{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T19:38:12Z","timestamp":1773517092162,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["National Satellite of Excellence in Trustworthy Software System"],"award-info":[{"award-number":["National Satellite of Excellence in Trustworthy Software System"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902170"],"award-info":[{"award-number":["61902170"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,11]]},"DOI":"10.1145\/3460319.3464821","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T22:18:43Z","timestamp":1625782723000},"page":"633-645","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Automated patch backporting in Linux (experience paper)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5409-4864","authenticated-orcid":false,"given":"Ridwan","family":"Shariffdeen","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Xiang","family":"Gao","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Gregory J.","family":"Duck","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8633-3372","authenticated-orcid":false,"given":"Shin Hwei","family":"Tan","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Julia","family":"Lawall","sequence":"additional","affiliation":[{"name":"Inria, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7127-1137","authenticated-orcid":false,"given":"Abhik","family":"Roychoudhury","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Backports project. https:\/\/backports.wiki.kernel.org\/index.php\/Main_Page Accessed: 2020-12-20.  2020. Backports project. https:\/\/backports.wiki.kernel.org\/index.php\/Main_Page Accessed: 2020-12-20."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. Guidelines for backporting Linux patches. https:\/\/www.kernel.org\/doc\/Documentation\/process\/stable-kernel-rules.rst Accessed: 2021-01-24.  2021. Guidelines for backporting Linux patches. https:\/\/www.kernel.org\/doc\/Documentation\/process\/stable-kernel-rules.rst Accessed: 2021-01-24."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. Linux Patch Tool. https:\/\/man7.org\/linux\/man-pages\/man1\/patch.1.html Accessed: 2020-11-20.  2021. Linux Patch Tool. https:\/\/man7.org\/linux\/man-pages\/man1\/patch.1.html Accessed: 2020-11-20."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. LLVM GumTree implementation. https:\/\/github.com\/llvm\/llvm-project\/main\/clang\/tools\/clang-diff Accessed: 2021-1-30.  2021. LLVM GumTree implementation. https:\/\/github.com\/llvm\/llvm-project\/main\/clang\/tools\/clang-diff Accessed: 2021-1-30."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2013.6679385"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360585"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338952"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428287"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330558"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330559"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318162"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926423"},{"key":"e_1_3_2_1_15_1","volume-title":"A case study of cross-branch porting in Linux Kernel. Master\u2019s thesis","author":"Hua Jinru","unstructured":"Jinru Hua . 2014. A case study of cross-branch porting in Linux Kernel. Master\u2019s thesis . University of Texas - Austin. Jinru Hua. 2014. A case study of cross-branch porting in Linux Kernel. Master\u2019s thesis. University of Texas - Austin."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00033"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.30"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Annual Technical Conference (USENIX ATC \u201918)","author":"Lawall Julia","year":"2018","unstructured":"Julia Lawall and Gilles Muller . 2018 . Coccinelle: 10 years of automated evolution in the Linux kernel . In USENIX Annual Technical Conference (USENIX ATC \u201918) . USENIX Association, USA. 601\u2013614. isbn:978 1931971447 https:\/\/hal.inria.fr\/hal-01853271 Julia Lawall and Gilles Muller. 2018. Coccinelle: 10 years of automated evolution in the Linux kernel. In USENIX Annual Technical Conference (USENIX ATC \u201918). USENIX Association, USA. 601\u2013614. isbn:9781931971447 https:\/\/hal.inria.fr\/hal-01853271"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330577"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993537"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913)","author":"Meng Na","unstructured":"Na Meng , Miryung Kim , and Kathryn S . McKinley. 2013. LASE: Locating and applying systematic edits by learning from examples . In Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913) . IEEE Press, Piscataway, NJ, USA. 502\u2013511. isbn:978-1-4673-3076-3 https:\/\/dl.acm.org\/doi\/10.5555\/2486788.2486855 Na Meng, Miryung Kim, and Kathryn S. McKinley. 2013. LASE: Locating and applying systematic edits by learning from examples. In Proceedings of the 2013 International Conference on Software Engineering (ICSE \u201913). IEEE Press, Piscataway, NJ, USA. 502\u2013511. isbn:978-1-4673-3076-3 https:\/\/dl.acm.org\/doi\/10.5555\/2486788.2486855"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360569"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.12"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00089"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486890"},{"key":"e_1_3_2_1_30_1","volume-title":"A note on inductive generalization. Machine intelligence, 5, 1","author":"Plotkin Gordon D","year":"1970","unstructured":"Gordon D Plotkin . 1970. A note on inductive generalization. Machine intelligence, 5, 1 ( 1970 ), 153\u2013163. Gordon D Plotkin. 1970. A note on inductive generalization. Machine intelligence, 5, 1 (1970), 153\u2013163."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693095"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2015.23"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.44"},{"key":"e_1_3_2_1_34_1","volume-title":"USENIX Annual Technical Conference (USENIX ATC\u201920)","author":"Serrano Lucas","year":"2020","unstructured":"Lucas Serrano , Van-Anh Nguyen , Ferdian Thung , Lingxiao Jiang , David Lo , Julia Lawall , and Gilles Muller . 2020 . SPINFER: Inferring semantic patches for the Linux kernel . In USENIX Annual Technical Conference (USENIX ATC\u201920) . USENIX Association, 235\u2013248. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/serrano Lucas Serrano, Van-Anh Nguyen, Ferdian Thung, Lingxiao Jiang, David Lo, Julia Lawall, and Gilles Muller. 2020. SPINFER: Inferring semantic patches for the Linux kernel. In USENIX Annual Technical Conference (USENIX ATC\u201920). USENIX Association, 235\u2013248. https:\/\/www.usenix.org\/conference\/atc20\/presentation\/serrano"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3412376"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375599"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065045"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180243"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.71"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337269"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931050"}],"event":{"name":"ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Denmark","acronym":"ISSTA '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464821","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460319.3464821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:31Z","timestamp":1750193311000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":41,"alternative-id":["10.1145\/3460319.3464821","10.1145\/3460319"],"URL":"https:\/\/doi.org\/10.1145\/3460319.3464821","relation":{},"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}