{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:14Z","timestamp":1750308494169,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534412","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"506-518","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Precise and efficient atomicity violation detection for interrupt-driven programs via staged path pruning"],"prefix":"10.1145","author":[{"given":"Chao","family":"Li","sequence":"first","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Rui","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Boxiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Xidian University, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Tingting","family":"Yu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Dongdong","family":"Gao","sequence":"additional","affiliation":[{"name":"Beijing Institute of Control Engineering, China \/ Beijing Sunwise Information Technology, China"}]},{"given":"Mengfei","family":"Yang","sequence":"additional","affiliation":[{"name":"China Academy of Space Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Racebench website.. https:\/\/github.com\/chenruibuaa\/racebench. \t\t\t\t\t  2019. Racebench website.. https:\/\/github.com\/chenruibuaa\/racebench."},{"key":"e_1_3_2_1_2_1","unstructured":"2021. DG website. https:\/\/github.com\/mchalupa\/dg. \t\t\t\t\t  2021. DG website. https:\/\/github.com\/mchalupa\/dg."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814303"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2019.00073"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00593-0_30"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ssiri-c.2011.18"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.13328\/j.cnki.jos.004980"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755945"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17184-1_25"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/qrs-c51114.2020.00084"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ipdps.2004.1303345"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375618"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/icst.2014.17"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594330"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931069"},{"key":"e_1_3_2_1_18_1","volume-title":"The BSD conference. 5.","author":"Lattner Chris","year":"2008","unstructured":"Chris Lattner . 2008 . LLVM and Clang: Next generation compiler technology . In The BSD conference. 5. Chris Lattner. 2008. LLVM and Clang: Next generation compiler technology. In The BSD conference. 5."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 6th workshop on parallel and distributed systems: testing, analysis, and debugging. 1\u201310","author":"Letko Zden\u011bk","year":"2008","unstructured":"Zden\u011bk Letko , Tom\u00e1\u0161 Vojnar , and Bohuslav K\u0159ena . 2008 . AtomRace: data race and atomicity violation detector and healer . In Proceedings of the 6th workshop on parallel and distributed systems: testing, analysis, and debugging. 1\u201310 . Zden\u011bk Letko, Tom\u00e1\u0161 Vojnar, and Bohuslav K\u0159ena. 2008. AtomRace: data race and atomicity violation detector and healer. In Proceedings of the 6th workshop on parallel and distributed systems: testing, analysis, and debugging. 1\u201310."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2012.6227184"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2011.35"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/mm.2007.5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/isca.2008.4"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594311"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2019.00037"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2013.6606739"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483792"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1523"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806838"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509538"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-013-0277-y"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086228.1086282"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00590-9_28"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1932682.1869474"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178625.1178628"},{"key":"e_1_3_2_1_37_1","unstructured":"China Academy of Space Technology Software Product Assurance Center. 2015. Analysis Report on Software Quality Problems of China Academy of Space Technology. \t\t\t\t\t  China Academy of Space Technology Software Product Assurance Center. 2015. Analysis Report on Software Quality Problems of China Academy of Space Technology."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882300"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2925291"},{"key":"e_1_3_2_1_40_1","unstructured":"Rishi Tulsyan Rekha Pai and Deepak D\u2019Souza. 2020. Static Race Detection for RTOS Applications. arXiv preprint arXiv:2010.02642 https:\/\/doi.org\/10.48550\/arXiv.2010.02642 \t\t\t\t\t  Rishi Tulsyan Rekha Pai and Deepak D\u2019Souza. 2020. Static Race Detection for RTOS Applications. arXiv preprint arXiv:2010.02642 https:\/\/doi.org\/10.48550\/arXiv.2010.02642"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111320.1111067"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12002-2_27"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1122971.1122993"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2006.1599419"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5160"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875913.2875943"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092724"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/emsoft.2015.7318260"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/sere-c.2013.33"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2365864.2151034"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961295.1950395"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2430545.2430546"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Virtual South Korea","acronym":"ISSTA '22"},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:41Z","timestamp":1750272221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":52,"alternative-id":["10.1145\/3533767.3534412","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534412","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}