{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:31:17Z","timestamp":1743078677615,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031720437"},{"type":"electronic","value":"9783031720444"}],"license":[{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-72044-4_9","type":"book-chapter","created":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:02:41Z","timestamp":1725897761000},"page":"168-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Exploring Loose Coupling of\u00a0Slicing with\u00a0Dynamic Symbolic Execution on\u00a0the\u00a0JVM"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6291-9886","authenticated-orcid":false,"given":"Malte","family":"Mues","sequence":"first","affiliation":[]},{"given":"Julian","family":"R\u00fcschoff","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9848-2017","authenticated-orcid":false,"given":"Ben","family":"Hermann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,10]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","unstructured":"Ahmed, K., Lis, M., Rubin, J.: Slicer4J: a dynamic slicer for Java. In: ESEC\/FSE 2021, pp. 1570\u20131574. Association for Computing Machinery, New York (2021). https:\/\/doi.org\/10.1145\/3468264.3473123","DOI":"10.1145\/3468264.3473123"},{"key":"9_CR2","doi-asserted-by":"publisher","unstructured":"Avgerinos, T., Rebert, A., Cha, S.K., Brumley, D.: Enhancing symbolic execution with veritesting. In: ICSE 2014, pp. 1083\u20131094 (2014). https:\/\/doi.org\/10.1145\/2568225.2568293","DOI":"10.1145\/2568225.2568293"},{"issue":"6","key":"9_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MS.2019.2930609","volume":"36","author":"J Backes","year":"2019","unstructured":"Backes, J., et al.: One-click formal methods. IEEE Softw. 36(6), 61\u201365 (2019). https:\/\/doi.org\/10.1109\/MS.2019.2930609","journal-title":"IEEE Softw."},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-031-57256-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"D Beyer","year":"2024","unstructured":"Beyer, D.: State of the art in software verification and witness validation: SV-COMP 2024. In: Finkbeiner, B., Kov\u00e1cs, L. (eds.) TACAS 2024. LNCS, vol. 14572, pp. 299\u2013329. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57256-2_15"},{"key":"9_CR5","doi-asserted-by":"publisher","unstructured":"Beyer, D.: SV-benchmarks: benchmark set for software verification (SV-COMP 2024) (2024). https:\/\/doi.org\/10.5281\/zenodo.10669723, https:\/\/doi.org\/10.5281\/zenodo.10669723","DOI":"10.5281\/zenodo.10669723"},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10009-017-0469-y","volume":"21","author":"D Beyer","year":"2019","unstructured":"Beyer, D., L\u00f6we, S., Wendler, P.: Reliable benchmarking: requirements and solutions. STTT 21(1), 1\u201329 (2019). https:\/\/doi.org\/10.1007\/s10009-017-0469-y","journal-title":"STTT"},{"key":"9_CR7","unstructured":"Brahmi, A., et al.: Industrial use of a safe and efficient formal method based software engineering process in avionics. In: ERTS 2020 (2020)"},{"key":"9_CR8","unstructured":"Djoudi, A., et al.: A bottom-up formal verification approach for common criteria certification: application to JavaCard virtual machine. In: ERTS 2022 (2022)"},{"key":"9_CR9","doi-asserted-by":"publisher","unstructured":"Ferrari, A., Beek, M.H.T.: Formal methods in railways: a systematic mapping study. ACM Comput. Surv. 55(4) (2022). https:\/\/doi.org\/10.1145\/3520480","DOI":"10.1145\/3520480"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-031-17108-6_9","volume-title":"Software Engineering and Formal Methods","author":"C Galindo","year":"2022","unstructured":"Galindo, C., Perez, S., Silva, J.: A program slicer for Java (tool paper). In: Schlingloff, B.H., Chai, M. (eds.) SEFM 2022. LNCS, vol. 13550, pp. 146\u2013151. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17108-6_9"},{"key":"9_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-58298-2_1","volume-title":"Formal Methods for Industrial Critical Systems","author":"H Garavel","year":"2020","unstructured":"Garavel, H., Beek, M.H., Pol, J.: The 2020 expert survey on formal methods. In: ter Beek, M.H., Ni\u010dkovi\u0107, D. (eds.) FMICS 2020. LNCS, vol. 12327, pp. 3\u201369. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58298-2_1"},{"key":"9_CR12","doi-asserted-by":"publisher","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. In: PLDI 2005, pp. 213\u2013223. ACM (2005). https:\/\/doi.org\/10.1007\/978-3-642-19237-1_4","DOI":"10.1007\/978-3-642-19237-1_4"},{"key":"9_CR13","doi-asserted-by":"publisher","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: SAGE: whitebox fuzzing for security testing: SAGE has had a remarkable impact at Microsoft. Queue 10(1), 20\u201327 (2012). https:\/\/doi.org\/10.1145\/2090147.2094081","DOI":"10.1145\/2090147.2094081"},{"key":"9_CR14","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.A., et\u00a0al.: Automated whitebox fuzz testing. In: NDSS 2008, vol.\u00a08, pp. 151\u2013166 (2008)"},{"key":"9_CR15","unstructured":"Hammacher, C.: Design and implementation of an efficient dynamic slicer for Java. Bachelor\u2019s thesis (2008)"},{"issue":"7","key":"9_CR16","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976). https:\/\/doi.org\/10.1145\/360248.360252","journal-title":"Commun. ACM"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/978-3-030-99527-0_27","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M Mues","year":"2022","unstructured":"Mues, M., Howar, F.: GDart: an ensemble of tools for dynamic symbolic execution on the java virtual machine (competition contribution). In: TACAS 2022. LNCS, vol. 13244, pp. 435\u2013439. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99527-0_27"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-031-17108-6_6","volume-title":"Software Engineering and Formal Methods","author":"M Mues","year":"2022","unstructured":"Mues, M., Howar, F., Dierl, S.: SPouT: symbolic path recording during testing - a concolic executor for the JVM. In: Schlingloff, B.H., Chai, M. (eds.) SEFM 2022. LNCS, vol. 13550, pp. 91\u2013107. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17108-6_6"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-32469-7_14","volume-title":"Formal Methods for Industrial Critical Systems","author":"J Slab\u00fd","year":"2012","unstructured":"Slab\u00fd, J., Strej\u010dek, J., Trt\u00edk, M.: Checking properties described by state machines: on synergy of instrumentation, slicing, and symbolic execution. In: Stoelinga, M., Pinger, R. (eds.) FMICS 2012. LNCS, vol. 7437, pp. 207\u2013221. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32469-7_14"},{"key":"9_CR20","doi-asserted-by":"publisher","unstructured":"Sridharan, M., Fink, S.J., Bodik, R.: Thin slicing. In: SPLASH 2007, pp. 112\u2013122 (2007). https:\/\/doi.org\/10.1145\/1250734.1250748","DOI":"10.1145\/1250734.1250748"},{"issue":"6","key":"9_CR21","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/1543135.1542486","volume":"44","author":"O Tripp","year":"2009","unstructured":"Tripp, O., Pistoia, M., Fink, S.J., Sridharan, M., Weisman, O.: TAJ: effective taint analysis of web applications. ACM Sigplan Not. 44(6), 87\u201397 (2009). https:\/\/doi.org\/10.1145\/1543135.1542486","journal-title":"ACM Sigplan Not."},{"key":"9_CR22","doi-asserted-by":"publisher","unstructured":"W\u00fcrthinger, T., et al.: One VM to rule them all. In: SPLASH 2013, pp. 187\u2013204. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2509578.2509581","DOI":"10.1145\/2509578.2509581"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-72044-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:06:00Z","timestamp":1725897960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-72044-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,10]]},"ISBN":["9783031720437","9783031720444"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-72044-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,9,10]]},"assertion":[{"value":"10 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Tests and Proofs","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Milan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tap2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}