{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:47:07Z","timestamp":1771703227725,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,7,9]],"date-time":"2007-07-09T00:00:00Z","timestamp":1183939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,7,9]]},"DOI":"10.1145\/1273463.1273486","type":"proceedings-article","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T02:57:04Z","timestamp":1270609024000},"page":"163-173","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Finding what's not there"],"prefix":"10.1145","author":[{"given":"Ray-Yaung","family":"Chang","sequence":"first","affiliation":[{"name":"Case Western Reserve University"}]},{"given":"Andy","family":"Podgurski","sequence":"additional","affiliation":[{"name":"Case Western Reserve University"}]},{"given":"Jiong","family":"Yang","sequence":"additional","affiliation":[{"name":"Case Western Reserve University"}]}],"member":"320","published-online":{"date-parts":[[2007,7,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache.org. Apache HTTP Server Project. www.apache.org.  Apache.org. Apache HTTP Server Project. www.apache.org."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/567446.567468"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/645484.656386"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/586094.586097"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39724-3_11"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1207450"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_8_1","unstructured":"Engler D. Meta-level compilation. metacomp.stanford.edu.  Engler D. Meta-level compilation. metacomp.stanford.edu."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.382.0258"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188895.1188910"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_12_1","unstructured":"Festa P. Study says buffer overflow is most common security bug. C|Net News.com. news.com.com\/2100-1001-233483.html.  Festa P. Study says buffer overflow is most common security bug. C|Net News.com. news.com.com\/2100-1001-233483.html."},{"key":"e_1_3_2_1_13_1","volume-title":"Freeman","author":"Garey M. R.","year":"1979"},{"key":"e_1_3_2_1_14_1","unstructured":"Grammatech. CodeSurfer. www.grammatech.com\/products\/codesurfer\/overview.html.  Grammatech. CodeSurfer. www.grammatech.com\/products\/codesurfer\/overview.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Grammatech. Dependence graphs and program slicing. www.grammatech.com\/research\/slicing\/slicingWhitepaper  Grammatech. Dependence graphs and program slicing. www.grammatech.com\/research\/slicing\/slicingWhitepaper"},{"key":"e_1_3_2_1_16_1","volume-title":"AAAI Workshop on Knowledge Discovery in Databases","author":"Holder L. B.","year":"1994"},{"key":"e_1_3_2_1_17_1","volume-title":"Microsoft Press","author":"Howard M.","year":"2003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233816"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/951949.952101"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014123"},{"key":"e_1_3_2_1_21_1","unstructured":"IBM. Orthogonal defect classification. Center for Software Eng. www.research.ibm.com\/softeng\/ODC\/ODC.HTM.  IBM. Orthogonal defect classification. Center for Software Eng. www.research.ibm.com\/softeng\/ODC\/ODC.HTM."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/832308.837142"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.28"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150522"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081754"},{"key":"e_1_3_2_1_29_1","volume-title":"McGraw Hill","author":"McClure S.","year":"2005"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/359588.359602"},{"key":"e_1_3_2_1_31_1","volume-title":"Wiley","author":"Meyers G. J.","year":"1979"},{"key":"e_1_3_2_1_32_1","unstructured":"Mozilla.org. Bugzilla. https:\/\/bugzilla.mozilla.org\/.  Mozilla.org. Bugzilla. https:\/\/bugzilla.mozilla.org\/."},{"key":"e_1_3_2_1_33_1","unstructured":"NIST. National Vulnerability Database. http:\/\/nvd.nist.gov\/.  NIST. National Vulnerability Database. http:\/\/nvd.nist.gov\/."},{"key":"e_1_3_2_1_34_1","volume-title":"Dex: A Semantic-Graph Differencing Tool for Studying Changes in Large Code Bases. 20th IEEE Intl. Conf. on Software Maintenance (Sept.","author":"Raghavan S.","year":"2004"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231892"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0095-8956(83)90079-5"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/645536.657183"},{"key":"e_1_3_2_1_39_1","volume-title":"TRW","author":"Thayer T. A.","year":"1976"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.102"},{"key":"e_1_3_2_1_41_1","volume-title":"1st Intl. Workshop on Code Based Software Security Assessments","author":"Wilander J.","year":"2005"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.63"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/222124.222148"},{"key":"e_1_3_2_1_44_1","volume-title":"IEEE Intl. Conf. on Data Mining, Maebashi City, Japan (2002)","author":"Yan X."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Zhang S. Yang J. and Cheedella V. Monkey: Approximate Graph Mining Based on Spanning Trees to appear in ICDE April 2007 Istanbul Turkey.  Zhang S. Yang J. and Cheedella V. Monkey: Approximate Graph Mining Based on Spanning Trees to appear in ICDE April 2007 Istanbul Turkey.","DOI":"10.1109\/ICDE.2007.368984"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"}],"event":{"name":"ISSTA07: International Symposium on Software Testing and Analysis","location":"London United Kingdom","acronym":"ISSTA07","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2007 international symposium on Software testing and analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1273463.1273486","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1273463.1273486","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:52Z","timestamp":1750258072000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1273463.1273486"}},"subtitle":["a new approach to revealing neglected conditions in software"],"short-title":[],"issued":{"date-parts":[[2007,7,9]]},"references-count":44,"alternative-id":["10.1145\/1273463.1273486","10.1145\/1273463"],"URL":"https:\/\/doi.org\/10.1145\/1273463.1273486","relation":{},"subject":[],"published":{"date-parts":[[2007,7,9]]},"assertion":[{"value":"2007-07-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}