{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:48:00Z","timestamp":1772164080234,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["FA8750-12-9-0169"],"award-info":[{"award-number":["FA8750-12-9-0169"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2804302.2804318","type":"proceedings-article","created":{"date-parts":[[2015,8,24]],"date-time":"2015-08-24T10:09:20Z","timestamp":1440410960000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Guilt free ivory"],"prefix":"10.1145","author":[{"given":"Trevor","family":"Elliott","sequence":"first","affiliation":[{"name":"Galois, USA"}]},{"given":"Lee","family":"Pike","sequence":"additional","affiliation":[{"name":"Galois, USA"}]},{"given":"Simon","family":"Winwood","sequence":"additional","affiliation":[{"name":"Galois, USA"}]},{"given":"Pat","family":"Hickey","sequence":"additional","affiliation":[{"name":"Galois, USA"}]},{"given":"James","family":"Bielman","sequence":"additional","affiliation":[{"name":"Galois, USA"}]},{"given":"Jamey","family":"Sharp","sequence":"additional","affiliation":[{"name":"Galois, USA"}]},{"given":"Eric","family":"Seidel","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"John","family":"Launchbury","sequence":"additional","affiliation":[{"name":"Willamette University, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Website http:\/\/hackage.haskell.org\/package\/ad. Retrieved","year":"2015","unstructured":"ad. Website http:\/\/hackage.haskell.org\/package\/ad. Retrieved Feb. 2015 . ad. Website http:\/\/hackage.haskell.org\/package\/ad. Retrieved Feb. 2015."},{"key":"e_1_3_2_1_2_1","volume-title":"Website http:\/\/hackage.haskell.org\/ package\/estimator. Retrieved","year":"2015","unstructured":"estimator. Website http:\/\/hackage.haskell.org\/ package\/estimator. Retrieved Feb. 2015 . estimator. Website http:\/\/hackage.haskell.org\/ package\/estimator. Retrieved Feb. 2015."},{"key":"e_1_3_2_1_3_1","volume-title":"Website http:\/\/hackage.haskell.org\/ package\/ghc-srcspan-plugin. Retrieved","year":"2015","unstructured":"ghc-srcspan-plugin. Website http:\/\/hackage.haskell.org\/ package\/ghc-srcspan-plugin. Retrieved Feb. 2015 . ghc-srcspan-plugin. Website http:\/\/hackage.haskell.org\/ package\/ghc-srcspan-plugin. Retrieved Feb. 2015."},{"key":"e_1_3_2_1_4_1","volume-title":"Website http:\/\/hackage.haskell.org\/package\/ linear. Retrieved","year":"2015","unstructured":"linear. Website http:\/\/hackage.haskell.org\/package\/ linear. Retrieved Feb. 2015 . linear. Website http:\/\/hackage.haskell.org\/package\/ linear. Retrieved Feb. 2015."},{"key":"e_1_3_2_1_5_1","volume-title":"An Approach","author":"Reasoning Computer-Aided","year":"2000","unstructured":"Computer-Aided Reasoning : An Approach . Kluwer Academic Publishers , 2000 . Computer-Aided Reasoning: An Approach. Kluwer Academic Publishers, 2000."},{"key":"e_1_3_2_1_6_1","volume-title":"February","year":"2015","unstructured":"Heartbleed. http:\/\/heartbleed.com\/ , February 2015 . Heartbleed. http:\/\/heartbleed.com\/, February 2015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2050135.2050143"},{"key":"e_1_3_2_1_8_1","volume-title":"High Integrity Software: The SPARK Approach to Safety and Security","author":"Barnes J.","year":"2003","unstructured":"J. Barnes . High Integrity Software: The SPARK Approach to Safety and Security . Addison-Wesley , 2003 . J. Barnes. High Integrity Software: The SPARK Approach to Safety and Security. Addison-Wesley, 2003."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032319"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security","author":"Checkoway S.","year":"2011","unstructured":"S. Checkoway , D. McCoy , B. Kantor , D. Anderson , H. Shacham , S. Savage , K. Koscher , A. Czeskis , F. Roesner , and T. Kohno . Comprehensive experimental analyses of automotive attack surfaces . In USENIX Security , 2011 . S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security, 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/357766.351266"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159842.1159851"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086365.1086387"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17524-9_34"},{"key":"e_1_3_2_1_15_1","volume-title":"Website","author":"Erkok L.","year":"2014","unstructured":"L. Erkok . SBV : SMT based verification in Haskell . Website , 2014 . http:\/\/leventerkok.github.io\/sbv\/. L. Erkok. SBV: SMT based verification in Haskell. Website, 2014. http:\/\/leventerkok.github.io\/sbv\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-012-9694-5"},{"key":"e_1_3_2_1_17_1","volume-title":"Presentation. Commercial Users of Functional Programming (CUFP), 2008","author":"Hawkins T.","year":"2008","unstructured":"T. Hawkins . Controlling hybrid vehicles with Haskell . Presentation. Commercial Users of Functional Programming (CUFP), 2008 . Available at http:\/\/cufp.galois.com\/ 2008 \/schedule.html. T. Hawkins. Controlling hybrid vehicles with Haskell. Presentation. Commercial Users of Functional Programming (CUFP), 2008. Available at http:\/\/cufp.galois.com\/2008\/schedule.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628136.2628146"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Conference","author":"Jim T.","year":"2002","unstructured":"T. Jim , J. G. Morrisett , D. Grossman , M. W. Hicks , J. Cheney , and Y. Wang . Cyclone: A safe dialect of C . In USENIX Conference , Berkeley, CA, USA , 2002 . USENIX. T. Jim, J. G. Morrisett, D. Grossman, M. W. Hicks, J. Cheney, and Y. Wang. Cyclone: A safe dialect of C. In USENIX Conference, Berkeley, CA, USA, 2002. USENIX."},{"key":"e_1_3_2_1_21_1","volume-title":"Computer-Aided Reasoning: An Approach","author":"Kaufmann M.","year":"2000","unstructured":"M. Kaufmann , P. Manolios , and J. S. Moore . Computer-Aided Reasoning: An Approach . Kluwer , 2000 . M. Kaufmann, P. Manolios, and J. S. Moore. Computer-Aided Reasoning: An Approach. Kluwer, 2000."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411286.1411288"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503778.2503791"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/773473.178246"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325708"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503778.2503786"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364394.2364397"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1291201.1291211"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663171.2663188"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45949-9"},{"key":"e_1_3_2_1_31_1","first-page":"345","volume":"6418","author":"Pike L.","year":"2010","unstructured":"L. Pike , A. Goodloe , R. Morisset , and S. Niller . Copilot: A hard realtime runtime monitor. In Runtime Verification (RV) , volume 6418 , pages 345 \u2013 359 . Springer, 2010 . L. Pike, A. Goodloe, R. Morisset, and S. Niller. Copilot: A hard realtime runtime monitor. In Runtime Verification (RV), volume 6418, pages 345\u2013359. Springer, 2010.","journal-title":"Copilot: A hard realtime runtime monitor. In Runtime Verification (RV)"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411204.1411215"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103786.2103795"}],"event":{"name":"ICFP'15: 20th ACM SIGPLAN International Conference on Functional Programming","location":"Vancouver BC Canada","acronym":"ICFP'15","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 2015 ACM SIGPLAN Symposium on Haskell"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2804302.2804318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2804302.2804318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:07:10Z","timestamp":1750208830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2804302.2804318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":32,"alternative-id":["10.1145\/2804302.2804318","10.1145\/2804302"],"URL":"https:\/\/doi.org\/10.1145\/2804302.2804318","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2887747.2804318","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}