{"id":"https://openalex.org/W1967836144","doi":"https://doi.org/10.1145/2527269.2527277","title":"SAW","display_name":"SAW","publication_year":2013,"publication_date":"2013-11-10","ids":{"openalex":"https://openalex.org/W1967836144","doi":"https://doi.org/10.1145/2527269.2527277","mag":"1967836144"},"language":"en","primary_location":{"id":"doi:10.1145/2527269.2527277","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2527269.2527277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM SIGAda annual conference on High integrity language technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5036774374","display_name":"Kyle Carter","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kyle Carter","raw_affiliation_strings":["Galois, Inc, Portland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Galois, Inc, Portland, OR, USA","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022822253","display_name":"Adam Foltzer","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Adam Foltzer","raw_affiliation_strings":["Galois, Inc, Portland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Galois, Inc, Portland, OR, USA","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006448583","display_name":"Joe Hendrix","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Joe Hendrix","raw_affiliation_strings":["Galois, Inc, Portland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Galois, Inc, Portland, OR, USA","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013696585","display_name":"Brian Huffman","orcid":"https://orcid.org/0000-0001-7847-962X"},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brian Huffman","raw_affiliation_strings":["Galois, Inc, Portland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Galois, Inc, Portland, OR, USA","institution_ids":["https://openalex.org/I4210140281"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043389542","display_name":"Aaron Tomb","orcid":null},"institutions":[{"id":"https://openalex.org/I4210140281","display_name":"Galois (United States)","ror":"https://ror.org/03g8y8161","country_code":"US","type":"company","lineage":["https://openalex.org/I4210140281"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aaron Tomb","raw_affiliation_strings":["Galois, Inc, Portland, OR, USA"],"affiliations":[{"raw_affiliation_string":"Galois, Inc, Portland, OR, USA","institution_ids":["https://openalex.org/I4210140281"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5036774374"],"corresponding_institution_ids":["https://openalex.org/I4210140281"],"apc_list":null,"apc_paid":null,"fwci":0.9576,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.73017453,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"15","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9064931869506836},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.7197660207748413},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7175875902175903},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6209399700164795},{"id":"https://openalex.org/keywords/workbench","display_name":"Workbench","score":0.5508102774620056},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.496025413274765},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.4266546964645386},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.42335838079452515},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.41165611147880554},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41010966897010803},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.40888747572898865},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.38322126865386963},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.380096971988678},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3595762848854065},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.15192407369613647},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1338956654071808},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.07310956716537476}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9064931869506836},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.7197660207748413},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7175875902175903},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6209399700164795},{"id":"https://openalex.org/C2779145975","wikidata":"https://www.wikidata.org/wiki/Q347690","display_name":"Workbench","level":3,"score":0.5508102774620056},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.496025413274765},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.4266546964645386},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.42335838079452515},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.41165611147880554},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41010966897010803},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40888747572898865},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.38322126865386963},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.380096971988678},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3595762848854065},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.15192407369613647},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1338956654071808},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.07310956716537476},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2527269.2527277","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2527269.2527277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2013 ACM SIGAda annual conference on High integrity language technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W1528837436","https://openalex.org/W2105506683"],"related_works":["https://openalex.org/W2388509490","https://openalex.org/W2109648960","https://openalex.org/W2050384624","https://openalex.org/W2166015079","https://openalex.org/W2776888796","https://openalex.org/W1977417404","https://openalex.org/W1965722552","https://openalex.org/W2136262554","https://openalex.org/W4237112499","https://openalex.org/W2090144004"],"abstract_inverted_index":{"Galois":[0,72],"has":[1],"developed":[2,70],"a":[3,68],"suite":[4],"of":[5,40,56],"symbolic":[6],"simulation":[7],"and":[8,23,34,37,59],"formal":[9,30],"analysis":[10],"tools,":[11],"collectively":[12],"called":[13],"the":[14,26,54],"Software":[15],"Analysis":[16],"Workbench":[17],"(SAW).":[18],"SAW":[19,48],"provides":[20],"security":[21],"analysts":[22],"engineers":[24],"with":[25],"ability":[27],"to":[28,52,62],"generate":[29],"models":[31],"from":[32],"C":[33],"Java":[35],"programs":[36,42],"prove":[38],"properties":[39],"those":[41],"using":[43],"several":[44],"automated":[45],"verification":[46],"tools.":[47],"is":[49,60],"primarily":[50],"used":[51],"verify":[53],"correctness":[55],"cryptographic":[57,75],"implementations,":[58],"able":[61],"import":[63],"specifications":[64],"written":[65],"in":[66],"Cryptol,":[67],"language":[69],"by":[71],"for":[73],"specifying":[74],"primitives.":[76]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
