{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T13:44:01Z","timestamp":1726407841280},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030042714"},{"type":"electronic","value":"9783030042721"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04272-1_4","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T01:02:36Z","timestamp":1542589356000},"page":"51-67","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Evaluating and Integrating Diverse Bug Finders for Effective Program Analysis"],"prefix":"10.1007","author":[{"given":"Bailin","family":"Lu","sequence":"first","affiliation":[]},{"given":"Wei","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Liangze","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"key":"4_CR1","unstructured":"CBMC. \n http:\/\/www.cprover.org\/cbmc\/"},{"key":"4_CR2","unstructured":"Clang Static Analyzer. \n http:\/\/clang-analyzer.llvm.org\/"},{"key":"4_CR3","unstructured":"Cppcheck. \n http:\/\/cppcheck.sourceforge.net\/"},{"key":"4_CR4","unstructured":"Frama-C. \n http:\/\/frama-c.com\/"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MS.2008.130","volume":"25","author":"N Ayewah","year":"2008","unstructured":"Ayewah, N., Penix, J., Morgenthaler, J.D., Pugh, W., Hovemeyer, D.: Using static analysis to find bugs. IEEE Softw. 25, 22\u201329 (2008). \n https:\/\/doi.org\/10.1109\/MS.2008.130","journal-title":"IEEE Softw."},{"key":"4_CR6","unstructured":"Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Usenix Conference on Operating Systems Design and Implementation, pp. 209\u2013224 (2009)"},{"key":"4_CR7","unstructured":"CAS: CAS static analysis tool study methodology. NSA (2012)"},{"key":"4_CR8","unstructured":"CAS: Juliet test suite v1.2 for C\/verb\/C++ user guide. NSA (2012)"},{"issue":"20","key":"4_CR9","first-page":"66","volume":"34","author":"C Chen","year":"2008","unstructured":"Chen, C., Li, J., Kong, D.: Source code static analysis based on data fusion. Comput. Eng. 34(20), 66\u201368 (2008)","journal-title":"Comput. Eng."},{"key":"4_CR10","volume-title":"Secure Programming with Static Analysis","author":"B Chess","year":"2007","unstructured":"Chess, B., West, J.: Secure Programming with Static Analysis. Addison-Wesley Professional, Boston (2007)"},{"issue":"4","key":"4_CR11","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1093\/logcom\/2.4.511","volume":"2","author":"P Cousot","year":"1992","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation frameworks. J. Log. Comput. 2(4), 511\u2013547 (1992)","journal-title":"J. Log. Comput."},{"issue":"11","key":"4_CR12","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1145\/1592761.1592781","volume":"52","author":"EM Clarke","year":"2009","unstructured":"Clarke, E.M., Emerson, E.A., Sifakis, J.: Model checking: algorithmic verification and debugging. Commun. ACM 52(11), 74\u201384 (2009)","journal-title":"Commun. ACM"},{"issue":"4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/j.infsof.2010.12.007","volume":"53","author":"SS Heckman","year":"2011","unstructured":"Heckman, S.S., Williams, L.A.: A systematic literature review of actionable alert identification techniques for automated static code analysis. Inf. Softw. Technol. 53(4), 363\u2013387 (2011)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Johnson, B., Song, Y., Murphy-Hill, E.R., Bowdidge, R.W.: Why don\u2019t software developers use static analysis tools to find bugs? In: Notkin, D., Cheng, B.H.C., Pohl, K. (eds.) 35th International Conference on Software Engineering, ICSE 2013, San Francisco, CA, USA, 18\u201326 May 2013, pp. 672\u2013681. IEEE Computer Society (2013)","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"4_CR15","unstructured":"kgirard: The tool output integration framework (TOIF) is a powerful composite vulnerability detection platform (2016). \n https:\/\/github.com\/KdmAnalytics\/toif"},{"issue":"7","key":"4_CR16","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"issue":"3","key":"4_CR17","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1007\/s00165-014-0326-7","volume":"27","author":"F Kirchner","year":"2015","unstructured":"Kirchner, F., Kosmatov, N., Prevosto, V., Signoles, J., Yakobowski, B.: Frama-C: a software analysis perspective. Formal Aspects Comput. 27(3), 573\u2013609 (2015)","journal-title":"Formal Aspects Comput."},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-54862-8_26","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"D Kroening","year":"2014","unstructured":"Kroening, D., Tautschnig, M.: CBMC \u2013 C bounded model checker. In: \u00c1brah\u00e1m, E., Havelund, K. (eds.) TACAS 2014. LNCS, vol. 8413, pp. 389\u2013391. Springer, Heidelberg (2014). \n https:\/\/doi.org\/10.1007\/978-3-642-54862-8_26"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"McLean, R.K.: Comparing static security analysis tools using open source software. In: IEEE Sixth International Conference on Software Security and Reliability Companion, pp. 68\u201374. IEEE (2012)","DOI":"10.1109\/SERE-C.2012.16"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Meng, N., Wang, Q., Wu, Q., Mei, H.: An approach to merge results of multiple static analysis tools (short paper). In: Zhu, H. (ed.) Proceedings of the Eighth International Conference on Quality Software, pp. 169\u2013174. IEEE Computer Society (2008)","DOI":"10.1109\/QSIC.2008.30"},{"issue":"13","key":"4_CR21","first-page":"39","volume":"4","author":"EO Omidiora","year":"2013","unstructured":"Omidiora, E.O., Adeyanju, I.A., Fenwa, O.D.: Comparison of machine learning classifiers for recognition of online and offline handwritten digits. Comput. Eng. Intell. Syst. 4(13), 39\u201347 (2013)","journal-title":"Comput. Eng. Intell. Syst."},{"issue":"10","key":"4_CR22","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2012","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12(10), 2825\u20132830 (2012)","journal-title":"J. Mach. Learn. Res."},{"key":"4_CR23","unstructured":"Rutar, N., Almazan, C.B., Foster, J.S.: A comparison of bug finding tools for java. In: International Symposium on Software Reliability Engineering, pp. 245\u2013256 (2004)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Thung, F.: To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 50\u201359 (2012)","DOI":"10.1145\/2351676.2351685"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Thung, F., Lucia, Lo, D., Jiang, L., Devanbu, P.T.: To what extent could we detect field defects? An empirical study of false negatives in static bug finding tools. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, pp. 50\u201359. SelectedWorks (2013)","DOI":"10.1145\/2351676.2351685"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Wagner, S., Deissenboeck, F., Aichner, M., Wimmer, J., Schwalb, M.: An evaluation of two bug pattern tools for java. In: International Conference on Software Testing, Verification, and Validation, pp. 248\u2013257 (2008)","DOI":"10.1109\/ICST.2008.63"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/11430230_4","volume-title":"Testing of Communicating Systems","author":"S Wagner","year":"2005","unstructured":"Wagner, S., J\u00fcrjens, J., Koller, C., Trischberger, P.: Comparing bug finding tools with reviews and tests. In: Khendek, F., Dssouli, R. (eds.) TestCom 2005. LNCS, vol. 3502, pp. 40\u201355. Springer, Heidelberg (2005). \n https:\/\/doi.org\/10.1007\/11430230_4"},{"issue":"3","key":"4_CR28","first-page":"69","volume":"51","author":"S Zhang","year":"2015","unstructured":"Zhang, S., Shang, Z.: Software defect pattern analysis and location based on Cppcheck. Comput. Eng. Appl. 51(3), 69\u201373 (2015)","journal-title":"Comput. Eng. Appl."}],"container-title":["Lecture Notes in Computer Science","Software Analysis, Testing, and Evolution"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04272-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T05:13:57Z","timestamp":1558329237000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04272-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030042714","9783030042721"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04272-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SATE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Analysis, Testing, and Evolution","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzheng","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"satev2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/xiongyingfei.github.io\/confs\/sate18\/index_en.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}