{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:10:07Z","timestamp":1738692607212,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540893295"},{"type":"electronic","value":"9783540893301"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89330-1_4","type":"book-chapter","created":{"date-parts":[[2008,11,27]],"date-time":"2008-11-27T02:43:37Z","timestamp":1227753817000},"page":"36-52","source":"Crossref","is-referenced-by-count":3,"title":["Context-Sensitive Relevancy Analysis for Efficient Symbolic Execution"],"prefix":"10.1007","author":[{"given":"Xin","family":"Li","sequence":"first","affiliation":[]},{"given":"Daryl","family":"Shannon","sequence":"additional","affiliation":[]},{"given":"Indradeep","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Mizuhito","family":"Ogawa","sequence":"additional","affiliation":[]},{"given":"Sreeranga P.","family":"Rajan","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"4_CR1","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J.C. King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM\u00a019(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Deng, X., Lee, J., Robby: Bogor\/Kiasan: A k-bounded symbolic execution for checking strong heap properties of open systems. In: The 21st IEEE International Conference on Automated Software Engineering (ASE 2006), pp. 157\u2013166 (2006)","DOI":"10.1109\/ASE.2006.26"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/3-540-36577-X_40","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Khurshid","year":"2003","unstructured":"Khurshid, S., Pasareanu, C., Visser, W.: Generalized symbolic execution for model checking and testing. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 553\u2013568. Springer, Heidelberg (2003)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-71209-1_12","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Anand","year":"2007","unstructured":"Anand, S., Pasareanu, C.S., Visser, W.: JPF-SE: A symbolic execution extension to Java PathFinder. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 134\u2013138. Springer, Heidelberg (2007)"},{"issue":"1-2","key":"4_CR5","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.scico.2005.02.009","volume":"58","author":"T.W. Reps","year":"2005","unstructured":"Reps, T.W., Schwoon, S., Jha, S., Melski, D.: Weighted pushdown systems and their application to interprocedural dataflow analysis. Sci. Comput. Program.\u00a058(1-2), 206\u2013263 (2005)","journal-title":"Sci. Comput. Program."},{"key":"4_CR6","first-page":"114","volume-title":"Functional Programming. Proc. 1990 Glasgow Workshop","author":"S. Hunt","year":"1990","unstructured":"Hunt, S.: PERs generalize projections for strictness analysis. In: Functional Programming. Proc. 1990 Glasgow Workshop, pp. 114\u2013125. Springer, Heidelberg (1990)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Schmidt, D.A.: Data flow analysis is model checking of abstract interpretations. In: The 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages (POPL 1998), pp. 38\u201348 (1998)","DOI":"10.1145\/268946.268950"},{"key":"4_CR8","unstructured":"Vall\u00e9e-Rai, R., Co, P., Gagnon, E., Hendren, L.J., Lam, P., Sundaresan, V.: Soot - a Java bytecode optimization framework. In: Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 1999 (1999)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Hasti, R., Horwitz, S.: Using static single assignment form to improve flow-insensitive pointer analysis. In: ACM SIGPLAN conference on Programming language design and implementation (PLDI 1998), pp. 97\u2013105 (1998)","DOI":"10.1145\/277650.277668"},{"key":"4_CR10","unstructured":"Li, X., Ogawa, M.: Interprocedural program analysis for java based on weighted pushdown model checking. In: The 5th International Workshop on Automated Verification of Infinite-State Systems (AVIS 2006), ETAPS (April 2006)"},{"key":"4_CR11","first-page":"5","volume-title":"International Logic Programming Symposium (ILPS 1997)","author":"T.W. Reps","year":"1997","unstructured":"Reps, T.W.: Program analysis via graph reachability. In: International Logic Programming Symposium (ILPS 1997), pp. 5\u201319. MIT Press, Cambridge (1997)"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-540-77050-3_4","volume-title":"FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science","author":"T.W. Reps","year":"2007","unstructured":"Reps, T.W., Lal, A., Kidd, N.: Program analysis using weighted pushdown systems. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol.\u00a04855, pp. 23\u201351. Springer, Heidelberg (2007)"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Shivers, O.: Control flow analysis in scheme. In: ACM SIGPLAN conference on Programming Language design and Implementation (PLDI 1988), pp. 164\u2013174 (1988)","DOI":"10.1145\/53990.54007"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Whaley, J., Lam, M.S.: Cloning-based context-sensitive pointer alias analysis using binary decision diagrams. In: ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2004), pp. 131\u2013144 (2004)","DOI":"10.1145\/996841.996859"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Tkachuk, O., Dwyer, M.B., P\u0103s\u0103reanu, C.: Automated environment generation for software model checking. In: The 18th IEEE International Conference on Automated Software Engineering (ASE 2003), pp. 116\u2013129 (2003)","DOI":"10.1109\/ASE.2003.1240300"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Khurshid, S., Suen, Y.L.: Generalizing symbolic execution to library classes. In: ACM SIGPLAN-SIGSOFT Workshop on Program Analysis For Software Tools and Engineering (PASTE 2005), pp. 103\u2013110 (2005)","DOI":"10.1145\/1108792.1108817"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Dwyer, M., Hatcliff, J., Joehanes, R., Laubach, S., Pasareanu, C.S., Robby, Zheng, H., Visser, W.: Tool-supported program abstraction for finite-state verification. In: The 23rd International Conference on Software Engineering (ICSE 2001), pp. 177\u2013187 (2001)","DOI":"10.1109\/ICSE.2001.919092"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Cadar, C., Ganesh, V., Pawlowski, P.M., Dill, D.L., Engler, D.R.: EXE: Automatically generating inputs of death. In: ACM Conference on Computer and Communications Security 2006 (CCS 2006), pp. 322\u2013335 (2006)","DOI":"10.1145\/1180405.1180445"},{"issue":"3","key":"4_CR19","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2006.01.002","volume":"144","author":"W. Schulte","year":"2006","unstructured":"Schulte, W., Grieskamp, W., Tillmann, N.: XRT-exploring runtime for.NET architecture and applications. Electronic Notes in Theoretical Computer Science\u00a0144(3), 3\u201326 (2006)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/1081706.1081750","volume-title":"ESEC\/FSE-13: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering","author":"K. Sen","year":"2005","unstructured":"Sen, K., Marinov, D., Agha, G.: CUTE: a concolic unit testing engine for C. In: ESEC\/FSE-13: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering, pp. 263\u2013272. ACM, New York (2005)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-540-71209-1_11","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Anand","year":"2007","unstructured":"Anand, S., Orso, A., Harrold, M.J.: Type-dependence analysis and program transformation for symbolic execution. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 117\u2013133. Springer, Heidelberg (2007)"},{"key":"4_CR22","unstructured":"Livshits, V.B., Lam, M.S.: Finding security vulnerabilities in Java applications with static analysis. In: The 14th conference on USENIX Security Symposium (SSYM 2005), p. 18. USENIX Association (2005)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44898-5_1","volume-title":"Static Analysis","author":"A. Christensen","year":"2003","unstructured":"Christensen, A., M\u00f8ller, A., Schwartzbach, M.: Precise analysis of string expressions. In: Cousot, R. (ed.) SAS 2003. LNCS, vol.\u00a02694, pp. 1\u201318. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89330-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T17:37:52Z","timestamp":1738690672000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89330-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893295","9783540893301"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89330-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}