{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:13:19Z","timestamp":1775873599046,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1253867,1526270"],"award-info":[{"award-number":["1253867,1526270"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-15-2-0009"],"award-info":[{"award-number":["FA8750-15-2-0009"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314616","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"561-575","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Continuously reasoning about programs using differential Bayesian inference"],"prefix":"10.1145","author":[{"given":"Kihong","family":"Heo","sequence":"first","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"Mukund","family":"Raghothaman","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"Xujie","family":"Si","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"Mayur","family":"Naik","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Foundations of Databases: The Logical Level","author":"Abiteboul Serge","unstructured":"Serge Abiteboul , Richard Hull , and Victor Vianu . 1994. Foundations of Databases: The Logical Level ( 1 st ed.). Pearson . Serge Abiteboul, Richard Hull, and Victor Vianu. 1994. Foundations of Databases: The Logical Level (1st ed.). Pearson.","edition":"1"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503274"},{"key":"e_1_3_2_2_3_1","volume-title":"Juan Manuel Crespo, and C\u00e9sar Kunz","author":"Barthe Gilles","year":"2011","unstructured":"Gilles Barthe , Juan Manuel Crespo, and C\u00e9sar Kunz . 2011 . Relational Verification Using Product Programs. In Formal Methods (FM 2011). Springer , 200\u2013214. Gilles Barthe, Juan Manuel Crespo, and C\u00e9sar Kunz. 2011. Relational Verification Using Product Programs. In Formal Methods (FM 2011). Springer, 200\u2013214."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781153"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"e_1_3_2_2_7_1","volume-title":"Moving Fast with Software Verification. In NASA Formal Method Symposium. Springer, 3\u201311","author":"Calcagno Cristiano","year":"2015","unstructured":"Cristiano Calcagno , Dino Distefano , Jeremy Dubreil , Dominik Gabi , Pieter Hooimeijer , Martino Luca , Peter O\u2019Hearn , Irene Papakonstantinou , Jim Purbrick , and Dulma Rodriguez . 2015 . Moving Fast with Software Verification. In NASA Formal Method Symposium. Springer, 3\u201311 . Cristiano Calcagno, Dino Distefano, Jeremy Dubreil, Dominik Gabi, Pieter Hooimeijer, Martino Luca, Peter O\u2019Hearn, Irene Papakonstantinou, Jim Purbrick, and Dulma Rodriguez. 2015. Moving Fast with Software Verification. In NASA Formal Method Symposium. Springer, 3\u201311."},{"key":"e_1_3_2_2_8_1","volume-title":"SonarQube in Action","author":"Campbell Ann","unstructured":"Ann Campbell and Patroklos Papapetrou . 2013. SonarQube in Action ( 1 st ed.). Manning Publications Co. Ann Campbell and Patroklos Papapetrou. 2013. SonarQube in Action (1st ed.). Manning Publications Co.","edition":"1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1891823.1891830"},{"key":"e_1_3_2_2_10_1","unstructured":"MITRE Corporation. 2015. CVE-2015-1345. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2015-1345 .  MITRE Corporation. 2015. CVE-2015-1345. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2015-1345 ."},{"key":"e_1_3_2_2_11_1","unstructured":"MITRE Corporation. 2015. CVE-2015-8106. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2015-8106 .  MITRE Corporation. 2015. CVE-2015-8106. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2015-8106 ."},{"key":"e_1_3_2_2_12_1","unstructured":"MITRE Corporation. 2017. CVE-2017-16938. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2017-16938 .  MITRE Corporation. 2017. CVE-2017-16938. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2017-16938 ."},{"key":"e_1_3_2_2_13_1","unstructured":"MITRE Corporation. 2018. CVE-2018-10372. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2018-10372 .  MITRE Corporation. 2018. CVE-2018-10372. https:\/\/cve.mitre. org\/cgi-bin\/cvename.cgi?name=CVE-2018-10372 ."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_2_15_1","unstructured":"Paul Eggert. 2010. sort: Commit 14ad7a2. http:\/\/git.savannah. gnu.org\/cgit\/coreutils.git\/commit\/?id=14ad7a2 . sort: Fix very-unlikely buffer overrun when merging to input file.  Paul Eggert. 2010. sort: Commit 14ad7a2. http:\/\/git.savannah. gnu.org\/cgit\/coreutils.git\/commit\/?id=14ad7a2 . sort: Fix very-unlikely buffer overrun when merging to input file."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1949303.1949305"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630034"},{"key":"e_1_3_2_2_18_1","unstructured":"Assaf Gordon. 2018. sed: Commit 007a417. http:\/\/git.savannah. gnu.org\/cgit\/sed.git\/commit\/?id=007a417 . sed: Fix heap buffer overflow from multiline EOL regex optimization.  Assaf Gordon. 2018. sed: Commit 007a417. http:\/\/git.savannah. gnu.org\/cgit\/sed.git\/commit\/?id=007a417 . sed: Fix heap buffer overflow from multiline EOL regex optimization."},{"key":"e_1_3_2_2_19_1","unstructured":"GrammaTech. 2005. CodeSonar. https:\/\/www.grammatech.com\/ products\/codesonar .  GrammaTech. 2005. CodeSonar. https:\/\/www.grammatech.com\/ products\/codesonar ."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38574-2_20"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.54"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/645543.655704"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_23"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_15"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192377"},{"key":"e_1_3_2_2_28_1","unstructured":"Ming Kawaguchi Shuvendu Lahiri and Henrique Rebelo. 2010. Conditional Equivalence . Technical Report. Microsoft Research. https:\/\/www.microsoft.com\/en-us\/research\/publication\/ conditional-equivalence\/  Ming Kawaguchi Shuvendu Lahiri and Henrique Rebelo. 2010. Conditional Equivalence . Technical Report. Microsoft Research. https:\/\/www.microsoft.com\/en-us\/research\/publication\/ conditional-equivalence\/"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070531"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3088525.3088675"},{"key":"e_1_3_2_2_31_1","volume-title":"Probabilistic Graphical Models: Principles and Techniques","author":"Koller Daphne","unstructured":"Daphne Koller and Nir Friedman . 2009. Probabilistic Graphical Models: Principles and Techniques . The MIT Press . Daphne Koller and Nir Friedman. 2009. Probabilistic Graphical Models: Principles and Techniques . The MIT Press."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760267.1760289"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1625275.1625680"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_54"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491452"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882405"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882336"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_20"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542485"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594326"},{"key":"e_1_3_2_2_42_1","volume-title":"Static Analysis","author":"Madsen Magnus","unstructured":"Magnus Madsen and Anders M\u00f8ller . 2014. Sparse Dataflow Analysis with Pointers and Reachability . In Static Analysis . Springer , 201\u2013218. Magnus Madsen and Anders M\u00f8ller. 2014. Sparse Dataflow Analysis with Pointers and Reachability. In Static Analysis. Springer, 201\u2013218."},{"key":"e_1_3_2_2_43_1","unstructured":"Jim Meyering. 2018. tar: Commit b531801. http:\/\/git.savannah. gnu.org\/cgit\/tar.git\/commit\/?id=b531801 . One-top-level: Avoid a heap-buffer-overflow.  Jim Meyering. 2018. tar: Commit b531801. http:\/\/git.savannah. gnu.org\/cgit\/tar.git\/commit\/?id=b531801 . One-top-level: Avoid a heap-buffer-overflow."},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the 32nd European Conference on Object-Oriented Programming (ECOOP","volume":"109","author":"Mezzetti Gianluca","year":"2018","unstructured":"Gianluca Mezzetti , Anders M\u00f8ller , and Martin Toldam Torp . 2018 . Type Regression Testing to Detect Breaking Changes in Node.js Libraries . In Proceedings of the 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Vol. 109 . Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, 7:1\u20137:24. Gianluca Mezzetti, Anders M\u00f8ller, and Martin Toldam Torp. 2018. Type Regression Testing to Detect Breaking Changes in Node.js Libraries. In Proceedings of the 32nd European Conference on Object-Oriented Programming (ECOOP 2018), Vol. 109. Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, 7:1\u20137:24."},{"key":"e_1_3_2_2_45_1","article-title":"libDAI: A Free and Open Source C++ Library for Discrete Approximate Inference in Graphical Models","author":"Mooij Joris","year":"2010","unstructured":"Joris Mooij . 2010 . libDAI: A Free and Open Source C++ Library for Discrete Approximate Inference in Graphical Models . Journal of Machine Learning Research 11 ( Aug. 2010), 2169\u20132173. Joris Mooij. 2010. libDAI: A Free and Open Source C++ Library for Discrete Approximate Inference in Graphical Models. Journal of Machine Learning Research 11 (Aug. 2010), 2169\u20132173.","journal-title":"Journal of Machine Learning Research 11"},{"key":"e_1_3_2_2_46_1","volume-title":"Chord: A Program Analysis Platform for Java. https:\/\/github.com\/pag-lab\/jchord .","author":"Naik Mayur","year":"2006","unstructured":"Mayur Naik . 2006 . Chord: A Program Analysis Platform for Java. https:\/\/github.com\/pag-lab\/jchord . Mayur Naik. 2006. Chord: A Program Analysis Platform for Java. https:\/\/github.com\/pag-lab\/jchord ."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.12"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254092"},{"key":"e_1_3_2_2_49_1","unstructured":"Hakjoo Oh Kihong Heo Wonchan Lee Woosuk Lee and Kwangkeun Yi. 2012. The Sparrow static analyzer. https:\/\/github.com\/ropas\/ sparrow .  Hakjoo Oh Kihong Heo Wonchan Lee Woosuk Lee and Kwangkeun Yi. 2012. The Sparrow static analyzer. https:\/\/github.com\/ropas\/ sparrow ."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209108.3209109"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38856-9_14"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453131"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192417"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032360"},{"key":"e_1_3_2_2_55_1","unstructured":"Tim R\u00fchsen. 2018. wget: Commit b3ff8ce. http:\/\/git.savannah. gnu.org\/cgit\/wget.git\/commit\/?id=b3ff8ce . src\/ftp-ls.c ( ftp_parse_vms_ls): Fix heap-buffer-overflow.  Tim R\u00fchsen. 2018. wget: Commit b3ff8ce. http:\/\/git.savannah. gnu.org\/cgit\/wget.git\/commit\/?id=b3ff8ce . src\/ftp-ls.c ( ftp_parse_vms_ls): Fix heap-buffer-overflow."},{"key":"e_1_3_2_2_56_1","unstructured":"Tim R\u00fchsen. 2018. wget: Commit f0d715b. http:\/\/git.savannah. gnu.org\/cgit\/wget.git\/commit\/?id=f0d715b . src\/ftp-ls.c ( ftp_parse_vms_ls): Fix heap-buffer-overflow.  Tim R\u00fchsen. 2018. wget: Commit f0d715b. http:\/\/git.savannah. gnu.org\/cgit\/wget.git\/commit\/?id=f0d715b . src\/ftp-ls.c ( ftp_parse_vms_ls): Fix heap-buffer-overflow."},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3188720"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594320"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276535"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238211"}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Phoenix AZ USA","acronym":"PLDI '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314616","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314616","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314616","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314616"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":61,"alternative-id":["10.1145\/3314221.3314616","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314616","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}