{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:40:02Z","timestamp":1746074402511,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":46,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642454219"},{"type":"electronic","value":"9783642454226"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45422-6_5","type":"book-chapter","created":{"date-parts":[[2013,12,12]],"date-time":"2013-12-12T03:59:06Z","timestamp":1386820746000},"page":"64-78","source":"Crossref","is-referenced-by-count":7,"title":["Detection of Infeasible Paths: Approaches and Challenges"],"prefix":"10.1007","author":[{"given":"Sun","family":"Ding","sequence":"first","affiliation":[]},{"given":"Hee Beng Kuan","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Altenbernd, P.: On the False Path Problem in Hard Real-Time Programs. In: Real-Time Systems, Euromicro Conference, p. 102 (1996)","key":"5_CR1","DOI":"10.1109\/EMWRTS.1996.557827"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-69166-2_16","volume-title":"Static Analysis","author":"G. Balakrishnan","year":"2008","unstructured":"Balakrishnan, G., Sankaranarayanan, S., Ivan\u010di\u0107, F., Wei, O., Gupta, A.: SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement. In: Alpuente, M., Vidal, G. (eds.) SAS 2008. LNCS, vol.\u00a05079, pp. 238\u2013254. Springer, Heidelberg (2008)"},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/565816.503274","volume":"37","author":"T. Ball","year":"2002","unstructured":"Ball, T., Rajamani, S.K.: The SLAM project: debugging system software via static analysis. SIGPLAN Not.\u00a037, 1\u20133 (2002)","journal-title":"SIGPLAN Not."},{"doi-asserted-by":"crossref","unstructured":"Ball, T., Rajamani, S.K.: Bebop: a path-sensitive interprocedural dataflow engine. Presented at the Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, Snowbird, Utah, United States (2001)","key":"5_CR4","DOI":"10.1145\/379605.379690"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1145\/267896.267921","volume":"22","author":"R. Bodik","year":"1997","unstructured":"Bodik, R., Gupta, R., Soffa, M.L.: Refining data flow information using infeasible paths. SIGSOFT Softw. Eng. Notes\u00a022, 361\u2013377 (1997)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"doi-asserted-by":"crossref","unstructured":"Bj\u00f8rner, N., Tillmann, N., Voronkov, A.: Path Feasibility Analysis for String-Manipulating Programs. Presented at the Proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems: Held as Part of the Joint European Conferences on Theory and Practice of Software, York, UK (2009)","key":"5_CR6","DOI":"10.1007\/978-3-642-00768-2_27"},{"doi-asserted-by":"crossref","unstructured":"Botella, B., Delahaye, M., Hong-Tuan-Ha, S., Kosmatov, N., Mouy, P., Roger, M., Williams, N.: Automating structural testing of C programs: Experience with PathCrawler. In: Automation of Software Test, ICSE Workshop, pp. 70\u201378 (2009)","key":"5_CR7","DOI":"10.1109\/IWAST.2009.5069043"},{"unstructured":"Cobleigh, J.M., Clarke, L.A., Ostenveil, L.J.: The right algorithm at the right time: comparing data flow analysis algorithms for finite state verification. Presented at the Proceedings of the 23rd International Conference on Software Engineering, Toronto, Ontario, Canada (2001)","key":"5_CR8"},{"unstructured":"Concolic testing, http:\/\/en.wikipedia.org\/wiki\/Concolic_testing (retrieved)","key":"5_CR9"},{"key":"5_CR10","first-page":"74","volume":"52","author":"M. Edmund","year":"2009","unstructured":"Edmund, M., Clarke, E., Allen, E., Joseph, S.: Model Checking: Algorithmic Verification and Debugging. Communications of the ACM\u00a052, 74\u201384 (2009)","journal-title":"Communications of the ACM"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/543552.512538","volume":"37","author":"M. Das","year":"2002","unstructured":"Das, M., Lerner, S., Seigle, M.: ESP: path-sensitive program verification in polynomial time. SIGPLAN Not.\u00a037, 57\u201368 (2002)","journal-title":"SIGPLAN Not."},{"doi-asserted-by":"crossref","unstructured":"Delahaye, M., Botella, B., Gotlieb, A.: Explanation-Based Generalization of Infeasible Path. Presented at the Proceedings of the 2010 Third International Conference on Software Testing, Verification and Validation (2010)","key":"5_CR12","DOI":"10.1109\/ICST.2010.13"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1013886.1007515","volume":"29","author":"N. Dor","year":"2004","unstructured":"Dor, N., Adams, S., Das, M., Yang, Z.: Software validation via scalable path-sensitive value flow analysis. SIGSOFT Softw. Eng. Notes\u00a029, 12\u201322 (2004)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"5_CR14","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1145\/1040291.1040292","volume":"13","author":"M.B. Dwyer","year":"2004","unstructured":"Dwyer, M.B., Clarke, L.A., Cobleigh, J.M., Naumovich, G.: Flow analysis for verifying properties of concurrent software systems. ACM Trans. Softw. Eng. Approachol.\u00a013, 359\u2013430 (2004)","journal-title":"ACM Trans. Softw. Eng. Approachol."},{"unstructured":"Ermedahl, A.: A modular tool architecture for worst-Case execution time Analysis. PHD thesis, Uppsala University, Dept. of Information Technology, Uppsala University, Sweden (June 2003)","key":"5_CR15"},{"issue":"5","key":"5_CR16","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/1095430.1081742","volume":"30","author":"J. Fischer","year":"2005","unstructured":"Fischer, J., Jhala, R., Majumdar, R.: Joining dataflow with predicates. SIGSOFT Softw. Eng. Notes\u00a030(5), 227\u2013236 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1145\/267896.267922","volume":"22","author":"I. Forg\u00e1cs","year":"1997","unstructured":"Forg\u00e1cs, I., Bertolino, A.: Feasible test path selection by principal slicing. SIGSOFT Softw. Eng. Notes\u00a022, 378\u2013394 (1997)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"doi-asserted-by":"crossref","unstructured":"Goldberg, A., Wang, T.C., Zimmerman, D.: Applications of feasible path analysis to program testing. Presented at the Proceedings of the 1994 ACM SIGSOFT International Symposium on Software Testing and Analysis, Seattle, Washington, United States (1994)","key":"5_CR18","DOI":"10.1145\/186258.186523"},{"unstructured":"Gustafsson, J.: Worst case execution time analysis of Object-Oriented programs. In: The Proceedings of the Seventh International Workshop on Object-Oriented Real-Time Dependable Systems, San Diego, CA, USA, pp. 0071\u20130071 (2002)","key":"5_CR19"},{"doi-asserted-by":"crossref","unstructured":"Gustafsson, J., Ermedahl, A., Sandberg, C., Lisper, B.: Automatic derivation of loop bounds and infeasible paths for WCET analysis using abstract execution. Presented at the Proceedings of the 27th IEEE International Real-Time Systems Symposium (2006)","key":"5_CR20","DOI":"10.1109\/RTSS.2006.12"},{"unstructured":"Gustafsson, J.: Analyzing execution-time of Object-Oriented programs using abstract interpretation. PhD thesis, Department of Computer Systems, Information Technology, Uppsala University (2000)","key":"5_CR21"},{"unstructured":"Gustafsson, J., Ermedahl, A., Lisper, B.: Algorithms for Infeasible Path Calculation. In: Sixth International Workshop on Worst-Case Execution Time Analysis, Dresden, Germany (2006)","key":"5_CR22"},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/1108768.1108808","volume":"31","author":"H. Hampapuram","year":"2005","unstructured":"Hampapuram, H., Yang, Y., Das, M.: Symbolic path simulation in path-sensitive dataflow analysis. SIGSOFT Softw. Eng. Notes\u00a031, 52\u201358 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"unstructured":"Hedley, D., Hennell, M.A.: The cause and effects of infeasible paths in computer programs. Presented at the Proceedings of the 8th International Conference on Software Engineering, London, England (1985)","key":"5_CR24"},{"unstructured":"Khedker, U., Sanyal, A., Karkare, B.: Data flow analysis: theory and practice. Taylor and Francis (2009)","key":"5_CR25"},{"key":"5_CR26","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1145\/226295.226319","volume":"21","author":"B. Korel","year":"1996","unstructured":"Korel, B.: Automated test data generation for programs with procedures. SIGSOFT Softw. Eng. Notes\u00a021, 209\u2013215 (1996)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"issue":"2","key":"5_CR27","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.infsof.2008.07.001","volume":"51","author":"H. Liu","year":"2009","unstructured":"Liu, H., Tan, H.B.K.: Covering code behavior on input validation in functional testing. Information and Software Technology\u00a051(2), 546\u2013553 (2009)","journal-title":"Information and Software Technology"},{"issue":"2","key":"5_CR28","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.jss.2007.05.007","volume":"81","author":"H. Liu","year":"2008","unstructured":"Liu, H., Tan, H.B.K.: Testing input validation in web applications through automated model recovery. Journal of Systems and Software\u00a081(2), 222\u2013233 (2008)","journal-title":"Journal of Systems and Software"},{"key":"5_CR29","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.infsof.2007.05.004","volume":"50","author":"H. Liu","year":"2008","unstructured":"Liu, H., Tan, H.B.K.: An Approach for the maintenance of input validation. Information and Software Technology\u00a050, 449\u2013461 (2008)","journal-title":"Information and Software Technology"},{"doi-asserted-by":"crossref","unstructured":"Liu, H., Tan, H.B.K.: An approach to aid the understanding and maintenance of input validation. In: Proceedings 22nd International Conference on Software Maintenance (ICSM 2006), pp. 370\u2013379 (September 2006)","key":"5_CR30","DOI":"10.1109\/ICSM.2006.12"},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/0950-5849(90)90110-D","volume":"32","author":"N. Malevris","year":"1990","unstructured":"Malevris, N., Yates, D.F., Veevers, A.: Predictive metric for likely feasibility of program paths. Information and Software Technology\u00a032, 115\u2013118 (1990)","journal-title":"Information and Software Technology"},{"key":"5_CR32","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1002\/stvr.294","volume":"14","author":"P. McMinn","year":"2004","unstructured":"McMinn, P.: Search-based software test data generation: a survey: Research Articles. Softw. Test. Verif. Reliab.\u00a014, 105\u2013156 (2004)","journal-title":"Softw. Test. Verif. Reliab."},{"unstructured":"Moura, L.D., Bjorner, N.: Z3: an efficient SMT solver. Presented at the Proceedings of the Theory and practice of software. In: 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, Budapest, Hungary (2008)","key":"5_CR33"},{"issue":"3","key":"5_CR34","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.infsof.2006.11.005","volume":"50","author":"M.N. Ngo","year":"2008","unstructured":"Ngo, M.N., Tan, H.B.K.: Applying static analysis for automated extraction of database interactions in web applications. Information and Software Technology\u00a050(3), 160\u2013175 (2008)","journal-title":"Information and Software Technology"},{"key":"5_CR35","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1016\/j.infsof.2007.06.006","volume":"50","author":"M.N. Ngo","year":"2008","unstructured":"Ngo, M.N., Tan, H.B.K.: Heuristics-based infeasible path detection for dynamic test data generation. Inf. Softw. Technol.\u00a050, 641\u2013655 (2008)","journal-title":"Inf. Softw. Technol."},{"doi-asserted-by":"crossref","unstructured":"Ngo, M.N., Tan, H.B.K.: Detecting Large Number of Infeasible Paths through Recognizing their Patterns. In: Proceedings ESEC-FSE 2007, Joint European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 215\u2013224. ACM Press (2007)","key":"5_CR36","DOI":"10.1145\/1287624.1287655"},{"issue":"11","key":"5_CR37","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MC.2011.229","volume":"44","author":"B. Padmanabhuni","year":"2011","unstructured":"Padmanabhuni, B., Tan, H.B.K.: Defending against Buffer-Overflow Vulnerabilities. IEEE Computer\u00a044(11), 53\u201360 (2011)","journal-title":"IEEE Computer"},{"doi-asserted-by":"crossref","unstructured":"Prather, R.E., Myers, J.P.: The Path Prefix Software Engineering. IEEE Trans. on Software Engineering (1987)","key":"5_CR38","DOI":"10.1109\/TSE.1987.233487"},{"unstructured":"Robinson, A.J.A., Voronkov, A.: Handbook of Automated Reasoning, vol.\u00a0II. North-Holland (2001)","key":"5_CR39"},{"key":"5_CR40","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/1095430.1081750","volume":"30","author":"K. Sen","year":"2005","unstructured":"Sen, K., Marinov, D., Agha, G.: CUTE: a concolic unit testing engine for C. SIGSOFT Softw. Eng. Notes\u00a030, 263\u2013272 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"5_CR41","doi-asserted-by":"publisher","first-page":"99","DOI":"10.5121\/ijcses.2011.2108","volume":"2","author":"H. Tahbildar","year":"2011","unstructured":"Tahbildar, H., Kalita, B.: Automated Software Test Data Generation: Direction of Research. International Journal of Computer Science and Engineering Survey\u00a02, 99\u2013120 (2011)","journal-title":"International Journal of Computer Science and Engineering Survey"},{"unstructured":"Vergilio, S., Maldonado, J., Jino, M.: Infeasible paths within the context of data flow based criteria. In: The VI International Conference on Software Quality, Ottawa, Canada, pp. 310\u2013321 (1996)","key":"5_CR42"},{"doi-asserted-by":"crossref","unstructured":"Williams, N.: Abstract path testing with PathCrawler. Presented at the Proceedings of the 5th Workshop on Automation of Software Test, Cape Town, South Africa (2010)","key":"5_CR43","DOI":"10.1145\/1808266.1808272"},{"key":"5_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1347375.1347389","volume":"7","author":"R. Wilhelm","year":"2008","unstructured":"Wilhelm, R., Engblom, J., Ermedahl, A., Holsti, N., Thesing, S., Whalley, D., Bernat, G., Ferdinand, C., Heckmann, R., Mitra, T., Mueller, F., Puaut, I., Puschner, P., Staschulat, J., Stenstrom, P.: The worst-case execution-time problem\u2013overview of approaches and survey of tools. ACM Trans. Embed. Comput. Syst.\u00a07, 1\u201353 (2008)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Xie, T., Tillmann, N., Halleux, P.D., Schulte, W.: Fitness-Guided Path Exploration in Dynamic Symbolic Execution. Presented at the IEEE\/IFIP International Conference on Dependable Systems & Networks, Lisbon (2009)","key":"5_CR45","DOI":"10.1109\/DSN.2009.5270315"},{"key":"5_CR46","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1142\/S0218194001000487","volume":"11","author":"J. Zhang","year":"2001","unstructured":"Zhang, J., Wang, X.: A constraint solver and its application to path feasibility analysis. International Journal of Software Engineering and Knowledge Engineering\u00a011, 139\u2013156 (2001)","journal-title":"International Journal of Software Engineering and Knowledge Engineering"}],"container-title":["Communications in Computer and Information Science","Evaluation of Novel Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45422-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:26:24Z","timestamp":1746073584000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45422-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642454219","9783642454226"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45422-6_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}