{"id":"https://openalex.org/W4386365673","doi":"https://doi.org/10.18293/seke2023-123","title":"CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale Software","display_name":"CAPS: An Efficient Whole-Program Critical Paths Search Framework for Large-Scale Software","publication_year":2023,"publication_date":"2023-07-01","ids":{"openalex":"https://openalex.org/W4386365673","doi":"https://doi.org/10.18293/seke2023-123"},"language":"en","primary_location":{"id":"doi:10.18293/seke2023-123","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2023-123","pdf_url":"http://dx.doi.org/10.18293/seke2023-123","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"http://dx.doi.org/10.18293/seke2023-123","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101907160","display_name":"Peiyang Li","orcid":"https://orcid.org/0000-0002-3937-2560"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Peiyang Li","raw_affiliation_strings":["State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078514490","display_name":"Zixin Liu","orcid":"https://orcid.org/0000-0001-8633-1182"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zixin Liu","raw_affiliation_strings":["State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108860927","display_name":"Yuening Su","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuening Su","raw_affiliation_strings":["State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116592778","display_name":"Hao Wang","orcid":"https://orcid.org/0000-0003-2227-075X"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Wang","raw_affiliation_strings":["State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055627351","display_name":"Bo Jiang","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Jiang","raw_affiliation_strings":["State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University , China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University, China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101907160"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18904532,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2023","issue":null,"first_page":"169","last_page":"174"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8155626654624939},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.6582612991333008},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.6380397081375122},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5774809122085571},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5439862608909607},{"id":"https://openalex.org/keywords/data-flow-analysis","display_name":"Data-flow analysis","score":0.4452044367790222},{"id":"https://openalex.org/keywords/control-flow-graph","display_name":"Control flow graph","score":0.4393162429332733},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.419939249753952},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4112367033958435},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37667128443717957},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3437845706939697},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.3271888494491577},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.19495657086372375},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1678144633769989}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8155626654624939},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.6582612991333008},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.6380397081375122},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5774809122085571},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5439862608909607},{"id":"https://openalex.org/C88468194","wikidata":"https://www.wikidata.org/wiki/Q1172416","display_name":"Data-flow analysis","level":3,"score":0.4452044367790222},{"id":"https://openalex.org/C27458966","wikidata":"https://www.wikidata.org/wiki/Q1187693","display_name":"Control flow graph","level":2,"score":0.4393162429332733},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.419939249753952},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4112367033958435},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37667128443717957},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3437845706939697},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.3271888494491577},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.19495657086372375},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1678144633769989}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18293/seke2023-123","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2023-123","pdf_url":"http://dx.doi.org/10.18293/seke2023-123","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.18293/seke2023-123","is_oa":true,"landing_page_url":"http://doi.org/10.18293/seke2023-123","pdf_url":"http://dx.doi.org/10.18293/seke2023-123","source":{"id":"https://openalex.org/S4220650826","display_name":"Proceedings/Proceedings of the ... International Conference on Software Engineering and Knowledge Engineering","issn_l":"2325-9000","issn":["2325-9000","2325-9086"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Conferences on Software Engineering and Knowledge Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4386365673.pdf","grobid_xml":"https://content.openalex.org/works/W4386365673.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W2297774820","https://openalex.org/W2888012902","https://openalex.org/W2922027358","https://openalex.org/W2930019028","https://openalex.org/W2956150220","https://openalex.org/W2956311605","https://openalex.org/W2972099136","https://openalex.org/W3015326774","https://openalex.org/W3046457291","https://openalex.org/W3215880744","https://openalex.org/W4247801608","https://openalex.org/W4288057797","https://openalex.org/W6761129024","https://openalex.org/W6802572211","https://openalex.org/W6840891907","https://openalex.org/W7056732649"],"related_works":["https://openalex.org/W2162436812","https://openalex.org/W4256382613","https://openalex.org/W2166895275","https://openalex.org/W2080046362","https://openalex.org/W2998775986","https://openalex.org/W2081768685","https://openalex.org/W2117042503","https://openalex.org/W2122222797","https://openalex.org/W2148030978","https://openalex.org/W2737936389"],"abstract_inverted_index":{"Tracking":[0],"the":[1,21,25,41,65,81,88,101,108,123],"flow":[2],"of":[3,61,67,125],"external":[4],"inputs":[5],"in":[6,20],"a":[7,59,72],"program":[8],"with":[9],"taint-analysis":[10],"techniques":[11],"can":[12,120],"help":[13],"developers":[14],"better":[15],"identify":[16],"potential":[17],"security":[18],"vulnerabilities":[19],"software.However,":[22],"directly":[23],"using":[24],"static":[26],"taint":[27],"analysis":[28],"provided":[29],"by":[30,76],"Clang":[31],"Static":[32],"Analyzer":[33],"is":[34],"inefficient":[35],"for":[36,84,104,129],"large-scale":[37,115,130],"software":[38,116],"due":[39],"to":[40,63,99],"huge":[42],"but":[43],"redundant":[44],"ExplodedGraph":[45,66],"generated.Therefore,":[46],"we":[47],"propose":[48],"an":[49],"efficient":[50],"Whole-Program":[51],"Critical":[52],"Paths":[53],"Search":[54],"(CAPS)":[55],"framework.It":[56],"first":[57],"performs":[58],"set":[60],"optimizations":[62],"reduce":[64],"each":[68,85],"function.Then,":[69],"it":[70,92],"constructs":[71],"global":[73,109],"exploded":[74,110],"graph":[75,90,97],"inserting":[77],"call":[78],"edges":[79],"among":[80],"reduced":[82],"ExplodedGraphs":[83],"function":[86],"within":[87],"Neo4j":[89],"database.Finally,":[91],"proposes":[93],"loop":[94],"removal":[95],"and":[96],"segmentation":[98],"optimize":[100],"search":[102,128],"process":[103],"critical":[105,126],"paths":[106],"on":[107,113],"graph.Our":[111],"experiments":[112],"3":[114],"show":[117],"that":[118],"CAPS":[119],"significantly":[121],"improve":[122],"efficiency":[124],"path":[127],"software.":[131]},"counts_by_year":[],"updated_date":"2026-03-09T07:00:12.390032","created_date":"2025-10-10T00:00:00"}
