{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:28:19Z","timestamp":1743064099823,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662482872"},{"type":"electronic","value":"9783662482889"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-48288-9_4","type":"book-chapter","created":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T02:26:24Z","timestamp":1441074384000},"page":"54-71","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Precise Data Flow Analysis in the Presence of Correlated Method Calls"],"prefix":"10.1007","author":[{"given":"Marianna","family":"Rapoport","sequence":"first","affiliation":[]},{"given":"Ond\u0159ej","family":"Lhot\u00e1k","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Tip","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,2]]},"reference":[{"key":"4_CR1","unstructured":"Agesen, O.: Concrete Type Inference: Delivering Object-Oriented Applications. Ph.D. thesis, Stanford University (1995)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Traon, Y.L., Octeau, D., McDaniel, P.: FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps. In: PLDI 2014, p. 29 (2014)","DOI":"10.1145\/2594291.2594299"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Blackburn, S.M., Garner, R., Hoffmann, C., Khan, A.M., McKinley, K.S., Bentzur, R., Diwan, A., Feinberg, D., Frampton, D., Guyer, S.Z., Hirzel, M., Hosking, A.L., Jump, M., Lee, H.B., Moss, J.E.B., Phansalkar, A., Stefanovic, D., VanDrunen, T., von Dincklage, D., Wiedermann, B.: The DaCapo benchmarks: Java benchmarking development and analysis. In: OOPSLA 2006, pp. 169\u2013190 (2006)","DOI":"10.1145\/1167515.1167488"},{"key":"4_CR4","unstructured":"Bodden, E., Tol\u00eado, T., Ribeiro, M., Brabrand, C., Borba, P., Mezini, M.: SPLLIFT - statically analyzing software product lines in minutes instead of years. In: Software Engineering 2014, pp. 81\u201382 (2014)"},{"key":"4_CR5","unstructured":"Fink, S., Dolby, J.: WALA \u2013 the TJ Watson libraries for analysis (2012). http:\/\/wala.sourceforge.net"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Guarnieri, S., Pistoia, M., Tripp, O., Dolby, J., Teilhet, S., Berg, R.: Saving the world wide web from vulnerable JavaScript. In: ISSTA 2011, pp. 177\u2013187 (2011)","DOI":"10.1145\/2001420.2001442"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Knoop, J., Steffen, B.: The interprocedural coincidence theorem. In: CC 1992, pp. 125\u2013140 (1992)","DOI":"10.1007\/3-540-55984-1_13"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1145\/229542.229545","volume":"3","author":"J Knoop","year":"1996","unstructured":"Knoop, J., Steffen, B., Vollmer, J.: Parallelism for free: efficient and optimal bitvector analyses for parallel programs. ACM Trans. Program. Lang. Syst. 3, 268\u2013299 (1996)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-642-37651-1_17","volume-title":"Programming Logics","author":"J Kreiker","year":"2013","unstructured":"Kreiker, J., Reps, T., Rinetzky, N., Sagiv, M., Wilhelm, R., Yahav, E.: Interprocedural shape analysis for effectively cutpoint-free programs. In: Voronkov, A., Weidenbach, C. (eds.) Programming Logics. LNCS, vol. 7797, pp. 414\u2013445. Springer, Heidelberg (2013)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Lerch, J., Hermann, B., Bodden, E., Mezini, M.: FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases. In: FSE 2014, pp. 98\u2013108 (2014)","DOI":"10.1145\/2635868.2635878"},{"issue":"1","key":"4_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1044834.1044835","volume":"14","author":"A Milanova","year":"2005","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. ACM Trans. Softw. Eng. Methodol. 14(1), 1\u201341 (2005)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Naeem, N.A., Lhot\u00e1k, O.: Typestate-like analysis of multiple interacting objects. In: OOPSLA 2008, pp. 347\u2013366 (2008)","DOI":"10.1145\/1449955.1449792"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Naeem, N.A., Lhot\u00e1k, O., Rodriguez, J.: Practical extensions to the IFDS algorithm. In: CC 2010, pp. 124\u2013144 (2010)","DOI":"10.1007\/978-3-642-11970-5_8"},{"key":"4_CR14","unstructured":"Odersky, M.: Essentials of Scala. In: LMO 2009, p. 2 (2009)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Rapoport, M., Lhot\u00e1k, O., Tip, F.: Precise data flow analysis in the presence of correlated method calls. Technical report CS-2015-07, University of Waterloo (2015)","DOI":"10.1007\/978-3-662-48288-9_4"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Reps, T.W., Horwitz, S., Sagiv, S.: Precise interprocedural dataflow analysis via graph reachability. In: POPL 1995, pp. 49\u201361 (1995)","DOI":"10.1145\/199448.199462"},{"key":"4_CR17","unstructured":"Rodriguez, J.D.: A concurrent IFDS dataflow analysis algorithm using actors. Master\u2019s thesis, University of Waterloo (2010)"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Sagiv, S., Reps, T. W., and Horwitz, S.: Precise interprocedural dataflow analysis with applications to constant propagation. In: TAPSOFT 1995, pp. 651\u2013665 (1995)","DOI":"10.1007\/3-540-59293-8_226"},{"key":"4_CR19","unstructured":"Sharir, M., Pnueli, A.: Two approaches to interprocedural data flow analysis. In: Program Flow Analysis: Theory and Applications, pp. 189\u2013234 (1981)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-642-31057-7_20","volume-title":"ECOOP 2012 \u2013 Object-Oriented Programming","author":"M Sridharan","year":"2012","unstructured":"Sridharan, M., Dolby, J., Chandra, S., Sch\u00e4fer, M., Tip, F.: Correlation tracking for points-to analysis of JavaScript. In: Noble, J. (ed.) ECOOP 2012. LNCS, vol. 7313, pp. 435\u2013458. Springer, Heidelberg (2012)"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.scico.2013.11.005","volume":"97","author":"F Tip","year":"2015","unstructured":"Tip, F.: Infeasible paths in object-oriented programs. Sci. Comput. Program. 97, 91\u201397 (2015)","journal-title":"Sci. Comput. Program."},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Tripp, O., Pistoia, M., Fink, S.J., Sridharan, M., Weisman, O.: TAJ: effective taint analysis of web applications. In: PLDI 2009, pp. 87\u201397 (2009)","DOI":"10.1145\/1543135.1542486"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, X., Mangal, R., Grigore, R., Naik, M., Yang, H.: On abstraction refinement for program analyses in Datalog. In: PLDI 2014, p. 27 (2014)","DOI":"10.1145\/2594291.2594327"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-48288-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T16:36:57Z","timestamp":1675874217000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-48288-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662482872","9783662482889"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-48288-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"2 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}