{"id":"https://openalex.org/W2980178716","doi":"https://doi.org/10.1145/3357390.3361028","title":"Towards efficient, multi-language dynamic taint analysis","display_name":"Towards efficient, multi-language dynamic taint analysis","publication_year":2019,"publication_date":"2019-10-10","ids":{"openalex":"https://openalex.org/W2980178716","doi":"https://doi.org/10.1145/3357390.3361028","mag":"2980178716"},"language":"en","primary_location":{"id":"doi:10.1145/3357390.3361028","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3357390.3361028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002542821","display_name":"Jacob Kreindl","orcid":"https://orcid.org/0000-0001-5112-3981"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jacob Kreindl","raw_affiliation_strings":["JKU Linz, Austria"],"affiliations":[{"raw_affiliation_string":"JKU Linz, Austria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025674223","display_name":"Daniele Bonetta","orcid":"https://orcid.org/0000-0001-7633-4224"},"institutions":[{"id":"https://openalex.org/I1342911587","display_name":"Oracle (United States)","ror":"https://ror.org/006c77m33","country_code":"US","type":"company","lineage":["https://openalex.org/I1342911587"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Daniele Bonetta","raw_affiliation_strings":["Oracle Labs, USA"],"affiliations":[{"raw_affiliation_string":"Oracle Labs, USA","institution_ids":["https://openalex.org/I1342911587"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011678778","display_name":"Hanspeter M\u00f6ssenb\u00f6ck","orcid":"https://orcid.org/0000-0001-7706-7308"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanspeter M\u00f6ssenb\u00f6ck","raw_affiliation_strings":["JKU Linz, Austria"],"affiliations":[{"raw_affiliation_string":"JKU Linz, Austria","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002542821"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5601,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.75479988,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"85","last_page":"94"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.9227096438407898},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8494871854782104},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6567627191543579},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6537109017372131},{"id":"https://openalex.org/keywords/dynamic-programming","display_name":"Dynamic programming","score":0.56230628490448},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4993889331817627},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.49148499965667725},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4649888873100281},{"id":"https://openalex.org/keywords/dynamic-program-analysis","display_name":"Dynamic program analysis","score":0.4574955403804779},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4325892925262451},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18872025609016418},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0791226327419281}],"concepts":[{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.9227096438407898},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8494871854782104},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6567627191543579},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6537109017372131},{"id":"https://openalex.org/C37404715","wikidata":"https://www.wikidata.org/wiki/Q380679","display_name":"Dynamic programming","level":2,"score":0.56230628490448},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4993889331817627},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.49148499965667725},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4649888873100281},{"id":"https://openalex.org/C140006998","wikidata":"https://www.wikidata.org/wiki/Q2499307","display_name":"Dynamic program analysis","level":3,"score":0.4574955403804779},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4325892925262451},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18872025609016418},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0791226327419281}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3357390.3361028","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3357390.3361028","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 16th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320307904","display_name":"Oracle","ror":"https://ror.org/006c77m33"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W1222699389","https://openalex.org/W1511560695","https://openalex.org/W1821004526","https://openalex.org/W1966973702","https://openalex.org/W1991074244","https://openalex.org/W2006419855","https://openalex.org/W2007831853","https://openalex.org/W2011146531","https://openalex.org/W2012286850","https://openalex.org/W2029684113","https://openalex.org/W2075675735","https://openalex.org/W2089745089","https://openalex.org/W2094269821","https://openalex.org/W2102970979","https://openalex.org/W2108747667","https://openalex.org/W2132215655","https://openalex.org/W2138788987","https://openalex.org/W2144789413","https://openalex.org/W2146717998","https://openalex.org/W2147794177","https://openalex.org/W2153155256","https://openalex.org/W2153185479","https://openalex.org/W2179304688","https://openalex.org/W2199584834","https://openalex.org/W2394543764","https://openalex.org/W2394695306","https://openalex.org/W2413140018","https://openalex.org/W2464350869","https://openalex.org/W2533740594","https://openalex.org/W2602111867","https://openalex.org/W2726256221","https://openalex.org/W2788565238","https://openalex.org/W2794883415","https://openalex.org/W2807041801","https://openalex.org/W2898614297","https://openalex.org/W2964097210","https://openalex.org/W2972099136","https://openalex.org/W4236519034","https://openalex.org/W4246166885"],"related_works":["https://openalex.org/W2146279349","https://openalex.org/W3155053542","https://openalex.org/W2005010039","https://openalex.org/W2021162507","https://openalex.org/W3120011499","https://openalex.org/W3111646971","https://openalex.org/W2996442553","https://openalex.org/W2930019028","https://openalex.org/W2486032082","https://openalex.org/W4210844302"],"abstract_inverted_index":{"Dynamic":[0],"taint":[1,37,67],"analysis":[2,6,38,68],"is":[3,11,16,21,24,54],"a":[4,43,71],"program":[5,20],"technique":[7],"in":[8,29,33,59],"which":[9],"data":[10],"marked":[12],"and":[13,47],"its":[14],"propagation":[15],"tracked":[17],"while":[18],"the":[19],"executing.":[22],"It":[23],"applied":[25],"to":[26,42],"solve":[27],"problems":[28],"many":[30],"fields,":[31],"especially":[32],"software":[34],"security.":[35],"Current":[36,63],"platforms":[39],"are":[40,57],"limited":[41],"single":[44],"programming":[45,61],"language,":[46],"therefore":[48],"cannot":[49],"support":[50],"programs":[51],"which,":[52],"as":[53],"common":[55],"today,":[56],"implemented":[58],"multiple":[60],"languages.":[62],"implementations":[64],"of":[65],"dynamic":[66],"also":[69],"incur":[70],"significant":[72],"performance":[73],"overhead.":[74]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
