 1133 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1133 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1133 5 , , , work_dzeata5onzf7rp26j2quaotjza 1133 6 1–1 1–1 CD work_dzeata5onzf7rp26j2quaotjza 1133 7 . . . work_dzeata5onzf7rp26j2quaotjza 1134 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1134 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1134 3 http://dl.acm.org/citation.cfm http://dl.acm.org/citation.cfm NNP work_dzeata5onzf7rp26j2quaotjza 1134 4 ? ? . work_dzeata5onzf7rp26j2quaotjza 1135 1 id=1929820.1929822 id=1929820.1929822 FW work_dzeata5onzf7rp26j2quaotjza 1135 2 . . . work_dzeata5onzf7rp26j2quaotjza 1136 1 Seshadri Seshadri NNP work_dzeata5onzf7rp26j2quaotjza 1136 2 A A NNP work_dzeata5onzf7rp26j2quaotjza 1136 3 , , , work_dzeata5onzf7rp26j2quaotjza 1136 4 Luk Luk NNP work_dzeata5onzf7rp26j2quaotjza 1136 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 1136 6 , , , work_dzeata5onzf7rp26j2quaotjza 1136 7 Qu Qu NNP work_dzeata5onzf7rp26j2quaotjza 1136 8 N N NNP work_dzeata5onzf7rp26j2quaotjza 1136 9 , , , work_dzeata5onzf7rp26j2quaotjza 1136 10 Perrig Perrig NNP work_dzeata5onzf7rp26j2quaotjza 1136 11 A. A. NNP work_dzeata5onzf7rp26j2quaotjza 1137 1 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 1137 2 . . . work_dzeata5onzf7rp26j2quaotjza 1138 1 SecVisor SecVisor NNP work_dzeata5onzf7rp26j2quaotjza 1138 2 : : : work_dzeata5onzf7rp26j2quaotjza 1138 3 a a DT work_dzeata5onzf7rp26j2quaotjza 1138 4 tiny tiny JJ work_dzeata5onzf7rp26j2quaotjza 1138 5 hypervisor hypervisor NN work_dzeata5onzf7rp26j2quaotjza 1138 6 to to TO work_dzeata5onzf7rp26j2quaotjza 1138 7 provide provide VB work_dzeata5onzf7rp26j2quaotjza 1138 8 lifetime lifetime NN work_dzeata5onzf7rp26j2quaotjza 1138 9 kernel kernel NNP work_dzeata5onzf7rp26j2quaotjza 1138 10 code code NNP work_dzeata5onzf7rp26j2quaotjza 1138 11 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 1138 12 for for IN work_dzeata5onzf7rp26j2quaotjza 1138 13 commodity commodity NN work_dzeata5onzf7rp26j2quaotjza 1138 14 oses os NNS work_dzeata5onzf7rp26j2quaotjza 1138 15 . . . work_dzeata5onzf7rp26j2quaotjza 1139 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1139 2 : : : work_dzeata5onzf7rp26j2quaotjza 1139 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1139 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1139 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1139 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1139 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1139 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 1139 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1139 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1139 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1139 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1139 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1139 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1139 15 07 07 CD work_dzeata5onzf7rp26j2quaotjza 1139 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1139 17 . . . work_dzeata5onzf7rp26j2quaotjza 1140 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1140 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1140 3 : : : work_dzeata5onzf7rp26j2quaotjza 1140 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1140 5 , , , work_dzeata5onzf7rp26j2quaotjza 1140 6 335–350 335–350 CD work_dzeata5onzf7rp26j2quaotjza 1140 7 . . . work_dzeata5onzf7rp26j2quaotjza 1141 1 Siefers siefer NNS work_dzeata5onzf7rp26j2quaotjza 1141 2 J J NNP work_dzeata5onzf7rp26j2quaotjza 1141 3 , , , work_dzeata5onzf7rp26j2quaotjza 1141 4 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 1141 5 G G NNP work_dzeata5onzf7rp26j2quaotjza 1141 6 , , , work_dzeata5onzf7rp26j2quaotjza 1141 7 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 1141 8 G. G. NNP work_dzeata5onzf7rp26j2quaotjza 1141 9 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 1141 10 . . . work_dzeata5onzf7rp26j2quaotjza 1142 1 Robusta Robusta NNP work_dzeata5onzf7rp26j2quaotjza 1142 2 : : : work_dzeata5onzf7rp26j2quaotjza 1142 3 taming tame VBG work_dzeata5onzf7rp26j2quaotjza 1142 4 the the DT work_dzeata5onzf7rp26j2quaotjza 1142 5 native native JJ work_dzeata5onzf7rp26j2quaotjza 1142 6 beast beast NN work_dzeata5onzf7rp26j2quaotjza 1142 7 of of IN work_dzeata5onzf7rp26j2quaotjza 1142 8 the the DT work_dzeata5onzf7rp26j2quaotjza 1142 9 JVM JVM NNP work_dzeata5onzf7rp26j2quaotjza 1142 10 . . . work_dzeata5onzf7rp26j2quaotjza 1143 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1143 2 : : : work_dzeata5onzf7rp26j2quaotjza 1143 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1143 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1143 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1143 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1143 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1143 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1143 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1143 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1143 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1143 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1143 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1143 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1143 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1143 16 10 10 CD work_dzeata5onzf7rp26j2quaotjza 1143 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1143 18 . . . work_dzeata5onzf7rp26j2quaotjza 1144 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1144 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1144 3 : : : work_dzeata5onzf7rp26j2quaotjza 1144 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1144 5 , , , work_dzeata5onzf7rp26j2quaotjza 1144 6 201–211 201–211 CD work_dzeata5onzf7rp26j2quaotjza 1144 7 . . . work_dzeata5onzf7rp26j2quaotjza 1145 1 Spearman Spearman NNP work_dzeata5onzf7rp26j2quaotjza 1145 2 C. C. NNP work_dzeata5onzf7rp26j2quaotjza 1145 3 1904 1904 CD work_dzeata5onzf7rp26j2quaotjza 1145 4 . . . work_dzeata5onzf7rp26j2quaotjza 1146 1 The the DT work_dzeata5onzf7rp26j2quaotjza 1146 2 proof proof NN work_dzeata5onzf7rp26j2quaotjza 1146 3 and and CC work_dzeata5onzf7rp26j2quaotjza 1146 4 measurement measurement NN work_dzeata5onzf7rp26j2quaotjza 1146 5 of of IN work_dzeata5onzf7rp26j2quaotjza 1146 6 association association NNP work_dzeata5onzf7rp26j2quaotjza 1146 7 between between IN work_dzeata5onzf7rp26j2quaotjza 1146 8 two two CD work_dzeata5onzf7rp26j2quaotjza 1146 9 things thing NNS work_dzeata5onzf7rp26j2quaotjza 1146 10 . . . work_dzeata5onzf7rp26j2quaotjza 1147 1 American American NNP work_dzeata5onzf7rp26j2quaotjza 1147 2 Journal Journal NNP work_dzeata5onzf7rp26j2quaotjza 1147 3 of of IN work_dzeata5onzf7rp26j2quaotjza 1147 4 Psychology Psychology NNP work_dzeata5onzf7rp26j2quaotjza 1147 5 15:88–103 15:88–103 CD work_dzeata5onzf7rp26j2quaotjza 1147 6 . . . work_dzeata5onzf7rp26j2quaotjza 1148 1 Stuckman Stuckman NNP work_dzeata5onzf7rp26j2quaotjza 1148 2 J J NNP work_dzeata5onzf7rp26j2quaotjza 1148 3 , , , work_dzeata5onzf7rp26j2quaotjza 1148 4 Purtilo Purtilo NNP work_dzeata5onzf7rp26j2quaotjza 1148 5 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 1149 1 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 1149 2 . . . work_dzeata5onzf7rp26j2quaotjza 1150 1 Mining mining NN work_dzeata5onzf7rp26j2quaotjza 1150 2 security security NN work_dzeata5onzf7rp26j2quaotjza 1150 3 vulnerabilities vulnerability NNS work_dzeata5onzf7rp26j2quaotjza 1150 4 from from IN work_dzeata5onzf7rp26j2quaotjza 1150 5 linux linux JJ work_dzeata5onzf7rp26j2quaotjza 1150 6 distribution distribution NN work_dzeata5onzf7rp26j2quaotjza 1150 7 metadata metadata NN work_dzeata5onzf7rp26j2quaotjza 1150 8 . . . work_dzeata5onzf7rp26j2quaotjza 1151 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1151 2 : : : work_dzeata5onzf7rp26j2quaotjza 1151 3 Software software NN work_dzeata5onzf7rp26j2quaotjza 1151 4 reliability reliability NN work_dzeata5onzf7rp26j2quaotjza 1151 5 engineering engineering NN work_dzeata5onzf7rp26j2quaotjza 1151 6 workshops workshop NNS work_dzeata5onzf7rp26j2quaotjza 1151 7 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1151 8 ISSREW ISSREW NNP work_dzeata5onzf7rp26j2quaotjza 1151 9 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1151 10 . . . work_dzeata5onzf7rp26j2quaotjza 1152 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1152 2 , , , work_dzeata5onzf7rp26j2quaotjza 1152 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1152 4 : : : work_dzeata5onzf7rp26j2quaotjza 1152 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1152 6 , , , work_dzeata5onzf7rp26j2quaotjza 1152 7 323–328 323–328 CD work_dzeata5onzf7rp26j2quaotjza 1152 8 . . . work_dzeata5onzf7rp26j2quaotjza 1153 1 Sun Sun NNP work_dzeata5onzf7rp26j2quaotjza 1153 2 W W NNP work_dzeata5onzf7rp26j2quaotjza 1153 3 , , , work_dzeata5onzf7rp26j2quaotjza 1153 4 Sekar Sekar NNP work_dzeata5onzf7rp26j2quaotjza 1153 5 R R NNP work_dzeata5onzf7rp26j2quaotjza 1153 6 , , , work_dzeata5onzf7rp26j2quaotjza 1153 7 Poothia Poothia NNP work_dzeata5onzf7rp26j2quaotjza 1153 8 G G NNP work_dzeata5onzf7rp26j2quaotjza 1153 9 , , , work_dzeata5onzf7rp26j2quaotjza 1153 10 Karandikar Karandikar NNP work_dzeata5onzf7rp26j2quaotjza 1153 11 T. T. NNP work_dzeata5onzf7rp26j2quaotjza 1153 12 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 1153 13 . . . work_dzeata5onzf7rp26j2quaotjza 1154 1 Practical practical JJ work_dzeata5onzf7rp26j2quaotjza 1154 2 proactive proactive JJ work_dzeata5onzf7rp26j2quaotjza 1154 3 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 1154 4 preservation preservation NN work_dzeata5onzf7rp26j2quaotjza 1154 5 : : : work_dzeata5onzf7rp26j2quaotjza 1154 6 a a DT work_dzeata5onzf7rp26j2quaotjza 1154 7 basis basis NN work_dzeata5onzf7rp26j2quaotjza 1154 8 for for IN work_dzeata5onzf7rp26j2quaotjza 1154 9 malware malware NNP work_dzeata5onzf7rp26j2quaotjza 1154 10 defense defense NN work_dzeata5onzf7rp26j2quaotjza 1154 11 . . . work_dzeata5onzf7rp26j2quaotjza 1155 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1155 2 : : : work_dzeata5onzf7rp26j2quaotjza 1155 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1155 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1155 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1155 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1155 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1155 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1155 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1155 10 SP’08 SP’08 NNP work_dzeata5onzf7rp26j2quaotjza 1155 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1155 12 . . . work_dzeata5onzf7rp26j2quaotjza 1156 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1156 2 , , , work_dzeata5onzf7rp26j2quaotjza 1156 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1156 4 : : : work_dzeata5onzf7rp26j2quaotjza 1156 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1156 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1156 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1156 8 , , , work_dzeata5onzf7rp26j2quaotjza 1156 9 248–262 248–262 CD work_dzeata5onzf7rp26j2quaotjza 1156 10 . . . work_dzeata5onzf7rp26j2quaotjza 1157 1 Szekeres szekere NNS work_dzeata5onzf7rp26j2quaotjza 1157 2 L L NNP work_dzeata5onzf7rp26j2quaotjza 1157 3 , , , work_dzeata5onzf7rp26j2quaotjza 1157 4 Payer Payer NNP work_dzeata5onzf7rp26j2quaotjza 1157 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 1157 6 , , , work_dzeata5onzf7rp26j2quaotjza 1157 7 Wei Wei NNP work_dzeata5onzf7rp26j2quaotjza 1157 8 T T NNP work_dzeata5onzf7rp26j2quaotjza 1157 9 , , , work_dzeata5onzf7rp26j2quaotjza 1157 10 Song Song NNP work_dzeata5onzf7rp26j2quaotjza 1157 11 D. D. NNP work_dzeata5onzf7rp26j2quaotjza 1157 12 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1157 13 . . . work_dzeata5onzf7rp26j2quaotjza 1158 1 Eternal eternal JJ work_dzeata5onzf7rp26j2quaotjza 1158 2 war war NN work_dzeata5onzf7rp26j2quaotjza 1158 3 in in IN work_dzeata5onzf7rp26j2quaotjza 1158 4 memory memory NN work_dzeata5onzf7rp26j2quaotjza 1158 5 . . . work_dzeata5onzf7rp26j2quaotjza 1159 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1159 2 : : : work_dzeata5onzf7rp26j2quaotjza 1159 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1159 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1159 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1159 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1159 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1159 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1159 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1159 10 SP SP NNP work_dzeata5onzf7rp26j2quaotjza 1159 11 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1159 12 13 13 CD work_dzeata5onzf7rp26j2quaotjza 1159 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1159 14 . . . work_dzeata5onzf7rp26j2quaotjza 1160 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1160 2 , , , work_dzeata5onzf7rp26j2quaotjza 1160 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1160 4 : : : work_dzeata5onzf7rp26j2quaotjza 1160 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1160 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1160 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1160 8 , , , work_dzeata5onzf7rp26j2quaotjza 1160 9 48–62 48–62 CD work_dzeata5onzf7rp26j2quaotjza 1160 10 . . . work_dzeata5onzf7rp26j2quaotjza 1161 1 Tang Tang NNP work_dzeata5onzf7rp26j2quaotjza 1161 2 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 1162 1 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 1162 2 . . . work_dzeata5onzf7rp26j2quaotjza 1163 1 Exploring explore VBG work_dzeata5onzf7rp26j2quaotjza 1163 2 control control NN work_dzeata5onzf7rp26j2quaotjza 1163 3 flow flow NN work_dzeata5onzf7rp26j2quaotjza 1163 4 guard guard NN work_dzeata5onzf7rp26j2quaotjza 1163 5 in in IN work_dzeata5onzf7rp26j2quaotjza 1163 6 windows windows NNP work_dzeata5onzf7rp26j2quaotjza 1163 7 10 10 CD work_dzeata5onzf7rp26j2quaotjza 1163 8 . . . work_dzeata5onzf7rp26j2quaotjza 1164 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1164 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1164 3 http://blog.trendmicro http://blog.trendmicro NNP work_dzeata5onzf7rp26j2quaotjza 1164 4 . . . work_dzeata5onzf7rp26j2quaotjza 1165 1 com com NNP work_dzeata5onzf7rp26j2quaotjza 1165 2 / / SYM work_dzeata5onzf7rp26j2quaotjza 1165 3 trendlabs trendlabs NNP work_dzeata5onzf7rp26j2quaotjza 1165 4 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1165 5 security security NN work_dzeata5onzf7rp26j2quaotjza 1165 6 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1165 7 intelligence intelligence NN work_dzeata5onzf7rp26j2quaotjza 1165 8 / / SYM work_dzeata5onzf7rp26j2quaotjza 1165 9 exploring explore VBG work_dzeata5onzf7rp26j2quaotjza 1165 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1165 11 control control NN work_dzeata5onzf7rp26j2quaotjza 1165 12 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1165 13 flow flow NN work_dzeata5onzf7rp26j2quaotjza 1165 14 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1165 15 guard guard NN work_dzeata5onzf7rp26j2quaotjza 1165 16 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1165 17 in in IN work_dzeata5onzf7rp26j2quaotjza 1165 18 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1165 19 windows-10/ windows-10/ NNP work_dzeata5onzf7rp26j2quaotjza 1165 20 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1165 21 accessed access VBN work_dzeata5onzf7rp26j2quaotjza 1165 22 10 10 CD work_dzeata5onzf7rp26j2quaotjza 1165 23 September September NNP work_dzeata5onzf7rp26j2quaotjza 1165 24 2015 2015 CD work_dzeata5onzf7rp26j2quaotjza 1165 25 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1165 26 . . . work_dzeata5onzf7rp26j2quaotjza 1166 1 Tang Tang NNP work_dzeata5onzf7rp26j2quaotjza 1166 2 S S NNP work_dzeata5onzf7rp26j2quaotjza 1166 3 , , , work_dzeata5onzf7rp26j2quaotjza 1166 4 Mai Mai NNP work_dzeata5onzf7rp26j2quaotjza 1166 5 H H NNP work_dzeata5onzf7rp26j2quaotjza 1166 6 , , , work_dzeata5onzf7rp26j2quaotjza 1166 7 King King NNP work_dzeata5onzf7rp26j2quaotjza 1166 8 ST ST NNP work_dzeata5onzf7rp26j2quaotjza 1166 9 . . . work_dzeata5onzf7rp26j2quaotjza 1166 10 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 1166 11 . . . work_dzeata5onzf7rp26j2quaotjza 1167 1 Trust trust NN work_dzeata5onzf7rp26j2quaotjza 1167 2 and and CC work_dzeata5onzf7rp26j2quaotjza 1167 3 protection protection NN work_dzeata5onzf7rp26j2quaotjza 1167 4 in in IN work_dzeata5onzf7rp26j2quaotjza 1167 5 the the DT work_dzeata5onzf7rp26j2quaotjza 1167 6 Illinois Illinois NNP work_dzeata5onzf7rp26j2quaotjza 1167 7 browser browser NN work_dzeata5onzf7rp26j2quaotjza 1167 8 operating operating NN work_dzeata5onzf7rp26j2quaotjza 1167 9 system system NN work_dzeata5onzf7rp26j2quaotjza 1167 10 . . . work_dzeata5onzf7rp26j2quaotjza 1168 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1168 2 : : : work_dzeata5onzf7rp26j2quaotjza 1168 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1168 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1168 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1168 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1168 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1168 8 design design NN work_dzeata5onzf7rp26j2quaotjza 1168 9 and and CC work_dzeata5onzf7rp26j2quaotjza 1168 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 1168 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1168 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 1168 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1168 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1168 15 OSDI’10 OSDI’10 NNP work_dzeata5onzf7rp26j2quaotjza 1168 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1168 17 . . . work_dzeata5onzf7rp26j2quaotjza 1169 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1169 2 : : : work_dzeata5onzf7rp26j2quaotjza 1169 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1169 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1169 5 , , , work_dzeata5onzf7rp26j2quaotjza 1169 6 1–8 1–8 CD work_dzeata5onzf7rp26j2quaotjza 1169 7 . . . work_dzeata5onzf7rp26j2quaotjza 1170 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1170 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1170 3 http://dl.acm.org/citation.cfm?id=1924943 http://dl.acm.org/citation.cfm?id=1924943 NN work_dzeata5onzf7rp26j2quaotjza 1170 4 . . . work_dzeata5onzf7rp26j2quaotjza 1171 1 1924945 1924945 CD work_dzeata5onzf7rp26j2quaotjza 1171 2 . . . work_dzeata5onzf7rp26j2quaotjza 1172 1 Wahbe Wahbe NNP work_dzeata5onzf7rp26j2quaotjza 1172 2 R R NNP work_dzeata5onzf7rp26j2quaotjza 1172 3 , , , work_dzeata5onzf7rp26j2quaotjza 1172 4 Lucco Lucco NNP work_dzeata5onzf7rp26j2quaotjza 1172 5 S S NNP work_dzeata5onzf7rp26j2quaotjza 1172 6 , , , work_dzeata5onzf7rp26j2quaotjza 1172 7 Anderson Anderson NNP work_dzeata5onzf7rp26j2quaotjza 1172 8 TE TE NNP work_dzeata5onzf7rp26j2quaotjza 1172 9 , , , work_dzeata5onzf7rp26j2quaotjza 1172 10 Graham Graham NNP work_dzeata5onzf7rp26j2quaotjza 1172 11 SL SL NNP work_dzeata5onzf7rp26j2quaotjza 1172 12 . . . work_dzeata5onzf7rp26j2quaotjza 1173 1 1993 1993 CD work_dzeata5onzf7rp26j2quaotjza 1173 2 . . . work_dzeata5onzf7rp26j2quaotjza 1174 1 Efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 1174 2 software software NN work_dzeata5onzf7rp26j2quaotjza 1174 3 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1174 4 based base VBN work_dzeata5onzf7rp26j2quaotjza 1174 5 fault fault NN work_dzeata5onzf7rp26j2quaotjza 1174 6 isolation isolation NN work_dzeata5onzf7rp26j2quaotjza 1174 7 . . . work_dzeata5onzf7rp26j2quaotjza 1175 1 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1175 2 SIGOPS SIGOPS NNP work_dzeata5onzf7rp26j2quaotjza 1175 3 Operating Operating NNP work_dzeata5onzf7rp26j2quaotjza 1175 4 Systems Systems NNPS work_dzeata5onzf7rp26j2quaotjza 1175 5 Review Review NNP work_dzeata5onzf7rp26j2quaotjza 1175 6 27(5):203–216 27(5):203–216 CD work_dzeata5onzf7rp26j2quaotjza 1175 7 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1175 8 10.1145/173668.168635 10.1145/173668.168635 NNS work_dzeata5onzf7rp26j2quaotjza 1175 9 . . . work_dzeata5onzf7rp26j2quaotjza 1176 1 Wallach Wallach NNP work_dzeata5onzf7rp26j2quaotjza 1176 2 DS DS NNP work_dzeata5onzf7rp26j2quaotjza 1176 3 , , , work_dzeata5onzf7rp26j2quaotjza 1176 4 Balfanz Balfanz NNP work_dzeata5onzf7rp26j2quaotjza 1176 5 D D NNP work_dzeata5onzf7rp26j2quaotjza 1176 6 , , , work_dzeata5onzf7rp26j2quaotjza 1176 7 Dean Dean NNP work_dzeata5onzf7rp26j2quaotjza 1176 8 D D NNP work_dzeata5onzf7rp26j2quaotjza 1176 9 , , , work_dzeata5onzf7rp26j2quaotjza 1176 10 Felten Felten NNP work_dzeata5onzf7rp26j2quaotjza 1176 11 EW EW NNP work_dzeata5onzf7rp26j2quaotjza 1176 12 . . . work_dzeata5onzf7rp26j2quaotjza 1177 1 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 1177 2 . . . work_dzeata5onzf7rp26j2quaotjza 1178 1 Extensible extensible JJ work_dzeata5onzf7rp26j2quaotjza 1178 2 security security NN work_dzeata5onzf7rp26j2quaotjza 1178 3 architectures architecture NNS work_dzeata5onzf7rp26j2quaotjza 1178 4 for for IN work_dzeata5onzf7rp26j2quaotjza 1178 5 Java Java NNP work_dzeata5onzf7rp26j2quaotjza 1178 6 . . . work_dzeata5onzf7rp26j2quaotjza 1179 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1179 2 : : : work_dzeata5onzf7rp26j2quaotjza 1179 3 Symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1179 4 on on IN work_dzeata5onzf7rp26j2quaotjza 1179 5 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1179 6 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1179 7 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 1179 8 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1179 9 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1179 10 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1179 11 97 97 CD work_dzeata5onzf7rp26j2quaotjza 1179 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1179 13 . . . work_dzeata5onzf7rp26j2quaotjza 1180 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1180 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1180 3 : : : work_dzeata5onzf7rp26j2quaotjza 1180 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1180 5 , , , work_dzeata5onzf7rp26j2quaotjza 1180 6 116–128 116–128 CD work_dzeata5onzf7rp26j2quaotjza 1180 7 . . . work_dzeata5onzf7rp26j2quaotjza 1181 1 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 1181 2 HJ HJ NNP work_dzeata5onzf7rp26j2quaotjza 1181 3 , , , work_dzeata5onzf7rp26j2quaotjza 1181 4 Fan Fan NNP work_dzeata5onzf7rp26j2quaotjza 1181 5 X X NNP work_dzeata5onzf7rp26j2quaotjza 1181 6 , , , work_dzeata5onzf7rp26j2quaotjza 1181 7 Howell Howell NNP work_dzeata5onzf7rp26j2quaotjza 1181 8 J J NNP work_dzeata5onzf7rp26j2quaotjza 1181 9 , , , work_dzeata5onzf7rp26j2quaotjza 1181 10 Jackson Jackson NNP work_dzeata5onzf7rp26j2quaotjza 1181 11 C. C. NNP work_dzeata5onzf7rp26j2quaotjza 1181 12 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 1181 13 . . . work_dzeata5onzf7rp26j2quaotjza 1182 1 Protection protection NN work_dzeata5onzf7rp26j2quaotjza 1182 2 and and CC work_dzeata5onzf7rp26j2quaotjza 1182 3 communication communication NN work_dzeata5onzf7rp26j2quaotjza 1182 4 abstractions abstraction NNS work_dzeata5onzf7rp26j2quaotjza 1182 5 for for IN work_dzeata5onzf7rp26j2quaotjza 1182 6 web web NN work_dzeata5onzf7rp26j2quaotjza 1182 7 browsers browser NNS work_dzeata5onzf7rp26j2quaotjza 1182 8 in in IN work_dzeata5onzf7rp26j2quaotjza 1182 9 mashupOS mashupOS NNP work_dzeata5onzf7rp26j2quaotjza 1182 10 . . . work_dzeata5onzf7rp26j2quaotjza 1183 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1183 2 : : : work_dzeata5onzf7rp26j2quaotjza 1183 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1183 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1183 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1183 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1183 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1183 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 1183 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1183 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1183 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1183 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1183 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1183 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1183 15 07 07 CD work_dzeata5onzf7rp26j2quaotjza 1183 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1183 17 . . . work_dzeata5onzf7rp26j2quaotjza 1184 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1184 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1184 3 : : : work_dzeata5onzf7rp26j2quaotjza 1184 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1184 5 , , , work_dzeata5onzf7rp26j2quaotjza 1184 6 1–16 1–16 CD work_dzeata5onzf7rp26j2quaotjza 1184 7 . . . work_dzeata5onzf7rp26j2quaotjza 1185 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 1185 2 et et FW work_dzeata5onzf7rp26j2quaotjza 1185 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 1185 4 . . . work_dzeata5onzf7rp26j2quaotjza 1186 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1186 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 1186 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1186 4 , , , work_dzeata5onzf7rp26j2quaotjza 1186 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 1186 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 1186 7 . . . work_dzeata5onzf7rp26j2quaotjza 1187 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 1187 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 1187 3 , , , work_dzeata5onzf7rp26j2quaotjza 1187 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1187 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 1187 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 1187 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 1187 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1187 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1187 10 35/36 35/36 CD work_dzeata5onzf7rp26j2quaotjza 1187 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNS work_dzeata5onzf7rp26j2quaotjza 1187 12 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 13 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 14 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 15 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 16 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 17 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 18 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 19 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 20 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 21 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 22 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 23 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 24 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 25 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 26 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 27 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 28 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 29 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 30 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 31 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 32 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 33 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 34 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 35 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 36 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 37 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 38 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 39 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 40 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 41 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 42 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 43 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 44 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 45 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 46 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 47 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 48 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 49 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 50 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 51 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 52 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 53 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 54 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 55 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 56 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 57 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 58 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 59 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 60 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 61 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 62 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 63 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 64 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 65 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 66 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 67 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 68 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 69 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 70 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 71 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 72 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 73 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 74 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 75 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 76 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 77 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 78 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 79 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 80 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 81 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 82 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 83 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 84 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 85 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 86 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 87 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 88 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html UH work_dzeata5onzf7rp26j2quaotjza 1187 89 http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html http://blog.azimuthsecurity.com/2012/09/poking-holes-in-apparmor-profiles.html ADD work_dzeata5onzf7rp26j2quaotjza 1187 90 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 VBZ work_dzeata5onzf7rp26j2quaotjza 1187 91 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 92 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 93 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 94 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 95 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 96 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 97 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 98 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 99 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 100 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 101 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 102 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 103 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 104 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 105 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 106 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 107 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 108 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 109 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 110 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 111 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 112 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 113 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 114 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 115 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 116 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 117 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 118 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 119 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 120 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 121 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 122 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 123 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 124 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 125 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 126 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 127 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 128 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 129 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 130 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 131 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 132 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 133 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 134 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNP work_dzeata5onzf7rp26j2quaotjza 1187 135 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 NNS work_dzeata5onzf7rp26j2quaotjza 1187 136 http://dl.acm.org/citation.cfm?id=645954.675785 http://dl.acm.org/citation.cfm?id=645954.675785 ADD work_dzeata5onzf7rp26j2quaotjza 1187 137 http://dx.doi.org/10.1016/j.cose.2012.09.007 http://dx.doi.org/10.1016/j.cose.2012.09.007 FW work_dzeata5onzf7rp26j2quaotjza 1187 138 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 FW work_dzeata5onzf7rp26j2quaotjza 1187 139 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 140 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 141 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 142 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 143 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 144 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 145 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 146 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 147 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 148 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 149 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 150 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 151 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 152 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 153 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 154 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 155 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 156 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 157 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 158 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 159 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 160 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 161 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 162 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 163 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 164 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 165 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 166 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 167 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 168 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 169 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 170 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 171 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 172 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 173 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 174 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 175 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 176 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 177 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 178 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 179 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 180 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 181 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 182 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 183 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 184 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 185 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 186 http://dl.acm.org/citation.cfm?id=1929820.1929822 http://dl.acm.org/citation.cfm?id=1929820.1929822 UH work_dzeata5onzf7rp26j2quaotjza 1187 187 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNP work_dzeata5onzf7rp26j2quaotjza 1187 188 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 189 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 190 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 191 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 192 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 193 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 194 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 195 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 196 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 197 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 198 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 199 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 200 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 201 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 202 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 203 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 204 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 205 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 206 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 207 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 208 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 209 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 210 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 211 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 212 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 213 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 214 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 215 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 216 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 217 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 218 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 219 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 220 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 221 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 222 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 223 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 224 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 225 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 226 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 227 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 228 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 229 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 230 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 231 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 232 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 233 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 234 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 235 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 236 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 237 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 238 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 239 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 240 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 241 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 242 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 243 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 244 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 245 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 246 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 247 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 248 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 249 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 250 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 251 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 252 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 253 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 254 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 255 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 256 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 257 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 258 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 259 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 260 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 261 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 262 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 263 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 264 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 265 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 266 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 267 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 268 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 269 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 270 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 271 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 272 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 273 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 274 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 275 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 276 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 277 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 278 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 279 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 280 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 281 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 282 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 283 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 284 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 285 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 286 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNPS work_dzeata5onzf7rp26j2quaotjza 1187 287 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNP work_dzeata5onzf7rp26j2quaotjza 1187 288 http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ http://blog.trendmicro.com/trendlabs-security-intelligence/exploring-control-flow-guard-in-windows-10/ NNP work_dzeata5onzf7rp26j2quaotjza 1187 289 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 NN work_dzeata5onzf7rp26j2quaotjza 1187 290 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 NN work_dzeata5onzf7rp26j2quaotjza 1187 291 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 NN work_dzeata5onzf7rp26j2quaotjza 1187 292 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 293 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 294 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 295 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 296 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 297 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 298 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 299 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 300 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 301 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 302 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 303 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 304 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 305 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 306 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 307 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 308 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 309 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 310 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 311 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 312 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 313 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 314 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 315 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 316 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 317 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 318 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 319 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 320 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 321 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 322 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 323 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 324 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 325 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 326 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 327 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 328 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 329 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 330 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 331 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 332 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 333 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 334 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 335 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 UH work_dzeata5onzf7rp26j2quaotjza 1187 336 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 NN work_dzeata5onzf7rp26j2quaotjza 1187 337 http://dl.acm.org/citation.cfm?id=1924943.1924945 http://dl.acm.org/citation.cfm?id=1924943.1924945 NN work_dzeata5onzf7rp26j2quaotjza 1187 338 http://dx.doi.org/10.1145/173668.168635 http://dx.doi.org/10.1145/173668.168635 NNP work_dzeata5onzf7rp26j2quaotjza 1187 339 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1187 340 Wang Wang NNP work_dzeata5onzf7rp26j2quaotjza 1187 341 Z Z NNP work_dzeata5onzf7rp26j2quaotjza 1187 342 , , , work_dzeata5onzf7rp26j2quaotjza 1187 343 Jiang Jiang NNP work_dzeata5onzf7rp26j2quaotjza 1187 344 X X NNP work_dzeata5onzf7rp26j2quaotjza 1187 345 , , , work_dzeata5onzf7rp26j2quaotjza 1187 346 Cui Cui NNP work_dzeata5onzf7rp26j2quaotjza 1187 347 W W NNP work_dzeata5onzf7rp26j2quaotjza 1187 348 , , , work_dzeata5onzf7rp26j2quaotjza 1187 349 Ning Ning NNP work_dzeata5onzf7rp26j2quaotjza 1187 350 P. P. NNP work_dzeata5onzf7rp26j2quaotjza 1187 351 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 1187 352 . . . work_dzeata5onzf7rp26j2quaotjza 1188 1 Countering counter VBG work_dzeata5onzf7rp26j2quaotjza 1188 2 kernel kernel NN work_dzeata5onzf7rp26j2quaotjza 1188 3 rootkits rootkit VBZ work_dzeata5onzf7rp26j2quaotjza 1188 4 with with IN work_dzeata5onzf7rp26j2quaotjza 1188 5 lightweight lightweight JJ work_dzeata5onzf7rp26j2quaotjza 1188 6 hook hook NN work_dzeata5onzf7rp26j2quaotjza 1188 7 protection protection NN work_dzeata5onzf7rp26j2quaotjza 1188 8 . . . work_dzeata5onzf7rp26j2quaotjza 1189 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1189 2 : : : work_dzeata5onzf7rp26j2quaotjza 1189 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1189 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1189 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1189 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1189 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1189 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1189 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1189 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1189 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1189 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1189 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1189 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1189 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1189 16 09 09 CD work_dzeata5onzf7rp26j2quaotjza 1189 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1189 18 . . . work_dzeata5onzf7rp26j2quaotjza 1190 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1190 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1190 3 : : : work_dzeata5onzf7rp26j2quaotjza 1190 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1190 5 , , , work_dzeata5onzf7rp26j2quaotjza 1190 6 545–554 545–554 CD work_dzeata5onzf7rp26j2quaotjza 1190 7 . . . work_dzeata5onzf7rp26j2quaotjza 1191 1 Wartell Wartell NNP work_dzeata5onzf7rp26j2quaotjza 1191 2 R R NNP work_dzeata5onzf7rp26j2quaotjza 1191 3 , , , work_dzeata5onzf7rp26j2quaotjza 1191 4 Mohan Mohan NNP work_dzeata5onzf7rp26j2quaotjza 1191 5 V V NNP work_dzeata5onzf7rp26j2quaotjza 1191 6 , , , work_dzeata5onzf7rp26j2quaotjza 1191 7 Hamlen Hamlen NNP work_dzeata5onzf7rp26j2quaotjza 1191 8 KW KW NNP work_dzeata5onzf7rp26j2quaotjza 1191 9 , , , work_dzeata5onzf7rp26j2quaotjza 1191 10 Lin Lin NNP work_dzeata5onzf7rp26j2quaotjza 1191 11 Z. Z. NNP work_dzeata5onzf7rp26j2quaotjza 1192 1 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 1192 2 . . . work_dzeata5onzf7rp26j2quaotjza 1193 1 Binary binary JJ work_dzeata5onzf7rp26j2quaotjza 1193 2 stirring stirring NN work_dzeata5onzf7rp26j2quaotjza 1193 3 : : : work_dzeata5onzf7rp26j2quaotjza 1193 4 self self NN work_dzeata5onzf7rp26j2quaotjza 1193 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1193 6 randomizing randomize VBG work_dzeata5onzf7rp26j2quaotjza 1193 7 instruction instruction NN work_dzeata5onzf7rp26j2quaotjza 1193 8 addresses address NNS work_dzeata5onzf7rp26j2quaotjza 1193 9 of of IN work_dzeata5onzf7rp26j2quaotjza 1193 10 legacy legacy NNP work_dzeata5onzf7rp26j2quaotjza 1193 11 x86 x86 NNP work_dzeata5onzf7rp26j2quaotjza 1193 12 binary binary NNP work_dzeata5onzf7rp26j2quaotjza 1193 13 code code NNP work_dzeata5onzf7rp26j2quaotjza 1193 14 . . . work_dzeata5onzf7rp26j2quaotjza 1194 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1194 2 : : : work_dzeata5onzf7rp26j2quaotjza 1194 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1194 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1194 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1194 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1194 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1194 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1194 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1194 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1194 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1194 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1194 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1194 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1194 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1194 16 12 12 CD work_dzeata5onzf7rp26j2quaotjza 1194 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1194 18 . . . work_dzeata5onzf7rp26j2quaotjza 1195 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1195 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1195 3 : : : work_dzeata5onzf7rp26j2quaotjza 1195 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1195 5 , , , work_dzeata5onzf7rp26j2quaotjza 1195 6 157–168 157–168 CD work_dzeata5onzf7rp26j2quaotjza 1195 7 . . . work_dzeata5onzf7rp26j2quaotjza 1196 1 Weinstock Weinstock NNP work_dzeata5onzf7rp26j2quaotjza 1196 2 CB CB NNP work_dzeata5onzf7rp26j2quaotjza 1196 3 , , , work_dzeata5onzf7rp26j2quaotjza 1196 4 Lipson Lipson NNP work_dzeata5onzf7rp26j2quaotjza 1196 5 HF HF NNP work_dzeata5onzf7rp26j2quaotjza 1196 6 , , , work_dzeata5onzf7rp26j2quaotjza 1196 7 Goodenough Goodenough NNP work_dzeata5onzf7rp26j2quaotjza 1196 8 J. J. NNP work_dzeata5onzf7rp26j2quaotjza 1197 1 2007 2007 CD work_dzeata5onzf7rp26j2quaotjza 1197 2 . . . work_dzeata5onzf7rp26j2quaotjza 1198 1 Arguing argue VBG work_dzeata5onzf7rp26j2quaotjza 1198 2 security security NN work_dzeata5onzf7rp26j2quaotjza 1198 3 : : : work_dzeata5onzf7rp26j2quaotjza 1198 4 creating create VBG work_dzeata5onzf7rp26j2quaotjza 1198 5 security security NN work_dzeata5onzf7rp26j2quaotjza 1198 6 assurance assurance NN work_dzeata5onzf7rp26j2quaotjza 1198 7 cases case NNS work_dzeata5onzf7rp26j2quaotjza 1198 8 . . . work_dzeata5onzf7rp26j2quaotjza 1199 1 Technical Technical NNP work_dzeata5onzf7rp26j2quaotjza 1199 2 Report Report NNP work_dzeata5onzf7rp26j2quaotjza 1199 3 . . . work_dzeata5onzf7rp26j2quaotjza 1200 1 Software Software NNP work_dzeata5onzf7rp26j2quaotjza 1200 2 Engineering Engineering NNP work_dzeata5onzf7rp26j2quaotjza 1200 3 Institute Institute NNP work_dzeata5onzf7rp26j2quaotjza 1200 4 , , , work_dzeata5onzf7rp26j2quaotjza 1200 5 Carnegie Carnegie NNP work_dzeata5onzf7rp26j2quaotjza 1200 6 Mellon Mellon NNP work_dzeata5onzf7rp26j2quaotjza 1200 7 University University NNP work_dzeata5onzf7rp26j2quaotjza 1200 8 . . . work_dzeata5onzf7rp26j2quaotjza 1201 1 Williams Williams NNP work_dzeata5onzf7rp26j2quaotjza 1201 2 D D NNP work_dzeata5onzf7rp26j2quaotjza 1201 3 , , , work_dzeata5onzf7rp26j2quaotjza 1201 4 Reynolds Reynolds NNP work_dzeata5onzf7rp26j2quaotjza 1201 5 P P NNP work_dzeata5onzf7rp26j2quaotjza 1201 6 , , , work_dzeata5onzf7rp26j2quaotjza 1201 7 Walsh Walsh NNP work_dzeata5onzf7rp26j2quaotjza 1201 8 K K NNP work_dzeata5onzf7rp26j2quaotjza 1201 9 , , , work_dzeata5onzf7rp26j2quaotjza 1201 10 Sirer Sirer NNP work_dzeata5onzf7rp26j2quaotjza 1201 11 EG EG NNP work_dzeata5onzf7rp26j2quaotjza 1201 12 , , , work_dzeata5onzf7rp26j2quaotjza 1201 13 Schneider Schneider NNP work_dzeata5onzf7rp26j2quaotjza 1201 14 FB FB NNP work_dzeata5onzf7rp26j2quaotjza 1201 15 . . . work_dzeata5onzf7rp26j2quaotjza 1202 1 2008 2008 CD work_dzeata5onzf7rp26j2quaotjza 1202 2 . . . work_dzeata5onzf7rp26j2quaotjza 1203 1 Device device NN work_dzeata5onzf7rp26j2quaotjza 1203 2 driver driver NN work_dzeata5onzf7rp26j2quaotjza 1203 3 safety safety NN work_dzeata5onzf7rp26j2quaotjza 1203 4 through through IN work_dzeata5onzf7rp26j2quaotjza 1203 5 a a DT work_dzeata5onzf7rp26j2quaotjza 1203 6 reference reference NN work_dzeata5onzf7rp26j2quaotjza 1203 7 validation validation NN work_dzeata5onzf7rp26j2quaotjza 1203 8 mechanism mechanism NN work_dzeata5onzf7rp26j2quaotjza 1203 9 . . . work_dzeata5onzf7rp26j2quaotjza 1204 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1204 2 : : : work_dzeata5onzf7rp26j2quaotjza 1204 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1204 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1204 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1204 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1204 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1204 8 design design NN work_dzeata5onzf7rp26j2quaotjza 1204 9 and and CC work_dzeata5onzf7rp26j2quaotjza 1204 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 1204 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1204 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 1204 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1204 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1204 15 OSDI’08 osdi’08 NN work_dzeata5onzf7rp26j2quaotjza 1204 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1204 17 . . . work_dzeata5onzf7rp26j2quaotjza 1205 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1205 2 : : : work_dzeata5onzf7rp26j2quaotjza 1205 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1205 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1205 5 , , , work_dzeata5onzf7rp26j2quaotjza 1205 6 241–254 241–254 CD work_dzeata5onzf7rp26j2quaotjza 1205 7 . . . work_dzeata5onzf7rp26j2quaotjza 1206 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1206 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1206 3 http:/ http:/ NNP work_dzeata5onzf7rp26j2quaotjza 1206 4 /dl.acm.org /dl.acm.org NNP work_dzeata5onzf7rp26j2quaotjza 1206 5 / / SYM work_dzeata5onzf7rp26j2quaotjza 1206 6 citation.cfm?id=1855741.1855758 citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1206 7 . . . work_dzeata5onzf7rp26j2quaotjza 1207 1 Wurster Wurster NNP work_dzeata5onzf7rp26j2quaotjza 1207 2 G G NNP work_dzeata5onzf7rp26j2quaotjza 1207 3 , , , work_dzeata5onzf7rp26j2quaotjza 1207 4 Van Van NNP work_dzeata5onzf7rp26j2quaotjza 1207 5 Oorschot Oorschot NNP work_dzeata5onzf7rp26j2quaotjza 1207 6 PC PC NNP work_dzeata5onzf7rp26j2quaotjza 1207 7 . . . work_dzeata5onzf7rp26j2quaotjza 1208 1 2010 2010 CD work_dzeata5onzf7rp26j2quaotjza 1208 2 . . . work_dzeata5onzf7rp26j2quaotjza 1209 1 A a DT work_dzeata5onzf7rp26j2quaotjza 1209 2 control control NN work_dzeata5onzf7rp26j2quaotjza 1209 3 point point NN work_dzeata5onzf7rp26j2quaotjza 1209 4 for for IN work_dzeata5onzf7rp26j2quaotjza 1209 5 reducing reduce VBG work_dzeata5onzf7rp26j2quaotjza 1209 6 root root NN work_dzeata5onzf7rp26j2quaotjza 1209 7 abuse abuse NN work_dzeata5onzf7rp26j2quaotjza 1209 8 of of IN work_dzeata5onzf7rp26j2quaotjza 1209 9 file file NN work_dzeata5onzf7rp26j2quaotjza 1209 10 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1209 11 system system NN work_dzeata5onzf7rp26j2quaotjza 1209 12 privileges privilege NNS work_dzeata5onzf7rp26j2quaotjza 1209 13 . . . work_dzeata5onzf7rp26j2quaotjza 1210 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1210 2 : : : work_dzeata5onzf7rp26j2quaotjza 1210 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1210 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1210 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1210 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1210 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1210 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1210 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1210 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1210 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1210 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1210 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1210 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1210 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1210 16 10 10 CD work_dzeata5onzf7rp26j2quaotjza 1210 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1210 18 . . . work_dzeata5onzf7rp26j2quaotjza 1211 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1211 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1211 3 : : : work_dzeata5onzf7rp26j2quaotjza 1211 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1211 5 , , , work_dzeata5onzf7rp26j2quaotjza 1211 6 224–236 224–236 CD work_dzeata5onzf7rp26j2quaotjza 1211 7 . . . work_dzeata5onzf7rp26j2quaotjza 1212 1 Xu Xu NNP work_dzeata5onzf7rp26j2quaotjza 1212 2 R R NNP work_dzeata5onzf7rp26j2quaotjza 1212 3 , , , work_dzeata5onzf7rp26j2quaotjza 1212 4 Saı̈di Saı̈di . work_dzeata5onzf7rp26j2quaotjza 1212 5 H H NNP work_dzeata5onzf7rp26j2quaotjza 1212 6 , , , work_dzeata5onzf7rp26j2quaotjza 1212 7 Anderson Anderson NNP work_dzeata5onzf7rp26j2quaotjza 1212 8 R. R. NNP work_dzeata5onzf7rp26j2quaotjza 1212 9 2012 2012 CD work_dzeata5onzf7rp26j2quaotjza 1212 10 . . . work_dzeata5onzf7rp26j2quaotjza 1213 1 Aurasium aurasium NN work_dzeata5onzf7rp26j2quaotjza 1213 2 : : : work_dzeata5onzf7rp26j2quaotjza 1213 3 practical practical JJ work_dzeata5onzf7rp26j2quaotjza 1213 4 policy policy NN work_dzeata5onzf7rp26j2quaotjza 1213 5 enforcement enforcement NN work_dzeata5onzf7rp26j2quaotjza 1213 6 for for IN work_dzeata5onzf7rp26j2quaotjza 1213 7 android android NN work_dzeata5onzf7rp26j2quaotjza 1213 8 applications application NNS work_dzeata5onzf7rp26j2quaotjza 1213 9 . . . work_dzeata5onzf7rp26j2quaotjza 1214 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1214 2 : : : work_dzeata5onzf7rp26j2quaotjza 1214 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1214 4 security security NN work_dzeata5onzf7rp26j2quaotjza 1214 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1214 6 Security’12 Security’12 NFP work_dzeata5onzf7rp26j2quaotjza 1214 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1214 8 . . . work_dzeata5onzf7rp26j2quaotjza 1215 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1215 2 : : : work_dzeata5onzf7rp26j2quaotjza 1215 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1215 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1215 5 , , , work_dzeata5onzf7rp26j2quaotjza 1215 6 27–27 27–27 CD work_dzeata5onzf7rp26j2quaotjza 1215 7 . . . work_dzeata5onzf7rp26j2quaotjza 1216 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1216 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1216 3 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NN work_dzeata5onzf7rp26j2quaotjza 1216 4 . . . work_dzeata5onzf7rp26j2quaotjza 1217 1 Yan Yan NNP work_dzeata5onzf7rp26j2quaotjza 1217 2 Y Y NNP work_dzeata5onzf7rp26j2quaotjza 1217 3 , , , work_dzeata5onzf7rp26j2quaotjza 1217 4 Menarini Menarini NNP work_dzeata5onzf7rp26j2quaotjza 1217 5 M M NNP work_dzeata5onzf7rp26j2quaotjza 1217 6 , , , work_dzeata5onzf7rp26j2quaotjza 1217 7 Griswold Griswold NNP work_dzeata5onzf7rp26j2quaotjza 1217 8 W. W. NNP work_dzeata5onzf7rp26j2quaotjza 1217 9 2014 2014 CD work_dzeata5onzf7rp26j2quaotjza 1217 10 . . . work_dzeata5onzf7rp26j2quaotjza 1218 1 Mining mining NN work_dzeata5onzf7rp26j2quaotjza 1218 2 software software NN work_dzeata5onzf7rp26j2quaotjza 1218 3 contracts contract NNS work_dzeata5onzf7rp26j2quaotjza 1218 4 for for IN work_dzeata5onzf7rp26j2quaotjza 1218 5 software software NN work_dzeata5onzf7rp26j2quaotjza 1218 6 evolution evolution NN work_dzeata5onzf7rp26j2quaotjza 1218 7 . . . work_dzeata5onzf7rp26j2quaotjza 1219 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1219 2 : : : work_dzeata5onzf7rp26j2quaotjza 1219 3 International international JJ work_dzeata5onzf7rp26j2quaotjza 1219 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1219 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1219 6 software software NN work_dzeata5onzf7rp26j2quaotjza 1219 7 maintenance maintenance NN work_dzeata5onzf7rp26j2quaotjza 1219 8 and and CC work_dzeata5onzf7rp26j2quaotjza 1219 9 evolution evolution NN work_dzeata5onzf7rp26j2quaotjza 1219 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1219 11 ICSME ICSME NNP work_dzeata5onzf7rp26j2quaotjza 1219 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1219 13 . . . work_dzeata5onzf7rp26j2quaotjza 1220 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1220 2 , , , work_dzeata5onzf7rp26j2quaotjza 1220 3 D.C. D.C. NNP work_dzeata5onzf7rp26j2quaotjza 1220 4 : : : work_dzeata5onzf7rp26j2quaotjza 1220 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1220 6 , , , work_dzeata5onzf7rp26j2quaotjza 1220 7 471–475 471–475 CD work_dzeata5onzf7rp26j2quaotjza 1220 8 . . . work_dzeata5onzf7rp26j2quaotjza 1221 1 Yee Yee NNP work_dzeata5onzf7rp26j2quaotjza 1221 2 B B NNP work_dzeata5onzf7rp26j2quaotjza 1221 3 , , , work_dzeata5onzf7rp26j2quaotjza 1221 4 Sehr Sehr NNP work_dzeata5onzf7rp26j2quaotjza 1221 5 D D NNP work_dzeata5onzf7rp26j2quaotjza 1221 6 , , , work_dzeata5onzf7rp26j2quaotjza 1221 7 Dardyk Dardyk NNP work_dzeata5onzf7rp26j2quaotjza 1221 8 G G NNP work_dzeata5onzf7rp26j2quaotjza 1221 9 , , , work_dzeata5onzf7rp26j2quaotjza 1221 10 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 1221 11 JB JB NNP work_dzeata5onzf7rp26j2quaotjza 1221 12 , , , work_dzeata5onzf7rp26j2quaotjza 1221 13 Muth Muth NNP work_dzeata5onzf7rp26j2quaotjza 1221 14 R R NNP work_dzeata5onzf7rp26j2quaotjza 1221 15 , , , work_dzeata5onzf7rp26j2quaotjza 1221 16 Ormandy Ormandy NNP work_dzeata5onzf7rp26j2quaotjza 1221 17 T T NNP work_dzeata5onzf7rp26j2quaotjza 1221 18 , , , work_dzeata5onzf7rp26j2quaotjza 1221 19 Okasaka Okasaka NNP work_dzeata5onzf7rp26j2quaotjza 1221 20 S S NNP work_dzeata5onzf7rp26j2quaotjza 1221 21 , , , work_dzeata5onzf7rp26j2quaotjza 1221 22 Narula Narula NNP work_dzeata5onzf7rp26j2quaotjza 1221 23 N N NNP work_dzeata5onzf7rp26j2quaotjza 1221 24 , , , work_dzeata5onzf7rp26j2quaotjza 1221 25 Fullagar Fullagar NNP work_dzeata5onzf7rp26j2quaotjza 1221 26 N. N. NNP work_dzeata5onzf7rp26j2quaotjza 1221 27 2009 2009 CD work_dzeata5onzf7rp26j2quaotjza 1221 28 . . . work_dzeata5onzf7rp26j2quaotjza 1222 1 Native native JJ work_dzeata5onzf7rp26j2quaotjza 1222 2 client client NN work_dzeata5onzf7rp26j2quaotjza 1222 3 : : : work_dzeata5onzf7rp26j2quaotjza 1222 4 a a DT work_dzeata5onzf7rp26j2quaotjza 1222 5 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 1222 6 for for IN work_dzeata5onzf7rp26j2quaotjza 1222 7 portable portable JJ work_dzeata5onzf7rp26j2quaotjza 1222 8 , , , work_dzeata5onzf7rp26j2quaotjza 1222 9 untrusted untrusted JJ work_dzeata5onzf7rp26j2quaotjza 1222 10 x86 x86 NNP work_dzeata5onzf7rp26j2quaotjza 1222 11 native native JJ work_dzeata5onzf7rp26j2quaotjza 1222 12 code code NN work_dzeata5onzf7rp26j2quaotjza 1222 13 . . . work_dzeata5onzf7rp26j2quaotjza 1223 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1223 2 : : : work_dzeata5onzf7rp26j2quaotjza 1223 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1223 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1223 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1223 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1223 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1223 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1223 9 . . . work_dzeata5onzf7rp26j2quaotjza 1224 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1224 2 , , , work_dzeata5onzf7rp26j2quaotjza 1224 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1224 4 : : : work_dzeata5onzf7rp26j2quaotjza 1224 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1224 6 , , , work_dzeata5onzf7rp26j2quaotjza 1224 7 79–93 79–93 CD work_dzeata5onzf7rp26j2quaotjza 1224 8 . . . work_dzeata5onzf7rp26j2quaotjza 1225 1 Zeldovich Zeldovich NNP work_dzeata5onzf7rp26j2quaotjza 1225 2 N N NNP work_dzeata5onzf7rp26j2quaotjza 1225 3 , , , work_dzeata5onzf7rp26j2quaotjza 1225 4 Boyd Boyd NNP work_dzeata5onzf7rp26j2quaotjza 1225 5 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1225 6 Wickizer Wickizer NNP work_dzeata5onzf7rp26j2quaotjza 1225 7 S S NNP work_dzeata5onzf7rp26j2quaotjza 1225 8 , , , work_dzeata5onzf7rp26j2quaotjza 1225 9 Kohler Kohler NNP work_dzeata5onzf7rp26j2quaotjza 1225 10 E E NNP work_dzeata5onzf7rp26j2quaotjza 1225 11 , , , work_dzeata5onzf7rp26j2quaotjza 1225 12 Mazieres Mazieres NNP work_dzeata5onzf7rp26j2quaotjza 1225 13 D. D. NNP work_dzeata5onzf7rp26j2quaotjza 1225 14 2006 2006 CD work_dzeata5onzf7rp26j2quaotjza 1225 15 . . . work_dzeata5onzf7rp26j2quaotjza 1226 1 Making make VBG work_dzeata5onzf7rp26j2quaotjza 1226 2 information information NN work_dzeata5onzf7rp26j2quaotjza 1226 3 flow flow NN work_dzeata5onzf7rp26j2quaotjza 1226 4 explicit explicit JJ work_dzeata5onzf7rp26j2quaotjza 1226 5 in in IN work_dzeata5onzf7rp26j2quaotjza 1226 6 HiStar HiStar NNP work_dzeata5onzf7rp26j2quaotjza 1226 7 . . . work_dzeata5onzf7rp26j2quaotjza 1227 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1227 2 : : : work_dzeata5onzf7rp26j2quaotjza 1227 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1227 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1227 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1227 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1227 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1227 8 design design NN work_dzeata5onzf7rp26j2quaotjza 1227 9 and and CC work_dzeata5onzf7rp26j2quaotjza 1227 10 implementation implementation NN work_dzeata5onzf7rp26j2quaotjza 1227 11 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1227 12 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 1227 13 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1227 14 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1227 15 OSDI OSDI NNP work_dzeata5onzf7rp26j2quaotjza 1227 16 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1227 17 06 06 CD work_dzeata5onzf7rp26j2quaotjza 1227 18 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1227 19 . . . work_dzeata5onzf7rp26j2quaotjza 1228 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1228 2 : : : work_dzeata5onzf7rp26j2quaotjza 1228 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1228 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1228 5 , , , work_dzeata5onzf7rp26j2quaotjza 1228 6 263–278 263–278 CD work_dzeata5onzf7rp26j2quaotjza 1228 7 . . . work_dzeata5onzf7rp26j2quaotjza 1229 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1229 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1229 3 http://dl.acm.org/citation http://dl.acm.org/citation NN work_dzeata5onzf7rp26j2quaotjza 1229 4 . . . work_dzeata5onzf7rp26j2quaotjza 1230 1 cfm?id=1298455.1298481 cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1230 2 . . . work_dzeata5onzf7rp26j2quaotjza 1231 1 Zeng Zeng NNP work_dzeata5onzf7rp26j2quaotjza 1231 2 B B NNP work_dzeata5onzf7rp26j2quaotjza 1231 3 , , , work_dzeata5onzf7rp26j2quaotjza 1231 4 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 1231 5 G G NNP work_dzeata5onzf7rp26j2quaotjza 1231 6 , , , work_dzeata5onzf7rp26j2quaotjza 1231 7 Erlingsson Erlingsson NNP work_dzeata5onzf7rp26j2quaotjza 1231 8 Ú. Ú. NNP work_dzeata5onzf7rp26j2quaotjza 1232 1 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1232 2 . . . work_dzeata5onzf7rp26j2quaotjza 1233 1 Strato Strato NNP work_dzeata5onzf7rp26j2quaotjza 1233 2 : : : work_dzeata5onzf7rp26j2quaotjza 1233 3 a a DT work_dzeata5onzf7rp26j2quaotjza 1233 4 retargetable retargetable JJ work_dzeata5onzf7rp26j2quaotjza 1233 5 framework framework NN work_dzeata5onzf7rp26j2quaotjza 1233 6 for for IN work_dzeata5onzf7rp26j2quaotjza 1233 7 low low JJ work_dzeata5onzf7rp26j2quaotjza 1233 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1233 9 level level NN work_dzeata5onzf7rp26j2quaotjza 1233 10 inlined inline VBN work_dzeata5onzf7rp26j2quaotjza 1233 11 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1233 12 reference reference NN work_dzeata5onzf7rp26j2quaotjza 1233 13 monitors monitor NNS work_dzeata5onzf7rp26j2quaotjza 1233 14 . . . work_dzeata5onzf7rp26j2quaotjza 1234 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1234 2 : : : work_dzeata5onzf7rp26j2quaotjza 1234 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1234 4 security security NN work_dzeata5onzf7rp26j2quaotjza 1234 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1234 6 SEC’13 SEC’13 NNP work_dzeata5onzf7rp26j2quaotjza 1234 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1234 8 . . . work_dzeata5onzf7rp26j2quaotjza 1235 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1235 2 : : : work_dzeata5onzf7rp26j2quaotjza 1235 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1235 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1235 5 , , , work_dzeata5onzf7rp26j2quaotjza 1235 6 369–382 369–382 CD work_dzeata5onzf7rp26j2quaotjza 1235 7 . . . work_dzeata5onzf7rp26j2quaotjza 1236 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1236 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1236 3 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 NN work_dzeata5onzf7rp26j2quaotjza 1236 4 . . . work_dzeata5onzf7rp26j2quaotjza 1237 1 Zeng Zeng NNP work_dzeata5onzf7rp26j2quaotjza 1237 2 B B NNP work_dzeata5onzf7rp26j2quaotjza 1237 3 , , , work_dzeata5onzf7rp26j2quaotjza 1237 4 Tan Tan NNP work_dzeata5onzf7rp26j2quaotjza 1237 5 G G NNP work_dzeata5onzf7rp26j2quaotjza 1237 6 , , , work_dzeata5onzf7rp26j2quaotjza 1237 7 Morrisett Morrisett NNP work_dzeata5onzf7rp26j2quaotjza 1237 8 G. G. NNP work_dzeata5onzf7rp26j2quaotjza 1237 9 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 1237 10 . . . work_dzeata5onzf7rp26j2quaotjza 1238 1 Combining combine VBG work_dzeata5onzf7rp26j2quaotjza 1238 2 control control NN work_dzeata5onzf7rp26j2quaotjza 1238 3 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1238 4 flow flow NN work_dzeata5onzf7rp26j2quaotjza 1238 5 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 1238 6 and and CC work_dzeata5onzf7rp26j2quaotjza 1238 7 static static JJ work_dzeata5onzf7rp26j2quaotjza 1238 8 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 1238 9 for for IN work_dzeata5onzf7rp26j2quaotjza 1238 10 efficient efficient JJ work_dzeata5onzf7rp26j2quaotjza 1238 11 and and CC work_dzeata5onzf7rp26j2quaotjza 1238 12 validated validated JJ work_dzeata5onzf7rp26j2quaotjza 1238 13 data datum NNS work_dzeata5onzf7rp26j2quaotjza 1238 14 sandboxing sandboxing NN work_dzeata5onzf7rp26j2quaotjza 1238 15 . . . work_dzeata5onzf7rp26j2quaotjza 1239 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1239 2 : : : work_dzeata5onzf7rp26j2quaotjza 1239 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1239 4 conference conference NN work_dzeata5onzf7rp26j2quaotjza 1239 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1239 6 computer computer NN work_dzeata5onzf7rp26j2quaotjza 1239 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1239 8 communications communication NNS work_dzeata5onzf7rp26j2quaotjza 1239 9 security security NN work_dzeata5onzf7rp26j2quaotjza 1239 10 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1239 11 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1239 12 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1239 13 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1239 14 CCS CCS NNP work_dzeata5onzf7rp26j2quaotjza 1239 15 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1239 16 11 11 CD work_dzeata5onzf7rp26j2quaotjza 1239 17 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1239 18 . . . work_dzeata5onzf7rp26j2quaotjza 1240 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1240 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1240 3 : : : work_dzeata5onzf7rp26j2quaotjza 1240 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1240 5 , , , work_dzeata5onzf7rp26j2quaotjza 1240 6 29–40 29–40 CD work_dzeata5onzf7rp26j2quaotjza 1240 7 . . . work_dzeata5onzf7rp26j2quaotjza 1241 1 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 1241 2 F F NNP work_dzeata5onzf7rp26j2quaotjza 1241 3 , , , work_dzeata5onzf7rp26j2quaotjza 1241 4 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 1241 5 J J NNP work_dzeata5onzf7rp26j2quaotjza 1241 6 , , , work_dzeata5onzf7rp26j2quaotjza 1241 7 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 1241 8 H H NNP work_dzeata5onzf7rp26j2quaotjza 1241 9 , , , work_dzeata5onzf7rp26j2quaotjza 1241 10 Zang Zang NNP work_dzeata5onzf7rp26j2quaotjza 1241 11 B. B. NNP work_dzeata5onzf7rp26j2quaotjza 1242 1 2011 2011 CD work_dzeata5onzf7rp26j2quaotjza 1242 2 . . . work_dzeata5onzf7rp26j2quaotjza 1243 1 Cloudvisor cloudvisor NN work_dzeata5onzf7rp26j2quaotjza 1243 2 : : : work_dzeata5onzf7rp26j2quaotjza 1243 3 retrofitting retrofitting NN work_dzeata5onzf7rp26j2quaotjza 1243 4 protection protection NN work_dzeata5onzf7rp26j2quaotjza 1243 5 of of IN work_dzeata5onzf7rp26j2quaotjza 1243 6 virtual virtual JJ work_dzeata5onzf7rp26j2quaotjza 1243 7 machines machine NNS work_dzeata5onzf7rp26j2quaotjza 1243 8 in in IN work_dzeata5onzf7rp26j2quaotjza 1243 9 multi multi JJ work_dzeata5onzf7rp26j2quaotjza 1243 10 - - JJ work_dzeata5onzf7rp26j2quaotjza 1243 11 tenant tenant JJ work_dzeata5onzf7rp26j2quaotjza 1243 12 cloud cloud NN work_dzeata5onzf7rp26j2quaotjza 1243 13 with with IN work_dzeata5onzf7rp26j2quaotjza 1243 14 nested nest VBN work_dzeata5onzf7rp26j2quaotjza 1243 15 virtualization virtualization NN work_dzeata5onzf7rp26j2quaotjza 1243 16 . . . work_dzeata5onzf7rp26j2quaotjza 1244 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1244 2 : : : work_dzeata5onzf7rp26j2quaotjza 1244 3 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1244 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1244 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1244 6 operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1244 7 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1244 8 principles principle NNS work_dzeata5onzf7rp26j2quaotjza 1244 9 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1244 10 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1244 11 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1244 12 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1244 13 SOSP SOSP NNP work_dzeata5onzf7rp26j2quaotjza 1244 14 ’ ' '' work_dzeata5onzf7rp26j2quaotjza 1244 15 11 11 CD work_dzeata5onzf7rp26j2quaotjza 1244 16 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1244 17 . . . work_dzeata5onzf7rp26j2quaotjza 1245 1 New New NNP work_dzeata5onzf7rp26j2quaotjza 1245 2 York York NNP work_dzeata5onzf7rp26j2quaotjza 1245 3 : : : work_dzeata5onzf7rp26j2quaotjza 1245 4 ACM ACM NNP work_dzeata5onzf7rp26j2quaotjza 1245 5 , , , work_dzeata5onzf7rp26j2quaotjza 1245 6 203–216 203–216 CD work_dzeata5onzf7rp26j2quaotjza 1245 7 . . . work_dzeata5onzf7rp26j2quaotjza 1246 1 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 1246 2 M M NNP work_dzeata5onzf7rp26j2quaotjza 1246 3 , , , work_dzeata5onzf7rp26j2quaotjza 1246 4 Sekar Sekar NNP work_dzeata5onzf7rp26j2quaotjza 1246 5 R. R. NNP work_dzeata5onzf7rp26j2quaotjza 1246 6 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1246 7 . . . work_dzeata5onzf7rp26j2quaotjza 1247 1 Control control NN work_dzeata5onzf7rp26j2quaotjza 1247 2 flow flow VBP work_dzeata5onzf7rp26j2quaotjza 1247 3 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 1247 4 for for IN work_dzeata5onzf7rp26j2quaotjza 1247 5 COTS COTS NNP work_dzeata5onzf7rp26j2quaotjza 1247 6 binaries binary NNS work_dzeata5onzf7rp26j2quaotjza 1247 7 . . . work_dzeata5onzf7rp26j2quaotjza 1248 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1248 2 : : : work_dzeata5onzf7rp26j2quaotjza 1248 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1248 4 security security NN work_dzeata5onzf7rp26j2quaotjza 1248 5 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1248 6 SEC’13 SEC’13 NNP work_dzeata5onzf7rp26j2quaotjza 1248 7 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1248 8 . . . work_dzeata5onzf7rp26j2quaotjza 1249 1 Berkeley Berkeley NNP work_dzeata5onzf7rp26j2quaotjza 1249 2 : : : work_dzeata5onzf7rp26j2quaotjza 1249 3 USENIX USENIX NNP work_dzeata5onzf7rp26j2quaotjza 1249 4 Association Association NNP work_dzeata5onzf7rp26j2quaotjza 1249 5 , , , work_dzeata5onzf7rp26j2quaotjza 1249 6 337–352 337–352 CD work_dzeata5onzf7rp26j2quaotjza 1249 7 . . . work_dzeata5onzf7rp26j2quaotjza 1250 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1250 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1250 3 http://dl.acm.org/citation.cfm?id=2534766 http://dl.acm.org/citation.cfm?id=2534766 JJ work_dzeata5onzf7rp26j2quaotjza 1250 4 . . . work_dzeata5onzf7rp26j2quaotjza 1251 1 2534796 2534796 CD work_dzeata5onzf7rp26j2quaotjza 1251 2 . . . work_dzeata5onzf7rp26j2quaotjza 1252 1 Zhang Zhang NNP work_dzeata5onzf7rp26j2quaotjza 1252 2 C C NNP work_dzeata5onzf7rp26j2quaotjza 1252 3 , , , work_dzeata5onzf7rp26j2quaotjza 1252 4 Wei Wei NNP work_dzeata5onzf7rp26j2quaotjza 1252 5 T T NNP work_dzeata5onzf7rp26j2quaotjza 1252 6 , , , work_dzeata5onzf7rp26j2quaotjza 1252 7 Chen Chen NNP work_dzeata5onzf7rp26j2quaotjza 1252 8 Z Z NNP work_dzeata5onzf7rp26j2quaotjza 1252 9 , , , work_dzeata5onzf7rp26j2quaotjza 1252 10 Duan Duan NNP work_dzeata5onzf7rp26j2quaotjza 1252 11 L L NNP work_dzeata5onzf7rp26j2quaotjza 1252 12 , , , work_dzeata5onzf7rp26j2quaotjza 1252 13 Szekeres Szekeres NNP work_dzeata5onzf7rp26j2quaotjza 1252 14 L L NNP work_dzeata5onzf7rp26j2quaotjza 1252 15 , , , work_dzeata5onzf7rp26j2quaotjza 1252 16 McCamant McCamant NNP work_dzeata5onzf7rp26j2quaotjza 1252 17 S S NNP work_dzeata5onzf7rp26j2quaotjza 1252 18 , , , work_dzeata5onzf7rp26j2quaotjza 1252 19 Song Song NNP work_dzeata5onzf7rp26j2quaotjza 1252 20 D D NNP work_dzeata5onzf7rp26j2quaotjza 1252 21 , , , work_dzeata5onzf7rp26j2quaotjza 1252 22 Zou Zou NNP work_dzeata5onzf7rp26j2quaotjza 1252 23 W. W. NNP work_dzeata5onzf7rp26j2quaotjza 1252 24 2013 2013 CD work_dzeata5onzf7rp26j2quaotjza 1252 25 . . . work_dzeata5onzf7rp26j2quaotjza 1253 1 Practical practical JJ work_dzeata5onzf7rp26j2quaotjza 1253 2 control control NN work_dzeata5onzf7rp26j2quaotjza 1253 3 flow flow NN work_dzeata5onzf7rp26j2quaotjza 1253 4 integrity integrity NN work_dzeata5onzf7rp26j2quaotjza 1253 5 and and CC work_dzeata5onzf7rp26j2quaotjza 1253 6 randomization randomization NN work_dzeata5onzf7rp26j2quaotjza 1253 7 for for IN work_dzeata5onzf7rp26j2quaotjza 1253 8 binary binary JJ work_dzeata5onzf7rp26j2quaotjza 1253 9 executables executable NNS work_dzeata5onzf7rp26j2quaotjza 1253 10 . . . work_dzeata5onzf7rp26j2quaotjza 1254 1 In in IN work_dzeata5onzf7rp26j2quaotjza 1254 2 : : : work_dzeata5onzf7rp26j2quaotjza 1254 3 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1254 4 symposium symposium NN work_dzeata5onzf7rp26j2quaotjza 1254 5 on on IN work_dzeata5onzf7rp26j2quaotjza 1254 6 security security NN work_dzeata5onzf7rp26j2quaotjza 1254 7 and and CC work_dzeata5onzf7rp26j2quaotjza 1254 8 privacy privacy NN work_dzeata5onzf7rp26j2quaotjza 1254 9 . . . work_dzeata5onzf7rp26j2quaotjza 1255 1 Washington Washington NNP work_dzeata5onzf7rp26j2quaotjza 1255 2 , , , work_dzeata5onzf7rp26j2quaotjza 1255 3 DC DC NNP work_dzeata5onzf7rp26j2quaotjza 1255 4 : : : work_dzeata5onzf7rp26j2quaotjza 1255 5 IEEE IEEE NNP work_dzeata5onzf7rp26j2quaotjza 1255 6 Computer Computer NNP work_dzeata5onzf7rp26j2quaotjza 1255 7 Society Society NNP work_dzeata5onzf7rp26j2quaotjza 1255 8 , , , work_dzeata5onzf7rp26j2quaotjza 1255 9 559–573 559–573 CD work_dzeata5onzf7rp26j2quaotjza 1255 10 . . . work_dzeata5onzf7rp26j2quaotjza 1256 1 Zhong Zhong NNP work_dzeata5onzf7rp26j2quaotjza 1256 2 Q Q NNP work_dzeata5onzf7rp26j2quaotjza 1256 3 , , , work_dzeata5onzf7rp26j2quaotjza 1256 4 Edwards Edwards NNP work_dzeata5onzf7rp26j2quaotjza 1256 5 N N NNP work_dzeata5onzf7rp26j2quaotjza 1256 6 , , , work_dzeata5onzf7rp26j2quaotjza 1256 7 Rees Rees NNPS work_dzeata5onzf7rp26j2quaotjza 1256 8 O. O. NNP work_dzeata5onzf7rp26j2quaotjza 1257 1 1997 1997 CD work_dzeata5onzf7rp26j2quaotjza 1257 2 . . . work_dzeata5onzf7rp26j2quaotjza 1258 1 Operating operate VBG work_dzeata5onzf7rp26j2quaotjza 1258 2 system system NN work_dzeata5onzf7rp26j2quaotjza 1258 3 support support NN work_dzeata5onzf7rp26j2quaotjza 1258 4 for for IN work_dzeata5onzf7rp26j2quaotjza 1258 5 the the DT work_dzeata5onzf7rp26j2quaotjza 1258 6 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 1258 7 method method NN work_dzeata5onzf7rp26j2quaotjza 1258 8 and and CC work_dzeata5onzf7rp26j2quaotjza 1258 9 its -PRON- PRP$ work_dzeata5onzf7rp26j2quaotjza 1258 10 application application NN work_dzeata5onzf7rp26j2quaotjza 1258 11 on on IN work_dzeata5onzf7rp26j2quaotjza 1258 12 mobile mobile JJ work_dzeata5onzf7rp26j2quaotjza 1258 13 code code NN work_dzeata5onzf7rp26j2quaotjza 1258 14 security security NN work_dzeata5onzf7rp26j2quaotjza 1258 15 . . . work_dzeata5onzf7rp26j2quaotjza 1259 1 Technical Technical NNP work_dzeata5onzf7rp26j2quaotjza 1259 2 Report Report NNP work_dzeata5onzf7rp26j2quaotjza 1259 3 HPL-97 hpl-97 CD work_dzeata5onzf7rp26j2quaotjza 1259 4 - - SYM work_dzeata5onzf7rp26j2quaotjza 1259 5 153 153 CD work_dzeata5onzf7rp26j2quaotjza 1259 6 . . . work_dzeata5onzf7rp26j2quaotjza 1260 1 HP HP NNP work_dzeata5onzf7rp26j2quaotjza 1260 2 Laboratories Laboratories NNPS work_dzeata5onzf7rp26j2quaotjza 1260 3 Bristol Bristol NNP work_dzeata5onzf7rp26j2quaotjza 1260 4 . . . work_dzeata5onzf7rp26j2quaotjza 1261 1 Available available JJ work_dzeata5onzf7rp26j2quaotjza 1261 2 at at IN work_dzeata5onzf7rp26j2quaotjza 1261 3 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/hpl-97-153.pdf NN work_dzeata5onzf7rp26j2quaotjza 1261 4 . . . work_dzeata5onzf7rp26j2quaotjza 1262 1 Maass Maass NNP work_dzeata5onzf7rp26j2quaotjza 1262 2 et et FW work_dzeata5onzf7rp26j2quaotjza 1262 3 al al NNP work_dzeata5onzf7rp26j2quaotjza 1262 4 . . . work_dzeata5onzf7rp26j2quaotjza 1263 1 ( ( -LRB- work_dzeata5onzf7rp26j2quaotjza 1263 2 2016 2016 CD work_dzeata5onzf7rp26j2quaotjza 1263 3 ) ) -RRB- work_dzeata5onzf7rp26j2quaotjza 1263 4 , , , work_dzeata5onzf7rp26j2quaotjza 1263 5 PeerJ PeerJ NNP work_dzeata5onzf7rp26j2quaotjza 1263 6 Comput Comput NNP work_dzeata5onzf7rp26j2quaotjza 1263 7 . . . work_dzeata5onzf7rp26j2quaotjza 1264 1 Sci Sci NNP work_dzeata5onzf7rp26j2quaotjza 1264 2 . . NNP work_dzeata5onzf7rp26j2quaotjza 1264 3 , , , work_dzeata5onzf7rp26j2quaotjza 1264 4 DOI DOI NNP work_dzeata5onzf7rp26j2quaotjza 1264 5 10.7717 10.7717 CD work_dzeata5onzf7rp26j2quaotjza 1264 6 / / SYM work_dzeata5onzf7rp26j2quaotjza 1264 7 peerj peerj NNP work_dzeata5onzf7rp26j2quaotjza 1264 8 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1264 9 cs.43 cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1264 10 36/36 36/36 CD work_dzeata5onzf7rp26j2quaotjza 1264 11 https://peerj.com/computer-science/ https://peerj.com/computer-science/ NNP work_dzeata5onzf7rp26j2quaotjza 1264 12 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 13 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 14 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 15 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 16 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 17 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 18 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 19 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 20 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 21 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 22 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 23 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 24 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 25 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 26 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 27 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 28 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 29 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 30 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 31 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 32 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 33 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 34 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 35 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 36 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 37 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 38 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 39 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 40 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 41 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 42 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 43 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 44 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 45 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 46 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 47 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 48 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 49 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 50 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 51 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 52 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 53 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 54 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 55 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 56 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 57 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 58 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 59 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 60 http://dl.acm.org/citation.cfm?id=1855741.1855758 http://dl.acm.org/citation.cfm?id=1855741.1855758 NNP work_dzeata5onzf7rp26j2quaotjza 1264 61 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 62 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 ADD work_dzeata5onzf7rp26j2quaotjza 1264 63 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 64 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 65 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 66 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 67 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 68 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 69 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 70 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 71 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 72 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 73 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 74 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 75 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 76 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 77 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 78 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 79 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 80 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 81 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 82 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 83 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 84 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 85 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 86 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 87 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 88 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 89 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 90 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 91 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 92 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 93 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 94 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 95 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 96 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 97 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 98 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 99 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 100 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 101 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 102 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 103 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 104 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 105 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 106 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 107 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 108 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 109 http://dl.acm.org/citation.cfm?id=2362793.2362820 http://dl.acm.org/citation.cfm?id=2362793.2362820 NNP work_dzeata5onzf7rp26j2quaotjza 1264 110 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 111 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 112 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 113 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 114 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 115 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 116 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 117 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 118 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 119 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 120 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 121 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 122 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 123 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 124 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 125 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 126 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 127 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 128 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 129 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 130 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 131 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 132 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 133 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 134 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 135 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 136 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 137 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 138 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 139 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 140 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 141 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 142 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 143 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 144 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 145 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 146 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 147 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 148 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 149 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 150 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 151 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 152 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 153 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 154 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 155 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 156 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 157 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 158 http://dl.acm.org/citation.cfm?id=1298455.1298481 http://dl.acm.org/citation.cfm?id=1298455.1298481 NNP work_dzeata5onzf7rp26j2quaotjza 1264 159 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 NNP work_dzeata5onzf7rp26j2quaotjza 1264 160 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 161 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 162 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 163 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 164 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 165 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 166 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 167 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 168 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 169 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 170 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 171 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 172 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 173 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 174 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 175 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 176 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 177 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 178 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 179 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 180 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 181 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 182 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 183 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 184 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 185 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 186 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 187 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 188 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 189 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 190 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 191 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 192 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 193 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 194 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 195 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 196 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 197 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 198 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 199 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 200 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 201 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 202 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 203 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 204 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 205 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 206 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 ADD work_dzeata5onzf7rp26j2quaotjza 1264 207 http://dl.acm.org/citation.cfm?id=2534766.2534798 http://dl.acm.org/citation.cfm?id=2534766.2534798 JJ work_dzeata5onzf7rp26j2quaotjza 1264 208 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 -LRB- work_dzeata5onzf7rp26j2quaotjza 1264 209 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 210 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 211 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 212 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 213 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 214 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 215 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 216 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 217 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 218 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 219 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 220 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 221 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 222 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 223 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 224 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 225 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 226 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 227 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 228 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 229 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 230 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 231 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 232 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 233 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 234 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 235 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 236 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 237 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 238 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 239 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 240 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 241 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 242 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 243 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 244 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 245 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 246 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 247 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 248 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 249 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 250 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 251 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 252 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 253 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 254 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 255 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 256 http://dl.acm.org/citation.cfm?id=2534766.2534796 http://dl.acm.org/citation.cfm?id=2534766.2534796 UH work_dzeata5onzf7rp26j2quaotjza 1264 257 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 258 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 259 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 260 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 261 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 262 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 263 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 264 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 265 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 266 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 267 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 268 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 269 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 270 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 271 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 272 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 273 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 274 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 275 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 276 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 277 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 278 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 279 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 280 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 281 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 282 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 283 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 284 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 285 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 286 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 287 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 288 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 289 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 290 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 291 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 292 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 293 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 294 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 295 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 296 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 297 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 298 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 299 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 300 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 301 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 302 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 303 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 304 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 305 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 306 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 307 http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf http://www.hpl.hp.com/techreports/97/HPL-97-153.pdf NNP work_dzeata5onzf7rp26j2quaotjza 1264 308 http://dx.doi.org/10.7717/peerj-cs.43 http://dx.doi.org/10.7717/peerj-cs.43 NNP work_dzeata5onzf7rp26j2quaotjza 1264 309 A a DT work_dzeata5onzf7rp26j2quaotjza 1264 310 systematic systematic JJ work_dzeata5onzf7rp26j2quaotjza 1264 311 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 1264 312 of of IN work_dzeata5onzf7rp26j2quaotjza 1264 313 the the DT work_dzeata5onzf7rp26j2quaotjza 1264 314 science science NN work_dzeata5onzf7rp26j2quaotjza 1264 315 of of IN work_dzeata5onzf7rp26j2quaotjza 1264 316 sandboxing sandboxe VBG work_dzeata5onzf7rp26j2quaotjza 1264 317 Introduction introduction NN work_dzeata5onzf7rp26j2quaotjza 1264 318 What what WP work_dzeata5onzf7rp26j2quaotjza 1264 319 is be VBZ work_dzeata5onzf7rp26j2quaotjza 1264 320 a a DT work_dzeata5onzf7rp26j2quaotjza 1264 321 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 1264 322 ? ? . work_dzeata5onzf7rp26j2quaotjza 1265 1 Methodology Methodology NNP work_dzeata5onzf7rp26j2quaotjza 1265 2 Picking Picking NNP work_dzeata5onzf7rp26j2quaotjza 1265 3 papers paper NNS work_dzeata5onzf7rp26j2quaotjza 1265 4 Categorizing categorize VBG work_dzeata5onzf7rp26j2quaotjza 1265 5 the the DT work_dzeata5onzf7rp26j2quaotjza 1265 6 dataset dataset NN work_dzeata5onzf7rp26j2quaotjza 1265 7 Analyzing analyze VBG work_dzeata5onzf7rp26j2quaotjza 1265 8 the the DT work_dzeata5onzf7rp26j2quaotjza 1265 9 dataset dataset JJ work_dzeata5onzf7rp26j2quaotjza 1265 10 Results Results NNP work_dzeata5onzf7rp26j2quaotjza 1265 11 Sandboxes Sandboxes NNP work_dzeata5onzf7rp26j2quaotjza 1265 12 : : : work_dzeata5onzf7rp26j2quaotjza 1265 13 building building NN work_dzeata5onzf7rp26j2quaotjza 1265 14 materials material NNS work_dzeata5onzf7rp26j2quaotjza 1265 15 for for IN work_dzeata5onzf7rp26j2quaotjza 1265 16 secure secure JJ work_dzeata5onzf7rp26j2quaotjza 1265 17 systems system NNS work_dzeata5onzf7rp26j2quaotjza 1265 18 Policy policy NN work_dzeata5onzf7rp26j2quaotjza 1265 19 flexibility flexibility NN work_dzeata5onzf7rp26j2quaotjza 1265 20 as as IN work_dzeata5onzf7rp26j2quaotjza 1265 21 a a DT work_dzeata5onzf7rp26j2quaotjza 1265 22 usability usability NN work_dzeata5onzf7rp26j2quaotjza 1265 23 bellwether bellwether NN work_dzeata5onzf7rp26j2quaotjza 1265 24 The the DT work_dzeata5onzf7rp26j2quaotjza 1265 25 state state NN work_dzeata5onzf7rp26j2quaotjza 1265 26 of of IN work_dzeata5onzf7rp26j2quaotjza 1265 27 practice practice NN work_dzeata5onzf7rp26j2quaotjza 1265 28 in in IN work_dzeata5onzf7rp26j2quaotjza 1265 29 sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 1265 30 validation validation NN work_dzeata5onzf7rp26j2quaotjza 1265 31 Strengthening strengthen VBG work_dzeata5onzf7rp26j2quaotjza 1265 32 Sandboxing Sandboxing NNP work_dzeata5onzf7rp26j2quaotjza 1265 33 Results Results NNPS work_dzeata5onzf7rp26j2quaotjza 1265 34 Structured structured JJ work_dzeata5onzf7rp26j2quaotjza 1265 35 arguments argument NNS work_dzeata5onzf7rp26j2quaotjza 1265 36 Sandbox sandbox NN work_dzeata5onzf7rp26j2quaotjza 1265 37 and and CC work_dzeata5onzf7rp26j2quaotjza 1265 38 policy policy NN work_dzeata5onzf7rp26j2quaotjza 1265 39 usability usability NN work_dzeata5onzf7rp26j2quaotjza 1265 40 Enabling enable VBG work_dzeata5onzf7rp26j2quaotjza 1265 41 Meta Meta NNP work_dzeata5onzf7rp26j2quaotjza 1265 42 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1265 43 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 1265 44 Generalizability generalizability NN work_dzeata5onzf7rp26j2quaotjza 1265 45 of of IN work_dzeata5onzf7rp26j2quaotjza 1265 46 methodology methodology NN work_dzeata5onzf7rp26j2quaotjza 1265 47 Meta meta JJ work_dzeata5onzf7rp26j2quaotjza 1265 48 - - HYPH work_dzeata5onzf7rp26j2quaotjza 1265 49 analysis analysis NN work_dzeata5onzf7rp26j2quaotjza 1265 50 challenges challenge NNS work_dzeata5onzf7rp26j2quaotjza 1265 51 and and CC work_dzeata5onzf7rp26j2quaotjza 1265 52 suggested suggest VBD work_dzeata5onzf7rp26j2quaotjza 1265 53 solutions solution NNS work_dzeata5onzf7rp26j2quaotjza 1265 54 Threats Threats NNPS work_dzeata5onzf7rp26j2quaotjza 1265 55 to to IN work_dzeata5onzf7rp26j2quaotjza 1265 56 Validity Validity NNP work_dzeata5onzf7rp26j2quaotjza 1265 57 Conclusion Conclusion NNP work_dzeata5onzf7rp26j2quaotjza 1265 58 References reference NNS