{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:19Z","timestamp":1772164039050,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T00:00:00Z","timestamp":1433289600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8650-11-C-7192"],"award-info":[{"award-number":["FA8650-11-C-7192"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,3]]},"DOI":"10.1145\/2737924.2737988","type":"proceedings-article","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T11:35:56Z","timestamp":1433331356000},"page":"43-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Automatic error elimination by horizontal code transfer across multiple applications"],"prefix":"10.1145","author":[{"given":"Stelios","family":"Sidiroglou-Douskos","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Eric","family":"Lahtinen","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Fan","family":"Long","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cwebp. https:\/\/developers.google.com\/speed\/webp\/ docs\/cwebp.  Cwebp. https:\/\/developers.google.com\/speed\/webp\/ docs\/cwebp."},{"key":"e_1_3_2_1_2_1","unstructured":"Dillo. http:\/\/www.dillo.org\/.  Dillo. http:\/\/www.dillo.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Feh - a fast and light Imlib2-based image viewer. http:\/\/feh. finalrewind.org\/.  Feh - a fast and light Imlib2-based image viewer. http:\/\/feh. finalrewind.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Hachoir. http:\/\/bitbucket.org\/haypo\/hachoir\/wiki\/ Home.  Hachoir. http:\/\/bitbucket.org\/haypo\/hachoir\/wiki\/ Home."},{"key":"e_1_3_2_1_5_1","unstructured":"Imagemagick. http:\/\/www.imagemagick.org\/script\/ index.php.  Imagemagick. http:\/\/www.imagemagick.org\/script\/ index.php."},{"key":"e_1_3_2_1_6_1","unstructured":"Peach fuzzing platform. http:\/\/peachfuzzer.com\/.  Peach fuzzing platform. http:\/\/peachfuzzer.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Swfdec. http:\/\/swfdec.freedesktop.org\/wiki\/.  Swfdec. http:\/\/swfdec.freedesktop.org\/wiki\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Viewnoir - the elegant image viewer. http:\/\/xsisqox.github. io\/Viewnior\/.  Viewnoir - the elegant image viewer. http:\/\/xsisqox.github. io\/Viewnior\/."},{"key":"e_1_3_2_1_9_1","unstructured":"Libtiff. http:\/\/www.remotesensing.org\/libtiff\/.  Libtiff. http:\/\/www.remotesensing.org\/libtiff\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Gnu gnash. https:\/\/www.gnu.org\/software\/gnash\/.  Gnu gnash. https:\/\/www.gnu.org\/software\/gnash\/."},{"key":"e_1_3_2_1_11_1","unstructured":"The jasper project home page. http:\/\/www.ece.uvic.ca\/ ~frodo\/jasper\/.  The jasper project home page. http:\/\/www.ece.uvic.ca\/ ~frodo\/jasper\/."},{"key":"e_1_3_2_1_12_1","unstructured":"mtpaint. http:\/\/mtpaint.sourceforge.net\/.  mtpaint. http:\/\/mtpaint.sourceforge.net\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Openjpeg. http:\/\/www.openjpeg.org.  Openjpeg. http:\/\/www.openjpeg.org."},{"key":"e_1_3_2_1_14_1","unstructured":"Wireshark. https:\/\/www.wireshark.org\/.  Wireshark. https:\/\/www.wireshark.org\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610401"},{"key":"e_1_3_2_1_16_1","volume-title":"Scientific Reports","author":"Ambrose K.","year":"2014","unstructured":"K. Ambrose , A. Koppenhofer , and F. Belanger . Horizontal gene transfer of a bacterial insect toxin gene into the epichloe fungal symbionts of grasses . Scientific Reports , 4, July 2014 . K. Ambrose, A. Koppenhofer, and F. Belanger. Horizontal gene transfer of a bacterial insect toxin gene into the epichloe fungal symbionts of grasses. Scientific Reports, 4, July 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-60327-853-9_23"},{"key":"e_1_3_2_1_18_1","unstructured":". URL http:\/\/dx.doi.org\/10.1007\/ 978-1-60327-853-9_23.  . URL http:\/\/dx.doi.org\/10.1007\/ 978-1-60327-853-9_23."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032497.2032537"},{"key":"e_1_3_2_1_21_1","first-page":"791","volume-title":"Proceedings of the 2013 International Conference on Software Engineering","author":"Carzaniga A.","unstructured":"A. Carzaniga , A. Gorla , A. Mattavelli , N. Perino , and M. Pezz\u00e8 . Automatic recovery from runtime failures . In Proceedings of the 2013 International Conference on Software Engineering , pages 782\u2013 791 . A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezz\u00e8. Automatic recovery from runtime failures. In Proceedings of the 2013 International Conference on Software Engineering, pages 782\u2013791."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCSH.1995.532621"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294283"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254099"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869475"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287634"},{"key":"e_1_3_2_1_28_1","first-page":"236","volume-title":"OSDI","volume":"12","author":"Jin G.","year":"2012","unstructured":"G. Jin , W. Zhang , D. Deng , B. Liblit , and S. Lu . Automated concurrencybug fixing . In OSDI , volume 12 , pages 221\u2013 236 , 2012 . G. Jin, W. Zhang, D. Deng, B. Liblit, and S. Lu. Automated concurrencybug fixing. In OSDI, volume 12, pages 221\u2013236, 2012."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1038\/83324"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrg2386"},{"key":"e_1_3_2_1_31_1","volume-title":"CASCON","author":"Khmelevsky Y.","year":"2013","unstructured":"Y. Khmelevsky , M. Rinard , and S. Sidiroglou . A source-to-source transformation tool for error fixing . CASCON , 2013 . Y. Khmelevsky, M. Rinard, and S. Sidiroglou. A source-to-source transformation tool for error fixing. CASCON, 2013."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384648"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312924"},{"key":"e_1_3_2_1_34_1","first-page":"176","volume-title":"Proceedings of the 7th symposium on Operating systems design and implementation","author":"Kremenek T.","unstructured":"T. Kremenek , P. Twohey , G. Back , A. Ng , and D. Engler . From uncertainty to belief: Inferring the specification within . In Proceedings of the 7th symposium on Operating systems design and implementation , pages 161\u2013 176 . USENIX Association, 2006. T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: Inferring the specification within. In Proceedings of the 7th symposium on Operating systems design and implementation, pages 161\u2013176. USENIX Association, 2006."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_36_1","first-page":"302","volume-title":"6th Symposium on Operating System Design and Implementation (OSDI 2004","author":"Li Z.","year":"2004","unstructured":"Z. Li , S. Lu , S. Myagmar , and Y. Zhou . Cp-miner: A tool for finding copy-paste and related bugs in operating system code . In 6th Symposium on Operating System Design and Implementation (OSDI 2004 ), San Francisco, California, USA , December 6-8, 2004 , pages 289\u2013 302 , 2004. Z. Li, S. Lu, S. Myagmar, and Y. Zhou. Cp-miner: A tool for finding copy-paste and related bugs in operating system code. In 6th Symposium on Operating System Design and Implementation (OSDI 2004), San Francisco, California, USA, December 6-8, 2004, pages 289\u2013302, 2004."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384626"},{"key":"e_1_3_2_1_38_1","unstructured":"2384626.  2384626."},{"key":"e_1_3_2_1_40_1","volume-title":"Automatic input rectification. ICSE \u201912","author":"Long F.","year":"2012","unstructured":"F. Long , V. Ganesh , M. Carbin , S. Sidiroglou , and M. Rinard . Automatic input rectification. ICSE \u201912 , 2012 . F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. Automatic input rectification. ICSE \u201912, 2012."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535888"},{"key":"e_1_3_2_1_42_1","first-page":"4503","volume":"978","author":"ACM","unstructured":"ACM . ISBN 978-1 - 4503 - 2544 -8.. URL http:\/\/doi.acm.org\/ 10.1145\/2535838.2535888. ACM. ISBN 978-1-4503-2544-8.. URL http:\/\/doi.acm.org\/ 10.1145\/2535838.2535888.","journal-title":"ISBN"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594337"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025185"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486855"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465787.2465790"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542431.1542439"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250736"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1275517.1275519"},{"key":"e_1_3_2_1_54_1","first-page":"316","volume-title":"OSDI","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and W. S. Beebee . Enhancing server availability and security through failure-oblivious computing . In OSDI , pages 303\u2013 316 , 2004 . M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303\u2013316, 2004."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337257"},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of the general track, 2005 USENIX annual technical conference","author":"Sidiroglou S.","year":"2005","unstructured":"S. Sidiroglou , M. E. Locasto , S. W. Boyd , and A. D. Keromytis . Building a reactive immune system for software services . In Proceedings of the general track, 2005 USENIX annual technical conference : April 10-15, 2005 , Anaheim, CA, USA, pages 149\u2013161. USENIX , 2005. S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In Proceedings of the general track, 2005 USENIX annual technical conference: April 10-15, 2005, Anaheim, CA, USA, pages 149\u2013161. USENIX, 2005."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694389"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048146"},{"key":"e_1_3_2_1_63_1","volume-title":"NDSS","author":"Son S.","year":"2013","unstructured":"S. Son , K. S. McKinley , and V. Shmatikov . Fix me up: Repairing accesscontrol bugs in web applications . In NDSS , 2013 . S. Son, K. S. McKinley, and V. Shmatikov. Fix me up: Repairing accesscontrol bugs in web applications. In NDSS, 2013."},{"key":"e_1_3_2_1_64_1","volume-title":"Pearson Education","author":"Sutton M.","year":"2007","unstructured":"M. Sutton , A. Greene , and P. Amini . Fuzzing: Brute Force Vulnerability Discovery . Pearson Education , 2007 . M. Sutton, A. Greene, and P. Amini. Fuzzing: Brute Force Vulnerability Discovery. Pearson Education, 2007."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.35"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"}],"event":{"name":"PLDI '15: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Portland OR USA","acronym":"PLDI '15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2737924.2737988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2737924.2737988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:12:23Z","timestamp":1750212743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2737924.2737988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6,3]]},"references-count":61,"alternative-id":["10.1145\/2737924.2737988","10.1145\/2737924"],"URL":"https:\/\/doi.org\/10.1145\/2737924.2737988","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2813885.2737988","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,6,3]]},"assertion":[{"value":"2015-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}