{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T10:38:02Z","timestamp":1772620682898,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,4]],"date-time":"2011-06-04T00:00:00Z","timestamp":1307145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,4]]},"DOI":"10.1145\/1993498.1993544","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T07:53:52Z","timestamp":1307346832000},"page":"389-400","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":142,"title":["Automated atomicity-violation fixing"],"prefix":"10.1145","author":[{"given":"Guoliang","family":"Jin","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Linhai","family":"Song","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Shan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]},{"given":"Ben","family":"Liblit","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"OSDI","author":"Aviram A.","year":"2010","unstructured":"A. Aviram , S.-C. Weng , S. Hu , and B. Ford . Efficient system-enforced deterministic parallelism . In OSDI , 2010 . A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Efficient system-enforced deterministic parallelism. In OSDI, 2010."},{"key":"e_1_3_2_1_2_1","volume-title":"OSDI","author":"Bergan T.","year":"2010","unstructured":"T. Bergan , N. Hunt , L. Ceze , and S. D. Gribble . Deterministic process groups in dOS . In OSDI , 2010 . T. Bergan, N. Hunt, L. Ceze, and S. D. Gribble. Deterministic process groups in dOS. In OSDI, 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806626"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755945"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"e_1_3_2_1_7_1","volume-title":"In Proceedings of the National Information Systems Security Conference (NISSC)","author":"Cowan C.","year":"2000","unstructured":"C. Cowan , H. Hinton , C. Pu , and J. Walpole . The cracker patch choice: An analysis of post hoc security techniques . In In Proceedings of the National Information Systems Security Conference (NISSC) , 2000 . C. Cowan, H. Hinton, C. Pu, and J. Walpole. The cracker patch choice: An analysis of post hoc security techniques. In In Proceedings of the National Information Systems Security Conference (NISSC), 2000."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11957-6_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964023"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735248"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869481"},{"key":"e_1_3_2_1_13_1","volume-title":"OSDI","author":"Jula H.","year":"2008","unstructured":"H. Jula , D. Tralamazza , C. Zamfir , and G. Candea . Deadlock immunity: Enabling systems to defend against deadlocks . In OSDI , 2008 . H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. Deadlock immunity: Enabling systems to defend against deadlocks. In OSDI, 2008."},{"key":"e_1_3_2_1_14_1","volume-title":"Sept.","author":"Kandrot E.","year":"2000","unstructured":"E. Kandrot and B. Eich . Our JavaScript is 3x slower than IE's , Sept. 2000 . URL https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=54743. E. Kandrot and B. Eich. Our JavaScript is 3x slower than IE's, Sept. 2000. URL https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=54743."},{"key":"e_1_3_2_1_15_1","unstructured":"B. Krebs. A time to patch II: Mozilla. The Washington Post Security Fix blog http:\/\/voices.washingtonpost.com\/securityfix\/2006\/02\/a_time_to_patch_ii_mozilla.html.  B. Krebs. A time to patch II: Mozilla. The Washington Post Security Fix blog http:\/\/voices.washingtonpost.com\/securityfix\/2006\/02\/a_time_to_patch_ii_mozilla.html."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273647.1273658"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390841.1390848"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168864"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2009.1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111068"},{"key":"e_1_3_2_1_24_1","volume-title":"Feb.","year":"2005","unstructured":"Microsoft. Revamping the microsoft security bulletin release process , Feb. 2005 . URL http:\/\/www.microsoft.com\/technet\/security\/bulletin\/revsbwp.mspx. Microsoft. Revamping the microsoft security bulletin release process, Feb. 2005. URL http:\/\/www.microsoft.com\/technet\/security\/bulletin\/revsbwp.mspx."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806838"},{"key":"e_1_3_2_1_27_1","volume-title":"Washington Post","author":"Pegoraro R.","year":"2008","unstructured":"R. Pegoraro . Apple updates Leopard--again . Washington Post , Feb. 2008 . R. Pegoraro. Apple updates Leopard--again. Washington Post, Feb. 2008."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_29_1","volume-title":"SecurityFocus","author":"Poulsen K.","year":"2004","unstructured":"K. Poulsen . Software bug contributed to blackout . SecurityFocus , Feb. 2004 . URL http:\/\/www.securityfocus.com\/news\/8016. K. Poulsen. Software bug contributed to blackout. SecurityFocus, Feb. 2004. URL http:\/\/www.securityfocus.com\/news\/8016."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1504176.1504202"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX Security Conference","author":"Rescorla E.","year":"2003","unstructured":"E. Rescorla . Security holes ... who cares? In USENIX Security Conference , 2003 . E. Rescorla. Security holes ... who cares? In USENIX Security Conference, 2003."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_33_1","volume-title":"HotDep","author":"Sidiroglou S.","year":"2007","unstructured":"S. Sidiroglou , S. Ioannidis , and A. D. Keromytis . Band-aid patching . In HotDep , 2007 . S. Sidiroglou, S. Ioannidis, and A. D. Keromytis. Band-aid patching. In HotDep, 2007."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375599"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390649"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869513"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111067"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706338"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736039"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924953"},{"key":"e_1_3_2_1_41_1","volume-title":"OSDI","author":"Xiong W.","year":"2010","unstructured":"W. Xiong , S. Park , J. Zhang , Y. Zhou , and Z. Ma . Ad hoc synchronization considered harmful . In OSDI , 2010 . W. Xiong, S. Park, J. Zhang, Y. Zhou, and Z. Ma. Ad hoc synchronization considered harmful. In OSDI, 2010."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"}],"event":{"name":"PLDI '11: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"San Jose California USA","acronym":"PLDI '11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1993498.1993544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:05:46Z","timestamp":1750230346000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1993498.1993544"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,4]]},"references-count":42,"alternative-id":["10.1145\/1993498.1993544","10.1145\/1993498"],"URL":"https:\/\/doi.org\/10.1145\/1993498.1993544","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1993316.1993544","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,6,4]]},"assertion":[{"value":"2011-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}