{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:34Z","timestamp":1750309234936,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1145\/3639477.3639738","type":"proceedings-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T13:27:26Z","timestamp":1717162046000},"page":"452-462","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Inference for Ever-Changing Policy of Taint Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2300-738X","authenticated-orcid":false,"given":"Wen-Hao","family":"Chiang","sequence":"first","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9392-3481","authenticated-orcid":false,"given":"Peixuan","family":"Li","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6770-0880","authenticated-orcid":false,"given":"Qiang","family":"Zhou","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5449-2264","authenticated-orcid":false,"given":"Subarno","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6804-0178","authenticated-orcid":false,"given":"Martin","family":"Schaef","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0139-8028","authenticated-orcid":false,"given":"Yingjun","family":"Lyu","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6194-7930","authenticated-orcid":false,"given":"Hoan","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2393-854X","authenticated-orcid":false,"given":"Omer","family":"Tripp","sequence":"additional","affiliation":[{"name":"Amazon Web Services, Seattle, Washington, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AWS. 2023. Amazon CodeGuru Reviewer. Available at https:\/\/docs.aws.amazon.com\/codeguru\/latest\/reviewer-ug\/welcome.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Subarno Banerjee Siwei Cui Michael Emmi Antonio Filieri Liana Hadarean Peixuan Li Linghui Luo Goran Piskachev Nicol\u00e1s Rosner Aritra Sengupta et al. 2023. Compositional Taint Analysis for Enforcing Security Policies at Scale. In Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM Digital Library Association for Computing Machinery 1601 Broadway 10th Floor New York NY 10019-7434 USA 1985--1996.","DOI":"10.1145\/3611643.3613889"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510162"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314648"},{"key":"e_1_3_2_1_5_1","volume-title":"Beware of the unexpected: Bimodal taint analysis. arXiv preprint arXiv:2301.10545","author":"Chow Yiu Wai","year":"2023","unstructured":"Yiu Wai Chow, Max Sch\u00e4fer, and Michael Pradel. 2023. Beware of the unexpected: Bimodal taint analysis. arXiv preprint arXiv:2301.10545 (2023)."},{"key":"e_1_3_2_1_6_1","unstructured":"CWE Community. 2023. CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'). Available at https:\/\/cwe.mitre.org\/data\/definitions\/89.html."},{"key":"e_1_3_2_1_7_1","volume-title":"Cold-start recommendations in collective matrix factorization. arXiv preprint arXiv:1809.00366","author":"Cortes David","year":"2018","unstructured":"David Cortes. 2018. Cold-start recommendations in collective matrix factorization. arXiv preprint arXiv:1809.00366 (2018)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513048"},{"key":"e_1_3_2_1_9_1","unstructured":"David B Effendi Fabian Yamaguchi and Jung Jaden. 2022. Plume. https:\/\/github.com\/plume-oss\/plume."},{"key":"e_1_3_2_1_10_1","unstructured":"Erik K Kristensen and Geoffrey White. 2023. Codeql. https:\/\/github.com\/github\/codeql."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542485"},{"key":"e_1_3_2_1_12_1","volume-title":"Distributed representations of words and phrases and their compositionality. Neural information processing systems","author":"Mikolov T","year":"2013","unstructured":"T Mikolov, I Sutskever, K Chen, GS Corrado, and J Dean. 2013. Distributed representations of words and phrases and their compositionality. Neural information processing systems (2013)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ECOOP.2022.14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.47"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03146-6_86"},{"key":"e_1_3_2_1_16_1","unstructured":"CVE Program. 2021. CVE-2021-44228. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2021-44228"},{"key":"e_1_3_2_1_17_1","first-page":"1125","article-title":"A machine-learning approach for classifying and categorizing android sources and sinks","volume":"14","author":"Rasthofer Siegfried","year":"2014","unstructured":"Siegfried Rasthofer, Steven Arzt, and Eric Bodden. 2014. A machine-learning approach for classifying and categorizing android sources and sinks.. In NDSS, Vol. 14. 1125.","journal-title":"NDSS"}],"event":{"name":"ICSE-SEIP '24: 46th International Conference on Software Engineering: Software Engineering in Practice","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"],"location":"Lisbon Portugal","acronym":"ICSE-SEIP '24"},"container-title":["Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639477.3639738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639477.3639738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:31Z","timestamp":1750290271000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639477.3639738"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":17,"alternative-id":["10.1145\/3639477.3639738","10.1145\/3639477"],"URL":"https:\/\/doi.org\/10.1145\/3639477.3639738","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"2024-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}