{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:09:44Z","timestamp":1776305384719,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:00:00Z","timestamp":1604707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-19-1-2541"],"award-info":[{"award-number":["N00014-19-1-2541"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006435","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1563920"],"award-info":[{"award-number":["1563920"]}],"id":[{"id":"10.13039\/100006435","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409734","type":"proceedings-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T06:03:52Z","timestamp":1604815432000},"page":"123-134","source":"Crossref","is-referenced-by-count":20,"title":["Java Ranger: statically summarizing regions for efficient symbolic execution of Java"],"prefix":"10.1145","author":[{"given":"Vaibhav","family":"Sharma","sequence":"first","affiliation":[{"name":"University of Minnesota, USA"}]},{"given":"Soha","family":"Hussein","sequence":"additional","affiliation":[{"name":"University of Minnesota, USA \/ Ain Shams University, Egypt"}]},{"given":"Michael W.","family":"Whalen","sequence":"additional","affiliation":[{"name":"University of Minnesota, USA"}]},{"given":"Stephen","family":"McCamant","sequence":"additional","affiliation":[{"name":"University of Minnesota, USA"}]},{"given":"Willem","family":"Visser","sequence":"additional","affiliation":[{"name":"Stellenbosch University, South Africa"}]}],"member":"320","published-online":{"date-parts":[[2020,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"ISSTA 2014: Proceedings of the 2014 International Symposium on Software Testing and Analysis. Association for Computing Machinery"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1177220"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FMCAD.2009.5351147"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855756"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110358"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233817"},{"key":"e_1_3_2_2_11_1","volume-title":"JBMC: A Bounded Model Checking Tool for Verifying Java Bytecode","author":"Cordeiro Lucas","year":"2018"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_2_13_1","volume-title":"COASTAL: Concolic analysis tool for Java. https:\/\/github.com\/DeepseaPlatform\/coastal. ( 2020 ).","author":"Geldenhuys Jaco","year":"2020"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190215.1190226"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04694-0_6"},{"key":"e_1_3_2_2_17_1","unstructured":"IBM. 2006-2020. WALA. http:\/\/wala.sourceforge.net\/wiki\/index.php\/Main_Page. ( 2006-2020 ). Accessed: 2018-11-16.  IBM. 2006-2020. WALA. http:\/\/wala.sourceforge.net\/wiki\/index.php\/Main_Page. ( 2006-2020 ). Accessed: 2018-11-16."},{"key":"e_1_3_2_2_18_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Kahsai Temesghen"},{"key":"e_1_3_2_2_19_1","unstructured":"James C. King. 1976. Symbolic Execution and Program Testing. Commun. ACM 19 7 ( 1976 ) 385-394. http:\/\/doi.acm.org\/10.1145\/360248.360252 10.1145\/360248.360252  James C. King. 1976. Symbolic Execution and Program Testing. Commun. ACM 19 7 ( 1976 ) 385-394. http:\/\/doi.acm.org\/10.1145\/360248.360252 10.1145\/360248.360252"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254088"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","unstructured":"Kasper Luckow Marko Dimja\u0161evi\u0107 Dimitra Giannakopoulou Falk Howar Malte Isberner Temesghen Kahsai Zvonimir Rakamari\u0107 and Vishwanath Raman. 2016. JDart: A Dynamic Symbolic Analysis Framework. In Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) (Lecture Notes in Computer Science) Marsha Chechik and Jean-Fran\u00e7ois Raskin (Eds.) Vol. 9636. Springer New York NY USA 442-459.  Kasper Luckow Marko Dimja\u0161evi\u0107 Dimitra Giannakopoulou Falk Howar Malte Isberner Temesghen Kahsai Zvonimir Rakamari\u0107 and Vishwanath Raman. 2016. JDart: A Dynamic Symbolic Analysis Framework. In Proceedings of the 22nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS) (Lecture Notes in Computer Science) Marsha Chechik and Jean-Fran\u00e7ois Raskin (Eds.) Vol. 9636. Springer New York NY USA 442-459.","DOI":"10.1007\/978-3-662-49674-9_26"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155662"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/93548.93578"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-013-0122-2"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032360"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786830"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00024"},{"key":"e_1_3_2_2_29_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Sharma Vaibhav"},{"key":"e_1_3_2_2_30_1","unstructured":"Vaibhav Sharma Soha Hussein Michael W. Whalen Stephen McCamant and Willem Visser. 2020. java-ranger : v1.0.0. (Jun 2020 ). https:\/\/doi.org\/10.5281\/ zenodo.3907232 10.5281\/zenodo.3907232  Vaibhav Sharma Soha Hussein Michael W. Whalen Stephen McCamant and Willem Visser. 2020. java-ranger : v1.0.0. (Jun 2020 ). https:\/\/doi.org\/10.5281\/ zenodo.3907232 10.5281\/zenodo.3907232"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_2_32_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Stephens Nick","year":"2016"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092706"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/223428.207115"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393665"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022920129859"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584063"},{"key":"e_1_3_2_2_38_1","unstructured":"Phillipp Wendler. 2020. SV-COMP 2020-JavaOverall-BenchExec Results. https:\/\/sv-comp.sosy-lab.org\/2020\/results\/results-verified\/META_JavaOverall.table.html. ( 2020 ).  Phillipp Wendler. 2020. SV-COMP 2020-JavaOverall-BenchExec Results. https:\/\/sv-comp.sosy-lab.org\/2020\/results\/results-verified\/META_JavaOverall.table.html. ( 2020 )."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23185"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336771"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409734","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409734","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409734","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:57Z","timestamp":1750197717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409734"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,7]]},"references-count":40,"alternative-id":["10.1145\/3368089.3409734","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409734","relation":{},"subject":[],"published":{"date-parts":[[2020,11,7]]}}}