{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:58:19Z","timestamp":1776333499485,"version":"3.51.2"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032227737","type":"print"},{"value":"9783032227744","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-22774-4_22","type":"book-chapter","created":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:18:34Z","timestamp":1776331114000},"page":"424-446","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Testing in Formal Verification via Witness Generation (Empirical Evaluation)"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4832-7662","authenticated-orcid":false,"given":"Dirk","family":"Beyer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0291-815X","authenticated-orcid":false,"given":"Thomas","family":"Lemberger","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4768-4054","authenticated-orcid":false,"given":"Henrik","family":"Wachowitz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2026,4,17]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","unstructured":"Beyer, D., Dangl, M., Lemberger, T., Tautschnig, M.: Tests from witnesses: Execution-based validation of verification results. In: Proc. TAP. pp. 3\u201323. LNCS\u00a010889, Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-92994-1_1","DOI":"10.1007\/978-3-319-92994-1_1"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Beyer, D., Chlipala, A.J., Henzinger, T.A., Jhala, R., Majumdar, R.: Generating tests from counterexamples. In: Proc. ICSE. pp. 326\u2013335. IEEE (2004). https:\/\/doi.org\/10.1109\/ICSE.2004.1317455","DOI":"10.1109\/ICSE.2004.1317455"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: Conditional testing: Off-the-shelf combination of test-case generators. In: Proc. ATVA. pp. 189\u2013208. LNCS\u00a011781, Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-31784-3_11","DOI":"10.1007\/978-3-030-31784-3_11"},{"key":"22_CR4","doi-asserted-by":"publisher","unstructured":"Alshmrany, K.M., Aldughaim, M., Bhayat, A., Cordeiro, L.C.: FuSeBMC: An energy-efficient test generator for finding security vulnerabilities in C programs. In: Proc. TAP. pp. 85\u2013105. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-79379-1_6","DOI":"10.1007\/978-3-030-79379-1_6"},{"key":"22_CR5","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.A.: Automated whitebox fuzz testing. In: Proc. NDSS. The Internet Society (2008), https:\/\/www.ndss-symposium.org\/ndss2008\/automated-whitebox-fuzz-testing\/"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: Dart: Directed automated random testing. In: Proc. PLDI. pp. 213\u2013223. ACM (2005). https:\/\/doi.org\/10.1145\/1065010.1065036","DOI":"10.1145\/1065010.1065036"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Tillmann, N., de\u00a0Halleux, J.: Pex-white box test generation for .net. In: Proc. TAP. pp. 134\u2013153. LNCS\u00a04966, Springer (2008). https:\/\/doi.org\/10.1007\/978-3-540-79124-9_10","DOI":"10.1007\/978-3-540-79124-9_10"},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Stephens, N., Grosen, J., Salls, C., Dutcher, A., Wang, R., Corbetta, J., Shoshitaishvili, Y., Kruegel, C., Vigna, G.: Driller: Augmenting fuzzing through selective symbolic execution. In: Proc. NDSS. Internet Society (2016). https:\/\/doi.org\/10.14722\/ndss.2016.23368","DOI":"10.14722\/ndss.2016.23368"},{"key":"22_CR9","unstructured":"Chen, C., Kande, R., Nguyen, N., Andersen, F., Tyagi, A., Sadeghi, A., Rajendran, J.: Hypfuzz: Formal-assisted processor fuzzing. In: USENIX Security. pp. 1361\u20131378. USENIX Association (2023)"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM 56(2), 82\u201390 (2013). https:\/\/doi.org\/10.1145\/2408776.2408795","DOI":"10.1145\/2408776.2408795"},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Metta, R., Medicherla, R.K., Chakraborty, S.: BMC+Fuzz: Efficient and effective test generation. In: Proc. DATE. pp. 1419\u20131424. IEEE (2022). https:\/\/doi.org\/10.23919\/DATE54114.2022.9774672","DOI":"10.23919\/DATE54114.2022.9774672"},{"key":"22_CR12","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: Six years later: Testing vs. model checking. Int. J. Softw. Tools Technol. Transf. 26(6), 633\u2013646 (2024). https:\/\/doi.org\/10.1007\/S10009-024-00769-8","DOI":"10.1007\/S10009-024-00769-8"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Beyer, D.: State of the art in software verification and witness validation: SV-COMP 2024. In: Proc. TACAS\u00a0(3). pp. 299\u2013329. LNCS\u00a014572, Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-57256-2_15","DOI":"10.1007\/978-3-031-57256-2_15"},{"key":"22_CR14","unstructured":"Beyer, D.: Automatic testing of C programs: Test-Comp 2024. In: TBA. Springer (2024)"},{"key":"22_CR15","doi-asserted-by":"publisher","unstructured":"Afzal, M., Asia, A., Chauhan, A., Chimdyalwar, B., Darke, P., Datar, A., Kumar, S., Venkatesh, R.: VeriAbs: Verification by abstraction and test generation. In: Proc. ASE. pp. 1138\u20131141. IEEE (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00121","DOI":"10.1109\/ASE.2019.00121"},{"key":"22_CR16","unstructured":"Collection of verification tasks. https:\/\/gitlab.com\/sosy-lab\/benchmarking\/sv-benchmarks, accessed: 2025-10-17"},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"Beyer, D., Strej\u010dek, J.: Evaluating software verifiers for C, Java, and SV-LIB (Report on SV-COMP 2026). In: Proc. TACAS (2). pp. 461\u2013502.  LNCS 16506, Springer (2026). https:\/\/doi.org\/10.1007\/978-3-032-22749-2_23","DOI":"10.1007\/978-3-032-22749-2_23"},{"key":"22_CR18","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Evaluating tools for automatic software testing (Report on Test-Comp 2026). In: Proc. FASE. pp. 449\u2013468. LNCS 16504, Springer (2026). https:\/\/doi.org\/10.1007\/978-3-032-22774-4_23","DOI":"10.1007\/978-3-032-22774-4_23"},{"key":"22_CR19","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Second competition on software testing: Test-Comp 2020. In: Proc. FASE. pp. 505\u2013519. LNCS\u00a012076, Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-45234-6_25","DOI":"10.1007\/978-3-030-45234-6_25"},{"key":"22_CR20","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Status report on software testing: Test-Comp 2021. In: Proc. FASE. pp. 341\u2013357. LNCS\u00a012649, Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-71500-7_17","DOI":"10.1007\/978-3-030-71500-7_17"},{"key":"22_CR21","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Advances in automatic software testing: Test-Comp 2022. In: Proc. FASE. pp. 321\u2013335. LNCS\u00a013241, Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-99429-7_18","DOI":"10.1007\/978-3-030-99429-7_18"},{"key":"22_CR22","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Software testing: 5th comparative evaluation: Test-Comp 2023. In: Proc. FASE. pp. 309\u2013323. LNCS\u00a013991, Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-30826-0_17","DOI":"10.1007\/978-3-031-30826-0_17"},{"key":"22_CR23","doi-asserted-by":"publisher","unstructured":"Beyer, D.: Advances in automatic software testing: Test-Comp 2025. In: Proc.\nFASE. pp. 257\u2013274. LNCS 15693, Springer (2025). https:\/\/doi.org\/10.1007\/978-3-031-90900-9_13","DOI":"10.1007\/978-3-031-90900-9_13"},{"key":"22_CR24","doi-asserted-by":"publisher","unstructured":"Lemberger, T., Wachowitz, H.: AFL-TC: Transforming fuzzer test inputs for Test-Comp (competition contribution). In: Proc. FASE. pp. 475-480. LNCS 16504, Springer (2026). https:\/\/doi.org\/10.1007\/978-3-032-22774-4_25","DOI":"10.1007\/978-3-032-22774-4_25"},{"key":"22_CR25","unstructured":"Google: american fuzzy lop. https:\/\/github.com\/google\/AFL, accessed: 2025-10-17"},{"key":"22_CR26","doi-asserted-by":"publisher","unstructured":"B\u00f6hme, M., Pham, V., Roychoudhury, A.: Coverage-based greybox fuzzing as markov chain. In: Proc. SIGSAC. pp. 1032\u20131043. ACM, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2976749.2978428","DOI":"10.1145\/2976749.2978428"},{"key":"22_CR27","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: Software verification: Testing vs. model checking. In: Proc. HVC. pp. 99\u2013114. LNCS\u00a010629, Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-70389-3_7","DOI":"10.1007\/978-3-319-70389-3_7"},{"key":"22_CR28","doi-asserted-by":"publisher","unstructured":"Yoo, S., Harman, M.: Regression testing minimization, selection, and prioritization: A survey. STVR 22(2), 67\u2013120 (2012). https:\/\/doi.org\/10.1002\/stvr.430","DOI":"10.1002\/stvr.430"},{"key":"22_CR29","doi-asserted-by":"publisher","unstructured":"McMinn, P.: Search-based software test-data generation: A survey. STVR 14(2), 105\u2013156 (2004). https:\/\/doi.org\/10.1002\/stvr.294","DOI":"10.1002\/stvr.294"},{"key":"22_CR30","doi-asserted-by":"publisher","unstructured":"Li, J., Zhao, B., Zhang, C.: Fuzzing: A survey. Cybersecurity 1(1), \u00a06 (June 2018). https:\/\/doi.org\/10.1186\/s42400-018-0002-y","DOI":"10.1186\/s42400-018-0002-y"},{"key":"22_CR31","doi-asserted-by":"publisher","unstructured":"Man\u00e8s, V.J.M., Han, H., Han, C., Cha, S.K., Egele, M., Schwartz, E.J., Woo, M.: The art, science, and engineering of fuzzing: A survey. IEEE Trans. Software Eng. 47(11), 2312\u20132331 (2021). https:\/\/doi.org\/10.1109\/TSE.2019.2946563","DOI":"10.1109\/TSE.2019.2946563"},{"key":"22_CR32","doi-asserted-by":"publisher","unstructured":"Baldoni, R., Coppa, E., D\u2019Elia, D.C., Demetrescu, C., Finocchi, I.: A survey of symbolic-execution techniques. ACM Comput. Surv. 51(3), 50:1\u201350:39 (2018). https:\/\/doi.org\/10.1145\/3182657","DOI":"10.1145\/3182657"},{"key":"22_CR33","doi-asserted-by":"publisher","unstructured":"Anand, S., Burke, E.K., Chen, T.Y., Clark, J.A., Cohen, M.B., Grieskamp, W., Harman, M., Harrold, M.J., McMinn, P.: An orchestrated survey of methodologies for automated software test case generation. Journal of Systems and Software 86(8), 1978\u20132001 (2013). https:\/\/doi.org\/10.1016\/j.jss.2013.02.061","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"22_CR34","doi-asserted-by":"publisher","unstructured":"D\u2019Silva, V., Kr\u00f6ning, D., Weissenbacher, G.: A survey of automated techniques for formal software verification. IEEE Trans. on CAD of Integrated Circuits and Systems 27(7), 1165\u20131178 (2008). https:\/\/doi.org\/10.1109\/TCAD.2008.923410","DOI":"10.1109\/TCAD.2008.923410"},{"key":"22_CR35","doi-asserted-by":"publisher","unstructured":"Jhala, R., Majumdar, R.: Software model checking. ACM Computing Surveys 41(4) (2009). https:\/\/doi.org\/10.1145\/1592434.1592438","DOI":"10.1145\/1592434.1592438"},{"key":"22_CR36","doi-asserted-by":"publisher","unstructured":"Garavel, H., ter Beek, M.H., van\u00a0de Pol, J.: The 2020 expert survey on formal methods. In: Proc. FMICS. pp. 3\u201369. LNCS\u00a012327, Springer (2020). https:\/\/doi.org\/10.1007\/978-3-030-58298-2_1","DOI":"10.1007\/978-3-030-58298-2_1"},{"key":"22_CR37","doi-asserted-by":"publisher","unstructured":"Beyer, D., Podelski, A.: Software model checking: 20 years and beyond. In: Principles of Systems Design. pp. 554\u2013582. LNCS\u00a013660, Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-22337-2_27","DOI":"10.1007\/978-3-031-22337-2_27"},{"key":"22_CR38","doi-asserted-by":"publisher","unstructured":"Godefroid, P., Sen, K.: Combining model checking and testing. In: Handbook of Model Checking, pp. 613\u2013649. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-10575-8_19","DOI":"10.1007\/978-3-319-10575-8_19"},{"key":"22_CR39","doi-asserted-by":"publisher","unstructured":"Beyer, D., Gulwani, S., Schmidt, D.: Combining model checking and data-flow analysis. In: Handbook of Model Checking, pp. 493\u2013540. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-10575-8_16","DOI":"10.1007\/978-3-319-10575-8_16"},{"key":"22_CR40","doi-asserted-by":"publisher","unstructured":"Fraser, G., Wotawa, F., Ammann, P.: Testing with model checkers: A survey. STVR 19(3), 215\u2013261 (2009). https:\/\/doi.org\/10.1002\/stvr.402","DOI":"10.1002\/stvr.402"},{"key":"22_CR41","doi-asserted-by":"publisher","unstructured":"Kaleeswaran, A.P., Nordmann, A., Vogel, T., Grunske, L.: A systematic literature review on counterexample explanation. Information and Software Technology 145, 106800 (2022). https:\/\/doi.org\/10.1016\/j.infsof.2021.106800","DOI":"10.1016\/j.infsof.2021.106800"},{"key":"22_CR42","doi-asserted-by":"publisher","unstructured":"Beyer, D., Dangl, M.: Verification-aided debugging: An interactive web-service for exploring error witnesses. In: Proc. CAV\u00a0(2). pp. 502\u2013509. LNCS\u00a09780, Springer (2016). https:\/\/doi.org\/10.1007\/978-3-319-41540-6_28","DOI":"10.1007\/978-3-319-41540-6_28"},{"key":"22_CR43","doi-asserted-by":"publisher","unstructured":"Novikov, E., Zakharov, I.S.: Towards automated static verification of GNU C programs. In: Proc. PSI. pp. 402\u2013416. LNCS\u00a010742, Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-74313-4_30","DOI":"10.1007\/978-3-319-74313-4_30"},{"key":"22_CR44","doi-asserted-by":"publisher","unstructured":"Groce, A., Kr\u00f6ning, D., Lerda, F.: Understanding counterexamples with explain. In: Proc. CAV\u201904. pp. 453\u2013456. LNCS\u00a03114, Springer (2004). https:\/\/doi.org\/10.1007\/978-3-540-27813-9_35","DOI":"10.1007\/978-3-540-27813-9_35"},{"key":"22_CR45","doi-asserted-by":"publisher","unstructured":"Groce, A., Visser, W.: What went wrong: Explaining counterexamples. In: Proc. SPIN. pp. 121\u2013135. LNCS\u00a02648, Springer (2003). https:\/\/doi.org\/10.1007\/3-540-44829-2_8","DOI":"10.1007\/3-540-44829-2_8"},{"key":"22_CR46","doi-asserted-by":"publisher","unstructured":"Chaki, S., Groce, A., Strichman, O.: Explaining abstract counterexamples. In: Proc. FSE. pp. 73\u201382. ACM (2004). https:\/\/doi.org\/10.1145\/1029894.1029908","DOI":"10.1145\/1029894.1029908"},{"key":"22_CR47","doi-asserted-by":"publisher","unstructured":"Casta\u00f1o, R., Braberman, V.A., Garbervetsky, D., Uchitel, S.: Model checker execution reports. In: Proc. ASE. pp. 200\u2013205. IEEE (2017). https:\/\/doi.org\/10.1109\/ASE.2017.8115633","DOI":"10.1109\/ASE.2017.8115633"},{"key":"22_CR48","doi-asserted-by":"publisher","unstructured":"Beyer, D., Dangl, M., Dietsch, D., Heizmann, M., Stahlbauer, A.: Witness validation and stepwise testification across software verifiers. In: Proc. FSE. pp. 721\u2013733. ACM (2015). https:\/\/doi.org\/10.1145\/2786805.2786867","DOI":"10.1145\/2786805.2786867"},{"key":"22_CR49","doi-asserted-by":"publisher","unstructured":"Beyer, D., Dangl, M., Dietsch, D., Heizmann, M.: Correctness witnesses: Exchanging verification results between verifiers. In: Proc. FSE. pp. 326\u2013337. ACM (2016). https:\/\/doi.org\/10.1145\/2950290.2950351","DOI":"10.1145\/2950290.2950351"},{"key":"22_CR50","doi-asserted-by":"publisher","unstructured":"Ayaziov\u00e1, P., Beyer, D., Lingsch-Rosenfeld, M., Spiessl, M., Strej\u010dek, J.: Software verification witnesses\u00a02.0. In: Proc. SPIN. pp. 184\u2013203. LNCS\u00a014624, Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-66149-5_11","DOI":"10.1007\/978-3-031-66149-5_11"},{"key":"22_CR51","doi-asserted-by":"publisher","unstructured":"Beyer, D., Strej\u010dek, J.: SV-Witnesses \u2013 Format 2.1. Zenodo (2025). https:\/\/doi.org\/10.5281\/zenodo.17277275","DOI":"10.5281\/zenodo.17277275"},{"key":"22_CR52","doi-asserted-by":"publisher","unstructured":"Beyer, D., Jakobs, M.C.: Cooperative verifier-based testing with CoVeriTest. Int. J. Softw. Tools Technol. Transfer 23(3), 313\u2013333 (2021). https:\/\/doi.org\/10.1007\/s10009-020-00587-8","DOI":"10.1007\/s10009-020-00587-8"},{"key":"22_CR53","doi-asserted-by":"publisher","unstructured":"Barth, M., Jakobs, M.C.: Test-case generation with automata-based software model checking. In: Proc. SPIN. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-66149-5_14","DOI":"10.1007\/978-3-031-66149-5_14"},{"key":"22_CR54","unstructured":"Cadar, C., Dunbar, D., Engler, D.R.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proc. OSDI. pp. 209\u2013224. USENIX Association (2008), available at https:\/\/www.usenix.org\/events\/osdi08\/tech\/full_papers\/cadar\/cadar.pdf"},{"key":"22_CR55","doi-asserted-by":"publisher","unstructured":"Lemberger, T.: Plain random test generation with PRTest (competition contribution). Int. J. Softw. Tools Technol. Transf. 23(6), 871\u2013873 (December 2021). https:\/\/doi.org\/10.1007\/s10009-020-00568-x","DOI":"10.1007\/s10009-020-00568-x"},{"key":"22_CR56","doi-asserted-by":"publisher","unstructured":"Beyer, D., Kanav, S.: CoVeriTeam: On-demand composition of cooperative verification systems. In: Proc. TACAS. pp. 561\u2013579. LNCS\u00a013243, Springer (2022). https:\/\/doi.org\/10.1007\/978-3-030-99524-9_31","DOI":"10.1007\/978-3-030-99524-9_31"},{"key":"22_CR57","doi-asserted-by":"publisher","unstructured":"Beyer, D., Strej\u010dek, J.: SV-Benchmarks: Benchmark set for software verification (SV-COMP\u00a02025). Zenodo (2025). https:\/\/doi.org\/10.5281\/zenodo.15012096","DOI":"10.5281\/zenodo.15012096"},{"key":"22_CR58","doi-asserted-by":"publisher","unstructured":"Beyer, D., Strej\u010dek, J.: Improvements in software verification\nand witness validation: SV-COMP 2025.  In: Proc. TACAS (3). pp. 151\u2013186. LNCS 15698, Springer (2025). https:\/\/doi.org\/10.1007\/978-3-031-90660-2_9","DOI":"10.1007\/978-3-031-90660-2_9"},{"key":"22_CR59","doi-asserted-by":"publisher","unstructured":"Beyer, D., L\u00f6we, S., Wendler, P.: Reliable benchmarking: Requirements and solutions. Int. J. Softw. Tools Technol. Transfer 21(1), 1\u201329 (2019). https:\/\/doi.org\/10.1007\/s10009-017-0469-y","DOI":"10.1007\/s10009-017-0469-y"},{"key":"22_CR60","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T.: TestCov: Robust test-suite execution and coverage measurement. In: Proc. ASE. pp. 1074\u20131077. IEEE (2019). https:\/\/doi.org\/10.1109\/ASE.2019.00105","DOI":"10.1109\/ASE.2019.00105"},{"key":"22_CR61","doi-asserted-by":"publisher","unstructured":"Wilcoxon, F.: Individual comparisons by ranking methods. Biometrics Bulletin 1(6), 80\u201383 (1945). https:\/\/doi.org\/10.2307\/3001968","DOI":"10.2307\/3001968"},{"key":"22_CR62","doi-asserted-by":"publisher","unstructured":"Beyer, D., Lemberger, T., Wachowitz, H.: Artifact for the fase 26 paper: Testing in formal verification via witness generation (empirical evaluation). Zenodo (2026). https:\/\/doi.org\/10.5281\/zenodo.18351121","DOI":"10.5281\/zenodo.18351121"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-22774-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:18:40Z","timestamp":1776331120000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-22774-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032227737","9783032227744"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-22774-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"17 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Turin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2026","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2026","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 April 2026","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2026","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/etaps.org\/2026\/conferences\/fase\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}