{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T13:27:03Z","timestamp":1778765223747,"version":"3.51.4"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319265285","type":"print"},{"value":"9783319265292","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26529-2_26","type":"book-chapter","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T12:23:39Z","timestamp":1449663819000},"page":"485-503","source":"Crossref","is-referenced-by-count":33,"title":["More Sound Static Handling of Java Reflection"],"prefix":"10.1007","author":[{"given":"Yannis","family":"Smaragdakis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"George","family":"Balatsouras","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"George","family":"Kastrinis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Bravenboer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"688","DOI":"10.1007\/978-3-642-31057-7_30","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"K Ali","year":"2012","unstructured":"Ali, K., Lhot\u00e1k, O.: Application-only call graph construction. In: Noble, J. (ed.) ECOOP 2012. LNCS, vol. 7313, pp. 688\u2013712. Springer, Heidelberg (2012)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/978-3-642-39038-8_16","volume-title":"ECOOP 2013 \u2013 Object-Oriented Programming","author":"K Ali","year":"2013","unstructured":"Ali, K., Lhot\u00e1k, O.: Averroes: whole-program analysis without the whole program. In: Castagna, G. (ed.) ECOOP 2013. LNCS, vol. 7920, pp. 378\u2013400. Springer, Heidelberg (2013)"},{"key":"26_CR3","unstructured":"Blackburn, S.M., et al.: The DaCapo benchmarks: Java benchmarking development and analysis. In: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 2006, pp. 169\u2013190. ACM, New York (2006)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Bodden, E., Sewe, A., Sinschek, J., Oueslati, H., Mezini, M.: Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 241\u2013250. ACM, New York (2011)","DOI":"10.1145\/1985793.1985827"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Bravenboer, M., Smaragdakis, Y.: Exception analysis and points-to analysis: Better together. In: Proceedings of the 18th International Symposium on Software Testing and Analysis, ISSTA 2009, pp. 1\u201312. ACM, New York (2009)","DOI":"10.1145\/1572272.1572274"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Bravenboer, M., Smaragdakis, Y.: Strictly declarative specification of sophisticated points-to analyses. In: Proceedings of the 24th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009. ACM, New York (2009)","DOI":"10.1145\/1640089.1640108"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Christensen, A.S., M\u00f8ller, A., Schwartzbach, M.I.: Precise analysis of string expressions. In: Proceedings of the 10th International Symposium on Static Analysis, SAS 2003, pp. 1\u201318. Springer (2003)","DOI":"10.1007\/3-540-44898-5_1"},{"key":"26_CR8","unstructured":"Fink, S.J., et al.: WALA UserGuide: PointerAnalysis. \n                      http:\/\/wala.sourceforge.net\/wiki\/index.php\/UserGuide:PointerAnalysis"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Furr, M., An, J.D., Foster, J.S.: Profile-guided static typing for dynamic scripting languages. In: Proceedings of the 24th Annual ACM SIGPLAN Conference on Object Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, pp. 283\u2013300. ACM, New York (2009)","DOI":"10.1145\/1640089.1640110"},{"key":"26_CR10","unstructured":"Guarnieri, S., Livshits, B.: GateKeeper: mostly static enforcement of security and reliability policies for Javascript code. In: Proceedings of the 18th USENIX Security Symposium, SSYM 2009, pp. 151\u2013168. USENIX Association, Berkeley (2009)"},{"issue":"2","key":"26_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1216374.1216379","volume":"29","author":"M Hirzel","year":"2007","unstructured":"Hirzel, M., von Dincklage, D., Diwan, A., Hind, M.: Fast online pointer analysis. ACM Trans. Program. Lang. Syst. 29(2), 11 (2007)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-24851-4_5","volume-title":"ECOOP 2004 \u2013 Object-Oriented Programming","author":"M Hirzel","year":"2004","unstructured":"Hirzel, M., Diwan, A., Hind, M.: Pointer analysis in the presence of dynamic class loading. In: Odersky, M. (ed.) ECOOP 2004. LNCS, vol. 3086, pp. 96\u2013122. Springer, Heidelberg (2004)"},{"key":"26_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-642-37051-9_3","volume-title":"Compiler Construction","author":"G Kastrinis","year":"2013","unstructured":"Kastrinis, G., Smaragdakis, Y.: Efficient and effective handling of exceptions in java points-to analysis. In: Jhala, R., De Bosschere, K. (eds.) Compiler Construction. LNCS, vol. 7791, pp. 41\u201360. Springer, Heidelberg (2013)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Kastrinis, G., Smaragdakis, Y.: Hybrid context-sensitivity for points-to analysis. In: Proceedings of the 2013 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2013. ACM, New York (2013)","DOI":"10.1145\/2491956.2462191"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Lam, M.S., Whaley, J., Livshits, V.B., Martin, M.C., Avots, D., Carbin, M., Unkel, C.: Context-sensitive program analysis as database queries. In: Proceedings of the 24th Symposium on Principles of Database Systems, PODS 2005, pp. 1\u201312. ACM, New York (2005)","DOI":"10.1145\/1065167.1065169"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","first-page":"27","volume-title":"ECOOP 2014 \u2013 Object-Oriented Programming","author":"Y Li","year":"2014","unstructured":"Li, Y., Tan, T., Sui, Y., Xue, J.: Self-inferencing reflection resolution for Java. In: Jones, R. (ed.) ECOOP 2014. LNCS, vol. 8586, pp. 27\u201353. Springer, Heidelberg (2014)"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Liang, P., Naik, M.: Scaling abstraction refinement via pruning. In: Proceedings of the 2011 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2011, pp. 590\u2013601. ACM, New York (2011)","DOI":"10.1145\/1993316.1993567"},{"key":"26_CR18","unstructured":"Livshits, B.: Improving Software Security with Precise Static and Runtime Analysis. Ph.D. thesis, Stanford University, December 2006"},{"issue":"2","key":"26_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2644805","volume":"58","author":"B Livshits","year":"2015","unstructured":"Livshits, B., et al.: In defense of soundiness: A manifesto. Commun. ACM 58(2), 44\u201346 (2015)","journal-title":"Commun. ACM"},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11575467_11","volume-title":"Programming Languages and Systems","author":"B Livshits","year":"2005","unstructured":"Livshits, B., Whaley, J., Lam, M.S.: Reflection analysis for Java. In: Yi, K. (ed.) APLAS 2005. LNCS, vol. 3780, pp. 139\u2013160. Springer, Heidelberg (2005)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Madsen, M., Livshits, B., Fanning, M.: Practical static analysis of JavaScript applications in the presence of frameworks and libraries. In: Proceedings of the ACM SIGSOFT International Symposium on the Foundations of Software Engineering, FSE 2013, pp. 499\u2013509. ACM (2013)","DOI":"10.1145\/2491411.2491417"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Naik, M., Aiken, A., Whaley, J.: Effective static race detection for java. In: Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2006, pp. 308\u2013319. ACM, New York (2006)","DOI":"10.1145\/1133981.1134018"},{"key":"26_CR23","first-page":"163","volume-title":"Applications of Logic Databases","author":"TW Reps","year":"1994","unstructured":"Reps, T.W.: Demand interprocedural program analysis using logic databases. In: Ramakrishnan, R. (ed.) Applications of Logic Databases, pp. 163\u2013196. Kluwer Academic Publishers, Boston (1994)"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Stancu, C., Wimmer, C., Brunthaler, S., Larsen, P., Franz, M.: Comparing points-to static analysis with runtime recorded profiling data. In: Proceedings of the 2014 International Conference on Principles and Practices of Programming on the Java Platform Virtual Machines, Languages and Tools, PPPJ 2014, pp. 157\u2013168. ACM (2014)","DOI":"10.1145\/2647508.2647524"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/11575467_8","volume-title":"Programming Languages and Systems","author":"J Whaley","year":"2005","unstructured":"Whaley, J., Avots, D., Carbin, M., Lam, M.S.: Using datalog with binary decision diagrams for program analysis. In: Yi, K. (ed.) APLAS 2005. LNCS, vol. 3780, pp. 97\u2013118. Springer, Heidelberg (2005)"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: Proceedings of the 2004 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2004, pp. 131\u2013144. ACM, New York (2004)","DOI":"10.1145\/996841.996859"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26529-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T21:05:08Z","timestamp":1559336708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26529-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319265285","9783319265292"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26529-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}