{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:19:40Z","timestamp":1752981580754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["1823262"],"award-info":[{"award-number":["1823262"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416639","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"324-335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["ER catcher"],"prefix":"10.1145","author":[{"given":"Navid","family":"Salehnamadi","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Abdulaziz","family":"Alshayban","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Iftekhar","family":"Ahmed","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Sam","family":"Malek","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"2020. ER Catcher Formal Proofs. Retrieved August 31, 2020 from https:\/\/github.com\/seal-hub\/ERCatcher\/blob\/master\/ERCatcher_Appendix.pdf"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"2020. ER Catcher Tool. Retrieved August 31, 2020 from https:\/\/github.com\/seal-hub\/ERCatcher"},{"key":"e_1_3_2_1_3_1","unstructured":"2020. F-Droid. Retrieved March 4 2020 from https:\/\/f-droid.org\/en\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_16"},{"key":"e_1_3_2_1_5_1","unstructured":"Android. 2020. UI\/Application Exerciser Monkey. Retrieved February 2 2020 from https:\/\/developer.android.com\/studio\/test\/monkey"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884816"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.61"},{"key":"e_1_3_2_1_9_1","volume-title":"Covert: Compositional analysis of android inter-app permission leakage","author":"Bagheri Hamid","year":"2015","unstructured":"Hamid Bagheri, Alireza Sadeghi, Joshua Garcia, and Sam Malek. 2015. Covert: Compositional analysis of android inter-app permission leakage. IEEE transactions on Software Engineering 41, 9 (2015), 866--886."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814303"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582440"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Yinzhi Cao Yanick Fratantonio Antonio Bianchi Manuel Egele Christopher Kruegel Giovanni Vigna and Yan Chen. 2015. EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework.. In NDSS.","DOI":"10.14722\/ndss.2015.23140"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26961-0_11"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945468"},{"key":"e_1_3_2_1_15_1","unstructured":"John Erickson Madanlal Musuvathi Sebastian Burckhardt and Kirk Olynyk. [n.d.]. Effective Data-Race Detection for the Kernel. ([n.d.]) 12."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238170"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168829"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71316-6_18"},{"volume-title":"Computer architecture: a quantitative approach","author":"Hennessy John L","key":"e_1_3_2_1_19_1","unstructured":"John L Hennessy and David A Patterson. 2011. Computer architecture: a quantitative approach. Elsevier."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3093336.3037712"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594330"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173173"},{"volume-title":"Search-Based Energy Testing of Android. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1119--1130","author":"Jabbarvand R.","key":"e_1_3_2_1_23_1","unstructured":"R. Jabbarvand, J. Lin, and S. Malek. 2019. Search-Based Energy Testing of Android. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 1119--1130."},{"key":"e_1_3_2_1_24_1","unstructured":"Leslie Lamport. 2019. Time clocks and the ordering of events in a distributed system. In Concurrency: the Works of Leslie Lamport. 179--196."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36579-6_12"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416623"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858965.2814272"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092733"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594311"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070538"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487568.2487569"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254095"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1889997.1890000"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/996893.996845"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509538"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786836"},{"volume-title":"Poster: A Benchmark for Event-Race Analysis in Android Apps. In Proceedings of the 18th Annual International Conference on Mobile Systems, Applications, and Services.","author":"Salehnamadi Navid","key":"e_1_3_2_1_39_1","unstructured":"Navid Salehnamadi, Abdulaziz Alshayban, Iftekhar Ahmed, and Sam Malek. [n.d.]. Poster: A Benchmark for Event-Race Analysis in Android Apps. In Proceedings of the 18th Annual International Conference on Mobile Systems, Applications, and Services."},{"key":"e_1_3_2_1_40_1","unstructured":"Micha Sharir Amir Pnueli et al. 1978. Two approaches to interprocedural data flow analysis. New York University. Courant Institute of Mathematical Sciences ...."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970320"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238224"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00062"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2018.03.008"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00035"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2121"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259053"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.50"},{"key":"e_1_3_2_1_49_1","unstructured":"Wei Zhang Junghee Lim Ramya Olichandran Joel Scherpelz Guoliang Jin Shan Lu and Thomas Reps. [n.d.]. ConSeq: Detecting Concurrency Bugs through Sequential Errors. ([n. d.]) 14."},{"key":"e_1_3_2_1_50_1","unstructured":"Wei Zhang Chong Sun and Shan Lu. [n.d.]. ConMem: Detecting Severe Concurrency Bugs through an Effect-Oriented Approach. ([n.d.]) 13."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745802.2745808"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168813"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416639","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:22Z","timestamp":1750193242000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416639"}},"subtitle":["a static analysis framework for accurate and scalable event-race detection in Android"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":52,"alternative-id":["10.1145\/3324884.3416639","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416639","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}