{"id":"https://openalex.org/W2140881643","doi":"https://doi.org/10.1109/icpc.2009.5090027","title":"Practical static analysis for inference of security-related program properties","display_name":"Practical static analysis for inference of security-related program properties","publication_year":2009,"publication_date":"2009-05-01","ids":{"openalex":"https://openalex.org/W2140881643","doi":"https://doi.org/10.1109/icpc.2009.5090027","mag":"2140881643"},"language":"en","primary_location":{"id":"doi:10.1109/icpc.2009.5090027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpc.2009.5090027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE 17th International Conference on Program Comprehension","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100619243","display_name":"Yin Liu","orcid":"https://orcid.org/0000-0003-0087-7032"},"institutions":[{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yin Liu","raw_affiliation_strings":["Department of Computer Science, Rensselaer Polytechnic Institute, USA","Department of Computer Science Rensselaer Polytechnic Institute USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Rensselaer Polytechnic Institute, USA","institution_ids":["https://openalex.org/I165799507"]},{"raw_affiliation_string":"Department of Computer Science Rensselaer Polytechnic Institute USA","institution_ids":["https://openalex.org/I165799507"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083326011","display_name":"Ana Milanova","orcid":"https://orcid.org/0009-0005-9667-5276"},"institutions":[{"id":"https://openalex.org/I165799507","display_name":"Rensselaer Polytechnic Institute","ror":"https://ror.org/01rtyzb94","country_code":"US","type":"education","lineage":["https://openalex.org/I165799507"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ana Milanova","raw_affiliation_strings":["Department of Computer Science, Rensselaer Polytechnic Institute, USA","Department of Computer Science Rensselaer Polytechnic Institute USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Rensselaer Polytechnic Institute, USA","institution_ids":["https://openalex.org/I165799507"]},{"raw_affiliation_string":"Department of Computer Science Rensselaer Polytechnic Institute USA","institution_ids":["https://openalex.org/I165799507"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100619243"],"corresponding_institution_ids":["https://openalex.org/I165799507"],"apc_list":null,"apc_paid":null,"fwci":0.901,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.81749761,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"23","issue":null,"first_page":"50","last_page":"59"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8354762196540833},{"id":"https://openalex.org/keywords/immutability","display_name":"Immutability","score":0.7346103191375732},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6520376205444336},{"id":"https://openalex.org/keywords/program-comprehension","display_name":"Program comprehension","score":0.6102685928344727},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.6054926514625549},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.559920608997345},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5584887862205505},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5349693894386292},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4920486807823181},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.45941242575645447},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.4137308895587921},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3970901370048523},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3386676609516144},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32447242736816406},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3223711848258972},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.30282336473464966},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.29626619815826416},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17800045013427734},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11796388030052185}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8354762196540833},{"id":"https://openalex.org/C2776126399","wikidata":"https://www.wikidata.org/wiki/Q3942906","display_name":"Immutability","level":3,"score":0.7346103191375732},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6520376205444336},{"id":"https://openalex.org/C2777561058","wikidata":"https://www.wikidata.org/wiki/Q2652119","display_name":"Program comprehension","level":4,"score":0.6102685928344727},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.6054926514625549},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.559920608997345},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5584887862205505},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5349693894386292},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4920486807823181},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.45941242575645447},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.4137308895587921},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3970901370048523},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3386676609516144},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32447242736816406},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3223711848258972},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.30282336473464966},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.29626619815826416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17800045013427734},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11796388030052185},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icpc.2009.5090027","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icpc.2009.5090027","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE 17th International Conference on Program Comprehension","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.151.884","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.rpi.edu/~milanova/docs/icpc09.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.421.907","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.421.907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.rpi.edu/~milanova/docs/ICPC2009_full-17_Liu_Yin.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W1505465226","https://openalex.org/W1516285664","https://openalex.org/W1536098516","https://openalex.org/W1536265389","https://openalex.org/W1548432452","https://openalex.org/W1972427803","https://openalex.org/W2012755172","https://openalex.org/W2052087935","https://openalex.org/W2073407646","https://openalex.org/W2079752311","https://openalex.org/W2080573945","https://openalex.org/W2106020683","https://openalex.org/W2113238444","https://openalex.org/W2117103037","https://openalex.org/W2119228825","https://openalex.org/W2120485257","https://openalex.org/W2122049982","https://openalex.org/W2129278597","https://openalex.org/W2136839747","https://openalex.org/W2139672538","https://openalex.org/W2144765051","https://openalex.org/W2145708265","https://openalex.org/W2146934772","https://openalex.org/W2161901678","https://openalex.org/W2162544703","https://openalex.org/W2165295615","https://openalex.org/W6630065895","https://openalex.org/W6630879875","https://openalex.org/W6632018036","https://openalex.org/W6632958005","https://openalex.org/W6680266916"],"related_works":["https://openalex.org/W1517747134","https://openalex.org/W2349172861","https://openalex.org/W101576598","https://openalex.org/W2504378244","https://openalex.org/W4388212678","https://openalex.org/W1981466760","https://openalex.org/W1486481742","https://openalex.org/W2348335144","https://openalex.org/W2106371080","https://openalex.org/W2350876175"],"abstract_inverted_index":{"We":[0,28],"present":[1],"a":[2,33,40],"static":[3],"analysis":[4],"framework":[5,14],"for":[6,26],"inference":[7,24],"of":[8,35,42],"security-related":[9],"program":[10,62],"properties.":[11],"Within":[12],"this":[13],"we":[15],"design":[16],"and":[17,21,38,54,56,71],"implement":[18],"ownership,":[19],"immutability":[20],"information":[22],"flow":[23],"analyses":[25,51],"Java.":[27],"perform":[29],"empirical":[30],"investigation":[31],"on":[32,39],"set":[34,41],"Java":[36],"components,":[37],"established":[43],"security":[44,70],"benchmarks.":[45],"The":[46],"results":[47],"indicate":[48],"that":[49,65],"the":[50],"are":[52],"practical":[53],"precise,":[55],"therefore":[57],"can":[58],"be":[59],"integrated":[60],"in":[61],"comprehension":[63],"tools":[64],"support":[66],"reasoning":[67],"about":[68],"software":[69,72],"quality.":[73]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
