{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T17:33:28Z","timestamp":1751391208338},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389153"},{"type":"electronic","value":"9783642389160"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38916-0_9","type":"book-chapter","created":{"date-parts":[[2013,6,9]],"date-time":"2013-06-09T22:13:47Z","timestamp":1370816027000},"page":"152-167","source":"Crossref","is-referenced-by-count":15,"title":["Generating Test Suites with Augmented Dynamic Symbolic Execution"],"prefix":"10.1007","author":[{"given":"Konrad","family":"Jamrozik","sequence":"first","affiliation":[]},{"given":"Gordon","family":"Fraser","sequence":"additional","affiliation":[]},{"given":"Nikolai","family":"Tillman","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"de Halleux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing, 1st edn. Cambridge University Press (2008)","DOI":"10.1017\/CBO9780511809163"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-71209-1_12","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Anand","year":"2007","unstructured":"Anand, S., P\u0103s\u0103reanu, C.S., Visser, W.: JPF-SE: a symbolic execution extension to Java PathFinder. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 134\u2013138. Springer, Heidelberg (2007)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Andrews, J.H., Briand, L.C., Labiche, Y.: Is mutation an appropriate tool for testing experiments? In: Proc. ICSE 2005, pp. 402\u2013411. ACM (2005)","DOI":"10.1145\/1062455.1062530"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/978-3-642-23716-4_19","volume-title":"Search Based Software Engineering","author":"N. Bhattacharya","year":"2011","unstructured":"Bhattacharya, N., Sakti, A., Antoniol, G., Gu\u00e9h\u00e9neuc, Y.-G., Pesant, G.: Divide-by-zero exception raising via branch coverage. In: Cohen, M.B., \u00d3 Cinn\u00e9ide, M. (eds.) SSBSE 2011. LNCS, vol.\u00a06956, pp. 204\u2013218. Springer, Heidelberg (2011)"},{"issue":"2","key":"9_CR5","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C. Cadar","year":"2013","unstructured":"Cadar, C., Sen, K.: Symbolic execution for software testing: three decades later. Commun. ACM\u00a056(2), 82\u201390 (2013)","journal-title":"Commun. ACM"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Chilenski, J.J., Miller, S.P.: Applicability of modified condition\/decision coverage to software testing. Software Engineering Journal, 193\u2013200 (1994)","DOI":"10.1049\/sej.1994.0025"},{"issue":"4","key":"9_CR7","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"R.A. DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.: Hints on test data selection: Help for the practicing programmer. Computer\u00a011(4), 34\u201341 (1978)","journal-title":"Computer"},{"key":"9_CR8","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1002\/stvr.402","volume":"19","author":"G. Fraser","year":"2009","unstructured":"Fraser, G., Wotawa, F., Ammann, P.E.: Testing with model checkers: a survey. Softw. Test. Verif. Reliab.\u00a019, 215\u2013261 (2009)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Ghani, K., Clark, J.A.: Strengthening inferred specifications using search based testing. In: Proc. SBST, pp. 187\u2013194. IEEE Computer Society Press (2008)","DOI":"10.1109\/ICSTW.2008.39"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: Dart: directed automated random testing. In: Proc. PLDI, pp. 213\u2013223 (2005)","DOI":"10.1145\/1064978.1065036"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.A.: Active property checking. In: Proc. EMSOFT 2008, pp. 207\u2013216. ACM (2008)","DOI":"10.1145\/1450058.1450087"},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2090147.2094081","volume":"10","author":"P. Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.A.: Sage: Whitebox fuzzing for security testing. ACM Queue\u00a010(1), 20 (2012)","journal-title":"ACM Queue"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Luchaup, D.: Automatic partial loop summarization in dynamic test generation. In: Proc. ISSTA 2011, pp. 23\u201333. ACM (2011)","DOI":"10.1145\/2001420.2001424"},{"issue":"4","key":"9_CR14","first-page":"371","volume":"8","author":"W.E. Howden","year":"1982","unstructured":"Howden, W.E.: Weak mutation testing and completeness of test sets. IEEE TSE\u00a08(4), 371\u2013379 (1982)","journal-title":"IEEE TSE"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Jamrozik, K., Fraser, G., Tillmann, N., De Halleux, J.: Augmented dynamic symbolic execution. In: Proc. ASE 2012, pp. 254\u2013257. ACM (2012)","DOI":"10.1145\/2351676.2351716"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Joebstl, E., Weiglhofer, M., Aichernig, B.K., Wotawa, F.: When bdds fail: Conformance testing with symbolic execution and smt solving. In: Proc. ICST 2010, pp. 479\u2013488. IEEE Computer Society (2010)","DOI":"10.1109\/ICST.2010.48"},{"key":"9_CR17","unstructured":"Kosmatov, N., Legeard, B., Peureux, F., Utting, M.: Boundary coverage criteria for test generation from formal models. In: Proc. ISSRE, pp. 139\u2013150. IEEE Computer Society (2004)"},{"key":"9_CR18","doi-asserted-by":"crossref","unstructured":"Pandita, R., Xie, T., Tillmann, N., de Halleux, J.: Guided test generation for coverage criteria. In: Proc. ICSM 2010, pp. 1\u201310. IEEE Computer Society (2010)","DOI":"10.1109\/ICSM.2010.5609565"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Romano, D., Di Penta, M., Antoniol, G.: An approach for search based testing of null pointer exceptions. In: Proc. ICST 2011, pp. 160\u2013169. IEEE (2011)","DOI":"10.1109\/ICST.2011.49"},{"key":"9_CR20","unstructured":"Rothermel, G., Harrold, M.J., Ostrin, J., Hong, C.: An empirical study of the effects of minimization on the fault detection capabilities of test suites. In: Proc. ICSM 1998, pp. 34\u201343. IEEE Computer Society Press (1998)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., Agha, G.: CUTE: a concolic unit testing engine for C. In: Proc. ESEC\/FSE-13, pp. 263\u2013272. ACM (2005)","DOI":"10.21236\/ADA482657"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Staats, M., P\u01ces\u01cereanu, C.: Parallel symbolic execution for structural test generation. In: Proc. ISSTA 2010, pp. 183\u2013194. ACM (2010)","DOI":"10.1145\/1831708.1831732"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-79124-9_10","volume-title":"Tests and Proofs","author":"N. Tillmann","year":"2008","unstructured":"Tillmann, N., de Halleux, J.: Pex\u2013white box test generation for.NET. In: Beckert, B., H\u00e4hnle, R. (eds.) TAP 2008. LNCS, vol.\u00a04966, pp. 134\u2013153. Springer, Heidelberg (2008)"},{"key":"9_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/3-540-45648-1_15","volume-title":"ZB 2002: Formal Specification and Development in Z and B","author":"S.A. Vilkomir","year":"2002","unstructured":"Vilkomir, S.A., Bowen, J.P.: Reinforced condition\/decision coverage (rc\/dc): A new criterion for software testing. In: Bert, D., Bowen, J.P., Henson, M.C., Robinson, K. (eds.) ZB 2002. LNCS, vol.\u00a02272, pp. 291\u2013308. Springer, Heidelberg (2002)"},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TSE.1980.234486","volume":"6","author":"L.J. White","year":"1980","unstructured":"White, L.J., Cohen, E.I.: A domain strategy for computer program testing. IEEE Trans. Softw. Eng.\u00a06, 247\u2013257 (1980)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, L., Xie, T., Zhang, L., Tillmann, N., de Halleux, J., Mei, H.: Test generation via dynamic symbolic execution for mutation testing. In: Proc. ICSM 2010, pp. 1\u201310. IEEE Computer Society (2010)","DOI":"10.1109\/ICSM.2010.5609672"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38916-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T20:22:53Z","timestamp":1557778973000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38916-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389153","9783642389160"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38916-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}