{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:57:14Z","timestamp":1743008234944,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811996009"},{"type":"electronic","value":"9789811996016"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-19-9601-6_3","type":"book-chapter","created":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T16:02:22Z","timestamp":1690214542000},"page":"43-55","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["How to\u00a0Make Taint Analysis Precise"],"prefix":"10.1007","author":[{"given":"Francesco","family":"Logozzo","sequence":"first","affiliation":[]},{"given":"Ibrahim","family":"Mohamed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,22]]},"reference":[{"unstructured":"CodeQL. https:\/\/codeql.github.com\/. Accessed: 2022-09-14","key":"3_CR1"},{"unstructured":"DataFlowSanitizer design document. https:\/\/clang.llvm.org\/docs\/DataFlowSanitizerDesign.html. Accessed: 2022-08-12","key":"3_CR2"},{"unstructured":"GrammaTech CodeSonar. https:\/\/resources.grammatech.com\/youtube-all-videos\/tainted-data-analysis-in-codesonar. Accessed: 2022-09-14","key":"3_CR3"},{"unstructured":"How Meta and the security industry collaborate to secure the internet. https:\/\/engineering.fb.com\/2022\/07\/20\/security\/how-meta-and-the-security-industry-collaborate-to-secure-the-internet\/. Accessed: 2022-09-15","key":"3_CR4"},{"unstructured":"Open-sourcing Mariana Trench: Analyzing Android and Java app security in depth. https:\/\/engineering.fb.com\/2021\/09\/29\/security\/mariana-trench\/. Accessed: 2022-09-15","key":"3_CR5"},{"unstructured":"Pysa: An open source static analysis tool to detect and prevent security issues in Python code. https:\/\/engineering.fb.com\/2020\/08\/07\/security\/pysa\/. Accessed: 2022-09-15","key":"3_CR6"},{"unstructured":"Zoncolan: How Facebook uses static analysis to detect and prevent security issues. https:\/\/engineering.fb.com\/2019\/08\/15\/security\/zoncolan\/. Accessed: 2022-09-15","key":"3_CR7"},{"key":"3_CR8","series-title":"NATO ASI Series F","volume-title":"Calculational System Design","author":"Patrick Cousot","year":"1999","unstructured":"Cousot, Patrick: The calculational design of a generic abstract interpreter. In: Broy, M., Steinbr\u00fcggen, R. (eds.) Calculational System Design. NATO ASI Series F, IOS Press, Amsterdam (1999)"},{"unstructured":"Cousot, P.: Principles of Abstract Interpretation. MIT Press (2021)","key":"3_CR9"},{"doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Graham, R.M., Harrison, M.A., Sethi, R. (Eds.) Conference Record of the Fourth ACM Symposium on Principles of Programming Languages, Los Angeles, California, USA, January 1977, pp. 238\u2013252. ACM (1977)","key":"3_CR10","DOI":"10.1145\/512950.512973"},{"doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Systematic design of program analysis frameworks. In: Aho, A.V., Zilles, S.N., Rosen, B.K. (Eds.) Conference Record of the Sixth Annual ACM Symposium on Principles of Programming Languages, San Antonio, Texas, USA, January 1979, pp. 269\u2013282. ACM Press (1979)","key":"3_CR11","DOI":"10.1145\/567752.567778"},{"doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R., F\u00e4hndrich, M., Logozzo, F.: Automatic inference of necessary preconditions. In: Giacobazzi, R., Berdine, J., Mastroeni, I. (Eds.) Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013, Rome, Italy, January 20-22, 2013. Proceedings, Lecture Notes in Computer Science, vol. 7737, pp. 128\u2013148. Springer (2013)","key":"3_CR12","DOI":"10.1007\/978-3-642-35873-9_10"},{"doi-asserted-by":"crossref","unstructured":"Deng, C., Cousot, P.: The systematic design of responsibility analysis by abstract interpretation. ACM Trans. Program. Lang. Syst. 44(1), 3:1\u20133:90 (2022)","key":"3_CR13","DOI":"10.1145\/3484938"},{"issue":"5","key":"3_CR14","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1145\/360051.360056","volume":"19","author":"Dorothy E Denning","year":"1976","unstructured":"Denning, Dorothy E.: A lattice model of secure information flow. Commun. ACM 19(5), 236\u2013243 (1976)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Deutsch, A.: Interprocedural may-alias analysis for pointers: Beyond k-limiting. In: Sarkar, V., Ryder, B.G., Soffa, M.L. (Eds.) Proceedings of the ACM SIGPLAN\u201994 Conference on Programming Language Design and Implementation (PLDI), Orlando, Florida, USA, June 20-24, 1994, pp. 230\u2013241. ACM (1994)","key":"3_CR15","DOI":"10.1145\/178243.178263"},{"doi-asserted-by":"crossref","unstructured":"Hubert, L., Jensen, T., Pichardie, D.: Semantic foundations and inference of non-null annotations. In: Barthe, G., de\u00a0Boer, F.S. (Eds.) Formal Methods for Open Object-Based Distributed Systems, 10th IFIP WG 6.1 International Conference, FMOODS 2008, Oslo, Norway, June 4-6, 2008, Proceedings, Lecture Notes in Computer Science, vol. 5051, pp. 132\u2013149. Springer (2008)","key":"3_CR16","DOI":"10.1007\/978-3-540-68863-1_9"},{"doi-asserted-by":"crossref","unstructured":"Logozzo, F., F\u00e4hndrich, M.: On the relative completeness of bytecode analysis versus source code analysis. In: Hendren, L.J. (Ed.) Compiler Construction, 17th International Conference, CC 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29 - April 6, 2008. Proceedings, Lecture Notes in Computer Science, vol. 4959, pp. 197\u2013212. Springer (2008)","key":"3_CR17","DOI":"10.1007\/978-3-540-78791-4_14"},{"unstructured":"Xie, Y., Aiken, A.: Static detection of security vulnerabilities in scripting languages. In: Keromytis, A.D. (Ed.) Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31 - August 4, 2006. USENIX Association (2006)","key":"3_CR18"}],"container-title":["Intelligent Systems Reference Library","Challenges of Software Verification"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-9601-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,24]],"date-time":"2023-07-24T16:03:41Z","timestamp":1690214621000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-9601-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789811996009","9789811996016"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-9601-6_3","relation":{},"ISSN":["1868-4394","1868-4408"],"issn-type":[{"type":"print","value":"1868-4394"},{"type":"electronic","value":"1868-4408"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"22 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}