{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:30:47Z","timestamp":1774949447720,"version":"3.50.1"},"reference-count":176,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"EU H2020"},{"name":"ERC Consolidator","award":["646867"],"award-info":[{"award-number":["646867"]}]},{"DOI":"10.13039\/501100003407","name":"MIUR","doi-asserted-by":"crossref","award":["2015KWREMX"],"award-info":[{"award-number":["2015KWREMX"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2019,1,1]]},"DOI":"10.1109\/tse.2017.2755013","type":"journal-article","created":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T18:09:22Z","timestamp":1509386962000},"page":"34-67","source":"Crossref","is-referenced-by-count":267,"title":["Automatic Software Repair: A Survey"],"prefix":"10.1109","volume":"45","author":[{"given":"Luca","family":"Gazzola","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1261-2234","authenticated-orcid":false,"given":"Daniela","family":"Micucci","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9527-7042","authenticated-orcid":false,"given":"Leonardo","family":"Mariani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950295"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483785"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.139"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381836"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884835"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.144"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332504"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851770"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090029"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39955-8_7"},{"key":"ref33","article-title":"Automatic software repair: A bibliography","author":"monperrus","year":"2015"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IranianCEE.2016.7585390"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173734"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635873"},{"key":"ref37","first-page":"73","article-title":"Automatic repair of concurrency bugs","author":"bradbury","year":"2010","journal-title":"Proc 2nd Int Symp Search Based Software Eng"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.40"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630793"},{"key":"ref34","article-title":"Two flavors in automated software repair: Rigid repair and plastic repair","author":"monperrus","year":"2013","journal-title":"Dagstuhl Seminar n 13061 &#x201C;Fault Prediction Localization and Repair&#x201D;"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786811"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001768"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2593735.2593740"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"ref26","article-title":"Automatic repair of infinite loops","author":"marcote","year":"2015"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635898"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.15"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2330163.2330333"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336775"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2454513"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.260"},{"key":"ref156","article-title":"Software-artifact infrastructure repository","year":"0"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628058"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.92"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771798"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321643"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.26"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897896"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516693"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606625"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814310"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/214956.214961"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-7171(85)80010-9"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.100"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.81"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.64"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884819"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931050"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321693"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591114"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9282-8"},{"key":"ref165","article-title":"Mining repair actions for guiding automated program fixing","author":"martinez","year":"2012"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2013.490"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830654"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786825"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381813"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2330163.2330296"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1147\/sj.411.0004"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1006147.1006165"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"ref5","author":"zeller","year":"2009","journal-title":"Why Programs Fail Second Edition A Guide to Systematic Debugging"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884872"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.25"},{"key":"ref49","first-page":"131","article-title":"Proof-directed debugging and repair","author":"dennis","year":"2006","journal-title":"Proc Symp Trends Functional Program"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081753"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48166-4_16"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92814-0_36"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00039-9"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/11560548_6"},{"key":"ref42","article-title":"Fix me up: Repairing access-control bugs in web applications","author":"son","year":"2013","journal-title":"Proc Symp Netw Distrib Syst"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.60"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_23"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694389"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2724719"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.9"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22655-7_28"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.63"},{"key":"ref70","author":"pezz\u00e8","year":"2007","journal-title":"Software Testing and Analysis Process Principles and Techniques"},{"key":"ref76","author":"jacob","year":"2004","journal-title":"A Practical Guide to the IBM Autonomic Computing Toolkit"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896931"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/11498490_24"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351735"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606624"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594335"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16612-9_28"},{"key":"ref131","first-page":"221","article-title":"Automated concurrency-bug fixing.","author":"jin","year":"2012","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2372785"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950309"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786858"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635881"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227184"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227186"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610398"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2013.6679385"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610401"},{"key":"ref62","first-page":"155","article-title":"Model-based program debugging and repair","author":"stumptner","year":"1996","journal-title":"Proc Int Conf Ind Eng Other Appl Appl Intell Syst"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594333"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1370175.1370223"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570031"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985828"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735249"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568258"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-010-0107-y"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.222"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.06.011"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384626"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73986-9_2"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18070-5_2"},{"key":"ref2","article-title":"Increasing software development productivity with reversible debugging","year":"2014"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2755970"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970282"},{"key":"ref1","article-title":"Reversible debugging software - quantify the time and cost saved using reversible debuggers","author":"britton","year":"2013"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/1138912.1138918"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2001858.2001995"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312918"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100080"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.29"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859059"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483785"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451151"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1029005"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICSESS.2013.6615295"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405280"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1147\/sj.411.0111"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.69"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2011.01.023"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2016.15"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830739"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/587052.587053"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.48"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572300"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.93"},{"key":"ref15","first-page":"815","article-title":"MIMIC: locating and understanding bugs by analyzing mimicked executions","author":"zuddas","year":"2014","journal-title":"Proc IEEE Int Conf Automated Software Engineering"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.76"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993544"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1267001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368157"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508250"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393598"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2659118.2659125"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.65"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635890"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"ref114","article-title":"Prophet: Automatic patch generation via learning from successful patches","author":"long","year":"2013"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2001.918971"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522923"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2007.87"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.24"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568324"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2975934"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.09.037"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227211"},{"key":"ref88","doi-asserted-by":"crossref","DOI":"10.18130\/V3KZ3C","article-title":"Automatic program repair using genetic programming","author":"le goues","year":"2013"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8605390\/08089448.pdf?arnumber=8089448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T22:13:28Z","timestamp":1643148808000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8089448\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,1]]},"references-count":176,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2017.2755013","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,1]]}}}