{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:46:36Z","timestamp":1777099596838,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003407","name":"Ministero dell'Istruzione, dell'Universit\u00e0 e della Ricerca","doi-asserted-by":"publisher","award":["PRIN-MIUR- 2015KWREMX"],"award-info":[{"award-number":["PRIN-MIUR- 2015KWREMX"]}],"id":[{"id":"10.13039\/501100003407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N007166\/1"],"award-info":[{"award-number":["EP\/N007166\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3092703.3092715","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"90-101","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Combining symbolic execution and search-based testing for programs with complex heap inputs"],"prefix":"10.1145","author":[{"given":"Pietro","family":"Braione","sequence":"first","affiliation":[{"name":"University of Milano-Bicocca, Italy"}]},{"given":"Giovanni","family":"Denaro","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca, Italy"}]},{"given":"Andrea","family":"Mattavelli","sequence":"additional","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Mauro","family":"Pezz\u00e8","sequence":"additional","affiliation":[{"name":"University of Lugano, Switerland"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2011.67"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100119"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2804322.2804325"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9150-y"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2490067"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-012-9246-5"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566191"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9207-1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491433"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786842"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983940"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_2_13_1","first-page":"224","volume-title":"Proceedings of the Symposium on Operating Systems Design and Implementation, OSDI \u201908","author":"Cadar C.","unstructured":"C. Cadar , D. Dunbar , and D. Engler . Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the Symposium on Operating Systems Design and Implementation, OSDI \u201908 , pages 209\u2013 224 . USENIX Association, 2008. C. Cadar, D. Dunbar, and D. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the Symposium on Operating Systems Design and Implementation, OSDI \u201908, pages 209\u2013224. USENIX Association, 2008."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.602"},{"key":"e_1_3_2_2_17_1","first-page":"10","volume-title":"Proceedings of the International Conference on Software Testing, Verification and Validation, ICST \u201910","author":"Cseppento L.","unstructured":"L. Cseppento and Z. Micskei . Evaluating symbolic execution-based test tools . In Proceedings of the International Conference on Software Testing, Verification and Validation, ICST \u201910 , pages 1\u2013 10 . IEEE Computer Society, 2015. L. Cseppento and Z. Micskei. Evaluating symbolic execution-based test tools. In Proceedings of the International Conference on Software Testing, Verification and Validation, ICST \u201910, pages 1\u201310. IEEE Computer Society, 2015."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786838"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.26"},{"key":"e_1_3_2_2_21_1","volume-title":"Tsafe: building a trusted computing base for air traffic control software. Master\u2019s thesis","author":"Dennis G. D.","year":"2003","unstructured":"G. D. Dennis . Tsafe: building a trusted computing base for air traffic control software. Master\u2019s thesis , Massachusetts Institute of Technology , 2003 . G. D. Dennis. Tsafe: building a trusted computing base for air traffic control software. Master\u2019s thesis, Massachusetts Institute of Technology, 2003."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635889"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_49"},{"key":"e_1_3_2_2_25_1","first-page":"28","volume-title":"Proceedings of the Second Conference on Computer Science and Engineering","author":"Edvardsson J.","unstructured":"J. Edvardsson . A survey on automatic test data generation . In Proceedings of the Second Conference on Computer Science and Engineering , pages 21\u2013 28 . ECSEL, 1999. J. Edvardsson. A survey on automatic test data generation. In Proceedings of the Second Conference on Computer Science and Engineering, pages 21\u201328. ECSEL, 1999."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9288-2"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.53"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.14"},{"key":"e_1_3_2_2_29_1","first-page":"27","volume-title":"Proceedings of the International Workshop on Search-Based Software Testing, SBST \u201915","author":"Fraser G.","unstructured":"G. Fraser and A. Arcuri . Evosuite at the sbst 2015 tool competition . In Proceedings of the International Workshop on Search-Based Software Testing, SBST \u201915 , pages 25\u2013 27 . IEEE Computer Society, 2015. G. Fraser and A. Arcuri. Evosuite at the sbst 2015 tool competition. In Proceedings of the International Workshop on Search-Based Software Testing, SBST \u201915, pages 25\u201327. IEEE Computer Society, 2015."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897010.2897020"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698889"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831712"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806835"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.40"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_53"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100137"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1765871.1765924"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.57624"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1389095.1389435"},{"key":"e_1_3_2_2_42_1","first-page":"157","volume-title":"Proceedings of the International Conference on Testing Software and Systems, ICTSS \u201910","author":"Lakhotia K.","unstructured":"K. Lakhotia , N. Tillmann , M. Harman , and J. De Halleux . Flopsy: Search-based floating point constraint solving for symbolic execution . In Proceedings of the International Conference on Testing Software and Systems, ICTSS \u201910 , pages 142\u2013 157 . Springer, 2010. K. Lakhotia, N. Tillmann, M. Harman, and J. De Halleux. Flopsy: Search-based floating point constraint solving for symbolic execution. In Proceedings of the International Conference on Testing Software and Systems, ICTSS \u201910, pages 142\u2013 157. Springer, 2010."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100092"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v14:2"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<263::AID-STVR190>3.0.CO;2-Y"},{"key":"e_1_3_2_2_47_1","volume-title":"Software Testing and Analysis: Process, Principles and Techniques","author":"Pezz\u00e8 M.","year":"2007","unstructured":"M. Pezz\u00e8 and M. Young . Software Testing and Analysis: Process, Principles and Techniques . Wiley , 2007 . M. Pezz\u00e8 and M. Young. Software Testing and Analysis: Process, Principles and Techniques. Wiley, 2007."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2389225"},{"key":"e_1_3_2_2_49_1","unstructured":"ISSTA\u201917 July 2017 Santa Barbara CA USA Pietro Braione Giovanni Denaro Andrea Mattavelli and Mauro Pezz\u00e8  ISSTA\u201917 July 2017 Santa Barbara CA USA Pietro Braione Giovanni Denaro Andrea Mattavelli and Mauro Pezz\u00e8"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048083"},{"key":"e_1_3_2_2_52_1","first-page":"153","volume-title":"Proceedings of the International Conference on Tests and Proofs, TAP \u201908","author":"Tillmann N.","unstructured":"N. Tillmann and J. de Halleux . Pex : White box test generation for .NET . In Proceedings of the International Conference on Tests and Proofs, TAP \u201908 , pages 134\u2013 153 . Springer, 2008. N. Tillmann and J. de Halleux. Pex: White box test generation for .NET. In Proceedings of the International Conference on Tests and Proofs, TAP \u201908, pages 134\u2013153. Springer, 2008."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007528"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_24"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"}],"event":{"name":"ISSTA '17: International Symposium on Software Testing and Analysis","location":"Santa Barbara CA USA","acronym":"ISSTA '17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092715","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092703.3092715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:26Z","timestamp":1750217846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092715"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":56,"alternative-id":["10.1145\/3092703.3092715","10.1145\/3092703"],"URL":"https:\/\/doi.org\/10.1145\/3092703.3092715","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}