{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:09:43Z","timestamp":1776305383581,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030451899","type":"print"},{"value":"9783030451905","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45190-5_3","type":"book-chapter","created":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T09:03:02Z","timestamp":1587114182000},"page":"40-57","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Interpretation-Based Violation Witness Validation for C: NITWIT"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8469-0835","authenticated-orcid":false,"given":"Jan","family":"\u0160vejda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3942-3217","authenticated-orcid":false,"given":"Philipp","family":"Berger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6143-1926","authenticated-orcid":false,"given":"Joost-Pieter","family":"Katoen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"3_CR1","unstructured":"Aho, A.V., Sethi, R., Ullman, J.D.: Compilers: Principles, Techniques, and Tools. Addison-Wesley series in computer science \/ World student series edition, Addison-Wesley (1986)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Beyer, D.: Competition on software verification - (SV-COMP). In: TACAS. Lecture Notes in Computer Science, vol.\u00a07214, pp. 504\u2013524. Springer (2012)","DOI":"10.1007\/978-3-642-28756-5_38"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Beyer, D.: Software verification and verifiable witnesses - (report on SV-COMP 2015). In: TACAS. Lecture Notes in Computer Science, vol.\u00a09035,pp. 401\u2013416. Springer (2015)","DOI":"10.1007\/978-3-662-46681-0_31"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Beyer, D.: Reliable and reproducible competition results with benchexec and witnesses (report on SV-COMP 2016). In: TACAS. Lecture Notes in Computer Science, vol.\u00a09636, pp. 887\u2013904. Springer (2016)","DOI":"10.1007\/978-3-662-49674-9_55"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Beyer, D.: Software verification with validation of results - (report on SV-COMP 2017). In: TACAS (2). Lecture Notes in Computer Science, vol. 10206, pp. 331\u2013349 (2017)","DOI":"10.1007\/978-3-662-54580-5_20"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Beyer, D.: Automatic verification of C and Java programs: SV-COMP 2019. In: TACAS (3). Lecture Notes in Computer Science, vol. 11429, pp. 133\u2013155. Springer (2019)","DOI":"10.1007\/978-3-030-17502-3_9"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Verification Witnesses from SV-COMP 2019 Verification Tools (Feb 2019). \nhttps:\/\/doi.org\/10.5281\/zenodo.2559175","DOI":"10.5281\/zenodo.2559175"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Results of the 9th International Competition on Software Verification (SV-COMP 2020) (Jan 2020). \nhttps:\/\/doi.org\/10.5281\/zenodo.3630205","DOI":"10.5281\/zenodo.3630205"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Verification Witnesses from SV-COMP 2020 Verification Tools (Jan 2020). \nhttps:\/\/doi.org\/10.5281\/zenodo.3630188","DOI":"10.5281\/zenodo.3630188"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Beyer, D., Dangl, M.: Verification-aided debugging: An interactive web-service for exploring error witnesses. In: CAV (2). Lecture Notes in Computer Science, vol.\u00a09780, pp. 502\u2013509. Springer (2016)","DOI":"10.1007\/978-3-319-41540-6_28"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Beyer, D., Dangl, M., Dietsch, D., Heizmann, M., Stahlbauer, A.: Witness validation and stepwise testification across software verifiers. In: ESEC\/SIGSOFT FSE. pp. 721\u2013733. ACM (2015)","DOI":"10.1145\/2786805.2786867"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Beyer, D., Dangl, M., Lemberger, T., Tautschnig, M.: Tests from witnesses - execution-based validation of verification results. In: TAP. Lecture Notes in Computer Science, vol. 10889, pp. 3\u201323. Springer (2018)","DOI":"10.1007\/978-3-319-92994-1_1"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Beyer, D., Henzinger, T.A., Th\u00e9oduloz, G.: Configurable software verification: Concretizing the convergence of model checking and program analysis. In: CAV. Lecture Notes in Computer Science, vol.\u00a04590, pp.504\u2013518. Springer (2007)","DOI":"10.1007\/978-3-540-73368-3_51"},{"key":"3_CR14","unstructured":"Beyer, D., Keremoglu, M.E., Wendler, P.: Predicate abstraction with adjustable-block encoding. In: FMCAD. pp. 189\u2013197. IEEE (2010)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Beyer, D., L\u00f6we, S.: Explicit-state software model checking based on CEGAR and interpolation. In: FASE. Lecture Notes in Computer Science, vol.\u00a07793, pp. 146\u2013162. Springer (2013)","DOI":"10.1007\/978-3-642-37057-1_11"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Clarke, E.M.: The birth of model checking. In: 25 Years of Model Checking. Lecture Notes in Computer Science, vol.\u00a05000, pp. 1\u201326. Springer (2008)","DOI":"10.1007\/978-3-540-69850-0_1"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Heizmann, M., Christ, J., Dietsch, D., Ermis, E., Hoenicke, J., Lindenmann, M.,Nutz, A., Schilling, C., Podelski, A.: Ultimate automizer with SMTInterpol - (competition contribution). In: TACAS. Lecture Notes in Computer Science, vol.\u00a07795, pp. 641\u2013643. Springer (2013)","DOI":"10.1007\/978-3-642-36742-7_53"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Heizmann, M., Dietsch, D., Leike, J., Musa, B., Podelski, A.: Ultimate automizer with array interpolation - (competition contribution). In: TACAS. Lecture Notes in Computer Science, vol.\u00a09035, pp. 455\u2013457. Springer (2015)","DOI":"10.1007\/978-3-662-46681-0_43"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Heizmann, M., Hoenicke, J., Podelski, A.: Software model checking for people who love automata. In: CAV. Lecture Notes in Computer Science, vol.\u00a08044,pp. 36\u201352. Springer (2013)","DOI":"10.1007\/978-3-642-39799-8_2"},{"key":"3_CR20","unstructured":"Holub, A.I.: Compiler Design in C. Prentice Hall (1990)"},{"key":"3_CR21","unstructured":"Mak, R.: Writing Compilers and Interpreters: A Software Engineering Approach. Wiley Publishing, 3rd edn. (2009)"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of Program Analysis. Springer (1999)","DOI":"10.1007\/978-3-662-03811-6"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"\u0160vejda, J., Berger, P., Katoen, J.P.: Replication artifact for the NITWIT Validator submitted to TACAS20 (Oct 2019). \nhttps:\/\/doi.org\/10.5281\/zenodo.3518139","DOI":"10.5281\/zenodo.3518139"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45190-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T13:07:50Z","timestamp":1597928870000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45190-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030451899","9783030451905"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45190-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TACAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tacas2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.etaps.org\/2020\/tacas","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"155","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference could not take place due to the COVID-19 pandemic. There was an online event on July 2, 2020.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}