{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:40:50Z","timestamp":1761709250464,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970281","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"780-785","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["MACKE: compositional analysis of low-level vulnerabilities with symbolic execution"],"prefix":"10.1145","author":[{"given":"Saahil","family":"Ognawala","sequence":"first","affiliation":[{"name":"TU Munich, Germany"}]},{"given":"Mart\u00edn","family":"Ochoa","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore"}]},{"given":"Alexander","family":"Pretschner","sequence":"additional","affiliation":[{"name":"TU Munich, Germany"}]},{"given":"Tobias","family":"Limmer","sequence":"additional","affiliation":[{"name":"Siemens, Germany"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"TACAS.","author":"Anand S.","year":"2008","unstructured":"S. Anand , P. Godefroid , and N. Tillmann . Demanddriven compositional symbolic execution . In TACAS. 2008 . S. Anand, P. Godefroid, and N. Tillmann. Demanddriven compositional symbolic execution. In TACAS. 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1763507.1763523"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792770"},{"key":"e_1_3_2_1_4_1","volume-title":"OSDI","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. R. Engler . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In OSDI , 2008 . C. Cadar, D. Dunbar, and D. R. Engler. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI, 2008."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_2"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.1950396"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693074"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23404-5_19"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46081-8_21"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775832.775928"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_13_1","volume-title":"SAT","author":"E\u00e9n N.","year":"2004","unstructured":"N. E\u00e9n and N. S\u00f6rensson . An extensible SAT-solver . In SAT , 2004 . N. E\u00e9n and N. S\u00f6rensson. An extensible SAT-solver. In SAT, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.98"},{"key":"e_1_3_2_1_15_1","volume-title":"CAV","author":"Ganesh V.","year":"2007","unstructured":"V. Ganesh and D. L. Dill . A decision procedure for bit-vectors and arrays . In CAV , 2007 . V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In CAV, 2007."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190215.1190226"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568273"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375607"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_1_20_1","volume-title":"NDSS","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Y. Levin , D. A. Molnar , Automated whitebox fuzz testing . In NDSS , 2008 . P. Godefroid, M. Y. Levin, D. A. Molnar, et al. Automated whitebox fuzz testing. In NDSS, 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"Usenix","author":"Haller I.","year":"2013","unstructured":"I. Haller , A. Slowinska , M. Neugschwandtner , and H. Bos . Dowsing for overflows: A guided fuzzer to find buffer boundary violations . In Usenix , 2013 . I. Haller, A. Slowinska, M. Neugschwandtner, and H. Bos. Dowsing for overflows: A guided fuzzer to find buffer boundary violations. In Usenix, 2013."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765871.1765924"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254088"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2015.32"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041552.2041563"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_41"},{"key":"e_1_3_2_1_29_1","volume-title":"CAV","author":"Palikareva H.","year":"2013","unstructured":"H. Palikareva and C. Cadar . Multi-solver support in symbolic execution . In CAV , 2013 . H. Palikareva and C. Cadar. Multi-solver support in symbolic execution. In CAV, 2013."},{"key":"e_1_3_2_1_30_1","volume-title":"FATES","author":"Pretschner A.","year":"2001","unstructured":"A. Pretschner . Classical search strategies for test case generation with constraint logic programming . In FATES , 2001 . A. Pretschner. Classical search strategies for test case generation with constraint logic programming. In FATES, 2001."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA482657"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786830"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_42"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Singapore Singapore","acronym":"ASE'16"},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970281","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970281","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":34,"alternative-id":["10.1145\/2970276.2970281","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970281","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}