{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T04:41:37Z","timestamp":1720327297831},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11390-019-1935-7","type":"journal-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T02:29:13Z","timestamp":1557973753000},"page":"670-689","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Unit Test Data Generation for C Using Rule-Directed Symbolic Execution"],"prefix":"10.1007","volume":"34","author":[{"given":"Ming-Zhe","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yun-Zhan","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Ya-Wen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Da-Hai","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,10]]},"reference":[{"key":"1935_CR1","doi-asserted-by":"crossref","unstructured":"Li B, Vendome C, Linares-V\u00e1squez M, Poshyvanyk D, Kraft N A. Automatically documenting unit test cases. In Proc. IEEE International Conference on the Software Testing, Verification and Validation, April 2016, pp.341-352.","DOI":"10.1109\/ICST.2016.30"},{"key":"1935_CR2","unstructured":"Lam W, Srisakaokul S, Bassett B, Mahdian P, Xie T, Tillmann N, de Halleux J. Parameterized unit testing in the open source wild. Technical Report, IDEALS, 2015. \n                    http:\/\/hdl.handle.net\/2142\/88374\n                    \n                  , Dec. 2018."},{"key":"1935_CR3","doi-asserted-by":"crossref","unstructured":"Zhang B, Hill E, Clause J. Towards automatically generating descriptive names for unit tests. In Proc. the 31st IEEE\/ACM International Conference on Automated Software Engineering, September 2016, pp.625-636.","DOI":"10.1145\/2970276.2970342"},{"key":"1935_CR4","doi-asserted-by":"crossref","unstructured":"Yoshida H, Tokumoto S, Prasad M R, Ghosh I, Uehara T. FSX: Fine-grained incremental unit test generation for C\/C++ programs. In Proc. the 25th International Symposium on Software Testing and Analysis, July 2016, pp.106-117.","DOI":"10.1145\/2931037.2931055"},{"issue":"9","key":"1935_CR5","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/32.92910","volume":"17","author":"RA DeMilli","year":"1991","unstructured":"DeMilli R A, Offutt A J. Constraint-based automatic test data generation. IEEE Transactions on Software Engineering, 1991, 17(9): 900-910.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"1935_CR6","doi-asserted-by":"crossref","unstructured":"Boonstoppel P, Cadar C, Engler D. RWset: Attacking path explosion in constraint-based test generation. In Proc. the 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, March 2008, pp.351-366.","DOI":"10.1007\/978-3-540-78800-3_27"},{"issue":"6","key":"1935_CR7","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1145\/390016.808445","volume":"10","author":"RS Boyer","year":"1975","unstructured":"Boyer R S, Elspas B, Levitt K N. SELECT \u2014 A formal system for testing and debugging programs by symbolic execution. ACM SIGPLAN Notices, 1975, 10(6): 234-245.","journal-title":"ACM SIGPLAN Notices"},{"issue":"2","key":"1935_CR8","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/2408776.2408795","volume":"56","author":"C Cadar","year":"2013","unstructured":"Cadar C, Sen K. Symbolic execution for software testing: Three decades later. Communications of the ACM, 2013, 56(2): 82-90.","journal-title":"Communications of the ACM"},{"key":"1935_CR9","unstructured":"Cadar C, Dunbar D, Engler D R. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proc. the 8th USENIX Symposium on Operating Systems Design and Implementation, December 2008, pp.209-224."},{"key":"1935_CR10","doi-asserted-by":"crossref","unstructured":"Ganesh V, Dill D L. A decision procedure for bit-vectors and arrays. In Proc. the 19th International Conference on Computer Aided Verification, July 2007, pp.519-531.","DOI":"10.1007\/978-3-540-73368-3_52"},{"key":"1935_CR11","doi-asserted-by":"crossref","unstructured":"de Moura L, Bj\u00f8rner N. Z3: An efficient SMT solver. In Proc. the 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, March 2008, pp.337-340.","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"1935_CR12","doi-asserted-by":"crossref","unstructured":"Tillmann N, de Halleux J. Pex-white box test generation for .NET. In Proc. the 2nd International Conference on Tests and Proofs, April 2008, pp.134-153.","DOI":"10.1007\/978-3-540-79124-9_10"},{"key":"1935_CR13","doi-asserted-by":"crossref","unstructured":"Cadar C, Ganesh V, Pawlowski P M, Dill D L, Engler D R. EXE: Automatically generating inputs of death. ACM Transactions on Information and System Security, 2008, 12(2): Article No. 10.","DOI":"10.1145\/1455518.1455522"},{"key":"1935_CR14","doi-asserted-by":"crossref","unstructured":"Engler D R, Dunbar D. Under-constrained execution: Making automatic code destruction easy and scalable. In Proc. the 2007 ACM\/SIGSOFT International Symposium on Software Testing and Analysis, July 2007, pp.1-4.","DOI":"10.1145\/1273463.1273464"},{"key":"1935_CR15","doi-asserted-by":"crossref","unstructured":"Burnim J, Sen K. Heuristics for scalable dynamic test generation. In Proc. the 23rd IEEE\/ACM International Conference on Automated Software Engineering, September 2008, pp.443-446.","DOI":"10.1109\/ASE.2008.69"},{"key":"1935_CR16","unstructured":"Hutchins M, Foster H, Goradia T, Ostrand T. Experiments of the effectiveness of dataflow- and controlflow-based test adequacy criteria. In Proc. the 16th International Conference on Software Engineering, May 1994, pp.191-200."},{"issue":"10","key":"1935_CR17","doi-asserted-by":"crossref","first-page":"1345","DOI":"10.1360\/N112014-00142","volume":"44","author":"Y Xing","year":"2014","unstructured":"Xing Y, Gong Y Z, Wang Y W, Zhang X Z. Branch and bound framework for automatic test case generation. SCIENTIA SINICA Informationis, 2014, 44(10): 1345-1360.","journal-title":"SCIENTIA SINICA Informationis"},{"key":"1935_CR18","unstructured":"Kernighan B W, Ritchie D M. The C Programming Language (2nd edition). Prentice hall, 1988."},{"issue":"6","key":"1935_CR19","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/s11390-017-1787-y","volume":"32","author":"XZ Zhang","year":"2017","unstructured":"Zhang X Z, Gong Y Z, Wang YW, Xing Y, Zhang M Z. Automated string constraints solving for programs containing string manipulation functions. Journal of Computer Science and Technology, 2017, 32(6): 1125-1135.","journal-title":"Journal of Computer Science and Technology"},{"key":"1935_CR20","unstructured":"Aho A V, Sethi R, Ullman J D. Compilers: Principles, Techniques, and Tools. Addison-Wesley, 1986."},{"issue":"2","key":"1935_CR21","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1049\/iet-sen.2010.0029","volume":"5","author":"MX Lin","year":"2011","unstructured":"Lin M X, Chen Y L, Yu K, Wu G S. Lazy symbolic execution for test data generation. IET Software, 2011, 5(2): 132-141.","journal-title":"IET Software"},{"key":"1935_CR22","doi-asserted-by":"crossref","unstructured":"Li G, Ghosh I. Lazy symbolic execution through abstraction and sub-space search. In Proc. the 9th International Haifa Verification Conference on Hardware and Software: Verification and Testing, November 2013, pp.295-310.","DOI":"10.1007\/978-3-319-03077-7_20"},{"key":"1935_CR23","first-page":"96","volume":"51","author":"L Brack-Bernsen","year":"2005","unstructured":"Brack-Bernsen L, Hunger H. On the \u201cAtypical Astronomical Cuneiform Text E\u201d: A mean-value scheme for predicting lunar latitude. Archiv fur Orientforschung, 2005, 51: 96-107.","journal-title":"Archiv fur Orientforschung"},{"key":"1935_CR24","doi-asserted-by":"crossref","unstructured":"Arcuri A, Iqbal M Z, Briand L. Formal analysis of the effectiveness and predictability of random testing. In Proc. the 19th International Symposium on Software Testing and Analysis, July 2010, pp.219-230.","DOI":"10.1145\/1831708.1831736"},{"key":"1935_CR25","doi-asserted-by":"crossref","unstructured":"Sen K, Marinov D, Agha G. Cute: A concolic unit testing engine for C. In Proc. the 10th European Software Engineering Conference, September 2005, pp.263-272.","DOI":"10.21236\/ADA482657"},{"issue":"3","key":"1935_CR26","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/2093548.2093564","volume":"55","author":"P Godefroid","year":"2012","unstructured":"Godefroid P, Levin M Y, Molnar D. SAGE: Whitebox fuzzing for security testing. Communications of the ACM, 2012, 55(3): 40-44.","journal-title":"Communications of the ACM"},{"issue":"5","key":"1935_CR27","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MS.2017.3571576","volume":"34","author":"H Yoshida","year":"2017","unstructured":"Yoshida H, Li G, Kamiya T, Ghosh I, Rajan S, Tokumoto S, Munakata K, Uehara T. KLOVER: Automatic test generation for C and C++ programs, using symbolic execution. IEEE Software, 2017, 34(5): 30-37.","journal-title":"IEEE Software"},{"key":"1935_CR28","unstructured":"Ramos D A, Engler D R. Under-constrained symbolic execution: Correctness checking for real code. In Proc. the 24th USENIX Security Symposium, August 2015, pp.49-64."},{"key":"1935_CR29","doi-asserted-by":"crossref","unstructured":"Nori A V, Rajamani S K. An empirical study of optimizations in YOGI. In Proc. the 32nd ACM\/IEEE International Conference on Software Engineering, Volume 1, May 2010, pp.355-364.","DOI":"10.1145\/1806799.1806852"},{"key":"1935_CR30","unstructured":"Zhang D, Liu D, Lei Y, Kung D, Csallner C, Wang W. Detecting vulnerabilities in C programs using trace-based testing. In Proc. the 2010 IEEE\/IFIP International Conference on Dependable Systems Networks, June 2010, pp.241-250."},{"key":"1935_CR31","doi-asserted-by":"crossref","unstructured":"Li H, Kim T, Bat-Erdene M, Lee H. Software vulnerability detection using backward trace analysis and symbolic execution. In Proc. the 2013 International Conference on Availability, Reliability and Security, September 2013, pp.446-454.","DOI":"10.1109\/ARES.2013.59"},{"key":"1935_CR32","doi-asserted-by":"crossref","unstructured":"Kim Y, Kim Y, Kim T, Lee G, Jang Y, Kim M. Automated unit testing of large industrial embedded software using concolic testing. In Proc. the 28th IEEE\/ACM International Conference on Automated Software Engineering, November 2013, pp.519-528.","DOI":"10.1109\/ASE.2013.6693109"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1935-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-019-1935-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-019-1935-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,8]],"date-time":"2020-05-08T23:27:50Z","timestamp":1588980470000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-019-1935-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["1935"],"URL":"https:\/\/doi.org\/10.1007\/s11390-019-1935-7","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5]]},"assertion":[{"value":"6 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}