{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T19:26:24Z","timestamp":1725909984936},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319675305"},{"type":"electronic","value":"9783319675312"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67531-2_19","type":"book-chapter","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T05:33:37Z","timestamp":1504589617000},"page":"312-329","source":"Crossref","is-referenced-by-count":1,"title":["Control Dependencies in Interpretive Systems"],"prefix":"10.1007","author":[{"given":"Babak","family":"Yadegari","sequence":"first","affiliation":[]},{"given":"Saumya","family":"Debray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,6]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Adl-Tabatabai, A.R., Cierniak, M., Lueh, G.Y., Parikh, V.M., Stichnoth, J.M.: Fast, effective code generation in a just-in-time Java compiler. In: Proceedings of the PLDI 1998, pp. 280\u2013290, June 1998","DOI":"10.1145\/277650.277740"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, H., Horgan, J.R.: Dynamic program slicing. In: Proceedings of the PLDI 1990, pp. 246\u2013256, June 1990","DOI":"10.1145\/93542.93576"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, H., Horgan, J.R., Krauser, E.W., London, S.: Incremental regression testing. In: ICSM, vol. 93, pp. 348\u2013357. Citeseer (1993)","DOI":"10.1109\/ICSM.1993.366927"},{"issue":"21","key":"19_CR4","doi-asserted-by":"crossref","first-page":"939","DOI":"10.1016\/j.ipl.2010.07.023","volume":"110","author":"T Amtoft","year":"2010","unstructured":"Amtoft, T., Androutsopoulos, K., Clark, D., Harman, M., Li, Z.: An alternative characterization of weak order dependence. Inf. Process. Lett. 110(21), 939\u2013943 (2010)","journal-title":"Inf. Process. Lett."},{"issue":"2","key":"19_CR5","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/JPROC.2004.840305","volume":"93","author":"M Arnold","year":"2005","unstructured":"Arnold, M., Fink, S.J., Grove, D., Hind, M., Sweeney, P.F.: A survey of adaptive optimization in virtual machines. Proc. IEEE 93(2), 449\u2013466 (2005)","journal-title":"Proc. IEEE"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G.: WYSINWYX: What you see is not what you eXecute. Ph.D. thesis, Computer Science Department, University of Wisconsin, Madison (2007)","DOI":"10.1007\/978-3-540-69149-5_22"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Bao, T., Zheng, Y., Lin, Z., Zhang, X., Xu, D.: Strict control dependence and its effect on dynamic information flow analyses. In: Proceedings of the 19th ISSTA, pp. 13\u201324 (2010)","DOI":"10.1145\/1831708.1831711"},{"issue":"9","key":"19_CR8","doi-asserted-by":"crossref","first-page":"724","DOI":"10.1145\/359588.359596","volume":"21","author":"JM Barth","year":"1978","unstructured":"Barth, J.M.: A practical interprocedural data flow analysis algorithm. Commun. ACM 21(9), 724\u2013736 (1978)","journal-title":"Commun. ACM"},{"issue":"5","key":"19_CR9","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/249069.231435","volume":"31","author":"G Bilardi","year":"1996","unstructured":"Bilardi, G., Pingali, K.: A framework for generalized control dependence. ACM SIGPLAN Not. 31(5), 291\u2013300 (1996)","journal-title":"ACM SIGPLAN Not."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H., Cutler, C., Kim, T., Mao, Y., Wang, X., Zeldovich, N., Kaashoek, M.F.: Security bugs in embedded interpreters. In: Proceedings of the 4th Asia-Pacific Workshop on Systems, p. 17. ACM (2013)","DOI":"10.1145\/2500727.2500747"},{"issue":"11","key":"19_CR11","doi-asserted-by":"crossref","first-page":"1031","DOI":"10.1002\/(SICI)1096-9128(199711)9:11<1031::AID-CPE354>3.0.CO;2-O","volume":"9","author":"LR Clausen","year":"1997","unstructured":"Clausen, L.R.: A java bytecode optimizer using side-effect analysis. Concurrency Pract. Experience 9(11), 1031\u20131045 (1997)","journal-title":"Concurrency Pract. Experience"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Cytron, R., Ferrante, J., Sarkar, V.: Compact representations for control dependence. In: Proceedings of the PLDI 1990, pp. 337\u2013351 (1990)","DOI":"10.1145\/93542.93592"},{"issue":"49","key":"19_CR13","doi-asserted-by":"crossref","first-page":"6809","DOI":"10.1016\/j.tcs.2011.08.033","volume":"412","author":"S Danicic","year":"2011","unstructured":"Danicic, S., Barraclough, R.W., Harman, M., Howroyd, J.D., Kiss, A., Laurence, M.R.: A unifying theory of control dependence and its application to arbitrary program structures. Theoret. Comput. Sci. 412(49), 6809\u20136842 (2011)","journal-title":"Theoret. Comput. Sci."},{"issue":"5","key":"19_CR14","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"DE Denning","year":"1976","unstructured":"Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"key":"19_CR15","first-page":"1","volume":"5","author":"MA Ertl","year":"2003","unstructured":"Ertl, M.A., Gregg, D.: The structure and performance of efficient interpreters. J. Instr. Level Parallelism 5, 1\u201325 (2003)","journal-title":"J. Instr. Level Parallelism"},{"issue":"3","key":"19_CR16","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"J Ferrante","year":"1987","unstructured":"Ferrante, J., Ottenstein, K.J., Warren, J.D.: The program dependence graph and its use in optimization. ACM Trans. Program. Lang. Syst. (TOPLAS) 9(3), 319\u2013349 (1987)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/3-540-62852-5_19","volume-title":"Mobile Object Systems Towards the Programmable Internet","author":"M Franz","year":"1997","unstructured":"Franz, M.: Adaptive compression of syntax trees and iterative dynamic code optimization: Two basic technologies for mobile object systems. In: Vitek, J., Tschudin, C. (eds.) MOS 1996. LNCS, vol. 1222, pp. 263\u2013276. Springer, Heidelberg (1997). doi: 10.1007\/3-540-62852-5_19"},{"key":"19_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/3-540-36579-6_13","volume-title":"Compiler Construction","author":"E Gagnon","year":"2003","unstructured":"Gagnon, E., Hendren, L.: Effective inline-threaded interpretation of java bytecode using preparation sequences. In: Hedin, G. (ed.) CC 2003. LNCS, vol. 2622, pp. 170\u2013184. Springer, Heidelberg (2003). doi: 10.1007\/3-540-36579-6_13"},{"key":"19_CR19","doi-asserted-by":"crossref","unstructured":"Gal, A., et al.: Trace-based just-in-time type specialization for dynamic languages. In: Proceedings of the 30th SIGPLAN Conference on Programming Language Design and Implementation, pp. 465\u2013478 (2009)","DOI":"10.1145\/1542476.1542528"},{"key":"19_CR20","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"JE Hopcroft","year":"1979","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to Automata Theory, Languages, and Computation. Addison Wesley, Reading (1979)"},{"issue":"1","key":"19_CR21","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/77606.77608","volume":"12","author":"S Horwitz","year":"1990","unstructured":"Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. ACM Trans. Program. Lang. Syst. (TOPLAS) 12(1), 26\u201360 (1990)","journal-title":"ACM Trans. Program. Lang. Syst. (TOPLAS)"},{"key":"19_CR22","volume-title":"Partial Evaluation and Automatic Program Generation","author":"ND Jones","year":"1993","unstructured":"Jones, N.D., Gomard, C.K., Sestoft, P.: Partial Evaluation and Automatic Program Generation. Prentice Hall, Upper Saddle River (1993)"},{"key":"19_CR23","unstructured":"Kang, M.G., McCamant, S., Poosankam, P., Song, D.: DTA++: Dynamic taint analysis with targeted control-flow propagation. In: NDSS (2011)"},{"issue":"3","key":"19_CR24","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1016\/0020-0190(88)90054-3","volume":"29","author":"B Korel","year":"1988","unstructured":"Korel, B., Laski, J.: Dynamic program slicing. Inf. Process. Lett. 29(3), 155\u2013163 (1988)","journal-title":"Inf. Process. Lett."},{"key":"19_CR25","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.: LLVM: A compilation framework for lifelong program analysis & transformation. In: International Symposium on Code Generation and Optimization, pp. 75\u201386 (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Luk, C.K., et al.: Pin: Building customized program analysis tools with dynamic instrumentation. In: Proceedings of the ACM Conference on Programming Language Design and Implementation, pp. 190\u2013200, June 2005","DOI":"10.1145\/1065010.1065034"},{"key":"19_CR27","doi-asserted-by":"crossref","unstructured":"Masri, W., Podgurski, A., Leon, D.: Detecting and debugging insecure information flows. In: ISSRE 2004, pp. 198\u2013209 (2004)","DOI":"10.1109\/ISSRE.2004.17"},{"issue":"1","key":"19_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2200\/S00340ED1V01Y201201CAC019","volume":"7","author":"SP Midkiff","year":"2012","unstructured":"Midkiff, S.P.: Automatic parallelization: an overview of fundamental compiler techniques. Synth. Lect. Comput. Architect. 7(1), 1\u2013169 (2012)","journal-title":"Synth. Lect. Comput. Architect."},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"Sharif, M., Lanzi, A., Giffin, J., Lee, W.: Automatic reverse engineering of malware emulators. In: 2009 Proceedings of the IEEE Symposium on Security and Privacy, May 2009","DOI":"10.1109\/SP.2009.27"},{"key":"19_CR30","volume-title":"Virtual Machines: Versatile Platforms for Systems and Processes","author":"J Smith","year":"2005","unstructured":"Smith, J., Nair, R.: Virtual Machines: Versatile Platforms for Systems and Processes. Elsevier, Amsterdam (2005)"},{"key":"19_CR31","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Reps, T.: Partial evaluation of machine code. In: ACM SIGPLAN Notices, vol. 50, pp. 860\u2013879. ACM (2015)","DOI":"10.1145\/2814270.2814321"},{"issue":"3","key":"19_CR32","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1023\/A:1010078412711","volume":"13","author":"S Thibault","year":"2000","unstructured":"Thibault, S., Consel, C., Lawall, J.L., Marlet, R., Muller, G.: Static and dynamic program compilation by interpreter specialization. High.-Order Symbolic Comput. 13(3), 161\u2013178 (2000)","journal-title":"High.-Order Symbolic Comput."},{"key":"19_CR33","first-page":"121","volume":"3","author":"F Tip","year":"1995","unstructured":"Tip, F.: A survey of program slicing techniques. J. Program. Lang. 3, 121\u2013189 (1995)","journal-title":"J. Program. Lang."},{"key":"19_CR34","unstructured":"Wang, X., et al.: Jitk: a trustworthy in-kernel interpreter infrastructure. In: Proceedings of the USENIX conference on Operating Systems Design and Implementation, pp. 33\u201347 (2014)"},{"issue":"4","key":"19_CR35","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M Weiser","year":"1984","unstructured":"Weiser, M.: Program slicing. IEEE Trans. Softw. Eng. 10(4), 352\u2013357 (1984)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"19_CR36","unstructured":"Wouters, T., Yasskin, J., Winter, C.: unladen-swallow: A faster implementation of python, https:\/\/code.google.com\/p\/unladen-swallow\/"},{"key":"19_CR37","doi-asserted-by":"crossref","unstructured":"Xin, B., Zhang, X.: Efficient online detection of dynamic control dependence. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis, pp. 185\u2013195. ACM (2007)","DOI":"10.1145\/1273463.1273489"},{"issue":"2","key":"19_CR38","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/s10664-006-9007-3","volume":"12","author":"X Zhang","year":"2007","unstructured":"Zhang, X., Gupta, N., Gupta, R.: A study of effectiveness of dynamic slicing in locating real faults. Empirical Softw. Eng. 12(2), 143\u2013160 (2007)","journal-title":"Empirical Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67531-2_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T00:19:33Z","timestamp":1570061973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67531-2_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319675305","9783319675312"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67531-2_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}