{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:47:44Z","timestamp":1766159264991,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819986637"},{"type":"electronic","value":"9789819986644"}],"license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-99-8664-4_20","type":"book-chapter","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T06:05:13Z","timestamp":1702533913000},"page":"351-367","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Binary Level Concolic Execution on\u00a0Windows with\u00a0Rich Instrumentation Based Taint Analysis"],"prefix":"10.1007","author":[{"given":"Yixiao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chen","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Zhiqi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,15]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Aslanyan, H., Arutunian, M., Keropyan, G., Kurmangaleev, S., Vardanyan, V.: BinSide: static analysis framework for defects detection in binary code. In: 2020 Ivannikov Memorial Workshop (IVMEM), pp. 3\u20138. IEEE (2020)","DOI":"10.1109\/IVMEM51402.2020.00007"},{"issue":"3","key":"20_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3182657","volume":"51","author":"R Baldoni","year":"2018","unstructured":"Baldoni, R., Coppa, E., D\u2019elia, D.C., Demetrescu, C., Finocchi, I.: A survey of symbolic execution techniques. ACM Comput. Surv. (CSUR) 51(3), 1\u201339 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"20_CR3","unstructured":"Cadar, C., Dunbar, D., Engler, D.R.: KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Usenix Conference on Operating Systems Design & Implementation (2009)"},{"issue":"4","key":"20_CR4","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/2248487.1950396","volume":"39","author":"V Chipounov","year":"2012","unstructured":"Chipounov, V., Kuznetsov, V., Candea, G.: S2E: a platform for in-vivo multi-path analysis of software systems. ACM SIGPLAN Not. 39(4), 265\u2013278 (2012)","journal-title":"ACM SIGPLAN Not."},{"key":"20_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E Clarke","year":"2004","unstructured":"Clarke, E., Kroening, D., Lerda, F.: A tool for checking ANSI-C programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol. 2988, pp. 168\u2013176. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24730-2_15"},{"key":"20_CR6","unstructured":"Contributor, O.: Simulink benchmark. Web (2022). https:\/\/github.com\/EmbedSystemTest\/SimulinkTest"},{"key":"20_CR7","unstructured":"Fioraldi, A., Maier, D., Ei\u00dffeldt, H., Heuse, M.: $$\\{$$AFL++$$\\}$$: combining incremental steps of fuzzing research. In: 14th USENIX Workshop on Offensive Technologies (WOOT 20) (2020)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Gerasimov, A., et al.: Anxiety: a dynamic symbolic execution framework. In: 2017 Ivannikov ISPRAS Open Conference (ISPRAS), pp. 16\u201321. IEEE (2017)","DOI":"10.1109\/ISPRAS.2017.00010"},{"key":"20_CR9","unstructured":"Github Company: Winlibs (2023). https:\/\/github.com\/winlibs"},{"issue":"1","key":"20_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2090147.2094081","volume":"10","author":"P Godefroid","year":"2012","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: SAGE: whitebox fuzzing for security testing: SAGE has had a remarkable impact at Microsoft. Queue 10(1), 20 (2012)","journal-title":"Queue"},{"key":"20_CR11","unstructured":"Google Company: Winafl (2023). https:\/\/github.com\/googleprojectzero\/winafl"},{"key":"20_CR12","unstructured":"Inc., M.: Simulink design verifier. Web (2022). https:\/\/nl.mathworks.com\/products\/simulink-design-verifier.html"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1134\/S0361768814050041","volume":"40","author":"V Ivannikov","year":"2014","unstructured":"Ivannikov, V., Belevantsev, A., Borodin, A., Ignatiev, V., Zhurikhin, D., Avetisyan, A.: Static analyzer SVACE for finding defects in a source program code. Program. Comput. Softw. 40, 265\u2013275 (2014)","journal-title":"Program. Comput. Softw."},{"key":"20_CR14","unstructured":"JonathanSalwan: Triton examples. Web (2023). https:\/\/github.com\/JonathanSalwan\/Triton\/tree\/master\/src\/examples\/cpp"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Jung, J., Tong, S., Hu, H., Lim, J., Kim, T.: WINNIE: fuzzing windows applications with harness synthesis and fast cloning. In: Network and Distributed System Security Symposium (2021)","DOI":"10.14722\/ndss.2021.24334"},{"key":"20_CR16","unstructured":"Lattner, C.: LLVM: an infrastructure for multi-stage optimization (2003)"},{"key":"20_CR17","unstructured":"Molnar, D.A., Wagner, D., et al.: Catchconv: symbolic execution and run-time type inference for integer conversion errors. UC Berkeley EECS (2007)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Nejati, S., Gaaloul, K., Menghi, C., Briand, L.C., Foster, S., Wolfe, D.: Evaluating model testing and model checking for finding requirements violations in simulink models. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1015\u20131025 (2019)","DOI":"10.1145\/3338906.3340444"},{"key":"20_CR19","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1134\/S0361768815060055","volume":"41","author":"VA Padaryan","year":"2015","unstructured":"Padaryan, V.A., Kaushan, V., Fedotov, A.: Automated exploit generation for stack buffer overflow vulnerabilities. Program. Comput. Softw. 41, 373\u2013380 (2015)","journal-title":"Program. Comput. Softw."},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Roohi, N., Wang, Y., West, M., Dullerud, G.E., Viswanathan, M.: Statistical verification of the Toyota powertrain control verification benchmark. In: International Conference on Hybrid Systems: Computation and Control (2017)","DOI":"10.1145\/3049797.3049804"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-33636-2_19","volume-title":"Computational Methods in Systems Biology","author":"S Sankaranarayanan","year":"2012","unstructured":"Sankaranarayanan, S., Fainekos, G.: Simulating insulin infusion pump risks by in-silico modeling of the insulin-glucose regulatory system. In: Gilbert, D., Heiner, M. (eds.) CMSB 2012. LNCS, pp. 322\u2013341. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33636-2_19"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Sargsyan, S., Hakobyan, J., Mehrabyan, M., Mishechkin, M., Akozin, V., Kurmangaleev, S.: ISP-fuzzer: extendable fuzzing framework. In: 2019 Ivannikov Memorial Workshop (IVMEM), pp. 68\u201371. IEEE (2019)","DOI":"10.1109\/IVMEM.2019.00017"},{"key":"20_CR23","unstructured":"Saudel, F., Salwan, J.: Triton: a dynamic symbolic execution framework. In: Symposium sur la s\u00e9curit\u00e9 des Technologies de l\u2019information et des Communications. pp. 31\u201354. SSTIC, Rennes, France (Jun 2015)"},{"key":"20_CR24","unstructured":"Security, C.I.: Miasm. Web (2023). https:\/\/github.com\/cea-sec\/miasm"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Stephens, N., et al.: Driller: augmenting fuzzing through selective symbolic execution. In: NDSS, vol. 16, pp. 1\u201316 (2016)","DOI":"10.14722\/ndss.2016.23368"},{"key":"20_CR26","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/TCAD.2021.3055487","volume":"41","author":"Z Su","year":"2021","unstructured":"Su, Z., et al.: Code synthesis for dataflow based embedded software design. IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. 41, 49\u201361 (2021)","journal-title":"IEEE Trans. Comput.-Aided Design Integr. Circuits Syst."},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Su, Z., et al.: MDD: a unified model-driven design framework for embedded control software. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(10), 3252\u20133265 (2022)","DOI":"10.1109\/TCAD.2021.3132564"},{"key":"20_CR28","doi-asserted-by":"publisher","first-page":"1072","DOI":"10.1109\/TCAD.2022.3197504","volume":"42","author":"Z Su","year":"2022","unstructured":"Su, Z., et al.: PHCG: optimizing simulink code generation for embedded system with SIMD instructions. IEEE Trans. Comput.-Aided Design Integr. Circuits Syst. 42, 1072\u20131084 (2022)","journal-title":"IEEE Trans. Comput.-Aided Design Integr. Circuits Syst."},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Su, Z., et al.: STCG: state-aware test case generation for simulink models. In: 60th ACM\/IEEE Design Automation Conference (DAC). ACM (2023)","DOI":"10.1109\/DAC56929.2023.10247787"},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Vishnyakov, A., et al.: Sydr: cutting edge dynamic symbolic execution. In: 2020 Ivannikov ISPRAS Open Conference (ISPRAS), pp. 46\u201354. IEEE (2020)","DOI":"10.1109\/ISPRAS51486.2020.00014"},{"key":"20_CR31","unstructured":"Yang, Y.: Wintaintce. Web (2023). https:\/\/github.com\/GrowingCode\/WinTaintCE-SETTA"},{"key":"20_CR32","unstructured":"Yun, I., Lee, S., Xu, M., Jang, Y., Kim, T.: QSYM: a practical concolic execution engine tailored for hybrid fuzzing. In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 745\u2013761 (2018)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-8664-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T06:09:00Z","timestamp":1702534140000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-8664-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"ISBN":["9789819986637","9789819986644"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-8664-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"15 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SETTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Dependable Software Engineering: Theories, Tools, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"setta2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/lcs.ios.ac.cn\/setta2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"78","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}