{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:36:40Z","timestamp":1729672600041,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/icpc.2009.5090027","type":"proceedings-article","created":{"date-parts":[[2009,6,29]],"date-time":"2009-06-29T02:22:27Z","timestamp":1246242147000},"page":"50-59","source":"Crossref","is-referenced-by-count":0,"title":["Practical static analysis for inference of security-related program properties"],"prefix":"10.1109","author":[{"family":"Yin Liu","sequence":"first","affiliation":[]},{"given":"Ana","family":"Milanova","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.1998.730915"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1044834.1044835"},{"key":"18","first-page":"158","article-title":"flexible alias protection","author":"noble","year":"1998","journal-title":"ECOOP"},{"key":"15","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1145\/1297027.1297059","article-title":"inferring aliasing and encapsulation properties for java","author":"ma","year":"2007","journal-title":"OOPSLA"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101922"},{"article-title":"finding security vulnerabilities in java applications with static analsysi","year":"2005","author":"livshits","key":"13"},{"key":"14","first-page":"271","article-title":"finding security vulnerabilities in java applications with static analysis","author":"livshits","year":"2005","journal-title":"USENIX Security Simposium"},{"article-title":"static information flow analysis for java. technical report 08-03, rensselaer polytechnic institute","year":"2008","author":"liu","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512486"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360208"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357793"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504286"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.20"},{"key":"25","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/383043.381532","article-title":"a schema for interprocedural modification side-effect analysis with pointer aliasing","volume":"23","author":"ryder","year":"2001","journal-title":"ACM TOPLAS"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.806121"},{"key":"27","first-page":"199","article-title":"a combined pointer and purity analysis for java programs","author":"salcianu","year":"2005","journal-title":"VMCAI"},{"key":"28","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/1094811.1094828","article-title":"javari: adding reference immutability to java","author":"tschantz","year":"2005","journal-title":"OOPSLA"},{"key":"29","first-page":"18","article-title":"optimizing java bytecode using the soot framework: is it feasible?","author":"valle?e-rai","year":"2000","journal-title":"CCC"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321649"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582448"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.61"},{"journal-title":"Introduction to Stanford SecuriBench","year":"0","key":"1"},{"key":"7","first-page":"346","article-title":"information flow analysis for java bytecode","author":"genaim","year":"2005","journal-title":"VMCAI"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"5","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/286936.286947","article-title":"ownership types for flexible alias protection","author":"clarke","year":"1998","journal-title":"OOPSLA"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582447"},{"key":"9","first-page":"153","article-title":"scaling java points-to analysis using spark","author":"lhotak","year":"2003","journal-title":"CCC"},{"journal-title":"Applying UML and Patterns","year":"2002","author":"larman","key":"8"}],"event":{"name":"2009 IEEE 17th International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2009,5,17]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2009,5,19]]}},"container-title":["2009 IEEE 17th International Conference on Program Comprehension"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5073941\/5090011\/05090027.pdf?arnumber=5090027","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,14]],"date-time":"2024-03-14T22:44:17Z","timestamp":1710456257000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5090027\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icpc.2009.5090027","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}