{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:21:21Z","timestamp":1771698081039,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319195834","type":"print"},{"value":"9783319195841","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19584-1_4","type":"book-chapter","created":{"date-parts":[[2015,6,10]],"date-time":"2015-06-10T15:56:31Z","timestamp":1433951791000},"page":"50-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Static Backward Program Slicing for Safety-Critical Systems"],"prefix":"10.1007","author":[{"given":"Husni","family":"Khanfar","sequence":"first","affiliation":[]},{"given":"Bj\u00f6rn","family":"Lisper","sequence":"additional","affiliation":[]},{"given":"Abu Naser","family":"Masud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,9]]},"reference":[{"issue":"6","key":"4_CR1","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1145\/773473.178456","volume":"29","author":"H Agrawal","year":"1994","unstructured":"Agrawal, H.: On slicing programs with jump statements. SIGPLAN Not. 29(6), 302\u2013312 (1994)","journal-title":"SIGPLAN Not."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Ball, T., Horwitz, S.: Slicing programs with arbitrary control-flow. In: Fritzson, P.A. (ed.) Proc. First International Workshop on Automated and Algorithmic Debugging, AADEBUG 1993. LNCS, vol. 749. pp. 206\u2013222. Springer, Heidelberg (1993)","DOI":"10.1007\/BFb0019410"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Barros, J.B., da Cruz, D., Henriques, P.R., Pinto, J.S.: Assertion-based slicing and slice graphs. In: Proceedings of the 2010 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010, pp. 93\u2013102. IEEE Computer Society, Washington, DC (2010)","DOI":"10.1109\/SEFM.2010.18"},{"key":"4_CR4","unstructured":"Bent, L., Atkinson, D.C., Griswold, W.G.: A qualitative study of two whole-program slicers for C. University of California San Diego, Tech. rep. (2000)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Binkley, D., Harman, M.: A large-scale empirical study of forward and backward static slice size and context sensitivity. In: Proc. International Conference on Software Maintenance, ICSM 2003, p. 44. IEEE Computer Society, Washington, DC (2003)","DOI":"10.1109\/ICSM.2003.1235405"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Binkley, D., Harman, M.: A survey of empirical results on program slicing. In: Advances in Computers, Advances in Computers, vol. 62, pp. 105\u2013178. Elsevier (2004)","DOI":"10.1016\/S0065-2458(03)62003-6"},{"issue":"11\u201312","key":"4_CR7","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/S0950-5849(98)00086-X","volume":"40","author":"G Canfora","year":"1998","unstructured":"Canfora, G.: Conditioned program slicing. Information and Software Technology 40(11\u201312), 595\u2013607 (1998)","journal-title":"Information and Software Technology"},{"issue":"4","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1145\/183432.183438","volume":"16","author":"JD Choi","year":"1994","unstructured":"Choi, J.D., Ferrante, J.: Static slicing in the presence of goto statements. ACM Trans. Program. Lang. Syst. 16(4), 1097\u20131113 (1994)","journal-title":"ACM Trans. Program. Lang. Syst."},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. 9(3), 319\u2013349 (1987)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Harman, M., Binkley, D., Danicic, S.: Amorphous program slicing. In: Software Focus, pp. 70\u201379. IEEE Computer Society Press (1997)","DOI":"10.1109\/WPC.1997.601266"},{"key":"4_CR11","unstructured":"Hong, H.S., Lee, I., Sokolsky, O.: Abstract slicing: A new approach to program slicing based on abstract interpretation and model checking. In: 2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 25\u201334 (2005)"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/77606.77608","volume":"12","author":"S Horwitz","year":"1990","unstructured":"Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. ACM Trans. Program. Lang. Syst. 12(1), 26\u201360 (1990)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Korel, B.: Dynamic program slicing. Information Processing Letters 29 (October 1988)","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"4_CR14","unstructured":"Kraft, J.: Enabling Timing Analysis of Complex Embedded Software Systems. Ph.D. thesis, M\u00e4lardalen University Press (August 2010)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Lisper, B., Masud, A.N., Khanfar, H.: Static backward demand-driven slicing. In: Proceedings of the 2015 Workshop on Partial Evaluation and Program Manipulation, PEPM 2015, pp. 115\u2013126. ACM, New York (2015)","DOI":"10.1145\/2678015.2682538"},{"key":"4_CR16","unstructured":"Lyle, J.R., Binkley, D.: Program slicing in the presence of pointers (1993) (extended abstract)"},{"key":"4_CR17","unstructured":"Lyle, J.R.: Evaluating Variations on Program Slicing for Debugging (Data-flow, Ada). Ph.D. thesis, College Park, MD, USA (1984)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/978-3-642-16901-4_30","volume-title":"Formal Methods and Software Engineering","author":"I Mastroeni","year":"2010","unstructured":"Mastroeni, I., Nikoli\u0107, D.J.: Abstract Program Slicing: From Theory towards an Implementation. In: Dong, J.S., Zhu, H. (eds.) ICFEM 2010. LNCS, vol. 6447, pp. 452\u2013467. Springer, Heidelberg (2010)"},{"key":"4_CR19","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis, 2nd edn. Springer (2005). iSBN 3-540-65410-0"},{"issue":"3","key":"4_CR20","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/390010.808263","volume":"9","author":"KJ Ottenstein","year":"1984","unstructured":"Ottenstein, K.J., Ottenstein, L.M.: The program dependence graph in a software development environment. SIGSOFT Softw. Eng. Notes 9(3), 177\u2013184 (1984)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Reps, T., Horwitz, S., Sagiv, M., Rosay, G.: Speeding up slicing. In: Proceedings of the 2Nd ACM SIGSOFT Symposium on Foundations of Software Engineering, SIGSOFT 1994, pp. 11\u201320. ACM, New York (1994)","DOI":"10.1145\/195274.195287"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Sinha, S., Harrold, M.J., Rothermel, G.: System-dependence-graph-based slicing of programs with arbitrary interprocedural control flow. In: Proceedings of the 21st International Conference on Software Engineering, ICSE 1999, pp. 432\u2013441. ACM, New York (1999)","DOI":"10.1145\/302405.302675"},{"key":"4_CR23","first-page":"121","volume":"3","author":"F Tip","year":"1995","unstructured":"Tip, F.: A survey of program slicing techniques. Journal of Programming Languages 3, 121\u2013189 (1995)","journal-title":"Journal of Programming Languages"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Weiser, M.: Program Slicing. IEEE Transactions on Software Engineering SE-10(4), 352\u2013357 (1984)","DOI":"10.1109\/TSE.1984.5010248"},{"key":"4_CR25","unstructured":"Weiser, M.D.: Program Slices: Formal, Psychological, and Practical Investigations of an Automatic Program Abstraction Method. Ph.D. thesis, Ann Arbor, MI, USA (1979), aAI8007856"},{"issue":"2","key":"4_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1050849.1050865","volume":"30","author":"B Xu","year":"2005","unstructured":"Xu, B., Qian, J., Zhang, X., Wu, Z., Chen, L.: A brief survey of program slicing. SIGSOFT Softw. Eng. Notes 30(2), 1\u201336 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies \u2013 Ada-Europe 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19584-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T12:49:01Z","timestamp":1748436541000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-19584-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319195834","9783319195841"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19584-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}