{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:05:15Z","timestamp":1730214315036,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/desec.2018.8625128","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T17:35:19Z","timestamp":1551375319000},"page":"1-8","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Path Pruning in Symbolic Execution"],"prefix":"10.1109","author":[{"given":"Ying-Shen","family":"Chen","sequence":"first","affiliation":[]},{"given":"Wei-Ning","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Che-Yu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hsu-Chun","family":"Hsiao","sequence":"additional","affiliation":[]},{"given":"Shih-Kun","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2013.14"},{"key":"ref11","article-title":"Selective Symbolic Execution","author":"chipounov","year":"2009","journal-title":"Workshop on Hot Topics in System Dependability (HotDep)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"ref13","article-title":"Z3: An efficient smt solver","author":"de moura","year":"2008","journal-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref14","first-page":"213","article-title":"DART: directed automated random testing","volume":"40","author":"godefroid","year":"2013","journal-title":"ACM SIGPLAN Notices - Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1975.224259"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref18","article-title":"Under-constrained symbolic execution: correctness checking for real code","author":"ramos","year":"2015","journal-title":"USENIX Security Symposium"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321746"},{"journal-title":"Klee llvm execution engine","year":"0","key":"ref4"},{"journal-title":"HITCON","article-title":"A dozen years of shellphish from defcon to the cyber grand challenge","year":"2015","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"journal-title":"Black Hat","article-title":"Using static binary analysis to find vulnerabilities and backdoors in firmware","year":"2015","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606558"},{"journal-title":"DefCon","article-title":"Angry hacking","year":"2015","key":"ref2"},{"journal-title":"Angr","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"ref22","article-title":"Driller: Augmenting fuzzing through selective symbolic execution","author":"stephens","year":"2016","journal-title":"NDSS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"journal-title":"American Fuzzy Lop","year":"0","author":"zalewski","key":"ref24"},{"key":"ref23","first-page":"620","article-title":"DASE: document-assisted symbolic execution for improving automated software testing","author":"wong","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"}],"event":{"name":"2018 IEEE Conference on Dependable and Secure Computing (DSC)","start":{"date-parts":[[2018,12,10]]},"location":"Kaohsiung, Taiwan","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8614461\/8625077\/08625128.pdf?arnumber=8625128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T21:37:23Z","timestamp":1598218643000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8625128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/desec.2018.8625128","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}