{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:09:03Z","timestamp":1776305343610,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["ITEA ASSUME"],"award-info":[{"award-number":["ITEA ASSUME"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002301","name":"Eesti Teadusagentuur","doi-asserted-by":"publisher","award":["IUT-2"],"award-info":[{"award-number":["IUT-2"]}],"id":[{"id":"10.13039\/501100002301","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970337","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"391-402","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":59,"title":["Static race detection for device drivers: the Goblint approach"],"prefix":"10.1145","author":[{"given":"Vesal","family":"Vojdani","sequence":"first","affiliation":[{"name":"University of Tartu, Estonia"}]},{"given":"Kalmer","family":"Apinis","sequence":"additional","affiliation":[{"name":"University of Tartu, Estonia"}]},{"given":"Vootele","family":"R\u00f5tov","sequence":"additional","affiliation":[{"name":"University of Tartu, Estonia"}]},{"given":"Helmut","family":"Seidl","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]},{"given":"Varmo","family":"Vene","sequence":"additional","affiliation":[{"name":"University of Tartu, Estonia"}]},{"given":"Ralf","family":"Vogler","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"278","volume-title":"Hardware and Software: Verification and Testing","author":"Apel S.","unstructured":"S. Apel , D. Beyer , K. Friedberger , F. Raimondi , and A. v. Rhein . Domain Types : Abstract-Domain Selection Based on Variable Usage . In Hardware and Software: Verification and Testing , pages 262\u2013 278 . LNCS 8244, Springer, 2013. S. Apel, D. Beyer, K. Friedberger, F. Raimondi, and A. v. Rhein. Domain Types: Abstract-Domain Selection Based on Variable Usage. In Hardware and Software: Verification and Testing, pages 262\u2013278. LNCS 8244, Springer, 2013."},{"key":"e_1_3_2_1_3_1","first-page":"172","volume-title":"APLAS\u201912","author":"Apinis K.","unstructured":"K. Apinis , H. Seidl , and V. Vojdani . Side-Effecting Constraint Systems: A Swiss Army Knife for Program Analysis . In APLAS\u201912 , pages 157\u2013 172 . LNCS 7705, Springer, 2012. K. Apinis, H. Seidl, and V. Vojdani. Side-Effecting Constraint Systems: A Swiss Army Knife for Program Analysis. In APLAS\u201912, pages 157\u2013172. LNCS 7705, Springer, 2012."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706305"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11823230_15"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503274"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0044-z"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10672-9_19"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328469"},{"key":"e_1_3_2_1_11_1","volume-title":"Springer","author":"Cousot P.","year":"2005","unstructured":"P. Cousot , R. Cousot , J. Feret , L. Mauborgne , A. Min\u00e9 , D. Monniaux , and X. Rival . The ASTR\u00c9E analyzer. In ESOP\u201905, LNCS 3444, pages 21\u201330 . Springer , 2005 . P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Min\u00e9, D. Monniaux, and X. Rival. The ASTR\u00c9E analyzer. In ESOP\u201905, LNCS 3444, pages 21\u201330. Springer, 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512538"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.30"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/325164.325102"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040333"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250765"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1480881.1480912"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040331"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996844"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.108"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375613"},{"key":"e_1_3_2_1_23_1","series-title":"LNCS","first-page":"239","volume-title":"CAV\u201907","author":"Kahlon V.","unstructured":"V. Kahlon , Y. Yang , S. Sankaranarayanan , and A. Gupta . Fast and accurate static data-race detection for concurrent programs . In CAV\u201907 , volume 4590 of LNCS , pages 226\u2013 239 . Springer, 2007. V. Kahlon, Y. Yang, S. Sankaranarayanan, and A. Gupta. Fast and accurate static data-race detection for concurrent programs. In CAV\u201907, volume 4590 of LNCS, pages 226\u2013239. Springer, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595701"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11319-2_17"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-012-0151-7"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594326"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69166-2_24"},{"key":"e_1_3_2_1_29_1","first-page":"418","volume-title":"ESOP\u201911","author":"Min\u00e9 A.","unstructured":"A. Min\u00e9 . Static analysis of run-time errors in embedded critical parallel C programs . In ESOP\u201911 , pages 398\u2013 418 . Springer, 2011. A. Min\u00e9. Static analysis of run-time errors in embedded critical parallel C programs. In ESOP\u201911, pages 398\u2013418. Springer, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54013-4_3"},{"key":"e_1_3_2_1_31_1","volume-title":"ERTS\u201916","author":"Min\u00e9 A.","year":"2016","unstructured":"A. Min\u00e9 , L. Mauborgne , X. Rival , J. Feret , P. Cousot , D. K\u00e4stner , S. Wilhelm , and C. Ferdinand . Taking Static Analysis to the Next Level: Proving the Absence of Run-Time Errors and Data Races with Astr\u00e9e . In ERTS\u201916 , 2016 . A. Min\u00e9, L. Mauborgne, X. Rival, J. Feret, P. Cousot, D. K\u00e4stner, S. Wilhelm, and C. Ferdinand. Taking Static Analysis to the Next Level: Proving the Absence of Run-Time Errors and Data Races with Astr\u00e9e. In ERTS\u201916, 2016."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190265"},{"key":"e_1_3_2_1_33_1","series-title":"LNCS","first-page":"228","volume-title":"CC\u201902","author":"Necula G. C.","unstructured":"G. C. Necula , S. McPeak , S. P. Rahul , and W. Weimer . Cil: An infrastructure for C program analysis and transformation . In CC\u201902 , volume 2304 of LNCS , pages 213\u2013 228 . Springer, 2002. G. C. Necula, S. McPeak, S. P. Rahul, and W. Weimer. Cil: An infrastructure for C program analysis and transformation. In CC\u201902, volume 2304 of LNCS, pages 213\u2013228. Springer, 2002."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134019"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/11823230_7"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057387.1057388"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54013-4_2"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03237-0_13"},{"issue":"4","key":"e_1_3_2_1_39_1","first-page":"413","article-title":"Global invariants for analyzing multithreaded applications. Proc. of the Estonian Academy of Sciences: Phys","volume":"52","author":"Seidl H.","year":"2003","unstructured":"H. Seidl , V. Vene , and M. M\u00fcller-Olm . Global invariants for analyzing multithreaded applications. Proc. of the Estonian Academy of Sciences: Phys ., Math. , 52 ( 4 ): 413 \u2013 436 , 2003 . H. Seidl, V. Vene, and M. M\u00fcller-Olm. Global invariants for analyzing multithreaded applications. Proc. of the Estonian Academy of Sciences: Phys., Math., 52(4):413\u2013436, 2003.","journal-title":"Math."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05089-3_41"},{"key":"e_1_3_2_1_41_1","first-page":"234","volume-title":"Program Flow Analysis: Theory and Applications","author":"Sharir M.","unstructured":"M. Sharir and A. Pnueli . Two approaches to interprocedural data flow analysis . In N. Jones and S. Muchnick, editors, Program Flow Analysis: Theory and Applications , pages 189\u2013 234 . Prentice Hall, 1981. M. Sharir and A. Pnueli. Two approaches to interprocedural data flow analysis. In N. Jones and S. Muchnick, editors, Program Flow Analysis: Theory and Applications, pages 189\u2013 234. Prentice Hall, 1981."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1134\/S0361768812030061"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_52"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11319-2_25"},{"key":"e_1_3_2_1_45_1","first-page":"141","article-title":"Goblint: Path-sensitive data race analysis. Annales Univ. Sci. Budapest","volume":"30","author":"Vojdani V.","year":"2009","unstructured":"V. Vojdani and V. Vene . Goblint: Path-sensitive data race analysis. Annales Univ. Sci. Budapest ., Sect. Comp. , 30 : 141 \u2013 155 , 2009 . V. Vojdani and V. Vene. Goblint: Path-sensitive data race analysis. Annales Univ. Sci. Budapest., Sect. Comp., 30:141\u2013155, 2009.","journal-title":"Sect. Comp."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287654"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","location":"Singapore Singapore","acronym":"ASE'16","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970337","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970337","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:01Z","timestamp":1750218601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970337"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":45,"alternative-id":["10.1145\/2970276.2970337","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970337","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}