{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:30Z","timestamp":1750306650790,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR0011-12-2-009","N66001-10-2-4089"],"award-info":[{"award-number":["HR0011-12-2-009","N66001-10-2-4089"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2642974","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"247-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["symMMU"],"prefix":"10.1145","author":[{"given":"Anthony","family":"Romano","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Dawson R.","family":"Engler","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/545596.545597"},{"key":"e_1_3_2_1_2_1","first-page":"209","volume-title":"Proc. of the 8th USENIX Conf. on Operating Systems Design and Implementation, OSDI'08","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs . In Proc. of the 8th USENIX Conf. on Operating Systems Design and Implementation, OSDI'08 , pages 209 -- 224 , 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs. In Proc. of the 8th USENIX Conf. on Operating Systems Design and Implementation, OSDI'08, pages 209--224, 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451152"},{"key":"e_1_3_2_1_7_1","first-page":"463","volume-title":"Proc. of the 22th USENIX Security Symposium, USENIX Security '13","author":"Davidson D.","year":"2013","unstructured":"D. Davidson , B. Moench , T. Ristenpart , and S. Jha . FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution . In Proc. of the 22th USENIX Security Symposium, USENIX Security '13 , pages 463 -- 478 , 2013 . D. Davidson, B. Moench, T. Ristenpart, and S. Jha. FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution. In Proc. of the 22th USENIX Security Symposium, USENIX Security '13, pages 463--478, 2013."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-011-0089-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572288"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/822074.822385"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770351.1770421"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831710"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"volume-title":"Proc. of the Network and Distributed System Security Symposium, NDSS'08","author":"Godefroid P.","key":"e_1_3_2_1_14_1","unstructured":"P. Godefroid , M. Y. Levin , and D. Molnar . Automated Whitebox Fuzz Testing . In Proc. of the Network and Distributed System Security Symposium, NDSS'08 . P. Godefroid, M. Y. Levin, and D. Molnar. Automated Whitebox Fuzz Testing. In Proc. of the Network and Distributed System Security Symposium, NDSS'08."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of the","author":"Hastings R.","year":"1992","unstructured":"R. Hastings and B. Joyce . Purify: Fast detection of memory leaks and access errors . In Proc. of the Winter 1992 USENIX Conf., pages 125--138 , 1991. R. Hastings and B. Joyce. Purify: Fast detection of memory leaks and access errors. In Proc. of the Winter 1992 USENIX Conf., pages 125--138, 1991."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765871.1765924"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032354"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151012"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254820"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of the Network and Distributed System Security Symposium, NDSS'05","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Proc. of the Network and Distributed System Security Symposium, NDSS'05 , 2005 . J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proc. of the Network and Distributed System Security Symposium, NDSS'05, 2005."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032360"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791235"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/185514.185515"},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. of the Network and Distributed System Security Symposium, NDSS'09","author":"Wang T.","year":"2009","unstructured":"T. Wang , T. Wei , Z. Lin , and W. Zou . IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution . In Proc. of the Network and Distributed System Security Symposium, NDSS'09 , 2009 . T. Wang, T. Wei, Z. Lin, and W. Zou. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. In Proc. of the Network and Distributed System Security Symposium, NDSS'09, 2009."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"D. A. Wheeler. SLOCcount 2009.  D. A. Wheeler. SLOCcount 2009.","DOI":"10.12968\/sece.2009.2.1440"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772960"}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"],"location":"Vasteras Sweden","acronym":"ASE '14"},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2642974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:09Z","timestamp":1750229769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642974"}},"subtitle":["symbolically executed runtime libraries for symbolic memory access"],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":32,"alternative-id":["10.1145\/2642937.2642974","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2642974","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}