{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:51Z","timestamp":1775873511582,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640382","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"912-928","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Plankton: Reconciling Binary Code and Debug Information"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8719-1070","authenticated-orcid":false,"given":"Anshunkang","family":"Zhou","sequence":"first","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9529-3410","authenticated-orcid":false,"given":"Chengfeng","family":"Ye","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5328-3994","authenticated-orcid":false,"given":"Heqing","family":"Huang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6340-1416","authenticated-orcid":false,"given":"Yuandao","family":"Cai","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6417-1034","authenticated-orcid":false,"given":"Charles","family":"Zhang","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.hex-rays.com\/ida-pro\/","author":"Ida","year":"2003","unstructured":"Ida pro. https:\/\/www.hex-rays.com\/ida-pro\/, 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/github.com\/SRI-CSL\/gllvm\/issues\/47","author":"Wllvm","year":"2015","unstructured":"Wllvm fails. https:\/\/github.com\/SRI-CSL\/gllvm\/issues\/47, 2015."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/scan.coverity.com\/projects\/","author":"Coverity","year":"2018","unstructured":"Coverity scan. https:\/\/scan.coverity.com\/projects\/, 2018."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/stackoverflow.com\/questions\/50434236\/coverity-scan-fails-to-build-stdlib-h-with-gnu-source-defined\/","author":"Coverity","year":"2018","unstructured":"Coverity scan fails. https:\/\/stackoverflow.com\/questions\/50434236\/coverity-scan-fails-to-build-stdlib-h-with-gnu-source-defined\/, 2018."},{"key":"e_1_3_2_1_5_1","volume-title":"https:\/\/github.com\/lifting-bits\/mcsema\/","year":"2018","unstructured":"Mcsema. https:\/\/github.com\/lifting-bits\/mcsema\/, 2018."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/github.com\/civetweb\/civetweb\/issues\/769","author":"Coverity","year":"2019","unstructured":"Coverity scan fails. https:\/\/github.com\/civetweb\/civetweb\/issues\/769, 2019."},{"key":"e_1_3_2_1_7_1","volume-title":"https:\/\/github.com\/microsoft\/llvm-mctoll\/issues\/55","year":"2019","unstructured":"mctoll issue. https:\/\/github.com\/microsoft\/llvm-mctoll\/issues\/55, 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"reopt. https:\/\/github.com\/GaloisInc\/reopt\/","author":"Galois","year":"2020","unstructured":"Galois inc. reopt. https:\/\/github.com\/GaloisInc\/reopt\/, 2020."},{"key":"e_1_3_2_1_9_1","volume-title":"https:\/\/github.com\/Microsoft\/llvm-mctoll\/","year":"2020","unstructured":"Llvm-mctoll. https:\/\/github.com\/Microsoft\/llvm-mctoll\/, 2020."},{"key":"e_1_3_2_1_10_1","volume-title":"https:\/\/github.com\/microsoft\/llvm-mctoll\/issues\/72","year":"2020","unstructured":"mctoll issue. https:\/\/github.com\/microsoft\/llvm-mctoll\/issues\/72, 2020."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/github.com\/avast\/retdec\/","year":"2020","unstructured":"Retdec. https:\/\/github.com\/avast\/retdec\/, 2020."},{"key":"e_1_3_2_1_12_1","volume-title":"https:\/\/github.com\/SRI-CSL\/gllvm\/issues\/39","author":"Wllvm","year":"2020","unstructured":"Wllvm fails. https:\/\/github.com\/SRI-CSL\/gllvm\/issues\/39, 2020."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/cppcheck.sourceforge.io\/","year":"2021","unstructured":"Cppcheck. https:\/\/cppcheck.sourceforge.io\/, 2021."},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/7\/html\/developer_guide\/debugging-crashed-application\/","author":"Debugging","year":"2021","unstructured":"Debugging a crashed application. https:\/\/access.redhat.com\/documentation\/en-us\/red_hat_enterprise_linux\/7\/html\/developer_guide\/debugging-crashed-application\/, 2021."},{"key":"e_1_3_2_1_15_1","volume-title":"https:\/\/github.com\/NationalSecurityAgency\/ghidra\/","year":"2021","unstructured":"Ghidra. https:\/\/github.com\/NationalSecurityAgency\/ghidra\/, 2021."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/github.com\/facebook\/infer\/","year":"2021","unstructured":"Infer. https:\/\/github.com\/facebook\/infer\/, 2021."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/documentation\/vtune-help\/top\/set-up-analysis-target\/linux-targets\/debug-info-for-linux-binaries.html","author":"Intel\u00ae","year":"2021","unstructured":"Intel\u00ae vtune\u2122 profiler user guide. https:\/\/www.intel.com\/content\/www\/us\/en\/develop\/documentation\/vtune-help\/top\/set-up-analysis-target\/linux-targets\/debug-info-for-linux-binaries.html, 2021."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/wiki.ubuntu.com\/DebugSymbolPackages\/","author":"Linux","year":"2021","unstructured":"Linux debug symbol packages. https:\/\/wiki.ubuntu.com\/DebugSymbolPackages\/, 2021."},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/llvm.org\/docs\/LangRef.html#llvm-lifetime-start-intrinsic","author":"Llvm","year":"2021","unstructured":"Llvm lifetime intrinsic. https:\/\/llvm.org\/docs\/LangRef.html#llvm-lifetime-start-intrinsic, 2021."},{"key":"e_1_3_2_1_20_1","volume-title":"whole program llvm. https:\/\/github.com\/travitch\/whole-program-llvm\/","author":"Wllvm","year":"2021","unstructured":"Wllvm: whole program llvm. https:\/\/github.com\/travitch\/whole-program-llvm\/, 2021."},{"key":"e_1_3_2_1_21_1","volume-title":"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/","author":"Debugging","year":"2022","unstructured":"Debugging tools for windows. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/, 2022."},{"key":"e_1_3_2_1_22_1","volume-title":"https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/public-and-private-symbols\/","author":"Windows","year":"2022","unstructured":"Windows debug symbols. https:\/\/docs.microsoft.com\/en-us\/windows-hardware\/drivers\/debugger\/public-and-private-symbols\/, 2022."},{"key":"e_1_3_2_1_23_1","volume-title":"https:\/\/hackingcpp.com\/cpp\/tools\/build_systems.html","author":"Build","year":"2023","unstructured":"Build systems for c++. https:\/\/hackingcpp.com\/cpp\/tools\/build_systems.html, 2023."},{"key":"e_1_3_2_1_24_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/List_of_compilers#C++_compilers","year":"2023","unstructured":"C++ compilers. https:\/\/en.wikipedia.org\/wiki\/List_of_compilers#C++_compilers, 2023."},{"key":"e_1_3_2_1_25_1","volume-title":"https:\/\/github.com\/seviezhou\/ASPLOS-2024-Supplement\/","author":"Supplement","year":"2024","unstructured":"Supplement material. https:\/\/github.com\/seviezhou\/ASPLOS-2024-Supplement\/, 2024."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387550"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465380"},{"key":"e_1_3_2_1_28_1","volume-title":"Decompilation to compiler high ir in a binary rewriter","author":"Anand Kapil","year":"2010","unstructured":"Kapil Anand, Matthew Smithson, Aparna Kotha, Khaled Elwazeer, and Rajeev Barua. Decompilation to compiler high ir in a binary rewriter. University of Maryland, Tech. Rep, 2010."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3575693.3575720"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69738-1_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/543552.512534"},{"key":"e_1_3_2_1_34_1","volume-title":"33nd USENIX Security Symposium (USENIX Security 24)","author":"Cai Yuandao","year":"2024","unstructured":"Yuandao Cai, Yibo Jin, and Charles Zhang. Unleashing the power of type-based call graph construction by using regional pointer information. In 33nd USENIX Security Symposium (USENIX Security 24), 2024."},{"key":"e_1_3_2_1_35_1","first-page":"3727","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cai Yuandao","year":"2023","unstructured":"Yuandao Cai, Peisen Yao, Chengfeng Ye, and Charles Zhang. Place your locks well: understanding and detecting lock misuse bugs. In 32nd USENIX Security Symposium (USENIX Security 23), pages 3727--3744, 2023."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454099"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549110"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3622833"},{"key":"e_1_3_2_1_39_1","first-page":"31","volume-title":"Proceedings of the 2007 GCC Developers' Summit","author":"Callanan Sean","year":"2007","unstructured":"Sean Callanan, Daniel J Dean, and Erez Zadok. Extending gcc with modular gimple optimizations. In Proceedings of the 2007 GCC Developers' Summit, pages 31--37. Citeseer, 2007."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0050"},{"key":"e_1_3_2_1_41_1","first-page":"309","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Corteggiani Nassim","year":"2018","unstructured":"Nassim Corteggiani, Giovanni Camurati, and Aur\u00e9lien Francillon. Inception:{System-Wide} security testing of {Real-World} embedded systems software. In 27th USENIX Security Symposium (USENIX Security 18), pages 309--326, 2018."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2018.8585654"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033019.3033028"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446695"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"e_1_3_2_1_46_1","volume-title":"Introduction to the dwarf debugging format","author":"Eager Michael J","year":"2007","unstructured":"Michael J Eager et al. Introduction to the dwarf debugging format. Group, 2007."},{"key":"e_1_3_2_1_47_1","volume-title":"Vulcan binary transformation in a distributed environment","author":"Edwards Andrew","year":"2001","unstructured":"Andrew Edwards, Hoi Vo, and Amitabh Srivastava. Vulcan binary transformation in a distributed environment. 2001."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462165"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397388"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29962-0_4"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134024"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872380"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/23.3.223"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251537"},{"key":"e_1_3_2_1_56_1","volume-title":"Heap abstractions for static analysis. ACM Computing Surveys (CSUR), 49(2):1--47","author":"Kanvar Vini","year":"2016","unstructured":"Vini Kanvar and Uday P Khedker. Heap abstractions for static analysis. ACM Computing Surveys (CSUR), 49(2):1--47, 2016."},{"key":"e_1_3_2_1_57_1","volume-title":"The c programming language","author":"Kernighan Brian W","year":"2002","unstructured":"Brian W Kernighan and Dennis M Ritchie. The c programming language. 2002."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00029"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452024"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276495"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-008-9099-0"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386020"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833799"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2655046"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3497764"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985813"},{"key":"e_1_3_2_1_68_1","volume-title":"Technical report, Cygnus support","author":"Menapace Julia","year":"1992","unstructured":"Julia Menapace, Jim Kingdon, and David MacKenzie. The\" stabs\" debug format. Technical report, Technical report, Cygnus support, 1992."},{"key":"e_1_3_2_1_69_1","volume-title":"From system f to typed assembly language. ACM Transactions on Programming Languages and Systems (TOPLAS), 21(3):527--568","author":"Morrisett Greg","year":"1999","unstructured":"Greg Morrisett, David Walker, Karl Crary, and Neal Glew. From system f to typed assembly language. ACM Transactions on Programming Languages and Systems (TOPLAS), 21(3):527--568, 1999."},{"key":"e_1_3_2_1_70_1","volume-title":"Advanced compiler design implementation. Morgan kaufmann","author":"Steven Muchnick","year":"1997","unstructured":"Steven Muchnick et al. Advanced compiler design implementation. Morgan kaufmann, 1997."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594295"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594318"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2019.8661201"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_1_75_1","first-page":"2479","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Pang Chengbin","year":"2022","unstructured":"Chengbin Pang, Tiantai Zhang, Ruotong Yu, Bing Mao, and Jun Xu. Ground truth for binary disassembly is not easy. In 31st USENIX Security Symposium (USENIX Security 22), pages 2479--2495, 2022."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2023.3241639"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP58684.2023.00036"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359796"},{"key":"e_1_3_2_1_79_1","first-page":"290","volume-title":"VMCAI 2009, Savannah, GA, USA, January 18-20, 2009. Proceedings 10","author":"Rakamari\u0107 Zvonimir","year":"2009","unstructured":"Zvonimir Rakamari\u0107 and Alan J Hu. A scalable memory model for low-level code. In Verification, Model Checking, and Abstract Interpretation: 10th International Conference, VMCAI 2009, Savannah, GA, USA, January 18-20, 2009. Proceedings 10, pages 290--304. Springer, 2009."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35308-6_5"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523719"},{"key":"e_1_3_2_1_82_1","volume-title":"USA","author":"Sandra LA","year":"1994","unstructured":"LA Sandra. Phb practical handbook of curve fitting. ed: CRC Press: Boca Raton, FL, USA, 1994."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17465-1_22"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2302311"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542526"},{"key":"e_1_3_2_1_88_1","volume-title":"The juliet 1.1 c\/c++ and java test suite","author":"Test Juliet","year":"2012","unstructured":"Juliet Test. The juliet 1.1 c\/c++ and java test suite. 2012."},{"key":"e_1_3_2_1_89_1","volume-title":"Ramakrishna Upadrasta, and YN Srikant. Ir2vec: Llvm ir based scalable program embeddings. ACM Transactions on Architecture and Code Optimization (TACO), 17(4):1--27","author":"VenkataKeerthy S","year":"2020","unstructured":"S VenkataKeerthy, Rohit Aggarwal, Shalini Jain, Maunendra Sankar Desarkar, Ramakrishna Upadrasta, and YN Srikant. Ir2vec: Llvm ir based scalable program embeddings. ACM Transactions on Architecture and Code Optimization (TACO), 17(4):1--27, 2020."},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523702"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58768-0_14"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23808-6_34"},{"key":"e_1_3_2_1_93_1","first-page":"367","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Williams-King David","year":"2016","unstructured":"David Williams-King, Graham Gobieski, Kent Williams-King, James P Blake, Xinhao Yuan, Patrick Colp, Michelle Zheng, Vasileios P Kemerlis, Junfeng Yang, and William Aiello. Shuffler: Fast and deployable continuous code {Re-Randomization}. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16), pages 367--382, 2016."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378470"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081728"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176258.3176309"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640382","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:41Z","timestamp":1750291421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640382"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":95,"alternative-id":["10.1145\/3620665.3640382","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640382","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}