{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:47:32Z","timestamp":1770281252193,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ERC Starting Grant","award":["680358"],"award-info":[{"award-number":["680358"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314648","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"760-774","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Scalable taint specification inference with big code"],"prefix":"10.1145","author":[{"given":"Victor","family":"Chibotaru","sequence":"first","affiliation":[{"name":"DeepCode, Switzerland"}]},{"given":"Benjamin","family":"Bichsel","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]},{"given":"Veselin","family":"Raychev","sequence":"additional","affiliation":[{"name":"DeepCode, Switzerland"}]},{"given":"Martin","family":"Vechev","sequence":"additional","affiliation":[{"name":"ETH Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"6","article-title":"FlowDroid: Precise Context, Flow","volume":"49","author":"Arzt Steven","year":"2014","unstructured":"Steven Arzt , Siegfried Rasthofer , Christian Fritz , Eric Bodden , Alexandre Bartel , Jacques Klein , Yves Le Traon , Damien Octeau , and Patrick McDaniel . 2014 . FlowDroid: Precise Context, Flow , Field, Objectsensitive and Lifecycle-aware Taint Analysis for Android Apps. SIG-PLAN Not. 49 , 6 (June 2014), 259\u2013269. Steven Arzt, Siegfried Rasthofer, Christian Fritz, Eric Bodden, Alexandre Bartel, Jacques Klein, Yves Le Traon, Damien Octeau, and Patrick McDaniel. 2014. FlowDroid: Precise Context, Flow, Field, Objectsensitive and Lifecycle-aware Taint Analysis for Android Apps. SIG-PLAN Not. 49, 6 (June 2014), 259\u2013269.","journal-title":"SIG-PLAN Not."},{"key":"e_1_3_2_2_2_1","unstructured":"Thorsten Brants Ashok C. Popat Peng Xu Franz J. Och Jeffrey Dean and Google Inc. 2007. Large language models in machine translation. In In EMNLP. 858\u2013867.  Thorsten Brants Ashok C. Popat Peng Xu Franz J. Och Jeffrey Dean and Google Inc. 2007. Large language models in machine translation. In In EMNLP. 858\u2013867."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771810"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27937-9_15"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90060-D"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(93)90036-B"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"key":"e_1_3_2_2_8_1","volume-title":"SCanDroid: Automated security certification of Android applications. (01","author":"Fuchs Adam","year":"2009","unstructured":"Adam Fuchs , Avik Chaudhuri , and Jeffrey S Foster . 2009. SCanDroid: Automated security certification of Android applications. (01 2009 ). Adam Fuchs, Avik Chaudhuri, and Jeffrey S Foster. 2009. SCanDroid: Automated security certification of Android applications. (01 2009)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_2_10_1","unstructured":"Min Gyung Kang Stephen McCamant Pongsin Poosankam and Dawn Xiaodong Song. 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In NDSS.  Min Gyung Kang Stephen McCamant Pongsin Poosankam and Dawn Xiaodong Song. 2011. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. In NDSS."},{"key":"e_1_3_2_2_11_1","volume-title":"SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications. (11","author":"Kim Jinyung","year":"2018","unstructured":"Jinyung Kim , Yongho Yoon , Kwangkeun Yi , and Junbum Shin . 2018 . SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications. (11 2018). Jinyung Kim, Yongho Yoon, Kwangkeun Yi, and Junbum Shin. 2018. SCANDAL: Static Analyzer for Detecting Privacy Leaks in Android Applications. (11 2018)."},{"key":"e_1_3_2_2_12_1","volume-title":"Kingma and Jimmy Ba","author":"Diederik","year":"2014","unstructured":"Diederik P. Kingma and Jimmy Ba . 2014 . Adam : A Method for Stochastic Optimization. CoRR abs\/1412.6980 (2014). arXiv: 1412.6980 http:\/\/arxiv.org\/abs\/1412.6980 Diederik P. Kingma and Jimmy Ba. 2014. Adam: A Method for Stochastic Optimization. CoRR abs\/1412.6980 (2014). arXiv: 1412.6980 http:\/\/arxiv.org\/abs\/1412.6980"},{"key":"e_1_3_2_2_13_1","volume-title":"Probabilistic Graphical Models: Principles and Techniques - Adaptive Computation and Machine Learning","author":"Koller Daphne","unstructured":"Daphne Koller and Nir Friedman . 2009. Probabilistic Graphical Models: Principles and Techniques - Adaptive Computation and Machine Learning . The MIT Press . Daphne Koller and Nir Friedman. 2009. Probabilistic Graphical Models: Principles and Techniques - Adaptive Computation and Machine Learning. The MIT Press."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542485"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 14th Conference on USENIX Security Symposium -","volume":"14","author":"Benjamin Livshits V.","unstructured":"V. Benjamin Livshits and Monica S. Lam . 2005. Finding Security Vulnerabilities in Java Applications with Static Analysis . In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 (SSYM\u201905). USENIX Association, Berkeley, CA, USA, 18\u201318. http: \/\/dl.acm.org\/citation.cfm?id=1251398.1251416 V. Benjamin Livshits and Monica S. Lam. 2005. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 (SSYM\u201905). USENIX Association, Berkeley, CA, USA, 18\u201318. http: \/\/dl.acm.org\/citation.cfm?id=1251398.1251416"},{"key":"e_1_3_2_2_16_1","unstructured":"T. Minka J.M. Winn J.P. Guiver Y. Zaykov D. Fabian and J. Bronskill. 2018. \/Infer.NET 0.3. Microsoft Research Cambridge. http:\/\/dotnet.github.io\/infer.  T. Minka J.M. Winn J.P. Guiver Y. Zaykov D. Fabian and J. Bronskill. 2018. \/Infer.NET 0.3. Microsoft Research Cambridge. http:\/\/dotnet.github.io\/infer."},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Xiaodong Song . 2005 . Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA. http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/05\/proceedings\/ papers\/taintcheck.pdf James Newsome and Dawn Xiaodong Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2005, San Diego, California, USA. http:\/\/www.isoc.org\/isoc\/conferences\/ndss\/05\/proceedings\/ papers\/taintcheck.pdf"},{"key":"e_1_3_2_2_18_1","unstructured":"OWASP. 2015. OWASP on Path Traversal. https:\/\/www.owasp.org\/ index.php\/Path_Traversal .  OWASP. 2015. OWASP on Path Traversal. https:\/\/www.owasp.org\/ index.php\/Path_Traversal ."},{"key":"e_1_3_2_2_19_1","unstructured":"OWASP. 2017. OWASP Top 10 Project. https:\/\/www.owasp.org\/index. php\/Category:OWASP_Top_Ten_Project .  OWASP. 2017. OWASP Top 10 Project. https:\/\/www.owasp.org\/index. php\/Category:OWASP_Top_Ten_Project ."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2373377"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1561\/2500000014"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_15"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542486"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCSE.2012.26"},{"key":"e_1_3_2_2_27_1","volume-title":"Exploring Artificial Intelligence in the New Millennium","author":"Yedidia Jonathan S.","unstructured":"Jonathan S. Yedidia , William T. Freeman , and Yair Weiss . 2003. Exploring Artificial Intelligence in the New Millennium . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA, 239\u2013269. http:\/\/dl.acm.org\/ citation.cfm?id=779343.779352 Jonathan S. Yedidia, William T. Freeman, and Yair Weiss. 2003. Exploring Artificial Intelligence in the New Millennium. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 239\u2013269. http:\/\/dl.acm.org\/ citation.cfm?id=779343.779352"}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Phoenix AZ USA","acronym":"PLDI '19","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:29Z","timestamp":1750204409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":27,"alternative-id":["10.1145\/3314221.3314648","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314648","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}