{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T21:30:27Z","timestamp":1769722227329,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409687","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:45:01Z","timestamp":1607647501000},"page":"1228-1239","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["When does my program do this? learning circumstances of software behavior"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Kampmann","sequence":"first","affiliation":[{"name":"CISPA, Germany"}]},{"given":"Nikolas","family":"Havrikov","sequence":"additional","affiliation":[{"name":"CISPA, Germany"}]},{"given":"Ezekiel O.","family":"Soremekun","sequence":"additional","affiliation":[{"name":"CISPA, Germany"}]},{"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[{"name":"CISPA, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2017. DbgBench-find.07b941b1. https:\/\/dbgbench.github. io\/find.07b941b1. report.txt  2017. DbgBench-find.07b941b1. https:\/\/dbgbench.github. io\/find.07b941b1. report.txt"},{"key":"e_1_3_2_2_2_1","unstructured":"2017. DbgBench-find.24bf33c0. https:\/\/dbgbench.github. io\/find.24bf33c0.report. txt  2017. DbgBench-find.24bf33c0. https:\/\/dbgbench.github. io\/find.24bf33c0.report. txt"},{"key":"e_1_3_2_2_3_1","unstructured":"2017. DbgBench-grep.2be0c659. https:\/\/dbgbench.github. io\/grep.2be0c659. report.txt  2017. DbgBench-grep.2be0c659. https:\/\/dbgbench.github. io\/grep.2be0c659. report.txt"},{"key":"e_1_3_2_2_4_1","unstructured":"2017. DbgBench-grep.7aa698d3. https:\/\/dbgbench.github. io\/grep.7aa698d3. report.txt  2017. DbgBench-grep.7aa698d3. https:\/\/dbgbench.github. io\/grep.7aa698d3. report.txt"},{"key":"e_1_3_2_2_5_1","unstructured":"2017. DbgBench-grep.c96b0f2c. https:\/\/dbgbench.github. io\/grep.c96b0f2c. report.txt  2017. DbgBench-grep.c96b0f2c. https:\/\/dbgbench.github. io\/grep.c96b0f2c. report.txt"},{"key":"e_1_3_2_2_6_1","unstructured":"2017. Genson. https:\/\/github.com\/owlike\/genson. Version 1.4.  2017. Genson. https:\/\/github.com\/owlike\/genson. Version 1.4."},{"key":"e_1_3_2_2_7_1","unstructured":"2018. ANTLR Grammars. https:\/\/github.com\/antlr\/grammars-v4\/.  2018. ANTLR Grammars. https:\/\/github.com\/antlr\/grammars-v4\/."},{"key":"e_1_3_2_2_8_1","unstructured":"2018. INTERNAL COMPILER ERROR: assigning a class extending class expression #2937. https:\/\/github.com\/google\/closure-compiler\/issues\/2937  2018. INTERNAL COMPILER ERROR: assigning a class extending class expression #2937. https:\/\/github.com\/google\/closure-compiler\/issues\/2937"},{"key":"e_1_3_2_2_9_1","unstructured":"2018. Mozilla Rhino. https:\/\/github.com\/mozilla\/rhino. Version 1.7.8.  2018. Mozilla Rhino. https:\/\/github.com\/mozilla\/rhino. Version 1.7.8."},{"key":"e_1_3_2_2_10_1","unstructured":"2019. Google Closure. https:\/\/github.com\/google\/closure-compiler. v20180101.  2019. Google Closure. https:\/\/github.com\/google\/closure-compiler. v20180101."},{"key":"e_1_3_2_2_11_1","unstructured":"2020. CVE-2020-5214. https:\/\/nethack.org\/security\/CVE-2020-5214.html  2020. CVE-2020-5214. https:\/\/nethack.org\/security\/CVE-2020-5214.html"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Osbert Bastani Rahul Sharma Alex Aiken and Percy Liang. 2017. Synthesizing program input grammars. ACM SIGPLAN Notices 52 6 ( 2017 ) 95-110.  Osbert Bastani Rahul Sharma Alex Aiken and Percy Liang. 2017. Synthesizing program input grammars. ACM SIGPLAN Notices 52 6 ( 2017 ) 95-110.","DOI":"10.1145\/3140587.3062349"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106255"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Jay Earley. 1970. An efficient context-free parsing algorithm. Commun. ACM 13 2 ( 1970 ) 94-102.  Jay Earley. 1970. An efficient context-free parsing algorithm. Commun. ACM 13 2 ( 1970 ) 94-102.","DOI":"10.1145\/362007.362035"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"crossref","unstructured":"Michael D Ernst Jeff H Perkins Philip J Guo Stephen McCamant Carlos Pacheco Matthew S Tschantz and Chen Xiao. 2007. The Daikon system for dynamic detection of likely invariants. Science of computer programming 69 1-3 ( 2007 ) 35-45.  Michael D Ernst Jeff H Perkins Philip J Guo Stephen McCamant Carlos Pacheco Matthew S Tschantz and Chen Xiao. 2007. The Daikon system for dynamic detection of likely invariants. Science of computer programming 69 1-3 ( 2007 ) 35-45.","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_2_18_1","volume-title":"Systematically Covering Input Structure. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 189-199","author":"Havrikov Nikolas","year":"2019","unstructured":"Nikolas Havrikov and Andreas Zeller . 2019 . Systematically Covering Input Structure. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 189-199 . Nikolas Havrikov and Andreas Zeller. 2019. Systematically Covering Input Structure. In 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 189-199."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970321"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 2020 International Conference on Software Engineering.","author":"Johnson Brittany","year":"2020","unstructured":"Brittany Johnson , Yuriy Brun , and Alexandra Meliou . 2020 . Causal Testing: Understanding Defects' Root Causes . In Proceedings of the 2020 International Conference on Software Engineering. Brittany Johnson, Yuriy Brun, and Alexandra Meliou. 2020. Causal Testing: Understanding Defects' Root Causes. In Proceedings of the 2020 International Conference on Software Engineering."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.3902142"},{"key":"e_1_3_2_2_23_1","first-page":"54","volume-title":"Genprog: A generic method for automatic software repair. Ieee transactions on software engineering 38, 1 ( 2011 )","author":"Goues Claire Le","year":"2011","unstructured":"Claire Le Goues , ThanhVu Nguyen , Stephanie Forrest , and Westley Weimer . 2011 . Genprog: A generic method for automatic software repair. Ieee transactions on software engineering 38, 1 ( 2011 ) , 54 - 72 . Claire Le Goues, ThanhVu Nguyen, Stephanie Forrest, and Westley Weimer. 2011. Genprog: A generic method for automatic software repair. Ieee transactions on software engineering 38, 1 ( 2011 ), 54-72."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Ben Liblit Mayur Naik Alice X Zheng Alex Aiken and Michael I Jordan. 2005. Scalable statistical bug isolation. ACM Sigplan Notices 40 6 ( 2005 ) 15-26.  Ben Liblit Mayur Naik Alice X Zheng Alex Aiken and Michael I Jordan. 2005. Scalable statistical bug isolation. ACM Sigplan Notices 40 6 ( 2005 ) 15-26.","DOI":"10.1145\/1064978.1065014"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314651"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_2_28_1","unstructured":"Terence Parr. 2013. The definitive ANTLR 4 reference. Pragmatic Bookshelf.  Terence Parr. 2013. The definitive ANTLR 4 reference. Pragmatic Bookshelf."},{"key":"e_1_3_2_2_29_1","volume-title":"Inputs from Hell: Generating Uncommon Inputs from Common Samples. arXiv preprint arXiv","author":"Pavese Esteban","year":"1812","unstructured":"Esteban Pavese , Ezekiel Soremekun , Nikolas Havrikov , Lars Grunske , and Andreas Zeller . 2018. Inputs from Hell: Generating Uncommon Inputs from Common Samples. arXiv preprint arXiv : 1812 . 07525 ( 2018 ). Esteban Pavese, Ezekiel Soremekun, Nikolas Havrikov, Lars Grunske, and Andreas Zeller. 2018. Inputs from Hell: Generating Uncommon Inputs from Common Samples. arXiv preprint arXiv: 1812. 07525 ( 2018 )."},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 2012 international symposium on software testing and analysis. 309-319","author":"Jeremias R\u00f6\u03b2","year":"2012","unstructured":"Jeremias R\u00f6\u03b2 ler, Gordon Fraser , Andreas Zeller , and Alessandro Orso . 2012 . Isolating failure causes through test case generation . In Proceedings of the 2012 international symposium on software testing and analysis. 309-319 . Jeremias R\u00f6\u03b2 ler, Gordon Fraser, Andreas Zeller, and Alessandro Orso. 2012. Isolating failure causes through test case generation. In Proceedings of the 2012 international symposium on software testing and analysis. 309-319."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180236"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGE.1977.6498972"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_2_34_1","unstructured":"Wikipedia. 2020. Ibn_al-Haytham. https:\/\/en.wikipedia.org\/wiki\/Ibn_alHaytham  Wikipedia. 2020. Ibn_al-Haytham. https:\/\/en.wikipedia.org\/wiki\/Ibn_alHaytham"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409687","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:39Z","timestamp":1750203879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409687"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":37,"alternative-id":["10.1145\/3368089.3409687","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409687","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}