{"id":"https://openalex.org/W1966634194","doi":"https://doi.org/10.1145/1453101.1453137","title":"Marple","display_name":"Marple","publication_year":2008,"publication_date":"2008-11-09","ids":{"openalex":"https://openalex.org/W1966634194","doi":"https://doi.org/10.1145/1453101.1453137","mag":"1966634194"},"language":"en","primary_location":{"id":"doi:10.1145/1453101.1453137","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1453101.1453137","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074426991","display_name":"Wei Le","orcid":"https://orcid.org/0000-0002-6797-0648"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wei Le","raw_affiliation_strings":["University of Virginia, Charlottesville, VA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047746948","display_name":"Mary Lou Soffa","orcid":"https://orcid.org/0000-0002-3665-7763"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mary Lou Soffa","raw_affiliation_strings":["University of Virginia, Charlottesville, VA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074426991"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":6.2925,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.95968284,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"272","last_page":"282"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4560551345348358}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4560551345348358}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1453101.1453137","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1453101.1453137","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320308943","display_name":"Microsoft Research","ror":"https://ror.org/00d0nc645"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W108689914","https://openalex.org/W1554164734","https://openalex.org/W1579850852","https://openalex.org/W2004378344","https://openalex.org/W2007181618","https://openalex.org/W2017612563","https://openalex.org/W2017842497","https://openalex.org/W2067836954","https://openalex.org/W2074847015","https://openalex.org/W2084974764","https://openalex.org/W2119736157","https://openalex.org/W2122751766","https://openalex.org/W2134287485","https://openalex.org/W2137726309","https://openalex.org/W2138538192","https://openalex.org/W2164638440","https://openalex.org/W4249902158"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2130043461","https://openalex.org/W2530322880"],"abstract_inverted_index":{"Despite":[0],"increasing":[1],"efforts":[2],"in":[3,113],"detecting":[4,69],"and":[5,34,70,97,108,123,133,155,177],"managing":[6],"software":[7,21],"security":[8,13,25],"vulnerabilities,":[9],"the":[10,55,76,111,114,117,204],"number":[11],"of":[12,79,116,126,147,189,202],"attacks":[14],"is":[15,53,167],"still":[16,54],"rising":[17],"every":[18],"year.":[19],"As":[20],"becomes":[22],"more":[23,28,35,48],"complex,":[24],"vulnerabilities":[26],"are":[27],"easily":[29],"introduced":[30],"into":[31],"a":[32,65,92,102],"system":[33],"difficult":[36],"to":[37,86,139,169,199],"eliminate.":[38],"Even":[39],"though":[40],"buffer":[41,73,106,171],"overflow":[42,107],"detection":[43],"has":[44],"been":[45],"studied":[46],"for":[47,68,95,105,144],"than":[49],"20":[50],"years,":[51],"it":[52],"most":[56],"commonly":[57],"exploited":[58],"vulnerability.":[59,87],"In":[60],"this":[61],"paper,":[62],"we":[63,207],"develop":[64,101],"static":[66],"analyzer":[67],"helping":[71],"diagnose":[72],"overflows":[74,172],"with":[75,91,159,180],"key":[77],"idea":[78],"categorizing":[80],"program":[81],"paths":[82,127],"as":[83],"they":[84],"relate":[85],"We":[88,99,121,150,193],"combine":[89],"path-sensitivity":[90],"demand-driven":[93,118],"analysis":[94],"precision":[96],"scalability.":[98],"first":[100],"vulnerability":[103],"model":[104,112],"then":[109],"use":[110],"development":[115],"path-sensitive":[119,179],"analyzer.":[120],"detect":[122,170],"identify":[124],"categories":[125],"including":[128],"infeasible,":[129],"safe,":[130],"vulnerable,":[131],"overflow-input-independent":[132],"don't-know.":[134],"The":[135],"categorization":[136],"enables":[137],"priorities":[138],"be":[140],"set":[141],"when":[142],"searching":[143],"root":[145],"causes":[146],"vulnerable":[148],"paths.":[149],"implemented":[151],"our":[152],"analyzer,":[153],"Marple,":[154],"compared":[156],"its":[157],"performance":[158],"existing":[160],"tools.":[161],"Our":[162],"experiments":[163],"show":[164,195],"that":[165,173,196],"Marple":[166,182,197],"able":[168],"other":[174],"tools":[175],"cannot,":[176],"being":[178],"prioritization,":[181],"produces":[183],"only":[184],"1":[185],"false":[186],"positive":[187],"out":[188],"72":[190],"reported":[191],"overflows.":[192],"also":[194],"scales":[198],"570,000":[200],"lines":[201],"code,":[203],"largest":[205],"benchmark":[206],"had.":[208]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
