{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T08:06:17Z","timestamp":1758960377211,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319489889"},{"type":"electronic","value":"9783319489896"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48989-6_50","type":"book-chapter","created":{"date-parts":[[2016,11,7]],"date-time":"2016-11-07T01:31:19Z","timestamp":1478482279000},"page":"779-785","source":"Crossref","is-referenced-by-count":6,"title":["RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions"],"prefix":"10.1007","author":[{"given":"Teodor","family":"Stoenescu","sequence":"first","affiliation":[]},{"given":"Alin","family":"Stefanescu","sequence":"additional","affiliation":[]},{"given":"Sorina","family":"Predut","sequence":"additional","affiliation":[]},{"given":"Florentin","family":"Ipate","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,8]]},"reference":[{"key":"50_CR1","unstructured":"European-Commission: Commission signs agreement with industry on cybersecurity and steps up efforts to tackle cyber-threats. http:\/\/europa.eu\/rapid\/press-release_IP-16-2321_en.htm . Accessed July 2016"},{"key":"50_CR2","unstructured":"DARPA-US: Cyber grand challenge (2016). http:\/\/cgc.darpa.mil"},{"issue":"2","key":"50_CR3","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C Cadar","year":"2013","unstructured":"Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM 56(2), 82\u201390 (2013)","journal-title":"Commun. ACM"},{"issue":"4","key":"50_CR4","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10009-009-0118-1","volume":"11","author":"CS Pasareanu","year":"2009","unstructured":"Pasareanu, C.S., Visser, W.: A survey of new trends in symbolic execution for software testing and analysis. STTT 11(4), 339\u2013353 (2009)","journal-title":"STTT"},{"key":"50_CR5","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., Agha, G.: CUTE: a concolic unit testing engine for C. In: Proceedings of ESEC\/FSE, pp. 263\u2013272. ACM (2005)","DOI":"10.1145\/1081706.1081750"},{"key":"50_CR6","unstructured":"Cadar, C., et al.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of OSDI, pp. 209\u2013224. USENIX (2008)"},{"issue":"1","key":"50_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2557833.2560571","volume":"39","author":"KS Luckow","year":"2014","unstructured":"Luckow, K.S., Pasareanu, C.S.: Symbolic PathFinder v7. ACM SIGSOFT Softw. Eng. Notes 39(1), 1\u20135 (2014)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"50_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D Song","year":"2008","unstructured":"Song, D., et al.: BitBlaze: a new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol. 5352, pp. 1\u201325. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-89862-7_1"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing Mayhem on binary code. In: Proceedings of SP 2012, pp. 380\u2013394. IEEE (2012)","DOI":"10.1109\/SP.2012.31"},{"key":"50_CR10","unstructured":"Salwan, J., Saudel, F.: Triton: a dynamic symbolic execution framework. In: Proceedings of SSTIC, pp. 31\u201354 (2015). http:\/\/triton.quarkslab.com"},{"key":"50_CR11","unstructured":"Bitdefender (2016). http:\/\/www.bitdefender.com\/business\/awards.html"},{"key":"50_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"L Moura de","year":"2008","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) TACAS 2008. LNCS, vol. 4963, pp. 337\u2013340. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-78800-3_24"},{"issue":"1","key":"50_CR13","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2110356.2110358","volume":"30","author":"V Chipounov","year":"2012","unstructured":"Chipounov, V., Kuznetsov, V., Candea, G.: The S2E platform: design, implementation, and applications. ACM Trans. Comput. Syst. 30(1), 2 (2012)","journal-title":"ACM Trans. Comput. Syst."},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Rizzi, E.F., et al.: On the techniques we create, the tools we build, and their misalignments: a study of KLEE. In: Proceedings of ICSE 2016, pp. 132\u2013143. ACM (2016)","DOI":"10.1145\/2884781.2884835"},{"issue":"4","key":"50_CR15","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1713254.1713257","volume":"43","author":"L Ciortea","year":"2009","unstructured":"Ciortea, L., Zamfir, C., Bucur, S., Chipounov, V., Candea, G.: Cloud9: a software testing service. Oper. Syst. Rev. 43(4), 5\u201310 (2009)","journal-title":"Oper. Syst. Rev."},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Stephens, N., et al.: Driller: augmenting fuzzing through selective symbolic execution. In: Proceedings of NDSS 2016, pp. 1\u201316. The Internet Society (2016)","DOI":"10.14722\/ndss.2016.23368"}],"container-title":["Lecture Notes in Computer Science","FM 2016: Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48989-6_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T22:58:58Z","timestamp":1498345138000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48989-6_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319489889","9783319489896"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48989-6_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}