{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T09:38:34Z","timestamp":1770284314871,"version":"3.49.0"},"reference-count":78,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Samsung Research Funding &amp; Incubation Center of Samsung Electronics","award":["SRFC-IT1701-51"],"award-info":[{"award-number":["SRFC-IT1701-51"]}]},{"name":"Institute of Information &amp; Communications Technology Planning &amp; Evaluation"},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["2020-0-01337"],"award-info":[{"award-number":["2020-0-01337"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ICT Creative Consilience program","award":["IITP-2021-2020-0-01819"],"award-info":[{"award-number":["IITP-2021-2020-0-01819"]}]},{"name":"Institute for Information &amp; communications Technology Planning &amp; Evaluation"},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2021R1C1C2006410"],"award-info":[{"award-number":["NRF-2021R1C1C2006410"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1109\/tse.2021.3101870","type":"journal-article","created":{"date-parts":[[2021,8,4]],"date-time":"2021-08-04T20:24:57Z","timestamp":1628108697000},"page":"3640-3663","source":"Crossref","is-referenced-by-count":14,"title":["Enhancing Dynamic Symbolic Execution by Automatically Learning Search Heuristics"],"prefix":"10.1109","volume":"48","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4697-8536","authenticated-orcid":false,"given":"Sooyoung","family":"Cha","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0530-0235","authenticated-orcid":false,"given":"Seongjoon","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3587-5005","authenticated-orcid":false,"given":"Jiseong","family":"Bak","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2072-8878","authenticated-orcid":false,"given":"Jingyoung","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, South Korea"}]},{"given":"Junhee","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1900-7654","authenticated-orcid":false,"given":"Hakjoo","family":"Oh","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sungkyunkwan University, Suwon, South Korea"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238172"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23294"},{"key":"ref12","first-page":"309","article-title":"Inception: System-wide security testing of real-world embedded systems software","author":"corteggiani","year":"2018","journal-title":"Proc Usenix Secur Symp"},{"key":"ref56","year":"2017"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/390016.808444"},{"key":"ref59","author":"sun","year":"2018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00051"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070545"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134050"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167289"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.40"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.40"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/390016.808445"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231144"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180177"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"},{"key":"ref46","year":"2005"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236049"},{"key":"ref48","article-title":"The yices SMT solver","author":"dutertre","year":"2006"},{"key":"ref47","year":"2018"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025180"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_27"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338964"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238227"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73368-3_52"},{"key":"ref8","first-page":"689","article-title":"CAB-Fuzz: Practical concolic testing techniques for COTS operating systems","author":"kim","year":"2017","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.80"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884843"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49122-5_16"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227146"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110358"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2659751"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102601"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238179"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092709"},{"key":"ref30","first-page":"620","article-title":"DASE: document-assisted symbolic execution for improving automated software testing","author":"wong","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509552"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606559"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"key":"ref32","year":"2008"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1083246.1083256"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180251"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092728"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00020"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393636"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.26"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635872"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45322-9_5"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180166"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509553"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970364"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"ref64","first-page":"14","article-title":"Boost symbolic execution using dynamic state merging and forking","author":"zhang","year":"2018","journal-title":"Proc Int Workshop Quantitative Approaches Softw Qual"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238227"},{"key":"ref22","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"Proc 8th USENIX Conf Operating Syst Des Implementation"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635889"},{"key":"ref21","first-page":"151","article-title":"Automated whitebox fuzz testing","author":"godefroid","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786830"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227105"},{"key":"ref29","first-page":"199","article-title":"Redundant state detection for dynamic symbolic execution","author":"bugrara","year":"2013","journal-title":"Proc USENIX Conf Annu Tech Conf"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491425"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706307"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190226"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9894039\/09507083.pdf?arnumber=9507083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T23:06:33Z","timestamp":1672182393000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9507083\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":78,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tse.2021.3101870","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]}}}