{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:20:08Z","timestamp":1759033208712,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T00:00:00Z","timestamp":1415664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,11]]},"DOI":"10.1145\/2635868.2635928","type":"proceedings-article","created":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T21:44:36Z","timestamp":1415137476000},"page":"518-529","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Building call graphs for embedded client-side code in dynamic web applications"],"prefix":"10.1145","author":[{"given":"Hung Viet","family":"Nguyen","sequence":"first","affiliation":[{"name":"Iowa State University, USA"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Tien N.","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Iowa State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Building call graphs for embedded client-side code in dynamic web applications. http:\/\/home.engineering.iastate.edu\/~hungnv\/ Research\/Varis\/?page=video_demo.  Building call graphs for embedded client-side code in dynamic web applications. http:\/\/home.engineering.iastate.edu\/~hungnv\/ Research\/Varis\/?page=video_demo."},{"key":"e_1_3_2_1_2_1","unstructured":"CSS selectors. http:\/\/www.w3.org\/TR\/CSS21\/selector.html.  CSS selectors. http:\/\/www.w3.org\/TR\/CSS21\/selector.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Detection of embedded code smells in dynamic web applications. http:\/\/home.engineering.iastate. edu\/~hungnv\/Research\/WebScent\/.  Detection of embedded code smells in dynamic web applications. http:\/\/home.engineering.iastate. edu\/~hungnv\/Research\/WebScent\/."},{"key":"e_1_3_2_1_4_1","unstructured":"ECMAScript language specification - ECMA-262 edition 5.1. http: \/\/www.ecma-international.org\/ecma-262\/5.1\/.  ECMAScript language specification - ECMA-262 edition 5.1. http: \/\/www.ecma-international.org\/ecma-262\/5.1\/."},{"key":"e_1_3_2_1_5_1","unstructured":"WALA tools in JavaScript. http:\/\/wala.sourceforge.net\/wiki\/index.php\/ Main_Page#WALA_Tools_in_JavaScript.  WALA tools in JavaScript. http:\/\/wala.sourceforge.net\/wiki\/index.php\/ Main_Page#WALA_Tools_in_JavaScript."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2541773"},{"key":"e_1_3_2_1_7_1","first-page":"491","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Apel S.","unstructured":"S. Apel , A. von Rhein , P. Wendler , A. Gr\u00f6\u00dflinger , and D. Beyer . Strategies for product-line verification: Case studies and experiments . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 482\u2013 491 . IEEE Computer Society, 2013. S. Apel, A. von Rhein, P. Wendler, A. Gr\u00f6\u00dflinger, and D. Beyer. Strategies for product-line verification: Case studies and experiments. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 482\u2013491. IEEE Computer Society, 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806840"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.31"},{"key":"e_1_3_2_1_10_1","first-page":"92","volume-title":"Proc. Int\u2019l Workshop Source Code Analysis and Manipulation (SCAM)","author":"Aversano L.","unstructured":"L. Aversano , M. D. Penta , and I. D. Baxter . Handling preprocessor-conditioned declarations . In Proc. Int\u2019l Workshop Source Code Analysis and Manipulation (SCAM) , pages 83\u2013 92 . IEEE CS, 2002. L. Aversano, M. D. Penta, and I. D. Baxter. Handling preprocessor-conditioned declarations. In Proc. Int\u2019l Workshop Source Code Analysis and Manipulation (SCAM), pages 83\u201392. IEEE CS, 2002."},{"key":"e_1_3_2_1_11_1","first-page":"290","volume-title":"Proc. Working Conf. Reverse Engineering (WCRE)","author":"Baxter I.","unstructured":"I. Baxter and M. Mehlich . Preprocessor conditional removal by simple partial evaluation . In Proc. Working Conf. Reverse Engineering (WCRE) , pages 281\u2013 290 . IEEE Computer Society, 2001. I. Baxter and M. Mehlich. Preprocessor conditional removal by simple partial evaluation. In Proc. Working Conf. Reverse Engineering (WCRE), pages 281\u2013290. IEEE Computer Society, 2001."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2491976"},{"key":"e_1_3_2_1_13_1","first-page":"131","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Bounimova E.","unstructured":"E. Bounimova , P. Godefroid , and D. Molnar . Billions and billions of constraints: Whitebox fuzz testing in production . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 122\u2013 131 . IEEE Computer Society, 2013. E. Bounimova, P. Godefroid, and D. Molnar. Billions and billions of constraints: Whitebox fuzz testing in production. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 122\u2013131. IEEE Computer Society, 2013."},{"key":"e_1_3_2_1_14_1","first-page":"224","volume-title":"Proc. USENIX Conf. Operating Systems Design and Implementation (OSDI)","author":"Cadar C.","unstructured":"C. Cadar , D. Dunbar , and D. Engler . Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proc. USENIX Conf. Operating Systems Design and Implementation (OSDI) , pages 209\u2013 224 . USENIX Association, 2008. C. Cadar, D. Dunbar, and D. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proc. USENIX Conf. Operating Systems Design and Implementation (OSDI), pages 209\u2013224. USENIX Association, 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926397"},{"key":"e_1_3_2_1_16_1","volume-title":"Generative Programming: Methods, Tools, and Applications","author":"Czarnecki K.","year":"2000","unstructured":"K. Czarnecki and U. Eisenecker . Generative Programming: Methods, Tools, and Applications . ACM Press \/ Addison-Wesley , 2000 . K. Czarnecki and U. Eisenecker. Generative Programming: Methods, Tools, and Applications. ACM Press \/ Addison-Wesley, 2000."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2400676.2400678"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048099"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063239.2063245"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048078"},{"key":"e_1_3_2_1_21_1","first-page":"761","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Feldthaus A.","unstructured":"A. Feldthaus , M. Sch\u00e4fer , M. Sridharan , J. Dolby , and F. Tip . Efficient construction of approximate call graphs for JavaScript IDE services . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 752\u2013 761 . IEEE Press, 2013. A. Feldthaus, M. Sch\u00e4fer, M. Sridharan, J. Dolby, and F. Tip. Efficient construction of approximate call graphs for JavaScript IDE services. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 752\u2013761. IEEE Press, 2013."},{"key":"e_1_3_2_1_22_1","unstructured":"M. Fowler. Domain-Specific Languages. Pearson Education 2010.   M. Fowler. Domain-Specific Languages. Pearson Education 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254103"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1890028.1890029"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11561347_21"},{"key":"e_1_3_2_1_28_1","first-page":"142","volume-title":"Proc. Int\u2019l Conf. Software Reuse (ICSR)","author":"Hudak P.","unstructured":"P. Hudak . Modular domain specific languages and tools . In Proc. Int\u2019l Conf. Software Reuse (ICSR) , pages 134\u2013 142 . IEEE Computer Society, 1998. P. Hudak. Modular domain specific languages and tools. In Proc. Int\u2019l Conf. Software Reuse (ICSR), pages 134\u2013142. IEEE Computer Society, 1998."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025125"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03237-0_17"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/512644.512652"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2211616.2211617"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048128"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869497"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070521"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491437"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491417"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/367177.367199"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060809"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693098"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100047"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/130665"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00722-4_9"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.45"},{"key":"e_1_3_2_1_46_1","first-page":"287","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Samimi H.","unstructured":"H. Samimi , M. Sch\u00e4fer , S. Artzi , T. Millstein , F. Tip , and L. Hendren . Automated repair of HTML generation errors in PHP applications using string constraint solving . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 277\u2013 287 . IEEE Press, 2012. H. Samimi, M. Sch\u00e4fer, S. Artzi, T. Millstein, F. Tip, and L. Hendren. Automated repair of HTML generation errors in PHP applications using string constraint solving. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 277\u2013287. IEEE Press, 2012."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491447"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/258993.259019"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580950"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371401.2371404"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882306"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393614"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368112"},{"key":"e_1_3_2_1_55_1","volume-title":"Proc. of the 15th Conf. on USENIX Security Symp. (USENIX-SS). USENIX Association","author":"Xie Y.","year":"2006","unstructured":"Y. Xie and A. Aiken . Static detection of security vulnerabilities in scripting languages . In Proc. of the 15th Conf. on USENIX Security Symp. (USENIX-SS). USENIX Association , 2006 . Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In Proc. of the 15th Conf. on USENIX Security Symp. (USENIX-SS). USENIX Association, 2006."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985828"}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14"},"container-title":["Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2635868.2635928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:11:57Z","timestamp":1750227117000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635928"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,11]]},"references-count":56,"alternative-id":["10.1145\/2635868.2635928","10.1145\/2635868"],"URL":"https:\/\/doi.org\/10.1145\/2635868.2635928","relation":{},"subject":[],"published":{"date-parts":[[2014,11,11]]},"assertion":[{"value":"2014-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}