{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T11:48:51Z","timestamp":1763466531430,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,14]],"date-time":"2017-05-14T00:00:00Z","timestamp":1494720000000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Laboratory for Telecommunication Sciences"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1139021, CCF-1139056, CCF-1161775"],"award-info":[{"award-number":["CCF-1139021, CCF-1139056, CCF-1161775"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2884781.2884856","type":"proceedings-article","created":{"date-parts":[[2016,5,13]],"date-time":"2016-05-13T14:21:10Z","timestamp":1463149270000},"page":"156-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Synthesizing framework models for symbolic execution"],"prefix":"10.1145","author":[{"given":"Jinseong","family":"Jeon","sequence":"first","affiliation":[{"name":"University of Maryland, College Park"}]},{"given":"Xiaokang","family":"Qiu","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]},{"given":"Jonathan","family":"Fetter-Degges","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park"}]},{"given":"Jeffrey S.","family":"Foster","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park"}]},{"given":"Armando","family":"Solar-Lezama","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"01","volume-title":"Workshop Automating OOSD Methods","author":"H.","year":"2001","unstructured":"H. Albin-amiot, Y. ga\u00ebl Gu\u00e9h\u00e9neuc, and R. A. Kastler. Meta-Modeling Design Patterns: Application to Pattern Detection and Code Synthesis. In Workshop Automating OOSD Methods, pages 01--35, 2001."},{"key":"e_1_3_2_1_2_1","volume-title":"Apr. 22","author":"Andersen T. R.","year":"2008","unstructured":"T. R. Andersen. Add Logging at Class Load Time, Apr. 22 2008. https:\/\/today.java.net\/article\/2008\/04\/22\/add-logging-class-load-time-java-instrumentation."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321664"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771284.2771288"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855756"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23140"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557833.2560572"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/646157.679856"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771810"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529710"},{"key":"e_1_3_2_1_11_1","unstructured":"M. Fowler. InversionOfControl June 2005. http:\/\/martinfowler.com\/bliki\/InversionOfControl.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/186897"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254116"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993506"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786875"},{"key":"e_1_3_2_1_16_1","unstructured":"J. Jeon. Framework Synthesis for Symbolic Execution of Event-Driven Frameworks. PhD thesis University of Maryland College Park Feb 2016."},{"key":"e_1_3_2_1_17_1","unstructured":"J. Jeon K. K. Micinski and J. S. Foster. SymDroid: Symbolic Execution for Dalvik Bytecode. Technical Report CS-TR-5022 Department of Computer Science University of Maryland College Park Jul 2012."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21668-3_22"},{"key":"e_1_3_2_1_20_1","volume-title":"JSketch: Sketching for Java. In European Software Engineering Conference and Foundations of Software Engineering (ESEC\/FSE)","author":"Jeon J.","year":"2015","unstructured":"J. Jeon, X. Qiu, A. Solar-Lezama, and J. S. Foster. JSketch: Sketching for Java. In European Software Engineering Conference and Foundations of Software Engineering (ESEC\/FSE), Sep 2015."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/785409.785835"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_3_2_1_23_1","volume-title":"Java swing","author":"Loy M.","year":"2003","unstructured":"M. Loy, R. Eckstein, D. Wood, J. Elliott, and B. Cole. Java swing, 2nd edition: Code examples, 2003. http:\/\/examples.oreilly.com\/jswing2\/code\/.","edition":"2"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100131"},{"key":"e_1_3_2_1_25_1","volume-title":"Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. In European Symposium on Research in Computer Security (ESORICS)","author":"Micinski K.","year":"2015","unstructured":"K. Micinski, J. Fetter-Degges, J. Jeon, J. S. Foster, and M. R. Clarkson. Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. In European Symposium on Research in Computer Security (ESORICS), Vienna, Austria, Sep 2015."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/302163.302175"},{"key":"e_1_3_2_1_27_1","volume-title":"Using swing components: Examples","author":"Oracle Corporation","year":"2015","unstructured":"Oracle Corporation. Using swing components: Examples, 2015. https:\/\/docs.oracle.com\/javase\/tutorial\/uiswing\/examples\/components\/."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993548"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/646243.681607"},{"key":"e_1_3_2_1_30_1","volume-title":"ASE 2013","author":"Rungta N.","year":"2013","unstructured":"N. Rungta, P. C. Mehlitz, and W. Visser. JPF Tutorial, ASE 2013, 2013. URL http:\/\/babelfish.arc.nasa.gov\/trac\/jpf\/raw-attachment\/wiki\/presentations\/start\/ASE13-tutorial.pdf."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483790"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025153"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462195"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-012-0249-7"},{"key":"e_1_3_2_1_35_1","first-page":"1","author":"A","year":"2015","unstructured":"A. Solar-Lezama. The Sketch Programmers Manual, 2015. Version 1.6.7.","journal-title":"Solar-Lezama. The Sketch Programmers Manual"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065045"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250754"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375599"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462174"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2693208.2693247"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 38th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884856","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2884781.2884856","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2884781.2884856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:20:59Z","timestamp":1763457659000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2884781.2884856"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":40,"alternative-id":["10.1145\/2884781.2884856","10.1145\/2884781"],"URL":"https:\/\/doi.org\/10.1145\/2884781.2884856","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}