{"id":"https://openalex.org/W2760166036","doi":"https://doi.org/10.1145/3127041.3127063","title":"Property templates for checking source code security","display_name":"Property templates for checking source code security","publication_year":2017,"publication_date":"2017-09-27","ids":{"openalex":"https://openalex.org/W2760166036","doi":"https://doi.org/10.1145/3127041.3127063","mag":"2760166036"},"language":"en","primary_location":{"id":"doi:10.1145/3127041.3127063","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3127041.3127063","pdf_url":null,"source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018698752","display_name":"Elizabeth I. Leonard","orcid":null},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elizabeth I. Leonard","raw_affiliation_strings":["Naval Research Laboratory"],"affiliations":[{"raw_affiliation_string":"Naval Research Laboratory","institution_ids":["https://openalex.org/I1288214837"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111860869","display_name":"Myla Archer","orcid":null},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Myla M. Archer","raw_affiliation_strings":["Naval Research Laboratory"],"affiliations":[{"raw_affiliation_string":"Naval Research Laboratory","institution_ids":["https://openalex.org/I1288214837"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004724179","display_name":"Constance Heitmeyer","orcid":"https://orcid.org/0000-0001-7942-9309"},"institutions":[{"id":"https://openalex.org/I1288214837","display_name":"United States Naval Research Laboratory","ror":"https://ror.org/04d23a975","country_code":"US","type":"facility","lineage":["https://openalex.org/I1288214837","https://openalex.org/I1330347796","https://openalex.org/I175003984","https://openalex.org/I3130687028"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Constance L. Heitmeyer","raw_affiliation_strings":["Naval Research Laboratory"],"affiliations":[{"raw_affiliation_string":"Naval Research Laboratory","institution_ids":["https://openalex.org/I1288214837"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5018698752"],"corresponding_institution_ids":["https://openalex.org/I1288214837"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.13114275,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"90"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/template","display_name":"Template","score":0.8255392909049988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7679758071899414},{"id":"https://openalex.org/keywords/property","display_name":"Property (philosophy)","score":0.7672207355499268},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.6449012756347656},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.53428053855896},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.44420522451400757}],"concepts":[{"id":"https://openalex.org/C82714645","wikidata":"https://www.wikidata.org/wiki/Q438331","display_name":"Template","level":2,"score":0.8255392909049988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7679758071899414},{"id":"https://openalex.org/C189950617","wikidata":"https://www.wikidata.org/wiki/Q937228","display_name":"Property (philosophy)","level":2,"score":0.7672207355499268},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.6449012756347656},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.53428053855896},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.44420522451400757},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3127041.3127063","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3127041.3127063","pdf_url":null,"source":null,"license":"public-domain","license_id":"https://openalex.org/licenses/public-domain","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM-IEEE International Conference on Formal Methods and Models for System Design","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4094306072","display_name":null,"funder_award_id":"Work Unit Number IE30","funder_id":"https://openalex.org/F4320337628","funder_display_name":"U.S. Naval Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320337628","display_name":"U.S. Naval Research Laboratory","ror":"https://ror.org/04d23a975"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W115265342","https://openalex.org/W1748842448","https://openalex.org/W1980767016","https://openalex.org/W2133281166","https://openalex.org/W2987907651","https://openalex.org/W4251912342"],"related_works":["https://openalex.org/W2121300814","https://openalex.org/W4231091074","https://openalex.org/W1886613375","https://openalex.org/W4236081792","https://openalex.org/W4250583430","https://openalex.org/W4234406076","https://openalex.org/W2010731026","https://openalex.org/W4311328601","https://openalex.org/W2360893094","https://openalex.org/W3081644756"],"abstract_inverted_index":{"This":[0],"paper":[1],"describes":[2],"a":[3,32],"method":[4,22],"for":[5,17],"using":[6],"property":[7,30],"definition":[8],"templates":[9],"to":[10],"support":[11],"automatic":[12],"analysis":[13],"of":[14,31],"source":[15],"code":[16],"application-specific":[18],"security":[19],"properties.":[20],"The":[21],"is":[23],"illustrated":[24],"on":[25],"an":[26],"example":[27],"data":[28],"flow":[29],"C":[33],"program.":[34]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
