{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T19:08:36Z","timestamp":1724094516611},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1321141"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2786805.2786879","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["String analysis for Java and Android applications"],"prefix":"10.1145","author":[{"given":"Ding","family":"Li","sequence":"first","affiliation":[{"name":"University of Southern California, USA"}]},{"given":"Yingjun","family":"Lyu","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]},{"given":"Mian","family":"Wan","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]},{"given":"William G. J.","family":"Halfond","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"Aho A. V.","year":"2006","unstructured":"A. V. Aho , M. S. Lam , R. Sethi , and J. D. Ullman . Compilers: Principles, Techniques, and Tools ( 2 nd Edition). Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 2006 . A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools (2nd Edition). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2006.","edition":"2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337334"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_27"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11924661_23"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760267.1760269"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_8_1","series-title":"Lecture Notes in Computer Science","first-page":"212","volume-title":"Static Analysis","author":"Dor N.","unstructured":"N. Dor , M. Rodeh , and M. Sagiv . Cleanness Checking of String Manipulations in C Programs via Integer Analysis . In P. Cousot, editor, Static Analysis , volume 2126 of Lecture Notes in Computer Science , pages 194\u2013 212 . Springer Berlin Heidelberg, 2001. N. Dor, M. Rodeh, and M. Sagiv. Cleanness Checking of String Manipulations in C Programs via Integer Analysis. In P. Cousot, editor, Static Analysis, volume 2126 of Lecture Notes in Computer Science, pages 194\u2013212. Springer Berlin Heidelberg, 2001."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/780822.781149"},{"key":"e_1_3_2_1_10_1","first-page":"542","volume-title":"SEKE","author":"Fu X.","year":"2010","unstructured":"X. Fu and C.-C. Li . A String Constraint Solver for Detecting Web Application Vulnerability . In SEKE , pages 535\u2013 542 , 2010 . X. Fu and C.-C. Li. A String Constraint Solver for Detecting Web Application Vulnerability. In SEKE, pages 535\u2013542, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.43"},{"key":"e_1_3_2_1_12_1","unstructured":"31st Annual International volume 1 pages 87\u201396 July 2007. 31st Annual International volume 1 pages 87\u201396 July 2007."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491462"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070519"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999476"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999468"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287646"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453126"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.26"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542498"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.29"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572286"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568321"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134447"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060809"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100047"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786836"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.38"},{"key":"e_1_3_2_1_30_1","first-page":"22","volume-title":"Abstracting Symbolic Execution with String Analysis. In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION, 2007","author":"Shannon D.","year":"2007","unstructured":"D. Shannon , S. Hajra , A. Lee , D. Zhan , and S. Khurshid . Abstracting Symbolic Execution with String Analysis. In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION, 2007 . TAICPART-MUTATION 2007 , pages 13\u2013 22 , Sept 2007. D. Shannon, S. Hajra, A. Lee, D. Zhan, and S. Khurshid. Abstracting Symbolic Execution with String Analysis. In Testing: Academic and Industrial Conference Practice and Research Techniques - MUTATION, 2007. TAICPART-MUTATION 2007, pages 13\u201322, Sept 2007."},{"key":"e_1_3_2_1_31_1","first-page":"1999","volume-title":"Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON \u201999","author":"Vall\u00e9e-Rai R.","unstructured":"R. Vall\u00e9e-Rai , P. Co , E. Gagnon , L. Hendren , P. Lam , and V. Sundaresan . Soot - a java bytecode optimization framework . In Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON \u201999 , pages 13\u2013. IBM Press, 1999 . R. Vall\u00e9e-Rai, P. Co, E. Gagnon, L. Hendren, P. Lam, and V. Sundaresan. Soot - a java bytecode optimization framework. In Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON \u201999, pages 13\u2013. IBM Press, 1999."},{"key":"e_1_3_2_1_32_1","series-title":"Lecture Notes in Computer Science","first-page":"654","volume-title":"C. Ferm \u02dc Aijller and A","author":"Veanes M.","unstructured":"M. Veanes , N. Bj \u02dc A\u00a8 yrner, and L. de Moura. Symbolic Automata Constraint Solving . In C. Ferm \u02dc Aijller and A . Voronkov, editors, Logic for Programming, Artificial Intelligence , and Reasoning , volume 6397 of Lecture Notes in Computer Science , pages 640\u2013 654 . Springer Berlin Heidelberg, 2010. M. Veanes, N. Bj \u02dc A\u00a8 yrner, and L. de Moura. Symbolic Automata Constraint Solving. In C. Ferm \u02dc Aijller and A. Voronkov, editors, Logic for Programming, Artificial Intelligence, and Reasoning, volume 6397 of Lecture Notes in Computer Science, pages 640\u2013654. Springer Berlin Heidelberg, 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.15"},{"key":"e_1_3_2_1_34_1","first-page":"17","volume-title":"In Network and Distributed System Security Symposium","author":"Wagner D.","year":"2000","unstructured":"D. Wagner , J. S. Foster , E. A. Brewer , and A. Aiken . A first step towards automated detection of buffer overrun vulnerabilities . In In Network and Distributed System Security Symposium , pages 3\u2013 17 , 2000 . D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In In Network and Distributed System Security Symposium, pages 3\u201317, 2000."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276933.1276935"},{"key":"e_1_3_2_1_36_1","first-page":"78","volume-title":"In Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004","author":"Wassermann G.","year":"2004","unstructured":"G. Wassermann and Z. Su . An analysis framework for security in Web applications . In In Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004 , pages 70\u2013 78 , 2004 . G. Wassermann and Z. Su. An analysis framework for security in Web applications. In In Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems (SAVCBS 2004, pages 70\u201378, 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250739"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368112"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85114-1_21"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491456"}],"event":{"name":"ESEC\/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Bergamo Italy","acronym":"ESEC\/FSE'15","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786805.2786879","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T03:15:30Z","timestamp":1673493330000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786879"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":40,"alternative-id":["10.1145\/2786805.2786879","10.1145\/2786805"],"URL":"https:\/\/doi.org\/10.1145\/2786805.2786879","relation":{},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}