{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:17:56Z","timestamp":1767183476648},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/icsm.2007.4362657","type":"proceedings-article","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:58:47Z","timestamp":1193169527000},"page":"445-454","source":"Crossref","is-referenced-by-count":4,"title":["ONTRAC: A system for efficient ONline TRACing for debugging"],"prefix":"10.1109","author":[{"given":"Vijay","family":"Nagarajan","sequence":"first","affiliation":[]},{"given":"Dennis","family":"Jeffrey","sequence":"additional","affiliation":[]},{"given":"Rajiv","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Neelam","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Squid","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2003.1191551"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2006.7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1275937.1275943"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273489"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2000.876075"},{"journal-title":"Mutt buffer overflow exploit","year":"0","key":"ref4"},{"journal-title":"Midnight commander","year":"0","key":"ref3"},{"journal-title":"Pine heap buffer overflow","year":"0","key":"ref6"},{"year":"0","author":"mutt","key":"ref5"},{"journal-title":"Pine Website","year":"0","key":"ref8"},{"journal-title":"Pine stack overflow","year":"0","key":"ref7"},{"journal-title":"Midnight Commander Exploit","year":"0","key":"ref2"},{"year":"0","author":"gnu","key":"ref1"},{"journal-title":"Squid buffer overflow exploit","year":"0","key":"ref9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/587052.587053"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085135"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996855"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1152154.1152180"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181786"}],"event":{"name":"2007 IEEE International Conference on Software Maintenance","start":{"date-parts":[[2007,10,2]]},"location":"Paris, France","end":{"date-parts":[[2007,10,5]]}},"container-title":["2007 IEEE International Conference on Software Maintenance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4362596\/4362597\/04362657.pdf?arnumber=4362657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T23:13:09Z","timestamp":1489705989000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4362657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icsm.2007.4362657","relation":{},"ISSN":["1063-6773"],"issn-type":[{"type":"print","value":"1063-6773"}],"subject":[],"published":{"date-parts":[[2007,10]]}}}