{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:48:21Z","timestamp":1763466501475,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,20]],"date-time":"2013-06-20T00:00:00Z","timestamp":1371686400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,20]]},"DOI":"10.1145\/2487568.2487574","type":"proceedings-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T13:40:50Z","timestamp":1375191650000},"page":"13-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["DUA-forensics"],"prefix":"10.1145","author":[{"given":"Raul","family":"Santelices","sequence":"first","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Yiji","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Haipeng","family":"Cai","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]},{"given":"Siyuan","family":"Jiang","sequence":"additional","affiliation":[{"name":"University of Notre Dame"}]}],"member":"320","published-online":{"date-parts":[[2013,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_1_2_1","unstructured":"A. V. Aho M. Lam R. Sethi and J. D. Ullman. Compilers: Principles Techniques and Tools (2nd Ed.). Sept. 2006.   A. V. Aho M. Lam R. Sethi and J. D. Ullman. Compilers: Principles Techniques and Tools (2nd Ed.) . Sept. 2006."},{"key":"e_1_3_2_1_3_1","unstructured":"L. O. Andersen. Program analysis and specialization for the C programming language. Ph.D. Thesis DIKU U. of Copenhagen May 1994.  L. O. Andersen. Program analysis and specialization for the C programming language. Ph.D. Thesis DIKU U. of Copenhagen May 1994."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Santuario project. Apache XML Security for Java. Apache Software Foundation. http:\/\/santuario.apache.org\/.  Apache Santuario project. Apache XML Security for Java. Apache Software Foundation. http:\/\/santuario.apache.org\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2006.18"},{"key":"e_1_3_2_1_6_1","unstructured":"Aristotle Research Group. JABA: Java Architecture for Bytecode Analysis. Georgia Institute of Technology. http:\/\/pleuma.cc.gatech.edu\/aristotle\/Tools\/jaba.html.  Aristotle Research Group. JABA: Java Architecture for Bytecode Analysis. Georgia Institute of Technology. http:\/\/pleuma.cc.gatech.edu\/aristotle\/Tools\/jaba.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/183432.183527"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-60247-4_25"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/646153.679523"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"e_1_3_2_1_14_1","first-page":"191","volume-title":"Proc. of Int'l Conf. on Softw. Eng.","author":"Hutchins M.","year":"1994"},{"key":"e_1_3_2_1_15_1","unstructured":"IBM T. J. Watson Research Center. T. J. Watson Libraries for Analysis (WALA). IBM. http:\/\/wala.sourceforge.net.  IBM T. J. Watson Research Center. T. J. Watson Libraries for Analysis (WALA). IBM. http:\/\/wala.sourceforge.net."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31984-9_20"},{"volume-title":"Cetus Users and Compiler Infrastructure Workshop","year":"2011","author":"Lam P.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11688839_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062496"},{"volume-title":"Tutorial at ACM Conference on Programming Language Design and Implementation","year":"2011","author":"Naik M.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58784"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321682"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831733"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.46"},{"volume-title":"Verification and Reliability","year":"2013","author":"Santelices R.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.32"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070508"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.29"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486981"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117696.1117706"},{"key":"e_1_3_2_1_32_1","first-page":"13","volume-title":"Proc. of Conference of the Centre for Advanced Studies on Collaborative Research","author":"Vall\u00e9e-Rai R.","year":"1999"},{"key":"e_1_3_2_1_33_1","first-page":"978","article-title":"Probability and Statistics for Engineers and Scientists (9th Edition)","author":"Walpole R. E.","year":"2011","journal-title":"Prentice Hall"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2012.43"}],"event":{"name":"PLDI '13: ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Seattle Washington","acronym":"PLDI '13"},"container-title":["Proceedings of the 2nd ACM SIGPLAN International Workshop on State Of the Art in Java Program analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487568.2487574","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2487568.2487574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:55Z","timestamp":1750235755000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2487568.2487574"}},"subtitle":["a fine-grained dependence analysis and instrumentation framework based on Soot"],"short-title":[],"issued":{"date-parts":[[2013,6,20]]},"references-count":33,"alternative-id":["10.1145\/2487568.2487574","10.1145\/2487568"],"URL":"https:\/\/doi.org\/10.1145\/2487568.2487574","relation":{},"subject":[],"published":{"date-parts":[[2013,6,20]]},"assertion":[{"value":"2013-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}