{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T11:56:23Z","timestamp":1775822183379,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1907727"],"award-info":[{"award-number":["CCF-1907727"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["851895"],"award-info":[{"award-number":["851895"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598104","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"892-903","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["That\u2019s a Tough Call: Studying the Challenges of Call Graph Construction for WebAssembly"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Lehmann","sequence":"first","affiliation":[{"name":"University of Stuttgart, Germany"}]},{"given":"Michelle","family":"Thalakottur","sequence":"additional","affiliation":[{"name":"Northeastern University, USA"}]},{"given":"Frank","family":"Tip","sequence":"additional","affiliation":[{"name":"Northeastern University, USA"}]},{"given":"Michael","family":"Pradel","sequence":"additional","affiliation":[{"name":"University of Stuttgart, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Clang: a C language family frontend for LLVM. https:\/\/clang.llvm.org\/ \t\t\t\t  [n. d.]. Clang: a C language family frontend for LLVM. https:\/\/clang.llvm.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. WASI \u2013 The WebAssembly System Interface. https:\/\/wasi.dev\/ \t\t\t\t  [n. d.]. WASI \u2013 The WebAssembly System Interface. https:\/\/wasi.dev\/"},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Wasmtime \u2013 A fast and secure runtime for WebAssembly. https:\/\/wasmtime.dev\/ \t\t\t\t  [n. d.]. Wasmtime \u2013 A fast and secure runtime for WebAssembly. https:\/\/wasmtime.dev\/"},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. WAVM. https:\/\/wavm.github.io\/ \t\t\t\t  [n. d.]. WAVM. https:\/\/wavm.github.io\/"},{"key":"e_1_3_2_1_5_1","unstructured":"2019. WebAssembly Core Specification Andreas Rossberg (Ed.). https:\/\/www.w3.org\/TR\/wasm-core-1\/ \t\t\t\t  2019. WebAssembly Core Specification Andreas Rossberg (Ed.). https:\/\/www.w3.org\/TR\/wasm-core-1\/"},{"key":"e_1_3_2_1_6_1","unstructured":"2022. aWsm \u2013 An Awesome Wasm Compiler and Runtime. https:\/\/github.com\/gwsystems\/awsm\/ \t\t\t\t  2022. aWsm \u2013 An Awesome Wasm Compiler and Runtime. https:\/\/github.com\/gwsystems\/awsm\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Binaryen \u2013 Optimizer and compiler\/toolchain library for WebAssembly. https:\/\/github.com\/WebAssembly\/binaryen \t\t\t\t  2023. Binaryen \u2013 Optimizer and compiler\/toolchain library for WebAssembly. https:\/\/github.com\/WebAssembly\/binaryen"},{"key":"e_1_3_2_1_8_1","unstructured":"2023. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/ \t\t\t\t  2023. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/"},{"key":"e_1_3_2_1_9_1","unstructured":"2023. Node.js with WebAssembly. https:\/\/nodejs.dev\/en\/learn\/nodejs-with-webassembly \t\t\t\t  2023. Node.js with WebAssembly. https:\/\/nodejs.dev\/en\/learn\/nodejs-with-webassembly"},{"key":"e_1_3_2_1_10_1","unstructured":"2023. TinyGo \u2013 Using WebAssembly. https:\/\/tinygo.org\/docs\/guides\/webassembly\/ \t\t\t\t  2023. TinyGo \u2013 Using WebAssembly. https:\/\/tinygo.org\/docs\/guides\/webassembly\/"},{"key":"e_1_3_2_1_11_1","unstructured":"2023. Twiggy: A code size profiler for Wasm. https:\/\/rustwasm.github.io\/twiggy\/ \t\t\t\t  2023. Twiggy: A code size profiler for Wasm. https:\/\/rustwasm.github.io\/twiggy\/"},{"key":"e_1_3_2_1_12_1","unstructured":"2023. WABT: The WebAssembly Binary Toolkit. https:\/\/github.com\/WebAssembly\/wabt \t\t\t\t  2023. WABT: The WebAssembly Binary Toolkit. https:\/\/github.com\/WebAssembly\/wabt"},{"key":"e_1_3_2_1_13_1","unstructured":"2023. WebAssembly. https:\/\/webassembly.org\/ \t\t\t\t  2023. WebAssembly. https:\/\/webassembly.org\/"},{"key":"e_1_3_2_1_14_1","unstructured":"2023. WebAssembly \u2013 Why Rust? https:\/\/www.rust-lang.org\/what\/wasm \t\t\t\t  2023. WebAssembly \u2013 Why Rust? https:\/\/www.rust-lang.org\/what\/wasm"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359823"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2956925"},{"key":"e_1_3_2_1_17_1","volume-title":"Constructing Call Graphs of Scala Programs. In European Conference on Object-Oriented Programming (ECOOP","author":"Ali Karim","year":"2014","unstructured":"Karim Ali , Marianna Rapoport , Ond\u0159ej Lhot\u00e1k , Julian Dolby , and Frank Tip . 2014 . Constructing Call Graphs of Scala Programs. In European Conference on Object-Oriented Programming (ECOOP 2014). 54\u201379. Karim Ali, Marianna Rapoport, Ond\u0159ej Lhot\u00e1k, Julian Dolby, and Frank Tip. 2014. Constructing Call Graphs of Scala Programs. In European Conference on Object-Oriented Programming (ECOOP 2014). 54\u201379."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"key":"e_1_3_2_1_20_1","volume-title":"Modular Abstract Definitional Interpreters for WebAssembly. In European Conference on Object-Oriented Programming (ECOOP","author":"Brandl Katharina","year":"2023","unstructured":"Katharina Brandl , Sebastian Erdweg , Sven Keidel , and Nils Hansen . 2023 . Modular Abstract Definitional Interpreters for WebAssembly. In European Conference on Object-Oriented Programming (ECOOP 2023). Katharina Brandl, Sebastian Erdweg, Sven Keidel, and Nils Hansen. 2023. Modular Abstract Definitional Interpreters for WebAssembly. In European Conference on Object-Oriented Programming (ECOOP 2023)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102745"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2022.3"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486887"},{"key":"e_1_3_2_1_24_1","volume-title":"TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. abs\/1802.01050","author":"Fu William","year":"2018","unstructured":"William Fu , Raymond Lin , and Daniel Inge . 2018. TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. abs\/1802.01050 ( 2018 ), arxiv:1802.01050. William Fu, Raymond Lin, and Daniel Inge. 2018. TaintAssembly: Taint-Based Information Flow Control Tracking for WebAssembly. abs\/1802.01050 (2018), arxiv:1802.01050."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/263698.264352"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062363"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503921.3503924"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3450138"},{"key":"e_1_3_2_1_30_1","volume-title":"Native Code. In 2019 USENIX Annual Technical Conference (USENIX ATC \u201919)","author":"Jangda Abhinav","year":"2019","unstructured":"Abhinav Jangda , Bobby Powers , Emery D. Berger , and Arjun Guha . 2019 . Not So Fast: Analyzing the Performance of WebAssembly vs . Native Code. In 2019 USENIX Annual Technical Conference (USENIX ATC \u201919) . USENIX Association, Renton, WA. 107\u2013120. isbn:978-1-939133-03-8 https:\/\/www.usenix.org\/conference\/atc19\/presentation\/jangda Abhinav Jangda, Bobby Powers, Emery D. Berger, and Arjun Guha. 2019. Not So Fast: Analyzing the Performance of WebAssembly vs. Native Code. In 2019 USENIX Annual Technical Conference (USENIX ATC \u201919). USENIX Association, Renton, WA. 107\u2013120. isbn:978-1-939133-03-8 https:\/\/www.usenix.org\/conference\/atc19\/presentation\/jangda"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security 20)","author":"Lehmann Daniel","year":"2020","unstructured":"Daniel Lehmann , Johannes Kinder , and Michael Pradel . 2020 . Everything Old is New Again: Binary Security of WebAssembly . In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, 217\u2013217. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/lehmann Daniel Lehmann, Johannes Kinder, and Michael Pradel. 2020. Everything Old is New Again: Binary Security of WebAssembly. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 217\u2013217. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/lehmann"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304068"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523449"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/279310.279314"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635928"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464836"},{"key":"#cr-split#-e_1_3_2_1_37_1.1","doi-asserted-by":"crossref","unstructured":"Mattia Paccamiccio Franco Raimondi Kelly Androutsopoulos and Leonardo Mostarda. 2022. Improving the Precision of Call Graph Construction for Webassembly with Symbolic Execution and Slicing. http:\/\/dx.doi.org\/10.2139\/ssrn.4341186. 10.2139\/ssrn.4341186","DOI":"10.2139\/ssrn.4341186"},{"key":"#cr-split#-e_1_3_2_1_37_1.2","doi-asserted-by":"crossref","unstructured":"Mattia Paccamiccio Franco Raimondi Kelly Androutsopoulos and Leonardo Mostarda. 2022. Improving the Precision of Call Graph Construction for Webassembly with Symbolic Execution and Slicing. http:\/\/dx.doi.org\/10.2139\/ssrn.4341186.","DOI":"10.2139\/ssrn.4341186"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386017"},{"key":"e_1_3_2_1_39_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Quach Anh","year":"2018","unstructured":"Anh Quach , Aravind Prakash , and Lok Yan . 2018 . Debloating Software through Piece-Wise Compilation and Loading . In 27th USENIX Security Symposium (USENIX Security 18) . USENIX Association, Baltimore, MD. 869\u2013886. isbn:978-1-939133-04-5 https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/quach Anh Quach, Aravind Prakash, and Lok Yan. 2018. Debloating Software through Piece-Wise Compilation and Loading. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD. 869\u2013886. isbn:978-1-939133-04-5 https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/quach"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950312"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330555"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833626"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007514"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00146"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510070"},{"key":"e_1_3_2_1_46_1","unstructured":"Quentin Sti\u00e9venart and Coen De Roover. 2021. Wassail: a WebAssembly Static Analysis Library. ProWeb21. https:\/\/2021.programming-conference.org\/home\/proweb-2021 Fifth International Workshop on Programming Technology for the Future Web \t\t\t\t  Quentin Sti\u00e9venart and Coen De Roover. 2021. Wassail: a WebAssembly Static Analysis Library. ProWeb21. https:\/\/2021.programming-conference.org\/home\/proweb-2021 Fifth International Workshop on Programming Technology for the Future Web"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM51674.2020.00007"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380441"},{"key":"e_1_3_2_1_49_1","volume-title":"Taint Tracking for WebAssembly. abs\/1807.08349","author":"Szanto Aron","year":"2018","unstructured":"Aron Szanto , Timothy Tamm , and Artidoro Pagnoni . 2018. Taint Tracking for WebAssembly. abs\/1807.08349 ( 2018 ), arxiv:1807.08349. Aron Szanto, Timothy Tamm, and Artidoro Pagnoni. 2018. Taint Tracking for WebAssembly. abs\/1807.08349 (2018), arxiv:1807.08349."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/353171.353190"},{"key":"e_1_3_2_1_51_1","volume-title":"Stubbifier: Debloating Dynamic Server-Side JavaScript Applications. CoRR, abs\/2110.14162","author":"Turcotte Alexi","year":"2021","unstructured":"Alexi Turcotte , Ellen Arteca , Ashish Mishra , Saba Alimadadi , and Frank Tip . 2021 . Stubbifier: Debloating Dynamic Server-Side JavaScript Applications. CoRR, abs\/2110.14162 (2021), arXiv:2110.14162. arxiv:2110.14162 Alexi Turcotte, Ellen Arteca, Ashish Mishra, Saba Alimadadi, and Frank Tip. 2021. Stubbifier: Debloating Dynamic Server-Side JavaScript Applications. CoRR, abs\/2110.14162 (2021), arXiv:2110.14162. arxiv:2110.14162"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510166"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167082"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610386"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3122821"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:42Z","timestamp":1750182522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":56,"alternative-id":["10.1145\/3597926.3598104","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598104","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}