{"id":"https://openalex.org/W2981467538","doi":"https://doi.org/10.1145/3324884.3416542","title":"Representing and reasoning about dynamic code","display_name":"Representing and reasoning about dynamic code","publication_year":2020,"publication_date":"2020-12-21","ids":{"openalex":"https://openalex.org/W2981467538","doi":"https://doi.org/10.1145/3324884.3416542","mag":"2981467538"},"language":"en","primary_location":{"id":"doi:10.1145/3324884.3416542","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3416542","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416542","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416542","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016551805","display_name":"Jesse Bartels","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jesse Bartels","raw_affiliation_strings":["The University Of Arizona","University of Arizona"],"affiliations":[{"raw_affiliation_string":"The University Of Arizona","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"University of Arizona","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jon Stephens","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jon Stephens","raw_affiliation_strings":["University Of Texas","University of Arizona"],"affiliations":[{"raw_affiliation_string":"University Of Texas","institution_ids":[]},{"raw_affiliation_string":"University of Arizona","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108542327","display_name":"Saumya Debray","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saumya Debray","raw_affiliation_strings":["The University Of Arizona","University of Arizona"],"affiliations":[{"raw_affiliation_string":"The University Of Arizona","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"University of Arizona","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016551805"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00761379,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"312","last_page":"323"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8185627460479736},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.7241437435150146},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.7011408805847168},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.685472846031189},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6573579907417297},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.6504119634628296},{"id":"https://openalex.org/keywords/unreachable-code","display_name":"Unreachable code","score":0.53134685754776},{"id":"https://openalex.org/keywords/generator","display_name":"Generator (circuit theory)","score":0.48302850127220154},{"id":"https://openalex.org/keywords/just-in-time-compilation","display_name":"Just-in-time compilation","score":0.46104735136032104},{"id":"https://openalex.org/keywords/kpi-driven-code-analysis","display_name":"KPI-driven code analysis","score":0.4552447199821472},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.43137621879577637},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.4133134186267853},{"id":"https://openalex.org/keywords/object-code","display_name":"Object code","score":0.3818967342376709},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.34000352025032043},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.17281600832939148},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.13554799556732178},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.13470998406410217},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.08362680673599243}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8185627460479736},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.7241437435150146},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.7011408805847168},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.685472846031189},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6573579907417297},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.6504119634628296},{"id":"https://openalex.org/C50951305","wikidata":"https://www.wikidata.org/wiki/Q2482534","display_name":"Unreachable code","level":5,"score":0.53134685754776},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.48302850127220154},{"id":"https://openalex.org/C76782552","wikidata":"https://www.wikidata.org/wiki/Q110546","display_name":"Just-in-time compilation","level":3,"score":0.46104735136032104},{"id":"https://openalex.org/C121957198","wikidata":"https://www.wikidata.org/wiki/Q14365593","display_name":"KPI-driven code analysis","level":5,"score":0.4552447199821472},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.43137621879577637},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.4133134186267853},{"id":"https://openalex.org/C154526789","wikidata":"https://www.wikidata.org/wiki/Q157965","display_name":"Object code","level":4,"score":0.3818967342376709},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.34000352025032043},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.17281600832939148},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.13554799556732178},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.13470998406410217},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.08362680673599243},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/3324884.3416542","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3416542","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416542","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.arizona.edu:10150/652285","is_oa":false,"landing_page_url":"http://hdl.handle.net/10150/652285","pdf_url":null,"source":{"id":"https://openalex.org/S4306400271","display_name":"UA Campus Repository (The University of Arizona)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I138006243","host_organization_name":"University of Arizona","host_organization_lineage":["https://openalex.org/I138006243"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"Proceedings"},{"id":"pmh:oai:arXiv.org:1910.09606","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1910.09606","pdf_url":"https://arxiv.org/pdf/1910.09606","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:2981467538","is_oa":true,"landing_page_url":"http://export.arxiv.org/pdf/1910.09606","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.1910.09606","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1910.09606","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.1145/3324884.3416542","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3324884.3416542","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3324884.3416542","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[{"id":"https://openalex.org/G2109732646","display_name":null,"funder_award_id":"1908313","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2981467538.pdf","grobid_xml":"https://content.openalex.org/works/W2981467538.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W138996787","https://openalex.org/W303139982","https://openalex.org/W1491178396","https://openalex.org/W1499241274","https://openalex.org/W1515180657","https://openalex.org/W1515790419","https://openalex.org/W1527581944","https://openalex.org/W1966973702","https://openalex.org/W1980153792","https://openalex.org/W1984248430","https://openalex.org/W1996885531","https://openalex.org/W2001154106","https://openalex.org/W2007831853","https://openalex.org/W2012431717","https://openalex.org/W2012578421","https://openalex.org/W2041394996","https://openalex.org/W2060692877","https://openalex.org/W2076807040","https://openalex.org/W2080573945","https://openalex.org/W2084845478","https://openalex.org/W2088840230","https://openalex.org/W2098492867","https://openalex.org/W2102970979","https://openalex.org/W2112460268","https://openalex.org/W2116136092","https://openalex.org/W2134633067","https://openalex.org/W2137530017","https://openalex.org/W2146948794","https://openalex.org/W2151135920","https://openalex.org/W2156858199","https://openalex.org/W2170364043","https://openalex.org/W2295857493","https://openalex.org/W2401617229","https://openalex.org/W2514974017","https://openalex.org/W2765653036","https://openalex.org/W2767198771","https://openalex.org/W2806079706","https://openalex.org/W4235832836","https://openalex.org/W6610773549","https://openalex.org/W6631022565","https://openalex.org/W6696642037"],"related_works":["https://openalex.org/W1623620460","https://openalex.org/W2166700159","https://openalex.org/W1969808647","https://openalex.org/W2980011154","https://openalex.org/W2143634494","https://openalex.org/W1620346340","https://openalex.org/W3190414298","https://openalex.org/W2752700320","https://openalex.org/W2925578274","https://openalex.org/W55468846","https://openalex.org/W1529821561","https://openalex.org/W1527664849","https://openalex.org/W3082055584","https://openalex.org/W589454760","https://openalex.org/W1828782849","https://openalex.org/W2903351818","https://openalex.org/W2613033681","https://openalex.org/W2916510342","https://openalex.org/W2119112383","https://openalex.org/W3083162932"],"abstract_inverted_index":{"Dynamic":[0],"code,":[1],"i.e.,":[2],"code":[3,20,29,101,124],"that":[4,87,111,125],"is":[5,11],"created":[6],"or":[7],"modified":[8],"at":[9],"runtime,":[10],"ubiquitous":[12],"in":[13,31,45,72],"today's":[14],"world.":[15],"The":[16],"behavior":[17],"of":[18,26,85,122],"dynamic":[19,28,100,106,123],"can":[21,40],"depend":[22],"on":[23,114],"the":[24,27,46,99,104],"logic":[25],"generator":[30,102],"subtle":[32],"and":[33,81,94,103],"non-obvious":[34],"ways,":[35],"e.g.,":[36],"JIT":[37],"compiler":[38],"bugs":[39],"lead":[41],"to":[42,52,90,119],"exploitable":[43],"vulnerabilities":[44],"resulting":[47],"JIT-compiled":[48],"code.":[49,107],"Existing":[50],"approaches":[51],"program":[53,79,131],"analysis":[54],"do":[55],"not":[56],"provide":[57],"adequate":[58],"support":[59],"for":[60],"reasoning":[61],"about":[62,92],"such":[63],"behavioral":[64],"relationships.":[65],"This":[66],"paper":[67],"takes":[68],"a":[69,78,82],"first":[70],"step":[71],"addressing":[73],"this":[74],"problem":[75],"by":[76],"describing":[77],"representation":[80],"new":[83],"notion":[84],"dependency":[86,93],"allows":[88],"us":[89],"reason":[91],"information":[95],"flow":[96],"relationships":[97],"between":[98],"generated":[105],"Experimental":[108],"results":[109],"show":[110],"analyses":[112],"based":[113],"these":[115],"concepts":[116],"are":[117],"able":[118],"capture":[120],"properties":[121],"cannot":[126],"be":[127],"identified":[128],"using":[129],"traditional":[130],"analyses.":[132]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
