{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T20:51:42Z","timestamp":1768337502137,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409678","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:09:10Z","timestamp":1605042550000},"page":"1101-1113","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["SinkFinder: harvesting hundreds of unknown interesting function pairs with just one seed"],"prefix":"10.1145","author":[{"given":"Pan","family":"Bian","sequence":"first","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Bin","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Xidong","family":"Wang","sequence":"additional","affiliation":[{"name":"Renmin University of China, China"}]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786849"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Glenn Ammons Rastislav Bod\u00edk and James R Larus. 2002. Mining specifications. ACM Sigplan Notices 37 1 ( 2002 ) 4-16.  Glenn Ammons Rastislav Bod\u00edk and James R Larus. 2002. Mining specifications. ACM Sigplan Notices 37 1 ( 2002 ) 4-16.","DOI":"10.1145\/565816.503275"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_4_1","volume-title":"Efective Static Analysis of Concurrency Use-After-Free Bugs in Linux Device Drivers. In 2019 USENIX Annual Technical Conference, USENIX ATC 2019","author":"Bai Jia-Ju","year":"2019"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236032"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Piotr Bojanowski Edouard Grave Armand Joulin and Tomas Mikolov. 2017. Enriching Word Vectors with Subword Information. TACL 5 ( 2017 ) 135-146. https:\/\/transacl.org\/ojs\/index.php\/tacl\/article\/view\/999  Piotr Bojanowski Edouard Grave Armand Joulin and Tomas Mikolov. 2017. Enriching Word Vectors with Subword Information. TACL 5 ( 2017 ) 135-146. https:\/\/transacl.org\/ojs\/index.php\/tacl\/article\/view\/999","DOI":"10.1162\/tacl_a_00051"},{"key":"e_1_3_2_2_8_1","first-page":"209","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008","author":"Cadar Cristian","year":"2008"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273486"},{"key":"e_1_3_2_2_10_1","volume-title":"Editor","author":"Chawla Nitesh V.","year":"2004"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/586094.586097"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/5397.5399"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236059"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA419626"},{"key":"e_1_3_2_2_16_1","first-page":"57","volume-title":"Proceedings of the 18th ACM Symposium on Operating System Principles, SOSP 2001","author":"Engler Dawson R.","year":"2001"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.54"},{"key":"e_1_3_2_2_18_1","volume-title":"KMiner: Uncovering Memory Corruption in Linux. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Gens David","year":"2018"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"e_1_3_2_2_20_1","volume-title":"Garcia","author":"He Haibo","year":"2009"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236085"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03013-0_14"},{"key":"e_1_3_2_2_24_1","first-page":"345","volume-title":"Proceedings of the 25th USENIX Security Symposium, USENIX Security 16","author":"Jana Suman","year":"2016"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970354"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.31274\/etd-180810-6021"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_2_28_1","first-page":"161","volume-title":"7th Symposium on Operating Systems Design and Implementation (OSDI'06)","author":"Kremenek Ted","year":"2006"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635890"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2006.51"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884870"},{"key":"e_1_3_2_2_33_1","first-page":"179","volume-title":"Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003 )","author":"Liu Bing","year":"2003"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081754"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 14th USENIX Security Symposium","author":"Benjamin Livshits V.","year":"2005"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401827.1401838"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294272"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_2_39_1","unstructured":"Tomas Mikolov Kai Chen Greg Corrado and Jefrey Dean. 2013. Eficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781 ( 2013 ). http:\/\/arxiv.org\/abs\/1301.3781  Tomas Mikolov Kai Chen Greg Corrado and Jefrey Dean. 2013. Eficient Estimation of Word Representations in Vector Space. CoRR abs\/1301.3781 ( 2013 ). http:\/\/arxiv.org\/abs\/1301.3781"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844136"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635924"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.47"},{"key":"e_1_3_2_2_43_1","volume-title":"Nam H. Pham, Jafar M. Al-Kofahi, and Tien N. Nguyen.","author":"Nguyen Tung Thanh","year":"2009"},{"key":"e_1_3_2_2_44_1","first-page":"179","volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering (ASE '10)","author":"Corina"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227114"},{"key":"e_1_3_2_2_47_1","first-page":"379","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Tan Lin","year":"2008"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.72"},{"key":"e_1_3_2_2_49_1","volume-title":"Proceedings of the 2nd Summit on Advances in Programming Languages, SNAPL 2017","author":"Toman John","year":"2017"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287632"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516665"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134620"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189256.1189259"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134085"},{"key":"e_1_3_2_2_55_1","first-page":"363","volume-title":"Proceedings of the 25th USENIX Security Symposium, USENIX Security 16","author":"Yun Insu","year":"2016"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194001000487"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:39Z","timestamp":1750203879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":55,"alternative-id":["10.1145\/3368089.3409678","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409678","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}