{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:44Z","timestamp":1763468264084,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662466629"},{"type":"electronic","value":"9783662466636"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46663-6_7","type":"book-chapter","created":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T18:37:47Z","timestamp":1427913467000},"page":"131-150","source":"Crossref","is-referenced-by-count":11,"title":["Staged Points-to Analysis for Large Code Bases"],"prefix":"10.1007","author":[{"given":"Nicholas","family":"Allen","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"Scholz","sequence":"additional","affiliation":[]},{"given":"Padmanabhan","family":"Krishnan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Abiteboul, S., Hull, R., Vianu, V.: Foundations of Databases. Addison-Wesley (1995)"},{"key":"7_CR2","unstructured":"Andersen, L.O.: Program Analysis and Specialization for the C Programming Language. Ph.D. thesis, DIKU, University of Copenhagen (Fall 1994)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Appel, A.W.: Modern Compiler Implementation in Java. Cambridge University Press (1998)","DOI":"10.1017\/CBO9781139174930"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-44585-4_25","volume-title":"Computer Aided Verification","author":"T. Ball","year":"2001","unstructured":"Ball, T., Rajamani, S.K.: The SLAM toolkit. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol.\u00a02102, pp. 260\u2013264. Springer, Heidelberg (2001)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Bessey, A., Block, K., Chelf, B., Chou, A., Fulton, B., Hallem, S., Henri-Gros, C., Kamsky, A., McPeak, S., Engler, D.: A few billion lines of code later \u2013 using static analysis to find bugs in the real world. Comm. ACM 53, 66\u201375 (2010)","DOI":"10.1145\/1646353.1646374"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Blackburn, S.M., Garner, R., Hoffmann, C., Khan, A.M., McKinley, K.S., Bentzur, R., Diwan, A., Feinberg, D., Frampton, D., Guyer, S.Z., Hirzel, M., Hosking, A., Jump, M., Lee, H., Moss, J.E.B., Phansalkar, A., Stefanovic, D., VanDrunen, T., von Dincklage, D., Wiedermann, B.: The DaCapo benchmarks: Java benchmarking development and analysis. In: OOPSLA 2006: Proceedings of the 21st Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (2006)","DOI":"10.1145\/1167473.1167488"},{"key":"7_CR7","unstructured":"Bravenboer, M., Smaragdakis, Y.: Strictly declarative specification of sophisticated points-to analyses. In: Proceeding of the 24th ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, OOPSLA 2009, pp. 243\u2013262. ACM (2009), http:\/\/doi.acm.org\/10.1145\/1640089.1640108"},{"issue":"3","key":"7_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2012.30","volume":"10","author":"C. Cifuentes","year":"2012","unstructured":"Cifuentes, C., Keynes, N., Li, L., Hawes, N., Valdiviezo, M.: Transitioning Parfait into a development tool. IEEE Security and Privacy\u00a010(3), 16\u201323 (2012)","journal-title":"IEEE Security and Privacy"},{"key":"7_CR9","unstructured":"Corporation, O.: Secure coding guidelines for java se (April 2014), http:\/\/www.oracle.com\/technetwork\/java\/seccodeguide-139067.html"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1145\/349214.349233","volume":"22","author":"S.K. Debray","year":"2000","unstructured":"Debray, S.K., Evans, W., Muth, R., De Sutter, B.: Compiler techniques for code compaction. ACM Transactions on Programming Languages and Systems\u00a022(2), 378\u2013415 (2000)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Feng, Y., Anand, S., Dillig, I., Aiken, A.: Apposcopy: Semantics-based detection of android malware through static analysis. In: International Symposium on Foundations of Software Engineering (2014) (to appear)","DOI":"10.1145\/2635868.2635869"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/11823230_16","volume-title":"Static Analysis","author":"A. Gotsman","year":"2006","unstructured":"Gotsman, A., Berdine, J., Cook, B.: Interprocedural shape analysis with separated heap abstractions. In: Yi, K. (ed.) SAS 2006. LNCS, vol.\u00a04134, pp. 240\u2013260. Springer, Heidelberg (2006)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-32925-8_1","volume-title":"Datalog in Academia and Industry","author":"T.J. Green","year":"2012","unstructured":"Green, T.J., Aref, M., Karvounarakis, G.: Logicblox, platform and language: A tutorial. In: Barcel\u00f3, P., Pichler, R. (eds.) Datalog 2.0 2012. LNCS, vol.\u00a07494, pp. 1\u20138. Springer, Heidelberg (2012)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Hind, M., Pioli, A.: Which pointer analysis should i use? In: Proceedings of the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pp. 113\u2013123. ACM (2000)","DOI":"10.1145\/347636.348916"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/11688839_5","volume-title":"Compiler Construction","author":"O. Lhot\u00e1k","year":"2006","unstructured":"Lhot\u00e1k, O., Hendren, L.J.: Context-sensitive points-to analysis: Is it worth it? In: Mycroft, A., Zeller, A. (eds.) CC 2006. LNCS, vol.\u00a03923, pp. 47\u201364. Springer, Heidelberg (2006)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Lhot\u00e1k, O., Hendren, L.J.: Evaluating the benefits of context-sensitive points-to analysis using a BDD-based implementation. ACM Transactions on Software Engineering Methodology 18(1) (2008)","DOI":"10.1145\/1391984.1391987"},{"key":"7_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-642-37051-9_4","volume-title":"Compiler Construction","author":"Y. Lu","year":"2013","unstructured":"Lu, Y., Shang, L., Xie, X., Xue, J.: An incremental points-to analysis with cfl-reachability. In: Jhala, R., De Bosschere, K. (eds.) Compiler Construction. LNCS, vol.\u00a07791, pp. 61\u201381. Springer, Heidelberg (2013)"},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1044834.1044835","volume":"14","author":"A. Milanova","year":"2005","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. ACM Transaction on Software Engineering Methodolology\u00a014(1), 1\u201341 (2005), http:\/\/doi.acm.org\/10.1145\/1044834.1044835","journal-title":"ACM Transaction on Software Engineering Methodolology"},{"key":"7_CR19","unstructured":"Octeau, D., McDaniel, P., Jha, S., Bartel, A., Bodden, E., Klein, J., Le Traon, Y.: Effective inter-component communication mapping in android with epicc: An essential step towards holistic security analysis. In: Proceedings of the 22nd USENIX Conference on Security (SEC), pp. 543\u2013558. USENIX Association (2013), http:\/\/dl.acm.org\/citation.cfm?id=2534766.2534813"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Oh, H., Lee, W., Heo, K., Yang, H., Yi, K.: Selective context-sensitivity guided by impact pre-analysis. In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp. 475\u2013484. ACM (2014)","DOI":"10.1145\/2666356.2594318"},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/3-540-36579-6_10","volume-title":"Compiler Construction","author":"B.G. Ryder","year":"2003","unstructured":"Ryder, B.G.: Dimensions of precision in reference analysis of object-oriented programming languages. In: Hedin, G. (ed.) CC 2003. LNCS, vol.\u00a02622, pp. 126\u2013137. Springer, Heidelberg (2003)"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Smaragdakis, Y., Balatsouras, G., Kastrinis, G.: Set-based pre-processing for points-to analysis. In: ACM SIGPLAN International Conference on Object Oriented Programming Systems Languages and Applications (OOPSLA), pp. 253\u2013270 (2013)","DOI":"10.1145\/2544173.2509524"},{"key":"7_CR23","unstructured":"Smaragdakis, Y., Bravenboer, M., Lhot\u00e1k, O.: Pick your contexts well: understanding object-sensitivity. In: Proceedings of the 38th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2011, pp. 17\u201330. ACM (2011), http:\/\/doi.acm.org\/10.1145\/1926385.1926390"},{"key":"7_CR24","unstructured":"Sridharan, M., Bod\u00edk, R.: Refinement-based context-sensitive points-to analysis for Java. In: Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2006, pp. 387\u2013400. ACM (2006), http:\/\/doi.acm.org\/10.1145\/1133981.1134027"},{"key":"7_CR25","unstructured":"Sridharan, M., Gopan, D., Shan, L., Bodik, R.: Demand-driven points-to analysis for Java. In: Proceedings of the 20th Annual ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA), pp. 59\u201376. ACM (2005), http:\/\/doi.acm.org\/10.1145\/1094811.1094817"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Tip, F., Palsberg, J.: Scalable propagation-based call graph construction algorithms. In: Rosson, M.B., Lea, D. (eds.) OOPSLA 2000, pp. 281\u2013293. ACM (2000)","DOI":"10.1145\/354222.353190"},{"key":"7_CR27","unstructured":"Yan, D., Xu, G., Rountev, A.: Demand-driven context-sensitive alias analysis for Java. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis (ISSTA), pp. 155\u2013165. ACM (2011), http:\/\/doi.acm.org\/10.1145\/2001420.2001440"},{"key":"7_CR28","unstructured":"Zheng, X., Rugina, R.: Demand-driven alias analysis for C. In: Proceedings of the 35th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, pp. 197\u2013208 (2008), http:\/\/doi.acm.org\/10.1145\/1328438.1328464"}],"container-title":["Lecture Notes in Computer Science","Compiler Construction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46663-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,31]],"date-time":"2020-08-31T10:00:31Z","timestamp":1598868031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46663-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662466629","9783662466636"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46663-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}