{"id":"https://openalex.org/W2982292911","doi":"https://doi.org/10.1109/msec.2019.2933682","title":"The Rode0day to Less-Buggy Programs","display_name":"The Rode0day to Less-Buggy Programs","publication_year":2019,"publication_date":"2019-10-29","ids":{"openalex":"https://openalex.org/W2982292911","doi":"https://doi.org/10.1109/msec.2019.2933682","mag":"2982292911"},"language":"en","primary_location":{"id":"doi:10.1109/msec.2019.2933682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2019.2933682","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024009471","display_name":"Andrew Fasano","orcid":"https://orcid.org/0000-0003-3149-9425"},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Andrew Fasano","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, Massachusetts United States"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, Massachusetts United States","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109834810","display_name":"Tim Leek","orcid":null},"institutions":[{"id":"https://openalex.org/I4210122954","display_name":"MIT Lincoln Laboratory","ror":"https://ror.org/022z6jk58","country_code":"US","type":"facility","lineage":["https://openalex.org/I4210122954","https://openalex.org/I63966007"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tim Leek","raw_affiliation_strings":["MIT Lincoln Laboratory, Lexington, Massachusetts United States"],"affiliations":[{"raw_affiliation_string":"MIT Lincoln Laboratory, Lexington, Massachusetts United States","institution_ids":["https://openalex.org/I4210122954"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060815601","display_name":"Brendan Dolan-Gavitt","orcid":"https://orcid.org/0000-0002-8867-4282"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brendan Dolan-Gavitt","raw_affiliation_strings":["New York University, United States","New York University, New York, NY, USA"],"affiliations":[{"raw_affiliation_string":"New York University, United States","institution_ids":["https://openalex.org/I57206974"]},{"raw_affiliation_string":"New York University, New York, NY, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025249640","display_name":"Joshua Bundt","orcid":"https://orcid.org/0000-0003-4378-0185"},"institutions":[{"id":"https://openalex.org/I12912129","display_name":"Northeastern University","ror":"https://ror.org/04t5xt781","country_code":"US","type":"education","lineage":["https://openalex.org/I12912129"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Josh Bundt","raw_affiliation_strings":["Northeastern University, Boston, Massachusetts United States"],"affiliations":[{"raw_affiliation_string":"Northeastern University, Boston, Massachusetts United States","institution_ids":["https://openalex.org/I12912129"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5024009471"],"corresponding_institution_ids":["https://openalex.org/I4210122954"],"apc_list":null,"apc_paid":null,"fwci":1.5991,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.84686266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"17","issue":"6","first_page":"84","last_page":"88"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.9186127185821533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8367030620574951},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5838432312011719},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5625351071357727},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4693003296852112},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43056491017341614},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.4069015681743622},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.0538998544216156}],"concepts":[{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.9186127185821533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8367030620574951},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5838432312011719},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5625351071357727},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4693003296852112},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43056491017341614},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4069015681743622},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0538998544216156}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/msec.2019.2933682","is_oa":false,"landing_page_url":"https://doi.org/10.1109/msec.2019.2933682","pdf_url":null,"source":{"id":"https://openalex.org/S61906035","display_name":"IEEE Security & Privacy","issn_l":"1540-7993","issn":["1540-7993","1558-4046"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Security &amp; Privacy","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4158783420","display_name":null,"funder_award_id":"FA8702-15-D-0001","funder_id":"https://openalex.org/F4320306078","funder_display_name":"U.S. Department of Defense"}],"funders":[{"id":"https://openalex.org/F4320306078","display_name":"U.S. Department of Defense","ror":"https://ror.org/0447fe631"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2515236103","https://openalex.org/W2898930465","https://openalex.org/W2964097210"],"related_works":["https://openalex.org/W2379153735","https://openalex.org/W2046172023","https://openalex.org/W2972896947","https://openalex.org/W2083974823","https://openalex.org/W2355105570","https://openalex.org/W2170146914","https://openalex.org/W2072751097","https://openalex.org/W622882839","https://openalex.org/W2185017216","https://openalex.org/W2016345697"],"abstract_inverted_index":{"Despite":[0],"their":[1,39],"best":[2],"efforts,":[3],"computer":[4,59],"programmers":[5],"consistently":[6],"fail":[7],"to":[8,64],"build":[9,20],"the":[10,62],"safe":[11],"and":[12,55],"reliable":[13],"programs":[14],"they":[15,18],"imagine;":[16],"rather,":[17],"typically":[19],"systems":[21,34],"that":[22,50],"work":[23],"well":[24],"until":[25],"something":[26],"unexpected":[27,32],"happens.":[28],"When":[29],"presented":[30],"with":[31],"inputs,":[33],"may":[35],"reveal":[36],"bugs":[37,51],"in":[38,58],"code,":[40],"which":[41],"cause":[42],"incorrect":[43],"behavior":[44],"or":[45],"crashes.":[46],"Every":[47],"programmer":[48],"knows":[49],"are":[52],"a":[53],"persistent":[54],"costly":[56],"issue":[57],"programs,":[60],"but":[61],"path":[63],"getting":[65],"rid":[66],"of":[67],"them":[68],"is":[69],"less":[70],"clear.":[71]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
