{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:16:54Z","timestamp":1773839814224,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1145\/2950290.2950345","type":"proceedings-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T13:46:03Z","timestamp":1478007963000},"page":"290-300","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["POLLUX: safely upgrading dependent application libraries"],"prefix":"10.1145","author":[{"given":"Sukrit","family":"Kalra","sequence":"first","affiliation":[{"name":"IIIT Delhi, India"}]},{"given":"Ayush","family":"Goel","sequence":"additional","affiliation":[{"name":"IIIT Delhi, India"}]},{"given":"Dhriti","family":"Khanna","sequence":"additional","affiliation":[{"name":"IIIT Delhi, India"}]},{"given":"Mohan","family":"Dhawan","sequence":"additional","affiliation":[{"name":"IBM Research, India"}]},{"given":"Subodh","family":"Sharma","sequence":"additional","affiliation":[{"name":"IIT Delhi, India"}]},{"given":"Rahul","family":"Purandare","sequence":"additional","affiliation":[{"name":"IIIT Delhi, India"}]}],"member":"320","published-online":{"date-parts":[[2016,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Capstone. https:\/\/github.com\/aquynh\/capstone.  Capstone. https:\/\/github.com\/aquynh\/capstone."},{"key":"e_1_3_2_1_2_1","unstructured":"Catch. https:\/\/github.com\/philsquared\/Catch.  Catch. https:\/\/github.com\/philsquared\/Catch."},{"key":"e_1_3_2_1_3_1","unstructured":"Curl. https:\/\/github.com\/curl\/curl.  Curl. https:\/\/github.com\/curl\/curl."},{"key":"e_1_3_2_1_4_1","unstructured":"DevIL. https:\/\/github.com\/DentonW\/DevIL.  DevIL. https:\/\/github.com\/DentonW\/DevIL."},{"key":"e_1_3_2_1_5_1","unstructured":"Docker. https:\/\/www.docker.com\/.  Docker. https:\/\/www.docker.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"dropbox\/json11. https:\/\/github.com\/dropbox\/json11.  dropbox\/json11. https:\/\/github.com\/dropbox\/json11."},{"key":"e_1_3_2_1_7_1","unstructured":"Eigen. https:\/\/bitbucket.org\/eigen\/eigen\/.  Eigen. https:\/\/bitbucket.org\/eigen\/eigen\/."},{"key":"e_1_3_2_1_8_1","unstructured":"Fit. https:\/\/github.com\/pfultz2\/Fit.  Fit. https:\/\/github.com\/pfultz2\/Fit."},{"key":"e_1_3_2_1_9_1","unstructured":"GSL - GNU Scientific Library. https:\/\/github.com\/ampl\/gsl.  GSL - GNU Scientific Library. https:\/\/github.com\/ampl\/gsl."},{"key":"e_1_3_2_1_10_1","unstructured":"HTTP parser. https:\/\/github.com\/nodejs\/http \u2212parser.  HTTP parser. https:\/\/github.com\/nodejs\/http \u2212parser."},{"key":"e_1_3_2_1_11_1","unstructured":"libarchive. https:\/\/github.com\/libarchive\/libarchive.  libarchive. https:\/\/github.com\/libarchive\/libarchive."},{"key":"e_1_3_2_1_12_1","unstructured":"libtorrent. https:\/\/github.com\/arvidn\/libtorrent.  libtorrent. https:\/\/github.com\/arvidn\/libtorrent."},{"key":"e_1_3_2_1_13_1","unstructured":"libxml violates the zlib interface and crashes. https:\/\/mail.gnome.org\/archives\/xml\/2010 \u2212 January\/msg00035.html.  libxml violates the zlib interface and crashes. https:\/\/mail.gnome.org\/archives\/xml\/2010 \u2212 January\/msg00035.html."},{"key":"e_1_3_2_1_14_1","unstructured":"Onion. https:\/\/github.com\/davidmoreno\/onion.  Onion. https:\/\/github.com\/davidmoreno\/onion."},{"key":"e_1_3_2_1_15_1","unstructured":"OpenSSH Patches Critical Flaw That Could Leak Private Crypto Keys. http:\/\/www.openssh.com\/txt\/release\u22127.1p2.  OpenSSH Patches Critical Flaw That Could Leak Private Crypto Keys. http:\/\/www.openssh.com\/txt\/release\u22127.1p2."},{"key":"e_1_3_2_1_16_1","unstructured":"PEGTL. https:\/\/github.com\/ColinH\/PEGTL.  PEGTL. https:\/\/github.com\/ColinH\/PEGTL."},{"key":"e_1_3_2_1_17_1","unstructured":"Phoenix Compiler and Shared Source Common Language Infrastructure. http:\/\/research.microsoft.com\/en\u2212us\/ collaboration\/focus\/cs\/phoenix.aspx.  Phoenix Compiler and Shared Source Common Language Infrastructure. http:\/\/research.microsoft.com\/en\u2212us\/ collaboration\/focus\/cs\/phoenix.aspx."},{"key":"e_1_3_2_1_18_1","unstructured":"Pin - A Dynamic Binary Instrumentation Tool. https:\/\/software.intel.com\/en \u2212us\/articles\/ pin \u2212a\u2212dynamic\u2212binary\u2212instrumentation\u2212tool.  Pin - A Dynamic Binary Instrumentation Tool. https:\/\/software.intel.com\/en \u2212us\/articles\/ pin \u2212a\u2212dynamic\u2212binary\u2212instrumentation\u2212tool."},{"key":"e_1_3_2_1_19_1","unstructured":"Pin 2.11 User Guide. https:\/\/software.intel.com\/sites\/landingpage\/ pintool\/docs\/49306\/Pin\/html\/.  Pin 2.11 User Guide. https:\/\/software.intel.com\/sites\/landingpage\/ pintool\/docs\/49306\/Pin\/html\/."},{"key":"e_1_3_2_1_20_1","unstructured":"S\u00f8rensen-Dice coefficient. https:\/\/en.wikipedia.org\/ wiki\/S%C3%B8rensen%E2%80%93Dice_coefficient.  S\u00f8rensen-Dice coefficient. https:\/\/en.wikipedia.org\/ wiki\/S%C3%B8rensen%E2%80%93Dice_coefficient."},{"key":"e_1_3_2_1_21_1","unstructured":"spdlog. https:\/\/github.com\/gabime\/spdlog.  spdlog. https:\/\/github.com\/gabime\/spdlog."},{"key":"e_1_3_2_1_22_1","unstructured":"The Heartbleed Bug. http:\/\/heartbleed.com\/.  The Heartbleed Bug. http:\/\/heartbleed.com\/."},{"key":"e_1_3_2_1_23_1","unstructured":"Valijson. https:\/\/github.com\/tristanpenman\/valijson.  Valijson. https:\/\/github.com\/tristanpenman\/valijson."},{"key":"e_1_3_2_1_24_1","unstructured":"Winamp crashes at launch. http:\/\/forums.winamp.com\/ showthread.php?t=374649.  Winamp crashes at launch. http:\/\/forums.winamp.com\/ showthread.php?t=374649."},{"key":"e_1_3_2_1_25_1","unstructured":"zlib. https:\/\/github.com\/madler\/zlib.  zlib. https:\/\/github.com\/madler\/zlib."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31985-6_19"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430553.2430557"},{"key":"e_1_3_2_1_28_1","unstructured":"B RUMLEY D. J AGER I. A VGERINOS T. AND S CHWARTZ E. J. BAP: A Binary Analysis Platform. In CAV\u201911.   B RUMLEY D. J AGER I. A VGERINOS T. AND S CHWARTZ E. J. BAP: A Binary Analysis Platform. In CAV\u201911."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1862372.1862389"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866354"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"e_1_3_2_1_32_1","unstructured":"D ULLIEN T. AND R OLLES R. Graph-based comparison of Executable Objects. In SSTIC \u201905.  D ULLIEN T. AND R OLLES R. Graph-based comparison of Executable Objects. In SSTIC \u201905."},{"key":"e_1_3_2_1_33_1","unstructured":"E GELE M. W OO M. C HAPMAN P. AND B RUMLEY D. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. In Security \u201914.   E GELE M. W OO M. C HAPMAN P. AND B RUMLEY D. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components. In Security \u201914."},{"key":"e_1_3_2_1_34_1","unstructured":"F LAKE H. Structural Comparison of Executable Objects. In DIMVA \u201904.  F LAKE H. Structural Comparison of Executable Objects. In DIMVA \u201904."},{"key":"e_1_3_2_1_35_1","unstructured":"G AO D. R EITER M. AND S ONG D. BinHunt: Automatically Finding Semantic Differences in Binary Programs. In ICICS \u201908.  G AO D. R EITER M. AND S ONG D. BinHunt: Automatically Finding Semantic Differences in Binary Programs. In ICICS \u201908."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_40"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151012"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595808.1595821"},{"key":"e_1_3_2_1_40_1","unstructured":"N AGARAJANA V. G UPTA R. Z HANG X. M ADOU M. AND D E S UTTER B. Matching Control Flow of Program Versions. In ICSM \u201907.  N AGARAJANA V. G UPTA R. Z HANG X. M ADOU M. AND D E S UTTER B. Matching Control Flow of Program Versions. In ICSM \u201907."},{"key":"e_1_3_2_1_41_1","volume-title":"ICSM","author":"AEMAEKERS S.","year":"2012","unstructured":"R AEMAEKERS , S. , VAN D EU RSEN , A., AND V I SSER , J. Measuring software library stability through historical version analysis . In ICSM 2012 . R AEMAEKERS, S., VAN D EURSEN, A., AND V ISSER, J. Measuring software library stability through historical version analysis. In ICSM 2012."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.30"},{"key":"e_1_3_2_1_43_1","volume-title":"ICSE","author":"EO H.","year":"2014","unstructured":"S EO , H. , S ADOWSKI , C. , E LBAUM , S. , A FTANDILIAN , E. , AND B OWD IDGE , R. Programmers\u2019 Build Errors: A Case Study (at Google) . In ICSE 2014 . S EO, H., S ADOWSKI, C., E LBAUM, S., A FTANDILIAN, E., AND B OWDIDGE, R. Programmers\u2019 Build Errors: A Case Study (at Google). In ICSE 2014."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1660"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_27"},{"key":"e_1_3_2_1_46_1","unstructured":"T IFFANY B AO J. B. AND W OO M. ByteWeight: Learning to Recognize Functions in Binary Code. In Security \u201914.  T IFFANY B AO J. B. AND W OO M. ByteWeight: Learning to Recognize Functions in Binary Code. In Security \u201914."}],"event":{"name":"FSE'16: 24nd ACM SIGSOFT International Symposium on the Foundations of Software Engineering","location":"Seattle WA USA","acronym":"FSE'16","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950345","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2950290.2950345","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:49:56Z","timestamp":1750218596000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2950290.2950345"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":45,"alternative-id":["10.1145\/2950290.2950345","10.1145\/2950290"],"URL":"https:\/\/doi.org\/10.1145\/2950290.2950345","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]},"assertion":[{"value":"2016-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}