{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:10Z","timestamp":1750221250323,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-10-C-0242"],"award-info":[{"award-number":["FA8750-10-C-0242"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230861","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["HYDRA"],"prefix":"10.1145","author":[{"given":"Brett","family":"Benyo","sequence":"first","affiliation":[{"name":"Raytheon BBN Technologies, Cambridge, MA USA"}]},{"given":"Shane","family":"Clark","sequence":"additional","affiliation":[{"name":"Raytheon BBN Technologies, Cambridge, MA USA"}]},{"given":"Aaron","family":"Paulos","sequence":"additional","affiliation":[{"name":"Raytheon BBN Technologies, Cambridge, MA USA"}]},{"given":"Partha","family":"Pal","sequence":"additional","affiliation":[{"name":"Raytheon BBN Technologies, Cambridge, MA USA"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2012 34th International Conference on. IEEE","author":"Le Goues C.","year":"2012","unstructured":"C. Le Goues , systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each.\" Software Engineering (ICSE) , 2012 34th International Conference on. IEEE , 2012 . C. Le Goues, et al. \"A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each.\" Software Engineering (ICSE), 2012 34th International Conference on. IEEE, 2012."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Z. Qi etal \"An analysis of patch plausibility and correctness for generate-and-validate patch generation systems.\" Tech. report. (2015).  Z. Qi et al. \"An analysis of patch plausibility and correctness for generate-and-validate patch generation systems.\" Tech. report. (2015).","DOI":"10.1145\/2771783.2771791"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398857.2384648"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591114"},{"key":"e_1_3_2_1_8_1","volume-title":"Enhancing Server Availability and Security Through Failure-Oblivious Computing.\" OSDI","author":"Rinard M.C.","year":"2004","unstructured":"M.C. Rinard , \" Enhancing Server Availability and Security Through Failure-Oblivious Computing.\" OSDI . Vol. 4 . 2004 . M.C. Rinard, et al. \"Enhancing Server Availability and Security Through Failure-Oblivious Computing.\" OSDI. Vol. 4. 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.23"},{"key":"e_1_3_2_1_10_1","volume-title":"Compiler-generated software diversity.\" Moving Target Defense","author":"Jackson T.","year":"2011","unstructured":"T. Jackson , \" Compiler-generated software diversity.\" Moving Target Defense . Springer New York , 2011 . 77--98. T. Jackson, et al. \"Compiler-generated software diversity.\" Moving Target Defense. Springer New York, 2011. 77--98."},{"key":"e_1_3_2_1_11_1","volume-title":"Fuzzbuster: A system for self-adaptive immunity from cyber threats.\" Eighth International Conference on Autonomic and Autonomous Systems (ICAS-12)","author":"Musliner D.J.","year":"2012","unstructured":"D.J. Musliner , \" Fuzzbuster: A system for self-adaptive immunity from cyber threats.\" Eighth International Conference on Autonomic and Autonomous Systems (ICAS-12) . 2012 . D.J. Musliner, et al. \"Fuzzbuster: A system for self-adaptive immunity from cyber threats.\" Eighth International Conference on Autonomic and Autonomous Systems (ICAS-12). 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813682"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294275"},{"key":"e_1_3_2_1_14_1","volume-title":"Prophet: Automatic patch generation via learning from successful human patches","author":"Long F.","year":"2015","unstructured":"F. Long and M. Rinard . \" Prophet: Automatic patch generation via learning from successful human patches .\" ( 2015 ). F. Long and M. Rinard. \"Prophet: Automatic patch generation via learning from successful human patches.\" (2015)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"e_1_3_2_1_16_1","volume-title":"Automatic patch generation learned from human-written patches.\" Proceedings of the 2013 International Conference on Software Engineering","author":"Kim D.","year":"2013","unstructured":"D. Kim , \" Automatic patch generation learned from human-written patches.\" Proceedings of the 2013 International Conference on Software Engineering . IEEE Press , 2013 . D. Kim, et al. \"Automatic patch generation learned from human-written patches.\" Proceedings of the 2013 International Conference on Software Engineering. IEEE Press, 2013."},{"key":"e_1_3_2_1_17_1","unstructured":"Symantec. ISTR20: Internet security threat report.  Symantec. ISTR20: Internet security threat report."},{"key":"e_1_3_2_1_18_1","unstructured":"Akamai. Q3 2015 State of the internet -- security report.  Akamai. Q3 2015 State of the internet -- security report."},{"key":"e_1_3_2_1_19_1","volume-title":"Vulnerability Database. CVE2012-1823 summary. &lt;https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2012-1823\/>, Last visited","author":"National","year":"2017","unstructured":"National Vulnerability Database. CVE2012-1823 summary. &lt;https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2012-1823\/>, Last visited Dec. 2017 National Vulnerability Database. CVE2012-1823 summary. &lt;https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2012-1823\/>, Last visited Dec. 2017"},{"key":"e_1_3_2_1_20_1","volume-title":"Last visited","author":"National Vulnerability Database. \"Vulnerability summary for CVE-2014-6271.\" &lt;https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6271\/>","year":"2017","unstructured":"National Vulnerability Database. \"Vulnerability summary for CVE-2014-6271.\" &lt;https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6271\/> , Last visited Dec. 2017 National Vulnerability Database. \"Vulnerability summary for CVE-2014-6271.\" &lt;https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-6271\/>, Last visited Dec. 2017"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090181.2090186"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SASOW.2012.13"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.15"},{"volume-title":"Last visitd","year":"2017","key":"e_1_3_2_1_24_1","unstructured":"&lt;http:\/\/git-public.flux.utah.edu\/gitweb.cgi?p=a3\/vmi.git;a=summary\/>,a3\/vmi.git\/summary. Last visitd Dec. 2017 . &lt;http:\/\/git-public.flux.utah.edu\/gitweb.cgi?p=a3\/vmi.git;a=summary\/>,a3\/vmi.git\/summary. Last visitd Dec. 2017."},{"key":"e_1_3_2_1_25_1","volume-title":"Last visitd","author":"National Vulnerability Database. \"Vulnerability summary for CVE-2014-0160.\" &lt;https:\/\/web.nvd.mst.gov\/view\/vuln\/detail?vulnId=CVE-2014-0160\/>","year":"2018","unstructured":"National Vulnerability Database. \"Vulnerability summary for CVE-2014-0160.\" &lt;https:\/\/web.nvd.mst.gov\/view\/vuln\/detail?vulnId=CVE-2014-0160\/> , Last visitd Jan. 2018 National Vulnerability Database. \"Vulnerability summary for CVE-2014-0160.\" &lt;https:\/\/web.nvd.mst.gov\/view\/vuln\/detail?vulnId=CVE-2014-0160\/>, Last visitd Jan. 2018"},{"key":"e_1_3_2_1_26_1","unstructured":"The Xen Project. &lt;http:\/\/xenproject.org\/> Loaded Dec. 2015.  The Xen Project. &lt;http:\/\/xenproject.org\/> Loaded Dec. 2015."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.89"},{"key":"e_1_3_2_1_28_1","unstructured":"MITLL CTF. &lt;https:\/\/events.ll.mit.edu\/mitllctf\/> Loaded Jan. 2016.  MITLL CTF. &lt;https:\/\/events.ll.mit.edu\/mitllctf\/> Loaded Jan. 2016."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674025.2576212"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382284"},{"key":"e_1_3_2_1_32_1","volume-title":"Last visited","author":"SANS Institute","year":"2017","unstructured":"SANS Institute , Protection from the Inside: Application Security Methodologies Compared, &lt;https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/protection-inside-application-security-methodologies-compared-35917&gt; , Last visited Dec 2017 SANS Institute, Protection from the Inside: Application Security Methodologies Compared, &lt;https:\/\/www.sans.org\/reading-room\/whitepapers\/analyst\/protection-inside-application-security-methodologies-compared-35917&gt;, Last visited Dec 2017"}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"],"location":"Hamburg Germany","acronym":"ARES 2018"},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230861","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230861","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230861"}},"subtitle":["Hypothesis Driven Repair Automation"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":32,"alternative-id":["10.1145\/3230833.3230861","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230861","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}