{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:10:09Z","timestamp":1750223409241,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,19]],"date-time":"2016-04-19T00:00:00Z","timestamp":1461024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008227","name":"Achievement Rewards for College Scientists Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008227","id-type":"DOI","asserted-by":"publisher"}]},{"name":"BEX","award":["13713\/13-2"],"award-info":[{"award-number":["13713\/13-2"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,19]]},"DOI":"10.1145\/2898375.2898398","type":"proceedings-article","created":{"date-parts":[[2016,4,14]],"date-time":"2016-04-14T21:09:21Z","timestamp":1460668161000},"page":"93-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Visualizing the variational callgraph of the Linux kernel"],"prefix":"10.1145","author":[{"given":"Momin M.","family":"Malik","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"J\u00fcrgen","family":"Pfeffer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Gabriel","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2016,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746194.2746211"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1525822X06298589"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS 2013","author":"Kurmus A.","year":"2013","unstructured":"A. Kurmus , R. Tartler , D. Dorneanu , B. Heinloth , V. Rothberg , A. Ruprecht , W. Schr\u00f6der-Preikschat , D. Lohmann , and R. Kapitza . Attack surface metrics and automated compile-time OS kernel tailoring . In Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS 2013 , 2013 . A. Kurmus, R. Tartler, D. Dorneanu, B. Heinloth, V. Rothberg, A. Ruprecht, W. Schr\u00f6der-Preikschat, D. Lohmann, and R. Kapitza. Attack surface metrics and automated compile-time OS kernel tailoring. In Proceedings of the 20th Annual Network and Distributed System Security Symposium, NDSS 2013, 2013."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/VLHCC.2011.6070391","volume-title":"2011 IEEE Symposium on Visual Languages and Human-Centric Computing, VL\/HCC '11","author":"Le D.","year":"2011","unstructured":"D. Le , E. Walkingshaw , and M. Erwig . #ifdef confirmed harmful: Promoting understandable software variation . In 2011 IEEE Symposium on Visual Languages and Human-Centric Computing, VL\/HCC '11 , pages 143 -- 150 , 2011 . D. Le, E. Walkingshaw, and M. Erwig. #ifdef confirmed harmful: Promoting understandable software variation. In 2011 IEEE Symposium on Visual Languages and Human-Centric Computing, VL\/HCC '11, pages 143--150, 2011."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(96)00299-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2201\/NiiPi.2008.5.8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511803161","volume-title":"Models, Reasoning and Inference","author":"Pearl J.","year":"2009","unstructured":"J. Pearl . Causality : Models, Reasoning and Inference . Cambridge University Press , 2 nd edition, 2009 . J. Pearl. Causality: Models, Reasoning and Inference. Cambridge University Press, 2nd edition, 2009.","edition":"2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357101"},{"key":"e_1_3_2_1_10_1","volume-title":"Unified Modeling Language Reference Manual. Pearson Higher Education","author":"Rumbaugh J.","year":"2004","unstructured":"J. Rumbaugh , I. Jacobson , and G. Booch . Unified Modeling Language Reference Manual. Pearson Higher Education , 2 nd edition, 2004 . J. Rumbaugh, I. Jacobson, and G. Booch. Unified Modeling Language Reference Manual. Pearson Higher Education, 2nd edition, 2004.","edition":"2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517208.2517215"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384416.2384418"}],"event":{"name":"HotSoS '16: HotSos 2016 Science of Security","acronym":"HotSoS '16","location":"Pittsburgh Pennsylvania"},"container-title":["Proceedings of the Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898375.2898398","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2898375.2898398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:30Z","timestamp":1750222590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898375.2898398"}},"subtitle":["an approach for reasoning about dependencies [poster]"],"short-title":[],"issued":{"date-parts":[[2016,4,19]]},"references-count":12,"alternative-id":["10.1145\/2898375.2898398","10.1145\/2898375"],"URL":"https:\/\/doi.org\/10.1145\/2898375.2898398","relation":{},"subject":[],"published":{"date-parts":[[2016,4,19]]},"assertion":[{"value":"2016-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}