{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:03Z","timestamp":1772163963952,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,3]],"date-time":"2006-03-03T00:00:00Z","timestamp":1141344000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,3]]},"DOI":"10.1145\/1121341.1121418","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T17:40:43Z","timestamp":1147110043000},"page":"249-253","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An undergraduate course on software bug detection tools and techniques"],"prefix":"10.1145","author":[{"given":"Eric","family":"Larson","sequence":"first","affiliation":[{"name":"Seattle University, Seattle, WA"}]}],"member":"320","published-online":{"date-parts":[[2006,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Automatically Validating Temporal Safety Properties of Interfaces. Workshop on Model Checking of Software","author":"Ball T.","year":"2001","unstructured":"T. Ball and S. Rajamani . Automatically Validating Temporal Safety Properties of Interfaces. Workshop on Model Checking of Software , May 2001 . T. Ball and S. Rajamani. Automatically Validating Temporal Safety Properties of Interfaces. Workshop on Model Checking of Software, May 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 7th USENIX Security Conference","author":"Cowan C.","year":"1998","unstructured":"C. Cowan , C. Pu , D. Maier , H. Hinton , P. Bakke , S. Beattie , A. Grier , P. Wagle , and Q. Zhang . StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks . Proceedings of the 7th USENIX Security Conference , January 1998 . C. Cowan, C. Pu, D. Maier, H. Hinton, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks. Proceedings of the 7th USENIX Security Conference, January 1998."},{"key":"e_1_3_2_1_4_1","unstructured":"Ctool. http:\/\/sourceforge.net\/projects\/ctool\/  Ctool. http:\/\/sourceforge.net\/projects\/ctool\/"},{"key":"e_1_3_2_1_5_1","volume-title":"May","year":"2002","unstructured":"The Economic Impacts of Inadequate Infrastructure for Software Testing. National Institute of Standards and Technology report, prepared by RTI (project 7007.011) , May 2002 . The Economic Impacts of Inadequate Infrastructure for Software Testing. National Institute of Standards and Technology report, prepared by RTI (project 7007.011), May 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_7_1","volume-title":"Purify: Fast Detection of Memory Leaks and Access Errors. 1992 Winter USENIX Conference","author":"Hastings R.","year":"1992","unstructured":"R. Hastings and B. Joyce . Purify: Fast Detection of Memory Leaks and Access Errors. 1992 Winter USENIX Conference , Jan. 1992 . R. Hastings and B. Joyce. Purify: Fast Detection of Memory Leaks and Access Errors. 1992 Winter USENIX Conference, Jan. 1992."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/645670.665360"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. of the 3rd International Workshop on Automated Debugging","author":"Jones R.","year":"1997","unstructured":"R. Jones and P. Kelly . Backwards-compatible bounds checking for arrays and pointers in C programs . Proc. of the 3rd International Workshop on Automated Debugging , May 1997 . R. Jones and P. Kelly. Backwards-compatible bounds checking for arrays and pointers in C programs. Proc. of the 3rd International Workshop on Automated Debugging, May 1997."},{"key":"e_1_3_2_1_10_1","volume-title":"May","author":"Merrill J.","year":"2003","unstructured":"J. Merrill . GENERIC and GIMPLE: A New Tree Representation for Entire Functions. GCC Developer's Summit , May 2003 . J. Merrill. GENERIC and GIMPLE: A New Tree Representation for Entire Functions. GCC Developer's Summit, May 2003."},{"key":"e_1_3_2_1_11_1","volume-title":"W.Weimer. Cil: Intermediate Language and Tools for Analysis and Transformation of C Programs. International Conference on Compiler Construction","author":"Necula G.","year":"2002","unstructured":"G. Necula , S. McPeak , S. P. Rahul , W.Weimer. Cil: Intermediate Language and Tools for Analysis and Transformation of C Programs. International Conference on Compiler Construction , Apr. 2002 . G. Necula, S. McPeak, S. P. Rahul, W.Weimer. Cil: Intermediate Language and Tools for Analysis and Transformation of C Programs. International Conference on Compiler Construction, Apr. 2002."},{"key":"e_1_3_2_1_12_1","volume-title":"Bounds-Checking Entire Programs Without Recompiling. Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management","author":"Nethercote N.","year":"2004","unstructured":"N. Nethercote and J. Fitzhardinge . Bounds-Checking Entire Programs Without Recompiling. Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management , Jan. 2004 . N. Nethercote and J. Fitzhardinge. Bounds-Checking Entire Programs Without Recompiling. Workshop on Semantics, Program Analysis, and Computing Environments for Memory Management, Jan. 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.819971"},{"key":"e_1_3_2_1_14_1","volume":"11","author":"Zhang J.","year":"2001","unstructured":"J. Zhang and X. Wang . A constraint solver and its application to path feasibility analysis. International Journal of Software Engineering and Knowledge , Volume 11 , 2001 . J. Zhang and X. Wang. A constraint solver and its application to path feasibility analysis. International Journal of Software Engineering and Knowledge, Volume 11, 2001.","journal-title":"International Journal of Software Engineering and Knowledge"}],"event":{"name":"SIGCSE06: Technical Symposium on Computer Science Education","location":"Houston Texas USA","acronym":"SIGCSE06","sponsor":["ACM Association for Computing Machinery","SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 37th SIGCSE technical symposium on Computer science education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1121341.1121418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1121341.1121418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:36Z","timestamp":1750249116000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1121341.1121418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,3]]},"references-count":14,"alternative-id":["10.1145\/1121341.1121418","10.1145\/1121341"],"URL":"https:\/\/doi.org\/10.1145\/1121341.1121418","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1124706.1121418","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2006,3,3]]},"assertion":[{"value":"2006-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}