{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T09:45:42Z","timestamp":1768988742009,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Athene center for cyber security","award":[""],"award-info":[{"award-number":[""]}]},{"name":"Crossing SFB 119","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,29]]},"DOI":"10.1145\/3567512.3567526","type":"proceedings-article","created":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T21:22:55Z","timestamp":1669929775000},"page":"161-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["jGuard: Programming Misuse-Resilient APIs"],"prefix":"10.1145","author":[{"given":"Simon","family":"Binder","sequence":"first","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Krishna","family":"Narasimhan","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Svenja","family":"Kernig","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]},{"given":"Mira","family":"Mezini","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Marat Akhin and Mikhail Belyaev. 2021. Kotlin language specification. https:\/\/kotlinlang.org\/spec\/pdf\/kotlin-spec.pdf \t\t\t\t  Marat Akhin and Mikhail Belyaev. 2021. Kotlin language specification. https:\/\/kotlinlang.org\/spec\/pdf\/kotlin-spec.pdf"},{"key":"e_1_3_2_1_2_1","unstructured":"Alvin Alexander. 2019. Java JDBC connection string examples. https:\/\/alvinalexander.com\/java\/jdbc-connection-string-mysql-postgresql-sqlserver\/ \t\t\t\t  Alvin Alexander. 2019. Java JDBC connection string examples. https:\/\/alvinalexander.com\/java\/jdbc-connection-string-mysql-postgresql-sqlserver\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2903506"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2827384"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11940197_2"},{"key":"e_1_3_2_1_6_1","unstructured":"Mihir Bellare. 2018. Symmetric Encryption. http:\/\/cseweb.ucsd.edu\/~mihir\/cse107\/slides\/s-se.pdf \t\t\t\t  Mihir Bellare. 2018. Symmetric Encryption. http:\/\/cseweb.ucsd.edu\/~mihir\/cse107\/slides\/s-se.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1890028.1890031"},{"key":"e_1_3_2_1_8_1","unstructured":"Rodrigo Bonifacio Stefan Kr\u00fcger Krishna Narasimhan Eric Bodden and Mira Mezini. 2021. Dealing with Variability in API Misuse Specification. arxiv:2105.04950. \t\t\t\t  Rodrigo Bonifacio Stefan Kr\u00fcger Krishna Narasimhan Eric Bodden and Mira Mezini. 2021. Dealing with Variability in API Misuse Specification. arxiv:2105.04950."},{"key":"e_1_3_2_1_9_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems, Nicolas Halbwachs and Lenore D","author":"Chen Feng","year":"1980","unstructured":"Feng Chen and Grigore Ro\u015fu . 2005. Java-MOP: A Monitoring Oriented Programming Environment for Java . In Tools and Algorithms for the Construction and Analysis of Systems, Nicolas Halbwachs and Lenore D . Zuck (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg . 546\u2013550. isbn:978-3-540-3 1980 -1 Feng Chen and Grigore Ro\u015fu. 2005. Java-MOP: A Monitoring Oriented Programming Environment for Java. In Tools and Algorithms for the Construction and Analysis of Systems, Nicolas Halbwachs and Lenore D. Zuck (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg. 546\u2013550. isbn:978-3-540-31980-1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2925345"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070532"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM51674.2020.00025"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/383845.383853"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382494.3422166"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/318372.318577"},{"key":"e_1_3_2_1_18_1","unstructured":"Stefan Kr\u00fcger. 2022. The CrySL Language CogniCrypt. https:\/\/www.eclipse.org\/cognicrypt\/documentation\/crysl\/ \t\t\t\t  Stefan Kr\u00fcger. 2022. The CrySL Language CogniCrypt. https:\/\/www.eclipse.org\/cognicrypt\/documentation\/crysl\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115707"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2018.10"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127878.1127884"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2656201"},{"key":"e_1_3_2_1_23_1","volume-title":"An Integrated Approach for Automated Software Debugging via Machine Learning and Big Code Mining","author":"Xia Li.","unstructured":"Xia Li. 2020. An Integrated Approach for Automated Software Debugging via Machine Learning and Big Code Mining . The University of Texas at Dallas. Xia Li. 2020. An Integrated Approach for Automated Software Debugging via Machine Learning and Big Code Mining. The University of Texas at Dallas."},{"key":"e_1_3_2_1_24_1","unstructured":"Bill Marczak and John Scott-Railton. 2020. Move Fast and Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings. https:\/\/citizenlab.ca\/2020\/04\/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings\/ \t\t\t\t  Bill Marczak and John Scott-Railton. 2020. Move Fast and Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings. https:\/\/citizenlab.ca\/2020\/04\/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings\/"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"A.J. Menezes P.C. van Oorschot and S.A. Vanstone. 2018. Handbook of Applied Cryptography. CRC Press. isbn:9780429881329 https:\/\/books.google.de\/books?id=YyCyDwAAQBAJ \t\t\t\t  A.J. Menezes P.C. van Oorschot and S.A. Vanstone. 2018. Handbook of Applied Cryptography. CRC Press. isbn:9780429881329 https:\/\/books.google.de\/books?id=YyCyDwAAQBAJ","DOI":"10.1201\/9781439821916"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(88)90022-2"},{"key":"e_1_3_2_1_27_1","volume-title":"Design by contract","author":"Meyer Bertrand","unstructured":"Bertrand Meyer . 2002. Design by contract . Prentice Hall Upper Saddle River . Bertrand Meyer. 2002. Design by contract. Prentice Hall Upper Saddle River."},{"key":"e_1_3_2_1_28_1","unstructured":"Bodo M\u00f6ller. 2004. Security of CBC Ciphersuites in SSL\/TLS: Problems and Countermeasures. https:\/\/www.openssl.org\/~bodo\/tls-cbc.txt \t\t\t\t  Bodo M\u00f6ller. 2004. Security of CBC Ciphersuites in SSL\/TLS: Problems and Countermeasures. https:\/\/www.openssl.org\/~bodo\/tls-cbc.txt"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.01.011"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416551"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.63"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.63"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9150-8"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2021.18"},{"key":"e_1_3_2_1_35_1","volume-title":"Abstract Refinement Types","author":"Vazou Niki","unstructured":"Niki Vazou , Patrick M. Rondon , and Ranjit Jhala . 2013. Abstract Refinement Types . In Programming Languages and Systems, Matthias Felleisen and Philippa Gardner (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg . 209\u2013228. isbn:978-3-642-37036-6 Niki Vazou, Patrick M. Rondon, and Ranjit Jhala. 2013. Abstract Refinement Types. In Programming Languages and Systems, Matthias Felleisen and Philippa Gardner (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg. 209\u2013228. isbn:978-3-642-37036-6"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35992-7_11"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35992-7_11"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210459.3210483"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180260"}],"event":{"name":"SLE '22: 15th ACM SIGPLAN International Conference on Software Language Engineering","location":"Auckland New Zealand","acronym":"SLE '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 15th ACM SIGPLAN International Conference on Software Language Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567512.3567526","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3567512.3567526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:47Z","timestamp":1750286627000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3567512.3567526"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":39,"alternative-id":["10.1145\/3567512.3567526","10.1145\/3567512"],"URL":"https:\/\/doi.org\/10.1145\/3567512.3567526","relation":{},"subject":[],"published":{"date-parts":[[2022,11,29]]},"assertion":[{"value":"2022-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}