{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T03:15:41Z","timestamp":1776482141675,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1528133"],"award-info":[{"award-number":["1528133"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3180155.3180236","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"361-371","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":94,"title":["Perses"],"prefix":"10.1145","author":[{"given":"Chengnian","family":"Sun","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Yuanbo","family":"Li","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Qirun","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Tianxiao","family":"Gu","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/6448"},{"key":"e_1_3_2_1_2_1","volume-title":"The ANTLR Parser Generator. (2017)","author":"ANTLR.","unstructured":"ANTLR. 2017. The ANTLR Parser Generator. (2017). http:\/\/www.antlr.org\/, accessed: 2017-08-05."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635893"},{"key":"e_1_3_2_1_4_1","unstructured":"GCC. 2017. A Guide to Testcase Reduction. (2017). https:\/\/gcc.gnu.org\/wiki\/A_guide_to_testcase_reduction accessed: 2017-08-05."},{"key":"e_1_3_2_1_5_1","volume-title":"Modular Programming Languages","author":"Hoare Tony","unstructured":"Tony Hoare. 2003. The verifying compiler: A grand challenge for computing research. In Modular Programming Languages. Springer, 25--35."},{"key":"e_1_3_2_1_6_1","volume-title":"The T.J. Watson Libraries for Analysis. (2017)","author":"IBM.","unstructured":"IBM. 2017. The T.J. Watson Libraries for Analysis. (2017). http:\/\/wala.sourceforge.net\/, accessed: 2017-08-05."},{"key":"e_1_3_2_1_7_1","unstructured":"JavaCC. 2017. The Java Parser Generator. (2017). https:\/\/javacc.org\/ accessed: 2017-08-05."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/github.com\/wala\/jsdelta, accessed: 2017-08-05","author":"Delta JS","year":"2017","unstructured":"JS Delta. 2017. JS Delta. (2017). https:\/\/github.com\/wala\/jsdelta, accessed: 2017-08-05."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594334"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771785"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814319"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","unstructured":"Sebastian Lekies Ben Stock and Martin Johns. 2013. 25 million flows later: large-scale detection of DOM-based XSS. In CCS. 1193--1204. 10.1145\/2508859.2516703","DOI":"10.1145\/2508859.2516703"},{"key":"e_1_3_2_1_13_1","unstructured":"LLVM. 2017. How to submit an LLVM bug report. (2017). https:\/\/llvm.org\/docs\/HowToSubmitABug.html accessed: 2017-08-05."},{"key":"e_1_3_2_1_14_1","unstructured":"LLVM\/Clang. {n. d.}. Clang documentation - LibTooling. ({n. d.}). https:\/\/clang.llvm.org\/docs\/LibTooling.html accessed: 2017-08-06."},{"key":"e_1_3_2_1_15_1","volume-title":"d.}. Berkeley Delta. ({n. d.})","author":"McPeak Scott","unstructured":"Scott McPeak, Daniel S. Wilkerson, and Simon Goldsmith. {n. d.}. Berkeley Delta. ({n. d.}). http:\/\/delta.tigris.org\/, accessed: 2017-08-20."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Jibesh Patra Satia Herfert and Michael Pradel. 2017. Automatically Reducing Tree-Structured Test Inputs. In ASE. To appear.","DOI":"10.5555\/3155562.3155669"},{"key":"e_1_3_2_1_19_1","volume-title":"FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. In NDSS.","author":"Saxena Prateek","year":"2010","unstructured":"Prateek Saxena, Steve Hanna, Pongsin Poosankam, and Dawn Song. 2010. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. In NDSS."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984038"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931074"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.26"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062379"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180236","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180236","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:29Z","timestamp":1750210769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180236"}},"subtitle":["syntax-guided program reduction"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":25,"alternative-id":["10.1145\/3180155.3180236","10.1145\/3180155"],"URL":"https:\/\/doi.org\/10.1145\/3180155.3180236","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}