{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:07:40Z","timestamp":1759032460954,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3382494.3422165","type":"proceedings-article","created":{"date-parts":[[2020,10,23]],"date-time":"2020-10-23T16:59:24Z","timestamp":1603472364000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["On the use of C# Unsafe Code Context"],"prefix":"10.1145","author":[{"given":"Ehsan","family":"Firouzi","sequence":"first","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Ashkan","family":"Sami","sequence":"additional","affiliation":[{"name":"Shiraz University, Shiraz, Iran"}]},{"given":"Foutse","family":"Khomh","sequence":"additional","affiliation":[{"name":"Polytechnique Montr\u00e9al, Montr\u00e9al, Canada"}]},{"given":"Gias","family":"Uddin","sequence":"additional","affiliation":[{"name":"University of Calgary, Calgary, Canada"}]}],"member":"320","published-online":{"date-parts":[[2020,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Security Code Scan - static code analyzer for .NET. https:\/\/security-code-scan.github.io\/  2020. Security Code Scan - static code analyzer for .NET. https:\/\/security-code-scan.github.io\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00042"},{"key":"e_1_3_2_1_3_1","unstructured":"Mark Borg. 2017. C++\/C# interoperability. https:\/\/mark-borg.github.io\/blog\/2017\/interop  Mark Borg. 2017. C++\/C# interoperability. https:\/\/mark-borg.github.io\/blog\/2017\/interop"},{"key":"e_1_3_2_1_4_1","unstructured":"c sharpcorner. 2020. understanding-unsafe-code-in-C-Sharp. https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/security  c sharpcorner. 2020. understanding-unsafe-code-in-C-Sharp. https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/security"},{"volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 536--547","author":"Chen M.","key":"e_1_3_2_1_5_1","unstructured":"M. Chen , F. Fischer , N. Meng , X. Wang , and J. Grossklags . 2019. How Reliable is the Crowdsourced Knowledge of Security Implementation? . In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 536--547 . M. Chen, F. Fischer, N. Meng, X. Wang, and J. Grossklags. 2019. How Reliable is the Crowdsourced Knowledge of Security Implementation?. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 536--547."},{"key":"e_1_3_2_1_6_1","volume-title":"TIOBE Index for","author":"Company TIOBE","year":"2019","unstructured":"TIOBE Company . 2020. TIOBE Index for January 2019 . https:\/\/www.tiobe.com\/tiobe-index\/ TIOBE Company. 2020. TIOBE Index for January 2019. https:\/\/www.tiobe.com\/tiobe-index\/"},{"volume-title":"2019 IEEE Workshop on Mining and Analyzing Interaction Histories (MAINT). 2--6.","author":"Firouzi E.","key":"e_1_3_2_1_7_1","unstructured":"E. Firouzi and A. Sami . 2019. Visual Studio Automated Refactoring Tool Should Improve Development Time, but ReSharper Led to More Solution-Build Failures . In 2019 IEEE Workshop on Mining and Analyzing Interaction Histories (MAINT). 2--6. E. Firouzi and A. Sami. 2019. Visual Studio Automated Refactoring Tool Should Improve Development Time, but ReSharper Led to More Solution-Build Failures. In 2019 IEEE Workshop on Mining and Analyzing Interaction Histories (MAINT). 2--6."},{"volume-title":"NET Security: Writing Secure Applications Using C# or Visual Basic. NET. \" O'Reilly Media","author":"Freeman Adam","key":"e_1_3_2_1_8_1","unstructured":"Adam Freeman and Allen Jones . 2003. Programming . NET Security: Writing Secure Applications Using C# or Visual Basic. NET. \" O'Reilly Media , Inc .\". Adam Freeman and Allen Jones. 2003. Programming. NET Security: Writing Secure Applications Using C# or Visual Basic. NET. \" O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_9_1","unstructured":"PYPL Index. 2020. PYPL Popularity of Programming Language. http:\/\/pypl.github.io\/PYPL.html  PYPL Index. 2020. PYPL Popularity of Programming Language. http:\/\/pypl.github.io\/PYPL.html"},{"volume-title":"NET framework security","author":"LaMacchia Brian A","key":"e_1_3_2_1_10_1","unstructured":"Brian A LaMacchia , Sebastian Lange , Matthew Lyons , Rudi Martin , and Kevin T Price . 2002. NET framework security . Addison-Wesley Reading . Brian A LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, and Kevin T Price. 2002. NET framework security. Addison-Wesley Reading."},{"volume-title":"Secure Coding Practices in Java: Challenges and Vulnerabilities. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). 372--383","author":"Meng N.","key":"e_1_3_2_1_11_1","unstructured":"N. Meng , S. Nagy , D. Yao , W. Zhuang , and G. Arango-Argoty . 2018 . Secure Coding Practices in Java: Challenges and Vulnerabilities. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). 372--383 . N. Meng, S. Nagy, D. Yao, W. Zhuang, and G. Arango-Argoty. 2018. Secure Coding Practices in Java: Challenges and Vulnerabilities. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). 372--383."},{"key":"e_1_3_2_1_12_1","unstructured":"Joe McManus MGR. 2018. SEI CERT Java Coding Standard. https:\/\/wiki.sei.cmu.edu\/confluence\/display\/java\/SEI+CERT+Oracle+Coding+Standard+for+Java  Joe McManus MGR. 2018. SEI CERT Java Coding Standard. https:\/\/wiki.sei.cmu.edu\/confluence\/display\/java\/SEI+CERT+Oracle+Coding+Standard+for+Java"},{"key":"e_1_3_2_1_13_1","unstructured":"Microsoft. 2015. Unsafe code and pointers. https:\/\/docs.microsoft.com\/en-us\/dotnet\/csharp\/programming-guide\/unsafe-code-pointers\/  Microsoft. 2015. Unsafe code and pointers. https:\/\/docs.microsoft.com\/en-us\/dotnet\/csharp\/programming-guide\/unsafe-code-pointers\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Microsoft. 2016. CA1060: Move P\/Invokes to NativeMethods class. https:\/\/docs.microsoft.com\/en-us\/visualstudio\/code-quality\/ca1060?view=vs-2019  Microsoft. 2016. CA1060: Move P\/Invokes to NativeMethods class. https:\/\/docs.microsoft.com\/en-us\/visualstudio\/code-quality\/ca1060?view=vs-2019"},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft. 2020. Interoperability (C# Programming Guide). https:\/\/docs.microsoft.com\/en-us\/dotnet\/csharp\/programming-guide\/interop\/  Microsoft. 2020. Interoperability (C# Programming Guide). https:\/\/docs.microsoft.com\/en-us\/dotnet\/csharp\/programming-guide\/interop\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Microsoft. 2020. Microsoft Security. https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/security  Microsoft. 2020. Microsoft Security. https:\/\/docs.microsoft.com\/en-us\/dotnet\/standard\/security"},{"key":"e_1_3_2_1_17_1","unstructured":"microsoft. 2020. unsafe-code-pointers. https:\/\/docs.microsoft.com\/en-us\/dotnet\/csharp\/programming-guide\/unsafe-code-pointers  microsoft. 2020. unsafe-code-pointers. https:\/\/docs.microsoft.com\/en-us\/dotnet\/csharp\/programming-guide\/unsafe-code-pointers"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292561"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Christian Nagel. 2018. Professional C# 7 and. NET Core 2.0. John Wiley & Sons.  Christian Nagel. 2018. Professional C# 7 and. NET Core 2.0. John Wiley & Sons.","DOI":"10.1002\/9781119549147"},{"key":"e_1_3_2_1_20_1","unstructured":"NICOLAS PORTMANN. 2019. Unsafe array access and pointer arithmetics in C#. https:\/\/ndportmann.com\/system-runtime-compilerservices-unsafe\/  NICOLAS PORTMANN. 2019. Unsafe array access and pointer arithmetics in C#. https:\/\/ndportmann.com\/system-runtime-compilerservices-unsafe\/"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345659"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00040"},{"key":"e_1_3_2_1_23_1","unstructured":"Robert Schiela. 2020. SEI CERT C++Coding Standard. https:\/\/wiki.sei.cmu.edu\/confluence\/pages\/viewpage.action?pageId=88046682  Robert Schiela. 2020. SEI CERT C++Coding Standard. https:\/\/wiki.sei.cmu.edu\/confluence\/pages\/viewpage.action?pageId=88046682"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.57"},{"key":"e_1_3_2_1_25_1","unstructured":"stackexchange. 2020. Stack Exchange Directory Listing-Internet Archive. https:\/\/archive.org\/download\/stackexchange  stackexchange. 2020. Stack Exchange Directory Listing-Internet Archive. https:\/\/archive.org\/download\/stackexchange"},{"key":"e_1_3_2_1_26_1","unstructured":"David Svoboda. 2018. SEI CERT C Coding Standard. https:\/\/wiki.sei.cmu.edu\/confluence\/display\/c\/SEI+CERT+C+Coding+Standard  David Svoboda. 2018. SEI CERT C Coding Standard. https:\/\/wiki.sei.cmu.edu\/confluence\/display\/c\/SEI+CERT+C+Coding+Standard"},{"key":"e_1_3_2_1_27_1","unstructured":"university of TARTU. 2020. imageprocessing. https:\/\/sisu.ut.ee\/imageprocessing\/book\/1  university of TARTU. 2020. imageprocessing. https:\/\/sisu.ut.ee\/imageprocessing\/book\/1"},{"key":"e_1_3_2_1_28_1","volume-title":"An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. arXiv preprint arXiv:1910.01321","author":"Verdi Morteza","year":"2019","unstructured":"Morteza Verdi , Ashkan Sami , Jafar Akhondali , Foutse Khomh , Gias Uddin , and Alireza Karami Motlagh . 2019. An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. arXiv preprint arXiv:1910.01321 ( 2019 ). Morteza Verdi, Ashkan Sami, Jafar Akhondali, Foutse Khomh, Gias Uddin, and Alireza Karami Motlagh. 2019. An Empirical Study of C++ Vulnerabilities in Crowd-Sourced Code Examples. arXiv preprint arXiv:1910.01321 (2019)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"e_1_3_2_1_30_1","unstructured":"Rajesh VS. 2019. pointers inC#. https:\/\/www.c-sharpcorner.com\/article\/pointers-in-C-Sharp\/  Rajesh VS. 2019. pointers inC#. https:\/\/www.c-sharpcorner.com\/article\/pointers-in-C-Sharp\/"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.09.007"},{"key":"e_1_3_2_1_32_1","unstructured":"Chris Woodruff. 2018. C# 7.2 and 7.3 updates for stackalloc. https:\/\/blog.jetbrains.com\/dotnet\/2018\/09\/17\/c-sharp-updates-for-stackalloc\/  Chris Woodruff. 2018. C# 7.2 and 7.3 updates for stackalloc. https:\/\/blog.jetbrains.com\/dotnet\/2018\/09\/17\/c-sharp-updates-for-stackalloc\/"}],"event":{"name":"ESEM '20: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Bari Italy","acronym":"ESEM '20"},"container-title":["Proceedings of the 14th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382494.3422165","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3382494.3422165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:26Z","timestamp":1750199906000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3382494.3422165"}},"subtitle":["An Empirical Study of Stack Overflow"],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":32,"alternative-id":["10.1145\/3382494.3422165","10.1145\/3382494"],"URL":"https:\/\/doi.org\/10.1145\/3382494.3422165","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}