{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:50:32Z","timestamp":1771699832432,"version":"3.50.1"},"publisher-location":"New York, NY","reference-count":20,"publisher":"Springer New York","isbn-type":[{"value":"9781461409762","type":"print"},{"value":"9781461409779","type":"electronic"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4614-0977-9_6","type":"book-chapter","created":{"date-parts":[[2011,8,19]],"date-time":"2011-08-19T16:24:22Z","timestamp":1313771062000},"page":"109-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Manipulating Program Functionality to Eliminate Security Vulnerabilities"],"prefix":"10.1007","author":[{"given":"Martin","family":"Rinard","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,5]]},"reference":[{"key":"6_CR1_6","doi-asserted-by":"crossref","unstructured":"Michael Carbin and Martin C. Rinard. Automatically identifying critical input regions and code in applications. In Paolo Tonella and Alessandro Orso, editors, ISSTA, pages 37\u201348. ACM, 2010.","DOI":"10.1145\/1831708.1831713"},{"key":"6_CR2_6","doi-asserted-by":"crossref","unstructured":"Brian Demsky, Michael D. Ernst, Philip J. Guo, Stephen McCamant, Jeff H. Perkins, and Martin C. Rinard. Inference and enforcement of data structure consistency specifications. In Lori L. Pollock and Mauro Pezz`e, editors, ISSTA, pages 233\u2013244. ACM, 2006.","DOI":"10.1145\/1146238.1146266"},{"key":"6_CR3_6","doi-asserted-by":"crossref","unstructured":"Brian Demsky and Martin C. Rinard. Automatic detection and repair of errors in data structures. In Ron Crocker and Guy L. Steele Jr., editors, OOPSLA, pages 78\u201395. ACM, 2003.","DOI":"10.1145\/949343.949314"},{"key":"6_CR4_6","doi-asserted-by":"crossref","unstructured":"Brian Demsky and Martin C. Rinard. Static specification analysis for termination of specification-based data structure repair. In ISSRE, pages 71\u201384. IEEE Computer Society, 2003.","DOI":"10.1109\/ISSRE.2003.1251032"},{"key":"6_CR5_6","doi-asserted-by":"crossref","unstructured":"Brian Demsky and Martin C. Rinard. Data structure repair using goal-directed reasoning. In Gruia-Catalin Roman, William G. Griswold, and Bashar Nuseibeh, editors, ICSE, pages 176\u2013185. ACM, 2005.","DOI":"10.1145\/1062455.1062499"},{"key":"6_CR6_6","doi-asserted-by":"crossref","unstructured":"Brian Demsky and Martin C. Rinard. Goal-directed reasoning for specification-based data structure repair. IEEE Trans. Software Eng., 32(12):931\u2013951, 2006.","DOI":"10.1109\/TSE.2006.122"},{"key":"6_CR7_6","unstructured":"Richard P. Gabriel, David F. Bacon, Cristina Videira Lopes, and Guy L. Steele Jr., editors. Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2007, October 21\u201325, 2007, Montreal, Quebec, Canada. ACM, 2007."},{"key":"6_CR8_6","doi-asserted-by":"crossref","unstructured":"Vijay Ganesh, Tim Leek, and Martin C. Rinard. Taint-based directed whitebox fuzzing. In ICSE, pages 474\u2013484. IEEE, 2009.","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"6_CR9_6","unstructured":"Henry Hoffman, Sasa Misailovic, Stelios Sidiroglou, Anant Agarwal, and Martin Rinard. Using Code Perforation to Improve Performance, Reduce Energy Consumption, and Respond to Failures. Technical Report TR-2009-042, Computer Science and Artificial Intelligence Laboratory, MIT, September 2009."},{"key":"6_CR10_6","unstructured":"Henry Hoffmann, Stelios Sidiroglou, Michael Carbin, Sasa Misailovic, Anant Agarwal, and Martin Rinard. Power-Aware Computing with Dynamic Knobs. Technical Report TR-2010- 027, Computer Science and Artificial Intelligence Laboratory, MIT, May 2010."},{"key":"6_CR11_6","doi-asserted-by":"crossref","unstructured":"Sasa Misailovic, Stelios Sidiroglou, Henry Hoffmann, and Martin C. Rinard. Quality of service profiling. In Jeff Kramer, Judith Bishop, Premkumar T. Devanbu, and Sebasti\u00b4an Uchitel, editors, ICSE (1), pages 25\u201334. ACM, 2010.","DOI":"10.1145\/1806799.1806808"},{"key":"6_CR12_6","doi-asserted-by":"crossref","unstructured":"Huu Hai Nguyen and Martin C. Rinard. Detecting and eliminating memory leaks using cyclic memory allocation. In Greg Morrisett and Mooly Sagiv, editors, ISMM, pages 15\u201330. ACM, 2007.","DOI":"10.1145\/1296907.1296912"},{"key":"6_CR13_6","doi-asserted-by":"crossref","unstructured":"Jeff H. Perkins, Sunghun Kim, Samuel Larsen, Saman P. Amarasinghe, Jonathan Bachrach, Michael Carbin, Carlos Pacheco, Frank Sherwood, Stelios Sidiroglou, Greg Sullivan, Weng- FaiWong, Yoav Zibin, Michael D. Ernst, and Martin C. Rinard. Automatically patching errors in deployed software. In Jeanna Neefe Matthews and Thomas E. Anderson, editors, SOSP, pages 87\u2013102. ACM, 2009.","DOI":"10.1145\/1629575.1629585"},{"key":"6_CR14_6","doi-asserted-by":"crossref","unstructured":"Martin C. Rinard. Acceptability-oriented computing. In Ron Crocker and Guy L. Steele Jr., editors, OOPSLA Companion, pages 221\u2013239. ACM, 2003.","DOI":"10.1145\/949344.949402"},{"key":"6_CR15_6","doi-asserted-by":"crossref","unstructured":"Martin C. Rinard. Probabilistic accuracy bounds for fault-tolerant computations that discard tasks. In Gregory K. Egan and Yoichi Muraoka, editors, ICS, pages 324\u2013334. ACM, 2006.","DOI":"10.1145\/1183401.1183447"},{"key":"6_CR16_6","doi-asserted-by":"crossref","unstructured":"Martin C. Rinard. Living in the comfort zone. In Gabriel et al. [7], pages 611\u2013622.","DOI":"10.1145\/1297105.1297072"},{"key":"6_CR17_6","doi-asserted-by":"crossref","unstructured":"Martin C. Rinard. Using early phase termination to eliminate load imbalances at barrier synchronization points. In Gabriel et al. [7], pages 369\u2013386.","DOI":"10.1145\/1297105.1297055"},{"key":"6_CR18_6","unstructured":"Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, andWilliam S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303\u2013316, 2004."},{"key":"6_CR19_6","doi-asserted-by":"crossref","unstructured":"Martin C. Rinard, Cristian Cadar, and Huu Hai Nguyen. Exploring the acceptability envelope. In Ralph E. Johnson and Richard P. Gabriel, editors, OOPSLA Companion, pages 21\u201330. ACM, 2005.","DOI":"10.1145\/1094855.1094866"},{"key":"6_CR20_6","doi-asserted-by":"crossref","unstructured":"Martin C. Rinard and Monica S. Lam. The design, implementation, and evaluation of jade. ACM Trans. Program. Lang. Syst., 20(3):483\u2013545, 1998.","DOI":"10.1145\/291889.291893"}],"container-title":["Advances in Information Security","Moving Target Defense"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-0977-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,8]],"date-time":"2025-03-08T23:21:28Z","timestamp":1741476088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-0977-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781461409762","9781461409779"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-0977-9_6","relation":{},"ISSN":["1568-2633"],"issn-type":[{"value":"1568-2633","type":"print"}],"subject":[],"published":{"date-parts":[[2011]]},"assertion":[{"value":"5 August 2011","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}