{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:40:10Z","timestamp":1760596810149,"version":"build-2065373602"},"reference-count":24,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Reliability Engineering &amp; System Safety"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1016\/j.ress.2019.03.031","type":"journal-article","created":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T03:19:04Z","timestamp":1552879144000},"page":"336-346","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Benchmarking static code analyzers"],"prefix":"10.1016","volume":"188","author":[{"given":"J\u00f6rg","family":"Herter","sequence":"first","affiliation":[]},{"given":"Daniel","family":"K\u00e4stner","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Mallon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5599-7560","authenticated-orcid":false,"given":"Reinhard","family":"Wilhelm","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ress.2019.03.031_bib0001","unstructured":"Rogue Wave Software. Klocwork\u2122. http:\/\/www.klocwork.com."},{"key":"10.1016\/j.ress.2019.03.031_bib0002","unstructured":"GrammaTech. CodeSonar. http:\/\/www.grammatech.com\/products\/codesonar."},{"key":"10.1016\/j.ress.2019.03.031_bib0003","unstructured":"Mathworks. Polyspace Bug Finder. http:\/\/www.mathworks.com\/products\/polyspace-bug-finder.html."},{"key":"10.1016\/j.ress.2019.03.031_bib0004","unstructured":"Synopsys. Coverity. http:\/\/www.synopsys.com\/software-integrity\/products\/static-code-analysis.html."},{"key":"10.1016\/j.ress.2019.03.031_bib0005","series-title":"Embedded real time software and systems congress ERTS2","article-title":"Taking static analysis to the next level: proving the absence of run-time errors and data races with astr\u00e9e","author":"Min\u00e9","year":"2016"},{"key":"10.1016\/j.ress.2019.03.031_bib0006","series-title":"SAE world congress 2017","article-title":"Finding all potential runtime errors and data races in automotive software","author":"K\u00e4stner","year":"2017"},{"key":"10.1016\/j.ress.2019.03.031_bib0007","unstructured":"AbsInt Angewandte Informatik GmbH. Astr\u00e9e. http:\/\/www.astree.de."},{"key":"10.1016\/j.ress.2019.03.031_bib0008","unstructured":"The Frama-C platform web site. Frama-C. https:\/\/frama-c.com\/."},{"key":"10.1016\/j.ress.2019.03.031_bib0009","series-title":"ACM SIGAda 2003 conference","article-title":"Static verification of dynamic properties","author":"Deutsch","year":"2003"},{"key":"10.1016\/j.ress.2019.03.031_bib0010","unstructured":"Mathworks. Polyspace Code Prover. http:\/\/www.mathworks.com\/products\/polyspace-code-prover.html."},{"key":"10.1016\/j.ress.2019.03.031_bib0011","unstructured":"AdaCore. CodePeer. http:\/\/www.adacore.com\/codepeer."},{"key":"10.1016\/j.ress.2019.03.031_bib0012","series-title":"2015 IEEE international symposium on software reliability engineering workshops, ISSRE workshops, Gaithersburg, MD, USA, November 2\u20135, 2015","first-page":"12","article-title":"Test suites for benchmarks of static analysis tools","author":"Shiraishi","year":"2015"},{"key":"10.1016\/j.ress.2019.03.031_bib0013","series-title":"Computer Safety, Reliability, and Security - 36th International Conference, SAFECOMP 2017, Trento, Italy, September 13\u201315, 2017, proceedings","first-page":"197","article-title":"Benchmarking static code analyzers","author":"Herter","year":"2017"},{"key":"10.1016\/j.ress.2019.03.031_bib0014","series-title":"Workshop on the evaluation of software defect detection tools","article-title":"Bugbench: benchmarks for evaluating bug detection tools","author":"Lu","year":"2005"},{"key":"10.1016\/j.ress.2019.03.031_bib0015","unstructured":"NIST \u2013 National Institute of Standards and Technology. Juliet suite for C\/C++. http:\/\/samate.nist.gov\/SRD\/view.php?tsID=86."},{"key":"10.1016\/j.ress.2019.03.031_bib0016","unstructured":"NIST \u2013 National Institute of Standards and Technology. Juliet documents. https:\/\/samate.nist.gov\/SRD\/around.php#juliet_documents."},{"year":"2013","series-title":"Information Technology \u2013 Programming Languages, Their Environments and System Software Interfaces \u2013 Secure Coding Rules (ISO\/IEC TS 17961)","author":"ISO\/IEC","key":"10.1016\/j.ress.2019.03.031_bib0017"},{"key":"10.1016\/j.ress.2019.03.031_bib0018","unstructured":"ETAPS\/TAPAS. Competition on Software Verification (SV-COMP). http:\/\/sv-comp.sosy-lab.org\/2017\/."},{"key":"10.1016\/j.ress.2019.03.031_bib0019","unstructured":"MISRA-C:2004 Guidelines for the Use of the C Language in Critical Systems; 2004."},{"key":"10.1016\/j.ress.2019.03.031_bib0020","unstructured":"MISRA-C:2012 Guidelines for the Use of the C Language in Critical Systems; 2013."},{"key":"10.1016\/j.ress.2019.03.031_sbref0010","series-title":"NIST workshop on software security assurance tools, techniques, and methods, Long Beach, California, USA","article-title":"The case for common flaw enumeration","author":"Martin","year":"2005"},{"issue":"6","key":"10.1016\/j.ress.2019.03.031_bib0022","first-page":"95","article-title":"The power of 10: rules for developing safety-critical code","volume":"39","author":"G. J. NASA\/JPL Laboratory for Reliable Software","year":"2006","journal-title":"Computer"},{"key":"10.1016\/j.ress.2019.03.031_bib0023","unstructured":"NIST \u2013 National Institute of Standards and Technology. SAMATE - Software Assurance Metrics And Tool Evaluation. http:\/\/samate.nist.gov\/Main_Page.html."},{"key":"10.1016\/j.ress.2019.03.031_bib0024","unstructured":"DARPA \u2013 Defense Advanced Research Projects Agency. Space\/Time Analysis for Cybersecurity (STAC). http:\/\/www.darpa.mil\/program\/space-time-analysis-for-cybersecurity."}],"container-title":["Reliability Engineering &amp; System Safety"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832018304721?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0951832018304721?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:18:16Z","timestamp":1760595496000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0951832018304721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":24,"alternative-id":["S0951832018304721"],"URL":"https:\/\/doi.org\/10.1016\/j.ress.2019.03.031","relation":{},"ISSN":["0951-8320"],"issn-type":[{"type":"print","value":"0951-8320"}],"subject":[],"published":{"date-parts":[[2019,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Benchmarking static code analyzers","name":"articletitle","label":"Article Title"},{"value":"Reliability Engineering & System Safety","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ress.2019.03.031","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}