{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:53:04Z","timestamp":1771951984625,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100008952","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-16-CE25-0015"],"award-info":[{"award-number":["ANR-16-CE25-0015"]}],"id":[{"id":"10.13039\/501100008952","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359796","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"163-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Systematic comparison of symbolic execution systems"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Poeplau","sequence":"first","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]},{"given":"Aur\u00e9lien","family":"Francillon","sequence":"additional","affiliation":[{"name":"EURECOM, Sophia Antipolis, France"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 8th International Workshop on Satisfiability Modulo Theories","volume":"13","author":"Barrett Clark","year":"2010","unstructured":"Clark Barrett , Aaron Stump , and Cesare Tinelli . 2010 . The SMT-LIB standard: Version 2.0 . In Proceedings of the 8th International Workshop on Satisfiability Modulo Theories ( Edinburgh, England) , Vol. 13 . 14. Clark Barrett, Aaron Stump, and Cesare Tinelli. 2010. The SMT-LIB standard: Version 2.0. In Proceedings of the 8th International Workshop on Satisfiability Modulo Theories (Edinburgh, England), Vol. 13. 14."},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track","volume":"41","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a fast and portable dynamic translator . In USENIX Annual Technical Conference, FREENIX Track , Vol. 41 . 46. Fabrice Bellard. 2005. QEMU, a fast and portable dynamic translator. In USENIX Annual Technical Conference, FREENIX Track, Vol. 41. 46."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486805"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_37"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_16"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_3_2_1_8_1","first-page":"209","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R. Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In OSDI , Vol. 8. 209 -- 224 . Cristian Cadar, Daniel Dunbar, and Dawson R. Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI, Vol. 8. 209--224.","journal-title":"OSDI"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380250706"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966475"},{"key":"e_1_3_2_1_14_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Corteggiani Nassim","year":"2018","unstructured":"Nassim Corteggiani , Giovanni Camurati , and Aur\u00e9lien Francillon . 2018 . Inception: system-wide security testing of real-world embedded systems software . In 27th USENIX Security Symposium (USENIX Security 18) . 309--326. Nassim Corteggiani, Giovanni Camurati, and Aur\u00e9lien Francillon. 2018. Inception: system-wide security testing of real-world embedded systems software. In 27th USENIX Security Symposium (USENIX Security 18). 309--326."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_16_1","volume-title":"ReCon 2014 Conference","author":"Dinaburg Artem","year":"2014","unstructured":"Artem Dinaburg and Andrew Ruef . 2014 . McSema: Static translation of x86 instructions to LLVM . In ReCon 2014 Conference , Montreal, Canada. Artem Dinaburg and Andrew Ruef. 2014. McSema: Static translation of x86 instructions to LLVM. In ReCon 2014 Conference, Montreal, Canada."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 5th International Conference on Software Engineering (ICSE '81)","author":"Joe","unstructured":"Joe W. Duran and Simeon Ntafos. 1981. A Report on Random Testing . In Proceedings of the 5th International Conference on Software Engineering (ICSE '81) . IEEE Press, Piscataway, NJ, USA, 179--183. http:\/\/dl.acm.org\/citation.cfm?id=800078.802530 Joe W. Duran and Simeon Ntafos. 1981. A Report on Random Testing. In Proceedings of the 5th International Conference on Software Engineering (ICSE '81). IEEE Press, Piscataway, NJ, USA, 179--183. http:\/\/dl.acm.org\/citation.cfm?id=800078.802530"},{"key":"e_1_3_2_1_18_1","volume-title":"Clarke","author":"Allen Emerson E.","year":"1980","unstructured":"E. Allen Emerson and Edmund M . Clarke . 1980 . Characterizing correctness properties of parallel programs using fixpoints. In International Colloquium on Automata, Languages, and Programming. Springer , 169--181. E. Allen Emerson and Edmund M. Clarke. 1980. Characterizing correctness properties of parallel programs using fixpoints. In International Colloquium on Automata, Languages, and Programming. Springer, 169--181."},{"key":"e_1_3_2_1_19_1","unstructured":"Free Software Foundation. 2016. Coreutils - GNU core utilities. https:\/\/www.gnu.org\/software\/coreutils\/. Accessed: 2019-02-04.  Free Software Foundation. 2016. Coreutils - GNU core utilities. https:\/\/www.gnu.org\/software\/coreutils\/. Accessed: 2019-02-04."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155609"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44465-8_41"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254088"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40787-1_31"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13338-6_21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39799-8_3"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2011.20"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-11494-7_22"},{"key":"e_1_3_2_1_32_1","unstructured":"Nguyen Anh Quynh and Dang Hoang Vu. 2015. Unicorn - The ultimate CPU emulator. https:\/\/www.unicorn-engine.org\/. Accessed: 2019-02-26.  Nguyen Anh Quynh and Dang Hoang Vu. 2015. Unicorn - The ultimate CPU emulator. https:\/\/www.unicorn-engine.org\/. Accessed: 2019-02-26."},{"key":"e_1_3_2_1_33_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"David","unstructured":"David A. Ramos and Dawson Engler. 2015. Under-constrained symbolic execution: Correctness checking for real code . In 24th USENIX Security Symposium (USENIX Security 15) . 49--64. David A. Ramos and Dawson Engler. 2015. Under-constrained symbolic execution: Correctness checking for real code. In 24th USENIX Security Symposium (USENIX Security 15). 49--64."},{"key":"e_1_3_2_1_34_1","volume-title":"2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 132--143","author":"Rizzi Eric F","unstructured":"Eric F Rizzi , Sebastian Elbaum , and Matthew B. Dwyer . 2016. On the techniques we create, the tools we build, and their misalignments: a study of KLEE . In 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 132--143 . Eric F Rizzi, Sebastian Elbaum, and Matthew B. Dwyer. 2016. On the techniques we create, the tools we build, and their misalignments: a study of KLEE. In 2016 IEEE\/ACM 38th International Conference on Software Engineering (ICSE). IEEE, 132--143."},{"key":"e_1_3_2_1_35_1","unstructured":"S2E issue tracker. 2019. Add support for symbolic MMX registers. https:\/\/github.com\/S2E\/s2e-env\/issues\/144. Accessed: 2019-06-04.  S2E issue tracker. 2019. Add support for symbolic MMX registers. https:\/\/github.com\/S2E\/s2e-env\/issues\/144. Accessed: 2019-06-04."},{"key":"e_1_3_2_1_36_1","unstructured":"Florent Saudel and Jonathan Salwan. 2015. Triton Dynamic Binary Analysis Framework. https:\/\/github.com\/JonathanSalwan\/Triton. Accessed: 2019-04-02.  Florent Saudel and Jonathan Salwan. 2015. Triton Dynamic Binary Analysis Framework. https:\/\/github.com\/JonathanSalwan\/Triton. Accessed: 2019-04-02."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_39_1","first-page":"1","article-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Andrew Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: Augmenting Fuzzing Through Selective Symbolic Execution . In NDSS , Vol. 16. 1 -- 16 . Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS, Vol. 16. 1--16.","journal-title":"NDSS"},{"key":"e_1_3_2_1_40_1","volume-title":"Manticore: Symbolic execution for humans. https:\/\/blog.trailofbits.com\/2017\/04\/27\/manticore-symbolic-execution-for-humans\/. Accessed: 2019-02-27.","author":"Bits Trail","year":"2017","unstructured":"Trail of Bits . 2017 . Manticore: Symbolic execution for humans. https:\/\/blog.trailofbits.com\/2017\/04\/27\/manticore-symbolic-execution-for-humans\/. Accessed: 2019-02-27. Trail of Bits. 2017. Manticore: Symbolic execution for humans. https:\/\/blog.trailofbits.com\/2017\/04\/27\/manticore-symbolic-execution-for-humans\/. Accessed: 2019-02-27."},{"key":"e_1_3_2_1_41_1","volume-title":"Lyu","author":"Xu Hui","year":"2018","unstructured":"Hui Xu , Zirui Zhao , Yangfan Zhou , and Michael R . Lyu . 2018 . Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs. IEEE Transactions on Dependable and Secure Computing ( 2018). Hui Xu, Zirui Zhao, Yangfan Zhou, and Michael R. Lyu. 2018. Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs. IEEE Transactions on Dependable and Secure Computing (2018)."},{"key":"e_1_3_2_1_42_1","volume-title":"2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 181--188","author":"Xu Hui","unstructured":"Hui Xu , Yangfan Zhou , Yu Kang , and Michael R. Lyu . 2017. Concolic execution on small-size binaries: challenges and empirical study . In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 181--188 . Hui Xu, Yangfan Zhou, Yu Kang, and Michael R. Lyu. 2017. Concolic execution on small-size binaries: challenges and empirical study. In 2017 47th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 181--188."},{"key":"e_1_3_2_1_43_1","volume-title":"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Yun Insu","year":"2018","unstructured":"Insu Yun , Sangho Lee , Meng Xu , Yeongjin Jang , and Taesoo Kim . 2018 . QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium (USENIX Security 18) . 745--761. Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium (USENIX Security 18). 745--761."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/603095.603153"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:07Z","timestamp":1750202587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359796"}},"subtitle":["intermediate representation and its generation"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":44,"alternative-id":["10.1145\/3359789.3359796","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359796","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}