{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:54Z","timestamp":1763507754314,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100011199","name":"European Research Council","doi-asserted-by":"publisher","award":["819141"],"award-info":[{"award-number":["819141"]}],"id":[{"id":"10.13039\/100011199","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["DTA studentship"],"award-info":[{"award-number":["DTA studentship"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DSO National Laboratories, Singapore"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416589","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"115-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Pending constraints in symbolic execution for better exploration and seeding"],"prefix":"10.1145","author":[{"given":"Timotej","family":"Kapus","sequence":"first","affiliation":[{"name":"Imperial College London, United Kingdom"}]},{"given":"Frank","family":"Busse","sequence":"additional","affiliation":[{"name":"Imperial College London, United Kingdom"}]},{"given":"Cristian","family":"Cadar","sequence":"additional","affiliation":[{"name":"Imperial College London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/ICSE.2017.46"},{"key":"e_1_3_2_1_2_1","volume-title":"CREST: A Concolic Test Generation Tool for C. https:\/\/www.burn.im\/crest\/","author":"Burnim Jacob","year":"2020","unstructured":"Jacob Burnim. 2020. CREST: A Concolic Test Generation Tool for C. https:\/\/www.burn.im\/crest\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3395363.3397360"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI'08)","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proc. of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI'08)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/11537328_2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1180405.1180445"},{"unstructured":"Cristian Cadar and Timotej Kapus. 2020. Measuring the coverage achieved by symbolic execution. https:\/\/ccadar.blogspot.com\/2020\/07\/measuring-coverage-achieved-by-symbolic.html.","key":"e_1_3_2_1_7_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_9_1","volume-title":"SAVIOR: Towards Bug-Driven Hybrid Testing. arXiv:cs.SE\/1906.07327","author":"Chen Yaohui","year":"2019","unstructured":"Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Taowei, and Long Lu. 2019. SAVIOR: Towards Bug-Driven Hybrid Testing. arXiv:cs.SE\/1906.07327"},{"key":"e_1_3_2_1_10_1","volume":"201","author":"Collingbourne Peter","unstructured":"Peter Collingbourne, Cristian Cadar, and Paul H.J. Kelly. 2011. Symbolic Cross-checking of Floating-Point and SIMD Code. In Proc. of the 6th European Conference on Computer Systems (EuroSys'11).","journal-title":"J. Kelly."},{"key":"e_1_3_2_1_11_1","volume":"201","author":"Collingbourne Peter","unstructured":"Peter Collingbourne, Cristian Cadar, and Paul H.J. Kelly. 2011. Symbolic Testing of OpenCL Code. In Proc. of the Haifa Verification Conference (HVC'11).","journal-title":"J. Kelly."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/1065010.1065036"},{"volume-title":"Proc. of the 15th Network and Distributed System Security Symposium (NDSS'08)","author":"Godefroid Patrice","unstructured":"Patrice Godefroid, Michael Y. Levin, and David A. Molnar. 2008. Automated Whitebox Fuzz Testing. In Proc. of the 15th Network and Distributed System Security Symposium (NDSS'08).","key":"e_1_3_2_1_13_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.5555\/2337223.2337279"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/3338906.3338936"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_17_1","volume-title":"KLUZZER: Whitebox Fuzzing on Top of LLVM. In Automated Technology for Verification and Analysis (ATVA).","author":"Le Hoang M.","year":"2019","unstructured":"Hoang M. Le. 2019. KLUZZER: Whitebox Fuzzing on Top of LLVM. In Automated Technology for Verification and Analysis (ATVA)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/2337223.2337308"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2491411.2491438"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of the 35th International Conference on Software Engineering (ICSE'13)","author":"Thien Nguyen Hoang Duong","year":"2013","unstructured":"Hoang Duong Thien Nguyen, Dawei Qi, Abhik Roychoudhury, and Satish Chandra. 2013. SemFix: Program Repair via Semantic Analysis. In Proc. of the 35th International Conference on Software Engineering (ICSE'13)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/3167132.3167289"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/2884781.2884845"},{"volume-title":"Proc. of the 24th USENIX Security Symposium (USENIX Security'15)","author":"David","unstructured":"David A. Ramos and Dawson Engler. 2015. Under-constrained Symbolic Execution: Correctness Checking for Real Code. In Proc. of the 24th USENIX Security Symposium (USENIX Security'15).","key":"e_1_3_2_1_23_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/1081706.1081750"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.14722\/ndss.2016.23368"},{"volume-title":"Proc. of the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE'12)","author":"Visser Willem","unstructured":"Willem Visser, Jaco Geldenhuys, and Matthew B. Dwyer. 2012. Green: reducing, reusing and recycling constraints in program analysis. In Proc. of the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE'12).","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of the IEEE Symposium on Security and Privacy (IEEE S&P'06)","author":"Yang Junfeng","year":"2006","unstructured":"Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, and Dawson Engler. 2006. Automatically generating malicious disks using symbolic execution. In Proc. of the IEEE Symposium on Security and Privacy (IEEE S&P'06)."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of the 27th USENIX Security Symposium (USENIX Security'18)","author":"Yun Insu","year":"2018","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In Proc. of the 27th USENIX Security Symposium (USENIX Security'18)."}],"event":{"sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"ASE '20","name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416589","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416589"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":28,"alternative-id":["10.1145\/3324884.3416589","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416589","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}