{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T10:09:21Z","timestamp":1774260561005,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,3,19]],"date-time":"2018-03-19T00:00:00Z","timestamp":1521417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1513718, SHF-1703931, and CAREER-1149773."],"award-info":[{"award-number":["CNS-1513718, SHF-1703931, and CAREER-1149773."]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DARPA\/SRC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,3,19]]},"DOI":"10.1145\/3173162.3177153","type":"proceedings-article","created":{"date-parts":[[2018,3,22]],"date-time":"2018-03-22T11:15:40Z","timestamp":1521717340000},"page":"348-362","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Optimistic Hybrid Analysis"],"prefix":"10.1145","author":[{"given":"David","family":"Devecsery","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Peter M.","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Jason","family":"Flinn","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Satish","family":"Narayanasamy","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,3,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/vimgolf.com","author":"VimGolf","year":"2016","unstructured":"VimGolf . http:\/\/vimgolf.com , 2016 . Accessed : 2016-07--31. VimGolf. http:\/\/vimgolf.com, 2016. Accessed: 2016-07--31."},{"key":"e_1_3_2_1_2_1","volume-title":"http:\/\/www.gutenberg.org","author":"Project Gutenbveg","year":"2017","unstructured":"Project Gutenbveg . (n.d.). http:\/\/www.gutenberg.org , 2017 . Accessed : 2017-04--12. Project Gutenbveg. (n.d.). http:\/\/www.gutenberg.org, 2017. Accessed: 2017-04--12."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/svgcuts.com","author":"SvgCuts","year":"2017","unstructured":"SvgCuts . http:\/\/svgcuts.com , 2017 . Accessed : 2017-07--28. SvgCuts. http:\/\/svgcuts.com, 2017. Accessed: 2017-07--28."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/780822.781144"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297035"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/123186.123222"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/304065.304113"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/266800.266825"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/74818.74831"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455778"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348254"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2685048.2685090"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273480"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453111"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250762"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"Enck W.","year":"2010","unstructured":"Enck , W. , Gilbert , P. , gon Chun , B. , Cox , L. P. , Jung , J. , McDaniel , P. , and Sheth , A. N . TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation ( Vancouver, BC , October 2010 ). Enck, W., Gilbert, P., gon Chun, B., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (Vancouver, BC, October 2010)."},{"key":"e_1_3_2_1_21_1","first-page":"24","volume-title":"IN WODA 2003: ICSE WORKSHOP ON DYNAMIC ANALYSIS","author":"Ernst M. D.","year":"2003","unstructured":"Ernst , M. D. Static and dynamic analysis: Synergy and duality . In IN WODA 2003: ICSE WORKSHOP ON DYNAMIC ANALYSIS ( 2003 ), pp. 24 -- 27 . Ernst, M. D. Static and dynamic analysis: Synergy and duality. In IN WODA 2003: ICSE WORKSHOP ON DYNAMIC ANALYSIS (2003), pp. 24--27."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302467"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806672.1806674"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/261640.261644"},{"key":"e_1_3_2_1_27_1","first-page":"214","volume-title":"Proceedings of the 10th International Conference on Static Analysis (Berlin, Heidelberg, 2003), SAS'03, Springer-Verlag","author":"Guyer S. Z.","unstructured":"Guyer , S. Z. , and Lin , C . Client-driven pointer analysis . In Proceedings of the 10th International Conference on Static Analysis (Berlin, Heidelberg, 2003), SAS'03, Springer-Verlag , pp. 214 -- 236 . Guyer, S. Z., and Lin, C. Client-driven pointer analysis. In Proceedings of the 10th International Conference on Static Analysis (Berlin, Heidelberg, 2003), SAS'03, Springer-Verlag, pp. 214--236."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581377"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250767"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2391451.2391470"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 10th Symposium on Operating Systems Design and Implementation","author":"Kim T.","year":"2012","unstructured":"Kim , T. , Chandra , R. , and Zeldovich , N . Efficient patch-based auditing for Web application vulnerabilities . In Proceedings of the 10th Symposium on Operating Systems Design and Implementation ( Hollywood, CA , October 2012 ). Kim, T., Chandra, R., and Zeldovich, N. Efficient patch-based auditing for Web application vulnerabilities. In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (Hollywood, CA, October 2012)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_18"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254119"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786851"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587062"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/379605.379671"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837855.1806657"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/565816.503286"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587054"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062350"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451131"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694379"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/582034.582042"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/822079.822712"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287654"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483788"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802557"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065579.1065798"}],"event":{"name":"ASPLOS '18: Architectural Support for Programming Languages and Operating Systems","location":"Williamsburg VA USA","acronym":"ASPLOS '18","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173162.3177153","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173162.3177153","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3173162.3177153","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:26:23Z","timestamp":1750199183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3173162.3177153"}},"subtitle":["Accelerating Dynamic Analysis through Predicated Static Analysis"],"short-title":[],"issued":{"date-parts":[[2018,3,19]]},"references-count":52,"alternative-id":["10.1145\/3173162.3177153","10.1145\/3173162"],"URL":"https:\/\/doi.org\/10.1145\/3173162.3177153","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3296957.3177153","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2018,3,19]]},"assertion":[{"value":"2018-03-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}