{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:55:46Z","timestamp":1725558946650},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540254119"},{"type":"electronic","value":"9783540319856"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31985-6_12","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T18:53:19Z","timestamp":1278874399000},"page":"172-187","source":"Crossref","is-referenced-by-count":1,"title":["Data Slicing: Separating the Heap into Independent Regions"],"prefix":"10.1007","author":[{"given":"Jeremy","family":"Condit","sequence":"first","affiliation":[]},{"given":"George C.","family":"Necula","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Austin, T.M., Breach, S.E., Sohi, G.S.: Efficient detection of all pointer and array access errors. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 290\u2013301 (1994)","DOI":"10.1145\/178243.178446"},{"key":"12_CR2","unstructured":"Carlisle, M.C.: Olden: Parallelizing Programs with Dynamic Data Structures on Distributed-Memory Machines. PhD thesis, Princeton University Department of Computer Science (June 1996)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Chilimbi, T.M., Davidson, B., Larus, J.R.: Cache-conscious structure definition. In: SIGPLAN Conference on Programming Language Design and Implementation, pp. 13\u201324 (1999)","DOI":"10.1145\/301618.301635"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Condit, J., Harren, M., McPeak, S., Necula, G.C., Weimer, W.: CCured in the real world. In: SIGPLAN Conference on Programming Language Design and Implementation (June 2003)","DOI":"10.1145\/781131.781157"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Crary, K., Weirich, S., Morrisett, J.G.: Intensional polymorphism in type-erasure semantics. In: International Conference on Functional Programming, pp. 301\u2013312 (1998)","DOI":"10.1145\/289423.289459"},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/314602.314604","volume":"21","author":"D. Duggan","year":"1999","unstructured":"Duggan, D.: Dynamic typing for distributed programming in polymorphic languages. ACM Transactions on Programming Languages and Systems\u00a021(1), 11\u201345 (1999)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Harper, R., Morrisett, G.: Compiling polymorphism using intensional type analysis. In: SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 130\u2013141 (1995)","DOI":"10.1145\/199448.199475"},{"key":"12_CR8","unstructured":"Howard, M., LeBlanc, D.: Writing Secure Code. Microsoft (2002)"},{"key":"12_CR9","unstructured":"Jones, R.W.M., Kelly, P.H.J.: Backwards-compatible bounds checking for arrays and pointers in C programs. AADEBUG (1997)"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Necula, G.C., McPeak, S., Weimer, W.: CCured: Type-safe retrofitting of legacy code. In: SIGPLAN\u2013SIGACT Symposium on Principles of Programming Languages, pp. 128\u2013139 (2002)","DOI":"10.1145\/503272.503286"},{"key":"12_CR11","unstructured":"Patil, H., Fischer, C.N.: Efficient run-time monitoring using shadow processing. In: Automated and Algorithmic Debugging, pp. 119\u2013132 (1995)"},{"key":"12_CR12","first-page":"121","volume":"3","author":"F. Tip","year":"1995","unstructured":"Tip, F.: A survey of program slicing techniques. Journal of programming languages\u00a03, 121\u2013189 (1995)","journal-title":"Journal of programming languages"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Truong, D.N., Bodin, F., Seznec, A.: Improving cache behavior of dynamically allocated data structures. In: IEEE PACT, p. 322 (1998)","DOI":"10.1109\/PACT.1998.727268"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1109\/TSE.1984.5010248","volume":"10","author":"M. Weiser","year":"1984","unstructured":"Weiser, M.: Program slicing. IEEE Transactions on Software Engineering\u00a010, 352\u2013357 (1984)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Yong, S.H., Horwitz, S.: Protecting C programs from attacks via invalid pointer dereferences. In: SIGSOFT International Symposium on Foundations of Software Engineering, pp. 307\u2013316 (2003)","DOI":"10.1145\/940071.940113"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31985-6_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:44:50Z","timestamp":1620013490000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31985-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540254119","9783540319856"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31985-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}