{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:42:17Z","timestamp":1775054537203,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/icst.2015.7102601","type":"proceedings-article","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T11:54:04Z","timestamp":1431086044000},"page":"1-10","source":"Crossref","is-referenced-by-count":17,"title":["Postconditioned Symbolic Execution"],"prefix":"10.1109","author":[{"given":"Qiuping","family":"Yi","sequence":"first","affiliation":[]},{"given":"Zijiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shengjian","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190226"},{"key":"ref11","first-page":"416","article-title":"Hybrid concolic testing","author":"majumdar","year":"2007","journal-title":"International Conference on Software Engineering"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/978-3-642-14295-6_10","article-title":"Lazy annotation for program testing and verification","author":"mcmillan","year":"2010","journal-title":"International Conference on Computer Aided Verification"},{"key":"ref13","first-page":"297","article-title":"Efficient memoization for dynamic programming with ad-hoc constraints","author":"jaffar","year":"2008","journal-title":"AAAI"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04244-7_37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_43"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390635"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1713254.1713257","article-title":"Cloud9: a software testing service","volume":"43","author":"ciortea","year":"2009","journal-title":"Operating Systems Review"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831732"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384654"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/11817963_38","article-title":"CUTE and jCUTE: Concolic unit testing and explicit path model-checking tools","author":"sen","year":"2006","journal-title":"International Conference on Computer Aided Verification"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393665"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"ref6","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"USENIX Symposium on Operating Systems Design and Implementation"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"ref8","article-title":"AEG: Automatic exploit generation","author":"avgerinos","year":"2011","journal-title":"USENIX Symposium on Network and Distributed System Security"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10009-009-0118-1","article-title":"A survey of new trends in symbolic execution for software testing and analysis","volume":"11","author":"pasareanu","year":"2009","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"ref2","article-title":"Automated whitebox fuzz testing","author":"godefroid","year":"0","journal-title":"USENIX Symposium on Network and Distributed System Security 2008"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1450058.1450087"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.114"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609565"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706307"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693084"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985971"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635872"},{"key":"ref25","first-page":"19","article-title":"Steering symbolic execution to less traveled paths","author":"li","year":"2013","journal-title":"Proc ACM SIGPLAN Conference on Object-Oriented Programming Systems Languages Applications"}],"event":{"name":"2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)","location":"Graz, Austria","start":{"date-parts":[[2015,4,13]]},"end":{"date-parts":[[2015,4,17]]}},"container-title":["2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7102553\/7102573\/07102601.pdf?arnumber=7102601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,24]],"date-time":"2019-08-24T15:50:51Z","timestamp":1566661851000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7102601\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icst.2015.7102601","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}