{"id":"https://openalex.org/W2009696102","doi":"https://doi.org/10.1145/2001420.2001459","title":"Generating analyses for detecting faults in path segments","display_name":"Generating analyses for detecting faults in path segments","publication_year":2011,"publication_date":"2011-07-17","ids":{"openalex":"https://openalex.org/W2009696102","doi":"https://doi.org/10.1145/2001420.2001459","mag":"2009696102"},"language":"en","primary_location":{"id":"doi:10.1145/2001420.2001459","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2001420.2001459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074426991","display_name":"Wei Le","orcid":"https://orcid.org/0000-0002-6797-0648"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Wei Le","raw_affiliation_strings":["University of Virginia, Charlottesville, VA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047746948","display_name":"Mary Lou Soffa","orcid":"https://orcid.org/0000-0002-3665-7763"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mary Lou Soffa","raw_affiliation_strings":["University of Virginia, Charlottesville, VA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, VA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5074426991"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":3.2619,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.91625322,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7885611057281494},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6202512383460999},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.583794355392456},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5782146453857422},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4867124855518341},{"id":"https://openalex.org/keywords/fault-detection-and-isolation","display_name":"Fault detection and isolation","score":0.47688940167427063},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.45170581340789795},{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.44426432251930237},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.39425063133239746},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.37549781799316406},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3261083960533142},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.18902510404586792},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16568142175674438},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11046993732452393}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7885611057281494},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6202512383460999},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.583794355392456},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5782146453857422},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4867124855518341},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.47688940167427063},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.45170581340789795},{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.44426432251930237},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.39425063133239746},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.37549781799316406},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3261083960533142},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.18902510404586792},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16568142175674438},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11046993732452393},{"id":"https://openalex.org/C172707124","wikidata":"https://www.wikidata.org/wiki/Q423488","display_name":"Actuator","level":2,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2001420.2001459","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2001420.2001459","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6200000047683716}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W108689914","https://openalex.org/W145782308","https://openalex.org/W1536898727","https://openalex.org/W1554164734","https://openalex.org/W1966634194","https://openalex.org/W1991546210","https://openalex.org/W2007181618","https://openalex.org/W2017842497","https://openalex.org/W2062444590","https://openalex.org/W2074847015","https://openalex.org/W2084974764","https://openalex.org/W2103714221","https://openalex.org/W2106972913","https://openalex.org/W2119736157","https://openalex.org/W2122751766","https://openalex.org/W2124377830","https://openalex.org/W2134401695","https://openalex.org/W2137726309","https://openalex.org/W2138538192","https://openalex.org/W2140611647","https://openalex.org/W2158767818","https://openalex.org/W2158798798","https://openalex.org/W2164638440","https://openalex.org/W2171480813","https://openalex.org/W2913256667","https://openalex.org/W4234020632","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2360139790","https://openalex.org/W2901649410","https://openalex.org/W1843794072","https://openalex.org/W2019168903","https://openalex.org/W4240545424","https://openalex.org/W2563096791","https://openalex.org/W2998602372","https://openalex.org/W2964781046","https://openalex.org/W2735834919","https://openalex.org/W2942625968"],"abstract_inverted_index":{"Although":[0],"static":[1,18,50],"bug":[2,34],"detectors":[3,35,143],"are":[4,121,211],"extensively":[5],"applied,":[6],"there":[7],"is":[8,16,56,128,171,207],"a":[9,22,49,61,79,91,96,119,177,187],"cost":[10],"in":[11,40,218],"using":[12],"them.":[13],"One":[14],"challenge":[15],"that":[17,64,82,98,158,175],"analysis":[19,103],"often":[20],"reports":[21],"large":[23,164],"number":[24],"of":[25,45,78,118,125,180,189,192,199,205],"false":[26],"positives":[27],"but":[28,109],"little":[29],"diagnostic":[30],"information.":[31],"Also,":[32],"individual":[33],"need":[36],"to":[37,42,71,163,173,213],"be":[38],"built":[39],"response":[41],"new":[43],"types":[44],"faults,":[46],"and":[47,54,85,95,133,140,152,167],"tuning":[48],"tool":[51],"for":[52,88,130,144,202],"precision":[53],"scalability":[55],"time-consuming.":[57],"This":[58],"paper":[59],"presents":[60],"novel":[62],"frame-work":[63],"automatically":[65],"generates":[66],"scalable,":[67,92],"interprocedural,":[68],"path-sensitive":[69,93],"analyses":[70,161],"detect":[72,214],"user-specified":[73],"faults.":[74,135],"The":[75,102,123],"framework":[76,127,139],"consists":[77],"specification":[80],"technique":[81],"expresses":[83],"faults":[84,108,191,206,215],"information":[86],"needed":[87],"their":[89],"detection,":[90],"algorithm,":[94],"generator":[97],"unifies":[99],"the":[100,111,115,126,159,193,197,203,219],"two.":[101],"produced":[104],"identifies":[105],"not":[106],"only":[107],"also":[110],"path":[112,200],"segments":[113,201],"where":[114],"root":[116],"causes":[117],"fault":[120,142],"located.":[122],"generality":[124],"accomplished":[129],"both":[131],"data-":[132],"control-centric":[134],"We":[136,155],"implemented":[137],"our":[138,183],"generated":[141,160],"identifying":[145],"buffer":[146],"overflows,":[147],"integer":[148],"violations,":[149],"null-pointer":[150],"dereferences":[151],"memory":[153],"leaks.":[154],"experimentally":[156],"demonstrate":[157],"scales":[162],"deployed":[165],"software,":[166],"its":[168],"detection":[169],"capability":[170],"comparable":[172],"tools":[174],"target":[176],"specific":[178],"type":[179],"fault.":[181],"In":[182],"experiments,":[184],"we":[185,210],"identify":[186],"total":[188],"146":[190],"four":[194],"types.":[195],"While":[196],"length":[198],"majority":[204],"1--4":[208],"procedures,":[209],"able":[212],"deeply":[216],"embedded":[217],"code":[220],"across":[221],"35":[222],"procedures.":[223]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
