{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:46:47Z","timestamp":1725796007017},"publisher-location":"Cham","reference-count":4,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319085920"},{"type":"electronic","value":"9783319085937"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-08593-7_20","type":"book-chapter","created":{"date-parts":[[2014,6,23]],"date-time":"2014-06-23T12:55:19Z","timestamp":1403528119000},"page":"218-219","source":"Crossref","is-referenced-by-count":0,"title":["TRACER: A Platform for Securing Legacy Code"],"prefix":"10.1007","author":[{"given":"Kostantinos","family":"Stroggylos","sequence":"first","affiliation":[]},{"given":"Dimitris","family":"Mitropoulos","sequence":"additional","affiliation":[]},{"given":"Zacharias","family":"Tzermias","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Fotios","family":"Rafailidis","sequence":"additional","affiliation":[]},{"given":"Diomidis","family":"Spinellis","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Katsaros","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"Chess, B., West, J.: Secure programming with static analysis. Addison-Wesley Professional (2007)"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/ICSE.2009.5070560","volume-title":"Proceedings of the 31st International Conference on Software Engineering, ICSE 2009","author":"G. Gousios","year":"2009","unstructured":"Gousios, G., Spinellis, D.: Alitheia core: An extensible software quality monitoring platform. In: Proceedings of the 31st International Conference on Software Engineering, ICSE 2009, pp. 579\u2013582. IEEE Computer Society, Washington, DC (2009)"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1052883.1052895","volume":"39","author":"D. Hovemeyer","year":"2004","unstructured":"Hovemeyer, D., Pugh, W.: Finding bugs is easy. SIGPLAN Not\u00a039, 92\u2013106 (2004)","journal-title":"SIGPLAN Not"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-33826-7_16","volume-title":"Software Engineering and Formal Methods","author":"P. Cuoq","year":"2012","unstructured":"Cuoq, P., Kirchner, F., Kosmatov, N., Prevosto, V., Signoles, J., Yakobowski, B.: Frama-c: A software analysis perspective. In: Eleftherakis, G., Hinchey, M., Holcombe, M. (eds.) SEFM 2012. LNCS, vol.\u00a07504, pp. 233\u2013247. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Trust and Trustworthy Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-08593-7_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T03:47:10Z","timestamp":1558928830000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-08593-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319085920","9783319085937"],"references-count":4,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-08593-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}