{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:22Z","timestamp":1750309522944,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:00:00Z","timestamp":1726444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,16]]},"DOI":"10.1145\/3703465.3703473","type":"proceedings-article","created":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T12:18:31Z","timestamp":1737029911000},"page":"96-105","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\u201cFunction Extraction: A New Paradigm for Producing Secure Code\u201c"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1209-8829","authenticated-orcid":false,"given":"Richard","family":"Linger","sequence":"first","affiliation":[{"name":"AssuranceLabs Inc., Gaithersburg, Maryland, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0135-5287","authenticated-orcid":false,"given":"Mark","family":"Pleszkoch","sequence":"additional","affiliation":[{"name":"Center for Computing Sciences, Institute for Defense Analyses, Bowie, Maryland, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4124-8435","authenticated-orcid":false,"given":"Jack","family":"McGaughey","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2900-1966","authenticated-orcid":false,"given":"John","family":"Mchugh","sequence":"additional","affiliation":[{"name":"University of South Florida, Tampa, Florida, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9162-4887","authenticated-orcid":false,"given":"Wided","family":"Ghardallou","sequence":"additional","affiliation":[{"name":"ENISO, University of Sousse, Sousse, Tunisia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6578-5510","authenticated-orcid":false,"given":"Ali","family":"Mili","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology, Newark, New Jersey, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,1,16]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"Test Driven Development. By Example (Addison-Wesley Signature)","author":"Beck Kent","year":"2002","unstructured":"Kent Beck. 2002. Test Driven Development. By Example (Addison-Wesley Signature). Addison-Wesley Longman, Amsterdam."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Al Bessey Ken Block Ben Chelf Andy Chou Bryan Fulton Seth Hallem Charles Henri-Gros Asya Kamsky Scott McPeak and Dawson Engler. 2010. A few billion lines of code later: using static analysis to find bugs in the real world. Commun. ACM 53 2 (Feb. 2010) 66\u201375. 10.1145\/1646353.1646374","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_3_2_4_2","volume-title":"CSNOBOL4","author":"Budne Phil","year":"2024","unstructured":"Phil Budne. 2024. CSNOBOL4. https:\/\/www.regressive.org\/snobol4\/csnobol4\/curr\/"},{"volume-title":"Clang: a C language family frontend for LLVM","year":"2024","key":"e_1_3_3_2_5_2","unstructured":"Clang. 2024. Clang: a C language family frontend for LLVM."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Patrick Cousot. 2000. Abstract interpretation: Achievements and perspectives. http:\/\/cs.nyu.edu\/\u00a0pcousot\/publications.www\/Cousot-SSGRR-00.pdf","DOI":"10.1145\/325694.325699"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.5555\/550359"},{"key":"e_1_3_3_2_8_2","volume-title":"What we know about the xz Utils backdoor that almost infected the world","author":"Goddin Dan","year":"2024","unstructured":"Dan Goddin. 2024. What we know about the xz Utils backdoor that almost infected the world. https:\/\/arstechnica.com\/security\/2024\/04\/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world\/"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.5555\/1095600"},{"key":"e_1_3_3_2_10_2","volume-title":"LLVM Language Reference Manual","author":"IR LLVM","year":"2024","unstructured":"LLVM IR. 2024. LLVM Language Reference Manual. https:\/\/llvm.org\/docs\/LangRef.html"},{"volume-title":"Tools for your Java Code","year":"2024","key":"e_1_3_3_2_11_2","unstructured":"Javaparser. 2024. Tools for your Java Code. https:\/\/javaparser.org\/"},{"key":"e_1_3_3_2_12_2","unstructured":"S.\u00a0C. Johnson and Murray Hill. 1978. Lint a C Program Checker. https:\/\/api.semanticscholar.org\/CorpusID:59749883"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Richard\u00a0A. Kemmerer. 1983. Shared resource matrix methodology: an approach to identifying storage and timing channels. ACM Trans. Comput. Syst. 1 3 (aug 1983) 256\u2013277. 10.1145\/357369.357374","DOI":"10.1145\/357369.357374"},{"key":"e_1_3_3_2_14_2","volume-title":"Structured Programming: Theory and Practice","author":"Linger Richard\u00a0C.","year":"1979","unstructured":"Richard\u00a0C. Linger, Harlan\u00a0D. Mills, and Bernard\u00a0I. Witt. 1979. Structured Programming: Theory and Practice. Addison Wesley Publishing Company."},{"volume-title":"The LLVM Compiler Infrastructure","year":"2024","key":"e_1_3_3_2_15_2","unstructured":"LLVM. 2024. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Ali Mili Shir Aharon and Chaitanya Nadkarni. 2009. Mathematics for reasoning about loop functions. Science of Computer Programming 74 11 (2009) 989\u20131020. 10.1016\/j.scico.2009.09.009","DOI":"10.1016\/j.scico.2009.09.009"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Joan\u00a0C. Miller and Clifford\u00a0J. Maloney. 1963. Systematic mistake analysis of digital computer programs. Commun. ACM 6 2 (Feb. 1963) 58\u201363. 10.1145\/366246.366248","DOI":"10.1145\/366246.366248"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/800027.808459"},{"key":"e_1_3_3_2_19_2","volume-title":"Embedded in Academia: A Guide to Undefined Behavior in C and C++, Parts 1\u20133","author":"Regehr John","year":"2010","unstructured":"John Regehr. 2010. Embedded in Academia: A Guide to Undefined Behavior in C and C++, Parts 1\u20133. https:\/\/blog.regehr.org\/archives\/213"},{"key":"e_1_3_3_2_20_2","volume-title":"Rust Compiler Development Guide: Overview of the compiler","author":"lang.org rust","year":"2024","unstructured":"rust lang.org. 2024. Rust Compiler Development Guide: Overview of the compiler. https:\/\/rustc-dev-guide.rust-lang.org\/overview.html"},{"key":"e_1_3_3_2_21_2","volume-title":"A \u2019Worst Nightmare\u2019 Cyberattack: The Untold Story Of The SolarWinds Hack","author":"Temple-Raston Dina","year":"2021","unstructured":"Dina Temple-Raston. 2021. A \u2019Worst Nightmare\u2019 Cyberattack: The Untold Story Of The SolarWinds Hack. https:\/\/www.npr.org\/2021\/04\/16\/985439655\/a-worst-nightmare-cyberattack-the-untold-story-of-the-solarwinds-hack"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Gwendolyn\u00a0H. Walton J.\u00a0H. Poore and Carmen\u00a0J. Trammell. 1995. Statistical Testing of Software Based on a Usage Model. Software\u2014 Practice and Experience 25 1 (Jan. 1995) 97\u2013108. 10.1002\/spe.4380250106","DOI":"10.1002\/spe.4380250106"},{"key":"e_1_3_3_2_23_2","volume-title":"Mathematica, Version 14.0","author":"Inc. Wolfram Research,","year":"2024","unstructured":"Wolfram Research, Inc.2024. Mathematica, Version 14.0. https:\/\/www.wolfram.com\/mathematica, Champaign, IL."}],"event":{"name":"NSPW '24: New Security Paradigms Workshop","acronym":"NSPW '24","location":"Bedford PA USA"},"container-title":["Proceedings of the New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703465.3703473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3703465.3703473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:08Z","timestamp":1750295888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3703465.3703473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,16]]},"references-count":22,"alternative-id":["10.1145\/3703465.3703473","10.1145\/3703465"],"URL":"https:\/\/doi.org\/10.1145\/3703465.3703473","relation":{},"subject":[],"published":{"date-parts":[[2024,9,16]]},"assertion":[{"value":"2025-01-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}