{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:04:52Z","timestamp":1743005092832,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819751006"},{"type":"electronic","value":"9789819751013"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5101-3_16","type":"book-chapter","created":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:01:46Z","timestamp":1720980106000},"page":"288-302","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CCE&amp;D: A Configuration Failure Prevention Method for Autonomous Driving Systems"],"prefix":"10.1007","author":[{"given":"Yanqiu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jinzhao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuanzhang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,15]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Coicheci, S., Filip, I.: Self-driving vehicles: current status of development and technical challenges to overcome. In: 2020 IEEE 14th International Symposium on Applied Computational Intelligence and Informatics (SACI), pp. 000255\u2013000260. IEEE, Timisoara, Romania (2020)","DOI":"10.1109\/SACI49304.2020.9118809"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Garcia, J., Feng, Y., Shen, J., et al.: A comprehensive study of autonomous vehicle bugs. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering (ICSE \u201820), pp. 385\u2013396. Association for Computing Machinery, New York, NY, USA (2020)","DOI":"10.1145\/3377811.3380397"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Zhang, S., Ernst, M.D.: Automated diagnosis of software configuration errors. In: 35th International Conference on Software Engineering (ICSE), pp. 312\u2013321. IEEE, San Francisco, CA, USA (2013)","DOI":"10.1109\/ICSE.2013.6606577"},{"issue":"4","key":"16_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2791577","volume":"47","author":"T Xu","year":"2015","unstructured":"Xu, T., Zhou, Y.: Systems approaches to tackling configuration errors: a survey. ACM Comput. Surv. 47(4), 1\u201341 (2015)","journal-title":"ACM Comput. Surv."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Tian, Y., Ray, B.: Automatically diagnosing and repairing error handling bugs in c. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering (ESEC\/FSE 2017), pp. 752\u2013762. Association for Computing Machinery, New York, NY, USA (2017)","DOI":"10.1145\/3106237.3106300"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Wang, C., Ko, R., Zhang, Y., et al.: Taintmini: detecting flow of sensitive data in mini-programs with static taint analysis. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 932\u2013944. IEEE, Melbourne, Australia (2023)","DOI":"10.1109\/ICSE48619.2023.00086"},{"key":"16_CR7","unstructured":"Autoware Homepage. https:\/\/autoware.org\/. Accessed 26 Dec 2023"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Xu, T., Zhang, J., Huang, P., et al.: Do not blame users for misconfigurations. In: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles, pp. 244\u2013259. Association for Computing Machinery, New York, NY, USA (2013)","DOI":"10.1145\/2517349.2522727"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Zhou, S., Liu, X., Li, S., et al.: ConfMapper: automated variable finding for configuration items in source code. In: 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 228\u2013235. IEEE, Vienna, Austria (2016)","DOI":"10.1109\/QRS-C.2016.35"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Nadi, S., Berger, T., Kastner, C., et al.: Mining configuration constraints: static analyses and empirical results. In: Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), Association for Computing Machinery, New York, NY, USA, pp. 140\u2013151. (2014)","DOI":"10.1145\/2568225.2568283"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Zhou, S., Liu, X., Li, S., et al.: ConfinLog: leveraging Software Logs to Infer Configuration Constraints. In: 2021 IEEE\/ACM 29th International Conference on Program Comprehension (ICPC), pp. 94\u2013105. IEEE, Madrid, Spain (2021)","DOI":"10.1109\/ICPC52881.2021.00018"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Chen, Q., Wang, T., Legunsen, O., et al.: Understanding and discovering software configuration dependencies in cloud and datacenter systems. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 362\u2013374. Association for Computing Machinery, New York, NY, USA (2020)","DOI":"10.1145\/3368089.3409727"},{"key":"16_CR13","unstructured":"Dawei, W., Ying, L., et al.: CarpetFuzz: automatic program option constraint extraction from documentation for fuzzing. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 1919\u20131936. USENIX Association, Anaheim, CA (2023)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Haochen, H., Zhouyang, J., Shanshan, L., et al.: CP-detector: using configuration-related performance properties to expose performance bugs. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering (ASE \u201820), pp. 623\u2013634. Association for Computing Machinery, New York, NY, USA (2020)","DOI":"10.1145\/3324884.3416531"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Timperley, C.S., Durschmid, T., Schmerl, B., et al.: ROSDiscover: statically detecting run-time architecture misconfigurations in robotics systems. In: 2022 IEEE 19th International Conference on Software Architecture (ICSA), pp. 112\u2013123. IEEE, Honolulu, HI, USA (2022)","DOI":"10.1109\/ICSA53651.2022.00019"},{"key":"16_CR16","unstructured":"Sun, X., Cheng, R., Chen, J., et al.: Testing configuration changes in context to prevent production failures. In: 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pp. 735\u2013751. USENIX Association (2020)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Cheng, R., Zhang, L., Marinov, D., et al.: Test-case prioritization for configuration testing. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021), pp. 452\u2013465. Association for Computing Machinery, New York, NY, USA (2021)","DOI":"10.1145\/3460319.3464810"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Dong, Z., Andrzejak, A., et al.: ORPLocator: identifying read points of configuration options via static analysis. In: 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE), pp. 185\u2013195. IEEE, Ottawa, ON, Canada (2016)","DOI":"10.1109\/ISSRE.2016.37"},{"key":"16_CR19","unstructured":"srcML Homepage. http:\/\/www.srcml.org\/. Accessed 26 Dec 2023"},{"key":"16_CR20","unstructured":"Wang, L., Zhouyang, J., Shanshan, L., et al.: Challenges and opportunities: an in-depth empirical study on configuration error injection testing. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2021), pp. 478\u2013490. Association for computing Machinery, New York, NY, USA (2021)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5101-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T18:04:16Z","timestamp":1720980256000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5101-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819751006","9789819751013"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5101-3_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"15 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}