{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T12:07:49Z","timestamp":1753272469462,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell'Istruzione, dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["IDEAS PRIN 2012"],"award-info":[{"award-number":["IDEAS PRIN 2012"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2786805.2786842","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"page":"602-613","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Symbolic execution of programs with heap inputs"],"prefix":"10.1145","author":[{"given":"Pietro","family":"Braione","sequence":"first","affiliation":[{"name":"University of Milano-Bicocca, Italy"}]},{"given":"Giovanni","family":"Denaro","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca, Italy"}]},{"given":"Mauro","family":"Pezz\u00e8","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca, Italy \/ University of Lugano, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33386-6_14"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566191"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491433"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In USENIX Symposium on Operating Systems Design and Implementation , 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In USENIX Symposium on Operating Systems Design and Implementation, 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233817"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/503209.503230"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.26"},{"key":"e_1_3_2_1_9_1","volume-title":"TSAFE: Building a trusted computing base for air traffic control software. Master\u2019s thesis","author":"Dennis G. D.","year":"2003","unstructured":"G. D. Dennis . TSAFE: Building a trusted computing base for air traffic control software. Master\u2019s thesis , Massachusetts Institute of Technology , 2003 . G. D. Dennis. TSAFE: Building a trusted computing base for air traffic control software. Master\u2019s thesis, Massachusetts Institute of Technology, 2003."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37036-6_9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831712"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38088-4_16"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/646479.693761"},{"key":"e_1_3_2_1_16_1","volume-title":"Software Abstractions: Logic, Language, and Analysis","author":"Jackson D.","year":"2006","unstructured":"D. Jackson . Software Abstractions: Logic, Language, and Analysis . The MIT Press , 2006 . D. Jackson. Software Abstractions: Logic, Language, and Analysis. The MIT Press, 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_18_1","volume-title":"Tools and Algorithms for Construction and Analysis of Systems, LNCS 2619","author":"Khurshid S.","year":"2003","unstructured":"S. Khurshid , C. S. P\u02c7 as\u02c7 areanu, and W. Visser. Generalized symbolic execution for model checking and testing . In Tools and Algorithms for Construction and Analysis of Systems, LNCS 2619 . Springer , 2003 . S. Khurshid, C. S. P\u02c7 as\u02c7 areanu, and W. Visser. Generalized symbolic execution for model checking and testing. In Tools and Algorithms for Construction and Analysis of Systems, LNCS 2619. Springer, 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_20_1","volume-title":"Program Development in Java: Abstraction, Specification, and Object-Oriented Design","author":"Liskov B.","year":"2000","unstructured":"B. Liskov and J. Guttag . Program Development in Java: Abstraction, Specification, and Object-Oriented Design . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 1 st edition, 2000 . B. Liskov and J. Guttag. Program Development in Java: Abstraction, Specification, and Object-Oriented Design. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1st edition, 2000.","edition":"1"},{"key":"e_1_3_2_1_21_1","first-page":"59","volume-title":"Proc. of the 18th International Conference on Static Analysis, SAS\u201911","author":"Madhusudan P.","unstructured":"P. Madhusudan and X. Qiu . Efficient decision procedures for heaps using strand . In Proc. of the 18th International Conference on Static Analysis, SAS\u201911 , pages 43\u2013 59 . Springer-Verlag, 2011. P. Madhusudan and X. Qiu. Efficient decision procedures for heaps using strand. In Proc. of the 18th International Conference on Static Analysis, SAS\u201911, pages 43\u201359. Springer-Verlag, 2011."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103673"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321653"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_47"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378851"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-009-0118-1"},{"key":"e_1_3_2_1_27_1","first-page":"252","volume-title":"Proc. of the 5th International Conference on Automated Technology for Verification and Analysis, ATVA\u201907","author":"Z. Rakamari\u00b4","unstructured":"Z. Rakamari\u00b4 c, R. Bruttomesso , A. J. Hu , and A. Cimatti . Verifying heap-manipulating programs in an SMT framework . In Proc. of the 5th International Conference on Automated Technology for Verification and Analysis, ATVA\u201907 , pages 237\u2013 252 . Springer-Verlag, 2007. Z. Rakamari\u00b4 c, R. Bruttomesso, A. J. Hu, and A. Cimatti. Verifying heap-manipulating programs in an SMT framework. In Proc. of the 5th International Conference on Automated Technology for Verification and Analysis, ATVA\u201907, pages 237\u2013252. Springer-Verlag, 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/645683.664578"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2231988"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/11690634_7"}],"event":{"name":"ESEC\/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Bergamo Italy","acronym":"ESEC\/FSE'15"},"container-title":["Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786805.2786842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:21Z","timestamp":1750227381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":32,"alternative-id":["10.1145\/2786805.2786842","10.1145\/2786805"],"URL":"https:\/\/doi.org\/10.1145\/2786805.2786842","relation":{},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}