{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:12:34Z","timestamp":1748664754966,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319259413"},{"type":"electronic","value":"9783319259420"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25942-0_15","type":"book-chapter","created":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T09:32:14Z","timestamp":1444987934000},"page":"227-242","source":"Crossref","is-referenced-by-count":0,"title":["PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation"],"prefix":"10.1007","author":[{"given":"Zhang","family":"Jun-xian","sequence":"first","affiliation":[]},{"given":"Li","family":"Zhou-jun","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Xian-chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"15_CR1","unstructured":"Godefroid, P., Levin, M., Molnar, D.: Automated whitebox fuzz testing. In: 16th Annual Network & Distributed System Security Symposium, pp. 6\u201379. THE INTERNET SOCIETY, San Diego, California, USA (2008)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/11817963_38","volume-title":"Computer Aided Verification","author":"Koushik Sen","year":"2006","unstructured":"Sen, Koushik, Agha, Gul: CUTE and jCUTE: Concolic unit testing and explicit path model-checking tools. In: Ball, Thomas, Jones, Robert B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 419\u2013423. Springer, Heidelberg (2006)"},{"issue":"3","key":"15_CR3","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TSE.1976.233817","volume":"2","author":"LA Clarke","year":"1976","unstructured":"Clarke, L.A.: A system to generate test data and symbolically execute programs. J. IEEE Trans on Software Engineering. 2(3), 215\u2013222 (1976)","journal-title":"J. IEEE Trans on Software Engineering."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. In: 26th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 213\u2013223. ACM Press, Chicago, Illinois, USA (2005)","DOI":"10.1145\/1064978.1065036"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Cadar, C., Godefroid, P., Tillmann, N., Visser, W.: Symbolic execution for software testing in practice preliminary assessment. In: 33th International Conference on Software Engineering, pp. 1066\u20131071. ACM Press, Waikiki, Honolulu, HI, USA (2011)","DOI":"10.1145\/1985793.1985995"},{"key":"15_CR6","unstructured":"Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: 8th USENIX Symposium on Operating Systems Design and Implementation, pp. 209\u2013224. IEEE Press, San Diego, California, USA. (2008)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Avgerinos, T., Rebert, T., Cha, S.K., Brumley, D.: Enhancing symbolic execution with veritesting. In: 36th International Conference on Software Engineering, pp. 1083\u20131094. IEEE Press, New York, USA (2014)","DOI":"10.1145\/2568225.2568293"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.: LLVM: a compilation framework for lifelong program analysis and transformation. In: 2nd International Symposium on Code Generation and Optimization, pp. 75\u201388. IEEE Press, San Jose, CA, USA (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"key":"15_CR9","unstructured":"Lattner, C.: LLVM: an Infrastructure for Multi-Stage Optimization. Masters Thesis, Computer Science Dept., University of Illinois at Urbana-Champaign (2002)"},{"key":"15_CR10","unstructured":"Clang: a C language family frontend for LLVM. http:\/\/clang.llvm.org\/"},{"key":"15_CR11","unstructured":"Lattner, C., Adve, V.: The LLVM Instruction Set and Compilation Strategy. Technical report, University of Illinois at Urbana-Champaign (2002)"},{"key":"15_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Leonardo Moura de","year":"2008","unstructured":"de Moura, Leonardo, Bj\u00f8rner, Nikolaj S.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, Jakob (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008)"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11537328_2","volume-title":"Model Checking Software","author":"Cristian Cadar","year":"2005","unstructured":"Cadar, Cristian, Engler, Dawson: Execution generated test cases: how to make systems code crash itself. In: Godefroid, Patrice (ed.) SPIN 2005. LNCS, vol. 3639, pp. 2\u201323. Springer, Heidelberg (2005)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Burnim, J., Sen, K.: Heuristics for scalable dynamic test generation. In: 23rd IEEE\/ACM International Conference on Automated Software Engineering, pp. 443\u2013446. IEEE Press, L\u2019Aquila, Italy (2008)","DOI":"10.1109\/ASE.2008.69"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Fraser, G., Arcuri, A.: Sound empirical evidence in software testing. In: 34th International Conference on Software Engineering, pp. 178\u2013188. IEEE Press, Zurich, Switzerland (2012)","DOI":"10.1109\/ICSE.2012.6227195"},{"key":"15_CR16","unstructured":"Kratkiewicz, K.: Evaluating Static Analysis Tools for Detecting Buffer Overflows in C Code. Harvard University, USA (2005)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering: Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25942-0_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T01:49:58Z","timestamp":1748656198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25942-0_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259413","9783319259420"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25942-0_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}