{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T22:54:03Z","timestamp":1773096843714,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T00:00:00Z","timestamp":1433289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000138","name":"U.S. Department of Education","doi-asserted-by":"publisher","award":["p200a100053"],"award-info":[{"award-number":["p200a100053"]}],"id":[{"id":"10.13039\/100000138","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,3]]},"DOI":"10.1145\/2737924.2737979","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T11:35:56Z","timestamp":1433331356000},"page":"336-345","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":70,"title":["Defining the undefinedness of C"],"prefix":"10.1145","author":[{"given":"Chris","family":"Hathhorn","sequence":"first","affiliation":[{"name":"University of Missouri, USA"}]},{"given":"Chucky","family":"Ellison","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]},{"given":"Grigore","family":"Ro\u015fu","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-009-9148-3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35308-6_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2009.22"},{"key":"e_1_3_2_1_4_1","series-title":"Lecture Notes in Computer Science","first-page":"30","volume-title":"Programming Languages and Systems","author":"Cousot P.","unstructured":"P. Cousot , R. Cousot , J. Feret , L. Mauborgne , A. Min\u00e9 , D. Monniaux , and X. Rival . The ASTR\u00c9E analyzer . In Programming Languages and Systems , volume 3444 of Lecture Notes in Computer Science , pages 21\u2013 30 . Springer Berlin Heidelberg, 2005. URL http:\/\/dx.doi.org\/10. 1007\/978-3-540-31987-0_3. P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Min\u00e9, D. Monniaux, and X. Rival. The ASTR\u00c9E analyzer. In Programming Languages and Systems, volume 3444 of Lecture Notes in Computer Science, pages 21\u2013 30. Springer Berlin Heidelberg, 2005. URL http:\/\/dx.doi.org\/10. 1007\/978-3-540-31987-0_3."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103719"},{"key":"e_1_3_2_1_8_1","volume-title":"Defect report #260. Technical report","author":"ISO","year":"2004","unstructured":"ISO \/IEC JTC 1, SC 22, WG 14. Defect report #260. Technical report , 2004 . URL http:\/\/www.open-std.org\/jtc1\/sc22\/wg14\/www\/ docs\/dr_260.htm. ISO \/IEC JTC 1, SC 22, WG 14. Defect report #260. Technical report, 2004. URL http:\/\/www.open-std.org\/jtc1\/sc22\/wg14\/www\/ docs\/dr_260.htm."},{"key":"e_1_3_2_1_9_1","volume-title":"Intl. Org. for Standardization","author":"ISO","year":"2012","unstructured":"ISO \/IEC JTC 1, SC 22, WG 14. ISO\/IEC 9899:2011 : Programming languages\u2014C. Technical report , Intl. Org. for Standardization , 2012 . ISO \/IEC JTC 1, SC 22, WG 14. ISO\/IEC 9899:2011: Programming languages\u2014C. Technical report, Intl. Org. for Standardization, 2012."},{"key":"e_1_3_2_1_10_1","volume-title":"Intl. Org. for Standardization","author":"ISO","year":"2013","unstructured":"ISO \/IEC JTC 1, SC 22, WG 14. ISO\/IEC TS 17961:2013 C secure coding rules. Technical report , Intl. Org. for Standardization , 2013 . ISO \/IEC JTC 1, SC 22, WG 14. ISO\/IEC TS 17961:2013 C secure coding rules. Technical report, Intl. Org. for Standardization, 2013."},{"key":"e_1_3_2_1_11_1","first-page":"288","volume-title":"USENIX Annual Technical Conference (ATEC\u201902)","author":"Jim T.","unstructured":"T. Jim , J. G. Morrisett , D. Grossman , M. W. Hicks , J. Cheney , and Y. Wang . Cyclone: A safe dialect of C . In USENIX Annual Technical Conference (ATEC\u201902) , pages 275\u2013 288 . USENIX Association, 2002. URL http:\/\/dl.acm.org\/citation.cfm?id=647057.713871. T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX Annual Technical Conference (ATEC\u201902), pages 275\u2013288. USENIX Association, 2002. URL http:\/\/dl.acm.org\/citation.cfm?id=647057.713871."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03545-1_4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535878"},{"key":"e_1_3_2_1_14_1","volume-title":"What every C programmer should know about undefined behavior","author":"Lattner C.","year":"2011","unstructured":"C. Lattner . What every C programmer should know about undefined behavior , 2011 . URL http:\/\/blog.llvm.org\/2011\/05\/ what-every-c-programmer-should-know.html. C. Lattner. What every C programmer should know about undefined behavior, 2011. URL http:\/\/blog.llvm.org\/2011\/05\/ what-every-c-programmer-should-know.html."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538814"},{"key":"e_1_3_2_1_16_1","volume-title":"INRIA Paris-Rocquencourt","author":"Leroy X.","year":"2014","unstructured":"X. Leroy . The CompCert C verified compiler : Documentation and user\u2019s manual, version 2.3. Technical report , INRIA Paris-Rocquencourt , 2014 . X. Leroy. The CompCert C verified compiler: Documentation and user\u2019s manual, version 2.3. Technical report, INRIA Paris-Rocquencourt, 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(92)90182-F"},{"key":"e_1_3_2_1_18_1","volume-title":"MISRA-C: 2004\u2014Guidelines for the use of the C language in critical systems. Technical report","author":"MISRA.","year":"2004","unstructured":"MISRA. MISRA-C: 2004\u2014Guidelines for the use of the C language in critical systems. Technical report , MIRA Ltd ., 2004 . MISRA. MISRA-C: 2004\u2014Guidelines for the use of the C language in critical systems. Technical report, MIRA Ltd., 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"The common weakness enumeration (CWE) initiative","author":"MITRE.","year":"2012","unstructured":"MITRE. The common weakness enumeration (CWE) initiative , 2012 . URL http:\/\/cwe.mitre.org\/. MITRE. The common weakness enumeration (CWE) initiative, 2012. URL http:\/\/cwe.mitre.org\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Troubles with GCC signed integer overflow optimization","author":"Nagel T.","year":"2010","unstructured":"T. Nagel . Troubles with GCC signed integer overflow optimization , 2010 . URL http:\/\/thiemonagel.de\/2010\/01\/ signed-integer-overflow\/. T. Nagel. Troubles with GCC signed integer overflow optimization, 2010. URL http:\/\/thiemonagel.de\/2010\/01\/ signed-integer-overflow\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"e_1_3_2_1_22_1","unstructured":"503286.  503286."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_24_1","volume-title":"version 1.0","author":"NIST.","year":"2010","unstructured":"NIST. Juliet test suite for C \/C ++ , version 1.0 , 2010 . URL http: \/\/samate.nist.gov\/SRD\/testsuite.php. NIST. Juliet test suite for C \/C ++, version 1.0, 2010. URL http: \/\/samate.nist.gov\/SRD\/testsuite.php."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0920-5489(01)00059-9"},{"key":"e_1_3_2_1_27_1","volume-title":"A guide to undefined behavior in C and C ++","author":"Regehr J.","year":"2010","unstructured":"J. Regehr . A guide to undefined behavior in C and C ++ , 2010 . URL http:\/\/blog.regehr.org\/archives\/213. J. Regehr. A guide to undefined behavior in C and C ++, 2010. URL http:\/\/blog.regehr.org\/archives\/213."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2010.03.012"},{"key":"e_1_3_2_1_29_1","volume-title":"Springer","author":"Ros G.","year":"2009","unstructured":"G. Ros , u, W. Schulte , and T. F. S , erb \u0103nut , \u0103. Runtime verification of C memory safety. In Runtime Verification (RV\u201909), volume 5779, pages 132\u2013152 . Springer , 2009 . URL http:\/\/dx.doi.org\/10.1007\/ 978-3-642-04694-0_10. G. Ros, u, W. Schulte, and T. F. S, erb\u0103nut, \u0103. Runtime verification of C memory safety. In Runtime Verification (RV\u201909), volume 5779, pages 132\u2013152. Springer, 2009. URL http:\/\/dx.doi.org\/10.1007\/ 978-3-642-04694-0_10."},{"key":"e_1_3_2_1_30_1","volume-title":"The CERT C Coding Standard","author":"Seacord R. C.","year":"2014","unstructured":"R. C. Seacord . The CERT C Coding Standard , Second Edition: 98 Rules for Developing Safe, Reliable , and Secure Systems . 2014 . R. C. Seacord. The CERT C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems. 2014."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"e_1_3_2_1_32_1","unstructured":"Introduction Undefined Behavior A Semantics for Catching Undefinedness Expressions Type Modifiers The Translation Phase Memory Model Pointer Provenance Evaluation Future Work and Conclusion  Introduction Undefined Behavior A Semantics for Catching Undefinedness Expressions Type Modifiers The Translation Phase Memory Model Pointer Provenance Evaluation Future Work and Conclusion"}],"event":{"name":"PLDI '15: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Portland OR USA","acronym":"PLDI '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2737924.2737979","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2737924.2737979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:12:23Z","timestamp":1750212743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2737924.2737979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,3]]},"references-count":29,"alternative-id":["10.1145\/2737924.2737979","10.1145\/2737924"],"URL":"https:\/\/doi.org\/10.1145\/2737924.2737979","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2813885.2737979","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,6,3]]},"assertion":[{"value":"2015-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}