{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T11:19:59Z","timestamp":1725621599462},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642244025"},{"type":"electronic","value":"9783642244032"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24403-2_3","type":"book-chapter","created":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T11:56:27Z","timestamp":1318852587000},"page":"32-43","source":"Crossref","is-referenced-by-count":8,"title":["H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation"],"prefix":"10.1007","author":[{"given":"Jinjing","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Yan","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Fuzz utility, ftp:\/\/grilled.cs.wisc.edu\/fuzz"},{"issue":"12","key":"3_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"B.P. Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Communications of the ACM\u00a033(12), 32\u201344 (1990)","journal-title":"Communications of the ACM"},{"issue":"3","key":"3_CR3","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1147\/sj.223.0229","volume":"22","author":"D. Bird","year":"1983","unstructured":"Bird, D., Munoz, C.: Automatic Generation of Random Self-Checking Test Cases. IBM Systems Journal\u00a022(3), 229\u2013245 (1983)","journal-title":"IBM Systems Journal"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Offut, J., Hayes, J.: A Semantic Model of Program Faults. In: Proceedings of International Symposium on Software Testing and Analysis (ISSTA 1996), pp. 195\u2013200 (1996)","DOI":"10.1145\/229000.226317"},{"key":"3_CR5","unstructured":"Forrester, J.E., Miller, B.P.: An Empirical Study of the Robustness of Windows NT Applications Using Random Testing. In: Proceedings of the 4th USENIX Windows System Symposium (2000)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1002\/spe.602","volume":"34","author":"C. Csallner","year":"2004","unstructured":"Csallner, C., Smaragdakis, Y.: JCrasher: An Automatic Robustness Tester for Java. Software: Practice and Experience\u00a034, 1025\u20131050 (2004)","journal-title":"Software: Practice and Experience"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Ernst, M.D.: Eclat: Automatic Generation and Classification of Test Inputs. In: Proceedings of 19th European Conference Object-Oriented Programing (2005)","DOI":"10.1007\/11531142_22"},{"issue":"7","key":"3_CR8","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J.C. King","year":"1976","unstructured":"King, J.C.: Symbolic Execution and Program Testing. Communications of the ACM\u00a019(7), 385\u2013394 (1976)","journal-title":"Communications of the ACM"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1109\/TSE.1976.233817","volume":"2","author":"L. Clarke","year":"1976","unstructured":"Clarke, L.: A System to Generate Test Data and Symbolically Execute Programs. IEEE Transaction on Software Engineering\u00a02, 215\u2013222 (1976)","journal-title":"IEEE Transaction on Software Engineering"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Visvanathan, S., Gupta, N.: Generating Test Data for Functions with Pointer Inputs. In: Proceedings of 17th IEEE International Conference on Automated Software Engineering, ICASE 2002 (2002)","DOI":"10.1109\/ASE.2002.1115007"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Visser, W., Pasareanu, C.S., Khurshid, S.: Test Input Generation with Java PathFinder. In: Proceedings of 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2004), pp. 97\u2013107 (2004)","DOI":"10.1145\/1007512.1007526"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Beyer, D., Chlipala, A.J., Henzinger, T.A., Jhala, R., Majumdar, R.: Generating Test from Counterexamples. In: Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), pp. 326\u2013335 (2004)","DOI":"10.1109\/ICSE.2004.1317455"},{"key":"3_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-540-31980-1_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"T. Xie","year":"2005","unstructured":"Xie, T., Marinov, D., Schulte, W., Notkin, D.: Symstra: A Framework for Generating Object-Oriented Unit Tests Using Symbolic Execution. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 365\u2013381. Springer, Heidelberg (2005)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Majumdar, R., Xu, R.: Directed test generation using symbolic grammars. In: Foundations of Software Engineering, pp. 553\u2013556 (2007)","DOI":"10.1145\/1321631.1321653"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Kiezun, A., Levin, M.: Grammar-based Whitebox Fuzzing. In: Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, PLDI 2008 (2008)","DOI":"10.1145\/1375581.1375607"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1109\/ICSE.2007.41","volume-title":"Proceedings of 29th International Conference on Software Engineering (ICSE 2007)","author":"R. Majumdar","year":"2007","unstructured":"Majumdar, R., Sen, K.: Hybrid concolic testing. In: Proceedings of 29th International Conference on Software Engineering (ICSE 2007), pp. 416\u2013426. IEEE, Los Alamitos (2007)"}],"container-title":["Lecture Notes in Computer Science","Network and Parallel Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24403-2_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T03:15:58Z","timestamp":1606187758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24403-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642244025","9783642244032"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24403-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}