{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T04:08:02Z","timestamp":1776398882811,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["1618771"],"award-info":[{"award-number":["1618771"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106300","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"752-762","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Automatically diagnosing and repairing error handling bugs in C"],"prefix":"10.1145","author":[{"given":"Yuchi","family":"Tian","sequence":"first","affiliation":[{"name":"University of Virginia, USA"}]},{"given":"Baishakhi","family":"Ray","sequence":"additional","affiliation":[{"name":"University of Virginia, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2011. Checker developer manual. http:\/\/clang-analyzer.llvm.org\/checker_dev_ manual.html. (2011). 2012. Clang LibTooling. http:\/\/clang.llvm.org\/docs\/LibTooling.html. (2012). 2013. Clang LibASTMatchers. http:\/\/clang.llvm.org\/docs\/ LibASTMatchersReference.html. (2013). 2014. CVE-2014-0092.  2011. Checker developer manual. http:\/\/clang-analyzer.llvm.org\/checker_dev_ manual.html. (2011). 2012. Clang LibTooling. http:\/\/clang.llvm.org\/docs\/LibTooling.html. (2012). 2013. Clang LibASTMatchers. http:\/\/clang.llvm.org\/docs\/ LibASTMatchersReference.html. (2013). 2014. CVE-2014-0092."},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2014-0092. (2014). 2015. CVE-2015-0208.  https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2014-0092. (2014). 2015. CVE-2015-0208."},{"key":"e_1_3_2_1_3_1","unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0208. (2015). 2015. CVE-2015-0285.  https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0208. (2015). 2015. CVE-2015-0285."},{"key":"e_1_3_2_1_4_1","unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0285. (2015). 2015. CVE-2015-0288.  https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0285. (2015). 2015. CVE-2015-0288."},{"key":"e_1_3_2_1_5_1","unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0288. (2015). 2015. CVE-2015-0292.  https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0288. (2015). 2015. CVE-2015-0292."},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0292. (2015). 2017. CVE-2017-3318.  https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2015-0292. (2015). 2017. CVE-2017-3318."},{"key":"e_1_3_2_1_7_1","unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2017-3318. (2017). 2017. CVE-2017-5350.  https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2017-3318. (2017). 2017. CVE-2017-5350."},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2017-5350. (2017).  https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name= CVE-2017-5350. (2017)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635883"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502041"},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"EIO: Error Handling is Occasionally Correct","volume":"8","author":"Gunawi Haryadi S","year":"2008","unstructured":"Haryadi S Gunawi , Cindy Rubio-Gonz\u00e1lez , Andrea C Arpaci-Dusseau , Remzi H Arpaci-Dusseau , and Ben Liblit . 2008 . EIO: Error Handling is Occasionally Correct .. In FAST , Vol. 8. 1 \u2013 16 . Haryadi S Gunawi, Cindy Rubio-Gonz\u00e1lez, Andrea C Arpaci-Dusseau, Remzi H Arpaci-Dusseau, and Ben Liblit. 2008. EIO: Error Handling is Occasionally Correct.. In FAST, Vol. 8. 1\u201316.","journal-title":"FAST"},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium (USENIX Security).","author":"Jana Suman","year":"2016","unstructured":"Suman Jana , Yuan Kang , Samuel Roth , and Baishakhi Ray . 2016 . Automatically Detecting Error Handling Bugs using Error Specifications . In USENIX Security Symposium (USENIX Security). Suman Jana, Yuan Kang, Samuel Roth, and Baishakhi Ray. 2016. Automatically Detecting Error Handling Bugs using Error Specifications. In USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568258"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970354"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486893"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2010.31"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081755"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660217"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398857.2384626"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025185"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993537"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/42372.42379"},{"key":"e_1_3_2_1_24_1","unstructured":"owasp 2007. OWASP TOP 10. https:\/\/www.owasp.org\/images\/e\/e8\/OWASP_ Top_10_2007.pdf. (2007).  owasp 2007. OWASP TOP 10. https:\/\/www.owasp.org\/images\/e\/e8\/OWASP_ Top_10_2007.pdf. (2007)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993558"},{"key":"e_1_3_2_1_26_1","volume-title":"ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE).","author":"Robillard M.P.","unstructured":"M.P. Robillard and G.C. Murphy . 1999. Analyzing exception flow in Java programs . In ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE). M.P. Robillard and G.C. Murphy. 1999. Analyzing exception flow in Java programs. In ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/357474.355046"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542506"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575307"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028976.1029011"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330017.1330019"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100058"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany","acronym":"ESEC\/FSE'17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106300","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106300","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:37Z","timestamp":1750217437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":32,"alternative-id":["10.1145\/3106237.3106300","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106300","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}