{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:57:25Z","timestamp":1752983845725,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,19]]},"DOI":"10.1145\/3501774.3501781","type":"proceedings-article","created":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T16:12:37Z","timestamp":1648311157000},"page":"45-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["The Impact of Undefined Behavior on Compiler Optimization"],"prefix":"10.1145","author":[{"given":"Zefan","family":"Shen","sequence":"first","affiliation":[{"name":"The University of Hertfordshire, UK"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337313"},{"key":"e_1_3_2_1_2_1","unstructured":"H.Tan \u201dC language programming[M] \u201d [EB\/OL] 2011  H.Tan \u201dC language programming[M] \u201d [EB\/OL] 2011"},{"key":"e_1_3_2_1_3_1","volume-title":"Expert C Programming: Deep C Secrets, page 15","author":"Hall","year":"1994","unstructured":"P. Hall , van der Linden , Expert C Programming: Deep C Secrets, page 15 , 1994 P. Hall, van der Linden, Expert C Programming: Deep C Secrets, page 15, 1994"},{"key":"e_1_3_2_1_4_1","volume-title":"The LLVM Project Blog","author":"Lattner","year":"2011","unstructured":"C. Lattner ,\u201d What every C programmer should know about undefined behavior. The LLVM Project Blog \u201d, 2011 , [Online] https:\/\/blog.llvm.org\/2011\/05\/what-every-c-programmer-should-know.html C. Lattner,\u201d What every C programmer should know about undefined behavior. The LLVM Project Blog\u201d, 2011, [Online] https:\/\/blog.llvm.org\/2011\/05\/what-every-c-programmer-should-know.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Wang\n      X Chen\n      H Cheung\n      A \u201d \n  Undefined behavior: what happened to my code?\u201d[C]\/\/Proceedings of the Asia-Pacific Workshop on Systems.\n  2012\n  :  \n  1\n  -\n  7  Wang X Chen H Cheung A \u201d Undefined behavior: what happened to my code?\u201d[C]\/\/Proceedings of the Asia-Pacific Workshop on Systems. 2012: 1-7","DOI":"10.1145\/2349896.2349905"},{"volume-title":"IEEE Security and Privacy Workshops. IEEE","author":"D'Silva V","key":"e_1_3_2_1_6_1","unstructured":"D'Silva V , Payer M , Song D. \u201d The correctness-security gap in compiler optimization\u201d [C]\/\/2015 IEEE Security and Privacy Workshops. IEEE , 2015: 73-87 D'Silva V, Payer M, Song D.\u201d The correctness-security gap in compiler optimization\u201d [C]\/\/2015 IEEE Security and Privacy Workshops. IEEE, 2015: 73-87"},{"key":"e_1_3_2_1_7_1","unstructured":"SO Documentation \u201d Undefined Behavior\u201d https:\/\/sodocumentation.net\/c\/topic\/364\/undefinedbehavior  SO Documentation \u201d Undefined Behavior\u201d https:\/\/sodocumentation.net\/c\/topic\/364\/undefinedbehavior"},{"key":"e_1_3_2_1_8_1","unstructured":"J. Hurchalla \u201d [C\/C++] Surprises and Undefined Behavior From Unsigned Integer Promotion \u201d 2019 https:\/\/jeffhurchalla.com\/2019\/01\/16\/c-c-surprises-and-undefined-behavior-due-tounsigned-integer-promotion\/  J. Hurchalla \u201d [C\/C++] Surprises and Undefined Behavior From Unsigned Integer Promotion \u201d 2019 https:\/\/jeffhurchalla.com\/2019\/01\/16\/c-c-surprises-and-undefined-behavior-due-tounsigned-integer-promotion\/"},{"key":"e_1_3_2_1_9_1","unstructured":"GCC Bugzilla \u201d Debate over GCC optimization (alleged) bug 30475 \u201d 2007 https:\/\/gcc.gnu.org\/bugzilla\/show bug.cgi?id=30475  GCC Bugzilla \u201d Debate over GCC optimization (alleged) bug 30475 \u201d 2007 https:\/\/gcc.gnu.org\/bugzilla\/show bug.cgi?id=30475"},{"volume-title":"Proceedings of the Asian-Pacific Conference on Systems, [Online] https:\/\/dl-acm-org.ez.xjtlu.edu.cn\/doi\/10","author":"Wang H.","key":"e_1_3_2_1_10_1","unstructured":"X. Wang , H. Chen , A. Cheung , Z. Jia , N. Zeldovich , M. F. Kaashoek , \u201d Undefined behavior : What happened to my code? \u201d, 2012, In Proceedings of the Asian-Pacific Conference on Systems, [Online] https:\/\/dl-acm-org.ez.xjtlu.edu.cn\/doi\/10 .5555\/2387841.2387850 X. Wang, H. Chen, A. Cheung, Z. Jia, N. Zeldovich, M. F. Kaashoek, \u201d Undefined behavior: What happened to my code?\u201d, 2012, In Proceedings of the Asian-Pacific Conference on Systems, [Online] https:\/\/dl-acm-org.ez.xjtlu.edu.cn\/doi\/10.5555\/2387841.2387850"},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/clang.llvm.org\/docs\/UsersManual.html","author":"Clang Compiler User's Manual","year":"2021","unstructured":"Clang Compiler User's Manual , https:\/\/clang.llvm.org\/docs\/UsersManual.html , 2021 Clang Compiler User's Manual, https:\/\/clang.llvm.org\/docs\/UsersManual.html, 2021"},{"key":"e_1_3_2_1_12_1","unstructured":"Y.Huang \u201dDiscussion on the self-increment and self-decrement operators in the output function of  Y.Huang \u201dDiscussion on the self-increment and self-decrement operators in the output function of"},{"key":"e_1_3_2_1_13_1","unstructured":"C language in different compiling environments \u201d [EB\/OL] 2013  C language in different compiling environments \u201d [EB\/OL] 2013"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2885256"},{"key":"e_1_3_2_1_15_1","unstructured":"T. S. Plum \u201d Automated safe secure techniques for eliminating undefined behavior in computer software \u201d Nov 2005 [Online]https:\/\/appft1.uspto.gov\/netacgi\/nphParser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-  T. S. Plum \u201d Automated safe secure techniques for eliminating undefined behavior in computer software \u201d Nov 2005 [Online]https:\/\/appft1.uspto.gov\/netacgi\/nphParser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-"},{"key":"e_1_3_2_1_16_1","unstructured":"bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20050246693.PGNR.&OS=DN\/20050246693&RS=DN\/20  bool.html&r=1&f=G&l=50&co1=AND&d=PG01&s1=20050246693.PGNR.&OS=DN\/20050246693&RS=DN\/20"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. ACM Program. Lang. 4, OOPSLA, Article 196 (November","author":"Random Testing C","year":"2020","unstructured":"V. LIVINSKII, D. BABOKIN and J. REGEHR,\u201d Random Testing for C and C++ Compilers with YARPGen,\u201d Proc. ACM Program. Lang. 4, OOPSLA, Article 196 (November 2020 ), 25 pages. https:\/\/doi.org\/10. 1145\/3428264 V. LIVINSKII, D. BABOKIN and J. REGEHR,\u201d Random Testing for C and C++ Compilers with YARPGen,\u201d Proc. ACM Program. Lang. 4, OOPSLA, Article 196 (November 2020), 25 pages. https:\/\/doi.org\/10. 1145\/3428264"},{"key":"e_1_3_2_1_18_1","unstructured":"Towards optimization-safe systems: analyzing the impact of undefined behavior[C]\/\/ Twenty-fourth  Towards optimization-safe systems: analyzing the impact of undefined behavior[C]\/\/ Twenty-fourth"},{"key":"e_1_3_2_1_19_1","volume-title":"Symposium on Operating Systems Principles. ACM","author":"Acm","year":"2013","unstructured":"Acm Symposium on Operating Systems Principles. ACM , 2013 Acm Symposium on Operating Systems Principles. ACM, 2013"}],"event":{"name":"ESSE 2021: 2021 2nd European Symposium on Software Engineering","acronym":"ESSE 2021","location":"Larissa Greece"},"container-title":["2021 2nd European Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501774.3501781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3501774.3501781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:45Z","timestamp":1750191105000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3501774.3501781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":19,"alternative-id":["10.1145\/3501774.3501781","10.1145\/3501774"],"URL":"https:\/\/doi.org\/10.1145\/3501774.3501781","relation":{},"subject":[],"published":{"date-parts":[[2021,11,19]]},"assertion":[{"value":"2022-03-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}