{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:26:29Z","timestamp":1757453189548,"version":"3.40.3"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030793784"},{"type":"electronic","value":"9783030793791"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79379-1_5","type":"book-chapter","created":{"date-parts":[[2021,6,17]],"date-time":"2021-06-17T18:04:00Z","timestamp":1623953040000},"page":"72-84","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Using a Guided Fuzzer and Preconditions to Achieve Branch Coverage with Valid Inputs"],"prefix":"10.1007","author":[{"given":"Amirfarhad","family":"Nilizadeh","sequence":"first","affiliation":[]},{"given":"Gary T.","family":"Leavens","sequence":"additional","affiliation":[]},{"given":"Corina S.","family":"P\u0103s\u0103reanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-319-49812-6_12","volume-title":"Deductive Software Verification \u2013 The KeY Book","author":"W Ahrendt","year":"2016","unstructured":"Ahrendt, W., Gladisch, C., Herda, M.: Proof-based test case generation. Deductive Software Verification \u2013 The KeY Book. LNCS, vol. 10001, pp. 415\u2013451. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49812-6_12"},{"issue":"2\u20133","key":"5_CR2","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.tcs.2004.11.007","volume":"336","author":"C Artho","year":"2005","unstructured":"Artho, C., et al.: Combining test case generation and runtime verification. Theor. Comput. Sci. 336(2\u20133), 209\u2013234 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/11836810_25","volume-title":"Information Security","author":"G Banks","year":"2006","unstructured":"Banks, G., Cova, M., Felmetsger, V., Almeroth, K., Kemmerer, R., Vigna, G.: SNOOZE: toward a Stateful NetwOrk prOtocol fuzZEr. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 343\u2013358. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11836810_25"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-030-03427-6_12","volume-title":"Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice","author":"S Bardin","year":"2018","unstructured":"Bardin, S., Kosmatov, N., Marre, B., Mentr\u00e9, D., Williams, N.: Test case generation with PathCrawler\/LTest: how to automate an industrial testing process. In: Margaria, T., Steffen, B. (eds.) ISoLA 2018. LNCS, vol. 11247, pp. 104\u2013120. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03427-6_12"},{"issue":"4","key":"5_CR5","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1145\/566171.566191","volume":"27","author":"C Boyapati","year":"2002","unstructured":"Boyapati, C., Khurshid, S., Marinov, D.: Korat: automated testing based on Java predicates. ACM SIGSOFT Softw. Eng. Notes 27(4), 123\u2013133 (2002)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-31848-4_2","volume-title":"Formal Approaches to Software Testing","author":"AD Brucker","year":"2005","unstructured":"Brucker, A.D., Wolff, B.: Symbolic test case generation for primitive recursive functions. In: Grabowski, J., Nielsen, B. (eds.) FATES 2004. LNCS, vol. 3395, pp. 16\u201332. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-31848-4_2"},{"key":"5_CR7","unstructured":"BuggyJavaJML. https:\/\/github.com\/Amirfarhad-Nilizadeh\/BuggyJavaJML. Accessed 05 May 2021"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-662-46675-9_6","volume-title":"Fundamental Approaches to Software Engineering","author":"J B\u00fcrdek","year":"2015","unstructured":"B\u00fcrdek, J., et al.: Facilitating reuse in multi-goal test-suite generation for software product lines. In: Egyed, A., Schaefer, I. (eds.) FASE 2015. LNCS, vol. 9033, pp. 84\u201399. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46675-9_6"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/s10009-004-0167-4","volume":"7","author":"L Burdy","year":"2005","unstructured":"Burdy, L., et al.: An overview of JML tools and applications. Int. J. Softw. Tools Technol. Transfer 7(3), 212\u2013232 (2005). https:\/\/doi.org\/10.1007\/s10009-004-0167-4","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Cadar, C., et al.: Symbolic execution for software testing in practice: preliminary assessment. In: 2011 33rd International Conference on Software Engineering (ICSE), pp. 1066\u20131071. IEEE (2011)","DOI":"10.1145\/1985793.1985995"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing mayhem on binary code. In: 2012 IEEE Symposium on Security and Privacy, pp. 380\u2013394. IEEE (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"5_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/11804192_16","volume-title":"Formal Methods for Components and Objects","author":"P Chalin","year":"2006","unstructured":"Chalin, P., Kiniry, J.R., Leavens, G.T., Poll, E.: Beyond assertions: advanced specification and verification with JML and ESC\/Java2. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2005. LNCS, vol. 4111, pp. 342\u2013363. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11804192_16"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/3-540-47993-7_10","volume-title":"ECOOP 2002\u2014Object-Oriented Programming","author":"Y Cheon","year":"2002","unstructured":"Cheon, Y., Leavens, G.T.: A simple and practical approach to unit testing: the JML and JUnit way. In: Magnusson, B. (ed.) ECOOP 2002. LNCS, vol. 2374, pp. 231\u2013255. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-47993-7_10"},{"key":"5_CR14","unstructured":"Cheon, Y., Leavens, G.T.: The JML and JUnit way of unit testing and its implementation. Technical report TR# 04\u201302a, Department of Computer Science (2004)"},{"issue":"3","key":"5_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1127878.1127900","volume":"31","author":"LA Clarke","year":"2006","unstructured":"Clarke, L.A., Rosenblum, D.S.: A historical perspective on runtime assertion checking in software development. ACM SIGSOFT Softw. Eng. Notes 31(3), 25\u201337 (2006)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"issue":"6","key":"5_CR16","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1007\/s10009-010-0138-x","volume":"12","author":"DR Cok","year":"2010","unstructured":"Cok, D.R.: Improved usability and performance of SMT solvers for debugging specifications. Int. J. Softw. Tools Technol. Transfer 12(6), 467\u2013481 (2010). https:\/\/doi.org\/10.1007\/s10009-010-0138-x","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"5_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-642-20398-5_35","volume-title":"NASA Formal Methods","author":"DR Cok","year":"2011","unstructured":"Cok, D.R.: OpenJML: JML for Java 7 by extending OpenJDK. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 472\u2013479. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_35"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Corina, J., et al.: DIFUZE: interface aware fuzzing for kernel drivers. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2123\u20132138 (2017)","DOI":"10.1145\/3133956.3134069"},{"issue":"1\u20133","key":"5_CR19","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"MD Ernst","year":"2007","unstructured":"Ernst, M.D., et al.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1\u20133), 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Fraser, G., Arcuri, A.: EvoSuite: automatic test suite generation for object-oriented software. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, pp. 416\u2013419 (2011)","DOI":"10.1145\/2025113.2025179"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Fraser, G., Arcuri, A.: EvoSuite: on the challenges of test case generation in the real world. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp. 362\u2013369. IEEE (2013)","DOI":"10.1109\/ICST.2013.51"},{"issue":"2","key":"5_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2685612","volume":"24","author":"G Fraser","year":"2014","unstructured":"Fraser, G., Arcuri, A.: A large-scale evaluation of automated unit test generation using evosuite. ACM Trans. Softw. Eng. Methodol. (TOSEM) 24(2), 1\u201342 (2014)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Gligoric, M., Gvero, T., Jagannath, V., Khurshid, S., Kuncak, V., Marinov, D.: Test generation through programming in UDITA. In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, vol. 1, pp. 225\u2013234 (2010)","DOI":"10.1145\/1806799.1806835"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 213\u2013223 (2005)","DOI":"10.1145\/1064978.1065036"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Peleg, H., Singh, R.: Learn&Fuzz: machine learning for input fuzzing. In: 2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 50\u201359. IEEE (2017)","DOI":"10.1109\/ASE.2017.8115618"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-319-17524-9_15","volume-title":"NASA Formal Methods","author":"A Groce","year":"2015","unstructured":"Groce, A., Pinto, J.: A little language for testing. In: Havelund, K., Holzmann, G., Joshi, R. (eds.) NFM 2015. LNCS, vol. 9058, pp. 204\u2013218. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17524-9_15"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Groce, A., Pinto, J., Azimi, P., Mittal, P.: TSTL: a language and tool for testing. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 414\u2013417 (2015)","DOI":"10.1145\/2771783.2784769"},{"key":"5_CR28","unstructured":"Hoffmann, M.R., Mandrikov, E., Friedenhagen, M.: Java Code Coverage for Eclipse. https:\/\/www.eclemma.org\/jacoco\/. Accessed 05 May 2021"},{"issue":"1","key":"5_CR29","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10009-016-0445-y","volume":"20","author":"J Holmes","year":"2016","unstructured":"Holmes, J., et al.: TSTL: the template scripting testing language. Int. J. Softw. Tools Technol. Transfer 20(1), 57\u201378 (2016). https:\/\/doi.org\/10.1007\/s10009-016-0445-y","journal-title":"Int. J. Softw. Tools Technol. Transfer"},{"key":"5_CR30","unstructured":"Google Inc., et al.: Google\/syzkaller. https:\/\/github.com\/google\/syzkaller. Accessed 05 May 2021"},{"key":"5_CR31","unstructured":"Java-JML. https:\/\/github.com\/Amirfarhad-Nilizadeh\/Java-JML. Accessed 05 May 2021"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Johansson, W., Svensson, M., Larson, U.E., Almgren, M., Gulisano, V.: T-Fuzz: model-based fuzzing for robustness testing of telecommunication protocols. In: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation, pp. 323\u2013332. IEEE (2014)","DOI":"10.1109\/ICST.2014.45"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Kersten, R., Luckow, K., P\u0103s\u0103reanu, C.S.: POSTER: AFL-based fuzzing for Java with Kelinci. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2511\u20132513 (2017)","DOI":"10.1145\/3133956.3138820"},{"key":"5_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/978-3-030-60508-7_17","volume-title":"Runtime Verification","author":"N Kosmatov","year":"2020","unstructured":"Kosmatov, N., Maurica, F., Signoles, J.: Efficient runtime assertion checking for properties over mathematical numbers. In: Deshmukh, J., Ni\u010dkovi\u0107, D. (eds.) RV 2020. LNCS, vol. 12399, pp. 310\u2013322. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60508-7_17"},{"key":"5_CR35","unstructured":"Kwong, G., Ruderman, J., Carette, A.: MozillaSecurity\/funfuzz. https:\/\/github.com\/MozillaSecurity\/funfuzz. Accessed 05 May 2021"},{"issue":"4","key":"5_CR36","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/3364452.3364455","volume":"44","author":"XBD Le","year":"2019","unstructured":"Le, X.B.D., Pasareanu, C., Padhye, R., Lo, D., Visser, W., Sen, K.: SAFFRON: adaptive grammar-based fuzzing for worst-case analysis. ACM SIGSOFT Softw. Eng. Notes 44(4), 14\u201314 (2019)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"5_CR37","series-title":"The Springer International Series in Engineering and Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-1-4615-5229-1_12","volume-title":"Behavioral Specifications of Businesses and Systems","author":"GT Leavens","year":"1999","unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: JML: a notation for detailed design. In: Kilov, H., Rumpe, B., Simmonds, I. (eds.) Behavioral Specifications of Businesses and Systems. SECS, vol. 523, pp. 175\u2013188. Springer, Boston (1999). https:\/\/doi.org\/10.1007\/978-1-4615-5229-1_12"},{"issue":"3","key":"5_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1127878.1127884","volume":"31","author":"GT Leavens","year":"2006","unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: Preliminary design of JML: a behavioral interface specification language for Java. ACM SIGSOFT Softw. Eng. Notes 31(3), 1\u201338 (2006)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"5_CR39","unstructured":"Leavens, G.T., Cheon, Y.: Design by contract with JML (2006). https:\/\/www.cs.ucf.edu\/~leavens\/JML\/\/jmldbc.pdf"},{"issue":"1\u20133","key":"5_CR40","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.scico.2004.05.015","volume":"55","author":"GT Leavens","year":"2005","unstructured":"Leavens, G.T., Cheon, Y., Clifton, C., Ruby, C., Cok, D.R.: How the design of JML accommodates both runtime assertion checking and formal verification. Sci. Comput. Program. 55(1\u20133), 185\u2013208 (2005)","journal-title":"Sci. Comput. Program."},{"key":"5_CR41","doi-asserted-by":"crossref","unstructured":"Leavens, G.T., Ruby, C., Leino, K.R.M., Poll, E., Jacobs, B.: JML (poster session) notations and tools supporting detailed design in JAVA. In: Addendum to the 2000 Proceedings of the Conference on Object-Oriented Programming, Systems, Languages, and Applications (Addendum), pp. 105\u2013106 (2000)","DOI":"10.1145\/367845.367996"},{"issue":"5","key":"5_CR42","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebraic Program. 78(5), 293\u2013303 (2009)","journal-title":"J. Log. Algebraic Program."},{"key":"5_CR43","doi-asserted-by":"publisher","unstructured":"Li, J., Zhao, B., Zhang, C.: Fuzzing: a survey. Cybersecurity 1(1) (2018). Article number: 6. https:\/\/doi.org\/10.1186\/s42400-018-0002-y","DOI":"10.1186\/s42400-018-0002-y"},{"issue":"3","key":"5_CR44","doi-asserted-by":"publisher","first-page":"1199","DOI":"10.1109\/TR.2018.2834476","volume":"67","author":"H Liang","year":"2018","unstructured":"Liang, H., Pei, X., Jia, X., Shen, W., Zhang, J.: Fuzzing: state of the art. IEEE Trans. Reliab. 67(3), 1199\u20131218 (2018)","journal-title":"IEEE Trans. Reliab."},{"key":"5_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-030-50995-8_6","volume-title":"Tests and Proofs","author":"D Ly","year":"2020","unstructured":"Ly, D., Kosmatov, N., Loulergue, F., Signoles, J.: Verified runtime assertion checking for memory properties. In: Ahrendt, W., Wehrheim, H. (eds.) TAP 2020. LNCS, vol. 12165, pp. 100\u2013121. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50995-8_6"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Meinke, K., Sindhu, M.A.: LBTest: a learning-based testing tool for reactive systems. In: 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, pp. 447\u2013454. IEEE (2013)","DOI":"10.1109\/ICST.2013.62"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Milicevic, A., Misailovic, S., Marinov, D., Khurshid, S.: Korat: a tool for generating structurally complex test inputs. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 771\u2013774. IEEE (2007)","DOI":"10.1109\/ICSE.2007.48"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Nagy, S., Hicks, M.: Full-speed fuzzing: reducing fuzzing overhead through coverage-guided tracing. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 787\u2013802. IEEE (2019)","DOI":"10.1109\/SP.2019.00069"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Nguyen, H.A., Dyer, R., Nguyen, T.N., Rajan, H.: Mining preconditions of APIs in large-scale code corpus. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 166\u2013177 (2014)","DOI":"10.1145\/2635868.2635924"},{"key":"5_CR50","unstructured":"Nilizadeh, A.: JMLKelinci. http:\/\/github.com\/Amirfarhad-Nilizadeh\/JMLKelinci. Accessed 05 May 2021"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Nilizadeh, A., Leavens, G., Le, X.B., Pasareanu, C., Cok, D.: Exploring true test overfitting in dynamic automated program repair using formal methods. In: 2021 14th IEEE Conference on Software Testing, Validation and Verification (ICST). IEEE (2021)","DOI":"10.1109\/ICST49551.2021.00033"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Nilizadeh, S., Noller, Y., Pasareanu, C.S.: DifFuzz: differential fuzzing for side-channel analysis. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 176\u2013187. IEEE (2019)","DOI":"10.1109\/ICSE.2019.00034"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Noller, Y., Kersten, R., P\u0103s\u0103reanu, C.S.: Badger: complexity analysis with fuzzing and symbolic execution. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 322\u2013332 (2018)","DOI":"10.1145\/3213846.3213868"},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Ernst, M.D.: Randoop: feedback-directed random testing for Java. In: Companion to the 22nd ACM SIGPLAN Conference on Object-Oriented Programming Systems and Applications Companion, pp. 815\u2013816 (2007)","DOI":"10.1145\/1297846.1297902"},{"key":"5_CR55","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Lahiri, S.K., Ernst, M.D., Ball, T.: Feedback-directed random test generation. In: 29th International Conference on Software Engineering (ICSE 2007), pp. 75\u201384. IEEE (2007)","DOI":"10.1109\/ICSE.2007.37"},{"key":"5_CR56","doi-asserted-by":"crossref","unstructured":"Peters, D., Parnas, D.L.: Generating a test oracle from program documentation: work in progress. In: Proceedings of the 1994 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 58\u201365 (1994)","DOI":"10.1145\/186258.186508"},{"key":"5_CR57","unstructured":"Rajpal, M., Blum, W., Singh, R.: Not all bytes are equal: neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596 (2017)"},{"key":"5_CR58","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C., Bos, H.: VUzzer: application-aware evolutionary fuzzing. In: NDSS, vol. 17, pp. 1\u201314 (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"5_CR59","doi-asserted-by":"crossref","unstructured":"Stephens, N., et al.: Driller: augmenting fuzzing through selective symbolic execution. In: NDSS, vol. 16, pp. 1\u201316 (2016)","DOI":"10.14722\/ndss.2016.23368"},{"key":"5_CR60","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-030-45237-7_23","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"W Visser","year":"2020","unstructured":"Visser, W., Geldenhuys, J.: COASTAL: combining concolic and fuzzing for Java (competition contribution). In: Biere, A., Parker, D. (eds.) TACAS 2020. LNCS, vol. 12079, pp. 373\u2013377. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45237-7_23"},{"key":"5_CR61","doi-asserted-by":"crossref","unstructured":"Visser, W., P\u01ces\u01cereanu, C.S., Khurshid, S.: Test input generation with Java pathfinder. In: Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 97\u2013107 (2004)","DOI":"10.1145\/1013886.1007526"},{"key":"5_CR62","doi-asserted-by":"crossref","unstructured":"Wang, T., Wei, T., Gu, G., Zou, W.: TaintScope: a checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: 2010 IEEE Symposium on Security and Privacy, pp. 497\u2013512. IEEE (2010)","DOI":"10.1109\/SP.2010.37"},{"key":"5_CR63","doi-asserted-by":"crossref","unstructured":"Wang, X., Hu, C., Ma, R., Li, B., Wang, X.: LAFuzz: neural network for efficient fuzzing. In: 2020 IEEE 32nd International Conference on Tools with Artificial Intelligence (ICTAI), pp. 603\u2013611. IEEE (2020)","DOI":"10.1109\/ICTAI50040.2020.00098"},{"key":"5_CR64","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-540-24617-6_6","volume-title":"Formal Approaches to Software Testing","author":"G Xu","year":"2004","unstructured":"Xu, G., Yang, Z.: JMLAutoTest: a novel automated testing framework based on JML and JUnit. In: Petrenko, A., Ulrich, A. (eds.) FATES 2003. LNCS, vol. 2931, pp. 70\u201385. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24617-6_6"},{"key":"5_CR65","doi-asserted-by":"publisher","first-page":"117029","DOI":"10.1109\/ACCESS.2019.2936235","volume":"7","author":"T Yue","year":"2019","unstructured":"Yue, T., Tang, Y., Yu, B., Wang, P., Wang, E.: LearnAFL: greybox fuzzing with knowledge enhancement. IEEE Access 7, 117029\u2013117043 (2019)","journal-title":"IEEE Access"},{"key":"5_CR66","unstructured":"Zalewski, M.: Technical \u201cwhitepaper\u201d for afl-fuzz (2014). http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt"},{"key":"5_CR67","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-18070-5_13","volume-title":"Formal Verification of Object-Oriented Software","author":"DM Zimmerman","year":"2011","unstructured":"Zimmerman, D.M., Nagmoti, R.: JMLUnit: the next generation. In: Beckert, B., March\u00e9, C. (eds.) FoVeOOS 2010. LNCS, vol. 6528, pp. 183\u2013197. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-18070-5_13"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79379-1_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T23:05:03Z","timestamp":1624143903000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79379-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030793784","9783030793791"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79379-1_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"18 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Tests and Proofs","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tap2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.univ-orleans.fr\/lifo\/events\/TAP2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}