{"id":"https://openalex.org/W3021992608","doi":"https://doi.org/10.1145/3342195.3387556","title":"Mousse","display_name":"Mousse","publication_year":2020,"publication_date":"2020-04-15","ids":{"openalex":"https://openalex.org/W3021992608","doi":"https://doi.org/10.1145/3342195.3387556","mag":"3021992608"},"language":"en","primary_location":{"id":"doi:10.1145/3342195.3387556","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3342195.3387556","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3342195.3387556","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth European Conference on Computer Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3342195.3387556","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088812047","display_name":"Yingtong Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yingtong Liu","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077064733","display_name":"Hsin-Wei Hung","orcid":"https://orcid.org/0000-0002-4007-339X"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hsin-Wei Hung","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003045043","display_name":"Ardalan Amiri Sani","orcid":"https://orcid.org/0000-0003-0130-587X"},"institutions":[{"id":"https://openalex.org/I2803209242","display_name":"University of California System","ror":"https://ror.org/00pjdza24","country_code":"US","type":"education","lineage":["https://openalex.org/I2803209242"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ardalan Amiri Sani","raw_affiliation_strings":["University of California"],"affiliations":[{"raw_affiliation_string":"University of California","institution_ids":["https://openalex.org/I2803209242"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088812047"],"corresponding_institution_ids":["https://openalex.org/I2803209242"],"apc_list":null,"apc_paid":null,"fwci":0.7607,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.70295804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8308278918266296},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.7457730174064636},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.5673989653587341},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5351897478103638},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4287142753601074},{"id":"https://openalex.org/keywords/execution-time","display_name":"Execution time","score":0.4245384931564331},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.34992074966430664},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.33786720037460327},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3324439525604248}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8308278918266296},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.7457730174064636},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.5673989653587341},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5351897478103638},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4287142753601074},{"id":"https://openalex.org/C2989134064","wikidata":"https://www.wikidata.org/wiki/Q288510","display_name":"Execution time","level":2,"score":0.4245384931564331},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.34992074966430664},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.33786720037460327},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3324439525604248}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3342195.3387556","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3342195.3387556","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3342195.3387556","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth European Conference on Computer Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3342195.3387556","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3342195.3387556","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3342195.3387556","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Fifteenth European Conference on Computer Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3382891349","display_name":null,"funder_award_id":"1763172","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3021992608.pdf","grobid_xml":"https://content.openalex.org/works/W3021992608.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W157156687","https://openalex.org/W1457363419","https://openalex.org/W1496222301","https://openalex.org/W1522250664","https://openalex.org/W1710734607","https://openalex.org/W1856462361","https://openalex.org/W1893312510","https://openalex.org/W1971719033","https://openalex.org/W1980731865","https://openalex.org/W2017025011","https://openalex.org/W2027538101","https://openalex.org/W2042033151","https://openalex.org/W2051990174","https://openalex.org/W2107558499","https://openalex.org/W2113864883","https://openalex.org/W2116998907","https://openalex.org/W2119236311","https://openalex.org/W2133119226","https://openalex.org/W2137530017","https://openalex.org/W2150990339","https://openalex.org/W2156368296","https://openalex.org/W2159849744","https://openalex.org/W2166743230","https://openalex.org/W2514974017","https://openalex.org/W2585259630","https://openalex.org/W2626301739","https://openalex.org/W2884769489","https://openalex.org/W2888875512","https://openalex.org/W2889022041"],"related_works":["https://openalex.org/W2905722102","https://openalex.org/W345638404","https://openalex.org/W3170793698","https://openalex.org/W2589019771","https://openalex.org/W3042714377","https://openalex.org/W2066353350","https://openalex.org/W166889777","https://openalex.org/W2345523543","https://openalex.org/W2159950491","https://openalex.org/W2968998509"],"abstract_inverted_index":{"Selective":[0],"symbolic":[1],"execution":[2,13,80],"(SSE)":[3],"is":[4],"a":[5,16,21,51,70],"powerful":[6],"program":[7,82],"analysis":[8],"technique":[9],"for":[10,43,53],"exploring":[11],"multiple":[12],"paths":[14],"of":[15,81,117],"program.":[17],"However,":[18],"it":[19],"faces":[20],"challenge":[22],"in":[23,93,115],"analyzing":[24,54],"programs":[25,56],"with":[26],"environments":[27],"that":[28,110],"cannot":[29],"be":[30],"modeled":[31],"nor":[32],"virtualized.":[33],"Examples":[34],"include":[35,69],"OS":[36,91],"services":[37,92],"managing":[38],"I/O":[39],"devices,":[40],"software":[41],"frameworks":[42],"accelerators,":[44],"and":[45,78,99,104,119],"specialized":[46],"applications.":[47],"We":[48,84,96],"introduce":[49],"Mousse,":[50],"system":[52],"such":[55],"using":[57],"SSE.":[58],"Mousse":[59,86,111],"uses":[60],"novel":[61,71],"solutions":[62,114],"to":[63,87],"overcome":[64],"the":[65],"above":[66],"challenge.":[67],"These":[68],"process-level":[72],"SSE":[73],"design,":[74],"environment-aware":[75],"concurrent":[76],"execution,":[77],"distributed":[79],"paths.":[83],"use":[85],"comprehensively":[88],"analyze":[89],"five":[90],"three":[94],"smartphones.":[95],"perform":[97],"bug":[98],"vulnerability":[100],"detection,":[101],"taint":[102],"analysis,":[103],"performance":[105,118],"profiling.":[106],"Our":[107],"evaluation":[108],"shows":[109],"outperforms":[112],"alternative":[113],"terms":[116],"coverage.":[120]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2020-05-13T00:00:00"}
