{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:48Z","timestamp":1763467788880},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,11,5]]},"DOI":"10.1145\/1181775.1181786","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"81-91","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Dynamic slicing long running programs through execution fast forwarding"],"prefix":"10.1145","author":[{"given":"Xiangyu","family":"Zhang","sequence":"first","affiliation":[{"name":"The University of Arizona, Tucson, Arizona"}]},{"given":"Sriraman","family":"Tallam","sequence":"additional","affiliation":[{"name":"The University of Arizona, Tucson, Arizona"}]},{"given":"Rajiv","family":"Gupta","sequence":"additional","affiliation":[{"name":"The University of Arizona, Tucson, Arizona"}]}],"member":"320","published-online":{"date-parts":[[2006,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566211"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_1_4_1","volume-title":"Toulouse","author":"Gyimothy T.","year":"1999","unstructured":"T. Gyimothy , A. Beszedes , I. Forgacs , \"An efficient relevant slicing method for debugging,\" 7th European Software Engineering Conference 7th ACM SIGSOFT International Symposium on Foundations of Software Engineering , Toulouse , France , 1999 . T. Gyimothy, A. Beszedes, I. Forgacs, \"An efficient relevant slicing method for debugging,\" 7th European Software Engineering Conference 7th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Toulouse, France, 1999."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781148"},{"key":"e_1_3_2_1_7_1","volume-title":"Workshop on the Evaluation of Software Defect Detection Tools","author":"Lu S.","year":"2005","unstructured":"S. Lu , Z. Li , F. Qin , L. Tan , P. Zhou , and Y. Zhou , \" BugBench: a benchmark for evaluating bug detection tools \", Workshop on the Evaluation of Software Defect Detection Tools , 2005 . S. Lu, Z. Li, F. Qin, L. Tan, P. Zhou, and Y. Zhou, \"BugBench: a benchmark for evaluating bug detection tools\", Workshop on the Evaluation of Software Defect Detection Tools, 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178477"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083246.1083251"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 2006 International Workshop on Dynamic Analysis","author":"Orso A.","year":"2006","unstructured":"A. Orso , S. Joshi , M. Burger , and A. Zeller , \" Locating Causes of Program Failures \", Proceedings of the 2006 International Workshop on Dynamic Analysis , Shanghai, China , May 2006 . A. Orso, S. Joshi, M. Burger, and A. Zeller, \"Locating Causes of Program Failures\", Proceedings of the 2006 International Workshop on Dynamic Analysis, Shanghai, China, May 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/68210.69227"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_13_1","first-page":"303","volume-title":"California","author":"Rinard M.C.","year":"2004","unstructured":"M.C. Rinard , C. Cadar , D. Dumitran , D.M. Roy , T. Leu , and W.S. Beebee , \" Enhancing Server Availability and Security Through Failure-Oblivious Computing\", the Sixth Symposium on Operating System Design and Implementation San Francisco , California , pages 303 -- 316 , 2004 . M.C. Rinard, C. Cadar, D. Dumitran, D.M. Roy, T. Leu, and W.S. Beebee, \"Enhancing Server Availability and Security Through Failure-Oblivious Computing\", the Sixth Symposium on Operating System Design and Implementation San Francisco, California, pages 303--316, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/903893.903895"},{"key":"e_1_3_2_1_15_1","volume-title":"Fourth Workshop on Automated and Analysis-Driven Debugging","author":"Ronsse M.","year":"2000","unstructured":"M. Ronsse , K. De Bosschere , and J.C. de Kergommeaux , \"Execution replay and debugging \", Fourth Workshop on Automated and Analysis-Driven Debugging , Munich, Germany , August 2000 . M. Ronsse, K. De Bosschere, and J.C. de Kergommeaux, \"Execution replay and debugging\", Fourth Workshop on Automated and Analysis-Driven Debugging, Munich, Germany, August 2000."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101927"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085139"},{"key":"e_1_3_2_1_18_1","unstructured":"J. Seward etal \"Valgrind: A GPL'd system for debugging and profiling x86-linux programs\" http:\/\/valgrind.ked.org\/ 2004.  J. Seward et al. \"Valgrind: A GPL'd system for debugging and profiling x86-linux programs\" http:\/\/valgrind.ked.org\/ 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Annual Technical Conference","author":"Srinivasan S.M.","year":"1994","unstructured":"S.M. Srinivasan , S. Kandula , C.R. Andrews , and Y. Zhou , \" Flashback: a lightweight extension for rollback and deterministic replay for software debugging \", USENIX Annual Technical Conference , Boston, MA, USA , June 1994 . S.M. Srinivasan, S. Kandula, C.R. Andrews, and Y. Zhou, \"Flashback: a lightweight extension for rollback and deterministic replay for software debugging\", USENIX Annual Technical Conference, Boston, MA, USA, June 1994."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/68210.69221"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.37"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9007-3"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134002"},{"key":"e_1_3_2_1_26_1","unstructured":"GNU bc. http:\/\/www.gnu.org\/software\/bc  GNU bc. http:\/\/www.gnu.org\/software\/bc"},{"key":"e_1_3_2_1_27_1","unstructured":"Mutt Website. www.mutt.org  Mutt Website. www.mutt.org"},{"key":"e_1_3_2_1_28_1","unstructured":"Mutt Buffer Overflow. http:\/\/www.securiteam.com\/unixfocus\/5FP0T0U9FU.html  Mutt Buffer Overflow. http:\/\/www.securiteam.com\/unixfocus\/5FP0T0U9FU.html"},{"key":"e_1_3_2_1_29_1","unstructured":"Midnight Commander. www.ibiblio.org\/mc  Midnight Commander. www.ibiblio.org\/mc"},{"key":"e_1_3_2_1_30_1","unstructured":"Midnight Commander exploit. www.securityfocus.com\/bid\/8658  Midnight Commander exploit. www.securityfocus.com\/bid\/8658"},{"key":"e_1_3_2_1_31_1","unstructured":"Pine Website. www.washington.edu\/pine\/  Pine Website. www.washington.edu\/pine\/"},{"key":"e_1_3_2_1_32_1","unstructured":"Pine Stack Buffer Overflow Error. http:\/\/www.xatrix.org\/advisory.php?s=7408  Pine Stack Buffer Overflow Error. http:\/\/www.xatrix.org\/advisory.php?s=7408"},{"key":"e_1_3_2_1_33_1","unstructured":"Pine Heap Buffer Overflow Error. http:\/\/www.securityfocus.com\/bid\/6120  Pine Heap Buffer Overflow Error. http:\/\/www.securityfocus.com\/bid\/6120"},{"key":"e_1_3_2_1_34_1","unstructured":"Squid Website. http:\/\/www.squid-cache.org\/  Squid Website. http:\/\/www.squid-cache.org\/"},{"key":"e_1_3_2_1_35_1","unstructured":"Squid Buffer Overflow. http:\/\/www.securiteam.com\/unixfocus\/5BP0P2A6AY.html  Squid Buffer Overflow. http:\/\/www.securiteam.com\/unixfocus\/5BP0P2A6AY.html"}],"event":{"name":"SIGSOFT06\/FSE-14: SIGSOFT 2006 -14th International Symposium on the Foundations of Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Portland Oregon USA","acronym":"SIGSOFT06\/FSE-14"},"container-title":["Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1181775.1181786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T20:44:15Z","timestamp":1673383455000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1181775.1181786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11,5]]},"references-count":35,"alternative-id":["10.1145\/1181775.1181786","10.1145\/1181775"],"URL":"https:\/\/doi.org\/10.1145\/1181775.1181786","relation":{},"subject":[],"published":{"date-parts":[[2006,11,5]]},"assertion":[{"value":"2006-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}