{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:58:51Z","timestamp":1767085131318,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319295091"},{"type":"electronic","value":"9783319295107"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29510-7_13","type":"book-chapter","created":{"date-parts":[[2016,1,29]],"date-time":"2016-01-29T09:39:16Z","timestamp":1454060356000},"page":"225-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An Approach to Static-Dynamic Software Analysis"],"prefix":"10.1007","author":[{"given":"Pablo","family":"Gonzalez-de-Aledo","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pablo","family":"Sanchez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralf","family":"Huuck","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2016,1,30]]},"reference":[{"key":"13_CR1","unstructured":"MISRA Ltd: MISRA-C:2004 Guidelines for the use of the C language in Critical Systems. MISRA, October 2004"},{"key":"13_CR2","unstructured":"Miller, C., Valasek, C.: A survey of remote automotive attack surfaces. Black Hat USA (2014)"},{"key":"13_CR3","unstructured":"Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T., et al.: Comprehensive experimental analyses of automotive attack surfaces. In: USENIX Security Symposium, San Francisco (2011)"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.scico.2014.11.003","volume":"103","author":"R Huuck","year":"2015","unstructured":"Huuck, R.: Technology transfer: formal analysis, engineering, and business value. Sci. Comput. Program. 103, 3\u201312 (2015)","journal-title":"Sci. Comput. Program."},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/978-3-662-46681-0_36","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"P Gonzalez-de-Aledo","year":"2015","unstructured":"Gonzalez-de-Aledo, P., Sanchez, P.: Framework for embedded system verification. In: Baier, C., Tinelli, C. (eds.) TACAS 2015. LNCS, vol. 9035, pp. 429\u2013431. Springer, Heidelberg (2015)"},{"issue":"3","key":"13_CR6","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TSE.1976.233817","volume":"2","author":"LA Clarke","year":"1976","unstructured":"Clarke, L.A.: A system to generate test data and symbolically execute programs. IEEE Trans. Softw. Eng. 2(3), 215\u2013222 (1976)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., Agha, G.: CUTE: a concolic unit testing engine for C. In: Proceedings of the 10th European Software Engineering Conference, ESEC\/FSE-13, pp. 263\u2013272. ACM, New York, NY, USA (2005)","DOI":"10.1145\/1081706.1081750"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: Dart: directed automated random testing. In: Programming Language Design and Implementation (PLDI) (2005)","DOI":"10.1145\/1065010.1065036"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Qu, X., Robinson, B.: A case study of concolic testing tools and their limitations. In: International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 117\u2013126, September 2011","DOI":"10.1109\/ESEM.2011.20"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Cadar, C., Godefroid, P., Khurshid, S., P\u0103s\u0103reanu, C.S., Sen, K., Tillmann, N., Visser, W.: Symbolic execution for software testing in practice: preliminary assessment. In: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, pp. 1066\u20131071. ACM, New York (2011)","DOI":"10.1145\/1985793.1985995"},{"issue":"2","key":"13_CR11","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/1646353.1646374","volume":"53","author":"A Bessey","year":"2010","unstructured":"Bessey, A., Block, K., Chelf, B., Chou, A., Fulton, B., Hallem, S., Henri-Gros, C., Kamsky, A., McPeak, S., Engler, D.: A few billion lines of code later: using static analysis to find bugs in the real world. Commun. ACM 53(2), 66\u201375 (2010)","journal-title":"Commun. ACM"},{"key":"13_CR12","unstructured":"GrammaTech: CodeSurfer. \n                    http:\/\/www.grammatech.com\/"},{"key":"13_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1007\/978-3-540-70545-1_36","volume-title":"Computer Aided Verification","author":"PW O\u2019Hearn","year":"2008","unstructured":"O\u2019Hearn, P.W., Calcagno, C., Distefano, D., Lee, O., Cook, B., Yang, H., Berdine, J.: Scalable shape analysis for systems code. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 385\u2013398. Springer, Heidelberg (2008)"},{"key":"13_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-34281-3_23","volume-title":"Formal Methods and Software Engineering","author":"M Junker","year":"2012","unstructured":"Junker, M., Huuck, R., Fehnker, A., Knapp, A.: SMT-based false positive elimination in static program analysis. In: Aoki, T., Taguchi, K. (eds.) ICFEM 2012. LNCS, vol. 7635, pp. 316\u2013331. Springer, Heidelberg (2012)"},{"key":"13_CR15","series-title":"Lecture Notes in Computer Science","first-page":"281","volume-title":"Dependable Computing - EDCC 2005","author":"B Marre","year":"2005","unstructured":"Marre, B., Mouy, P., Williams, N., Roger, M.: PathCrawler: automatic generation of path tests by combining static and dynamic analysis. In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol. 3463, pp. 281\u2013292. Springer, Heidelberg (2005)"},{"issue":"2","key":"13_CR16","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C Cadar","year":"2013","unstructured":"Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM 56(2), 82\u201390 (2013)","journal-title":"Commun. ACM"},{"issue":"8","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1016\/j.jss.2011.03.051","volume":"84","author":"MJ Escalona","year":"2011","unstructured":"Escalona, M.J., Gutierrez, J.J., Mej\u00edas, M., Arag\u00f3n, G., Ramos, I., Torres, J., Dom\u00ednguez, F.J.: An overview on test generation from functional requirements. J. Syst. Softw. 84(8), 1379\u20131393 (2011)","journal-title":"J. Syst. Softw."},{"issue":"7","key":"13_CR18","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1109\/TCAD.2008.923410","volume":"27","author":"V D\u2019Silva","year":"2008","unstructured":"D\u2019Silva, V., Kroening, D., Weissenbacher, G.: A survey of automated techniques for formal software verification. IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. (TCAD) 27(7), 1165\u20131178 (2008)","journal-title":"IEEE Trans. Comput.-Aided Des. Integr. Circ. Syst. (TCAD)"},{"issue":"4","key":"13_CR19","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s10009-009-0118-1","volume":"11","author":"CS Pasareanu","year":"2009","unstructured":"Pasareanu, C.S., Visser, W.: A survey of new trends in symbolic execution for software testing and analysis. Int. J. Softw. Tools Technol. Transf. 11(4), 339\u2013353 (2009)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Qu, X., Robinson, B.: A case study of concolic testing tools and their limitations. In: International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 117\u2013126, September 2011","DOI":"10.1109\/ESEM.2011.20"},{"issue":"10","key":"13_CR21","doi-asserted-by":"publisher","first-page":"1499","DOI":"10.1109\/32.6195","volume":"14","author":"M Young","year":"1988","unstructured":"Young, M., Taylor, R.N.: Combining static concurrency analysis with symbolic execution. IEEE Trans. Softw. Eng. 14(10), 1499\u20131511 (1988)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/11408901_21","volume-title":"Dependable Computing - EDCC 2005","author":"N Williams","year":"2005","unstructured":"Williams, N., Mouy, P., Roger, M., Marre, B.: PathCrawler: automatic generation of path tests by combining static and dynamic analysis. In: Dal Cin, M., Ka\u00e2niche, M., Pataricza, A. (eds.) EDCC 2005. LNCS, vol. 3463, pp. 281\u2013292. Springer, Heidelberg (2005)"},{"key":"13_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03811-6","volume-title":"Principles of Program Analysis","author":"F Nielson","year":"1999","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.L.: Principles of Program Analysis. Springer, Berlin (1999)"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-11512-7_20","volume-title":"Concurrency, Compositionality, and Correctness","author":"A Fehnker","year":"2010","unstructured":"Fehnker, A., Seefried, S., Huuck, R.: Counterexample guided path reduction for static program analysis. In: Dams, D., Hannemann, U., Steffen, M. (eds.) Concurrency, Compositionality, and Correctness. LNCS, vol. 5930, pp. 322\u2013341. Springer, Heidelberg (2010)"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-49727-7_22","volume-title":"Static Analysis","author":"DA Schmidt","year":"1998","unstructured":"Schmidt, D.A., Steffen, B.: Program analysis as model checking of abstract interpretations. In: Levi, G. (ed.) SAS 1998. LNCS, vol. 1503, pp. 351\u2013380. Springer, Heidelberg (1998)"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Fehnker, A., Huuck, R., Jayet, P., Lussenburg, M., Rauch, F.: Model checking software at compile time. In: Proceedings of the First Joint IEEE\/IFIP Symposium on Theoretical Aspects of Software Engineering, TASE 2007, pp. 45\u201356. IEEE Computer Society, Washington, DC, USA (2007)","DOI":"10.1109\/TASE.2007.34"},{"key":"13_CR27","unstructured":"Cadar, C., Dunbar, D., Engler, D.: Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI 2008, pp. 209\u2013224. USENIX Association, Berkeley, CA, USA (2008)"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Burnim, J., Sen, K.: Heuristics for scalable dynamic test generation. In: Proceedings of the 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering. ASE 2008, pp. 443\u2013446. IEEE Computer Society, Washington, DC, USA (2008)","DOI":"10.1109\/ASE.2008.69"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Bradley, M., Cassez, F., Fehnker, A., Given-Wilson, T., Huuck, R.: High performance static analysis for industry. ENTCS, Third Workshop on Tools for Automatic Program Analysis (TAPAS 2012), vol. 289, pp. 3\u201314 (2012)","DOI":"10.1016\/j.entcs.2012.11.002"}],"container-title":["Communications in Computer and Information Science","Formal Techniques for Safety-Critical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29510-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T22:39:53Z","timestamp":1558391993000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-29510-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319295091","9783319295107"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29510-7_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"30 January 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}