{"id":"https://openalex.org/W1965940079","doi":"https://doi.org/10.1007/s00165-011-0214-3","title":"Simple linear string constraints","display_name":"Simple linear string constraints","publication_year":2012,"publication_date":"2012-01-16","ids":{"openalex":"https://openalex.org/W1965940079","doi":"https://doi.org/10.1007/s00165-011-0214-3","mag":"1965940079"},"language":"en","primary_location":{"id":"doi:10.1007/s00165-011-0214-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00165-011-0214-3","pdf_url":null,"source":{"id":"https://openalex.org/S128250343","display_name":"Formal Aspects of Computing","issn_l":"0934-5043","issn":["0934-5043","1433-299X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Formal Aspects of Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100607534","display_name":"Xiang Fu","orcid":"https://orcid.org/0000-0002-6608-1654"},"institutions":[{"id":"https://openalex.org/I139290212","display_name":"Hofstra University","ror":"https://ror.org/03pm18j10","country_code":"US","type":"education","lineage":["https://openalex.org/I139290212"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xiang Fu","raw_affiliation_strings":["Department of Computer Science, Hofstra University, 11549, Hempstead, NY, USA","Department of Computer Science, Hofstra University, Hempstead, USA 11549#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hofstra University, 11549, Hempstead, NY, USA","institution_ids":["https://openalex.org/I139290212"]},{"raw_affiliation_string":"Department of Computer Science, Hofstra University, Hempstead, USA 11549#TAB#","institution_ids":["https://openalex.org/I139290212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049151454","display_name":"Michael C. Powell","orcid":null},"institutions":[{"id":"https://openalex.org/I139290212","display_name":"Hofstra University","ror":"https://ror.org/03pm18j10","country_code":"US","type":"education","lineage":["https://openalex.org/I139290212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael C. Powell","raw_affiliation_strings":["Department of Computer Science, Hofstra University, 11549, Hempstead, NY, USA","Department of Computer Science, Hofstra University, Hempstead, USA 11549#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hofstra University, 11549, Hempstead, NY, USA","institution_ids":["https://openalex.org/I139290212"]},{"raw_affiliation_string":"Department of Computer Science, Hofstra University, Hempstead, USA 11549#TAB#","institution_ids":["https://openalex.org/I139290212"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035792159","display_name":"Michael Bantegui","orcid":null},"institutions":[{"id":"https://openalex.org/I139290212","display_name":"Hofstra University","ror":"https://ror.org/03pm18j10","country_code":"US","type":"education","lineage":["https://openalex.org/I139290212"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael Bantegui","raw_affiliation_strings":["Department of Computer Science, Hofstra University, 11549, Hempstead, NY, USA","Department of Computer Science, Hofstra University, Hempstead, USA 11549#TAB#"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Hofstra University, 11549, Hempstead, NY, USA","institution_ids":["https://openalex.org/I139290212"]},{"raw_affiliation_string":"Department of Computer Science, Hofstra University, Hempstead, USA 11549#TAB#","institution_ids":["https://openalex.org/I139290212"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060890881","display_name":"Chung-Chih Li","orcid":null},"institutions":[{"id":"https://openalex.org/I47301684","display_name":"Illinois State University","ror":"https://ror.org/050kcr883","country_code":"US","type":"education","lineage":["https://openalex.org/I47301684"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chung-Chih Li","raw_affiliation_strings":["School of Information and Technology, Illinois State University, 61790, Normal, IL, USA","School of Information and Technology, Illinois State University, Normal, USA 61790#TAB#"],"affiliations":[{"raw_affiliation_string":"School of Information and Technology, Illinois State University, 61790, Normal, IL, USA","institution_ids":["https://openalex.org/I47301684"]},{"raw_affiliation_string":"School of Information and Technology, Illinois State University, Normal, USA 61790#TAB#","institution_ids":["https://openalex.org/I47301684"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100607534"],"corresponding_institution_ids":["https://openalex.org/I139290212"],"apc_list":null,"apc_paid":null,"fwci":5.6844,"has_fulltext":false,"cited_by_count":20,"citation_normalized_percentile":{"value":0.95549597,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"25","issue":"6","first_page":"847","last_page":"891"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9904999732971191,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7898637652397156},{"id":"https://openalex.org/keywords/string","display_name":"String (physics)","score":0.5732685327529907},{"id":"https://openalex.org/keywords/solver","display_name":"Solver","score":0.5653734803199768},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.520551323890686},{"id":"https://openalex.org/keywords/constraint-programming","display_name":"Constraint programming","score":0.4971669018268585},{"id":"https://openalex.org/keywords/nondeterministic-algorithm","display_name":"Nondeterministic algorithm","score":0.4906817674636841},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.45683568716049194},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4432424306869507},{"id":"https://openalex.org/keywords/decidability","display_name":"Decidability","score":0.4298687279224396},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.35155951976776123},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.1796380579471588},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1452898383140564},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.13277217745780945}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7898637652397156},{"id":"https://openalex.org/C157486923","wikidata":"https://www.wikidata.org/wiki/Q1376436","display_name":"String (physics)","level":2,"score":0.5732685327529907},{"id":"https://openalex.org/C2778770139","wikidata":"https://www.wikidata.org/wiki/Q1966904","display_name":"Solver","level":2,"score":0.5653734803199768},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.520551323890686},{"id":"https://openalex.org/C173404611","wikidata":"https://www.wikidata.org/wiki/Q528588","display_name":"Constraint programming","level":3,"score":0.4971669018268585},{"id":"https://openalex.org/C176181172","wikidata":"https://www.wikidata.org/wiki/Q3490301","display_name":"Nondeterministic algorithm","level":2,"score":0.4906817674636841},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.45683568716049194},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4432424306869507},{"id":"https://openalex.org/C153269930","wikidata":"https://www.wikidata.org/wiki/Q430001","display_name":"Decidability","level":2,"score":0.4298687279224396},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.35155951976776123},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.1796380579471588},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1452898383140564},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.13277217745780945},{"id":"https://openalex.org/C137631369","wikidata":"https://www.wikidata.org/wiki/Q7617831","display_name":"Stochastic programming","level":2,"score":0.0},{"id":"https://openalex.org/C37914503","wikidata":"https://www.wikidata.org/wiki/Q156495","display_name":"Mathematical physics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00165-011-0214-3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00165-011-0214-3","pdf_url":null,"source":{"id":"https://openalex.org/S128250343","display_name":"Formal Aspects of Computing","issn_l":"0934-5043","issn":["0934-5043","1433-299X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Formal Aspects of Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":59,"referenced_works":["https://openalex.org/W87331621","https://openalex.org/W130708379","https://openalex.org/W182831726","https://openalex.org/W658337295","https://openalex.org/W1503669439","https://openalex.org/W1511560695","https://openalex.org/W1513168562","https://openalex.org/W1530609294","https://openalex.org/W1561331110","https://openalex.org/W1563770249","https://openalex.org/W1565656617","https://openalex.org/W1584587517","https://openalex.org/W1586417893","https://openalex.org/W1602355087","https://openalex.org/W1648477960","https://openalex.org/W1694069253","https://openalex.org/W1777881387","https://openalex.org/W1809751277","https://openalex.org/W1845288303","https://openalex.org/W1917555234","https://openalex.org/W1952344271","https://openalex.org/W1993370765","https://openalex.org/W1993550470","https://openalex.org/W2001693166","https://openalex.org/W2002089154","https://openalex.org/W2003115932","https://openalex.org/W2030888081","https://openalex.org/W2032823354","https://openalex.org/W2035096212","https://openalex.org/W2039468209","https://openalex.org/W2057330156","https://openalex.org/W2086171783","https://openalex.org/W2094568767","https://openalex.org/W2098697136","https://openalex.org/W2101512909","https://openalex.org/W2103660000","https://openalex.org/W2107604680","https://openalex.org/W2108455276","https://openalex.org/W2110318050","https://openalex.org/W2117030266","https://openalex.org/W2117402063","https://openalex.org/W2125529971","https://openalex.org/W2128325590","https://openalex.org/W2132897303","https://openalex.org/W2140506847","https://openalex.org/W2156744022","https://openalex.org/W2166381878","https://openalex.org/W2166461033","https://openalex.org/W2169867894","https://openalex.org/W2181775248","https://openalex.org/W2492526546","https://openalex.org/W2999237515","https://openalex.org/W3046457375","https://openalex.org/W3188158268","https://openalex.org/W4232808412","https://openalex.org/W4242751444","https://openalex.org/W4245888925","https://openalex.org/W4247666604","https://openalex.org/W4255265285"],"related_works":["https://openalex.org/W93433526","https://openalex.org/W2980966835","https://openalex.org/W1572317885","https://openalex.org/W2952847374","https://openalex.org/W2535930729","https://openalex.org/W2171153670","https://openalex.org/W2888015909","https://openalex.org/W4292559440","https://openalex.org/W2402760466","https://openalex.org/W152167007"],"abstract_inverted_index":{"Abstract":[0],"Modern":[1],"web":[2,38,84,94],"applications":[3,95],"often":[4],"suffer":[5],"from":[6,196],"command":[7],"injection":[8],"attacks.":[9],"Even":[10],"when":[11],"equipped":[12],"with":[13,245],"sanitization":[14],"code,":[15],"many":[16],"systems":[17],"can":[18,72,169,193],"be":[19,43,73,170,194],"penetrated":[20],"due":[21],"to":[22,28,80,172,218],"software":[23],"bugs.":[24],"It":[25],"is":[26,77,211,228],"desirable":[27],"automatically":[29],"discover":[30],"such":[31,152],"vulnerabilities,":[32],"given":[33],"the":[34,46,69,78,91,113,128,174,179,215,239],"bytecode":[35],"of":[36,90,112,122,160,182,207,243],"a":[37,109,120,161,166,189,197,204,220,231,247],"application.":[39],"One":[40],"approach":[41],"would":[42],"symbolically":[44],"executing":[45],"target":[47],"system":[48],"and":[49,56,132,241],"constructing":[50],"constraints":[51,61,87],"for":[52,148],"matching":[53],"path":[54],"conditions":[55],"attack":[57,64,70],"patterns.":[58],"Solving":[59],"these":[60],"yields":[62],"an":[63],"signature,":[65],"based":[66],"on":[67],"which,":[68],"process":[71],"replayed.":[74],"Constraint":[75],"solving":[76],"key":[79],"symbolic":[81,205],"execution.":[82],"For":[83],"applications,":[85],"string":[86,105,115,249],"receive":[88],"most":[89],"attention":[92],"because":[93],"are":[96,136,146],"essentially":[97],"text":[98,140],"processing":[99,141],"programs.":[100,142],"We":[101,237],"present":[102],"simple":[103],"linear":[104],"equation":[106],"(SISE)":[107],",":[108],"decidable":[110],"fragment":[111],"general":[114],"constraint":[116,216,233],"system.":[117],"SISE":[118],"models":[119],"collection":[121],"regular":[123],"replacement":[124],"operations":[125],"(such":[126],"as":[127,153],"greedy,":[129],"reluctant,":[130],"declarative,":[131],"finite":[133,208],"replacement),":[134],"which":[135,177],"frequently":[137],"used":[138,171],"by":[139],"Various":[143],"automata":[144],"techniques":[145],"proposed":[147],"simulating":[149],"procedural":[150],"semantics":[151],"left-most":[154],"matching.":[155],"By":[156],"composing":[157],"atomic":[158],"transducers":[159],"SISE,":[162],"we":[163],"show":[164],"that":[165],"recursive":[167],"algorithm":[168,227],"compute":[173],"solution":[175,192,198],"pool,":[176],"contains":[178],"value":[180],"range":[181],"each":[183],"variable":[184,191],"in":[185,224,230],"concrete":[186,190],"solutions.":[187],"Then":[188],"synthesized":[195],"pool.":[199],"To":[200],"accelerate":[201],"solver":[202,217,234],"performance,":[203],"representation":[206],"state":[209],"transducer":[210],"developed.":[212],"This":[213],"allows":[214],"support":[219],"16-bit":[221],"Unicode":[222],"alphabet":[223],"practice.":[225],"The":[226],"implemented":[229],"Java":[232],"called":[235],"SUSHI.":[236],"compare":[238],"applicability":[240],"performance":[242],"SUSHI":[244],"Kaluza,":[246],"bounded":[248],"solver.":[250]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":5},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
