{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:45:33Z","timestamp":1743021933222,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031401312"},{"type":"electronic","value":"9783031401329"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-40132-9_16","type":"book-chapter","created":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T11:02:20Z","timestamp":1692183740000},"page":"257-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Source-Code-to-Object-Code Traceability Analysis for\u00a0Airborne Software: A Case for\u00a0Tool Support"],"prefix":"10.1007","author":[{"given":"J\u00f6rg","family":"Brauer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,17]]},"reference":[{"issue":"6","key":"16_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1749608.1749612","volume":"32","author":"G Balakrishnan","year":"2010","unstructured":"Balakrishnan, G., Reps, T.W.: WYSINWYX: what you see is not what you execute. ACM Trans. Program. Lang. Syst. 32(6), 1\u201387 (2010)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"16_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-18275-4_6","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"S Bardin","year":"2011","unstructured":"Bardin, S., Herrmann, P., V\u00e9drine, F.: Refinement-based CFG reconstruction from unstructured programs. In: Jhala, R., Schmidt, D. (eds.) VMCAI 2011. LNCS, vol. 6538, pp. 54\u201369. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18275-4_6"},{"unstructured":"Bartholomew, D.: Qemu: a multihost, multitarget emulator. Linux J. 2006(145) (2006)","key":"16_CR3"},{"unstructured":"Bordin, M., Comar, C., Gingold, T., Guitton, J., Hainque, O., Quinot, T.: Object and source coverage for critical applications with the couverture open analysis framework. In: ERTS (2010)","key":"16_CR4"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/978-3-319-24255-2_31","volume-title":"Computer Safety, Reliability, and Security","author":"J Brauer","year":"2015","unstructured":"Brauer, J., Dahlweid, M., Pankrath, T., Peleska, J.: Source-code-to-object-code traceability analysis for avionics software: don\u2019t trust your compiler. In: Koornneef, F., van Gulijk, C. (eds.) SAFECOMP 2015. LNCS, vol. 9337, pp. 427\u2013440. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24255-2_31"},{"doi-asserted-by":"crossref","unstructured":"Brauer, J., Noll, T., Schlich, B.: Interval analysis of microcontroller code using abstract interpretation of hardware and software. In: SCOPES. ACM (2010)","key":"16_CR6","DOI":"10.1145\/1811212.1811216"},{"unstructured":"Certification Authorities Software Team (CAST): Guidelines for Approving Source Code to Object Code Traceability - Position Paper CAST-12. CAST (2002)","key":"16_CR7"},{"unstructured":"Certification Authorities Software Team (CAST): Structural Coverage of Object Code - Position Paper CAST-17. CAST (2003)","key":"16_CR8"},{"key":"16_CR9","first-page":"1","volume":"5","author":"T Dullien","year":"2005","unstructured":"Dullien, T., Rolles, R.: Graph-based comparison of executable objects. SSTIC 5, 1\u201313 (2005)","journal-title":"SSTIC"},{"unstructured":"Flake, H.: Structural comparison of executable objects (2004)","key":"16_CR10"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-23702-7_10","volume-title":"Static Analysis","author":"A Flexeder","year":"2011","unstructured":"Flexeder, A., Petter, M., Seidl, H.: Side-effect analysis of assembly code. In: Yahav, E. (ed.) SAS 2011. LNCS, vol. 6887, pp. 77\u201394. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23702-7_10"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-88625-9_16","volume-title":"Information and Communications Security","author":"D Gao","year":"2008","unstructured":"Gao, D., Reiter, M.K., Song, D.: BinHunt: automatically finding semantic differences in binary programs. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 238\u2013255. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88625-9_16"},{"doi-asserted-by":"crossref","unstructured":"Hopcroft, J.: An n log n algorithm for minimizing states in a finite automaton. Technical report, DTIC Document (1971)","key":"16_CR13","DOI":"10.1016\/B978-0-12-417750-5.50022-1"},{"unstructured":"LDRA Inc.: TBobjectbox. https:\/\/ldra.com\/products\/tbobjectbox","key":"16_CR14"},{"unstructured":"Rapita Systems Ltd.: RapiCover Zero. https:\/\/www.rapitasystems.com\/products\/rapicoverzero","key":"16_CR15"},{"key":"16_CR16","volume-title":"Developing Safety-Critical Software","author":"A Rierson","year":"2013","unstructured":"Rierson, A.: Developing Safety-Critical Software. CRC Press, Boca Raton (2013)"},{"unstructured":"RTCA SC-205\/EUROCAE WG-71: Software Considerations in Airborne Systems and Equipment Certification. No. RTCA DO-178C, RTCA Inc, 1140 Connecticut Avenue, N.W., Suite 1020, Washington, D.C. 20036 (2011)","key":"16_CR17"},{"unstructured":"RTCA SC-205\/EUROCAE WG-71: Software Tool Qualification Considerations. No. RTCA DO-330, RTCA, Inc. (2011)","key":"16_CR18"},{"unstructured":"Sobek, S., Burke, K.: Power PC Embedded Application Binary Interface (EABI): 32-Bit Implementation. Freescale Semiconductor Inc. (2004)","key":"16_CR19"},{"unstructured":"Verified Systems International GmbH: RT-Tester. https:\/\/www.verified.de\/products\/rt-tester","key":"16_CR20"}],"container-title":["Lecture Notes in Computer Science","Applicable Formal Methods for Safe Industrial Products"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-40132-9_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T11:04:46Z","timestamp":1692183886000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-40132-9_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031401312","9783031401329"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-40132-9_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"17 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}