{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:44Z","timestamp":1775873504308,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,7,11]],"date-time":"2021-07-11T00:00:00Z","timestamp":1625961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,7,11]]},"DOI":"10.1145\/3460319.3464845","type":"proceedings-article","created":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T22:18:43Z","timestamp":1625782723000},"page":"374-387","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Grammar-agnostic symbolic execution by token symbolization"],"prefix":"10.1145","author":[{"given":"Weiyu","family":"Pan","sequence":"first","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Zhenbang","family":"Chen","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Guofeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Yunlai","family":"Luo","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Yufeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Hunan University, China"}]},{"given":"Ji","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"1986","unstructured":"Alfred V. Aho , Ravi Sethi , and Jeffrey D . Ullman . 1986 . Compilers : Principles, Techniques, and Tools. Addison-Wesley . Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. 1986. Compilers: Principles, Techniques, and Tools. Addison-Wesley."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_28"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062349"},{"key":"e_1_3_2_1_4_1","volume-title":"Engler","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R . Engler . 2008 . KLEE : Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, Richard Draves and Robbert van Renesse (Eds.). USENIX Association , 209\u2013224. Cristian Cadar, Daniel Dunbar, and Dawson R. Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In 8th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2008, December 8-10, 2008, San Diego, California, USA, Proceedings, Richard Draves and Robbert van Renesse (Eds.). USENIX Association, 209\u2013224."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1480881.1480917"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.2307\/2963594"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451152"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931048"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190226"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409679"},{"key":"e_1_3_2_1_13_1","unstructured":"Nikolas Havrikov. 2019. tribble 1.0.0. https:\/\/github.com\/havrikov\/tribble  Nikolas Havrikov. 2019. tribble 1.0.0. https:\/\/github.com\/havrikov\/tribble"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00027"},{"key":"e_1_3_2_1_15_1","unstructured":"Marc R Hoffmann B Janiczak and E Mandrikov. 2014. JaCoCo version 0.6.5.201403032054. https:\/\/github.com\/jacoco\/jacoco  Marc R Hoffmann B Janiczak and E Mandrikov. 2014. JaCoCo version 0.6.5.201403032054. https:\/\/github.com\/jacoco\/jacoco"},{"key":"e_1_3_2_1_16_1","volume-title":"Ullman","author":"Hopcroft John E.","year":"2007","unstructured":"John E. Hopcroft , Rajeev Motwani , and Jeffrey D . Ullman . 2007 . Introduction to automata theory, languages, and computation, 3 rd Edition. Addison-Wesley . John E. Hopcroft, Rajeev Motwani, and Jeffrey D. Ullman. 2007. Introduction to automata theory, languages, and computation, 3rd Edition. Addison-Wesley.","edition":"3"},{"key":"e_1_3_2_1_17_1","volume-title":"First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009, Ewen Denney, Dimitra Giannakopoulou, and Corina S. Pasareanu (Eds.) (NASA Conference Proceedings","volume":"125","author":"Jayaraman Karthick","year":"2009","unstructured":"Karthick Jayaraman , David Harvison , Vijay Ganesh , and Adam Kiezun . 2009 . jFuzz: A Concolic Whitebox Fuzzer for Java . In First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009, Ewen Denney, Dimitra Giannakopoulou, and Corina S. Pasareanu (Eds.) (NASA Conference Proceedings , Vol. NASA\/CP-2009-215407). 121\u2013 125 . Karthick Jayaraman, David Harvison, Vijay Ganesh, and Adam Kiezun. 2009. jFuzz: A Concolic Whitebox Fuzzer for Java. In First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009, Ewen Denney, Dimitra Giannakopoulou, and Corina S. Pasareanu (Eds.) (NASA Conference Proceedings, Vol. NASA\/CP-2009-215407). 121\u2013125."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338934"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-50497-0"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23702-7_11"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321653"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314651"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397348"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390635"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859035"},{"key":"e_1_3_2_1_29_1","volume-title":"Gillian: Compositional Symbolic Execution for All. CoRR, abs\/2001.05059","author":"Santos Jos\u00e9 Fragoso","year":"2020","unstructured":"Jos\u00e9 Fragoso Santos , Petar Maksimovic , Sacha-\u00c9lie Ayoun , and Philippa Gardner . 2020 . Gillian: Compositional Symbolic Execution for All. CoRR, abs\/2001.05059 (2020), arxiv:2001.05059 Jos\u00e9 Fragoso Santos, Petar Maksimovic, Sacha-\u00c9lie Ayoun, and Philippa Gardner. 2020. Gillian: Compositional Symbolic Execution for All. CoRR, abs\/2001.05059 (2020), arxiv:2001.05059"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632362.2632363"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79124-9_10"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338958"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180227"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3122830"},{"key":"e_1_3_2_1_39_1","unstructured":"Andreas Zeller Rahul Gopinath Marcel B\u00f6hme Gordon Fraser and Christian Holler. 2019. The Fuzzing Book. In The Fuzzing Book.  Andreas Zeller Rahul Gopinath Marcel B\u00f6hme Gordon Fraser and Christian Holler. 2019. The Fuzzing Book. In The Fuzzing Book."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.80"}],"event":{"name":"ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Denmark","acronym":"ISSTA '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460319.3464845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:36Z","timestamp":1750195476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460319.3464845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,11]]},"references-count":40,"alternative-id":["10.1145\/3460319.3464845","10.1145\/3460319"],"URL":"https:\/\/doi.org\/10.1145\/3460319.3464845","relation":{},"subject":[],"published":{"date-parts":[[2021,7,11]]},"assertion":[{"value":"2021-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}