{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:12:04Z","timestamp":1775873524737,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation"},{"name":"National University of Singapore"},{"name":"Singapore Telecommunications Ltd"},{"name":"Prime Ministers Office, Singapore"},{"name":"EPSRC project","award":["EP\/N023978\/2"],"award-info":[{"award-number":["EP\/N023978\/2"]}]},{"name":"the National Science Foundation of China","award":["61632015"],"award-info":[{"award-number":["61632015"]}]},{"name":"the National Research Foundation Singapore under its NSoE Programme","award":["NSOE-TSS2019-03"],"award-info":[{"award-number":["NSOE-TSS2019-03"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397358","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"440-451","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Recovering fitness gradients for interprocedural Boolean flags in search-based testing"],"prefix":"10.1145","author":[{"given":"Yun","family":"Lin","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Gordon","family":"Fraser","sequence":"additional","affiliation":[{"name":"University of Passau, Germany"}]},{"given":"Ziheng","family":"Xiu","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Ting","family":"Liu","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, China"}]},{"given":"Jin Song","family":"Dong","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Anonymous Webiste. https:\/\/sites.google.com\/view\/evoipf\/home. Accessed: 2019-05-13.  [n. d.]. Anonymous Webiste. https:\/\/sites.google.com\/view\/evoipf\/home. Accessed: 2019-05-13."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Apache Math. https:\/\/commons.apache.org\/proper\/commons-math\/ download_math.cgi. Accessed: 2020-01-27.  [n. d.]. Apache Math. https:\/\/commons.apache.org\/proper\/commons-math\/ download_math.cgi. Accessed: 2020-01-27."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. IDA SDK. https:\/\/www.hex-rays.com\/products\/ida\/support\/download. shtml. Accessed: 2020-01-27.  [n. d.]. IDA SDK. https:\/\/www.hex-rays.com\/products\/ida\/support\/download. shtml. Accessed: 2020-01-27."},{"key":"e_1_3_2_1_4_1","volume-title":"d.]. JFreechat","unstructured":"[n. d.]. JFreechat . http:\/\/www.jfree.org\/jfreechart\/download.html. Accessed: 2020-01-27. [n. d.]. JFreechat. http:\/\/www.jfree.org\/jfreechart\/download.html. Accessed: 2020-01-27."},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. Weka. https:\/\/sourceforge.net\/projects\/weka\/files\/weka-3-8 \/3.8.0\/. Accessed: 2020-01-27.  [n. d.]. Weka. https:\/\/sourceforge.net\/projects\/weka\/files\/weka-3-8 \/3.8.0\/. Accessed: 2020-01-27."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.11.035"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-016-0197-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Andrea Arcuri. 2013. It really does matter how you normalize the branch distance in search-based software testing. Software Testing Verification and Reliability 23 2 ( 2013 ) 119-147.  Andrea Arcuri. 2013. It really does matter how you normalize the branch distance in search-based software testing. Software Testing Verification and Reliability 23 2 ( 2013 ) 119-147.","DOI":"10.1002\/stvr.457"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2697848"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007527"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2955491.2955736"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-008-9098-4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000796"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2007.01.015"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180202"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_28"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02450-5_3"},{"key":"e_1_3_2_1_18_1","volume-title":"2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). 185-195","author":"Dong Z.","unstructured":"Z. Dong , A. Andrzejak , D. Lo , and D. Costa . 2016. ORPLocator: Identifying Read Points of Configuration Options via Static Analysis . In 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). 185-195 . Z. Dong, A. Andrzejak, D. Lo, and D. Costa. 2016. ORPLocator: Identifying Read Points of Configuration Options via Static Analysis. In 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE). 185-195."},{"key":"e_1_3_2_1_19_1","volume-title":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME). 171-180","author":"Dong Z.","unstructured":"Z. Dong , A. Andrzejak , and K. Shao . 2015. Practical and accurate pinpointing of configuration errors using static analysis . In 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME). 171-180 . Z. Dong, A. Andrzejak, and K. Shao. 2015. Practical and accurate pinpointing of configuration errors using static analysis. In 2015 IEEE International Conference on Software Maintenance and Evolution (ICSME). 171-180."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380402"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337245"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.51"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.14"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685612"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.05.032"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 42nd International Conference on Software Engineering. ACM.","author":"Haijun Wang","year":"2020","unstructured":"Wang Haijun , Xie Xiaofei , Li Yi , Wen Cheng , Li Yuekang , Liu Yang , Qin Shengchao , Chen Hongxu , and Sui Yulei . 2020 . Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities . In Proceedings of the 42nd International Conference on Software Engineering. ACM. Wang Haijun, Xie Xiaofei, Li Yi, Wen Cheng, Li Yuekang, Liu Yang, Qin Shengchao, Chen Hongxu, and Sui Yulei. 2020. Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities. In Proceedings of the 42nd International Conference on Software Engineering. ACM."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"key":"e_1_3_2_1_29_1","volume-title":"Formal Methods and Testing","author":"Harman Mark","unstructured":"Mark Harman , Andr\u00e9 Baresel , David Binkley , Robert Hierons , Lin Hu , Bogdan Korel , Phil McMinn , and Marc Roper . 2008. Formal Methods and Testing . Springer-Verlag , Berlin, Heidelberg , Chapter Testability Transformation: Program Transformation to Improve Testability, 320-344. http:\/\/dl.acm.org\/citation. cfm?id= 1806209. 1806220 Mark Harman, Andr\u00e9 Baresel, David Binkley, Robert Hierons, Lin Hu, Bogdan Korel, Phil McMinn, and Marc Roper. 2008. Formal Methods and Testing. Springer-Verlag, Berlin, Heidelberg, Chapter Testability Transformation: Program Transformation to Improve Testability, 320-344. http:\/\/dl.acm.org\/citation. cfm?id= 1806209. 1806220"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2004.1357891"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.1265732"},{"key":"e_1_3_2_1_32_1","volume-title":"Jerfeson Teixeira de Souza, and Shin Yoo","author":"Harman Mark","year":"2012","unstructured":"Mark Harman , Phil McMinn , Jerfeson Teixeira de Souza, and Shin Yoo . 2012 . Empirical Software Engineering and Verification. Springer-Verlag , Berlin, Heidelberg, Chapter Search Based Software Engineering: Techniques, Taxonomy, Tutorial, 1-59. http:\/\/dl.acm.org\/citation.cfm?id= 2184075. 2184076 Mark Harman, Phil McMinn, Jerfeson Teixeira de Souza, and Shin Yoo. 2012. Empirical Software Engineering and Verification. Springer-Verlag, Berlin, Heidelberg, Chapter Search Based Software Engineering: Techniques, Taxonomy, Tutorial, 1-59. http:\/\/dl.acm.org\/citation.cfm?id= 2184075. 2184076"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2008.36"},{"key":"e_1_3_2_1_34_1","unstructured":"Yanchuan Li and Gordon Fraser. 2011. Bytecode Testability Transformation.  Yanchuan Li and Gordon Fraser. 2011. Bytecode Testability Transformation."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238163"},{"key":"e_1_3_2_1_37_1","volume-title":"FeedbackBased Debugging. In Proceedings of the 39th International Conference on Software Engineering. 393-403","author":"Lin Yun","year":"2017","unstructured":"Yun Lin , Jun Sun , Yinxing Xue , Yang Liu , and Jinsong Dong . 2017 . FeedbackBased Debugging. In Proceedings of the 39th International Conference on Software Engineering. 393-403 . Yun Lin, Jun Sun, Yinxing Xue, Yang Liu, and Jinsong Dong. 2017. FeedbackBased Debugging. In Proceedings of the 39th International Conference on Software Engineering. 393-403."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00017"},{"key":"e_1_3_2_1_39_1","volume-title":"Jin Song Dong, and Zhenkai Liang","author":"Mahadewa Kulani","year":"2019","unstructured":"Kulani Mahadewa , Kailong Wang , Guangdong Bai , Ling Shi , Jin Song Dong, and Zhenkai Liang . 2019 . Scrutinizing Implementations of Smart Home Integrations. IEEE Transactions on Software Engineering ( 2019 ). Kulani Mahadewa, Kailong Wang, Guangdong Bai, Ling Shi, Jin Song Dong, and Zhenkai Liang. 2019. Scrutinizing Implementations of Smart Home Integrations. IEEE Transactions on Software Engineering ( 2019 )."},{"key":"e_1_3_2_1_40_1","volume-title":"Search-based Software Test Data Generation: A Survey: Research Articles. Softw. Test. Verif. Reliab. 14, 2 (","author":"McMinn Phil","year":"2004","unstructured":"Phil McMinn . 2004. Search-based Software Test Data Generation: A Survey: Research Articles. Softw. Test. Verif. Reliab. 14, 2 ( June 2004 ), 105-156. Phil McMinn. 2004. Search-based Software Test Data Generation: A Survey: Research Articles. Softw. Test. Verif. Reliab. 14, 2 ( June 2004 ), 105-156."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233818"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380334"},{"key":"e_1_3_2_1_43_1","volume-title":"2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST). 1-10","author":"Panichella A.","unstructured":"A. Panichella , F. M. Kifetew , and P. Tonella . 2015. Reformulating Branch Coverage as a Many-Objective Optimization Problem . In 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST). 1-10 . A. Panichella, F. M. Kifetew, and P. Tonella. 2015. Reformulating Branch Coverage as a Many-Objective Optimization Problem. In 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST). 1-10."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2663435"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22183-0_7"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBST.2015.12"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.86"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-016-9504-8"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146240"},{"key":"e_1_3_2_1_50_1","volume-title":"Qinghua Zheng, and Ting Liu.","author":"Wang Haijun","year":"2019","unstructured":"Haijun Wang , Yun Lin , Zijiang Yang , Jun Sun , Yang Liu , Jin Song Dong , Qinghua Zheng, and Ting Liu. 2019 . Explaining Regressions via Alignment Slicing and Mending. IEEE Transactions on Software Engineering ( 2019 ), 1-1. Haijun Wang, Yun Lin, Zijiang Yang, Jun Sun, Yang Liu, Jin Song Dong, Qinghua Zheng, and Ting Liu. 2019. Explaining Regressions via Alignment Slicing and Mending. IEEE Transactions on Software Engineering ( 2019 ), 1-1."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338966"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180177"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"crossref","unstructured":"Joachim Wegener Andr\u00e9 Baresel and Harmen Sthamer. 2001. Evolutionary test environment for automatic structural testing. Information & Software Technology 43 14 ( 2001 ) 841-854. http:\/\/dblp.uni-trier.de\/db\/journals\/infsof\/infsof43.html# WegenerBS01  Joachim Wegener Andr\u00e9 Baresel and Harmen Sthamer. 2001. Evolutionary test environment for automatic structural testing. Information & Software Technology 43 14 ( 2001 ) 841-854. http:\/\/dblp.uni-trier.de\/db\/journals\/infsof\/infsof43.html# WegenerBS01","DOI":"10.1016\/S0950-5849(01)00190-2"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Yan Xiao Jacky Keung Kwabena E Bennin and Qing Mi. 2019. Improving bug localization with word embedding and enhanced convolutional neural networks. Information and Software Technology 105 ( 2019 ) 17-29.  Yan Xiao Jacky Keung Kwabena E Bennin and Qing Mi. 2019. Improving bug localization with word embedding and enhanced convolutional neural networks. Information and Software Technology 105 ( 2019 ) 17-29.","DOI":"10.1016\/j.infsof.2018.08.002"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950340"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106260"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771815"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3071178.3071184"}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397358","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:35Z","timestamp":1750199915000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":58,"alternative-id":["10.1145\/3395363.3397358","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397358","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}