{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:57:01Z","timestamp":1776333421008,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"United States Department of the Navy, Office of Naval Research","award":["N68335-17-C-0238"],"award-info":[{"award-number":["N68335-17-C-0238"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416586","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"250-261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Synthesis of infinite-state systems with random behavior"],"prefix":"10.1145","author":[{"given":"Andreas","family":"Katis","sequence":"first","affiliation":[{"name":"University of Minnesota"}]},{"given":"Grigory","family":"Fedyukovich","sequence":"additional","affiliation":[{"name":"Florida State University"}]},{"given":"Jeffrey","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"David","family":"Greve","sequence":"additional","affiliation":[{"name":"Collins Aerospace"}]},{"given":"Sanjai","family":"Rayadurgam","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]},{"given":"Michael W.","family":"Whalen","sequence":"additional","affiliation":[{"name":"University of Minnesota"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Peach fuzzer. https:\/\/www.peach.tech\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_23"},{"key":"e_1_3_2_1_3_1","volume-title":"Mukund Raghothaman, Sanjit A Seshia, Rishabh Singh, Armando Solar-Lezama, Emina Torlak, and Abhishek Udupa.","author":"Alur Rajeev","year":"2013","unstructured":"Rajeev Alur, Rastislav Bodik, Garvit Juniwal, Milo MK Martin, Mukund Raghothaman, Sanjit A Seshia, Rishabh Singh, Armando Solar-Lezama, Emina Torlak, and Abhishek Udupa. 2013. Syntax-guided synthesis. In 2013 Formal Methods in Computer-Aided Design. IEEE, 1--8."},{"key":"e_1_3_2_1_4_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 8th International Workshop on Satisfiability Modulo Theories","volume":"13","author":"Barrett Clark","year":"2010","unstructured":"Clark Barrett, Aaron Stump, Cesare Tinelli, et al. 2010. The smt-lib standard: Version 2.0. In Proceedings of the 8th International Workshop on Satisfiability Modulo Theories (Edinburgh, England), Vol. 13. 14."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Tewodros Beyene Swarat Chaudhuri Corneliu Popeea and Andrey Rybalchenko. 2014. A constraint-based approach to solving games on infinite graphs. In POPL. ACM 221--233.","DOI":"10.1145\/2578855.2535860"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Tewodros A. Beyene Swarat Chaudhuri Corneliu Popeea and Andrey Rybalchenko. 2014. A constraint-based approach to solving games on infinite graphs. In POPL. ACM 221--234.","DOI":"10.1145\/2578855.2535860"},{"key":"e_1_3_2_1_8_1","volume-title":"LPAR (short papers) (EPiC Series in Computing)","author":"Bj\u00f8rner Nikolaj","unstructured":"Nikolaj Bj\u00f8rner and Mikol\u00e1s Janota. 2015. Playing with Quantified Satisfaction. In LPAR (short papers) (EPiC Series in Computing), Vol. 35. EasyChair, 15--27."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04081-8_14"},{"key":"e_1_3_2_1_11_1","volume-title":"Functional synthesis via input-output separation. In 2018 Formal Methods in Computer Aided Design (FMCAD)","author":"Chakraborty Supratik","unstructured":"Supratik Chakraborty, Dror Fried, Lucas M Tabajara, and Moshe Y Vardi. 2018. Functional synthesis via input-output separation. In 2018 Formal Methods in Computer Aided Design (FMCAD). IEEE, 1--9."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_29"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70389-3_8"},{"key":"e_1_3_2_1_14_1","volume-title":"CP (LNCS)","author":"Fedyukovich Grigory","unstructured":"Grigory Fedyukovich and Aarti Gupta. 2019. Functional Synthesis with Examples. In CP (LNCS), Vol. 11802. Springer, 547--564."},{"key":"e_1_3_2_1_15_1","volume-title":"VMCAI (LNCS)","author":"Fedyukovich Grigory","unstructured":"Grigory Fedyukovich, Arie Gurfinkel, and Aarti Gupta. 2019. Lazy but Effective Functional Synthesis. In VMCAI (LNCS), Vol. 11388. Springer, 92--113."},{"key":"e_1_3_2_1_16_1","volume-title":"LPAR (LNCS)","author":"Fedyukovich Grigory","unstructured":"Grigory Fedyukovich, Arie Gurfinkel, and Natasha Sharygina. 2015. Automated Discovery of Simulation Between Programs. In LPAR (LNCS), Vol. 9450. Springer, 606--621."},{"key":"e_1_3_2_1_17_1","first-page":"72","article-title":"Synthesis of Reactive Systems","volume":"45","author":"Finkbeiner Bernd","year":"2016","unstructured":"Bernd Finkbeiner. 2016. Synthesis of Reactive Systems. Dependable Software Systems Engineering 45 (2016), 72--98.","journal-title":"Dependable Software Systems Engineering"},{"key":"e_1_3_2_1_18_1","unstructured":"Dustin Fraze. [n.d.]. The DARPA Cyber Grand Challenge. https:\/\/www.darpa.mil\/program\/cyber-grand-challenge."},{"key":"e_1_3_2_1_19_1","volume-title":"Control improvisation. arXiv preprint arXiv:1704.06319","author":"Fremont Daniel J","year":"2017","unstructured":"Daniel J Fremont, Alexandre Donz\u00e9, and Sanjit A Seshia. 2017. Control improvisation. arXiv preprint arXiv:1704.06319 (2017)."},{"key":"e_1_3_2_1_20_1","volume-title":"Seshia","author":"Fremont Daniel J.","year":"2018","unstructured":"Daniel J. Fremont and Sanjit A. Seshia. 2018. Reactive Control Improvisation. In Computer Aided Verification, Hana Chockler and Georg Weissenbacher (Eds.). Springer International Publishing, Cham, 307--326."},{"key":"e_1_3_2_1_21_1","volume-title":"The JKind Model Checker. In International Conference on Computer Aided Verification. Springer, 20--27","author":"Gacek Andrew","year":"2018","unstructured":"Andrew Gacek, John Backes, Mike Whalen, Lucas Wagner, and Elaheh Ghassabani. 2018. The JKind Model Checker. In International Conference on Computer Aided Verification. Springer, 20--27."},{"key":"e_1_3_2_1_22_1","volume-title":"NFM (LNCS)","author":"Gacek Andrew","unstructured":"Andrew Gacek, Andreas Katis, Michael W Whalen, John Backes, and Darren Cofer. 2015. Towards Realizability Checking of Contracts Using Theories. In NFM (LNCS), Vol. 9058. Springer, 173--187."},{"key":"e_1_3_2_1_23_1","volume-title":"A survey on coverage path planning for robotics. Robotics and Autonomous systems 61, 12","author":"Galceran Enric","year":"2013","unstructured":"Enric Galceran and Marc Carreras. 2013. A survey on coverage path planning for robotics. Robotics and Autonomous systems 61, 12 (2013), 1258--1276."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Sumit Gulwani. 2010. Dimensions in program synthesis. In PPDP. ACM 13--24.","DOI":"10.1145\/1836089.1836091"},{"key":"e_1_3_2_1_25_1","volume-title":"Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). 445--458.","author":"Holler Christian","unstructured":"Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with code fragments. In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). 445--458."},{"key":"e_1_3_2_1_26_1","volume-title":"Machine Learning for Dynamic Software Analysis: Potentials and Limits","author":"Howar Falk","unstructured":"Falk Howar and Bernhard Steffen. 2018. Active automata learning in practice. In Machine Learning for Dynamic Software Analysis: Potentials and Limits. Springer, 123--148."},{"key":"e_1_3_2_1_27_1","unstructured":"Erwan Jahier Pascal Raymond and Nicolas Halbwachs. [n.d.]. The Lustre V6 Reference Manual. http:\/\/www-verimag.imag.fr\/Lustre-V6.html."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89963-3_10"},{"key":"e_1_3_2_1_29_1","volume-title":"Machine-Checked Proofs For Realizability Checking Algorithms","author":"Katis Andreas","unstructured":"Andreas Katis, Andrew Gacek, and Michael W Whalen. 2015. Machine-Checked Proofs For Realizability Checking Algorithms. In VSTTE. Springer, 110--123."},{"key":"e_1_3_2_1_30_1","volume-title":"Towards synthesis from assume-guarantee contracts involving infinite theories: a preliminary report","author":"Katis Andreas","unstructured":"Andreas Katis, Andrew Gacek, and Michael W Whalen. 2016. Towards synthesis from assume-guarantee contracts involving infinite theories: a preliminary report. In FormaliSE. IEEE, 36--41."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-017-0276-9"},{"key":"e_1_3_2_1_33_1","volume-title":"Counterterrorism and Cybersecurity","author":"Lee Newton","unstructured":"Newton Lee. 2015. DARPA's Cyber Grand Challenge (2014--2016). In Counterterrorism and Cybersecurity. Springer, 429--456."},{"key":"e_1_3_2_1_34_1","volume-title":"Manuel Egele, Edward J Schwartz, and Maverick Woo.","author":"Marie Man\u00e8s Valentin Jean","year":"2019","unstructured":"Valentin Jean Marie Man\u00e8s, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J Schwartz, and Maverick Woo. 2019. The art, science, and engineering of fuzzing: A survey. IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_35_1","volume-title":"Learning-based synthesis of safety controllers. In 2019 Formal Methods in Computer Aided Design (FMCAD)","author":"Neider Daniel","unstructured":"Daniel Neider and Oliver Markgraf. 2019. Learning-based synthesis of safety controllers. In 2019 Formal Methods in Computer Aided Design (FMCAD). IEEE, 120--128."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49674-9_12"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54577-5_17"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"e_1_3_2_1_40_1","unstructured":"Michael Rash. [n.d.]. afl-cov - AFL Fuzzing Code Coverage. https:\/\/github.com\/mrash\/afl-cov."},{"key":"e_1_3_2_1_41_1","first-page":"1","article-title":"VUzzer: Application-aware Evolutionary Fuzzing","volume":"17","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing.. In NDSS, Vol. 17. 1--14.","journal-title":"NDSS"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629583"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13338-6_19"},{"key":"e_1_3_2_1_44_1","first-page":"1","article-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS, Vol. 16. 1--16.","journal-title":"NDSS"},{"key":"e_1_3_2_1_45_1","volume-title":"A taxonomy of model-based testing approaches. Software testing, verification and reliability 22, 5","author":"Utting Mark","year":"2012","unstructured":"Mark Utting, Alexander Pretschner, and Bruno Legeard. 2012. A taxonomy of model-based testing approaches. Software testing, verification and reliability 22, 5 (2012), 297--312."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_29"},{"key":"e_1_3_2_1_47_1","unstructured":"Michal Zalewski. [n.d.]. American Fuzzy Lop. https:\/\/lcamtuf.coredump.cx\/afl\/."}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":47,"alternative-id":["10.1145\/3324884.3416586","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416586","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}