{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T08:43:29Z","timestamp":1765961009970,"version":"3.37.3"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["01IS15009B"],"award-info":[{"award-number":["01IS15009B"]}]},{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"publisher","award":["1318808","1552944"],"award-info":[{"award-number":["1318808","1552944"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science of Security Lablet","award":["H9823014C0140"],"award-info":[{"award-number":["H9823014C0140"]}]},{"DOI":"10.13039\/100006602","name":"AFRL and DARPA","doi-asserted-by":"publisher","award":["FA8750-16-2-0042"],"award-info":[{"award-number":["FA8750-16-2-0042"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018867","name":"Heinz Nixdorf Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100018867","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1109\/tse.2017.2756048","type":"journal-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T18:12:31Z","timestamp":1506363151000},"page":"1269-1291","source":"Crossref","is-referenced-by-count":22,"title":["Tracking Load-Time Configuration Options"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8213-6988","authenticated-orcid":false,"given":"Max","family":"Lillack","sequence":"first","affiliation":[{"name":"University of Leipzig, Leipzig, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4450-4572","authenticated-orcid":false,"given":"Christian","family":"Kastner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3470-3647","authenticated-orcid":false,"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[{"name":"Paderborn University & Fraunhofer IEM, Paderborn, Germany"}]}],"member":"263","reference":[{"article-title":"Personal communication","year":"2014","author":"rasthofer","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568300"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","article-title":"Z3: An efficient SMT solver","author":"moura","year":"2008","journal-title":"Proc Int Conf Tools Algorithms Construction Anal Syst"},{"key":"ref31","first-page":"140","article-title":"JoDroid:\n Adding Android support to a static information flow control tool","author":"mohr","year":"2015","journal-title":"Proc Work Conf Program Languages"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970322"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227068"},{"year":"2013","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950311"},{"key":"ref28","first-page":"445","article-title":"Tracking load-time configuration options","author":"lillack","year":"2014","journal-title":"Proc IEEE Int Conf Automated Software Engineering"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806819"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217954"},{"key":"ref2","first-page":"385","article-title":"Configuration-aware change impact analysis","author":"angerer","year":"2015","journal-title":"Proc IEEE Int Conf Automated Software Engineering"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1509239.1509274"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591191"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1621607.1621632"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368131"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960284"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048128"},{"key":"ref26","first-page":"143","article-title":"#ifdef\n confirmed harmful: Promoting understandable software variation","author":"le","year":"2011","journal-title":"Proc IEEE Symp Visual Languages and Human Centric Computing"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491459"},{"key":"ref50","first-page":"421","article-title":"Static analysis of variability in system\n software: The 90,000 #ifdefs issue","author":"tartler","year":"2014","journal-title":"Proc USENIX Conf USENIX Annu Tech Conf"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966451"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568251"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491456"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref54","first-page":"125","article-title":"Soot - a Java bytecode optimization framework","author":"vall\u00e9e-rai","year":"1999","journal-title":"Proc Conf Centre Adv Stud Collaborative Res"},{"key":"ref53","first-page":"24:1","article-title":"Staccato: A bug finder for dynamic configuration updates","author":"toman","year":"2016","journal-title":"Proc Eur Conf Object-Oriented Program"},{"key":"ref52","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"J Program Languages"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491430"},{"key":"ref11","first-page":"171","article-title":"Practical and\n accurate pinpointing of configuration errors using static analysis","author":"dong","year":"2015","journal-title":"Intl Conf Software Maintenance and Evolution"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806864"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.1997.601260"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-012-9208-x"},{"key":"ref15","first-page":"46:1","article-title":"DTAM:\n Dynamic taint analysis of multi-threaded programs for relevancy","author":"ganai","year":"2012","journal-title":"Proc Int'l Symp the Foundations of Software Eng"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"ref17","first-page":"123","article-title":"Using JOANA\n for information flow control in Java programs&#x2014;A practical guide","author":"graf","year":"2013","journal-title":"Proc 6th Work Conf Program Languages"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970321"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37521-7"},{"key":"ref6","first-page":"237","article-title":"Automating configuration troubleshooting with dynamic information flow analysis","author":"attariyan","year":"2010","journal-title":"Proc USENIX Conf Operating System Design and Implementations"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1019478"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2001.957833"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379690"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250748"},{"key":"ref9","first-page":"355","article-title":"SPL$^{LIFT}$\n: Statically analyzing\n software product lines in minutes instead of years","author":"bodden","year":"2013","journal-title":"Proc ACM Conf Program Lang Des Implementation"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/978-3-642-28872-2_19","article-title":"Integration testing of\n software product lines using compositional symbolic execution","author":"shi","year":"2012","journal-title":"Proc 8th Int Conf Fundam Approaches Softw Eng"},{"key":"ref45","article-title":"Detecting format string vulnerabilities\n with type qualifiers","author":"shankar","year":"2001","journal-title":"Proc Usenix Secur Symp"},{"key":"ref48","first-page":"185","article-title":"#ifdef considered harmful or portability experience with C news","author":"spencer","year":"1992","journal-title":"Proc USENIX Conf USENIX Annu Tech Conf"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1868294.1868300"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9947-1953-0053041-6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568289"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.29"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1449913.1449917"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/8571058\/8049300-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8571058\/08049300.pdf?arnumber=8049300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:48:20Z","timestamp":1649443700000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8049300\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,1]]},"references-count":58,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tse.2017.2756048","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2018,12,1]]}}}