{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:59:06Z","timestamp":1769914746036,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T00:00:00Z","timestamp":1621814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,24]]},"DOI":"10.1145\/3433210.3453115","type":"proceedings-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T15:26:39Z","timestamp":1622820399000},"page":"731-743","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms"],"prefix":"10.1145","author":[{"given":"Dongyu","family":"Meng","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Michele","family":"Guerriero","sequence":"additional","affiliation":[{"name":"Politecnico di Milano, Milan, Italy"}]},{"given":"Aravind","family":"Machiry","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Hojjat","family":"Aghakhani","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Priyanka","family":"Bose","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Andrea","family":"Continella","sequence":"additional","affiliation":[{"name":"University of Twente, Twente, Netherlands"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache flink project. https:\/\/flink.apache.org\/. (Used version: 1.6.0).  Apache flink project. https:\/\/flink.apache.org\/. (Used version: 1.6.0)."},{"key":"e_1_3_2_1_2_1","unstructured":"Cppcheck - a tool for static c\/c+ code analysis.  Cppcheck - a tool for static c\/c+ code analysis."},{"key":"e_1_3_2_1_3_1","unstructured":"flawfinder - lexically find potential security flaws (\"hits\") in source code.  flawfinder - lexically find potential security flaws (\"hits\") in source code."},{"key":"e_1_3_2_1_4_1","volume-title":"http:\/\/deployingradius.com\/pscan\/","author":"Pscan","year":"2017","unstructured":"Pscan , http:\/\/deployingradius.com\/pscan\/ , 2017 . Pscan, http:\/\/deployingradius.com\/pscan\/, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/code.google.com\/archive\/p\/rough-auditing-tool-for-security\/","author":"Rats","year":"2017","unstructured":"Rats , https:\/\/code.google.com\/archive\/p\/rough-auditing-tool-for-security\/ , 2017 . Rats, https:\/\/code.google.com\/archive\/p\/rough-auditing-tool-for-security\/, 2017."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2016.7425809"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/8570"},{"key":"e_1_3_2_1_8_1","unstructured":"Paul E. Black. SARD. https:\/\/samate.nist.gov\/SARD\/.  Paul E. Black. SARD. https:\/\/samate.nist.gov\/SARD\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.10.027"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180445.3180453"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.06.003"},{"key":"e_1_3_2_1_12_1","unstructured":"Debian. Debian - the universal operating system. https:\/\/www.debian.org\/.  Debian. Debian - the universal operating system. https:\/\/www.debian.org\/."},{"key":"e_1_3_2_1_13_1","first-page":"33","article-title":"Coverage-guided kernel fuzzing with syzkaller","volume":"2","author":"Drysdale David","year":"2016","unstructured":"David Drysdale . Coverage-guided kernel fuzzing with syzkaller . Linux Weekly News , 2 : 33 , 2016 . David Drysdale. Coverage-guided kernel fuzzing with syzkaller. Linux Weekly News, 2:33, 2016.","journal-title":"Linux Weekly News"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00024"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/648"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106257"},{"key":"e_1_3_2_1_17_1","unstructured":"GitHub. GitHub. https:\/\/github.com.  GitHub. GitHub. https:\/\/github.com."},{"key":"e_1_3_2_1_18_1","unstructured":"GitHub. Github's public apis. https:\/\/developer.github.com\/v3\/. (Accessed: 2019-01--15).  GitHub. Github's public apis. https:\/\/developer.github.com\/v3\/. (Accessed: 2019-01--15)."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. syzbot. https:\/\/syzkaller.appspot.com\/.  Google. syzbot. https:\/\/syzkaller.appspot.com\/."},{"key":"e_1_3_2_1_20_1","volume-title":"GCC: the complete reference","author":"Griffith Arthur","year":"2002","unstructured":"Arthur Griffith . GCC: the complete reference . McGraw-Hill, Inc. , 2002 . Arthur Griffith. GCC: the complete reference. McGraw-Hill, Inc., 2002."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.112"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134319"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2011.103"},{"key":"e_1_3_2_1_24_1","volume-title":"Sang Peter Chin, and Tomo Lazovich. Automated software vulnerability detection with machine learning. CoRR, abs\/1803.04497","author":"Harer Jacob A.","year":"2018","unstructured":"Jacob A. Harer , Louis Y. Kim , Rebecca L. Russell , Onur Ozdemir , Leonard R. Kosta , Akshay Rangamani , Lei H. Hamilton , Gabriel I. Centeno , Jonathan R. Key , Paul M. Ellingwood , Marc W. McConley , Jeffrey M. Opper , Sang Peter Chin, and Tomo Lazovich. Automated software vulnerability detection with machine learning. CoRR, abs\/1803.04497 , 2018 . Jacob A. Harer, Louis Y. Kim, Rebecca L. Russell, Onur Ozdemir, Leonard R. Kosta, Akshay Rangamani, Lei H. Hamilton, Gabriel I. Centeno, Jonathan R. Key, Paul M. Ellingwood, Marc W. McConley, Jeffrey M. Opper, Sang Peter Chin, and Tomo Lazovich. Automated software vulnerability detection with machine learning. CoRR, abs\/1803.04497, 2018."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/53990.53994"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.62"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-008-9080-x"},{"key":"e_1_3_2_1_30_1","volume-title":"Experts Urge Rapid Patching of Struts Bug","author":"Krebs Brian","year":"2018","unstructured":"Brian Krebs . Experts Urge Rapid Patching of Struts Bug , 2018 . https:\/\/krebsonsecurity.com\/2018\/08\/experts-urge-rapid-patching-of-struts-bug\/. Brian Krebs. Experts Urge Rapid Patching of Struts Bug, 2018. https:\/\/krebsonsecurity.com\/2018\/08\/experts-urge-rapid-patching-of-struts-bug\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1293079"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"e_1_3_2_1_34_1","volume-title":"Sysevr: A framework for using deep learning to detect software vulnerabilities. CoRR, abs\/1807.06756","author":"Li Zhen","year":"2018","unstructured":"Zhen Li , Deqing Zou , Shouhuai Xu , Hai Jin , Yawei Zhu , Zhaoxuan Chen , Sujuan Wang , and Jialai Wang . Sysevr: A framework for using deep learning to detect software vulnerabilities. CoRR, abs\/1807.06756 , 2018 . Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen, Sujuan Wang, and Jialai Wang. Sysevr: A framework for using deep learning to detect software vulnerabilities. CoRR, abs\/1807.06756, 2018."},{"key":"e_1_3_2_1_35_1","volume-title":"Vuldeepecker: A deep learning-based system for vulnerability detection. CoRR, abs\/1801.01681","author":"Li Zhen","year":"2018","unstructured":"Zhen Li , Deqing Zou , Shouhuai Xu , Xinyu Ou , Hai Jin , Sujuan Wang , Zhijun Deng , and Yuyi Zhong . Vuldeepecker: A deep learning-based system for vulnerability detection. CoRR, abs\/1801.01681 , 2018 . Zhen Li, Deqing Zou, Shouhuai Xu, Xinyu Ou, Hai Jin, Sujuan Wang, Zhijun Deng, and Yuyi Zhong. Vuldeepecker: A deep learning-based system for vulnerability detection. CoRR, abs\/1801.01681, 2018."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"key":"e_1_3_2_1_37_1","first-page":"18","volume-title":"Proceedings of the 14th Conference on USENIX Security Symposium -","volume":"14","author":"Benjamin Livshits V.","year":"2005","unstructured":"V. Benjamin Livshits and Monica S. Lam . Finding security vulnerabilities in java applications with static analysis . In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14 , SSYM'05, pages 18 -- 18 , Berkeley, CA, USA , 2005 . USENIX Association. V. Benjamin Livshits and Monica S. Lam. Finding security vulnerabilities in java applications with static analysis. In Proceedings of the 14th Conference on USENIX Security Symposium - Volume 14, SSYM'05, pages 18--18, Berkeley, CA, USA, 2005. USENIX Association."},{"key":"e_1_3_2_1_38_1","first-page":"1007","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Machiry Aravind","year":"2017","unstructured":"Aravind Machiry , Chad Spensky , Jake Corina , Nick Stephens , Christopher Kruegel , and Giovanni Vigna . DR. CHECKER : A soundy analysis for linux kernel drivers . In 26th USENIX Security Symposium (USENIX Security 17) , pages 1007 -- 1024 , 2017 . Aravind Machiry, Chad Spensky, Jake Corina, Nick Stephens, Christopher Kruegel, and Giovanni Vigna. DR. CHECKER: A soundy analysis for linux kernel drivers. In 26th USENIX Security Symposium (USENIX Security 17), pages 1007--1024, 2017."},{"key":"e_1_3_2_1_39_1","volume-title":"February","author":"Malhotra Ruchika","year":"2015","unstructured":"Ruchika Malhotra . A systematic review of machine learning techniques for software fault prediction. Appl. Soft Comput., 27(C):504--518 , February 2015 . Ruchika Malhotra. A systematic review of machine learning techniques for software fault prediction. Appl. Soft Comput., 27(C):504--518, February 2015."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.1976.233837"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931041"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.19"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661685.2661687"},{"key":"e_1_3_2_1_44_1","volume-title":"Soundness and Completeness: With Precision","author":"Meyer Bertrand","year":"2019","unstructured":"Bertrand Meyer . Soundness and Completeness: With Precision , 2019 . https:\/\/cacm.acm.org\/blogs\/blog-cacm\/236068-soundness-and-completeness-with-precision\/fulltext. Bertrand Meyer. Soundness and Completeness: With Precision, 2019. https:\/\/cacm.acm.org\/blogs\/blog-cacm\/236068-soundness-and-completeness-with-precision\/fulltext."},{"key":"e_1_3_2_1_45_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Kai Chen , Greg Corrado , and Jeffrey Dean . Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 , 2013 . Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781, 2013."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70045-9"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70045-9"},{"key":"e_1_3_2_1_48_1","volume-title":"Building program vector representations for deep learning. CoRR, abs\/1409.3358","author":"Mou Lili","year":"2014","unstructured":"Lili Mou , Ge Li , Yuxuan Liu , Hao Peng , Zhi Jin , Yan Xu , and Lu Zhang . Building program vector representations for deep learning. CoRR, abs\/1409.3358 , 2014 . Lili Mou, Ge Li, Yuxuan Liu, Hao Peng, Zhi Jin, Yan Xu, and Lu Zhang. Building program vector representations for deep learning. CoRR, abs\/1409.3358, 2014."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738486"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315311"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1853919.1853923"},{"key":"e_1_3_2_1_52_1","unstructured":"nluedtke. Linux kernel cves. https:\/\/github.com\/nluedtke\/linux_kernel_cves. (Accessed: 2019-01--15).  nluedtke. Linux kernel cves. https:\/\/github.com\/nluedtke\/linux_kernel_cves. (Accessed: 2019-01--15)."},{"key":"e_1_3_2_1_53_1","unstructured":"Serkan Ozkan. Cve details: The ultimate security vulnerability datasource. https:\/\/www.cvedetails.com. (Accessed: 2019-01--15).  Serkan Ozkan. Cve details: The ultimate security vulnerability datasource. https:\/\/www.cvedetails.com. (Accessed: 2019-01--15)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813604"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859089"},{"key":"e_1_3_2_1_56_1","unstructured":"pmccabe. Mccabe-style function complexity and line counting. https:\/\/people.debian.org\/ bame\/pmccabe\/pmccabe.1. (Used version: 2.6).  pmccabe. Mccabe-style function complexity and line counting. https:\/\/people.debian.org\/ bame\/pmccabe\/pmccabe.1. (Used version: 2.6)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.02.009"},{"key":"e_1_3_2_1_58_1","volume-title":"McConley. Automated vulnerability detection in source code using deep representation learning. CoRR, abs\/1807.04320","author":"Russell Rebecca L.","year":"2018","unstructured":"Rebecca L. Russell , Louis Y. Kim , Lei H. Hamilton , Tomo Lazovich , Jacob A. Harer , Onur Ozdemir , Paul M. Ellingwood , and Marc W . McConley. Automated vulnerability detection in source code using deep representation learning. CoRR, abs\/1807.04320 , 2018 . Rebecca L. Russell, Louis Y. Kim, Lei H. Hamilton, Tomo Lazovich, Jacob A. Harer, Onur Ozdemir, Paul M. Ellingwood, and Marc W. McConley. Automated vulnerability detection in source code using deep representation learning. CoRR, abs\/1807.04320, 2018."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234183"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884877"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2340398"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.81"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414065"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048146"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264598"},{"key":"e_1_3_2_1_66_1","first-page":"379","volume-title":"Proceedings of the 17th Conference on Security Symposium, SS'08","author":"Tan Lin","year":"2008","unstructured":"Lin Tan , Xiaolan Zhang , Xiao Ma , Weiwei Xiong , and Yuanyuan Zhou . Autoises : Automatically inferring security specifications and detecting violations . In Proceedings of the 17th Conference on Security Symposium, SS'08 , pages 379 -- 394 , Berkeley, CA, USA , 2008 . USENIX Association. Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, and Yuanyuan Zhou. Autoises: Automatically inferring security specifications and detecting violations. In Proceedings of the 17th Conference on Security Symposium, SS'08, pages 379--394, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.12"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2000.898880"},{"key":"e_1_3_2_1_69_1","volume-title":"gcc: add fuzzing coverage","author":"Vyukov Dmitry","year":"2016","unstructured":"Dmitry Vyukov . gcc: add fuzzing coverage , 2016 . https:\/\/codereview.appspot.com\/280140043. Dmitry Vyukov. gcc: add fuzzing coverage, 2016. https:\/\/codereview.appspot.com\/280140043."},{"key":"e_1_3_2_1_70_1","volume-title":"Recommended kernel configs","author":"Vyukov Dmitry","year":"2019","unstructured":"Dmitry Vyukov . Recommended kernel configs , 2019 . https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/kernel_configs.md. Dmitry Vyukov. Recommended kernel configs, 2019. https:\/\/github.com\/google\/syzkaller\/blob\/master\/docs\/linux\/kernel_configs.md."},{"key":"e_1_3_2_1_71_1","article-title":"Accurate and scalable cross-architecture cross-os binary code search with emulation","author":"Xue Y.","year":"2018","unstructured":"Y. Xue , Z. Xu , M. Chandramohan , and Y. Liu . Accurate and scalable cross-architecture cross-os binary code search with emulation . IEEE Transactions on Software Engineering, pages 1--1 , 2018 . Y. Xue, Z. Xu, M. Chandramohan, and Y. Liu. Accurate and scalable cross-architecture cross-os binary code search with emulation. IEEE Transactions on Software Engineering, pages 1--1, 2018.","journal-title":"IEEE Transactions on Software Engineering, pages 1--1"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.44"},{"key":"e_1_3_2_1_74_1","first-page":"13","volume-title":"Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT'11","author":"Yamaguchi Fabian","year":"2011","unstructured":"Fabian Yamaguchi , Felix Lindner , and Konrad Rieck . Vulnerability extrapolation : Assisted discovery of vulnerabilities using machine learning . In Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT'11 , pages 13 -- 13 , Berkeley, CA, USA , 2011 . USENIX Association. Fabian Yamaguchi, Felix Lindner, and Konrad Rieck. Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning. In Proceedings of the 5th USENIX Conference on Offensive Technologies, WOOT'11, pages 13--13, Berkeley, CA, USA, 2011. USENIX Association."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421003"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.54"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516665"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.48"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950353"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134085"},{"key":"e_1_3_2_1_81_1","first-page":"51","volume-title":"Proceedings of the 19th European Conference on Artificial Intelligence (ECAI 2010) Workshop on Configuration","volume":"2010","author":"Zengler Christoph","year":"2010","unstructured":"Christoph Zengler and Wolfgang K\u00fcchlin . Encoding the linux kernel configuration in propositional logic . In Proceedings of the 19th European Conference on Artificial Intelligence (ECAI 2010) Workshop on Configuration , volume 2010 , pages 51 -- 56 , 2010 . Christoph Zengler and Wolfgang K\u00fcchlin. Encoding the linux kernel configuration in propositional logic. In Proceedings of the 19th European Conference on Artificial Intelligence (ECAI 2010) Workshop on Configuration, volume 2010, pages 51--56, 2010."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884839"},{"key":"e_1_3_2_1_83_1","volume-title":"How far we have progressed in the journey? an examination of cross-project defect prediction. ACM Transactions on Software Engineering and Methodology (TOSEM), 27(1):1","author":"Zhou Yuming","year":"2018","unstructured":"Yuming Zhou , Yibiao Yang , Hongmin Lu , Lin Chen , Yanhui Li , Yangyang Zhao , Junyan Qian , and Baowen Xu . How far we have progressed in the journey? an examination of cross-project defect prediction. ACM Transactions on Software Engineering and Methodology (TOSEM), 27(1):1 , 2018 . Yuming Zhou, Yibiao Yang, Hongmin Lu, Lin Chen, Yanhui Li, Yangyang Zhao, Junyan Qian, and Baowen Xu. How far we have progressed in the journey? an examination of cross-project defect prediction. ACM Transactions on Software Engineering and Methodology (TOSEM), 27(1):1, 2018."}],"event":{"name":"ASIA CCS '21: ACM Asia Conference on Computer and Communications Security","location":"Virtual Event Hong Kong","acronym":"ASIA CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3453115","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3433210.3453115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:12Z","timestamp":1750193292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3433210.3453115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,24]]},"references-count":83,"alternative-id":["10.1145\/3433210.3453115","10.1145\/3433210"],"URL":"https:\/\/doi.org\/10.1145\/3433210.3453115","relation":{},"subject":[],"published":{"date-parts":[[2021,5,24]]},"assertion":[{"value":"2021-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}