{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:10:03Z","timestamp":1755882603848,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["236869097"],"award-info":[{"award-number":["236869097"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,2]]},"DOI":"10.1145\/3646548.3672585","type":"proceedings-article","created":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T12:19:07Z","timestamp":1723205947000},"page":"12-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Should I Bother? Fast Patch Filtering for Statically-Configured Software Variants"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9792-7667","authenticated-orcid":false,"given":"Tobias","family":"Landsberg","sequence":"first","affiliation":[{"name":"Leibniz Universit\u00e4t Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9258-0513","authenticated-orcid":false,"given":"Christian","family":"Dietrich","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Braunschweig, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8224-4161","authenticated-orcid":false,"given":"Daniel","family":"Lohmann","sequence":"additional","affiliation":[{"name":"Leibniz Universit\u00e4t Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571788.3571801"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.58"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648511.2648517"},{"key":"e_1_3_2_1_4_1","unstructured":"Apache. 2021. CVE - CVE-2021-44228. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2021-44228"},{"volume-title":"Software change impact analysis","author":"Arnold S","key":"e_1_3_2_1_5_1","unstructured":"Robert\u00a0S Arnold. 1996. Software change impact analysis. IEEE Computer Society Press."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461001.3473059"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.34"},{"volume-title":"Software Product Lines: Practices and Patterns","author":"Clements Paul","key":"e_1_3_2_1_8_1","unstructured":"Paul Clements and Linda Northrop. 2001. Software Product Lines: Practices and Patterns. Addison-Wesley."},{"key":"e_1_3_2_1_9_1","volume-title":"2017 USENIX Annual Technical Conf. (USENIX \u201917)","author":"Dietrich Christian","year":"2017","unstructured":"Christian Dietrich, Valentin Rothberg, Ludwig F\u00fcracker, Andreas Ziegler, and Daniel Lohmann. 2017. cHash: Detection of Redundant Compilations via AST Hashing. In 2017 USENIX Annual Technical Conf. (USENIX \u201917). USENIX Association. https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/dietrich"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2362536.2362544"},{"key":"e_1_3_2_1_11_1","volume-title":"Software security patch management-A systematic literature review of challenges, approaches, tools and practices. Information and Software Technology 144","author":"Dissanayake Nesara","year":"2022","unstructured":"Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, and M\u00a0Ali Babar. 2022. Software security patch management-A systematic literature review of challenges, approaches, tools and practices. Information and Software Technology 144 (2022)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663755"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254103"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048128"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399742"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379469"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","unstructured":"Tobias Landsberg Christian Dietrich and Daniel Lohmann. 2024. Should I Bother? Fast Patch Filtering for Statically-Configured Software Variants \u2013 Artifacts. https:\/\/doi.org\/10.5281\/zenodo.11611859","DOI":"10.5281\/zenodo.11611859"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bts652"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1960275.1960299"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491437"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643001"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524299"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111283"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00038"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503229.3547031"},{"key":"e_1_3_2_1_26_1","unstructured":"Neel Metha Riku Antii and Matti. 2014. Heartbleed Bug. https:\/\/heartbleed.com\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER56733.2023.00035"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3486609.3487195"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3382025.3414954"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852786.1852794"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332492"},{"key":"e_1_3_2_1_32_1","unstructured":"Matthew Prince. 2014. The Hidden Costs of Heartbleed. https:\/\/blog.cloudflare.com\/the-hard-costs-of-heartbleed\/"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233027.3233028"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510455.3512792"},{"key":"e_1_3_2_1_35_1","unstructured":"Joel Rosdahl. 2010. Ccache \u2014 Compiler cache. https:\/\/ccache.dev"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658761.2658767"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10168-9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2011.40"},{"key":"e_1_3_2_1_40_1","volume-title":"2014 USENIX Annual Technical Conf. (USENIX \u201914)","author":"Tartler Reinhard","year":"2014","unstructured":"Reinhard Tartler, Christian Dietrich, Julio Sincero, Wolfgang Schr\u00f6der-Preikschat, and Daniel Lohmann. 2014. Static Analysis of Variability in System Software: The 90,000 #ifdefs Issue. In 2014 USENIX Annual Technical Conf. (USENIX \u201914). USENIX Association. https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/tartler"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966451"},{"key":"e_1_3_2_1_42_1","unstructured":"The\u00a0Clang Team. 2023. JSON Compilation Database Format Specification. https:\/\/clang.llvm.org\/docs\/JSONCompilationDatabase.html"},{"key":"e_1_3_2_1_43_1","unstructured":"The kernel development community. 2019. The Linux Kernel \u2014 Reproducible builds. https:\/\/www.kernel.org\/doc\/html\/latest\/kbuild\/reproducible-builds.html"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580950"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3307630.3342414"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233027.3233035"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579027.3608978"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416590"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644896"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364412.2364428"}],"event":{"name":"SPLC '24: 28th ACM International Systems and Software Product Line Conference","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Dommeldange Luxembourg","acronym":"SPLC '24"},"container-title":["28th ACM International Systems and Software Product Line Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646548.3672585","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646548.3672585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:55:56Z","timestamp":1755881756000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646548.3672585"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":50,"alternative-id":["10.1145\/3646548.3672585","10.1145\/3646548"],"URL":"https:\/\/doi.org\/10.1145\/3646548.3672585","relation":{},"subject":[],"published":{"date-parts":[[2024,9,2]]},"assertion":[{"value":"2024-09-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}