{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:15:43Z","timestamp":1770977743906,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T00:00:00Z","timestamp":1690329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T00:00:00Z","timestamp":1690329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1801546"],"award-info":[{"award-number":["CNS-1801546"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s10270-023-01118-0","type":"journal-article","created":{"date-parts":[[2023,7,26]],"date-time":"2023-07-26T07:01:34Z","timestamp":1690354894000},"page":"455-472","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Counterexample classification"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4436-8360","authenticated-orcid":false,"given":"Cole","family":"Vick","sequence":"first","affiliation":[]},{"given":"Eunsuk","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Tripakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,26]]},"reference":[{"key":"1118_CR1","doi-asserted-by":"crossref","unstructured":"Ball, T., Naik, M., Rajamani, S.K.: From symptom to cause: localizing errors in counterexample traces. In: Proceedings of the 30th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL\u201903, pp. 97\u2013105. Association for Computing Machinery, New York, NY, USA, January 2003","DOI":"10.1145\/604131.604140"},{"key":"1118_CR2","unstructured":"Barrett, C., Fontaine, P., Tinelli, C.: The satisfiability modulo theories library (SMT-LIB). www.SMT-LIB.org (2016)"},{"key":"1118_CR3","doi-asserted-by":"crossref","unstructured":"Beer, I., Ben-David, S., Chockler, H., Orni, A., Trefler, R.: Explaining counterexamples using causality. In: A Bouajjani, A., Maler, O. (eds.) Computer Aided Verification, Lecture Notes in Computer Science, pp. 94\u2013108. Springer: Berlin (2009)","DOI":"10.1007\/978-3-642-02658-4_11"},{"key":"1118_CR4","doi-asserted-by":"crossref","unstructured":"Chechik, M., Gurfinkel, A.: A framework for counterexample generation and exploration. In: FASE, pp. 220\u2013236 (2005)","DOI":"10.1007\/978-3-540-31984-9_17"},{"key":"1118_CR5","doi-asserted-by":"crossref","unstructured":"Christiansen, H., Dahl, V.: Hyprolog: a new logic programming language with assumptions and abduction. In: ICLP, pp. 159\u2013173 (2005)","DOI":"10.1007\/11562931_14"},{"key":"1118_CR6","doi-asserted-by":"crossref","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: Proceedings of the 4th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, POPL \u201977, pp. 238\u2013252. Association for Computing Machinery, New York, NY, USA, January 1977","DOI":"10.1145\/512950.512973"},{"key":"1118_CR7","doi-asserted-by":"crossref","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: an efficient SMT solver. In: Ramakrishnan, C.R., Rehof, J. (eds.) Tools and Algorithms for the Construction and Analysis of Systems. Lecture Notes in Computer Science, pp. 337\u2013340. Springer, Berlin (2008)","DOI":"10.1007\/978-3-540-78800-3_24"},{"issue":"8","key":"1118_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"DE Denning","year":"1981","unstructured":"Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Commun. ACM 24(8), 533\u2013536 (1981)","journal-title":"Commun. ACM"},{"key":"1118_CR9","unstructured":"Dominguez, A., Day, N., Cheriton: generating multiple diverse counterexamples for an EFSM (2013)"},{"key":"1118_CR10","volume-title":"Frontiers in Artificial Intelligence and Applications","author":"CP Gomes","year":"2021","unstructured":"Gomes, C.P., Sabharwal, A., Selman, B.: Chapter 25. Model counting. In: Biere, A., Heule, M., Van Maaren, H., Walsh, T. (eds.) Frontiers in Artificial Intelligence and Applications. IOS Press, Amsterdam (2021)"},{"key":"1118_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-44829-2_8","volume-title":"Model Checking Software. Lecture Notes in Computer Science","author":"A Groce","year":"2003","unstructured":"Groce, A., Visser, W.: What went wrong: explaining counterexamples. In: Ball, T., Rajamani, S.K. (eds.) Model Checking Software. Lecture Notes in Computer Science, pp. 121\u2013136. Springer, Berlin (2003)"},{"issue":"2","key":"1118_CR12","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/505145.505149","volume":"11","author":"D Jackson","year":"2002","unstructured":"Jackson, D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. (TOSEM) 11(2), 256\u2013290 (2002)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"1118_CR13","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/978-3-319-10575-8_15","volume-title":"Handbook of Model Checking","author":"R Jhala","year":"2018","unstructured":"Jhala, R., Podelski, A., Rybalchenko, A.: Predicate abstraction for program verification. In: Clarke, E.M., Henzinger, T.A., Veith, H., Bloem, R. (eds.) Handbook of Model Checking, pp. 447\u2013491. Springer, Cham (2018)"},{"key":"1118_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511530128","volume-title":"Abductive Inference: Computation, Philosophy, and Technology","author":"SG Josephson","year":"1994","unstructured":"Josephson, S.G., Josephson, J.R.: Abductive Inference: Computation, Philosophy, and Technology. Cambridge University Press, Cambridge (1994)"},{"issue":"6","key":"1118_CR15","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1093\/logcom\/2.6.719","volume":"2","author":"AC Kakas","year":"1992","unstructured":"Kakas, A.C., Kowalski, R.A., Toni, F.: Abductive logic programming. J. Log. Comput. 2(6), 719\u2013770 (1992)","journal-title":"J. Log. Comput."},{"key":"1118_CR16","unstructured":"Kakas, A.C., Van Nuffelen, B., Denecker, M.: A-system: problem solving through abduction. In: IJCAI, pp. 591\u2013596 (2001)"},{"key":"1118_CR17","doi-asserted-by":"crossref","unstructured":"Kashyap, S., Garg, V.K.: Producing short counter examples using \u201cCrucial Events\u201d. In: Gupta, A., Malik, S. (eds.) Computer Aided Verification. Lecture Notes in Computer Science, pp. 491\u2013503. Springer, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-70545-1_47"},{"issue":"3","key":"1118_CR18","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131\u2013133 (1995)","journal-title":"Inf. Process. Lett."},{"issue":"12","key":"1118_CR19","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"RM Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993\u2013999 (1978)","journal-title":"Commun. ACM"},{"key":"1118_CR20","doi-asserted-by":"crossref","unstructured":"Postel, J.: Transmission Control Protocol. RFC 793, September 1981. Available at: https:\/\/www.rfc-editor.org\/info\/rfc793","DOI":"10.17487\/rfc0793"},{"key":"1118_CR21","doi-asserted-by":"crossref","unstructured":"Shen, S., Qin, Y., Li, S.: Minimizing counterexample with unit core extraction and incremental sat. In: VMCAI, pp. 298\u2013312 (2005)","DOI":"10.1007\/978-3-540-30579-8_20"},{"key":"1118_CR22","doi-asserted-by":"crossref","unstructured":"Shlyakhter, I., Seater, R., Jackson, D., Sridharan, M., Taghdiri, M.: Debugging over constrained declarative models using unsatisfiable cores. In: ASE, pp. 94\u2013105 (2003)","DOI":"10.1109\/ASE.2003.1240298"},{"key":"1118_CR23","doi-asserted-by":"crossref","unstructured":"Solar-Lezama, A., Tancau, L., Bodik, R., Saraswat, V., Seshia, S.: Combinatorial sketching for finite programs. In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating System (ASPLOS), p. 12 (2006)","DOI":"10.1145\/1168857.1168907"},{"key":"1118_CR24","first-page":"109","volume-title":"Business Process Management Workshops. Lecture Notes in Business Information Processing","author":"M Song","year":"2009","unstructured":"Song, M., G\u00fcnther, C.W., van der Aalst, W.M.P.: Trace clustering in process mining. In: Ardagna, D., Mecella, M., Yang, J. (eds.) Business Process Management Workshops. Lecture Notes in Business Information Processing, pp. 109\u2013120. Springer, Berlin (2009)"},{"key":"1118_CR25","doi-asserted-by":"crossref","unstructured":"S\u00fclflow, A., Fey, G., Bloem, R., Drechsler, R.: Using unsatisfiable cores to debug multiple design errors. In: ACM Great Lakes Symposium on VLSI, pp. 77\u201382 (2008)","DOI":"10.1145\/1366110.1366131"},{"key":"1118_CR26","doi-asserted-by":"crossref","unstructured":"Torlak, E., Chang, F.S.-H., Jackson, D.: Finding minimal unsatisfiable cores of declarative specifications. In: Cuellar, J., Maibaum, T., Sere, K. (eds.) FM 2008: Formal Methods. Lecture Notes in Computer Science, pp. 326\u2013341. Springer, Berlin, Heidelberg (2008)","DOI":"10.1007\/978-3-540-68237-0_23"},{"key":"1118_CR27","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/978-3-030-92124-8_18","volume-title":"Software Engineering and Formal Methods","author":"C Vick","year":"2021","unstructured":"Vick, C., Kang, E., Tripakis, S.: Counterexample classification. In: Calinescu, R., P\u0103s\u0103reanu, C.S. (eds.) Software Engineering and Formal Methods, pp. 312\u2013331. Springer, Cham (2021)"},{"key":"1118_CR28","doi-asserted-by":"crossref","unstructured":"von Hippel, M., Vick, C., Tripakis, S., Nita-Rotaru, C.: Automated attacker synthesis for distributed protocols. In: Casimiro, A., Ortmeier, F., Bitsch, F., Ferreira, P. (eds.) Computer Safety, Reliability, and Security, pp. 133\u2013149. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-54549-9_9"},{"key":"1118_CR29","unstructured":"Zeller, A.: The debugging book. CISPA Helmholtz Center for Information Security (2021). Retrieved 2021-03-12 18:02:07+01:00"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-023-01118-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-023-01118-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-023-01118-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T00:17:18Z","timestamp":1729815438000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-023-01118-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,26]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["1118"],"URL":"https:\/\/doi.org\/10.1007\/s10270-023-01118-0","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,26]]},"assertion":[{"value":"10 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 July 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}