{"status":"ok","message-type":"work-list","message-version":"1.0.0","message":{"facets":{},"total-results":50,"items":[{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T15:08:37Z","timestamp":1774883317740,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T00:00:00Z","timestamp":1768953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1007\/s10664-025-10789-w","type":"journal-article","created":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T09:09:40Z","timestamp":1768986580000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The design space of lockfiles across package managers"],"prefix":"10.1007","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-7537-4961","authenticated-orcid":false,"given":"Yogya","family":"Gamage","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0293-2592","authenticated-orcid":false,"given":"Deepika","family":"Tiwari","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,21]]},"reference":[{"key":"10789_CR1","doi-asserted-by":"publisher","unstructured":"Alfadel M, Costa DE, Shihab E, Mkhallalati M (2021) On the use of dependabot security pull requests. In: 2021 IEEE\/ACM 18th International conference on mining software repositories (MSR), pp 254\u2013265. https:\/\/doi.org\/10.1109\/MSR52588.2021.00037","DOI":"10.1109\/MSR52588.2021.00037"},{"key":"10789_CR2","doi-asserted-by":"crossref","unstructured":"Abate P, Di\u00a0Cosmo R, Gousios G, Zacchiroli S (2020) Dependency solving is still hard, but we are getting better at it. In: 2020 IEEE 27th International conference on software analysis, evolution and reengineering (SANER), IEEE, pp 547\u2013551","DOI":"10.1109\/SANER48275.2020.9054837"},{"key":"10789_CR3","doi-asserted-by":"crossref","unstructured":"A\u00efdasso H, Sayagh M, Bordeleau F (2025) Build Optimization: A Systematic Literature Review. arXiv:2501.11940","DOI":"10.1145\/3757912"},{"key":"10789_CR4","doi-asserted-by":"crossref","unstructured":"Bogart C, K\u00e4stner C, Herbsleb J, Thung F (2021) When and How to Make Breaking Changes: Policies and Practices in 18 Open Source Software Ecosystems. ACM Trans Softw Eng Methodol","DOI":"10.1145\/3447245"},{"key":"10789_CR5","doi-asserted-by":"publisher","unstructured":"Bifolco D, Nocera S, Romano S, Di\u00a0Penta M, Francese R, Scanniello G (2024) On the accuracy of github\u2019s dependency graph. In: Proceedings of the 28th international conference on evaluation and assessment in software engineering. EASE \u201924, Association for Computing Machinery, New York, NY, USA, pp 242\u2013251. https:\/\/doi.org\/10.1145\/3661167.3661175","DOI":"10.1145\/3661167.3661175"},{"key":"10789_CR6","unstructured":"Bos AM (2023) A review of attacks against language-based package managers. arXiv:2302.08959"},{"key":"10789_CR7","doi-asserted-by":"crossref","unstructured":"Bi T, Xia B, Xing Z, Lu Q, Zhu L (2024) On the way to sboms: Investigating design issues and solutions in practice. ACM Trans Softw Eng Methodol","DOI":"10.1145\/3654442"},{"key":"10789_CR8","unstructured":"Cass S (2024) The top programming languages 2024. https:\/\/spectrum.ieee.org\/top-programming-languages-2024"},{"key":"10789_CR9","doi-asserted-by":"publisher","unstructured":"Cleare J, Iacob C (2018) Gemchecker: Reporting on the status of gems in ruby on rails projects. In: 2018 IEEE International conference on software maintenance and evolution (ICSME), pp 700\u2013704. https:\/\/doi.org\/10.1109\/ICSME.2018.00080","DOI":"10.1109\/ICSME.2018.00080"},{"issue":"2","key":"10789_CR10","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/3329781.3344149","volume":"17","author":"R Cox","year":"2019","unstructured":"Cox R (2019) Surviving software dependencies: Software reuse is finally here but comes with risks. Queue 17(2):24\u201347. https:\/\/doi.org\/10.1145\/3329781.3344149","journal-title":"Queue"},{"key":"10789_CR11","doi-asserted-by":"publisher","unstructured":"Decan A, Mens T, Constantinou E (2018) On the impact of security vulnerabilities in the npm package dependency network. In: Proceedings of the 15th international conference on mining software repositories. MSR \u201918, Association for Computing Machinery, New York, NY, USA, pp 181\u2013191. https:\/\/doi.org\/10.1145\/3196398.3196401","DOI":"10.1145\/3196398.3196401"},{"key":"10789_CR12","doi-asserted-by":"publisher","unstructured":"Goswami P, Gupta S, Li Z, Meng N, Yao D (2020) Investigating the reproducibility of npm packages. In: 2020 IEEE International conference on software maintenance and evolution (ICSME), pp 677\u2013681. https:\/\/doi.org\/10.1109\/ICSME46990.2020.00071","DOI":"10.1109\/ICSME46990.2020.00071"},{"key":"10789_CR13","doi-asserted-by":"crossref","unstructured":"Gu Y, Ying L, Pu Y, Hu X, Chai H, Wang R, Gao X, Duan H (2023) Investigating package related security threats in software registries. In: 2023 IEEE Symposium on security and privacy (SP), IEEE, pp 1578\u20131595","DOI":"10.1109\/SP46215.2023.10179332"},{"key":"10789_CR14","doi-asserted-by":"crossref","unstructured":"He H, Vasilescu B, K\u00e4stner C (2025) Pinning is futile: You need more than local dependency versioning to defend against supply chain attacks. arXiv:2502.06662","DOI":"10.1145\/3715728"},{"key":"10789_CR15","doi-asserted-by":"publisher","unstructured":"Kalliamvakou E, Gousios G, Blincoe K, Singer L, German DM, Damian D (2014) The promises and perils of mining github. In: Proceedings of the 11th working conference on mining software repositories. MSR 2014, Association for Computing Machinery, New York, NY, USA, pp 92\u2013101. https:\/\/doi.org\/10.1145\/2597073.2597074","DOI":"10.1145\/2597073.2597074"},{"issue":"2","key":"10789_CR16","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/130844.130856","volume":"24","author":"CW Krueger","year":"1992","unstructured":"Krueger CW (1992) Software Reuse ACM Comput Surveys 24(2):131\u2013183","journal-title":"Software Reuse ACM Comput Surveys"},{"key":"10789_CR17","unstructured":"Kalu KG, Singla T, Okafor C, Torres-Arias S, Davis JC (2024) An industry interview study of software signing for supply chain security. arXiv:2406.08198"},{"key":"10789_CR18","doi-asserted-by":"publisher","unstructured":"Kabir MMA, Wang Y, Yao D, Meng N (2022) How do developers follow security-relevant best practices when using npm packages? In: 2022 IEEE Secure development conference (SecDev), pp 77\u201383. https:\/\/doi.org\/10.1109\/SecDev53368.2022.00027","DOI":"10.1109\/SecDev53368.2022.00027"},{"issue":"1","key":"10789_CR19","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1109\/TSE.2022.3152148","volume":"49","author":"H Li","year":"2023","unstructured":"Li H, C\u00f4go FR, Bezemer C (2023) An empirical study of yanked releases in the rust package registry. IEEE Trans Software Eng 49(1):437\u2013449","journal-title":"IEEE Trans Software Eng"},{"key":"10789_CR20","doi-asserted-by":"publisher","unstructured":"Liu C, Chen S, Fan L, Chen B, Liu Y, Peng X (2022) Demystifying the vulnerability propagation and its evolution via dependency trees in the npm ecosystem. In: Proceedings of the 44th international conference on software engineering. ICSE \u201922, Association for Computing Machinery, New York, NY, USA, pp 672\u2013684. https:\/\/doi.org\/10.1145\/3510003.3510142","DOI":"10.1145\/3510003.3510142"},{"key":"10789_CR21","doi-asserted-by":"crossref","unstructured":"Ladisa P, Plate H, Martinez M, Barais O (2023) Sok: Taxonomy of attacks on open-source software supply chains. In: 2023 IEEE Symposium on security and privacy (SP), IEEE, pp 1509\u20131526","DOI":"10.1109\/SP46215.2023.10179304"},{"issue":"2","key":"10789_CR22","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MS.2021.3073045","volume":"39","author":"C Lamb","year":"2022","unstructured":"Lamb C, Zacchiroli S (2022) Reproducible builds: Increasing the integrity of software supply chains. IEEE Softw 39(2):62\u201370","journal-title":"IEEE Softw"},{"key":"10789_CR23","doi-asserted-by":"publisher","unstructured":"Mohayeji H, Agaronian A, Constantinou E, Zannone N, Serebrenik A (2023) Investigating the resolution of vulnerable dependencies with dependabot security updates. In: 2023 IEEE\/ACM 20th International conference on mining software repositories (MSR), pp 234\u2013246. https:\/\/doi.org\/10.1109\/MSR59073.2023.00042","DOI":"10.1109\/MSR59073.2023.00042"},{"key":"10789_CR24","doi-asserted-by":"publisher","unstructured":"Mohayeji H, Agaronian A, Constantinou E, Zannone N, Serebrenik A (2025) Securing dependencies: A comprehensive study of dependabot\u2019s impact on vulnerability mitigation. Empirical Softw Eng 30(3). https:\/\/doi.org\/10.1007\/s10664-025-10638-w","DOI":"10.1007\/s10664-025-10638-w"},{"key":"10789_CR25","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/s10664-007-9040-x","volume":"12","author":"P Mohagheghi","year":"2007","unstructured":"Mohagheghi P, Conradi R (2007) Quality, productivity and economic benefits of software reuse: a review of industrial studies. Empirical Softw Eng 12:471\u2013516","journal-title":"Empirical Softw Eng"},{"issue":"13","key":"10789_CR26","doi-asserted-by":"publisher","first-page":"1753","DOI":"10.1177\/1049732315617444","volume":"26","author":"K Malterud","year":"2016","unstructured":"Malterud K, Siersma VD, Guassora AD (2016) Sample size in qualitative interview studies: Guided by information power. Qualitative Health Res 26(13):1753\u20131760. https:\/\/doi.org\/10.1177\/1049732315617444","journal-title":"Qualitative Health Res"},{"key":"10789_CR27","doi-asserted-by":"publisher","unstructured":"Ochoa L, Degueule T, Falleri J-R, Vinju J (2022) Breaking bad? semantic versioning and impact of breaking changes in maven central: An external and differentiated replication study. Empirical Softw Engg 27(3). https:\/\/doi.org\/10.1007\/s10664-021-10052-y","DOI":"10.1007\/s10664-021-10052-y"},{"key":"10789_CR28","doi-asserted-by":"publisher","unstructured":"Pinckney D, Cassano F, Guha A, Bell J, Culpo M, Gamblin T (2023) Flexible and optimal dependency management via max-smt. In: 2023 IEEE\/ACM 45th International conference on software engineering (ICSE), pp 1418\u20131429. https:\/\/doi.org\/10.1109\/ICSE48619.2023.00124","DOI":"10.1109\/ICSE48619.2023.00124"},{"key":"10789_CR29","doi-asserted-by":"publisher","unstructured":"Patra J, Dixit PN, Pradel M (2018) Conflictjs: Finding and understanding conflicts between javascript libraries. In: 2018 IEEE\/ACM 40th International conference on software engineering (ICSE), pp 741\u2013751. https:\/\/doi.org\/10.1145\/3180155.3180184","DOI":"10.1145\/3180155.3180184"},{"key":"10789_CR30","doi-asserted-by":"publisher","unstructured":"Reyes F, Baudry B, Monperrus M (2024) Breaking-Good: Explaining Breaking Dependency Updates with Build Analysis . In: 2024 IEEE International conference on source code analysis and manipulation (SCAM), IEEE Computer Society, Los Alamitos, CA, USA, pp 36\u201346. https:\/\/doi.org\/10.1109\/SCAM63643.2024.00014","DOI":"10.1109\/SCAM63643.2024.00014"},{"key":"10789_CR31","doi-asserted-by":"crossref","unstructured":"Rombaut B, Cogo FR, Adams B, Hassan AE (2023) There\u2019s no such thing as a free lunch: Lessons learned from exploring the overhead introduced by the greenkeeper dependency bot in npm. ACM Trans Softw Eng Methodol","DOI":"10.1145\/3522587"},{"key":"10789_CR32","doi-asserted-by":"publisher","unstructured":"Reyes F, Gamage Y, Skoglund G, Baudry B, Monperrus M (2024) Bump: A benchmark of reproducible breaking dependency updates. In: 2024 IEEE International conference on software analysis, evolution and reengineering (SANER), pp 159\u2013170. https:\/\/doi.org\/10.1109\/SANER60148.2024.00024","DOI":"10.1109\/SANER60148.2024.00024"},{"key":"10789_CR33","doi-asserted-by":"crossref","unstructured":"Rausch T, Hummer W, Leitner P, Schulte S (2017) An empirical analysis of build failures in the continuous integration workflows of java-based open-source software. In: 2017 IEEE\/ACM 14th International conference on mining software repositories (MSR), IEEE, pp 345\u2013355","DOI":"10.1109\/MSR.2017.54"},{"key":"10789_CR34","unstructured":"Radford A, Kim J.W, Xu T, Brockman G, McLeavey C, Sutskever I (2023) Robust speech recognition via large-scale weak supervision. In: Proceedings of the 40th international conference on machine learning. ICML\u201923"},{"key":"10789_CR35","doi-asserted-by":"crossref","unstructured":"Rahman I, Marley J, Enck W, Williams L (2025) Which Is Better For Reducing Outdated and Vulnerable Dependencies: Pinning or Floating? arXiv:2510.08609","DOI":"10.1109\/ASE63991.2025.00229"},{"key":"10789_CR36","unstructured":"Rahman I, Paramitha R, Zahan N, Magill S, Enck W, Williams L (2025) No Vulnerability Data, No Problem: Towards Predicting Mean Time To Remediate In Open Source Software Dependencies. arXiv:2403.17382"},{"key":"10789_CR37","doi-asserted-by":"publisher","unstructured":"Schorlemmer TR, Kalu KG, Chigges L, Ko KM, Ishgair EA, Bagchi S, Torres-Arias S, Davis JC (2024) Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors . In: 2024 IEEE Symposium on security and privacy (SP), IEEE Computer Society, Los Alamitos, CA, USA, pp 1160\u20131178. https:\/\/doi.org\/10.1109\/SP54263.2024.00215","DOI":"10.1109\/SP54263.2024.00215"},{"issue":"2","key":"10789_CR38","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MS.2012.38","volume":"29","author":"D Spinellis","year":"2012","unstructured":"Spinellis D (2012) Package management systems. IEEE Softw 29(2):84\u201386","journal-title":"IEEE Softw"},{"issue":"1","key":"10789_CR39","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1038\/s41597-022-01819-z","volume":"9","author":"W Schueller","year":"2022","unstructured":"Schueller W, Wachs J, Servedio VDP, Thurner S, Loreto V (2022) Evolving collaboration, dependencies, and use in the rust open source software ecosystem. Scientific Data 9(1):703. https:\/\/doi.org\/10.1038\/s41597-022-01819-z","journal-title":"Scientific Data"},{"key":"10789_CR40","unstructured":"Vaidya RK, Carli LD, Davidson D, Rastogi V (2021) Security issues in language-based software ecosystems. arXiv:1903.02613"},{"key":"10789_CR41","doi-asserted-by":"crossref","unstructured":"Venturini D, Cogo FR, Polato I, Gerosa MA, Wiese IS (2023) I depended on you and you broke me: An empirical study of manifesting breaking changes in client packages. ACM Trans Softw Eng Methodol","DOI":"10.1145\/3576037"},{"key":"10789_CR42","doi-asserted-by":"crossref","unstructured":"Williams L, Benedetti G, Hamer S, Paramitha R, Rahman I, Tamanna M, Tystahl G, Zahan N, Morrison P, Acar Y, Cukier M, K\u00e4stner C, Kapravelos A, Wermke D, Enck W (2025) Research directions in software supply chain security. ACM Trans Softw Eng Methodol","DOI":"10.1145\/3714464"},{"key":"10789_CR43","doi-asserted-by":"publisher","unstructured":"Wang Y, Qiao L, Xu C, Liu Y, Cheung S-C, Meng N, Yu H, Zhu Z (2021) Hero: On the chaos when path meets modules. In: Proceedings of the 43rd international conference on software engineering. ICSE \u201921, pp 99\u2013111. https:\/\/doi.org\/10.1109\/ICSE43902.2021.00022","DOI":"10.1109\/ICSE43902.2021.00022"},{"key":"10789_CR44","doi-asserted-by":"publisher","unstructured":"Wang Y, Wen M, Liu Y, Wang Y, Li Z, Wang C, Yu H, Cheung S-C, Xu C, Zhu Z (2020) Watchman: Monitoring dependency conflicts for python library ecosystem. In: 2020 IEEE\/ACM 42nd International conference on software engineering (ICSE), pp 125\u2013135. https:\/\/doi.org\/10.1145\/3377811.3380426","DOI":"10.1145\/3377811.3380426"},{"key":"10789_CR45","doi-asserted-by":"publisher","unstructured":"Wang C, Wu R, Song H, Shu J, Li G (2023) smartpip: A smart approach to resolving python dependency conflict issues. In: Proceedings of the 37th IEEE\/ACM International conference on automated software engineering. ASE \u201922. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3551349.3560437","DOI":"10.1145\/3551349.3560437"},{"key":"10789_CR46","doi-asserted-by":"publisher","unstructured":"Wang X, Wang M, Shen W, Chang R, (2025) Understanding and Detecting Peer Dependency Resolving Loop in npm Ecosystem. In, (2025) IEEE\/ACM 47th International conference on software engineering (ICSE), pp 591\u2013591. IEEE Computer Society Los Alamitos CA USA. https:\/\/doi.org\/10.1109\/ICSE55347.2025.00054","DOI":"10.1109\/ICSE55347.2025.00054"},{"key":"10789_CR47","doi-asserted-by":"publisher","unstructured":"Wang Y, Wen M, Wu R, Liu Z, Tan SH, Zhu Z, Yu H, Cheung S-C (2019) Could i have a stack trace to examine the dependency conflict issue? In: 2019 IEEE\/ACM 41st International conference on software engineering (ICSE), pp 572\u2013583. https:\/\/doi.org\/10.1109\/ICSE.2019.00068","DOI":"10.1109\/ICSE.2019.00068"},{"key":"10789_CR48","doi-asserted-by":"publisher","unstructured":"Yu S, Song W, Hu X, Yin H (2024) On the correctness of metadata-based sbom generation: A differential analysis approach. In: 2024 54th Annual IEEE\/IFIP International conference on dependable systems and networks (DSN), pp 29\u201336. https:\/\/doi.org\/10.1109\/DSN58291.2024.00018","DOI":"10.1109\/DSN58291.2024.00018"}],"container-title":["Empirical Software Engineering"],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10789-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10789-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10789-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T14:37:17Z","timestamp":1774881437000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10789-w"}},"issued":{"date-parts":[[2026,1,21]]},"references-count":48,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["10789"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10789-w","ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"published":{"date-parts":[[2026,1,21]]},"assertion":[{"value":"25 July 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"This paper includes minimal-risk data collected from developers during interviews. Participation in the study was entirely voluntary. All data collected from participants were anonymized and were handled in accordance with the\n                      \n                      . Prior to the study, we obtained approval from our organization\u2019s Research Ethics Board (REB).","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Considerations"}},{"value":"Generative AI was not used for the generation of any part of the content in this paper or for data analysis. Grammarly, a tool that uses AI, was used for spell checking, grammar correction, and improving writing clarity.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Generative AI"}},{"value":"Not applicable","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Number"}}],"article-number":"63"},{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T00:43:57Z","timestamp":1773276237851,"version":"3.50.1"},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Softw."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/ms.2023.3298729","type":"journal-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T18:37:33Z","timestamp":1690396653000},"page":"68-76","source":"Crossref","is-referenced-by-count":9,"title":["SOBO: A Feedback Bot to Nudge Code Quality in Programming Courses"],"prefix":"10.1109","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3116-3278","authenticated-orcid":false,"given":"Sofia","family":"Bobadilla","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8996-0221","authenticated-orcid":false,"given":"Richard","family":"Glassey","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8087-1903","authenticated-orcid":false,"given":"Alexandre","family":"Bergel","sequence":"additional","affiliation":[{"name":"Computer scientist, RelationalAI, Bern, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"Software Rechnology, KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"issue":"4","key":"ref1","article-title":"The impact of automated code quality feedback in programming education","volume":"210","author":"Jansen","year":"2017","journal-title":"Proc.-Post 10th Seminar Adv. Techn. Tools Softw. Evol. (SATToSE)"},{"key":"ref2","first-page":"792","article-title":"It is never too early to learn about code quality: Analyzing code quality of first-year programming students and the difference between TA groups","volume-title":"Proc. 54th ACM Tech. Symp. Comput. Sci. Educ. (SIGCSE)","author":"Wicklund","year":"2023"},{"key":"ref3","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"Thaler","year":"2009"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.econedurev.2018.03.008"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3513140"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18304-1_4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2022.3224813"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560425"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ase51524.2021.9678837"},{"key":"ref10","volume-title":"Java code quality and code security","year":"2022"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3534857"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3167316"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159602"}],"container-title":["IEEE Software"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/52\/10443793\/10195904.pdf?arnumber=10195904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T16:11:51Z","timestamp":1709309511000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10195904\/"}},"issued":{"date-parts":[[2024,3]]},"references-count":13,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/ms.2023.3298729","ISSN":["0740-7459","1937-4194"],"issn-type":[{"value":"0740-7459","type":"print"},{"value":"1937-4194","type":"electronic"}],"published":{"date-parts":[[2024,3]]}},{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:19:02Z","timestamp":1763468342133,"version":"3.40.5"},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1016\/j.jss.2016.08.062","type":"journal-article","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T19:46:30Z","timestamp":1472845590000},"page":"52-62","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Casper: Automatic tracking of null dereferences to inception with causality traces"],"prefix":"10.1016","volume":"122","author":[{"given":"Benoit","family":"Cornu","sequence":"first","affiliation":[]},{"given":"Earl T.","family":"Barr","sequence":"additional","affiliation":[]},{"given":"Lionel","family":"Seinturier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2016.08.062_bib0001","series-title":"Proceedings of the Workshop on Program Analysis for Software Tools and Engineering","first-page":"65","article-title":"Null dereference analysis in practice","author":"Ayewah","year":"2010"},{"key":"10.1016\/j.jss.2016.08.062_bib0002","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/S0065-2458(03)62003-6","article-title":"A survey of empirical results on program slicing","volume":"62","author":"Binkley","year":"2004","journal-title":"Adv. Comput."},{"issue":"10","key":"10.1016\/j.jss.2016.08.062_bib0003","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/1297105.1297057","article-title":"Tracking bad apples: reporting the origin of null and undefined value errors","volume":"42","author":"Bond","year":"2007","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1016\/j.jss.2016.08.062_bib0004","unstructured":"The Cobra Programming Language. 2016. http:\/\/cobra-language.com\/."},{"key":"10.1016\/j.jss.2016.08.062_bib0005","series-title":"Proceedings of the 33rd International Conference on Software Engineering","first-page":"681","article-title":"Building and Using Pluggable Type-checkers","author":"Dietl","year":"2011"},{"key":"10.1016\/j.jss.2016.08.062_bib0006","series-title":"Software Reliability Engineering, 2008. ISSRE 2008. 19th International Symposium on","first-page":"47","article-title":"Changing Java\u2019s Semantics for Handling Null Pointer Exceptions","author":"Dobolyi","year":"2008"},{"issue":"4","key":"10.1016\/j.jss.2016.08.062_bib0007","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/248448.248456","article-title":"My hairiest bug war stories","volume":"40","author":"Eisenstadt","year":"1997","journal-title":"Commun. ACM"},{"issue":"11","key":"10.1016\/j.jss.2016.08.062_bib0008","doi-asserted-by":"crossref","DOI":"10.1145\/949343.949332","article-title":"Declaring and checking non-null types in an object-oriented language","volume":"38","author":"F\u00e4hndrich","year":"2003","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1016\/j.jss.2016.08.062_bib0009","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.infsof.2014.10.010","article-title":"Automated refactoring to the null object design pattern","volume":"59","author":"Gaitani","year":"2015","journal-title":"Inf. Softw. Technol."},{"year":"2005","series-title":"Java Language Specification","author":"Gosling","key":"10.1016\/j.jss.2016.08.062_bib0010"},{"issue":"12","key":"10.1016\/j.jss.2016.08.062_bib0011","doi-asserted-by":"crossref","DOI":"10.1145\/1052883.1052895","article-title":"Finding bugs is easy","volume":"39","author":"Hovemeyer","year":"2004","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1016\/j.jss.2016.08.062_bib0012","series-title":"ACM SIGSOFT Software Engineering Notes","first-page":"13","article-title":"Evaluating and tuning a static analysis to find null pointer bugs","volume":"31","author":"Hovemeyer","year":"2005"},{"year":"2008","series-title":"Dynamic error remediation: acase study with null pointer exceptions","author":"Kent","key":"10.1016\/j.jss.2016.08.062_bib0013"},{"key":"10.1016\/j.jss.2016.08.062_bib0014","series-title":"IEEE Conference on Software Maintenance, Reengineering and Reverse Engineering (CSMR-WCRE)","first-page":"244","article-title":"Does return null matter?","author":"Kimura","year":"2014"},{"key":"10.1016\/j.jss.2016.08.062_bib0015","series-title":"Proceedings of the 1st workshop on Architectural and system support for improving software dependability","first-page":"25","article-title":"Have things changed now?: an empirical study of bug characteristics in modern open source software","author":"Li","year":"2006"},{"key":"10.1016\/j.jss.2016.08.062_bib0016","article-title":"Spoon: alibrary for implementing analyses and transformations of java source code","author":"Pawlak","year":"2015","journal-title":"Softw. Pract. Exp."},{"key":"10.1016\/j.jss.2016.08.062_bib0017","series-title":"Software Testing, Verification and Validation (ICST), 2011 IEEE Fourth International Conference on","first-page":"160","article-title":"An approach for search based testing of null pointer exceptions","author":"Romano","year":"2011"},{"year":"2001","series-title":"Linux Device Drivers","author":"Rubini","key":"10.1016\/j.jss.2016.08.062_bib0018"},{"key":"10.1016\/j.jss.2016.08.062_bib0019","series-title":"Proceedings of the 3rd Workshop on Programming Languages Meets Program Verification","first-page":"67","article-title":"Challenge proposal: Verification of refactorings","author":"Sch\u00e4fer","year":"2008"},{"key":"10.1016\/j.jss.2016.08.062_bib0020","series-title":"Proceedings of the eighteenth international symposium on Software testing and analysis","first-page":"153","article-title":"Fault Localization and Repair for Java Runtime Exceptions","author":"Sinha","year":"2009"},{"issue":"2","key":"10.1016\/j.jss.2016.08.062_bib0021","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/s10270-009-0132-5","article-title":"Precise null-pointer analysis","volume":"10","author":"Spoto","year":"2011","journal-title":"Softw. Syst. Model."},{"key":"10.1016\/j.jss.2016.08.062_bib0022","series-title":"Fundamental Approaches to Software Engineering","first-page":"355","article-title":"Algorithms for automatically computing the causal paths of failures","author":"Sumner","year":"2009"},{"key":"10.1016\/j.jss.2016.08.062_bib0023","series-title":"Proceedings of the International Conference on Software Engineering","first-page":"272","article-title":"Comparative causality: explaining the differences between executions","author":"Sumner","year":"2013"},{"key":"10.1016\/j.jss.2016.08.062_bib0024","series-title":"ACM SIGPLAN Notices","first-page":"51","article-title":"Generating sound and effective memory debuggers","volume":"48","author":"Wang","year":"2013"},{"key":"10.1016\/j.jss.2016.08.062_bib0025","series-title":"Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering","first-page":"1","article-title":"Isolating cause-effect chains from computer programs","author":"Zeller","year":"2002"}],"container-title":["Journal of Systems and Software"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121216301522?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121216301522?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T01:15:49Z","timestamp":1572657349000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121216301522"}},"issued":{"date-parts":[[2016,12]]},"references-count":25,"alternative-id":["S0164121216301522"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2016.08.062","ISSN":["0164-1212"],"issn-type":[{"type":"print","value":"0164-1212"}],"published":{"date-parts":[[2016,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Casper: Automatic tracking of null dereferences to inception with causality traces","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2016.08.062","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]},{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T06:43:26Z","timestamp":1775889806827,"version":"3.50.1"},"reference-count":192,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T00:00:00Z","timestamp":1516665600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2019,1,31]]},"abstract":"<jats:p>This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention. This article considers all kinds of repairs. First, it discusses behavioral repair where test suites, contracts, models, and crashing inputs are taken as oracle. Second, it discusses state repair, also known as runtime repair or runtime recovery, with techniques such as checkpoint and restart, reconfiguration, and invariant restoration. The uniqueness of this article is that it spans the research communities that contribute to this body of knowledge: software engineering, dependability, operating systems, programming languages, and security. It provides a novel and structured overview of the diversity of bug oracles and repair operators used in the literature.<\/jats:p>","DOI":"10.1145\/3105906","type":"journal-article","created":{"date-parts":[[2018,1,23]],"date-time":"2018-01-23T13:26:43Z","timestamp":1516714003000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":286,"title":["Automatic Software Repair"],"prefix":"10.1145","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"first","affiliation":[{"name":"University of Lille, Villeneuve d'Ascq Cedex"}]}],"member":"320","published-online":{"date-parts":[[2018,1,23]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.42"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2012.28"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.2185"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0062-z"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.01.023"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630793"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642955"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635898"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133255.1134000"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-013-0287-9"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.49"},{"key":"e_1_2_1_16_1","volume-title":"Claire Le Goues, and Prem Devanbu","author":"Brun Yuriy","year":"2013"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884819"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 125--130","author":"Candea G."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the 9th Conference on Hot Topics in Operating Systems. 12--12","author":"Candea G."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251257"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the Workshop on Active Middleware Services. 168--177","author":"Candea G."},{"key":"e_1_2_1_22_1","volume-title":"Procceedings of the European Conference on Object-Oriented Programming (ECOOP\u201911)","author":"Carbin Michael"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486891"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882327"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/646546.693939"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486892"},{"key":"e_1_2_1_28_1","volume-title":"Exception handling analysis and transformation using fault injection: Study of resilience against unanticipated exceptions. Inf. Softw. Technol. 57 (Jan","author":"Cornu Benoit","year":"2015"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095824"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1883784.1883820"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.15"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.17"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593735.2593740"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70592-5_21"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/949343.949314"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595734"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 7th Symposium on Trends in Functional Programming. 131--140","author":"Dennis Louise A.","year":"2006"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786877"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.59"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.113"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_21"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/248448.248456"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321643"},{"key":"e_1_2_1_45_1","volume-title":"Propolice: Improved stacksmashing attack detection. IPSJ SIG Not2 75","author":"Yoda H.","year":"2001"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570031"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.8"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336775"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167515.1167510"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818812"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.81"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454510"},{"key":"e_1_2_1_53_1","doi-asserted-by":"crossref","unstructured":"David Garlan Shang-Wen Cheng and Bradley Schmerl. 2003. Increasing system dependability through architecture-based self-repair. In Architecting Dependable Systems. 61--89.   David Garlan Shang-Wen Cheng and Bradley Schmerl. 2003. Increasing system dependability through architecture-based self-repair. In Architecting Dependable Systems. 61--89.","DOI":"10.1007\/3-540-45177-3_3"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024436.2024443"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1036921.1036929"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.06.011"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568303"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987389.1987408"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_33"},{"key":"e_1_2_1_60_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence.","author":"Gupta Rahul","year":"2017"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753478"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24721-0_20"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486869"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of the International Symposium on Fault-Tolerant Computing. 381--390","author":"Huang Y."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/347324.383378"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090029"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390652"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_2_1_70_1","volume-title":"Fei-Ching Kuo, Dave Towey, and Zuohua Ding.","author":"Jiang Mingyue","year":"2016"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993544"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_23"},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 295--308","author":"Jula H."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568258"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25032-3_12"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/11762256_15"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.814515"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.60"},{"key":"e_1_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Christian Kern and Javier Esparza. 2010. Automatic error correction of java programs. In Formal Methods for Industrial Critical Systems. 67--81.   Christian Kern and Javier Esparza. 2010. Automatic error correction of java programs. In Formal Methods for Industrial Critical Systems. 67--81.","DOI":"10.1007\/978-3-642-15898-8_5"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486893"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21668-3_13"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380190702"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381813"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.5555\/2157654.2157671"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39611-3_11"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232562"},{"key":"e_1_2_1_87_1","unstructured":"Matt Lake. 2010. Epic Failures: 11 Infamous Software Bugs. Retrieved from http:\/\/www.computerworld.com\/article\/2515483\/enterprise-applications\/epic-failures--11-infamous-software-bugs.html.  Matt Lake. 2010. Epic Failures: 11 Infamous Software Bugs. Retrieved from http:\/\/www.computerworld.com\/article\/2515483\/enterprise-applications\/epic-failures--11-infamous-software-bugs.html."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270354"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.41"},{"key":"e_1_2_1_91_1","volume-title":"Proceedings of the 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER\u201916)","author":"Le X. B. D."},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the International Conference on Software Engineering. 3--13","author":"Goues C. Le"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"e_1_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Claire Le Goues Neal Holtschulte Edward K. Smith Yuriy Brun Premkumar Devanbu Stephanie Forrest and Westley Weimer. 2015. The ManyBugs and IntroClass benchmarks for automated repair of C programs. (unpublished).  Claire Le Goues Neal Holtschulte Edward K. Smith Yuriy Brun Premkumar Devanbu Stephanie Forrest and Westley Weimer. 2015. The ManyBugs and IntroClass benchmarks for automated repair of C programs. (unpublished).","DOI":"10.1109\/TSE.2015.2454513"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.73"},{"key":"e_1_2_1_97_1","volume-title":"Workshop on Plan Execution: A Reality Check.","author":"Levinson R.","year":"2005"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810352"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102150"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610398"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1267001"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.24"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950309"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337259"},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Locasto Michael E."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384626"},{"key":"e_1_2_1_107_1","first-page":"341","article-title":"Automatic repair of overflowing expressions with abstract interpretation. In Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A","volume":"129","author":"Logozzo Francesco","year":"2013","journal-title":"Schmidt on the Occasion of His Sixtieth Birthday"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337233"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786811"},{"key":"e_1_2_1_110_1","volume-title":"Proceedings of the Symposium on Principles of Programming Languages.","author":"Long Fan"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535888"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594337"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.65"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9470-4"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9282-8"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591114"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818811"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568024"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/1416563.1416564"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993537"},{"key":"e_1_2_1_122_1","volume-title":"Proceedings of the International Conference on Software Engineering. 502--511","author":"Meng Na"},{"key":"e_1_2_1_123_1","volume-title":"Proceedings of the 2003 International Conference on Dependable Systems and Networks.","author":"Merideth Michael G.","year":"2003"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.161279"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568324"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079368.3079412"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24255-2_32"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776871"},{"key":"e_1_2_1_129_1","volume-title":"Proceedings of the International Conference on Software Engineering.","author":"Thien Nguyen Hoang Duong","year":"2013"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296912"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1142"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250736"},{"key":"e_1_2_1_133_1","volume-title":"Proceedings of the 8th International Symposium on Search Based Software Engineering.","author":"Oliveira Vinicius"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352618"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECOWS.2007.6"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2009.61"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.29"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095833"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312842"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1145\/966051.966060"},{"key":"e_1_2_1_145_1","volume-title":"Proceedings of the 6th Conference on Symposium on Operating Systems, Design 8 Implementation. 21--21","author":"Rinard M."},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.2"},{"key":"e_1_2_1_147_1","unstructured":"M. Rinard M. Ernst and J. Perkins. 2011. Collaborative Learning for Security and Repair in Application Communities. Technical Report. Massachusetts Institute of Technology.  M. Rinard M. Ernst and J. Perkins. 2011. Collaborative Learning for Security and Repair in Application Communities. Technical Report. Massachusetts Institute of Technology."},{"key":"e_1_2_1_149_1","volume-title":"Proceedings of the International Conference on Fault-Tolerant Computing (FTCS\u201973)","author":"Rohr J. A.","year":"1973"},{"key":"e_1_2_1_150_1","volume-title":"International Static Analysis Symposium. Springer, 268--284","author":"Samanta Roopsha"},{"key":"e_1_2_1_151_1","volume-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering (ICSE\u201912)","author":"Samimi Hesam"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859059"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.01.010"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.25"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/582128.582152"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368103"},{"key":"e_1_2_1_157_1"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508250"},{"key":"e_1_2_1_159_1","volume-title":"Proceedings of the USENIX Annual Technical Conference","volume":"161","author":"Sidiroglou S."},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025133"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2011.05.024"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462195"},{"key":"e_1_2_1_164_1","volume-title":"Proceedings of the 12th Annual Network and Distributed System Security Symposium.","author":"Smirnov A."},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786825"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283742"},{"key":"e_1_2_1_167_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium.","author":"Son Sooel","year":"2013"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v39:10"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985847"},{"key":"e_1_2_1_170_1","volume-title":"Proceedings on the 7th International Workshop on Principles of Diagnosis.","author":"Stumptner M."},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.29"},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.36"},{"key":"e_1_2_1_173_1","unstructured":"Gerald Jay Sussman. 2007. Building Robust Systems An Essay. (2007). https:\/\/groups.csail.mit.edu\/mac\/users\/gjs\/6.945\/readings\/robust-systems.pdf.  Gerald Jay Sussman. 2007. Building Robust Systems An Essay. (2007). https:\/\/groups.csail.mit.edu\/mac\/users\/gjs\/6.945\/readings\/robust-systems.pdf."},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.23"},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818813"},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635873"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.12"},{"key":"e_1_2_1_179_1","volume-title":"Proceedings of the International Workshop on Program Comprehension. 48--59","author":"Tran J. B."},{"key":"e_1_2_1_180_1"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68855-6_12"},{"key":"e_1_2_1_182_1","doi-asserted-by":"crossref","unstructured":"Tielei Wang Chengyu Song and Wenke Lee. 2014. Diagnosis and emergency patch generation for integer overflow exploits. In Detection of Intrusions and Malware and Vulnerability Assessment. 255--275.  Tielei Wang Chengyu Song and Wenke Lee. 2014. Diagnosis and emergency patch generation for integer overflow exploits. In Detection of Intrusions and Malware and Vulnerability Assessment. 255--275.","DOI":"10.1007\/978-3-319-08509-8_14"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393614"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.628398"},{"key":"e_1_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173734"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735249"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_2_1_189_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_2_1_190_1","volume-title":"Tech. Rep. UTDCS-45-09","author":"Wong W. E.","year":"2009"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595757"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2383381"},{"key":"e_1_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312918"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622655.1622659"},{"key":"e_1_2_1_196_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818864"},{"key":"e_1_2_1_197_1","volume-title":"Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 45--60","author":"Zhou F."}],"container-title":["ACM Computing Surveys"],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3105906","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3105906","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:04Z","timestamp":1750217404000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3105906"}},"subtitle":["A Bibliography"],"issued":{"date-parts":[[2018,1,23]]},"references-count":192,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1,31]]}},"alternative-id":["10.1145\/3105906"],"URL":"https:\/\/doi.org\/10.1145\/3105906","ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"published":{"date-parts":[[2018,1,23]]},"assertion":[{"value":"2015-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-01-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]},{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:15:13Z","timestamp":1769728513705,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1145\/3639475.3640099","type":"proceedings-article","created":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T12:37:31Z","timestamp":1717677451000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["With Great Humor Comes Great Developer Engagement"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0293-2592","authenticated-orcid":false,"given":"Deepika","family":"Tiwari","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0209-2805","authenticated-orcid":false,"given":"Tim","family":"Toady","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190537"},{"key":"e_1_3_2_1_2_1","volume-title":"Stack overflow unveils the next steps in computer security. https:\/\/youtu.be\/VgC4b9K-gYU","year":"2017","unstructured":"StackOverflow. Stack overflow unveils the next steps in computer security. https:\/\/youtu.be\/VgC4b9K-gYU, 2017."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180180"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10062-w"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1177\/147470490600400129"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/0170840603249008"},{"key":"e_1_3_2_1_7_1","first-page":"7265","volume-title":"Proceedings of the AAAI conference on Artificial Intelligence","volume":"33","author":"West Robert","year":"2019","unstructured":"Robert West and Eric Horvitz. Reverse-engineering Satire, or \"Paper on Computational Humor Accepted Despite Making Serious Advances\". In Proceedings of the AAAI conference on Artificial Intelligence, volume 33, pages 7265--7272, 2019."},{"key":"e_1_3_2_1_8_1","first-page":"1","volume-title":"Humor in Conversational Agents. In Proceedings of the 5th International Conference on Conversational User Interfaces","author":"Zargham Nima","year":"2023","unstructured":"Nima Zargham, Vino Avanesi, Leon Reicherts, Ava Elizabeth Scott, Yvonne Rogers, and Rainer Malaka. \"Funny How?\" A Serious Look at Humor in Conversational Agents. In Proceedings of the 5th International Conference on Conversational User Interfaces, pages 1--7, 2023."},{"key":"e_1_3_2_1_9_1","volume-title":"Effect of humor usage by engineers at construction sites. Journal of management in engineering, 22(2):81--88","author":"Ogunlana Stephen","year":"2006","unstructured":"Stephen Ogunlana, Chudate Niwawate, Truong Quang, and Le Chien Thang. Effect of humor usage by engineers at construction sites. Journal of management in engineering, 22(2):81--88, 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/08900523.2012.746110"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180241"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3148539"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534857"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512949"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.7559\/citarj.v9i3.432"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIS52602.2021.00009"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077800405284363"},{"key":"e_1_3_2_1_18_1","volume-title":"Testing(10).","author":"Elhage Nelson","year":"2019","unstructured":"Nelson Elhage. Testing as communication. Increment Magazine, Testing(10). 2019."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115619"},{"key":"e_1_3_2_1_21_1","volume-title":"OSDI","volume":"8","author":"Musuvathi Madanlal","year":"2008","unstructured":"Madanlal Musuvathi, Shaz Qadeer, Thomas Ball, Gerard Basler, Piramanayagam Arumuga Nainar, and Iulian Neamtiu. Finding and reproducing heisenbugs in concurrent programs. In OSDI, volume 8, 2008."},{"key":"e_1_3_2_1_22_1","first-page":"24","article-title":"The science behind the Volkswagen emissions scandal","volume":"9","author":"Schiermeier Quirin","year":"2015","unstructured":"Quirin Schiermeier. The science behind the Volkswagen emissions scandal. Nature, 9:24, 2015.","journal-title":"Nature"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3120928"},{"key":"e_1_3_2_1_24_1","first-page":"1393","volume-title":"Proc. of USENIX Security","author":"Torres-Arias Santiago","year":"2019","unstructured":"Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, and Justin Cappos. in-toto: Providing farm-to-table guarantees for bits and bytes. In Proc. of USENIX Security, pages 1393--1410, 2019."},{"key":"e_1_3_2_1_25_1","volume-title":"Social responsibility worldwide. Journal of mass media ethics, 19(1):3--28","author":"Christians Clifford","year":"2004","unstructured":"Clifford Christians and Kaarle Nordenstreng. Social responsibility worldwide. Journal of mass media ethics, 19(1):3--28, 2004."},{"issue":"2","key":"e_1_3_2_1_26_1","first-page":"63","article-title":"first easter egg","volume":"4","author":"Salvador Rodrigo B","year":"2017","unstructured":"Rodrigo B Salvador. History's first easter egg. J Geek Stud, 4(2):63--68, 2017.","journal-title":"J Geek Stud"},{"key":"e_1_3_2_1_27_1","volume-title":"Exploding whale easter egg. https:\/\/www.youtube.com\/watch?v=JZPzT2AIR0o&t=101s","author":"Battlefield","year":"2018","unstructured":"Battlefield V. Exploding whale easter egg. https:\/\/www.youtube.com\/watch?v=JZPzT2AIR0o&t=101s, 2018."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152489"},{"key":"e_1_3_2_1_30_1","volume-title":"Using a pilot study to derive a gui model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM), 18(2):1--35","author":"Xie Qing","year":"2008","unstructured":"Qing Xie and Atif M Memon. Using a pilot study to derive a gui model for automated testing. ACM Transactions on Software Engineering and Methodology (TOSEM), 18(2):1--35, 2008."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW52544.2021.00032"},{"key":"e_1_3_2_1_34_1","article-title":"Humour to facilitate meaningful learning in nursing education as experienced by learner nurses","author":"Chabeli Mary","year":"2015","unstructured":"Mary Chabeli, Jackie Malesela, and Monica Rasepae. Humour to facilitate meaningful learning in nursing education as experienced by learner nurses. Journal of Education, (59):89--114, 2015.","journal-title":"Journal of Education, (59):89--114"},{"key":"e_1_3_2_1_35_1","volume-title":"Humor to the rescue: how to make introductory economics an appealing social science for non-majors. American Journal of Business Education (AJBE), 7(2):151--156","author":"Jones George H","year":"2014","unstructured":"George H Jones et al. Humor to the rescue: how to make introductory economics an appealing social science for non-majors. American Journal of Business Education (AJBE), 7(2):151--156, 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.103597"},{"key":"e_1_3_2_1_37_1","first-page":"1","volume-title":"Multimedia Tools and Applications","author":"Takbiri Yazdan","year":"2023","unstructured":"Yazdan Takbiri, Azam Bastanfard, and Amineh Amini. A gamified approach for improving the learning performance of k-6 students using easter eggs. Multimedia Tools and Applications, pages 1--19, 2023."},{"key":"e_1_3_2_1_38_1","first-page":"192","volume-title":"Jan van Bergen, J. M. Everink, Thomas van der Klis, Rick Meijerink, Roan Oosenbrug, Jelle J. Oostveen, Tijmen van den Pol, and Wink M. van Zon. Having fun in learning formal specifications","author":"Prasetya I. S. W. B.","year":"2019","unstructured":"I. S. W. B. Prasetya, Craig Q. H. D. Leek, Orestis Melkonian, Joris ten Tusscher, Jan van Bergen, J. M. Everink, Thomas van der Klis, Rick Meijerink, Roan Oosenbrug, Jelle J. Oostveen, Tijmen van den Pol, and Wink M. van Zon. Having fun in learning formal specifications. In Sarah Beecham and Daniela E. Damian, editors, Proceedings of the International Conference on Software Engineering, Software Engineering Education and Training track, ICSE-SEIT, pages 192--196, 2019."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSE.2015.7250265"},{"key":"e_1_3_2_1_40_1","volume-title":"Humorous songs to accompany the teaching of software engineering","author":"Gardner Henry","year":"2021","unstructured":"Henry Gardner. Humorous songs to accompany the teaching of software engineering. 2021. http:\/\/users.cecs.anu.edu.au\/~Henry.Gardner\/Gardner_Humourous_Songs_Education_Preprint.pdf."},{"key":"e_1_3_2_1_41_1","volume-title":"Tenderly written and illustrated by_why the lucky stiff.","author":"Gardner Henry","year":"2005","unstructured":"_why the lucky stiff. Why's Poignant Guide to Ruby, Tenderly written and illustrated by_why the lucky stiff. 2005. https:\/\/poignant.guide\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2466627.2466648"},{"key":"e_1_3_2_1_43_1","volume-title":"Accessed","author":"List","year":"2023","unstructured":"List of esoteric languages. https:\/\/esolangs.org\/wiki\/Category:Joke_languages. Accessed: October, 2023."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7725.003.0041"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10336-5"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473119"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.02.041"},{"key":"e_1_3_2_1_48_1","unstructured":"Keith Collins. \"BURN BABY! BURN!\": The code that took America to the moon was just published to GitHub and it's like a 1960s time capsule. https:\/\/qz.com\/726338\/the-code-that-took-america-to-the-moon-was-just-published-to-github-and-its-like-a-1960s-time-capsule 2016."},{"key":"e_1_3_2_1_49_1","volume-title":"7th-11th october","author":"Naur Peter","year":"1968","unstructured":"Peter Naur and Brian Randell. Software engineering: Report of a conference sponsored by the nato science committee, garmisch, germany, 7th-11th october 1968. 1969."},{"key":"e_1_3_2_1_50_1","first-page":"1","article-title":"Do it for the Culture","volume":"20","author":"Iloh Constance","year":"2021","unstructured":"Constance Iloh. Do it for the Culture: The Case for Memes in Qualitative Research. International Journal of Qualitative Methods, 20:1--10, 2021.","journal-title":"The Case for Memes in Qualitative Research. International Journal of Qualitative Methods"},{"key":"e_1_3_2_1_51_1","volume-title":"Moving from Rust to C++. https:\/\/raphlinus.github.io\/rust\/2023\/04\/01\/rust-to-cpp.html","author":"Levien Raph","year":"2023","unstructured":"Raph Levien. Moving from Rust to C++. https:\/\/raphlinus.github.io\/rust\/2023\/04\/01\/rust-to-cpp.html, 2023."},{"key":"e_1_3_2_1_52_1","first-page":"183","volume-title":"La Chose Publique","author":"Verschueren Pierre","year":"2015","unstructured":"Pierre Verschueren. Le rire de la vieille dame? humours, sciences et politiques rue d'ulm de 1945 \u00e0 1971. In La Chose Publique, pages 183--214. Champ Vallon, 2015."}],"event":{"name":"ICSE-SEIS'24: 46th International Conference on Software Engineering: Software Engineering in Society","location":"Lisbon Portugal","acronym":"ICSE-SEIS'24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Society"],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639475.3640099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639475.3640099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:38Z","timestamp":1750287218000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639475.3640099"}},"issued":{"date-parts":[[2024,4,14]]},"references-count":49,"alternative-id":["10.1145\/3639475.3640099","10.1145\/3639475"],"URL":"https:\/\/doi.org\/10.1145\/3639475.3640099","published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"2024-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]},{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:00:43Z","timestamp":1763348443527,"version":"3.37.3"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Swedish Foundation for Strategic Research"},{"name":"Swedish National Infrastructure for Computing"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2023,7,1]]},"DOI":"10.1109\/tdsc.2022.3167316","type":"journal-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T19:34:12Z","timestamp":1649878452000},"page":"2794-2810","source":"Crossref","is-referenced-by-count":11,"title":["Sorald: Automatic Patch Suggestions for SonarQube Static Analysis Violations"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2183-9633","authenticated-orcid":false,"given":"Khashayar","family":"Etemadi","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2491-2771","authenticated-orcid":false,"given":"Nicolas","family":"Harrand","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8343-057X","authenticated-orcid":false,"given":"Simon","family":"Lars\u00e9n","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8080-1355","authenticated-orcid":false,"given":"Haris","family":"Adzemovic","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Henry Luong","family":"Phu","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Ashutosh","family":"Verma","sequence":"additional","affiliation":[{"name":"IIT Bombay, Mumbai, Maharashtra, India"}]},{"given":"Fernanda","family":"Madeiral","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Douglas","family":"Wikstr\u00f6m","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1016\/j.jss.2020.110671"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/SANER48275.2020.9054842"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3338906.3338952"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/3360585"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1109\/BotSE.2019.00015"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1109\/BotSE52550.2021.00013"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/BotSE.2019.00019"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/SEAA.2019.00055"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1109\/ASE.2019.00081"},{"year":"2021","author":"luong phu","article-title":"Contributions to the usability of Sorald for repairing static analysis violations","key":"ref17"},{"year":"2020","author":"adzemovic","article-title":"A template-based approach to automatic program repair of SonarQube static warnings","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.infsof.2020.106377"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1016\/j.jss.2020.110750"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1109\/ICSE-SEIP.2019.00039"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1145\/3349589"},{"key":"ref46","first-page":"10","article-title":"Static contract checking with abstract interpretation","author":"f\u00e4hndrich","year":"2010","journal-title":"Proc Int Conf Formal Verification Object-Oriented Softw"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1145\/2384616.2384626"},{"key":"ref48","first-page":"780","article-title":"TFix: Learning to fix coding errors with a text-to-text transformer","author":"berabi","year":"2021","journal-title":"Proc Int Conf Mach Learn"},{"doi-asserted-by":"publisher","key":"ref47","DOI":"10.1109\/SANER.2019.8667970"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1109\/SCAM.2012.28"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1007\/978-3-319-17524-9_1"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1145\/2642937.2642982"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1145\/3377812.3382150"},{"key":"ref49","first-page":"95","article-title":"How to design a program repair bot? Insights from the repairnator project","author":"urli","year":"2018","journal-title":"Proc IEEE\/ACM 40th Int Conf Softw Eng Softw Eng Pract Track"},{"key":"ref8","first-page":"672","article-title":"Why don&#x2019;t software developers use static analysis tools to find bugs?","author":"johnson","year":"2013","journal-title":"Proc 35th Int Conf Softw Eng"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSE.2018.2884955"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2786805.2786848"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.entcs.2005.01.018"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3238147.3238213"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/MSP.2009.56"},{"year":"2019","author":"loriot","article-title":"STYLER: Learning formatting conventions to repair checkstyle errors","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1145\/3238147.3240729"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TSE.2020.3004525"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1145\/1831708.1831738"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/MSR.2019.00049"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3188720"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/MSR.2017.2"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/s10664-020-09920-w"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/ISSRE.2019.00040"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1145\/1052883.1052895"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/SANER.2016.105"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s10664-019-09750-5"},{"key":"ref39","article-title":"Understanding static code warnings: An incremental AI approach","volume":"167","author":"yang","year":"2020","journal-title":"Expert Syst Appl"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/SCAM51674.2020.00035"},{"key":"ref24","first-page":"54","article-title":"Layout preserving parser for refactoring in Erlang","volume":"9","author":"kitlei","year":"2009","journal-title":"Acta Electrotechnica et Informatica"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/SCAM.2003.1238042"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1002\/spe.2346"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1007\/978-3-642-28830-2_3"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ICPC.2019.00040"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/1390630.1390647"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/SCAM.2001.972674"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/s10664-020-09880-1"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-030-58793-2_12"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/2568225.2568260"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10177761\/09756950.pdf?arnumber=9756950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T18:37:09Z","timestamp":1690915029000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9756950\/"}},"issued":{"date-parts":[[2023,7,1]]},"references-count":54,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2022.3167316","ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"published":{"date-parts":[[2023,7,1]]}},{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T13:16:49Z","timestamp":1775135809642,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Wallenberg AI, Autonomous Systems and Software Program"},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/tse.2019.2954871","type":"journal-article","created":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T21:09:40Z","timestamp":1574370580000},"page":"2534-2548","source":"Crossref","is-referenced-by-count":24,"title":["A Chaos Engineering System for Live Analysis and Falsification of Exception-Handling in the JVM"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7211-3894","authenticated-orcid":false,"given":"Long","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1029-0147","authenticated-orcid":false,"given":"Brice","family":"Morin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2659-5271","authenticated-orcid":false,"given":"Philipp","family":"Haller","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2016.04.001"},{"key":"ref38","first-page":"207","article-title":"A reusable architecture for dependability and performance benchmarking of cloud services","author":"sangroya","year":"2015","journal-title":"Proc Int Conf Service-Oriented Comput"},{"key":"ref33","article-title":"Inside azure search: Chaos engineering","year":"2015"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2014.6962080"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2014.105"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2063509.2063511"},{"key":"ref37","first-page":"2017","author":"rosenthal","year":"0","journal-title":"Chaos Engineering Building Confidence in System Behavior through Experiments"},{"key":"ref36","first-page":"21","article-title":"Enhancing server availability and security through failure-oblivious computing","author":"rinard","year":"2014","journal-title":"Proc 6th Conf Symp Operating Syst Des Implementation"},{"key":"ref35","article-title":"Too big to test: Breaking a production brokerage platform without causing financial devastation","author":"parrish","year":"2015"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2841425"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2790038"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.02.010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.08.004"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338916"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/12.142682"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30138-7_25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.35"},{"key":"ref17","article-title":"Lineage-driven fault injection for actor-based programs","author":"ghidei","year":"2019"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2008.02.047"},{"key":"ref19","article-title":"Failure as a service (FaaS): A cloud service for large-scale, online failure drills","author":"gunawi","year":"2011"},{"key":"ref28","first-page":"410","article-title":"SFIDA: A software implemented fault injection tool for distributed dependable applications","volume":"1","author":"lee","year":"2000","journal-title":"Proc 4th Int Conf \/Exhib High Perform Comput Asia-Pacific Region"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3155112.3155114"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/32.256857"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987555"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/12.54853"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670992"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.44380"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134320"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.60"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2346916.2353017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.05.003"},{"key":"ref1","year":"2018"},{"key":"ref20","first-page":"204","article-title":"DOCTOR: An integrated software fault injection environment for distributed real-time systems","author":"han","year":"1995","journal-title":"Proc IEEE Int Comput Perform Dependability Symp"},{"key":"ref22","article-title":"The Netflix simian army","author":"izrailevsky","year":"2011"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2015.12"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2945408.2945415"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243567"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1988.5306"},{"key":"ref23","first-page":"2005","author":"johnson","year":"0","journal-title":"Professional Java Development with the Spring Framework"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2652483"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/9780470370506"},{"key":"ref43","first-page":"249","article-title":"Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems","author":"yuan","year":"2014","journal-title":"Proc 11th USENIX Symp Operating Syst Des Implementation"},{"key":"ref25","article-title":"DBench * (Dependability Benchmarking)","author":"kanoun","year":"2005","journal-title":"Proc 5th Eur Dependable Comput Conf"}],"container-title":["IEEE Transactions on Software Engineering"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9611545\/08908767.pdf?arnumber=8908767","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:50:07Z","timestamp":1652194207000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8908767\/"}},"issued":{"date-parts":[[2021,11,1]]},"references-count":44,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2019.2954871","ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"published":{"date-parts":[[2021,11,1]]}},{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T15:59:35Z","timestamp":1768319975580,"version":"3.49.0"},"reference-count":0,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1109\/mc.2022.3175542","type":"journal-article","created":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T19:47:41Z","timestamp":1664308061000},"page":"26-34","source":"Crossref","is-referenced-by-count":4,"title":["The Multibillion Dollar Software Supply Chain of Ethereum"],"prefix":"10.1109","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0541-6411","authenticated-orcid":false,"given":"Cesar","family":"Soto-Valero","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology"}]}],"member":"263","container-title":["Computer"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/2\/9903856\/09903894.pdf?arnumber=9903894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T01:07:48Z","timestamp":1667524068000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9903894\/"}},"issued":{"date-parts":[[2022,10]]},"references-count":0,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/mc.2022.3175542","ISSN":["0018-9162","1558-0814"],"issn-type":[{"value":"0018-9162","type":"print"},{"value":"1558-0814","type":"electronic"}],"published":{"date-parts":[[2022,10]]}},{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T13:19:57Z","timestamp":1768310397144,"version":"3.49.0"},"reference-count":63,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"CHAINS Project through Swedish Foundation for Strategic Research"},{"name":"Wallenberg Autonomous Systems and Software Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1109\/tse.2025.3627891","type":"journal-article","created":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T18:44:48Z","timestamp":1762195488000},"page":"54-69","source":"Crossref","is-referenced-by-count":0,"title":["Causes and Canonicalization of Unreproducible Builds in Java"],"prefix":"10.1109","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2263-7902","authenticated-orcid":false,"given":"Aman","family":"Sharma","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"Universit&#x00E9; de Montr&#x00E9;al, Montr&#x00E9;al, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Geth Rebuild: Verifiable Builds for Go Ethereum","author":"Andersson","year":"2024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-023-10399-4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE55347.2025.00136"},{"key":"ref4","article-title":"JVM-Repo-Rebuild\/Reproducible-Central","author":"Boutemy","year":"2024"},{"key":"ref5","article-title":"Canonical XML Version 1.1","author":"Boyer","year":"2008"},{"key":"ref6","article-title":"JVM \u2014 Reproducible-Builds.Org","year":"2024"},{"key":"ref7","article-title":"Solana JavaScript SDK backdoored to steal keys, funds","year":"2024"},{"key":"ref8","article-title":"JEP 223: New version-string scheme","author":"Clark","year":"2014"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3329781.3344149"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3722542"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985468"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664288"},{"key":"ref13","article-title":"BinEq-A benchmark of compiled Java programs to assess alternative builds","author":"Dietrich","year":"2024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/icsme64153.2025.00058"},{"key":"ref15","article-title":"Reproducible builds and insights from an independent verifier for arch Linux","author":"Drexel","year":"2024"},{"key":"ref16","article-title":"Behind the Scenes: How do lambda expressions really work in Java?","author":"Evans","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179320"},{"key":"ref18","article-title":"[JDK-4774077] use covariant return types in the NIO buffer hierarchy - Java bug system","author":"Gafter","year":"2002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MSR66628.2025.00062"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/icsme46990.2020.00071"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/esem.2017.11"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3603110"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3643764"},{"key":"ref24","article-title":"Integration of reproducibility verification with diffoscope in GNU Make","author":"Lagn\u00f6hed","year":"2024"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2021.3073045"},{"key":"ref26","article-title":"Supply-chain attack analysis: Ultralytics - The Python package index blog","author":"Larson","year":"2024"},{"key":"ref27","article-title":"Eclipse Temurin reproducible verification builds for secure supply chain validation","author":"Leonard","year":"2024"},{"key":"ref28","article-title":"A tale of several distros joining forces for a common goal: Reproducible builds","author":"Holger Levsen","year":"2025"},{"key":"ref29","article-title":"Reproducible Builds:Break a Log, Good Things Come in Trees","author":"Linderud","year":"2019"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09926-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10117-6"},{"key":"ref32","author":"Malka","year":"2025","journal-title":"How NixOS Could Have Detected XZ Supply-Chain Attack Benefit All Thanks to Reproducible-Builds"},{"key":"ref33","first-page":"775","article-title":"Does functional package management enable reproducible builds at scale? Yes","volume-title":"Proc. 22nd Int. Conf. Mining Softw. Repositories","author":"Malka","year":"2025"},{"key":"ref34","article-title":"Why getClass returns the name of the class + $1 (or $*)","year":"2016"},{"key":"ref35","article-title":"Guava artifacts are not bitwise reproducible $\\cdot$\u22c5 Issue #6321 $\\cdot$\u22c5 Google\/Guava","author":"Moore","year":"2023"},{"key":"ref36","article-title":"Java still rocks the finance industry","year":"2021"},{"key":"ref37","article-title":"Decentralized Validation of Reproducible Builds: A Protocol for Collaborative and Decentralized Validation of Package Reproducibility","author":"Moritz","year":"2023"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464797"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378519"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ctc.2013.9"},{"key":"ref41","article-title":"Deterministic builds part one: Cyberwar and global compromise","author":"Perry"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-032-00627-1_11"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528537"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/msr66628.2025.00026"},{"key":"ref45","article-title":"Jimple: Simplifying Java bytecode for analyses and transformations","author":"Vall\u00e9e-Rai","year":"1998"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3643991.3644913"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180224"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ase.2019.00056"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510102"},{"key":"ref50","article-title":"Synthetic Constructs in Java","author":"Rimenti","year":"2018"},{"key":"ref51","article-title":"Trends in Government Software Developers - Stack Overflow","author":"Robinson","year":"2017"},{"key":"ref52","article-title":"Java bytecode normalization for code similarity analysis","author":"Schott","year":"2024","journal-title":"In DROPS-IDN\/v2\/Document\/10.4230\/LIPIcs.ECOOP.2024.37. Schloss Dagstuhl \u2013 Leibniz-Zentrum F\u00fcr Informatik"},{"key":"ref53","article-title":"SBOM.EXE: Countering dynamic code injection based on software bill of materials in Java","author":"Sharma","year":"2024"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3092692"},{"key":"ref55","article-title":"JEP 280: Indify string concatenation","author":"Shipilev","year":"2024"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2022.3175542"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3001878.3001882"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/358198.358210"},{"key":"ref59","first-page":"13","article-title":"Soot - a Java bytecode optimization framework","volume-title":"Proc. Conf. Centre Adv. Stud. Collaborative Res. (CASCON)","author":"Vall\u00e9e-Rai","year":"1999"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468592"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3714464"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513050"},{"key":"ref63","article-title":"Automatic Building Of Java Projects On GitHub: A Study On Reproducibility","author":"Yasi","year":"2022"}],"container-title":["IEEE Transactions on Software Engineering"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/32\/11346545\/11223991.pdf?arnumber=11223991","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T08:13:04Z","timestamp":1768291984000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11223991\/"}},"issued":{"date-parts":[[2026,1]]},"references-count":63,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2025.3627891","ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"published":{"date-parts":[[2026,1]]}},{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T07:49:26Z","timestamp":1768895366522,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":4,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,26]],"date-time":"2023-11-26T00:00:00Z","timestamp":1700956800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Swedish Research Council"},{"name":"Swedish Foundation for Strategic Research"},{"name":"Wallenberg Autonomous Systems and Software Program"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3605770.3625207","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T11:46:12Z","timestamp":1700739972000},"page":"75-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Software Bill of Materials in Java"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6005-5992","authenticated-orcid":false,"given":"Musard","family":"Balliu","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3116-3278","authenticated-orcid":false,"given":"Sofia","family":"Bobadilla","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3922-9606","authenticated-orcid":false,"given":"Mathias","family":"Ekstedt","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6988-3102","authenticated-orcid":false,"given":"Javier","family":"Ron","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2263-7902","authenticated-orcid":false,"given":"Aman","family":"Sharma","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7070-5950","authenticated-orcid":false,"given":"Gabriel","family":"Skoglund","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0541-6411","authenticated-orcid":false,"given":"C\u00e9sar","family":"Soto-Valero","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2578-6399","authenticated-orcid":false,"given":"Martin","family":"Wittlinger","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3347446"},{"key":"e_1_3_2_1_2_1","volume-title":"SoK: Taxonomy of Attacks on Open-Source Software Supply Chains,\" in Proceedings of the IEEE Symposium on Security and Privacy (SP), may","author":"Ladisa P.","year":"2023","unstructured":"P. Ladisa, H. Plate, M. Martinez, and O. Barais, \"SoK: Taxonomy of Attacks on Open-Source Software Supply Chains,\" in Proceedings of the IEEE Symposium on Security and Privacy (SP), may 2023."},{"key":"e_1_3_2_1_3_1","first-page":"2","article-title":"Challenges of Producing Software Bill of Materials for Java","author":"Balliu M.","year":"2023","unstructured":"M. Balliu, B. Baudry, S. Bobadilla, M. Ekstedt, M. Monperrus, J. Ron, A. Sharma, G. Skoglund, C. Soto-Valero, and M. Wittlinger, \"Challenges of Producing Software Bill of Materials for Java,\" IEEE Security & Privacy, pp. 2--13, 2023.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09914-8"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses"],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605770.3625207","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3605770.3625207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:18Z","timestamp":1750178178000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605770.3625207"}},"issued":{"date-parts":[[2023,11,26]]},"references-count":4,"alternative-id":["10.1145\/3605770.3625207","10.1145\/3605770"],"URL":"https:\/\/doi.org\/10.1145\/3605770.3625207","published":{"date-parts":[[2023,11,26]]},"assertion":[{"value":"2023-11-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]},{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T17:53:09Z","timestamp":1774374789574,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,15]],"date-time":"2024-04-15T00:00:00Z","timestamp":1713139200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["BD\/04736\/2023"],"award-info":[{"award-number":["BD\/04736\/2023"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UIDB\/50021\/2020"],"award-info":[{"award-number":["UIDB\/50021\/2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"published-print":{"date-parts":[[2024,4,15]]},"DOI":"10.1145\/3643991.3644884","type":"proceedings-article","created":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T13:05:13Z","timestamp":1719925513000},"page":"118-122","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["GitBug-Java: A Reproducible Benchmark of Recent Java Bugs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6667-4970","authenticated-orcid":false,"given":"Andr\u00e9","family":"Silva","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4148-5991","authenticated-orcid":false,"given":"Nuno","family":"Saavedra","sequence":"additional","affiliation":[{"name":"INESC-ID and IST, University of Lisbon, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2024,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00116"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00035"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524842.3528480"},{"key":"e_1_3_2_1_4_1","volume-title":"Critical review of bugswarm for fault localization and program repair. arXiv preprint arXiv:1905.09375","author":"Durieux Thomas","year":"2019","unstructured":"Thomas Durieux and Rui Abreu. 2019. Critical review of bugswarm for fault localization and program repair. arXiv preprint arXiv:1905.09375 (2019)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00019"},{"key":"e_1_3_2_1_6_1","volume-title":"Stop uploading test data in plain text: Practical strategies for mitigating data contamination by evaluation benchmarks. arXiv preprint arXiv:2305.10160","author":"Jacovi Alon","year":"2023","unstructured":"Alon Jacovi, Avi Caciularu, Omer Goldman, and Yoav Goldberg. 2023. Stop uploading test data in plain text: Practical strategies for mitigating data contamination by evaluation benchmarks. arXiv preprint arXiv:2305.10160 (2023)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00125"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_9_1","volume-title":"The GitHub Recent Bugs Dataset for Evaluating LLM-based Debugging Applications. arXiv preprint arXiv:2310.13229","author":"Lee Jae Yong","year":"2023","unstructured":"Jae Yong Lee, Sungmin Kang, Juyeon Yoon, and Shin Yoo. 2023. The GitHub Recent Bugs Dataset for Evaluating LLM-based Debugging Applications. arXiv preprint arXiv:2310.13229 (2023)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135932.3135941"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.87"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635920"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667991"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2019.03.006"},{"key":"e_1_3_2_1_15_1","volume-title":"RunBugRun-An Executable Dataset for Automated Program Repair. arXiv preprint arXiv:2304.01102","author":"Prenner Julian Aron","year":"2023","unstructured":"Julian Aron Prenner and Romain Robbes. 2023. RunBugRun-An Executable Dataset for Automated Program Repair. arXiv preprint arXiv:2304.01102 (2023)."},{"key":"e_1_3_2_1_16_1","volume-title":"GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub Actions. In 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion). IEEE.","author":"Saavedra Nuno","year":"2024","unstructured":"Nuno Saavedra, Andr\u00e9 Silva, and Martin Monperrus. 2024. GitBug-Actions: Building Reproducible Bug-Fix Benchmarks with GitHub Actions. In 2024 IEEE\/ACM 46th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion). IEEE."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196473"},{"key":"e_1_3_2_1_18_1","volume-title":"Flacoco: Fault localization for java based on industry-grade coverage. arXiv preprint arXiv:2111.12513","author":"Silva Andr\u00e9","year":"2021","unstructured":"Andr\u00e9 Silva, Matias Martinez, Benjamin Danglot, Davide Ginelli, and Martin Monperrus. 2021. Flacoco: Fault localization for java based on industry-grade coverage. arXiv preprint arXiv:2111.12513 (2021)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201189"},{"key":"e_1_3_2_1_20_1","volume-title":"DebugBench: Evaluating Debugging Capability of Large Language Models. arXiv preprint arXiv:2401.04621","author":"Tian Runchu","year":"2024","unstructured":"Runchu Tian, Yining Ye, Yujia Qin, Xin Cong, Yankai Lin, Zhiyuan Liu, and Maosong Sun. 2024. DebugBench: Evaluating Debugging Capability of Large Language Models. arXiv preprint arXiv:2401.04621 (2024)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00048"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882446"},{"key":"e_1_3_2_1_23_1","unstructured":"Quanjun Zhang Tongke Zhang Juan Zhai Chunrong Fang Bowen Yu Weisong Sun and Zhenyu Chen. 2023. A Critical Review of Large Language Model on Software Engineering: An Example from ChatGPT and Automated Program Repair. arXiv:2310.08879 [cs.SE]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00195"}],"event":{"name":"MSR '24: 21st International Conference on Mining Software Repositories","location":"Lisbon Portugal","acronym":"MSR '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 21st International Conference on Mining Software Repositories"],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643991.3644884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643991.3644884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:44Z","timestamp":1750291004000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643991.3644884"}},"issued":{"date-parts":[[2024,4,15]]},"references-count":24,"alternative-id":["10.1145\/3643991.3644884","10.1145\/3643991"],"URL":"https:\/\/doi.org\/10.1145\/3643991.3644884","published":{"date-parts":[[2024,4,15]]},"assertion":[{"value":"2024-07-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]},{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T01:40:31Z","timestamp":1772761231157,"version":"3.50.1"},"reference-count":89,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T00:00:00Z","timestamp":1764547200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1016\/j.jss.2025.112571","type":"journal-article","created":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T22:21:39Z","timestamp":1752963699000},"page":"112571","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":5,"special_numbering":"C","title":["Mokav: Execution-driven differential testing with LLMs"],"prefix":"10.1016","volume":"230","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2183-9633","authenticated-orcid":false,"given":"Khashayar","family":"Etemadi","sequence":"first","affiliation":[]},{"given":"Bardia","family":"Mohammadi","sequence":"additional","affiliation":[]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2025.112571_b1","doi-asserted-by":"crossref","unstructured":"Al-Kaswan, A., Izadi, M., Van Deursen, A., 2024. Traces of memorisation in large language models for code. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. pp. 1\u201312.","DOI":"10.1145\/3597503.3639133"},{"key":"10.1016\/j.jss.2025.112571_b2","doi-asserted-by":"crossref","unstructured":"Almasi, M.M., Hemmati, H., Fraser, G., McMinn, P., Benefelds, J., 2018. Search-based detection of deviation failures in the migration of legacy spreadsheet applications. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis. pp. 266\u2013275.","DOI":"10.1145\/3213846.3213861"},{"key":"10.1016\/j.jss.2025.112571_b3","series-title":"Automated unit test improvement using large language models at meta","author":"Alshahwan","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b4","series-title":"Coverup: Coverage-guided LLM-based test generation","author":"Altmayer Pizzorno","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b5","doi-asserted-by":"crossref","unstructured":"Castellano, E., Zhang, X.-Y., Arcaini, P., Takisaka, T., Ishikawa, F., Ikehata, N., Iwakura, K., 2022. Explaining the behaviour of game agents using differential comparison. In: Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering. pp. 1\u20138.","DOI":"10.1145\/3551349.3560503"},{"key":"10.1016\/j.jss.2025.112571_b6","doi-asserted-by":"crossref","unstructured":"Chen, C., Ren, P., Duan, Z., Tian, C., Lu, X., Yu, B., 2023. SBDT: Search-Based Differential Testing of Certificate Parsers in SSL\/TLS Implementations. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. pp. 967\u2013979.","DOI":"10.1145\/3597926.3598110"},{"key":"10.1016\/j.jss.2025.112571_b7","series-title":"The Thirty-Eighth Annual Conference on Neural Information Processing Systems","article-title":"Divide-and-conquer meets consensus: Unleashing the power of functions in code generation","author":"Chen","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b8","series-title":"Evaluating large language models trained on code","author":"Chen","year":"2021"},{"key":"10.1016\/j.jss.2025.112571_b9","series-title":"Codet: Code generation with generated tests","author":"Chen","year":"2022"},{"key":"10.1016\/j.jss.2025.112571_b10","series-title":"2020 IEEE International Conference on Software Maintenance and Evolution","first-page":"174","article-title":"Detecting semantic conflicts via automated behavior change detection","author":"Da Silva","year":"2020"},{"key":"10.1016\/j.jss.2025.112571_b11","doi-asserted-by":"crossref","DOI":"10.1016\/j.infsof.2024.107468","article-title":"Effective test generation using pre-trained large language models and mutation testing","volume":"171","author":"Dakhel","year":"2024","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/j.jss.2025.112571_b12","series-title":"Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","first-page":"185","article-title":"Automated testing of refactoring engines","author":"Daniel","year":"2007"},{"key":"10.1016\/j.jss.2025.112571_b13","doi-asserted-by":"crossref","unstructured":"Deng, Y., Xia, C.S., Peng, H., Yang, C., Zhang, L., 2023. Large language models are zero-shot fuzzers: Fuzzing deep-learning libraries via large language models. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. pp. 423\u2013435.","DOI":"10.1145\/3597926.3598067"},{"key":"10.1016\/j.jss.2025.112571_b14","doi-asserted-by":"crossref","unstructured":"Dinella, E., Ryan, G., Mytkowicz, T., Lahiri, S.K., 2022. Toga: A neural method for test oracle generation. In: Proceedings of the 44th International Conference on Software Engineering. pp. 2130\u20132141.","DOI":"10.1145\/3510003.3510141"},{"key":"10.1016\/j.jss.2025.112571_b15","series-title":"Multi-programming language sandbox for LLMs","author":"Dou","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b16","doi-asserted-by":"crossref","unstructured":"Du, X., Liu, M., Wang, K., Wang, H., Liu, J., Chen, Y., Feng, J., Sha, C., Peng, X., Lou, Y., 2024. Evaluating large language models in class-level code generation. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. pp. 1\u201313.","DOI":"10.1145\/3597503.3639219"},{"key":"10.1016\/j.jss.2025.112571_b17","series-title":"SBFT tool competition 2024\u2013python test case generation track","author":"Erni","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b18","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2023.3324258","article-title":"Augmenting diffs with runtime information","author":"Etemadi","year":"2023","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2025.112571_b19","doi-asserted-by":"crossref","unstructured":"Evans, R.B., Savoia, A., 2007. Differential testing: a new approach to change detection. In: The 6th Joint Meeting on European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering: Companion Papers. pp. 549\u2013552.","DOI":"10.1145\/1295014.1295038"},{"key":"10.1016\/j.jss.2025.112571_b20","series-title":"Large language models for software engineering: Survey and open problems","author":"Fan","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b21","series-title":"Codebert: A pre-trained model for programming and natural languages","author":"Feng","year":"2020"},{"key":"10.1016\/j.jss.2025.112571_b22","doi-asserted-by":"crossref","unstructured":"Fraser, G., Arcuri, A., 2011. Evosuite: automatic test suite generation for object-oriented software. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. pp. 416\u2013419.","DOI":"10.1145\/2025113.2025179"},{"key":"10.1016\/j.jss.2025.112571_b23","series-title":"ChangeGuard: Validating code changes via pairwise learning-guided execution","author":"Gr\u00f6ninger","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b24","series-title":"LLM test generation via iterative hybrid program analysis","author":"Gu","year":"2025"},{"key":"10.1016\/j.jss.2025.112571_b25","series-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice","first-page":"71","article-title":"Perception and practices of differential testing","author":"Gulzar","year":"2019"},{"key":"10.1016\/j.jss.2025.112571_b26","doi-asserted-by":"crossref","unstructured":"Guo, J., Jiang, Y., Zhao, Y., Chen, Q., Sun, J., 2018. Dlfuzz: Differential fuzzing testing of deep learning systems. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. pp. 739\u2013743.","DOI":"10.1145\/3236024.3264835"},{"key":"10.1016\/j.jss.2025.112571_b27","series-title":"Measuring coding challenge competence with apps","author":"Hendrycks","year":"2021"},{"key":"10.1016\/j.jss.2025.112571_b28","series-title":"TOGLL: Correct and strong test oracle generation with LLMs","author":"Hossain","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b29","series-title":"International Conference on Fundamental Approaches To Software Engineering","first-page":"184","article-title":"Peqtest: Testing functional equivalence","author":"Jakobs","year":"2022"},{"key":"10.1016\/j.jss.2025.112571_b30","doi-asserted-by":"crossref","unstructured":"Jarman, D., Hunt, S., Berry, J., Towey, D., 2020a. Difference grouping and test suite evaluation: Lessons from automated differential testing for adobe analytics. In: Proceedings of the IEEE\/ACM 1st International Conference on Automation of Software Test. pp. 103\u2013104.","DOI":"10.1145\/3387903.3389315"},{"key":"10.1016\/j.jss.2025.112571_b31","doi-asserted-by":"crossref","unstructured":"Jarman, D., Hunt, S., Towey, D., 2020b. Program Slicing and Execution Tracing for Differential Testing at Adobe Analytics. In: Proceedings of the 28th International Conference on Program Comprehension. pp. 411\u2013415.","DOI":"10.1145\/3387904.3389292"},{"key":"10.1016\/j.jss.2025.112571_b32","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering","first-page":"1430","article-title":"Impact of code language models on automated program repair","author":"Jiang","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b33","doi-asserted-by":"crossref","unstructured":"Karampatsis, R.-M., Sutton, C., 2020. How often do single-statement bugs occur? the manysstubs4j dataset. In: Proceedings of the 17th International Conference on Mining Software Repositories. pp. 573\u2013577.","DOI":"10.1145\/3379597.3387491"},{"key":"10.1016\/j.jss.2025.112571_b34","doi-asserted-by":"crossref","unstructured":"Khalimov, A., Benahmed, S., Hussain, R., Kazmi, S.A., Oracevic, A., Hussain, F., Ahmad, F., Kerrache, C.A., 2019. Container-based sandboxes for malware analysis: A compromise worth considering. In: Proceedings of the 12th IEEE\/ACM International Conference on Utility and Cloud Computing. pp. 219\u2013227.","DOI":"10.1145\/3344341.3368810"},{"key":"10.1016\/j.jss.2025.112571_b35","doi-asserted-by":"crossref","unstructured":"Kim, H., Ozmen, M.O., Celik, Z.B., Bianchi, A., Xu, D., 2023. {PatchVerif}: Discovering Faulty Patches in Robotic Vehicles. In: 32nd USENIX Security Symposium (USENIX Security 23). pp. 3011\u20133028.","DOI":"10.14722\/vehiclesec.2023.23015"},{"key":"10.1016\/j.jss.2025.112571_b36","series-title":"Auger: Automated unittest generation for python","author":"Laffra","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b37","series-title":"Interactive code generation via test-driven user-intent formalization","author":"Lahiri","year":"2022"},{"key":"10.1016\/j.jss.2025.112571_b38","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering","first-page":"919","article-title":"Codamosa: Escaping coverage plateaus in test generation with pre-trained large language models","author":"Lemieux","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b39","series-title":"Mutation-based consistency testing for evaluating the code understanding capability of llms","author":"Li","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b40","series-title":"Large language models as test case generators: Performance evaluation and enhancement","author":"Li","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b41","series-title":"2023 38th IEEE\/ACM International Conference on Automated Software Engineering","first-page":"14","article-title":"Nuances are the key: Unlocking chatgpt to find failure-inducing tests with differential prompting","author":"Li","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b42","doi-asserted-by":"crossref","unstructured":"Lin, D., Koppel, J., Chen, A., Solar-Lezama, A., 2017. QuixBugs: A multi-lingual program repair benchmark set based on the Quixey Challenge. In: Proceedings Companion of the 2017 ACM SIGPLAN International Conference on Systems, Programming, Languages, and Applications: Software for Humanity. pp. 55\u201356.","DOI":"10.1145\/3135932.3135941"},{"key":"10.1016\/j.jss.2025.112571_b43","doi-asserted-by":"crossref","unstructured":"Liu, Z., Chen, C., Wang, J., Chen, M., Wu, B., Che, X., Wang, D., Wang, Q., 2024a. Make llm a testing expert: Bringing human-like interaction to mobile gui testing via functionality-aware decisions. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. pp. 1\u201313.","DOI":"10.1145\/3597503.3639180"},{"issue":"2","key":"10.1016\/j.jss.2025.112571_b44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3628159","article-title":"Generation-based differential fuzzing for deep learning libraries","volume":"33","author":"Liu","year":"2023","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/j.jss.2025.112571_b45","series-title":"LLM-powered test case generation for detecting tricky bugs","author":"Liu","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b46","doi-asserted-by":"crossref","unstructured":"Liu, Z., Liu, K., Xia, X., Yang, X., 2023b. Towards more realistic evaluation for neural test oracle generation. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. pp. 589\u2013600.","DOI":"10.1145\/3597926.3598080"},{"key":"10.1016\/j.jss.2025.112571_b47","article-title":"Is your code generated by chatgpt really correct? rigorous evaluation of large language models for code generation","volume":"36","author":"Liu","year":"2024","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"10.1016\/j.jss.2025.112571_b48","doi-asserted-by":"crossref","unstructured":"Lukasczyk, S., Fraser, G., 2022. Pynguin: Automated unit test generation for python. In: Proceedings of the ACM\/IEEE 44th International Conference on Software Engineering: Companion Proceedings. pp. 168\u2013172.","DOI":"10.1145\/3510454.3516829"},{"key":"10.1016\/j.jss.2025.112571_b49","series-title":"Search-Based Software Engineering: 12th International Symposium, SSBSE 2020, Bari, Italy, October 7\u20138, 2020, Proceedings 12","first-page":"9","article-title":"Automated unit test generation for python","author":"Lukasczyk","year":"2020"},{"issue":"2","key":"10.1016\/j.jss.2025.112571_b50","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s10664-022-10248-w","article-title":"An empirical study of automated unit test generation for python","volume":"28","author":"Lukasczyk","year":"2023","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.jss.2025.112571_b51","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.cola.2019.03.006","article-title":"Code4Bench: A multidimensional benchmark of codeforces data for different program analysis techniques","volume":"53","author":"Majd","year":"2019","journal-title":"J. Comput. Lang."},{"issue":"1","key":"10.1016\/j.jss.2025.112571_b52","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman","year":"1998","journal-title":"Digit. Tech. J."},{"key":"10.1016\/j.jss.2025.112571_b53","series-title":"2023 IEEE\/ACM 45th International Conference on Software Engineering","first-page":"2111","article-title":"Learning deep semantics for test completion","author":"Nie","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b54","series-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering","first-page":"176","article-title":"Diffuzz: differential fuzzing for side-channel analysis","author":"Nilizadeh","year":"2019"},{"key":"10.1016\/j.jss.2025.112571_b55","doi-asserted-by":"crossref","unstructured":"Noller, Y., P\u0103s\u0103reanu, C.S., B\u00f6hme, M., Sun, Y., Nguyen, H.L., Grunske, L., 2020. HyDiff: Hybrid differential software analysis. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering. pp. 1273\u20131285.","DOI":"10.1145\/3377811.3380363"},{"key":"10.1016\/j.jss.2025.112571_b56","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Ernst, M.D., 2007. Randoop: feedback-directed random testing for Java. In: Companion To the 22nd ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications Companion. pp. 815\u2013816.","DOI":"10.1145\/1297846.1297902"},{"key":"10.1016\/j.jss.2025.112571_b57","doi-asserted-by":"crossref","unstructured":"Pan, R., Kim, M., Krishna, R., Pavuluri, R., Sinha, S., 2025. ASTER: Natural and Multi-language Unit Test Generation with LLMs. In: ACM\/IEEE International Conference on Software Engineering.","DOI":"10.1109\/ICSE-SEIP66354.2025.00042"},{"key":"10.1016\/j.jss.2025.112571_b58","series-title":"Large Language Models in Cybersecurity: Threats, Exposure and Mitigation","first-page":"87","article-title":"Vulnerabilities introduced by llms through code suggestions","author":"Panichella","year":"2024"},{"issue":"2","key":"10.1016\/j.jss.2025.112571_b59","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TSE.2017.2663435","article-title":"Automated test case generation as a many-objective optimisation problem with dynamic selection of the targets","volume":"44","author":"Panichella","year":"2017","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2025.112571_b60","doi-asserted-by":"crossref","DOI":"10.1016\/j.jss.2019.07.100","article-title":"A systematic literature review of techniques and metrics to reduce the cost of mutation testing","volume":"157","author":"Pizzoleto","year":"2019","journal-title":"J. Syst. Softw."},{"key":"10.1016\/j.jss.2025.112571_b61","series-title":"Coverup: Coverage-guided LLM-based test generation","author":"Pizzorno","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b62","series-title":"Automatic generation of test cases based on bug reports: a feasibility study with large language models","author":"Plein","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b63","series-title":"2024 12th International Conference in Software Engineering Research and Innovation","first-page":"331","article-title":"State of the art of the security of code generated by LLMs: A systematic literature review","author":"Ram\u00edrez","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b64","series-title":"2022 IEEE Conference on Software Testing, Verification and Validation","first-page":"256","article-title":"Automating differential testing with overapproximate symbolic execution","author":"Rutledge","year":"2022"},{"key":"10.1016\/j.jss.2025.112571_b65","series-title":"Code-aware prompting: A study of coverage guided test generation in regression setting using LLM","author":"Ryan","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b66","article-title":"An empirical evaluation of using large language models for automated unit test generation","author":"Sch\u00e4fer","year":"2023","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"11","key":"10.1016\/j.jss.2025.112571_b67","article-title":"Ampyfier: Test amplification in python","volume":"34","author":"Schoofs","year":"2022","journal-title":"J. Softw.: Evol. Process."},{"issue":"OOPSLA","key":"10.1016\/j.jss.2025.112571_b68","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3276531","article-title":"Test generation for higher-order functions in dynamic languages","volume":"2","author":"Selakovic","year":"2018","journal-title":"Proc. the ACM Program. Lang."},{"key":"10.1016\/j.jss.2025.112571_b69","series-title":"Exploring the effectiveness of large language models in generating unit tests","author":"Siddiq","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b70","series-title":"Reinforcement learning from automatic feedback for high-quality unit test generation","author":"Steenhoek","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b71","series-title":"Pytester: Deep reinforcement learning for text-to-testcase generation","author":"Takerngsaksiri","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b72","series-title":"Proceedings of the 23rd IEEE\/ACM International Conference on Automated Software Engineering","first-page":"407","article-title":"DiffGen: Automated regression unit-test generation","author":"Taneja","year":"2008"},{"key":"10.1016\/j.jss.2025.112571_b73","series-title":"2008 23rd IEEE\/ACM International Conference on Automated Software Engineering","first-page":"407","article-title":"DiffGen: Automated regression unit-test generation","author":"Taneja","year":"2008"},{"key":"10.1016\/j.jss.2025.112571_b74","doi-asserted-by":"crossref","DOI":"10.1109\/TSE.2024.3382365","article-title":"Chatgpt vs sbst: A comparative assessment of unit test suite generation","author":"Tang","year":"2024","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"10.1016\/j.jss.2025.112571_b75","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-024-10590-1","article-title":"How secure is AI-generated code: a large-scale comparison of large language models","volume":"30","author":"Tihanyi","year":"2025","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.jss.2025.112571_b76","series-title":"Unit test case generation with transformers and focal context","author":"Tufano","year":"2020"},{"key":"10.1016\/j.jss.2025.112571_b77","doi-asserted-by":"crossref","unstructured":"Tufano, M., Drain, D., Svyatkovskiy, A., Sundaresan, N., 2022. Generating accurate assert statements for unit test cases using pretrained transformers. In: Proceedings of the 3rd ACM\/IEEE International Conference on Automation of Software Test. pp. 54\u201364.","DOI":"10.1145\/3524481.3527220"},{"key":"10.1016\/j.jss.2025.112571_b78","doi-asserted-by":"crossref","unstructured":"Usman, M., Wang, W., Khurshid, S., 2020. TestMC: testing model counters using differential and metamorphic testing. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering. pp. 709\u2013721.","DOI":"10.1145\/3324884.3416563"},{"key":"10.1016\/j.jss.2025.112571_b79","series-title":"Mobile and Ubiquitous Systems: Computing, Networking and Services: 18th EAI International Conference, MobiQuitous 2021, Virtual Event, November 8-11, 2021, Proceedings","first-page":"322","article-title":"SEMEO: A semantic equivalence analysis framework for obfuscated android applications","volume":"419","author":"VieiraB","year":"2022"},{"key":"10.1016\/j.jss.2025.112571_b80","series-title":"Can large language models write good property-based tests?","author":"Vikram","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b81","article-title":"Software testing with large language models: Survey, landscape, and vision","author":"Wang","year":"2024","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2025.112571_b82","doi-asserted-by":"crossref","unstructured":"Watson, C., Tufano, M., Moran, K., Bavota, G., Poshyvanyk, D., 2020. On learning meaningful assert statements for unit test cases. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering. pp. 1398\u20131409.","DOI":"10.1145\/3377811.3380429"},{"key":"10.1016\/j.jss.2025.112571_b83","doi-asserted-by":"crossref","unstructured":"Xia, C.S., Paltenghi, M., Le Tian, J., Pradel, M., Zhang, L., 2024. Fuzz4all: Universal fuzzing with large language models. In: Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. pp. 1\u201313.","DOI":"10.1145\/3597503.3639121"},{"key":"10.1016\/j.jss.2025.112571_b84","series-title":"ChatUniTest: a ChatGPT-based automated unit test generation tool","author":"Xie","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b85","doi-asserted-by":"crossref","unstructured":"Ye, G., Hu, T., Tang, Z., Fan, Z., Tan, S.H., Zhang, B., Qian, W., Wang, Z., 2023. A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. pp. 1127\u20131139.","DOI":"10.1145\/3611643.3616332"},{"key":"10.1016\/j.jss.2025.112571_b86","series-title":"Evaluating instruction-tuned large language models on code comprehension and generation","author":"Yuan","year":"2023"},{"key":"10.1016\/j.jss.2025.112571_b87","series-title":"American fuzzy lop","author":"Zalewski","year":"2024"},{"key":"10.1016\/j.jss.2025.112571_b88","series-title":"Generating exceptional behavior tests with reasoning augmented large language models","author":"Zhang","year":"2024"},{"issue":"4","key":"10.1016\/j.jss.2025.112571_b89","doi-asserted-by":"crossref","first-page":"1671","DOI":"10.1109\/TR.2021.3107165","article-title":"Duo: Differential fuzzing for deep learning operators","volume":"70","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Reliab."}],"container-title":["Journal of Systems and Software"],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121225002407?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121225002407?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T22:57:38Z","timestamp":1772751458000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121225002407"}},"issued":{"date-parts":[[2025,12]]},"references-count":89,"alternative-id":["S0164121225002407"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2025.112571","ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"published":{"date-parts":[[2025,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Mokav: Execution-driven differential testing with LLMs","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2025.112571","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112571"},{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T17:47:48Z","timestamp":1767116868182,"version":"3.37.3"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Wallenberg Artificial Intelligence, Autonomous Systems, and Software Program"},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001729","name":"Stiftelsen f\u00f6r\u00a0Strategisk Forskning","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001729","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2021,10,1]]},"DOI":"10.1109\/tse.2019.2946148","type":"journal-article","created":{"date-parts":[[2019,10,8]],"date-time":"2019-10-08T20:02:28Z","timestamp":1570564948000},"page":"2225-2241","source":"Crossref","is-referenced-by-count":20,"title":["IntRepair: Informed Repairing of Integer Overflows"],"prefix":"10.1109","volume":"47","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2462-7612","authenticated-orcid":false,"given":"Paul","family":"Muntean","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8634-2367","authenticated-orcid":false,"given":"Hao","family":"Sun","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1093-1282","authenticated-orcid":false,"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Eckert","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39","article-title":"The language toolkit: An API for automated refactorings in eclipse-based IDEs"},{"key":"ref38","article-title":"Codan-C\/C++ static analysis framework for CDT","author":"laskavaia","year":"2011","journal-title":"EclipseCon"},{"journal-title":"Design Patterns Elements of Reusable Object-Oriented Software","year":"1994","author":"gamma","key":"ref33"},{"year":"2010","author":"barrett","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2015.7335070"},{"key":"ref30","first-page":"295","article-title":"Repairing programs with semantic code search","author":"yalin","year":"2015","journal-title":"Proc 30th IEEE\/ACM Int Conf Automated Softw Eng"},{"year":"0","key":"ref37","article-title":"Eclipse CDT."},{"key":"ref36","first-page":"1","article-title":"A fast and low-overhead technique to secure programs against integer overflows","author":"pereira","year":"2013","journal-title":"Proc IEEE\/ACM Int Symp Code Gener Optim"},{"key":"ref35","first-page":"760","article-title":"Understanding integer overflow in C\/C++","author":"dietz","year":"2012","journal-title":"Proc 34th Int'l Conf Software Eng"},{"key":"ref34","article-title":"Understanding integer overflow in C\/C++","author":"dietz","year":"2012","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115718"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606625"},{"article-title":"Automatic error elimination by multi-application code transfer","year":"2014","author":"sidiroglou-douskos","key":"ref61"},{"year":"0","key":"ref28","article-title":"Numeric truncation error."},{"year":"0","key":"ref27","article-title":"Unsigned to signed conversion error."},{"year":"0","key":"ref29","article-title":"IO2BO: Integer overflow to buffer overflow."},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_20"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884820"},{"year":"0","key":"ref22","article-title":"Integer underflow (wrap or wraparound)."},{"article-title":"Integer overflow or wraparound.","year":"0","author":"corporation","key":"ref21"},{"year":"0","key":"ref24","article-title":"Off-by-one error."},{"year":"0","key":"ref23","article-title":"Integer coercion error."},{"year":"0","key":"ref26","article-title":"Signed to unsigned conversion error."},{"year":"0","key":"ref25","article-title":"Unexpected sign extension."},{"key":"ref50","first-page":"67","article-title":"Dynamic test generation to find integer bugs in x86 binary Linux programs","author":"molnar","year":"2009","journal-title":"Proc Usenix Security Symp"},{"key":"ref51","article-title":"Modular bug-finding for integer overflows in the large: Sound, efficient, bit-precise static analysis","author":"moy","year":"2009","journal-title":"MSR - TR 2009&#x2013;179"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.70"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2016.7515929"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_12"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2775054.2694389"},{"article-title":"Automatic discovery and patching of buffer and integer overflow errors","year":"2015","author":"sidiroglou-douskos","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535888"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664282"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227146"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24255-2_32"},{"year":"0","key":"ref40","article-title":"Eclipse JFace."},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.7873\/DATE.2015.0750"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"year":"0","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.63"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref19","article-title":"RICH: Automatically protecting against integer-based vulnerabilities","author":"brumley","year":"2007","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274737"},{"key":"ref3","article-title":"IntScope: Automatically detecting integer overflow vulnerability in X86 binary using symbolic execution","author":"wang","year":"2009","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_14"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref7","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11145-7_26"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"key":"ref46","article-title":"Automated whitebox fuzz testing","author":"godefroid","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"year":"0","key":"ref45","article-title":"PREfast analysis tool."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2009.77"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00071"},{"year":"0","key":"ref41","article-title":"The GNU compiler collection."},{"key":"ref44","article-title":"UQBTng: A tool capable of automatically finding integer overflows in Win32 binaries","author":"wojtczuk","year":"2005","journal-title":"Chaos Commun Congr (22C3)"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30108-0_24"}],"container-title":["IEEE Transactions on Software Engineering"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9573514\/08862860.pdf?arnumber=8862860","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:50:06Z","timestamp":1652194206000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8862860\/"}},"issued":{"date-parts":[[2021,10,1]]},"references-count":62,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tse.2019.2946148","ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"published":{"date-parts":[[2021,10,1]]}},{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:15:44Z","timestamp":1773774944668,"version":"3.50.1"},"reference-count":15,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Secur. Privacy"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1109\/msec.2023.3302956","type":"journal-article","created":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T17:45:11Z","timestamp":1693503911000},"page":"12-23","source":"Crossref","is-referenced-by-count":31,"title":["Challenges of Producing Software Bill of Materials for Java"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6005-5992","authenticated-orcid":false,"given":"Musard","family":"Balliu","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3116-3278","authenticated-orcid":false,"given":"Sofia","family":"Bobadilla","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3922-9606","authenticated-orcid":false,"given":"Mathias","family":"Ekstedt","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6988-3102","authenticated-orcid":false,"given":"Javier","family":"Ron","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2263-7902","authenticated-orcid":false,"given":"Aman","family":"Sharma","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7070-5950","authenticated-orcid":false,"given":"Gabriel","family":"Skoglund","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0541-6411","authenticated-orcid":false,"given":"C\u00e9sar","family":"Soto-Valero","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2578-6399","authenticated-orcid":false,"given":"Martin","family":"Wittlinger","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3347446"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110653"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/sp46215.2023.10179304"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2021.3087419"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2020.2983530"},{"key":"ref6","first-page":"1271","article-title":"CHAINIAC: Proactive software-update transparency via collectively signed skipchains and verified builds","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Nikitin","year":"2017"},{"key":"ref7","volume-title":"The Log4j vulnerability and its impact on software supply chain security","author":"Tal","year":"2023"},{"key":"ref8","volume-title":"Survey of existing SBOM formats and standards","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2022.3175542"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2021.3065627"},{"key":"ref11","volume-title":"The minimum elements for a software bill of materials","year":"2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09914-8"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/icse48619.2023.00219"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2323"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3510457.3513044"}],"container-title":["IEEE Security &amp; Privacy"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8013\/10315765\/10235318.pdf?arnumber=10235318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T23:04:04Z","timestamp":1709334244000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10235318\/"}},"issued":{"date-parts":[[2023,11]]},"references-count":15,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/msec.2023.3302956","ISSN":["1540-7993","1558-4046"],"issn-type":[{"value":"1540-7993","type":"print"},{"value":"1558-4046","type":"electronic"}],"published":{"date-parts":[[2023,11]]}},{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:02:58Z","timestamp":1775854978532,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Wallenberg Artificial Intelligence, Autonomous Systems and Software Program"},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Swedish Foundation for Strategic Research"},{"DOI":"10.13039\/501100008982","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1750399"],"award-info":[{"award-number":["CCF-1750399"]}],"id":[{"id":"10.13039\/501100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004359","name":"Vetenskapsr\u00e5det","doi-asserted-by":"publisher","award":["2018-05973"],"award-info":[{"award-number":["2018-05973"]}],"id":[{"id":"10.13039\/501100004359","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/tse.2022.3147265","type":"journal-article","created":{"date-parts":[[2022,2,1]],"date-time":"2022-02-01T20:42:45Z","timestamp":1643748165000},"page":"147-165","source":"Crossref","is-referenced-by-count":123,"title":["Neural Transfer Learning for Repairing Security Vulnerabilities in C Code"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6673-6438","authenticated-orcid":false,"given":"Zimin","family":"Chen","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1447-5993","authenticated-orcid":false,"given":"Steve","family":"Kommrusch","sequence":"additional","affiliation":[{"name":"Colorado State University, Fort Collins, CO, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1021\/acs.chemmater.7b00156"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.500-297"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2005.05.019"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_33"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387501"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870873"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/E17-1088"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00071"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"key":"ref52","first-page":"10 799","article-title":"Graph-based, self-supervised program repair from diagnostic feedback","author":"yasunaga","year":"2020","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref11","first-page":"1693","article-title":"Teaching machines to read and comprehend","author":"hermann","year":"2015","journal-title":"Adv Neural Inf Process Syst"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00502"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-3302"},{"key":"ref54","first-page":"5110","article-title":"Learning and evaluating contextual embedding of source code","author":"kanade","year":"2020","journal-title":"Proc Int Conf Mach Learn"},{"key":"ref17","article-title":"Estimating the global cost of cybercrime","author":"losses","year":"2014","journal-title":"McAfee"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3475960.3475985"},{"key":"ref19","article-title":"Google's neural machine translation system: Bridging the gap between human and machine translation","author":"wu","year":"2016"},{"key":"ref18","first-page":"3104","article-title":"Sequence to sequence learning with neural networks","author":"sutskever","year":"2014","journal-title":"Proc 27th Int Conf Neural Inf Process Syst"},{"key":"ref51","article-title":"BART: Denoising sequence-to-sequence pre-training for natural language generation, translation, and comprehension","author":"lewis","year":"2019"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2021.naacl-main.211"},{"key":"ref46","article-title":"Encore: Ensemble learning using convolution neural machine translation for automatic program repair","author":"lutellier","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3070743"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3359591.3359735"},{"key":"ref47","article-title":"Clang: A C language family frontend for LLVM","year":"2021"},{"key":"ref42","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3183377.3183383"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.308"},{"key":"ref43","first-page":"1929","article-title":"Dropout: A simple way to prevent neural networks from overfitting","volume":"15","author":"srivastava","year":"2014","journal-title":"J Mach Learn Res"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2016.2528162"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.97"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSC.2018.00017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_13"},{"key":"ref4","article-title":"2020 state of the octoverse: Securing the world's software","author":"forsgren","year":"2021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.15"},{"key":"ref6","article-title":"SeqTrans: Automatic vulnerability fix via sequence to sequence learning","author":"chi","year":"2020"},{"key":"ref5","article-title":"Learning to repair software vulnerabilities with generative adversarial networks","author":"harer","year":"2018"},{"key":"ref81","first-page":"1877","article-title":"Language models are few-shot learners","author":"brown","year":"2020","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-4012"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110936"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v31i1.10742"},{"key":"ref79","article-title":"A study of pyramid structure for code correction","author":"huang","year":"2020"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/W14-4012"},{"key":"ref78","article-title":"Exploring the possibilities of applying transfer learning methods for natural language processing in software development","author":"ding","year":"2021"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49430-8_3"},{"key":"ref36","article-title":"Neural machine translation of rare words with subword units","author":"sennrich","year":"2015"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"ref75","article-title":"code2seq: Generating sequences from structured representations of code","author":"alon","year":"2018"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2020.2993293"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380345"},{"key":"ref33","year":"2021"},{"key":"ref77","article-title":"Learning to represent edits","author":"yin","year":"2018"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2018.00120"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3020502"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.02.009"},{"key":"ref1","article-title":"The 2020 state of the octoverse","year":"2021"},{"key":"ref39","year":"2015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1154"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3212695"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106576"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397369"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-766-9.ch011"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00064"},{"key":"ref23","first-page":"5998","article-title":"Attention is all you need","author":"vaswani","year":"2017","journal-title":"Proc 31st Conf Adv Neural Inf Process Syst"},{"key":"ref67","article-title":"A ground-truth dataset of real security patches","author":"reis","year":"2021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3340544"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01424-7_27"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196454"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/K16-1028"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.64"},{"key":"ref22","first-page":"1943","article-title":"Sequencer: Sequence-to-sequence learning for end-to-end program repair","volume":"47","author":"chen","year":"2011","journal-title":"IEEE Trans Softw Eng"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_14"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227135"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946148"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392181"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340455"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468544"},{"key":"ref60","article-title":"FuzzBomb: Autonomous cyber vulnerability detection and repair","volume":"136","author":"musliner","year":"2015","journal-title":"Proc 4th Int Conf Commun Comput Netw Technol"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236079"},{"key":"ref61","article-title":"Beyond tests: Program vulnerability repair via crash constraint extraction","volume":"1","author":"gao","year":"2020","journal-title":"ACM Trans Softw Eng Methodol"}],"container-title":["IEEE Transactions on Software Engineering"],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/32\/10008953\/9699412-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10008953\/09699412.pdf?arnumber=9699412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T18:40:29Z","timestamp":1675190429000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9699412\/"}},"issued":{"date-parts":[[2023,1,1]]},"references-count":81,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3147265","ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"published":{"date-parts":[[2023,1,1]]}},{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:18:38Z","timestamp":1768537118292,"version":"3.49.0"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Wallenberg AI, Autonomous Systems and Software Program"},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1109\/tr.2021.3101318","type":"journal-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T19:59:51Z","timestamp":1630439991000},"page":"1381-1397","source":"Crossref","is-referenced-by-count":17,"title":["Production Monitoring to Improve Test Suites"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0293-2592","authenticated-orcid":false,"given":"Deepika","family":"Tiwari","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7211-3894","authenticated-orcid":false,"given":"Long","family":"Zhang","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1363102.1363107"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00034"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2017.2727062"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00040"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110398"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_23"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201188"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483769"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238183"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1145\/3183519.3183521","article-title":"State of mutation testing at Google","volume-title":"Proc. 40th Int. Conf. Softw. Eng.: Softw. Eng. Pract.","author":"Petrovi","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134425"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181806"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2896941.2896944"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568271"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786858"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00021"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09794-7"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/3324884.3416667","article-title":"Revisiting the relationship between fault detection, test adequacy criteria, and test set size","volume-title":"Proc. 35th IEEE\/ACM Int. Conf. Automated Softw. Eng.","author":"Chen","year":"2020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9653-2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110452"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.32"},{"key":"ref24","article-title":"The state of JAVA serialization","author":"Costlow","year":"2020"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/DICTAP.2012.6215346"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213863"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180164"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-009-0115-4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70592-5_23"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2346"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/1077800405284363"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2009.06.016"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9600-2"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464824"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771812"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101927"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.11"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09692-y"},{"key":"ref39","article-title":"Equality and comparison in JAVA: Pitfalls and best practices","author":"Weidig","year":"2020"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110523"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102165"},{"key":"ref42","first-page":"1021","article-title":"Differentially-private control-flow node coverage for software usage analysis","volume-title":"Proc. 29th USENIX Secur. Symp., USENIX Secur.","author":"Zhang","year":"2020"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517847"},{"key":"ref44","article-title":"Analyzing the impact of $\\lbrace$GDPR$\\rbrace$ on storage systems","volume-title":"Proc. 11th Workshop Hot Topics Storage File Syst.","author":"Shah","year":"2019"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2897010.2897016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786838"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985712"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.402"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.456"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00053"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13977-2_8"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79124-9_10"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.22"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70723"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1733"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803206"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/AITEST49225.2020.00020"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2002.1173246"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.117"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1145\/3377811.3380436","article-title":"Taming behavioral backward incompatibilities via cross-project testing and analysis","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Chen","year":"2020"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985847"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2436920"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00061"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2957507"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362636"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348993"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM51674.2020.00018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1188966.1188981"}],"container-title":["IEEE Transactions on Reliability"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/9872066\/09526340.pdf?arnumber=9526340","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T23:16:55Z","timestamp":1705015015000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9526340\/"}},"issued":{"date-parts":[[2022,9]]},"references-count":72,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2021.3101318","ISSN":["0018-9529","1558-1721"],"issn-type":[{"value":"0018-9529","type":"print"},{"value":"1558-1721","type":"electronic"}],"published":{"date-parts":[[2022,9]]}},{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T11:48:20Z","timestamp":1771328900097,"version":"3.50.1"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"abstract":"<jats:p>\n                    N-Version Programming is a well-known methodology for developing fault-tolerant systems. It achieves fault detection and correction at runtime by adding diverse redundancy into programs, minimizing fault mode overlap between redundant program variants. In this work, we propose the automated generation of program variants using large language models. We design, develop and evaluate\n                    <jats:sc>Gal\u00e1pagos<\/jats:sc>\n                    : a tool for generating program variants using LLMs, validating their correctness and equivalence, and using them to assemble N-Version binaries. We evaluate\n                    <jats:sc>Gal\u00e1pagos<\/jats:sc>\n                    by creating N-Version components of real-world C code. Our original results show that\n                    <jats:sc>Gal\u00e1pagos<\/jats:sc>\n                    can produce program variants that are proven to be functionally equivalent, even when the variants are written in a different programming language. Our systematic diversity measurement indicates that functionally equivalent variants produced by\n                    <jats:sc>Gal\u00e1pagos<\/jats:sc>\n                    , are statically different after compilation, and present diverging internal behavior at runtime. We demonstrate that the variants produced by\n                    <jats:sc>Gal\u00e1pagos<\/jats:sc>\n                    can protect C code against real miscompilation bugs which affect the Clang compiler. Overall, our paper shows that producing N-Version software can be drastically automated by advanced usage of practical formal verification and generative language models.\n                  <\/jats:p>","DOI":"10.1145\/3785363","type":"journal-article","created":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T15:56:57Z","timestamp":1765987017000},"update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Gal\u00e1pagos: Automated N-Version Programming with LLMs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6988-3102","authenticated-orcid":false,"given":"Javier","family":"Ron","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1338-3295","authenticated-orcid":false,"given":"Diogo","family":"Gaspar","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9399-8647","authenticated-orcid":false,"given":"Javier","family":"Cabrera-Arteaga","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Montr\u00e9al, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,12,17]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"72","volume-title":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133)","author":"Forrest Stephanie","unstructured":"Stephanie Forrest, Anil Somayaji, and David\u00a0H Ackley. Building diverse computer systems. In Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133), pages 67\u201372. IEEE, 1997."},{"key":"e_1_2_1_2_1","article-title":"The n-version approach to fault-tolerant software","volume":"1491","author":"Avizienis Algirdas","year":"1985","unstructured":"Algirdas Avizienis. The n-version approach to fault-tolerant software. IEEE Transactions on software engineering, (12):1491\u20131501, 1985.","journal-title":"IEEE Transactions on software engineering, (12)"},{"key":"e_1_2_1_3_1","volume-title":"The methodology of n-version programming. Software fault tolerance, 3:23\u201346","author":"Avizienis Algirdas","year":"1995","unstructured":"Algirdas Avizienis. The methodology of n-version programming. Software fault tolerance, 3:23\u201346, 1995."},{"key":"e_1_2_1_4_1","article-title":"An experimental evaluation of the assumption of independence in multiversion programming","volume":"96","author":"Knight C","year":"2012","unstructured":"John\u00a0C Knight and Nancy\u00a0G Leveson. An experimental evaluation of the assumption of independence in multiversion programming. IEEE Transactions on software engineering, (1):96\u2013109, 2012.","journal-title":"IEEE Transactions on software engineering, (1)"},{"issue":"2","key":"e_1_2_1_5_1","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/32.44387","article-title":"Analysis of faults in an n-version software experiment","volume":"16","author":"Brilliant S.","year":"2002","unstructured":"Susan\u00a0S. Brilliant, John\u00a0C. Knight, and Nancy\u00a0G. Leveson. Analysis of faults in an n-version software experiment. IEEE Transactions on software engineering, 16(2):238\u2013247, 2002.","journal-title":"IEEE Transactions on software engineering"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2001.936213"},{"key":"e_1_2_1_7_1","volume-title":"Evaluating large language models trained on code","author":"\u00a0al Mark\u00a0Chen","year":"2021","unstructured":"Mark\u00a0Chen et\u00a0al. Evaluating large language models trained on code, 2021."},{"key":"e_1_2_1_8_1","volume-title":"Cigar: Cost-efficient program repair with llms","author":"Hidv\u00e9gi D\u00e1vid","year":"2024","unstructured":"D\u00e1vid Hidv\u00e9gi, Khashayar Etemadi, Sofia Bobadilla, and Martin Monperrus. Cigar: Cost-efficient program repair with llms, 2024."},{"key":"e_1_2_1_9_1","first-page":"5","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering","author":"Ahmed Toufique","year":"2022","unstructured":"Toufique Ahmed and Premkumar Devanbu. Few-shot training llms for project-specific code-summarization. In Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering, pages 1\u20135, 2022."},{"key":"e_1_2_1_10_1","unstructured":"The tigress C obfuscator. tigress.wtf."},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","first-page":"103731","DOI":"10.1016\/j.cose.2024.103731","article-title":"Fast and effective binary diversification for webassembly","volume":"139","author":"Cabrera-Arteaga Javier","year":"2024","unstructured":"Javier Cabrera-Arteaga, Nicholas Fitzgerald, Martin Monperrus, and Benoit Baudry. Wasm-mutate: Fast and effective binary diversification for webassembly. Computers & Security, 139:103731, 2024.","journal-title":"Computers & Security"},{"key":"e_1_2_1_12_1","first-page":"294","volume-title":"Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation","author":"Yang Xuejun","year":"2011","unstructured":"Xuejun Yang, Yang Chen, Eric Eide, and John Regehr. Finding and understanding bugs in c compilers. In Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation, pages 283\u2013294, 2011."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231895"},{"key":"e_1_2_1_14_1","article-title":"Highly available blockchain nodes with n-version design","author":"Ron Javier","year":"2023","unstructured":"Javier Ron, C\u00e9sar Soto-Valero, Long Zhang, Benoit Baudry, and Martin Monperrus. Highly available blockchain nodes with n-version design. IEEE Transactions on Dependable and Secure Computing, 2023.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_2_1_15_1","volume-title":"IFAC Proceedings Volumes, 19(11):35\u201341, 1986. 5th IFAC Workshop on Safety of Computer Control Systems 1986 (SAFECOMP \u201986)","author":"Tso K.S.","year":"1986","unstructured":"K.S. Tso, A.\u00a0Avi\u017eienis, and J.P.J. Kelly. Error recovery in multi-version software. IFAC Proceedings Volumes, 19(11):35\u201341, 1986. 5th IFAC Workshop on Safety of Computer Control Systems 1986 (SAFECOMP \u201986). Trends in Safe Real Time Computer Systems, Sarlat, France, 14-17 October, 1986."},{"key":"e_1_2_1_16_1","volume-title":"ACM Distributed Ledger Technologies: Research and Practice","author":"Ron Javier","year":"2025","unstructured":"Javier Ron, Zheyuan He, and Martin Monperrus. Proving and rewarding client diversity to strengthen resilience of blockchain networks. In ACM Distributed Ledger Technologies: Research and Practice, 2025."},{"key":"e_1_2_1_17_1","first-page":"160","volume-title":"Proceedings of the ACM\/SPEC International Conference on Performance Engineering","author":"Gholami Sara","year":"2020","unstructured":"Sara Gholami, Alireza Goli, Cor-Paul Bezemer, and Hamzeh Khazaei. A framework for satisfying the performance requirements of containerized software systems through multi-versioning. In Proceedings of the ACM\/SPEC International Conference on Performance Engineering, pages 150\u2013160, 2020."},{"key":"e_1_2_1_18_1","first-page":"283","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Xu Meng","year":"2017","unstructured":"Meng Xu, Kangjie Lu, Taesoo Kim, and Wenke Lee. Bunshin: compositing security mechanisms through diversification. In 2017 USENIX Annual Technical Conference (USENIX ATC 17), pages 271\u2013283, 2017."},{"key":"e_1_2_1_19_1","first-page":"427","volume-title":"52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2022","author":"Espinoza M.","year":"2022","unstructured":"Antonio\u00a0M. Espinoza, Riley Wood, Stephanie Forrest, and Mohit Tiwari. Back to the future: N-versioning of microservices. In 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Baltimore, MD, USA, June 27-30, 2022, pages 415\u2013427. IEEE, 2022."},{"key":"e_1_2_1_20_1","first-page":"8","volume-title":"2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","author":"Hu Tingting","year":"2017","unstructured":"Tingting Hu, Ivan\u00a0Cibrario Bertolott, and Nicolas Navet. Towards seamless integration of n-version programming in model-based design. In 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), pages 1\u20138, 2017."},{"issue":"1","key":"e_1_2_1_21_1","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1145\/2786763.2694390","article-title":"Varan the unbelievable: An efficient n-version execution framework","volume":"43","author":"Hosek Petr","year":"2015","unstructured":"Petr Hosek and Cristian Cadar. Varan the unbelievable: An efficient n-version execution framework. SIGARCH Comput. Archit. News, 43(1):339\u2013353, mar 2015.","journal-title":"SIGARCH Comput. Archit. News"},{"key":"e_1_2_1_22_1","first-page":"33","volume-title":"Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, CPSS \u201916","author":"Xu Hui","year":"2016","unstructured":"Hui Xu, Yangfan Zhou, and Michael Lyu. N-version obfuscation. In Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, CPSS \u201916, page 22\u201333, New York, NY, USA, 2016. Association for Computing Machinery."},{"key":"e_1_2_1_23_1","volume-title":"Automated creation of source code variants of a cryptographic hash function implementation using generative pre-trained transformer models","author":"Pelofske Elijah","year":"2024","unstructured":"Elijah Pelofske, Vincent Urias, and Lorie\u00a0M. Liebrock. Automated creation of source code variants of a cryptographic hash function implementation using generative pre-trained transformer models, 2024."},{"key":"e_1_2_1_24_1","first-page":"36","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"Tufano Michele","year":"2019","unstructured":"Michele Tufano, Jevgenija Pantiuchina, Cody Watson, Gabriele Bavota, and Denys Poshyvanyk. On learning meaningful code changes via neural machine translation. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pages 25\u201336, 2019."},{"issue":"9","key":"e_1_2_1_25_1","first-page":"1943","article-title":"Sequence-to-sequence learning for end-to-end program repair","volume":"47","author":"Chen Zimin","year":"2021","unstructured":"Zimin Chen, Steve Kommrusch, Michele Tufano, Louis-No\u00ebl Pouchet, Denys Poshyvanyk, and Martin Monperrus. Sequencer: Sequence-to-sequence learning for end-to-end program repair. IEEE Transactions on Software Engineering, 47(9):1943\u20131959, 2021.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_2_1_26_1","volume-title":"Unsupervised translation of programming languages","author":"Lachaux Marie-Anne","year":"2020","unstructured":"Marie-Anne Lachaux, Baptiste Roziere, Lowik Chanussot, and Guillaume Lample. Unsupervised translation of programming languages, 2020."},{"key":"e_1_2_1_27_1","volume-title":"Vert: Verified equivalent rust transpilation with large language models as few-shot learners","author":"Yang Aidan","year":"2024","unstructured":"Aidan Z.\u00a0H. Yang, Yoshiki Takashima, Brandon Paulsen, Josiah Dodds, and Daniel Kroening. Vert: Verified equivalent rust transpilation with large language models as few-shot learners, 2024."},{"key":"e_1_2_1_28_1","first-page":"305","volume-title":"Proceedings of the 25th international symposium on software testing and analysis","author":"Sun Chengnian","year":"2016","unstructured":"Chengnian Sun, Vu\u00a0Le, Qirun Zhang, and Zhendong Su. Toward understanding compiler bugs in gcc and llvm. In Proceedings of the 25th international symposium on software testing and analysis, pages 294\u2013305, 2016."},{"key":"e_1_2_1_29_1","volume-title":"Inria","author":"Leroy Xavier","year":"2023","unstructured":"Xavier Leroy. The compcert c verified compiler: Documentation and user's manual. Technical report, Inria, 2023."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the ACM on Programming Languages, 3(OOPSLA):1\u201329","author":"Marcozzi Micha\u00ebl","year":"2019","unstructured":"Micha\u00ebl Marcozzi, Qiyi Tang, Alastair\u00a0F Donaldson, and Cristian Cadar. Compiler fuzzing: How much does it matter? Proceedings of the ACM on Programming Languages, 3(OOPSLA):1\u201329, 2019."},{"key":"e_1_2_1_31_1","first-page":"264","volume-title":"Proceedings of the 8th ACM International Conference on Embedded Software, EMSOFT \u201908","author":"Eide Eric","year":"2008","unstructured":"Eric Eide and John Regehr. Volatiles are miscompiled, and what to do about it. In Proceedings of the 8th ACM International Conference on Embedded Software, EMSOFT \u201908, page 255\u2013264, New York, NY, USA, 2008. Association for Computing Machinery."},{"key":"e_1_2_1_32_1","first-page":"123","volume-title":"Proceedings of the 2024 IEEE\/ACM First International Conference on AI Foundation Models and Software Engineering, FORGE \u201924","author":"Blyth Scott","year":"2024","unstructured":"Scott Blyth, Christoph Treude, and Markus Wagner. Creative and correct: Requesting diverse code solutions from ai foundation models. In Proceedings of the 2024 IEEE\/ACM First International Conference on AI Foundation Models and Software Engineering, FORGE \u201924, page 119\u2013123, New York, NY, USA, 2024. Association for Computing Machinery."},{"key":"e_1_2_1_33_1","first-page":"11","volume-title":"Proceedings of the 2013 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","author":"Homescu Andrei","year":"2013","unstructured":"Andrei Homescu, Steven Neisius, Per Larsen, Stefan Brunthaler, and Michael Franz. Profile-guided automated software diversity. In Proceedings of the 2013 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO), pages 1\u201311, 2013."},{"key":"e_1_2_1_34_1","first-page":"39","volume-title":"Proceedings of the 21st USENIX Conference on Security Symposium, Security\u201912","author":"Kemerlis P.","year":"2012","unstructured":"Vasileios\u00a0P. Kemerlis, Georgios Portokalidis, and Angelos\u00a0D. Keromytis. kguard: lightweight kernel protection against return-to-user attacks. In Proceedings of the 21st USENIX Conference on Security Symposium, Security\u201912, page\u00a039, USA, 2012. USENIX Association."},{"key":"e_1_2_1_35_1","first-page":"21572","volume-title":"A.\u00a0Oh, T.\u00a0Naumann, A.\u00a0Globerson, K.\u00a0Saenko, M.\u00a0Hardt, and S.\u00a0Levine","author":"Liu Jiawei","unstructured":"Jiawei Liu, Chunqiu\u00a0Steven Xia, Yuyao Wang, and LINGMING ZHANG. Is your code generated by chatgpt really correct? rigorous evaluation of large language models for code generation. In A.\u00a0Oh, T.\u00a0Naumann, A.\u00a0Globerson, K.\u00a0Saenko, M.\u00a0Hardt, and S.\u00a0Levine, editors, Advances in Neural Information Processing Systems, volume\u00a036, pages 21558\u201321572. Curran Associates, Inc., 2023."},{"key":"e_1_2_1_36_1","volume-title":"Exploring and evaluating hallucinations in llm-powered code generation. arXiv preprint arXiv:2404.00971","author":"Liu Fang","year":"2024","unstructured":"Fang Liu, Yang Liu, Lin Shi, Houkun Huang, Ruifeng Wang, Zhen Yang, and Li\u00a0Zhang. Exploring and evaluating hallucinations in llm-powered code generation. arXiv preprint arXiv:2404.00971, 2024."},{"key":"e_1_2_1_37_1","first-page":"79","volume-title":"Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation","author":"Lopes P","year":"2021","unstructured":"Nuno\u00a0P Lopes, Juneyoung Lee, Chung-Kil Hur, Zhengyang Liu, and John Regehr. Alive2: bounded translation validation for llvm. In Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, pages 65\u201379, 2021."},{"key":"e_1_2_1_38_1","first-page":"330","volume-title":"Proceedings of the 44th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP \u201922","author":"VanHattum Alexa","year":"2022","unstructured":"Alexa VanHattum, Daniel Schwartz-Narbonne, Nathan Chong, and Adrian Sampson. Verifying dynamic trait objects in rust. In Proceedings of the 44th International Conference on Software Engineering: Software Engineering in Practice, ICSE-SEIP \u201922, page 321\u2013330, New York, NY, USA, 2022. Association for Computing Machinery."},{"key":"e_1_2_1_39_1","first-page":"1352","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Breidenbach Lorenz","year":"2018","unstructured":"Lorenz Breidenbach, Phil Daian, Florian Tram\u00e8r, and Ari Juels. Enter the hydra: Towards principled bug bounties and Exploit-Resistant smart contracts. In 27th USENIX Security Symposium (USENIX Security 18), pages 1335\u20131352, Baltimore, MD, August 2018. USENIX Association."},{"key":"e_1_2_1_40_1","first-page":"896","volume-title":"Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2012, part of SPLASH 2012","author":"Huang Wei","year":"2012","unstructured":"Wei Huang, Ana\u00a0L. Milanova, Werner Dietl, and Michael\u00a0D. Ernst. Reim & reiminfer: checking and inference of reference immutability and method purity. In Gary\u00a0T. Leavens and Matthew\u00a0B. Dwyer, editors, Proceedings of the 27th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2012, part of SPLASH 2012, Tucson, AZ, USA, October 21-25, 2012, pages 879\u2013896. ACM, 2012."},{"key":"e_1_2_1_41_1","first-page":"110","volume-title":"15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015","author":"Nicolay Jens","year":"2015","unstructured":"Jens Nicolay, Carlos Noguera, Coen\u00a0De Roover, and Wolfgang\u00a0De Meuter. Detecting function purity in javascript. In Michael\u00a0W. Godfrey, David Lo, and Foutse Khomh, editors, 15th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2015, Bremen, Germany, September 27-28, 2015, pages 101\u2013110. IEEE Computer Society, 2015."},{"key":"e_1_2_1_42_1","unstructured":"Javier Cabrera\u00a0Arteaga. Software Diversification for WebAssembly. PhD thesis KTH Royal Institute of Technology 2024."},{"key":"e_1_2_1_43_1","first-page":"200","volume-title":"Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI \u201905","author":"Luk Chi-Keung","year":"2005","unstructured":"Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay\u00a0Janapa Reddi, and Kim Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI \u201905, page 190\u2013200, New York, NY, USA, 2005. Association for Computing Machinery."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1038\/234034a0"},{"key":"e_1_2_1_45_1","first-page":"328","volume-title":"Proceedings of the 28th Annual Computer Security Applications Conference","author":"Collberg Christian","year":"2012","unstructured":"Christian Collberg, Sam Martin, Jonathan Myers, and Jasvir Nagra. Distributed application tamper detection via continuous software updates. In Proceedings of the 28th Annual Computer Security Applications Conference, pages 319\u2013328, 2012."},{"key":"e_1_2_1_46_1","volume-title":"Dynamic system diversification for securing cloud-based iot subnetworks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 17(1-2):1\u201323","author":"Almohri Hussain","year":"2022","unstructured":"Hussain Almohri, Layne Watson, David Evans, and Stephen Billups. Dynamic system diversification for securing cloud-based iot subnetworks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 17(1-2):1\u201323, 2022."},{"key":"e_1_2_1_47_1","volume-title":"6th Workshop on Hot Topics in System Dependability","author":"Singh Atul","year":"2010","unstructured":"Atul Singh, Nishant Sinha, and Nitin Agrawal. Avatars for pennies: Cheap n-version programming for replication. In 6th Workshop on Hot Topics in System Dependability, 2010."},{"key":"e_1_2_1_48_1","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, ICSE \u201924","author":"Pan Rangeet","year":"2024","unstructured":"Rangeet Pan, Ali\u00a0Reza Ibrahimzada, Rahul Krishna, Divya Sankar, Lambert\u00a0Pouguem Wassi, Michele Merler, Boris Sobolev, Raju Pavuluri, Saurabh Sinha, and Reyhaneh Jabbarvand. Lost in translation: A study of bugs introduced by large language models while translating code. In Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering, ICSE \u201924, New York, NY, USA, 2024. Association for Computing Machinery."},{"key":"e_1_2_1_49_1","first-page":"8","volume-title":"N-version assessment and enhancement of generative ai","author":"Kessel Marcus","year":"2024","unstructured":"Marcus Kessel and Colin Atkinson. N-version assessment and enhancement of generative ai. IEEE Software, page 1\u20138, 2024."},{"key":"e_1_2_1_50_1","volume-title":"Mercury: A code efficiency benchmark for code large language models","author":"Du Mingzhe","year":"2024","unstructured":"Mingzhe Du, Anh\u00a0Tuan Luu, Bin Ji, Qian Liu, and See-Kiong Ng. Mercury: A code efficiency benchmark for code large language models, 2024."},{"key":"e_1_2_1_51_1","volume-title":"A survey of large language models for code: Evolution, benchmarking, and future trends","author":"Zheng Zibin","year":"2024","unstructured":"Zibin Zheng, Kaiwen Ning, Yanlin Wang, Jingwen Zhang, Dewu Zheng, Mingxi Ye, and Jiachi Chen. A survey of large language models for code: Evolution, benchmarking, and future trends, 2024."},{"key":"e_1_2_1_52_1","volume-title":"A survey on large language models for code generation","author":"Jiang Juyong","year":"2024","unstructured":"Juyong Jiang, Fan Wang, Jiasi Shen, Sungju Kim, and Sunghun Kim. A survey on large language models for code generation, 2024."},{"key":"e_1_2_1_53_1","volume-title":"Verified code transpilation with llms","author":"Bhatia Sahil","year":"2024","unstructured":"Sahil Bhatia, Jie Qiu, Niranjan Hasabnis, Sanjit\u00a0A. Seshia, and Alvin Cheung. Verified code transpilation with llms, 2024."},{"key":"e_1_2_1_54_1","volume-title":"Proc. ACM Softw. Eng., 1(FSE)","author":"Yang Zhen","year":"2024","unstructured":"Zhen Yang, Fang Liu, Zhongxing Yu, Jacky\u00a0Wai Keung, Jia Li, Shuo Liu, Yifan Hong, Xiaoxue Ma, Zhi Jin, and Ge\u00a0Li. Exploring and unleashing the power of large language models in automated code translation. Proc. ACM Softw. Eng., 1(FSE), July 2024."},{"key":"e_1_2_1_55_1","first-page":"139","volume-title":"Proceedings of the 40th International Conference on Software Engineering","author":"Mechtaev Sergey","year":"2018","unstructured":"Sergey Mechtaev, Manh-Dung Nguyen, Yannic Noller, Lars Grunske, and Abhik Roychoudhury. Semantic program repair using a reference implementation. In Proceedings of the 40th International Conference on Software Engineering, pages 129\u2013139, 2018."},{"key":"e_1_2_1_56_1","first-page":"105","volume-title":"Martin Rinard. Codecarboncopy. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering","author":"Sidiroglou-Douskos Stelios","year":"2017","unstructured":"Stelios Sidiroglou-Douskos, Eric Lahtinen, Anthony Eden, Fan Long, and Martin Rinard. Codecarboncopy. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pages 95\u2013105, 2017."},{"key":"e_1_2_1_57_1","first-page":"317","volume-title":"Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014","author":"Barr T.","year":"2014","unstructured":"Earl\u00a0T. Barr, Yuriy Brun, Premkumar Devanbu, Mark Harman, and Federica Sarro. The plastic surgery hypothesis. In Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, FSE 2014, page 306\u2013317, New York, NY, USA, 2014. Association for Computing Machinery."},{"key":"e_1_2_1_58_1","first-page":"252","volume-title":"Search-Based Software Engineering: 6th International Symposium, SSBSE 2014, Fortaleza, Brazil, August 26-29, 2014. Proceedings 6","author":"Harman Mark","unstructured":"Mark Harman, Yue Jia, and William\u00a0B Langdon. Babel pidgin: Sbse can grow and graft entirely new functionality into a real world system. In Search-Based Software Engineering: 6th International Symposium, SSBSE 2014, Fortaleza, Brazil, August 26-29, 2014. Proceedings 6, pages 247\u2013252. Springer, 2014."},{"key":"e_1_2_1_59_1","first-page":"676","volume-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE)","author":"Zhang Tianyi","year":"2017","unstructured":"Tianyi Zhang and Miryung Kim. Automated transplantation and differential testing for clones. In 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pages 665\u2013676, 2017."},{"key":"e_1_2_1_60_1","first-page":"25","volume-title":"Proceedings of the 11th Annual Symposium On Information Assurance. NYS Cyber Security Conference","author":"Persaud Bheesham","year":"2016","unstructured":"Bheesham Persaud, Borke Obada-Obieh, Nilofar Mansourzadeh, Ashley Moni, and Anil Somayaji. Frankenssl: Recombining cryptographic libraries for software diversity. In Proceedings of the 11th Annual Symposium On Information Assurance. NYS Cyber Security Conference, pages 19\u201325, 2016."},{"key":"e_1_2_1_61_1","first-page":"964","volume-title":"Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation, GECCO \u201910","author":"Foster Blair","year":"2010","unstructured":"Blair Foster and Anil Somayaji. Object-level recombination of commodity applications. In Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation, GECCO \u201910, page 957\u2013964, New York, NY, USA, 2010. Association for Computing Machinery."},{"issue":"10","key":"e_1_2_1_62_1","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1145\/2858965.2814319","article-title":"Finding deep compiler bugs via guided stochastic program mutation","volume":"50","author":"Sun Chengnian","year":"2015","unstructured":"Vu\u00a0Le, Chengnian Sun, and Zhendong Su. Finding deep compiler bugs via guided stochastic program mutation. SIGPLAN Not., 50(10):386\u2013399, oct 2015.","journal-title":"SIGPLAN Not."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2024.3397822"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3785363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T15:57:08Z","timestamp":1765987028000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3785363"}},"issued":{"date-parts":[[2025,12,17]]},"references-count":63,"alternative-id":["10.1145\/3785363"],"URL":"https:\/\/doi.org\/10.1145\/3785363","ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"published":{"date-parts":[[2025,12,17]]},"assertion":[{"value":"2025-05-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-12-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3785363"},{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:13Z","timestamp":1772893033340,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Wallenberg Artificial Intelligence, Autonomous Systems and Software Program"},{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Swedish Foundation for Strategic Research"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1109\/tse.2021.3071750","type":"journal-article","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T01:36:32Z","timestamp":1617932192000},"page":"2920-2938","source":"Crossref","is-referenced-by-count":49,"title":["Automated Classification of Overfitting Patches With Statically Extracted Code Features"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4807-2110","authenticated-orcid":false,"given":"He","family":"Ye","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Jian","family":"Gu","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"given":"Matias","family":"Martinez","sequence":"additional","affiliation":[{"name":"Universit&#x00E8; Polytechnique Hauts-de-France, Famars, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1996-6134","authenticated-orcid":false,"given":"Thomas","family":"Durieux","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00063-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2019.2940179"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2881961"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1810.04805"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/KAM.2009.137"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/9781118625590.ch14"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884635"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338911"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896931"},{"key":"ref13","article-title":"ODSs repository that contains the models and the data used in this study","year":"2020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.2307\/2699986"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330558"},{"key":"ref18","article-title":"Validation of automatically generated patches: An appetizer","author":"Ghanbari","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330559"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3318162"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"ref22","first-page":"87","article-title":"Causal testing: Understanding defects\u2019 root causes","volume-title":"Proc. 42nd Int. Conf. Softw. Eng.","author":"Johnson"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref24","volume-title":"Exploratory Data Analysis","author":"Tukey","year":"1977"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3345628"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00064"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106309"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182536"},{"key":"ref29","first-page":"302","article-title":"Robust logitboost and adaptive base class (ABc) logitboost","volume-title":"Proc. 26th Conf. Uncertainty Artif. Intell.","author":"Li"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397369"},{"key":"ref32","article-title":"Towards an automated approach for bug fix pattern detection","volume-title":"Proc. VI Workshop Softw. Visual. Evol. Maintenance","author":"Madeiral"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8667991"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9470-4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99241-9_3"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00043"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180247"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9550-0"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297902"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"ref42","volume-title":"C4.5: Programs For Machine Learning","author":"Quinlan","year":"1993"},{"key":"ref43","first-page":"10","article-title":"Bugs.jar: A large-scale, diverse dataset of real-world java bugs","volume-title":"Proc. IEEE\/ACM 15th Int. Conf. Mining Softw. Repositories","author":"Saha"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386005"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3138818"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.86"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.001"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786825"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330203"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2877612"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.139"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950295"},{"key":"ref54","first-page":"981","article-title":"Evaluating representation learning of code changes for predicting patch correctness in program repair","volume-title":"Proc. 35th ACM\/IEEE Int. Conf. Automated Softw. Eng.","author":"Tian"},{"key":"ref55","first-page":"2579","article-title":"Visualizing data using t-SNE","volume":"9","author":"Hinton","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"ref56","first-page":"968","article-title":"Automated patch correctness assessment: How far are we?","volume-title":"Proc. 35th Int. Conf. Automated Softw. Eng.","author":"Wang"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180233"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115676"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092718"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180182"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"ref63","first-page":"1359","article-title":"CPC: Automatically classifying and propagating natural language comments via program analysis","volume-title":"Proc. IEEE\/ACM 42th Int. Conf. Softw. Eng.","author":"Xu"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/IBF50092.2020.9034821"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106274"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110825"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09920-w"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2023.3275380"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9619-4"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2874648"}],"container-title":["IEEE Transactions on Software Engineering"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9857502\/09399306.pdf?arnumber=9399306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T04:53:49Z","timestamp":1725252829000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9399306\/"}},"issued":{"date-parts":[[2022,8,1]]},"references-count":72,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3071750","ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"published":{"date-parts":[[2022,8,1]]}},{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:02:47Z","timestamp":1769724167535,"version":"3.49.0"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/tse.2022.3143766","type":"journal-article","created":{"date-parts":[[2022,1,18]],"date-time":"2022-01-18T22:13:27Z","timestamp":1642544007000},"page":"64-83","source":"Crossref","is-referenced-by-count":6,"title":["Spork: Structured Merge for Java With Formatting Preservation"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8343-057X","authenticated-orcid":false,"given":"Simon","family":"Larsen","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Bordeaux INP, CNRS, LaBRI, IUF, Universit&#x00E9; de Bordeaux, Bordeaux, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8284-7218","authenticated-orcid":false,"given":"Jean-Remy","family":"Falleri","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Bordeaux INP, CNRS, LaBRI, IUF, Universit&#x00E9; de Bordeaux, Bordeaux, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4015-4640","authenticated-orcid":false,"given":"Benoit","family":"Baudry","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Bordeaux INP, CNRS, LaBRI, IUF, Universit&#x00E9; de Bordeaux, Bordeaux, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Bordeaux INP, CNRS, LaBRI, IUF, Universit&#x00E9; de Bordeaux, Bordeaux, France"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2009.5069475"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393648"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1000449"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0151-5"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9674-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106256"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9586-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.28"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606619"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/111062.111071"},{"key":"ref11","article-title":"Adjustable syntactic merge of Java programs","author":"Le\u00dfenich","year":"2012"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2006.04.010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37487-7_12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390647"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1030397.1030399"},{"key":"ref16","article-title":"Spork: Move-enabled structured merge for Java with GumTree and 3DM","author":"Lars\u00e9n","year":"2020"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568322"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568284"},{"key":"ref19","first-page":"13","article-title":"Semistructured merge in revision control systems","volume-title":"Proc. Int. Workshop Variability Modelling Softw.-Intensive Syst.","author":"Apel"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025141"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2015.7321191"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3133883"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115665"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00117"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3360596"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2346"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351694"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0227-0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00097"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3276536"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54494-5_9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.53"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9512-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2019.8870173"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2871083"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3130098"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2466\/11.it.3.1"},{"issue":"21","key":"ref39","first-page":"19","article-title":"The need to report effect size estimates revisited. An overview of some recommended measures of effect size","volume":"1","author":"Tomczak","year":"2014","journal-title":"Trends Sport Sci."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00098"},{"key":"ref41","article-title":"A template-based approach to automatic program repair of Sonarqube static warnings","author":"Adzemovic","year":"2020"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491415"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00016"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233366"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2004.1342719"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1410140.1410151"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646326"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250435"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950339"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.46"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810339"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.64"},{"key":"ref54","first-page":"576","article-title":"Analyzing conflict predictors in open-source Java projects","volume-title":"Proc. 15th Int. Conf. Mining Softw. Repositories","author":"Accioly"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380344"}],"container-title":["IEEE Transactions on Software Engineering"],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10008953\/09684709.pdf?arnumber=9684709","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T22:09:45Z","timestamp":1705183785000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9684709\/"}},"issued":{"date-parts":[[2023,1,1]]},"references-count":55,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3143766","ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"published":{"date-parts":[[2023,1,1]]}},{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:30:23Z","timestamp":1766068223826,"version":"build-2065373602"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"abstract":"<jats:p>Client diversity is a cornerstone of blockchain resilience, yet most networks suffer from a dangerously skewed distribution of client implementations. This monoculture exposes the network to very risky scenarios, such as massive financial losses in the event of a majority client failure.<\/jats:p>\n                  <jats:p>In this paper, we present a novel framework that combines verifiable execution and economic incentives to provably identify and reward the use of minority clients, thereby promoting a healthier, more robust ecosystem. Our approach leverages state-of-the-art verifiable computation (zkVMs and TEEs) to generate cryptographic proofs of client execution, which are then verified on-chain.<\/jats:p>\n                  <jats:p>We design and implement an end-to-end prototype of verifiable client diversity in the context of Ethereum, by modifying the popular Lighthouse client and by deploying our novel diversity-aware reward protocol. Through comprehensive experiments, we quantify the practicality of our approach, from overheads of proof production and verification to the effectiveness of the incentive mechanism.<\/jats:p>\n                  <jats:p>This work demonstrates, for the first time, a practical and economically viable path to encourage and ensure provable client diversity in blockchain networks. Our findings inform the design of future protocols that seek to maximize the resilience of decentralized systems.<\/jats:p>","DOI":"10.1145\/3773288","type":"journal-article","created":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T14:47:49Z","timestamp":1761576469000},"update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Proving and Rewarding Client Diversity to Strengthen Resilience of Blockchain Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6988-3102","authenticated-orcid":false,"given":"Javier","family":"Ron","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2131-1046","authenticated-orcid":false,"given":"Zheyuan","family":"He","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2025,10,27]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008."},{"key":"e_1_2_1_2_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014):1\u201332","author":"\u00a0al Gavin Wood","year":"2014","unstructured":"Gavin Wood et\u00a0al. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014):1\u201332, 2014."},{"key":"e_1_2_1_3_1","unstructured":"The market capitalization of ethereum. https:\/\/coinmarketcap.com\/currencies\/ethereum\/."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01127-0"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559780"},{"key":"e_1_2_1_6_1","unstructured":"Ethereum client diversity part 3: Consensus-layer diversity. https:\/\/www.kiln.fi\/post\/ethereum-client-diversity-part-3-consensus-layer-diversity."},{"key":"e_1_2_1_7_1","volume-title":"Ethereum docs: Nodes and clients. https:\/\/ethereum.org\/en\/developers\/docs\/nodes-and-clients\/","author":"Community Ethereum","year":"2021","unstructured":"Ethereum Community. Ethereum docs: Nodes and clients. https:\/\/ethereum.org\/en\/developers\/docs\/nodes-and-clients\/, 2021. Accessed: 2021-08-10."},{"key":"e_1_2_1_8_1","unstructured":"How a dormant bug briefly split the ethereum blockchain. https:\/\/decrypt.co\/47891\/how-a-dormant-bug-briefly-split-the-ethereum-blockchain."},{"key":"e_1_2_1_9_1","first-page":"365","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Yang Youngseok","year":"2021","unstructured":"Youngseok Yang, Taesoo Kim, and Byung-Gon Chun. Finding consensus bugs in ethereum via multi-transaction differential fuzzing. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21), pages 349\u2013365, 2021."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/971617.971650"},{"key":"e_1_2_1_11_1","volume-title":"The critical need for client diversity ahead of ethereum\u2019s merge to proof of stake. Post on consensys.net","author":"Watson Clarissa","year":"2022","unstructured":"Clarissa Watson and Matt Nelson. The critical need for client diversity ahead of ethereum\u2019s merge to proof of stake. Post on consensys.net, 2022. Accessed: 2022-02-10."},{"key":"e_1_2_1_12_1","unstructured":"Prysm: An ethereum consensus implementation written in go. https:\/\/github.com\/prysmaticlabs\/prysm."},{"key":"e_1_2_1_13_1","unstructured":"Lighthouse: An ethereum consensus implementation written in rust. https:\/\/github.com\/sigp\/lighthouse."},{"key":"e_1_2_1_14_1","unstructured":"Teku: An ethereum consensus implementation written in java. https:\/\/github.com\/Consensys\/teku."},{"key":"e_1_2_1_15_1","unstructured":"Nimbus: An ethereum consensus implementation written in nim. https:\/\/github.com\/status-im\/nimbus-eth2."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3194871"},{"key":"e_1_2_1_17_1","first-page":"30","article-title":"Verifiable execution of deep neural networks on an untrusted cloud","author":"Ghodsi Zahra","year":"2017","unstructured":"Zahra Ghodsi, Tianyu Gu, and Siddharth Garg. Safetynets: Verifiable execution of deep neural networks on an untrusted cloud. Advances in Neural Information Processing Systems, 30, 2017.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0872-3"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"e_1_2_1_20_1","unstructured":"Intel\u00ae software guard extensions (intel\u00ae sgx). https:\/\/www.intel.com\/content\/www\/us\/en\/products\/docs\/accelerator-engines\/software-guard-extensions.html."},{"key":"e_1_2_1_21_1","unstructured":"Trustzone security. https:\/\/docs.amd.com\/r\/en-US\/am011-versal-acap-trm\/TrustZone-Security?tocId=SLMc_OjWZpn7BOOvGa_nlA."},{"key":"e_1_2_1_22_1","unstructured":"Amd secure encrypted virtualization (sev). https:\/\/www.amd.com\/en\/developer\/sev.html."},{"key":"e_1_2_1_23_1","volume-title":"A survey of noninteractive zero knowledge proof system and its applications. The scientific world journal","author":"Wu Huixin","year":"2014","unstructured":"Huixin Wu and Feng Wang. A survey of noninteractive zero knowledge proof system and its applications. The scientific world journal, 2014(1):560484, 2014."},{"key":"e_1_2_1_24_1","volume-title":"Paper 2023\/1032","author":"Dokchitser Tim","year":"2023","unstructured":"Tim Dokchitser and Alexandr Bulkin. Zero knowledge virtual machine step by step. Cryptology ePrint Archive, Paper 2023\/1032, 2023."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42452-019-0989-z"},{"key":"e_1_2_1_26_1","first-page":"291","volume-title":"2014 IEEE Symposium on Security and Privacy","author":"Larsen Per","unstructured":"Per Larsen, Andrei Homescu, Stefan Brunthaler, and Michael Franz. Sok: Automated software diversity. In 2014 IEEE Symposium on Security and Privacy, pages 276\u2013291. IEEE, 2014."},{"key":"e_1_2_1_27_1","first-page":"72","volume-title":"Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133)","author":"Forrest Stephanie","unstructured":"Stephanie Forrest, Anil Somayaji, and David\u00a0H Ackley. Building diverse computer systems. In Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No. 97TB100133), pages 67\u201372. IEEE, 1997."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3372848"},{"key":"e_1_2_1_29_1","volume-title":"Springer","author":"Lyu R","year":"1992","unstructured":"Michael\u00a0R Lyu and Algirdas Avi\u017eienis. Assuring design diversity in n-version software: a design paradigm for n-version programming. In Dependable Computing for Critical Applications 2, pages 197\u2013218. Springer, 1992."},{"key":"e_1_2_1_30_1","volume-title":"Galapagos: Automated n-version programming with llms. arXiv preprint arXiv:2408.09536","author":"Ron Javier","year":"2024","unstructured":"Javier Ron, Diogo Gaspar, Javier Cabrera-Arteaga, Benoit Baudry, and Martin Monperrus. Galapagos: Automated n-version programming with llms. arXiv preprint arXiv:2408.09536, 2024."},{"key":"e_1_2_1_31_1","volume-title":"6th Workshop on Hot Topics in System Dependability","author":"Singh Atul","year":"2010","unstructured":"Atul Singh, Nishant Sinha, and Nitin Agrawal. Avatars for pennies: Cheap n-version programming for replication. In 6th Workshop on Hot Topics in System Dependability, 2010."},{"key":"e_1_2_1_32_1","first-page":"262","volume-title":"Proceedings of the Twenty-Fourth Annual Hawaii International Conference on System Sciences, volume\u00a02","author":"Gersting L","unstructured":"Judith\u00a0L Gersting, Robert\u00a0L Nist, Dale\u00a0B Roberts, and Randal\u00a0L Van\u00a0Valkenburg. A comparison of voting algorithms for n-version programming. In Proceedings of the Twenty-Fourth Annual Hawaii International Conference on System Sciences, volume\u00a02, pages 253\u2013262. IEEE, 1991."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/102792.102801"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611649"},{"key":"e_1_2_1_35_1","volume-title":"A framework for equitable blockchain governance","author":"Isenkul M\u00a0Erdem","year":"2025","unstructured":"M\u00a0Erdem Isenkul. Proof-of-diversity (pod): A framework for equitable blockchain governance. IEEE Access, 2025."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.189"},{"key":"e_1_2_1_37_1","unstructured":"Ethereum client diversity part 1: Consensus & finalization. https:\/\/www.kiln.fi\/post\/ethereum-client-diversity-part-1-consensus-finalization."},{"key":"e_1_2_1_38_1","unstructured":"Ethereum client diversity part 2: Execution-layer diversity. https:\/\/www.kiln.fi\/post\/ethereum-client-diversity-part-2-execution-layer-diversity."},{"key":"e_1_2_1_39_1","unstructured":"Proof-of-stake rewards and penalties. https:\/\/ethereum.org\/en\/developers\/docs\/consensus-mechanisms\/pos\/rewards-and-penalties\/."},{"key":"e_1_2_1_40_1","volume-title":"A game-theoretic approach to the study of blockchain\u2019s robustness. arXiv preprint arXiv:2411.19175","author":"Pavloff Ulysse","year":"2024","unstructured":"Ulysse Pavloff. A game-theoretic approach to the study of blockchain\u2019s robustness. arXiv preprint arXiv:2411.19175, 2024."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616251"},{"key":"e_1_2_1_43_1","first-page":"1","article-title":"Highly available blockchain nodes with n-version design","author":"Ron Javier","year":"2023","unstructured":"Javier Ron, C\u00e9sar Soto-Valero, Long Zhang, Benoit Baudry, and Martin Monperrus. Highly available blockchain nodes with n-version design. IEEE Transactions on Dependable and Secure Computing, pages 1\u201314, 2023.","journal-title":"IEEE Transactions on Dependable and Secure Computing, pages"},{"key":"e_1_2_1_44_1","unstructured":"Jorge Arce-Garro. Allowing validators to provide client information privately. https:\/\/ethresear.ch\/t\/research-report-allowing-validators-to-share-client-information-privately-a-project-by-nethermind-research\/19506."},{"key":"e_1_2_1_45_1","unstructured":"Blockprint:shaping the future of blockchain transparency. https:\/\/blockprint.sigp.io\/."},{"key":"e_1_2_1_46_1","unstructured":"Estimating validator decentralization using p2p data. https:\/\/ethresear.ch\/t\/estimating-validator-decentralization-using-p2p-data\/19920."},{"key":"e_1_2_1_47_1","first-page":"491","volume-title":"Australasian Database Conference","author":"Ryan Gavin","unstructured":"Gavin Ryan and Jiangshan Yu. Recommendation algorithm to further ethereum client diversity. In Australasian Database Conference, pages 479\u2013491. Springer, 2025."},{"key":"e_1_2_1_48_1","unstructured":"Inside arbitrum nitro. https:\/\/docs.arbitrum.io\/how-arbitrum-works\/inside-arbitrum-nitro."},{"key":"e_1_2_1_49_1","first-page":"3960","volume-title":"2024 IEEE Symposium on Security and Privacy (SP)","author":"Ye Zhe","unstructured":"Zhe Ye, Ujval Misra, Jiajun Cheng, Wenyang Zhou, and Dawn Song. Specular: Towards secure, trust-minimized optimistic blockchain execution. In 2024 IEEE Symposium on Security and Privacy (SP), pages 3943\u20133960. IEEE, 2024."},{"key":"e_1_2_1_50_1","volume-title":"Aspects of Computation and Automata Theory with Applications.","author":"Teutsch Jason","year":"2024","unstructured":"Jason Teutsch and Christian Reitwie\u00dfner. A scalable verification solution for blockchains. In Aspects of Computation and Automata Theory with Applications. 2024."},{"key":"e_1_2_1_51_1","volume-title":"Trusted compute units: A framework for chained verifiable computations","author":"Castillo Fernando","year":"2025","unstructured":"Fernando Castillo, Jonathan Heiss, Sebastian Werner, and Stefan Tai. Trusted compute units: A framework for chained verifiable computations, 2025."}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T14:48:01Z","timestamp":1761576481000},"score":0.0,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773288"}},"issued":{"date-parts":[[2025,10,27]]},"references-count":51,"alternative-id":["10.1145\/3773288"],"URL":"https:\/\/doi.org\/10.1145\/3773288","ISSN":["2769-6480"],"issn-type":[{"type":"electronic","value":"2769-6480"}],"published":{"date-parts":[[2025,10,27]]},"assertion":[{"value":"2025-06-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-20","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"3773288"}],"items-per-page":20,"query":{"start-index":0,"search-terms":null}}}