{"_id":"9GH4aZuRKZEFjxz6A","authorIDs":[],"author_short":["Livshits, B.","Nori, A.","Rajamani, S.","Banerjee, A."],"bibbaseid":"livshits-nori-rajamani-banerjee-merlinspecificationinferenceforexplicitinformationflowproblems-2009","bibdata":{"id":"1aa901a5-3a4c-3107-8613-aa32d27a4603","title":"Merlin: specification inference for explicit information flow problems","type":"article","year":"2009","identifiers":"[object Object]","keywords":"security analysis tools,specification inference","created":"2013-12-30T20:59:21.000Z","websites":"http://dl.acm.org/citation.cfm?id=1542485","accessed":"2013-12-30","file_attached":"true","profile_id":"004bdeb9-12f7-3879-957f-241cda5af41a","last_modified":"2014-06-23T20:42:24.000Z","read":false,"starred":false,"authored":"true","confirmed":"true","hidden":false,"citation_key":"Livshits2009","client_data":"\"desktop_id\":\"f02a7166-77f0-44e1-b95d-6ba4d97f9769\"","bibtype":"article","author":"Livshits, Benjamin and Nori, AV and Rajamani, SK and Banerjee, A","journal":"ACM Sigplan Notices","bibtex":"@article{\n id = {1aa901a5-3a4c-3107-8613-aa32d27a4603},\n title = {Merlin: specification inference for explicit information flow problems},\n type = {article},\n year = {2009},\n identifiers = {[object Object]},\n keywords = {security analysis tools,specification inference},\n created = {2013-12-30T20:59:21.000Z},\n websites = {http://dl.acm.org/citation.cfm?id=1542485},\n accessed = {2013-12-30},\n file_attached = {true},\n profile_id = {004bdeb9-12f7-3879-957f-241cda5af41a},\n last_modified = {2014-06-23T20:42:24.000Z},\n read = {false},\n starred = {false},\n authored = {true},\n confirmed = {true},\n hidden = {false},\n citation_key = {Livshits2009},\n client_data = {\"desktop_id\":\"f02a7166-77f0-44e1-b95d-6ba4d97f9769\"},\n bibtype = {article},\n author = {Livshits, Benjamin and Nori, AV and Rajamani, SK and Banerjee, A},\n journal = {ACM Sigplan Notices}\n}","author_short":["Livshits, B.","Nori, A.","Rajamani, S.","Banerjee, A."],"urls":{"Paper":"http://bibbase.org/service/mendeley/004bdeb9-12f7-3879-957f-241cda5af41a/file/5039f239-dd9a-62f1-656b-3f2b7bc7f525/Merlin: specification inference for explicit information flow problems.pdf"},"bibbaseid":"livshits-nori-rajamani-banerjee-merlinspecificationinferenceforexplicitinformationflowproblems-2009","role":"author","keyword":["security analysis tools","specification inference"],"downloads":0},"bibtype":"article","biburl":null,"creationDate":"2014-11-06T00:16:25.451Z","downloads":0,"keywords":["security analysis tools","specification inference"],"search_terms":["merlin","specification","inference","explicit","information","flow","problems","livshits","nori","rajamani","banerjee"],"title":"Merlin: specification inference for explicit information flow problems","year":2009}