{"id":"https://openalex.org/W2542317943","doi":"https://doi.org/10.4230/darts.2.1.12","title":"Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact)","display_name":"Boomerang: Demand-Driven Flow- and Context-Sensitive Pointer Analysis for Java (Artifact)","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2542317943","doi":"https://doi.org/10.4230/darts.2.1.12","mag":"2542317943"},"language":"en","primary_location":{"id":"pmh:oai:drops-oai.dagstuhl.de:6133","is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/DARTS.2.1.12","pdf_url":null,"source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":"Article"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://drops.dagstuhl.de/entities/document/10.4230/DARTS.2.1.12","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008520601","display_name":"Johannes Sp\u00e4th","orcid":"https://orcid.org/0000-0003-4462-9372"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Sp\u00e4th, Johannes","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037366470","display_name":"Lisa Nguyen Quang","orcid":"https://orcid.org/0000-0003-3146-7968"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nguyen Quang Do, Lisa","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038781215","display_name":"Karim Ali","orcid":"https://orcid.org/0000-0002-5516-1376"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ali, Karim","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5076678278","display_name":"Eric Bodden","orcid":"https://orcid.org/0000-0003-3470-3647"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bodden, Eric","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5008520601"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.14864537,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9905999898910522,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.7994554042816162},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7552714347839355},{"id":"https://openalex.org/keywords/pointer-analysis","display_name":"Pointer analysis","score":0.6626939177513123},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6286122798919678},{"id":"https://openalex.org/keywords/test-suite","display_name":"Test suite","score":0.5601798295974731},{"id":"https://openalex.org/keywords/suite","display_name":"Suite","score":0.5031608939170837},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.4114255905151367},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4026944041252136},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.24291262030601501},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.21613997220993042},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1738070547580719},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.09592783451080322}],"concepts":[{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.7994554042816162},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7552714347839355},{"id":"https://openalex.org/C7263679","wikidata":"https://www.wikidata.org/wiki/Q5978076","display_name":"Pointer analysis","level":3,"score":0.6626939177513123},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6286122798919678},{"id":"https://openalex.org/C151552104","wikidata":"https://www.wikidata.org/wiki/Q7705809","display_name":"Test suite","level":4,"score":0.5601798295974731},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.5031608939170837},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.4114255905151367},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4026944041252136},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.24291262030601501},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.21613997220993042},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1738070547580719},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.09592783451080322},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:drops-oai.dagstuhl.de:6133","is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/DARTS.2.1.12","pdf_url":null,"source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":"Article"},{"id":"doi:10.4230/darts.2.1.12","is_oa":true,"landing_page_url":"https://doi.org/10.4230/darts.2.1.12","pdf_url":null,"source":{"id":"https://openalex.org/S7407052059","display_name":"Dagstuhl Research Online Publication Server","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":""}],"best_oa_location":{"id":"pmh:oai:drops-oai.dagstuhl.de:6133","is_oa":true,"landing_page_url":"https://drops.dagstuhl.de/entities/document/10.4230/DARTS.2.1.12","pdf_url":null,"source":{"id":"https://openalex.org/S4377196569","display_name":"DROPS (Schloss Dagstuhl \u2013 Leibniz Center for Informatics)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2799853480","host_organization_name":"Schloss Dagstuhl \u2013 Leibniz Center for Informatics","host_organization_lineage":["https://openalex.org/I2799853480"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"","raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2553375745","https://openalex.org/W2053155313","https://openalex.org/W2352464313","https://openalex.org/W1522089540","https://openalex.org/W1979582240","https://openalex.org/W1885035175","https://openalex.org/W3099499197","https://openalex.org/W2390629024","https://openalex.org/W2349639756","https://openalex.org/W2955422324","https://openalex.org/W1734116059","https://openalex.org/W2387682673","https://openalex.org/W1579435874","https://openalex.org/W2044735058","https://openalex.org/W29413014","https://openalex.org/W2396234346","https://openalex.org/W2139538727","https://openalex.org/W2122751766","https://openalex.org/W2949893529","https://openalex.org/W2095115578"],"abstract_inverted_index":{"Evaluating":[0],"pointer":[1,30,37,59],"analyses":[2],"with":[3,33,92],"respect":[4],"to":[5,27,56,63,85,90],"soundness":[6],"and":[7,41,44,79,95,107],"precision":[8],"has":[9],"been":[10],"a":[11],"tedious":[12],"task.":[13],"Within":[14],"this":[15],"artifact":[16,66,100],"we":[17],"present":[18],"PointerBench,":[19],"the":[20,25,29,65,80,93,99,102],"benchmark":[21],"suite":[22],"used":[23,55],"in":[24],"paper":[26],"compare":[28],"analysis":[31],"Boomerang":[32,71,86],"two":[34],"other":[35],"demand-driven":[36],"analyses,":[38],"SB":[39],"[Sridharan":[40],"Bodik,":[42],"2006]":[43],"DA":[45,108],"[Yan":[46],"et":[47],"al.,":[48],"2011].":[49],"We":[50],"show":[51],"PointerBench":[52],"can":[53,87,112],"be":[54,88,114],"test":[57,74,77],"different":[58],"analyses.":[60],"In":[61],"addition":[62],"that,":[64],"contains":[67,101],"usage":[68],"examples":[69],"for":[70],"on":[72,82,116],"simple":[73],"programs.":[75],"The":[76],"programs":[78,84],"input":[81],"these":[83],"changed":[89],"experiment":[91],"algorithm":[94],"its":[96],"features.":[97],"Additionally,":[98],"integration":[103],"of":[104],"Boomerang,":[105],"SB,":[106],"into":[109],"FlowDroid,":[110],"which":[111],"then":[113],"executed":[115],"arbitrary":[117],"Android":[118],"applications.":[119]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
