{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:17Z","timestamp":1750221377828,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,23]],"date-time":"2017-10-23T00:00:00Z","timestamp":1508716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-14-2-0242"],"award-info":[{"award-number":["FA8750-14-2-0242"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,23]]},"DOI":"10.1145\/3136014.3136030","type":"proceedings-article","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T12:37:48Z","timestamp":1508157468000},"page":"244-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Robust programs with filtered iterators"],"prefix":"10.1145","author":[{"given":"Jiasi","family":"Shen","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1989. .ZIP Application Note. https:\/\/www.pkware.com\/support\/zipapp-note\/. (1989).  1989. .ZIP Application Note. https:\/\/www.pkware.com\/support\/zipapp-note\/. (1989)."},{"key":"e_1_3_2_1_2_1","unstructured":"1990. GRAPHICS INTERCHANGE FORMAT Version 89a. http:\/\/www.w3.org\/Graphics\/GIF\/spec-gif89a.txt. (1990).  1990. GRAPHICS INTERCHANGE FORMAT Version 89a. http:\/\/www.w3.org\/Graphics\/GIF\/spec-gif89a.txt. (1990)."},{"key":"e_1_3_2_1_3_1","unstructured":"1996. Wavefront OBJ File Format Summary. http:\/\/www.fileformat.info\/format\/wavefrontobj\/egff.htm. (1996).  1996. Wavefront OBJ File Format Summary. http:\/\/www.fileformat.info\/format\/wavefrontobj\/egff.htm. (1996)."},{"key":"e_1_3_2_1_4_1","unstructured":"2017. CVE \u2013 Common Vulnerabilities and Exposures. http:\/\/cve.mitre.org\/. (2017).  2017. CVE \u2013 Common Vulnerabilities and Exposures. http:\/\/cve.mitre.org\/. (2017)."},{"volume-title":"SLE 2017 RIFL Artifact. http:\/\/people.csail.mit.edu\/jiasi\/sle2017_ rifl_artifact\/ and https:\/\/people.csail.mit.edu\/rinard\/paper\/sle17","year":"2017","key":"e_1_3_2_1_5_1","unstructured":"2017. SLE 2017 RIFL Artifact. http:\/\/people.csail.mit.edu\/jiasi\/sle2017_ rifl_artifact\/ and https:\/\/people.csail.mit.edu\/rinard\/paper\/sle17 .rifl. artifact . ( 2017 ). 2017. SLE 2017 RIFL Artifact. http:\/\/people.csail.mit.edu\/jiasi\/sle2017_ rifl_artifact\/ and https:\/\/people.csail.mit.edu\/rinard\/paper\/sle17.rifl. artifact . (2017)."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. Wireshark. https:\/\/www.wireshark.org\/. (2017).  2017. Wireshark. https:\/\/www.wireshark.org\/. (2017)."},{"volume-title":"Proceedings of the 2Nd International Conference on Software Engineering (ICSE \u201976)","author":"Anderson T.","key":"e_1_3_2_1_7_1","unstructured":"T. Anderson and R. Kerr . 1976. Recovery Blocks in Action: A System Supporting High Reliability . In Proceedings of the 2Nd International Conference on Software Engineering (ICSE \u201976) . 447\u2013457. T. Anderson and R. Kerr. 1976. Recovery Blocks in Action: A System Supporting High Reliability. In Proceedings of the 2Nd International Conference on Software Engineering (ICSE \u201976). 447\u2013457."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985817"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594323"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"T. Boutell. 1997. PNG (Portable Network Graphics) Specification Version 1.0. (1997).  T. Boutell. 1997. PNG (Portable Network Graphics) Specification Version 1.0. (1997).","DOI":"10.17487\/rfc2083"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"T Bray. 2014. JavaScript Object Notation (JSON) Data Interchange Format. http:\/\/www.rfc-editor.org\/rfc\/rfc7159.txt. (March 2014). RFC 7159.  T Bray. 2014. JavaScript Object Notation (JSON) Data Interchange Format. http:\/\/www.rfc-editor.org\/rfc\/rfc7159.txt. (March 2014). RFC 7159.","DOI":"10.17487\/rfc7159"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950377"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22655-7_28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009007"},{"key":"e_1_3_2_1_16_1","unstructured":"L. Degioanni F. Risso and G. Varenni. 2004. PCAP Next Generation Dump File Format. https:\/\/www.winpcap.org\/ntar\/draft\/PCAP-DumpFileFormat.html. (March 2004).  L. Degioanni F. Risso and G. Varenni. 2004. PCAP Next Generation Dump File Format. https:\/\/www.winpcap.org\/ntar\/draft\/PCAP-DumpFileFormat.html. (March 2004)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70592-5_21"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"R. Fielding and J. Reschke. 2014. Hypertext transfer protocol (HTTP\/1.1): Semantics and content. (2014).  R. Fielding and J. Reschke. 2014. Hypertext transfer protocol (HTTP\/1.1): Semantics and content. (2014).","DOI":"10.17487\/rfc7231"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/361227.361230"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/573304"},{"key":"e_1_3_2_1_21_1","unstructured":"E. Hamilton. 1992. JPEG File Interchange Format. (1992).  E. Hamilton. 1992. JPEG File Interchange Format. (1992)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869462"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-64359-1_732"},{"key":"e_1_3_2_1_24_1","volume-title":"Computer Networking: A Top-down Approach.","author":"Kurose J.F.","year":"2010","unstructured":"J.F. Kurose and K.W. Ross . 2010 . Computer Networking: A Top-down Approach. J.F. Kurose and K.W. Ross. 2010. Computer Networking: A Top-down Approach."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/359763.359789"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227204"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594337"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1101\/gr.107524.110"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806651.1806657"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.90"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"volume-title":"2012 34th International Conference on Software Engineering (ICSE). 123\u2013133","author":"Pankratius V.","key":"e_1_3_2_1_34_1","unstructured":"V. Pankratius , F. Schmidt , and G. Garret\u00c3\u015fn . 2012. Combining functional and imperative programming for multicore software: An empirical study evaluating Scala and Java . In 2012 34th International Conference on Software Engineering (ICSE). 123\u2013133 . V. Pankratius, F. Schmidt, and G. Garret\u00c3\u015fn. 2012. Combining functional and imperative programming for multicore software: An empirical study evaluating Scala and Java. In 2012 34th International Conference on Software Engineering (ICSE). 123\u2013133."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095833"},{"key":"e_1_3_2_1_36_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2015","unstructured":"R Core Team . 2015 . R: A Language and Environment for Statistical Computing . R Foundation for Statistical Computing , Vienna, Austria . https:\/\/www.R-project.org R Core Team. 2015. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. https:\/\/www.R-project.org"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635922"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design &amp; Implementation -","volume":"6","author":"Rinard M.","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and W. S. Beebee , Jr . 2004. Enhancing Server Availability and Security Through Failure-oblivious Computing . In Proceedings of the 6th Conference on Symposium on Opearting Systems Design &amp; Implementation - Volume 6 (OSDI\u201904). 21\u201321. M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee, Jr. 2004. Enhancing Server Availability and Security Through Failure-oblivious Computing. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design &amp; Implementation - Volume 6 (OSDI\u201904). 21\u201321."},{"key":"e_1_3_2_1_39_1","volume-title":"NDSS","volume":"2004","author":"Ruwase O.","year":"2004","unstructured":"O. Ruwase and M. S Lam . 2004 . A Practical Dynamic Buffer Overflow Detector .. In NDSS , Vol. 2004 . 159\u2013169. O. Ruwase and M. S Lam. 2004. A Practical Dynamic Buffer Overflow Detector.. In NDSS, Vol. 2004. 159\u2013169."},{"key":"e_1_3_2_1_40_1","volume-title":"Common Format and MIME Type for CommaSeparated Values (CSV) Files. https:\/\/tools.ietf.org\/html\/rfc4180. (Oct","author":"Shafranovich Y.","year":"2005","unstructured":"Y. Shafranovich . 2005. Common Format and MIME Type for CommaSeparated Values (CSV) Files. https:\/\/tools.ietf.org\/html\/rfc4180. (Oct . 2005 ). RFC 4180. Y. Shafranovich. 2005. Common Format and MIME Type for CommaSeparated Values (CSV) Files. https:\/\/tools.ietf.org\/html\/rfc4180. (Oct. 2005). RFC 4180."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/224964.224987"},{"key":"e_1_3_2_1_42_1","unstructured":"J. Shen and M. Rinard. 2015. Filtered Iterators for Safe and Robust Programs in RIFL. http:\/\/hdl.handle.net\/1721.1\/100542 . (2015). http: \/\/hdl.handle.net\/1721.1\/100542 MIT-CSAIL-TR-2015-036.  J. Shen and M. Rinard. 2015. Filtered Iterators for Safe and Robust Programs in RIFL. http:\/\/hdl.handle.net\/1721.1\/100542 . (2015). http: \/\/hdl.handle.net\/1721.1\/100542 MIT-CSAIL-TR-2015-036."},{"key":"e_1_3_2_1_43_1","unstructured":"A. Shinnar D. Tarditi M. Plesko and B. Steensgaard. 2004. Integrating support for undo with exception handling. Technical Report. Microsoft Research. MSR-TR-2004-140.  A. Shinnar D. Tarditi M. Plesko and B. Steensgaard. 2004. Integrating support for undo with exception handling. Technical Report. Microsoft Research. MSR-TR-2004-140."},{"key":"e_1_3_2_1_44_1","unstructured":"S. Sidiroglou and A. D. Keromytis. 2004. Using Execution Transactions To Recover From Buffer Overflow Attacks. Technical Report. Columbia University Computer Science Department. http:\/\/academiccommons. columbia.edu\/item\/ac:109823 CUCS\u2013031\u201304.  S. Sidiroglou and A. D. Keromytis. 2004. Using Execution Transactions To Recover From Buffer Overflow Attacks. Technical Report. Columbia University Computer Science Department. http:\/\/academiccommons. columbia.edu\/item\/ac:109823 CUCS\u2013031\u201304."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"e_1_3_2_1_46_1","unstructured":"S. Siegel. 1956. Nonparametric statistics for the behavioral sciences.  S. Siegel. 1956. Nonparametric statistics for the behavioral sciences."},{"volume-title":"Lax: Driver Interfaces for Approximate Sensor Device Access. In 15th Workshop on Hot Topics in Operating Systems (HotOS XV)","author":"Stanley-Marbell P.","key":"e_1_3_2_1_47_1","unstructured":"P. Stanley-Marbell and M. Rinard . 2015 . Lax: Driver Interfaces for Approximate Sensor Device Access. In 15th Workshop on Hot Topics in Operating Systems (HotOS XV) . Kartause Ittingen, Switzerland. https:\/\/www.usenix.org\/conference\/hotos15\/ workshop-program\/presentation\/stanley-marbell P. Stanley-Marbell and M. Rinard. 2015. Lax: Driver Interfaces for Approximate Sensor Device Access. In 15th Workshop on Hot Topics in Operating Systems (HotOS XV). Kartause Ittingen, Switzerland. https:\/\/www.usenix.org\/conference\/hotos15\/ workshop-program\/presentation\/stanley-marbell"},{"key":"e_1_3_2_1_48_1","unstructured":"G. L. Steele Jr. 1990. Common LISP: The Language (2Nd Ed.).  G. L. Steele Jr. 1990. Common LISP: The Language (2Nd Ed.)."},{"key":"e_1_3_2_1_49_1","article-title":"An Empirical Investigation into Programming Language","volume":"13","author":"Stefik A.","year":"2013","unstructured":"A. Stefik and S. Siebert . 2013 . An Empirical Investigation into Programming Language Syntax. Trans. Comput. Educ. 13 , 4, Article 19 (Nov. 2013), 40 pages. A. Stefik and S. Siebert. 2013. An Empirical Investigation into Programming Language Syntax. Trans. Comput. Educ. 13, 4, Article 19 (Nov. 2013), 40 pages.","journal-title":"Syntax. Trans. Comput. Educ."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22655-7_9"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815165"},{"key":"e_1_3_2_1_53_1","unstructured":"F. Wilcoxon. [n. d.]. Biometrics Bulletin 6 ([n. d.]) 80\u201383.  F. Wilcoxon. [n. d.]. Biometrics Bulletin 6 ([n. d.]) 80\u201383."},{"key":"e_1_3_2_1_54_1","volume-title":"Software Engineering: An Introduction.","author":"Wohlin C.","year":"2000","unstructured":"C. Wohlin , P. Runeson , M. H\u00f6st , M. C. Ohlsson , B. Regnell , and A. Wessl\u00e9n . 2000 . Experimentation in Software Engineering: An Introduction. C. Wohlin, P. Runeson, M. H\u00f6st, M. C. Ohlsson, B. Regnell, and A. Wessl\u00e9n. 2000. Experimentation in Software Engineering: An Introduction."}],"event":{"name":"SPLASH '17: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGAda ACM Special Interest Group on Ada Programming Language"],"location":"Vancouver BC Canada","acronym":"SPLASH '17"},"container-title":["Proceedings of the 10th ACM SIGPLAN International Conference on Software Language Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136014.3136030","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136014.3136030","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3136014.3136030","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:45Z","timestamp":1750213605000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3136014.3136030"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,23]]},"references-count":53,"alternative-id":["10.1145\/3136014.3136030","10.1145\/3136014"],"URL":"https:\/\/doi.org\/10.1145\/3136014.3136030","relation":{},"subject":[],"published":{"date-parts":[[2017,10,23]]},"assertion":[{"value":"2017-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}