{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:08:52Z","timestamp":1725516532179},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691471"},{"type":"electronic","value":"9783540691495"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-69149-5_5","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T16:07:43Z","timestamp":1218557263000},"page":"42-48","source":"Crossref","is-referenced-by-count":1,"title":["The Verified Software Challenge: A Call for a Holistic Approach to Reliability"],"prefix":"10.1007","author":[{"given":"Thomas","family":"Ball","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Bush, W.R., Pincus, J.D., Sielaff, D.J.: A static analyzer for finding dynamic programming errors. Software-Practice and Experience\u00a030(7), 775\u2013802 (2000)","DOI":"10.1002\/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Ball, T., Rajamani, S.K.: Automatically validating temporal safety properties of interfaces. In: Dwyer, M.B. (ed.) SPIN 2001. LNCS, vol.\u00a02057, Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45139-0_7"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Chaki, S., Clarke, E., Groce, A., Jha, S., Veith, H.: Modular verification of software components in C. TSE: Transactions on Software Engineering\u00a030(6), 388\u2013402 (2004)","DOI":"10.1109\/TSE.2004.22"},{"key":"5_CR4","unstructured":"Chen, H., Dean, D., Wagner, D.: Model checking one million lines of C code. In: NDSS: Network and Distributed System Security Symposium, pp. 171\u2013185 (2004)"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Das, M., Lerner, S., Seigle, M.: ESP: path-sensitive program verifica-tion in polynomial time. In: PLDI 2002: Programming language design and implementation, pp. 57\u201368. ACM, New York (2002)","DOI":"10.1145\/512537.512538"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Evans, D., Larochelle, D.: Improving security using extensible lightweight static analysis. IEEE Software\u00a019(1), 42\u201351 (2002)","DOI":"10.1109\/52.976940"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Flanagan, C., Leino, K.R.M., Lillibridge, M., Nelson, G., Saxe, J.B., Stata, R.: Extended static checking for java. In: PLDI 2002: Programming Language Design and Implementation, pp. 234\u2013245. ACM, New York (2002)","DOI":"10.1145\/512529.512558"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Foster, J.S., Terauchi, T., Aiken, A.: Flow-sensitive type qualifiers. In: PLDI 2002: Programming language design and implementation, pp. 1\u201312. ACM, New York (2002)","DOI":"10.1145\/512529.512531"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Godefroid, P.: Model checking for programming languages using Verisoft. In: POPL 1997: Principles of Programming Languages, pp. 174\u2013186. ACM, New York (1997)","DOI":"10.1145\/263699.263717"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Hallem, S., Chelf, B., Xie, Y., Engler, D.: Asystem and language for building system-specific, static analyses. In: PLDI 2002: Programming Lan-guage Design and Implementation, pp. 69\u201382. ACM, New York (2002)","DOI":"10.1145\/512537.512539"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. In: POPL 2002, pp. 58\u201370. ACM Press, New York (2002)","DOI":"10.1145\/503272.503279"},{"key":"5_CR12","unstructured":"Hunt, G.C., Larus, J.R.: Singularity design motivation. Technical Report MSR-TR-2004-105, Microsoft Research (December 2004)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Holzmann, G.J.: Logic verification of ANSI-C code with Spin. In: Havelund, K., Penix, J., Visser, W. (eds.) SPIN 2000. LNCS, vol.\u00a01885, pp. 131\u2013147. Springer, Heidelberg (2000)","DOI":"10.1007\/10722468_8"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Larus, J.R., Ball, T., Das, M., DeLine, R., Fahndrich, M., Pincus, J., Ra-jamani, S.K., Venkatapathy, R.: Righting software. IEEE Software\u00a021(3), 92\u2013100 (2004)","DOI":"10.1109\/MS.2004.1293079"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Necula, G., McPeak, S., Weimer, W.: CCured: Type-safe retrofitting of legacy code. In: POPL 2002, pp. 128\u2013139. ACM, New York (2002)","DOI":"10.1145\/503272.503286"}],"container-title":["Lecture Notes in Computer Science","Verified Software: Theories, Tools, Experiments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69149-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T07:44:11Z","timestamp":1557733451000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69149-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540691471","9783540691495"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69149-5_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}