{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T13:49:39Z","timestamp":1751377779684},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icse.2012.6227146","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T21:24:04Z","timestamp":1341869044000},"page":"716-726","source":"Crossref","is-referenced-by-count":26,"title":["make test-zesti: A symbolic execution solution for improving regression testing"],"prefix":"10.1109","author":[{"given":"Paul","family":"Dan Marinescu","sequence":"first","affiliation":[]},{"given":"Cristian","family":"Cadar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/152388.152391"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001422"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.109"},{"journal-title":"The Economic Impacts of Inadequate Infrastructure for Software Testing","year":"2002","author":"tassey","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199606)6:2<83::AID-STVR112>3.0.CO;2-9"},{"key":"33","article-title":"Bitblaze: A new approach to computer security via binary analysis","author":"song","year":"2008","journal-title":"ICISS'08"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190226"},{"key":"34","doi-asserted-by":"crossref","DOI":"10.1145\/566172.566187","article-title":"Effectively prioritizing tests in development environment","author":"srivastava","year":"2002","journal-title":"ISSTA'02"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882330"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512531"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"37","article-title":"Pex: White box test generation for.net","author":"tillmann","year":"2008","journal-title":"TAP'08"},{"key":"11","article-title":"Mace: Model-inference-assisted concolic exploration for protocol and vulnerability discovery","author":"cho","year":"2011","journal-title":"Usenix Security"},{"key":"38","article-title":"A first step towards automated detection of buffer overrun vulnerabilities","author":"wagner","year":"2000","journal-title":"NDSS'00"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512538"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"20","article-title":"Purify: Fast detection of memory leaks and access errors","author":"hastings","year":"1992","journal-title":"USENIX-Winter'92"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.10"},{"key":"40","article-title":"Using model checking to find serious file system errors","author":"yang","year":"2004","journal-title":"OSDI'04"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1002\/0471715816","author":"johnson","year":"2005","journal-title":"Univariate Discrete Distributions"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287710"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"25","article-title":"High coverage detection of input-related security faults","author":"larson","year":"2003","journal-title":"USENIX Security'03"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2229"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831715"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_12"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/32.536955"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_27"},{"key":"32","doi-asserted-by":"crossref","DOI":"10.1145\/1081706.1081750","article-title":"CUTE: A concolic unit testing engine for C","author":"sen","year":"2005","journal-title":"ESEC\/FSE'05"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/158511.158694"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.32"},{"key":"4","article-title":"Automatically validating temporal safety properties of interfaces","author":"ball","year":"2001","journal-title":"SPIN '01"},{"key":"9","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"OSDI'08"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H"}],"event":{"name":"2012 34th International Conference on Software Engineering (ICSE 2012)","start":{"date-parts":[[2012,6,2]]},"location":"Zurich","end":{"date-parts":[[2012,6,9]]}},"container-title":["2012 34th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6218989\/6227015\/06227146.pdf?arnumber=6227146","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:08:05Z","timestamp":1497992885000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6227146\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/icse.2012.6227146","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}