{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:06:24Z","timestamp":1725858384766},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319415901"},{"type":"electronic","value":"9783319415918"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41591-8_6","type":"book-chapter","created":{"date-parts":[[2016,6,23]],"date-time":"2016-06-23T17:27:27Z","timestamp":1466702847000},"page":"76-81","source":"Crossref","is-referenced-by-count":3,"title":["Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information"],"prefix":"10.1007","author":[{"given":"Josselin","family":"Feist","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Mounier","sequence":"additional","affiliation":[]},{"given":"Marie-Laure","family":"Potet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,23]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Babic, D., Martignoni, L., McCamant, S., Song, D.: Statically-directed dynamic automated test generation. In: ISSTA (2011)","DOI":"10.1145\/2001420.2001423"},{"issue":"2","key":"6_CR2","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C Cadar","year":"2013","unstructured":"Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. ACM Commun. 56(2), 82\u201390 (2013)","journal-title":"ACM Commun."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"David, R., Bardin, S., Ta, T.D., Feist, J., et al.: BINSEC\/SE: a dynamic symbolic execution toolkit for binary-level analysis. In: SANER (2016)","DOI":"10.1109\/SANER.2016.43"},{"issue":"3","key":"6_CR4","first-page":"211","volume":"10","author":"J Feist","year":"2014","unstructured":"Feist, J., Mounier, L., Potet, M.L.: Statically detecting use-after-free on binary code. JCVHT 10(3), 211\u2013217 (2014)","journal-title":"JCVHT"},{"key":"6_CR5","unstructured":"Godefroid, P.: 500 machine-years of software model checking and SMT solving (invited speaker). In: SEFM (2014)"},{"key":"6_CR6","unstructured":"Haller, I., Slowinska, A., Neugschwandtner, M., Bos, H.: Dowsing for overflows: a guided fuzzer to find buffer boundary violations. In: USENIX SEC (2013)"},{"key":"6_CR7","unstructured":"Lov\u00e1sz, L.: Random walks on graphs: a survey. In: Erd\u0151s, P., Mikl\u00f3s,D., S\u00f3s, V.T., Sz\u0151nyi, T., Bolyai J\u00e1nos Matematikai T\u00e1rsulat (eds.) Combinatorics, Paul Erd\u00f6s is Eighty. Bolyai Society Mathematical Studies, vol. 2, pp. 1\u201346. J\u00e1nos Bolyai Mathematical Society (1996)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","first-page":"95","volume-title":"Static Analysis","author":"K-K Ma","year":"2011","unstructured":"Ma, K.-K., Yit Phang, K., Foster, J.S., Hicks, M.: Directed symbolic execution. In: Yahav, E. (ed.) Static Analysis. LNCS, vol. 6887, pp. 95\u2013111. Springer, Heidelberg (2011)"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Marinescu, P.D., Cadar, C.: Katch: high-coverage testing of software patches. In: ESEC\/SIGSOFT FSE (2013)","DOI":"10.1145\/2491411.2491438"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Rawat, S., Mounier, L.: Finding buffer overflow inducing loops in binary executables. In: SERE (2012)","DOI":"10.1109\/SERE.2012.30"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Zamfir, C., Candea, G.: Execution synthesis: a technique for automated software debugging. In: EuroSys (2010)","DOI":"10.1145\/1755913.1755946"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, Z., Wang, J., Dong, W., Liu, Z.: Regular property guided dynamic symbolic execution. In: ICSE (2015)","DOI":"10.1109\/ICSE.2015.80"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41591-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T03:23:39Z","timestamp":1568085819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41591-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319415901","9783319415918"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41591-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}