{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T21:06:01Z","timestamp":1776373561071,"version":"3.51.2"},"publisher-location":"Cham","reference-count":42,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031661488","type":"print"},{"value":"9783031661495","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,13]],"date-time":"2024-10-13T00:00:00Z","timestamp":1728777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-66149-5_14","type":"book-chapter","created":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T07:01:54Z","timestamp":1728716514000},"page":"248-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Test-Case Generation with Automata-Based Software Model Checking"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-7716-3898","authenticated-orcid":false,"given":"Max","family":"Barth","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5890-4673","authenticated-orcid":false,"given":"Marie-Christine","family":"Jakobs","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,10,13]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Alshmrany, K.M., Aldughaim, M., Bhayat, A., Cordeiro, L.C.: FuSeBMC: an energy-efficient test generator for finding security vulnerabilities in C programs. In: Loulergue, F., Wotawa, F. (eds.) TAP 2021, pp. 85\u2013105. LNCS, vol.\u00a012740. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-79379-1_6","DOI":"10.1007\/978-3-030-79379-1_6"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Alshmrany, K.M., Aldughaim, M., Bhayat, A., Shmarov, F., Aljaafari, F., Cordeiro, L.C.: FuSeBMC v4: Improving code coverage with smart seeds via fuzzing and static analysis. CoRR abs\/2206.14068 (2022). https:\/\/doi.org\/10.48550\/arXiv.2206.14068","DOI":"10.48550\/arXiv.2206.14068"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Barrett, C.W., et al.: CVC4. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 171\u2013177. Springer, Cham (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_14","DOI":"10.1007\/978-3-642-22110-1_14"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Barth, M., Jakobs, M.: Replication package for paper \u201cTest-case generation with automata-based software model checking\u201d SPIN 24 (2024). https:\/\/doi.org\/10.5281\/zenodo.10574234","DOI":"10.5281\/zenodo.10574234"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Competition on software verification and witness validation: SV-COMP 2023. In: Sankaranarayanan, S., Sharygina, N. (eds.) TACAS 2023. LNCS, vol.\u00a013994, pp. 495\u2013522. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30820-8_29","DOI":"10.1007\/978-3-031-30820-8_29"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Software testing: 5th comparative evaluation: test-Comp 2023. In: Lambers, L., Uchitel, S. (eds.) FASE 2023. LNCS, vol. 13991, pp. 309\u2013323. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30826-0_17","DOI":"10.1007\/978-3-031-30826-0_17"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Beyer, D., Chlipala, A., Henzinger, T.A., Jhala, R., Majumdar, R.: Generating tests from counterexamples. In: Proc. ICSE, pp. 326\u2013335. IEEE (2004). https:\/\/doi.org\/10.1109\/ICSE.2004.1317455","DOI":"10.1109\/ICSE.2004.1317455"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Beyer, D., Holzer, A., Tautschnig, M., Veith, H.: Information reuse for multi-goal reachability analyses. In: Felleisen, M., Gardner, P. (eds.) ESOP 2013, LNCS, vol.\u00a07792, pp. 472\u2013491. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-642-37036-6_26","DOI":"10.1007\/978-3-642-37036-6_26"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Beyer, D., Jakobs, M.: CoVeriTest: cooperative verifier-based testing. In: H\u00e4hnle, R., van der Aalst, W. (eds.) FASE 2019. LNCS, vol. 11424, pp. 389\u2013408. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16722-6_23","DOI":"10.1007\/978-3-030-16722-6_23"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Beyer, D., Keremoglu, M.E.: CPAchecker: a tool for configurable software verification. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 184\u2013190. Springer, Cham (2011). https:\/\/doi.org\/10.1007\/978-3-642-22110-1_16","DOI":"10.1007\/978-3-642-22110-1_16"},{"key":"14_CR11","unstructured":"Beyer, D., Keremoglu, M.E., Wendler, P.: Predicate abstraction with adjustable-block encoding. In: Proc. FMCAD, pp. 189\u2013197. IEEE (2010). https:\/\/ieeexplore.ieee.org\/document\/5770949\/"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: Conditional testing - off-the-shelf combination of test-case generators. In: Chen, Y.F., Cheng, C.H., Esparza, J. (eds.) ATVA 2019, pp. 189\u2013208. LNCS, vol.\u00a011781. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31784-3_11","DOI":"10.1007\/978-3-030-31784-3_11"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: TestCov: robust test-suite execution and coverage measurement. In: Proc. ASE, pp. 1074\u20131077. IEEE (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00105","DOI":"10.1109\/ASE.2019.00105"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Beyer, D., L\u00f6we, S.: Explicit-state software model checking based on CEGAR and interpolation. In: Cortellessa, V., Varr\u00f3, D. (eds) FASE 2013. LNCS, vol. 7793, pp. 146\u2013162. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-642-37057-1_11","DOI":"10.1007\/978-3-642-37057-1_11"},{"issue":"1","key":"14_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10009-017-0469-y","volume":"21","author":"D Beyer","year":"2019","unstructured":"Beyer, D., L\u00f6we, S., Wendler, P.: Reliable benchmarking: Requirements and solutions. STTT 21(1), 1\u201329 (2019). https:\/\/doi.org\/10.1007\/s10009-017-0469-y","journal-title":"Reliable benchmarking: Requirements and solutions. STTT"},{"key":"14_CR16","unstructured":"Cadar, C., Dunbar, D., Engler, D.R.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proc. OSDI, pp. 209\u2013224. USENIX Association (2008). http:\/\/www.usenix.org\/events\/osdi08\/tech\/full_papers\/cadar\/cadar.pdf"},{"key":"14_CR17","doi-asserted-by":"publisher","unstructured":"Chalupa, M., Vitovsk\u00e1, M., Strejcek, J.: SYMBIOTIC 5: boosted instrumentation - (competition contribution). In: Beyer, D., Huisman, M. (eds.) TACAS 2018, pp. 442\u2013446. LNCS, vol.\u00a010806. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89963-3_29","DOI":"10.1007\/978-3-319-89963-3_29"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Christ, J., Hoenicke, J., Nutz, A.: SMTInterpol: an interpolating SMT solver. In: Donaldson, A., Parker, D. (eds.) SPIN. LNCS, vol.\u00a07385, pp. 248\u2013254. Springer, Cham (2012). https:\/\/doi.org\/10.1007\/978-3-642-31759-0_19","DOI":"10.1007\/978-3-642-31759-0_19"},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Cimatti, A., Griggio, A., Schaafsma, B.J., Sebastiani, R.: The MathSAT5 SMT solver. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013, pp. 93\u2013107. LNCS, vol.\u00a07795. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-642-36742-7_7","DOI":"10.1007\/978-3-642-36742-7_7"},{"issue":"4","key":"14_CR20","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1145\/115372.115320","volume":"13","author":"R Cytron","year":"1991","unstructured":"Cytron, R., Ferrante, J., Rosen, B.K., Wegman, M.N., Zadeck, F.K.: Efficiently computing static single assignment form and the control dependence graph. TOPLAS 13(4), 451\u2013490 (1991). https:\/\/doi.org\/10.1145\/115372.115320","journal-title":"TOPLAS"},{"key":"14_CR21","doi-asserted-by":"publisher","unstructured":"Daca, P., Gupta, A., Henzinger, T.A.: Abstraction-driven concolic testing. In: Jobstmann, B., Leino, K. (eds.) VMCAI 2016. LNCS, vol.\u00a09583, pp. 328\u2013347. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-662-49122-5_16","DOI":"10.1007\/978-3-662-49122-5_16"},{"issue":"1","key":"14_CR22","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TSE.2004.1265732","volume":"30","author":"M Harman","year":"2004","unstructured":"Harman, M., et al.: Testability transformation. IEEE TSE 30(1), 3\u201316 (2004). https:\/\/doi.org\/10.1109\/TSE.2004.1265732","journal-title":"Testability transformation. IEEE TSE"},{"issue":"2","key":"14_CR23","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TSSC.1968.300136","volume":"4","author":"PE Hart","year":"1968","unstructured":"Hart, P.E., Nilsson, N.J., Raphael, B.: A formal basis for the heuristic determination of minimum cost paths. TSSC 4(2), 100\u2013107 (1968). https:\/\/doi.org\/10.1109\/TSSC.1968.300136","journal-title":"TSSC"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Hart, P.E., Nilsson, N.J., Raphael, B.: Correction to \u201ca formal basis for the heuristic determination of minimum cost paths.\u201d SIGART Newsl. 37, 28\u201329 (1972). https:\/\/doi.org\/10.1145\/1056777.1056779","DOI":"10.1145\/1056777.1056779"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Heizmann, M., et al.: Ultimate automizer and the CommuHash normal form - (competition contribution). In: Sankaranarayanan, S., Sharygina, N. (eds.) TACAS 2023. LNCS, vol.\u00a013994, pp. 577\u2013581. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30820-8_39","DOI":"10.1007\/978-3-031-30820-8_39"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Heizmann, M., Hoenicke, J., Podelski, A.: Refinement of trace abstraction. In: Palsberg, J., Su, Z. (eds.) SAS 2009. LNCS, vol.\u00a05673, pp. 69\u201385. Springer, Cham (2009). https:\/\/doi.org\/10.1007\/978-3-642-03237-0_7","DOI":"10.1007\/978-3-642-03237-0_7"},{"key":"14_CR27","doi-asserted-by":"publisher","unstructured":"Heizmann, M., Hoenicke, J., Podelski, A.: Software model checking for people who love automata. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol.\u00a08044, pp. 36\u201352. Springer, Cham (2013). https:\/\/doi.org\/10.1007\/978-3-642-39799-8_2","DOI":"10.1007\/978-3-642-39799-8_2"},{"key":"14_CR28","doi-asserted-by":"publisher","unstructured":"Holzer, A., Schallhart, C., Tautschnig, M., Veith, H.: Query-driven program testing. In: Jones, N.D., M\u00fcller-Olm, M. (eds.) VMCAI 2009. LNCS, vol.\u00a05403, pp. 151\u2013166. Springer, Cham (2009). https:\/\/doi.org\/10.1007\/978-3-540-93900-9_15","DOI":"10.1007\/978-3-540-93900-9_15"},{"key":"14_CR29","doi-asserted-by":"publisher","unstructured":"Holzer, A., Schallhart, C., Tautschnig, M., Veith, H.: How did you specify your test suite. In: Proc. ASE, pp. 407\u2013416. ACM (2010). https:\/\/doi.org\/10.1145\/1858996.1859084","DOI":"10.1145\/1858996.1859084"},{"issue":"7","key":"14_CR30","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976). https:\/\/doi.org\/10.1145\/360248.360252","journal-title":"Commun. ACM"},{"key":"14_CR31","doi-asserted-by":"publisher","unstructured":"Kroening, D., Schrammel, P., Tautschnig, M.: CBMC: the C bounded model checker. CoRR abs\/2302.02384 (2023). https:\/\/doi.org\/10.48550\/arXiv.2302.02384","DOI":"10.48550\/arXiv.2302.02384"},{"issue":"6","key":"14_CR32","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1007\/s10009-020-00568-x","volume":"23","author":"T Lemberger","year":"2021","unstructured":"Lemberger, T.: Plain random test generation with PRTest. STTT 23(6), 871\u2013873 (2021). https:\/\/doi.org\/10.1007\/s10009-020-00568-x","journal-title":"STTT"},{"issue":"1","key":"14_CR33","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/s42400-018-0002-y","volume":"1","author":"J Li","year":"2018","unstructured":"Li, J., Zhao, B., Zhang, C.: Fuzzing: a survey. Cybersecurity 1(1), 6 (2018). https:\/\/doi.org\/10.1186\/s42400-018-0002-y","journal-title":"Cybersecurity"},{"issue":"2","key":"14_CR34","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1002\/stvr.294","volume":"14","author":"P McMinn","year":"2004","unstructured":"McMinn, P.: Search-based software test data generation: a survey. STVR 14(2), 105\u2013156 (2004). https:\/\/doi.org\/10.1002\/stvr.294","journal-title":"STVR"},{"key":"14_CR35","doi-asserted-by":"publisher","unstructured":"Metta, R., Medicherla, R.K., Karmarkar, H.: VeriFuzz: Good seeds for fuzzing (competition contribution). In: Johnsen, E.B., Wimmer, M. (eds.) FASE 2022. LNCS, vol.\u00a013241, pp. 341\u2013346. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99429-7_20","DOI":"10.1007\/978-3-030-99429-7_20"},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"de\u00a0Moura, L.M., Bj\u00f8rner, N.S.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Cham (2008). https:\/\/doi.org\/10.1007\/978-3-540-78800-3_24","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"14_CR37","doi-asserted-by":"publisher","unstructured":"Pacheco, C., Lahiri, S.K., Ernst, M.D., Ball, T.: Feedback-directed random test generation. In: Proc. ICSE, pp. 75\u201384. IEEE (2007). https:\/\/doi.org\/10.1109\/ICSE.2007.37","DOI":"10.1109\/ICSE.2007.37"},{"issue":"4","key":"14_CR38","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s10009-009-0118-1","volume":"11","author":"CS Pasareanu","year":"2009","unstructured":"Pasareanu, C.S., Visser, W.: A survey of new trends in symbolic execution for software testing and analysis. STTT 11(4), 339\u2013353 (2009). https:\/\/doi.org\/10.1007\/s10009-009-0118-1","journal-title":"STTT"},{"issue":"6","key":"14_CR39","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/s10009-020-00574-z","volume":"23","author":"S Ruland","year":"2021","unstructured":"Ruland, S., Lochau, M., Fehse, O., Sch\u00fcrr, A.: CPA\/Tiger-MGP: test-goal set partitioning for efficient multi-goal test-suite generation. STTT 23(6), 853\u2013856 (2021). https:\/\/doi.org\/10.1007\/s10009-020-00574-z","journal-title":"STTT"},{"key":"14_CR40","doi-asserted-by":"publisher","unstructured":"Ruland, S., Lochau, M., Jakobs, M.: HybridTiger: hybrid model checking and domination-based partitioning for efficient multi-goal test-suite generation (competition contribution). In: Wehrheim, H., Cabot, J. (eds.) Proc. FASE. LNCS, vol. 12076, pp. 520\u2013524. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45234-6_26","DOI":"10.1007\/978-3-030-45234-6_26"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Visser, W., P\u0103s\u0103reanu, C.S., Khurshid, S.: Test input generation with Java PathFinder. In: Proc. ISSTA, pp. 97\u2013107. ACM (2004). https:\/\/doi.org\/10.1145\/1007512.1007526","DOI":"10.1145\/1007512.1007526"},{"key":"14_CR42","unstructured":"Zeller, A., Gopinath, R., B\u00f6hme, M., Fraser, G., Holler, C.: The Fuzzing Book. CISPA Helmholtz Center for Information Security (2023). https:\/\/www.fuzzingbook.org\/, retrieved 2023-01-07 14:37:57+01:00"}],"container-title":["Lecture Notes in Computer Science","Model Checking Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-66149-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,12]],"date-time":"2024-10-12T07:06:57Z","timestamp":1728716817000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-66149-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,13]]},"ISBN":["9783031661488","9783031661495"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-66149-5_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,13]]},"assertion":[{"value":"13 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"All experimental data, all used software as well as the test tasks are publicly available in our supplementary artifact\u00a0[].","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data-Availability Statement"}},{"value":"SPIN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Model Checking Software","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spin2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/spin-web.github.io\/SPIN2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}