{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:28Z","timestamp":1750308688408,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591062.2591104","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"432-435","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Shadow symbolic execution for better testing of evolving software"],"prefix":"10.1145","author":[{"given":"Cristian","family":"Cadar","sequence":"first","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Hristina","family":"Palikareva","sequence":"additional","affiliation":[{"name":"Imperial College London, UK"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"e_1_3_2_1_2_1","unstructured":"M. B\u00f6hme B. C. d. S. Oliveira and A. Roychoudhury. Partition-based regression verification. In ICSE\u201913.  M. B\u00f6hme B. C. d. S. Oliveira and A. Roychoudhury. Partition-based regression verification. In ICSE\u201913."},{"key":"e_1_3_2_1_3_1","unstructured":"M. B\u00f6hme B. C. d. S. Oliveira and A. Roychoudhury. Regression tests to expose change interaction errors. In ESEC\/FSE\u201913.  M. B\u00f6hme B. C. d. S. Oliveira and A. Roychoudhury. Regression tests to expose change interaction errors. In ESEC\/FSE\u201913."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_3_2_1_5_1","unstructured":"E. Clarke D. Kroening and F. Lerda. A tool for checking ANSI-C programs. In TACAS\u201904.  E. Clarke D. Kroening and F. Lerda. A tool for checking ANSI-C programs. In TACAS\u201904."},{"key":"e_1_3_2_1_6_1","unstructured":"Coverity software. http:\/\/www.coverity.com.  Coverity software. http:\/\/www.coverity.com."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273472"},{"key":"e_1_3_2_1_8_1","unstructured":"Fortify software. http:\/\/www.fortify.com.  Fortify software. http:\/\/www.fortify.com."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629911.1630034"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806812"},{"key":"e_1_3_2_1_11_1","unstructured":"P. Hosek and C. Cadar. Safe software updates via multi-version execution. In ICSE\u201913.   P. Hosek and C. Cadar. Safe software updates via multi-version execution. In ICSE\u201913."},{"key":"e_1_3_2_1_12_1","unstructured":"C. H. P. Kim S. Khurshid and D. Batory. Shared execution for e\ufb03ciently testing product lines. In ISSRE\u201912.  C. H. P. Kim S. Khurshid and D. Batory. Shared execution for e\ufb03ciently testing product lines. In ISSRE\u201912."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1137999"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491452"},{"key":"e_1_3_2_1_16_1","unstructured":"K.-K. Ma Y. P. Khoo J. S. Foster and M. Hicks. Directed symbolic execution. In SAS\u201911.   K.-K. Ma Y. P. Khoo J. S. Foster and M. Hicks. Directed symbolic execution. In SAS\u201911."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31759-0_2"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491438"},{"key":"e_1_3_2_1_19_1","unstructured":"M. Maurer and D. Brumley. TACHYON: Tandem execution for e\ufb03cient live patch testing. In USENIX Security\u201912.   M. Maurer and D. Brumley. TACHYON: Tandem execution for e\ufb03cient live patch testing. In USENIX Security\u201912."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/586094.586095"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453131"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993558"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.32"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001422"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508267"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.29"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025121"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Companion Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591062.2591104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:14Z","timestamp":1750276874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":28,"alternative-id":["10.1145\/2591062.2591104","10.1145\/2591062"],"URL":"https:\/\/doi.org\/10.1145\/2591062.2591104","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}