{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:41:47Z","timestamp":1729647707425,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1109\/icpc.2016.7503727","type":"proceedings-article","created":{"date-parts":[[2016,7,7]],"date-time":"2016-07-07T17:30:57Z","timestamp":1467912657000},"page":"1-4","source":"Crossref","is-referenced-by-count":3,"title":["Human-machine resolution of Invisible Control Flow?"],"prefix":"10.1109","author":[{"given":"Suresh","family":"Kothari","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Tamrawi","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Mathews","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref10","article-title":"XINU"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591065"},{"year":"0","key":"ref12","article-title":"Ensoft corp"},{"year":"0","key":"ref13","article-title":"Automated Program Analysis for Cybersecurity (APAC)"},{"year":"0","key":"ref14","article-title":"Space\/Time Analysis for Cybersecurity (STAC)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26961-0_11"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2004.16"},{"key":"ref3","first-page":"7","volume":"11","author":"milanova","year":"2004","journal-title":"Precise call graphs for c programs with function pointers"},{"year":"0","key":"ref6","article-title":"Linux driver verification tool"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1232420.1232423"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2302311"},{"year":"0","key":"ref7","article-title":"Clang static analyzer"},{"article-title":"Control flow analysis of event-driven program","year":"0","author":"scheibner","key":"ref2"},{"article-title":"Bill Gates Keynote: Microsoft Tech-Ed","year":"2008","author":"gates","key":"ref1"},{"year":"0","key":"ref9","article-title":"Coverity static analysis"}],"event":{"name":"2016 IEEE 24th International Conference on Program Comprehension (ICPC)","start":{"date-parts":[[2016,5,16]]},"location":"Austin, TX, USA","end":{"date-parts":[[2016,5,17]]}},"container-title":["2016 IEEE 24th International Conference on Program Comprehension (ICPC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7500162\/7503699\/07503727.pdf?arnumber=7503727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,28]],"date-time":"2016-09-28T12:16:39Z","timestamp":1475064999000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7503727\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/icpc.2016.7503727","relation":{},"subject":[],"published":{"date-parts":[[2016,5]]}}}