{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:38:33Z","timestamp":1770287913550,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T00:00:00Z","timestamp":1535932800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,3]]},"DOI":"10.1145\/3238147.3238211","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T20:04:36Z","timestamp":1534795476000},"page":"656-666","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Datalog-based scalable semantic diffing of concurrent programs"],"prefix":"10.1145","author":[{"given":"Chungha","family":"Sung","sequence":"first","affiliation":[{"name":"University of Southern California, USA"}]},{"given":"Shuvendu K.","family":"Lahiri","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Constantin","family":"Enea","sequence":"additional","affiliation":[{"name":"University of Paris Diderot, France"}]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Gcc bug 21334. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=21334.  Gcc bug 21334. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=21334."},{"key":"e_1_3_2_1_2_1","unstructured":"Gcc bug 24430. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=25330.  Gcc bug 24430. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=25330."},{"key":"e_1_3_2_1_3_1","unstructured":"Gcc bug 3584. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=3584.  Gcc bug 3584. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=3584."},{"key":"e_1_3_2_1_4_1","unstructured":"Gcc bug 40518. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=40518.  Gcc bug 40518. http:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=40518."},{"key":"e_1_3_2_1_5_1","unstructured":"Glib bug 51264.  Glib bug 51264."},{"key":"e_1_3_2_1_6_1","unstructured":"https:\/\/bugzilla.gnome.org\/show_bug.cgi?id=512624.  https:\/\/bugzilla.gnome.org\/show_bug.cgi?id=512624."},{"key":"e_1_3_2_1_7_1","unstructured":"Jetty bug 1187.  Jetty bug 1187."},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/jira.codejaus.org\/browse\/JET TY- 1187.  https:\/\/jira.codejaus.org\/browse\/JET TY- 1187."},{"key":"e_1_3_2_1_9_1","unstructured":"Llvm bug 8441. http:\/\/llvm.org\/bugs\/show_bug.cgi?id=8441.  Llvm bug 8441. http:\/\/llvm.org\/bugs\/show_bug.cgi?id=8441."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(91)90224-P"},{"key":"e_1_3_2_1_11_1","volume-title":"Brian Gaeke. LLVA: A Low-level Virtual Instruction Set Architecture. In ACM\/IEEE international symposium on Microarchitecture","author":"Adve Vikram","year":"2003","unstructured":"Vikram Adve , Chris Lattner , Michael Brukman , Anand Shukla , and Brian Gaeke. LLVA: A Low-level Virtual Instruction Set Architecture. In ACM\/IEEE international symposium on Microarchitecture , Dec 2003 . Vikram Adve, Chris Lattner, Michael Brukman, Anand Shukla, and Brian Gaeke. LLVA: A Low-level Virtual Instruction Set Architecture. In ACM\/IEEE international symposium on Microarchitecture, Dec 2003."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66158-2_44"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46681-0_31"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483764"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2682923.2682937"},{"key":"e_1_3_2_1_16_1","first-page":"65","volume-title":"Abstract Semantic Diffing of Evolving Concurrent Programs","author":"Bouajjani Ahmed","unstructured":"Ahmed Bouajjani , Constantin Enea , and Shuvendu K . Lahiri . Abstract Semantic Diffing of Evolving Concurrent Programs , pages 46\u2013 65 . Springer International Publishing, Cham, 2017. Ahmed Bouajjani, Constantin Enea, and Shuvendu K. Lahiri. Abstract Semantic Diffing of Evolving Concurrent Programs, pages 46\u201365. Springer International Publishing, Cham, 2017."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231399"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103693"},{"key":"e_1_3_2_1_20_1","volume-title":"Springer-Verlag","author":"Godlin Benny","year":"2010","unstructured":"Benny Godlin and Ofer Strichman . Time for verification. chapter Inference Rules for Proving the Equivalence of Recursive Procedures, pages 167\u2013184 . Springer-Verlag , Berlin, Heidelberg , 2010 . Benny Godlin and Ofer Strichman. Time for verification. chapter Inference Rules for Proving the Equivalence of Recursive Procedures, pages 167\u2013184. Springer-Verlag, Berlin, Heidelberg, 2010."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970332"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786841"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378802"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/1734069"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032341"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/222124.222146"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/645543.655704"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001437"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103662"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771798"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642998"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950291"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106243"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_54"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491452"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065169"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024445.2024454"},{"key":"e_1_3_2_1_39_1","first-page":"18","volume-title":"USENIX Security Symposium","author":"Benjamin Livshits V.","year":"2005","unstructured":"V. Benjamin Livshits and Monica S. Lam . Finding security vulnerabilities in java applications with static analysis . In USENIX Security Symposium , pages 18\u2013 18 , 2005 . V. Benjamin Livshits and Monica S. Lam. Finding security vulnerabilities in java applications with static analysis. In USENIX Security Symposium, pages 18\u201318, 2005."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491438"},{"key":"e_1_3_2_1_42_1","first-page":"280","volume-title":"USENIX Symposium on Operating Systems Design and Implementation","author":"Musuvathi Madanlal","year":"2008","unstructured":"Madanlal Musuvathi , Shaz Qadeer , Thomas Ball , G\u00e9rard Basler , Piramanayagam Arumuga Nainar , and Iulian Neamtiu . Finding and reproducing heisenbugs in concurrent programs . In USENIX Symposium on Operating Systems Design and Implementation , pages 267\u2013 280 , 2008 . Madanlal Musuvathi, Shaz Qadeer, Thomas Ball, G\u00e9rard Basler, Piramanayagam Arumuga Nainar, and Iulian Neamtiu. Finding and reproducing heisenbugs in concurrent programs. In USENIX Symposium on Operating Systems Design and Implementation, pages 267\u2013280, 2008."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453131"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/349214.349241"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/42190.42277"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950292"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155592"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88387-6_11"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"},{"key":"e_1_3_2_1_51_1","volume-title":"Inspect: A runtime model checker for multithreaded C programs. Technical report","author":"Yang Yu","year":"2008","unstructured":"Yu Yang , Xiaofang Chen , and Ganesh Gopalakrishnan . Inspect: A runtime model checker for multithreaded C programs. Technical report , University of Utah , 2008 . Yu Yang, Xiaofang Chen, and Ganesh Gopalakrishnan. Inspect: A runtime model checker for multithreaded C programs. Technical report, University of Utah, 2008."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02652-2_22"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025121"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555796"},{"key":"e_1_3_2_1_55_1","article-title":"Directed test suite augmentation for concurrent software","author":"Yu Tingting","year":"2018","unstructured":"Tingting Yu , Zunchen Huang , and Chao Wang . ConTesa : Directed test suite augmentation for concurrent software . IEEE Transactions on Software Engineering , 2018 . Tingting Yu, Zunchen Huang, and Chao Wang. ConTesa: Directed test suite augmentation for concurrent software. IEEE Transactions on Software Engineering, 2018.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568294"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106266"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594327"}],"event":{"name":"ASE '18: 33rd ACM\/IEEE International Conference on Automated Software Engineering","location":"Montpellier France","acronym":"ASE '18","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","CNRS Centre National De La Rechercue Scientifique","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3238147.3238211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:35Z","timestamp":1750210775000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3238147.3238211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,3]]},"references-count":58,"alternative-id":["10.1145\/3238147.3238211","10.1145\/3238147"],"URL":"https:\/\/doi.org\/10.1145\/3238147.3238211","relation":{},"subject":[],"published":{"date-parts":[[2018,9,3]]},"assertion":[{"value":"2018-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}