{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T21:05:59Z","timestamp":1776373559981,"version":"3.51.2"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030452339","type":"print"},{"value":"9783030452346","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45234-6_25","type":"book-chapter","created":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T14:04:23Z","timestamp":1587391463000},"page":"505-519","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Second Competition on Software Testing: Test-Comp 2020"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4832-7662","authenticated-orcid":false,"given":"Dirk","family":"Beyer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","unstructured":"Bartocci, E., Beyer, D., Black, P.E., Fedyukovich, G., Garavel, H., Hartmanns, A., Huisman, M., Kordon, F., Nagele, J., Sighireanu, M., Steffen, B., Suda, M., Sutcliffe, G., Weber, T., Yamada, A.: TOOLympics 2019: An overview of competitions in formal methods. In: Proc. TACAS (3). pp. 3\u201324. LNCS 11429, Springer (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-17502-3_1","DOI":"10.1007\/978-3-030-17502-3_1"},{"key":"25_CR2","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Second competition on software verification (Summary of SV-COMP 2013). In: Proc. TACAS. pp. 594\u2013609. LNCS\u00a07795, Springer (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-36742-7_43","DOI":"10.1007\/978-3-642-36742-7_43"},{"key":"25_CR3","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Automatic verification of C and Java programs: SV-COMP 2019. In: Proc. TACAS (3). pp. 133\u2013155. LNCS 11429, Springer (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-17502-3_9","DOI":"10.1007\/978-3-030-17502-3_9"},{"key":"25_CR4","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Competition on software testing (Test-Comp). In: Proc. TACAS (3). pp. 167\u2013175. LNCS 11429, Springer (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-17502-3_11","DOI":"10.1007\/978-3-030-17502-3_11"},{"key":"25_CR5","unstructured":"Beyer, D.: First international competition on software testing (Test-Comp 2019). Int. J. Softw. Tools Technol, Transf (2020)"},{"key":"25_CR6","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Results of the 2nd International Competition on Software Testing (Test-Comp 2020). Zenodo (2020). \nhttps:\/\/doi.org\/10.5281\/zenodo.3678264","DOI":"10.5281\/zenodo.3678264"},{"key":"25_CR7","doi-asserted-by":"publisher","unstructured":"Beyer, D.: SV-Benchmarks: Benchmark set of the 2nd Intl. Competition on Software Testing (Test-Comp 2020). Zenodo (2020). \nhttps:\/\/doi.org\/10.5281\/zenodo.3678250","DOI":"10.5281\/zenodo.3678250"},{"key":"25_CR8","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Test suites from Test-Comp 2020 test-generation tools. Zenodo (2020). \nhttps:\/\/doi.org\/10.5281\/zenodo.3678275","DOI":"10.5281\/zenodo.3678275"},{"key":"25_CR9","doi-asserted-by":"publisher","unstructured":"Beyer, D., Chlipala, A.J., Henzinger, T.A., Jhala, R., Majumdar, R.: Generating tests from counterexamples. In: Proc. ICSE. pp. 326\u2013335. IEEE (2004). \nhttps:\/\/doi.org\/10.1109\/ICSE.2004.1317455","DOI":"10.1109\/ICSE.2004.1317455"},{"key":"25_CR10","doi-asserted-by":"publisher","unstructured":"Beyer, D., Jakobs, M.C.: CoVeriTest: Cooperative verifier-based testing. In: Proc. FASE. pp. 389\u2013408. LNCS 11424, Springer (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-16722-6_23","DOI":"10.1007\/978-3-030-16722-6_23"},{"key":"25_CR11","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: Software verification: Testing vs. model checking. In: Proc. HVC. pp. 99\u2013114. LNCS\u00a010629, Springer (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70389-3_7","DOI":"10.1007\/978-3-319-70389-3_7"},{"issue":"1","key":"25_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10009-017-0469-y","volume":"21","author":"D Beyer","year":"2017","unstructured":"Beyer, D., L\u00f6we, S., Wendler, P.: Reliable benchmarking: requirements and solutions. Int. J. Soft. Tools Technol. Transfer 21(1), 1\u201329 (2017). \nhttps:\/\/doi.org\/10.1007\/s10009-017-0469-y","journal-title":"Int. J. Soft. Tools Technol. Transfer"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Beyer, D., Wendler, P.: CPU Energy Meter: A tool for energy-aware algorithms engineering. In: Proc. TACAS (2). LNCS 12079, Springer (2020)","DOI":"10.1007\/978-3-030-45237-7_8"},{"key":"25_CR14","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: TestCov: Robust test-suite execution and coverage measurement. In: Proc. ASE. pp. 1074\u20131077. IEEE (2019). \nhttps:\/\/doi.org\/10.1109\/ASE.2019.00105","DOI":"10.1109\/ASE.2019.00105"},{"key":"25_CR15","doi-asserted-by":"publisher","unstructured":"B\u00fcrdek, J., Lochau, M., Bauregger, S., Holzer, A., von Rhein, A., Apel, S., Beyer, D.: Facilitating reuse in multi-goal test-suite generation for software product lines. In: Proc. FASE. pp. 84\u201399. LNCS 9033, Springer (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-46675-9_6","DOI":"10.1007\/978-3-662-46675-9_6"},{"key":"25_CR16","unstructured":"Cadar, C., Dunbar, D., Engler, D.R.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proc. OSDI. pp. 209\u2013224. USENIX Association (2008)"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Cadar, C., Nowack, M.: Klee symbolic execution engine (competition contribution). Int. J. Softw. Tools Technol, Transf (2020)","DOI":"10.1007\/s10009-020-00570-3"},{"key":"25_CR18","unstructured":"Chalupa, M., Vitovska, M., Ja\u0161ek, T., \u0160im\u00e1\u010dek, M., Strej\u010dek, J.: Symbiotic 6: Generating test-cases (competition contribution). Int. J. Softw. Tools Technol. Transf. (2020)"},{"key":"25_CR19","doi-asserted-by":"publisher","unstructured":"Chalupa, M., Strejcek, J., Vitovsk\u00e1, M.: Joint forces for memory safety checking. In: Proc. SPIN. pp. 115\u2013132. Springer (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-94111-0_7","DOI":"10.1007\/978-3-319-94111-0_7"},{"key":"25_CR20","doi-asserted-by":"publisher","unstructured":"Chowdhury, A.B., Medicherla, R.K., Venkatesh, R.: VeriFuzz: Program-aware fuzzing (competition contribution). In: Proc. TACAS (3). pp. 244\u2013249. LNCS 11429, Springer (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-17502-3_22","DOI":"10.1007\/978-3-030-17502-3_22"},{"key":"25_CR21","first-page":"207","volume":"9","author":"DR Cok","year":"2016","unstructured":"Cok, D.R., D\u00e9harbe, D., Weber, T.: The 2014 SMT competition. JSAT 9, 207\u2013242 (2016)","journal-title":"JSAT"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Gadelha, M.R., Menezes, R., Monteiro, F.R., Cordeiro, L., Nicole, D.: Esbmc: Scalable and precise test generation based on the floating-point theory (competition contribution). In: Proc. FASE. LNCS 12076, Springer (2020)","DOI":"10.1007\/978-3-030-45234-6_27"},{"issue":"1","key":"25_CR23","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10009-015-0407-9","volume":"19","author":"MYR Gadelha","year":"2015","unstructured":"Gadelha, M.Y.R., Ismail, H.I., Cordeiro, L.C.: Handling loops in bounded model checking of C programs via k-induction. Int. J. Softw. Tools Technol. Transfer 19(1), 97\u2013114 (2015). \nhttps:\/\/doi.org\/10.1007\/s10009-015-0407-9","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"25_CR24","doi-asserted-by":"publisher","unstructured":"Godefroid, P., Sen, K.: Combining model checking and testing. In: Handbook of Model Checking, pp. 613\u2013649. Springer (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-10575-8_19","DOI":"10.1007\/978-3-319-10575-8_19"},{"issue":"1","key":"25_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TSE.2004.1265732","volume":"30","author":"M Harman","year":"2004","unstructured":"Harman, M., Hu, L., Hierons, R.M., Wegener, J., Sthamer, H., Baresel, A., Roper, M.: Testability transformation. IEEE Trans. Software Eng. 30(1), 3\u201316 (2004). \nhttps:\/\/doi.org\/10.1109\/TSE.2004.1265732","journal-title":"IEEE Trans. Software Eng."},{"key":"25_CR26","doi-asserted-by":"publisher","unstructured":"Holzer, A., Schallhart, C., Tautschnig, M., Veith, H.: How did you specify your test suite. In: Proc. ASE. pp. 407\u2013416. ACM (2010). \nhttps:\/\/doi.org\/10.1145\/1858996.1859084","DOI":"10.1145\/1858996.1859084"},{"issue":"5","key":"25_CR27","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/s10009-014-0337-y","volume":"16","author":"F Howar","year":"2014","unstructured":"Howar, F., Isberner, M., Merten, M., Steffen, B., Beyer, D., P\u0103s\u0103reanu, C.S.: Rigorous examination of reactive systems. Int. J. Softw. Tools Technol. Transfer 16(5), 457\u2013464 (2014). \nhttps:\/\/doi.org\/10.1007\/s10009-014-0337-y","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"issue":"6","key":"25_CR28","doi-asserted-by":"publisher","first-page":"647","DOI":"10.1007\/s10009-015-0396-8","volume":"17","author":"M Huisman","year":"2015","unstructured":"Huisman, M., Klebanov, V., Monahan, R.: VerifyThis 2012: A program verification competition. STTT 17(6), 647\u2013657 (2015). \nhttps:\/\/doi.org\/10.1007\/s10009-015-0396-8","journal-title":"STTT"},{"key":"25_CR29","doi-asserted-by":"crossref","unstructured":"Jaffar, J., Maghareh, R., Godboley, S., Ha, X.L.: TracerX: Dynamic symbolic execution with interpolation (competition contribution). In: Proc. FASE. LNCS 12076, Springer (2020)","DOI":"10.1007\/978-3-030-45234-6_28"},{"key":"25_CR30","doi-asserted-by":"publisher","unstructured":"Jaffar, J., Murali, V., Navas, J.A., Santosa, A.E.: Tracer: A symbolic execution tool for verification. In: Proc. CAV. pp. 758\u2013766. LNCS 7358, Springer (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31424-7_61","DOI":"10.1007\/978-3-642-31424-7_61"},{"key":"25_CR31","doi-asserted-by":"crossref","unstructured":"Jakobs, M.C.: CoVeriTest with dynamic partitioning of the iteration time limit (competition contribution). In: Proc. FASE. LNCS 12076, Springer (2020)","DOI":"10.1007\/978-3-030-45234-6_30"},{"key":"25_CR32","doi-asserted-by":"publisher","unstructured":"Kifetew, F.M., Devroey, X., Rueda, U.: Java unit-testing tool competition: Seventh round. In: Proc. SBST. pp. 15\u201320. IEEE (2019). \nhttps:\/\/doi.org\/10.1109\/SBST.2019.00014","DOI":"10.1109\/SBST.2019.00014"},{"issue":"7","key":"25_CR33","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976). \nhttps:\/\/doi.org\/10.1145\/360248.360252","journal-title":"Commun. ACM"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"Le, H.M.: Llvm-based hybrid fuzzing with LibKluzzer (competition contribution). In: Proc. FASE. LNCS 12076, Springer (2020)","DOI":"10.1007\/978-3-030-45234-6_29"},{"key":"25_CR35","doi-asserted-by":"crossref","unstructured":"Lemberger, T.: Plain random test generation with PRTest (competition contribution). Int. J. Softw. Tools Technol. Transf. (2020)","DOI":"10.1007\/s10009-020-00568-x"},{"key":"25_CR36","doi-asserted-by":"crossref","unstructured":"Liu, D., Ernst, G., Murray, T., Rubinstein, B.: Legion: Best-first concolic testing (competition contribution). In: Proc. FASE. LNCS 12076, Springer (2020)","DOI":"10.1007\/978-3-030-45234-6_31"},{"key":"25_CR37","doi-asserted-by":"crossref","unstructured":"Ruland, S., Lochau, M., Jakobs, M.C.: HybridTiger: Hybrid model checking and domination-based partitioning for efficient multi-goal test-suite generation (competition contribution). In: Proc. FASE. LNCS 12076, Springer (2020)","DOI":"10.1007\/978-3-030-45234-6_26"},{"issue":"1","key":"25_CR38","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MSP.2016.14","volume":"14","author":"J Song","year":"2016","unstructured":"Song, J., Alves-Foss, J.: The DARPA cyber grand challenge: A competitor\u2019s perspective, part 2. IEEE Security and Privacy 14(1), 76\u201381 (2016). \nhttps:\/\/doi.org\/10.1109\/MSP.2016.14","journal-title":"IEEE Security and Privacy"},{"key":"25_CR39","doi-asserted-by":"publisher","unstructured":"Stump, A., Sutcliffe, G., Tinelli, C.: StarExec: A\u00a0cross-community infrastructure for logic solving. In: Proc. IJCAR, pp. 367\u2013373. LNCS\u00a08562, Springer (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-08587-6_28","DOI":"10.1007\/978-3-319-08587-6_28"},{"issue":"2","key":"25_CR40","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1609\/aimag.v37i2.2620","volume":"37","author":"G Sutcliffe","year":"2016","unstructured":"Sutcliffe, G.: The CADE ATP system competition: CASC. AI Magazine 37(2), 99\u2013101 (2016)","journal-title":"AI Magazine"},{"key":"25_CR41","doi-asserted-by":"publisher","unstructured":"Visser, W., P\u0103s\u0103reanu, C.S., Khurshid, S.: Test-input generation with Java PathFinder. In: Proc. ISSTA. pp. 97\u2013107. ACM (2004). \nhttps:\/\/doi.org\/10.1145\/1007512.1007526","DOI":"10.1145\/1007512.1007526"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45234-6_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T12:23:57Z","timestamp":1597148637000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45234-6_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030452339","9783030452346"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45234-6_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.etaps.org\/2020\/fase","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference could not take place due to the COVID-19 pandemic. There was an online event on July 2, 2020.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}