{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:06Z","timestamp":1750220466664,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,6,20]],"date-time":"2021-06-20T00:00:00Z","timestamp":1624147200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,6,22]]},"DOI":"10.1145\/3460946.3464320","type":"proceedings-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T12:19:55Z","timestamp":1624018795000},"page":"25-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Weldr: fusing binaries for simplified analysis"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Heinricher","sequence":"first","affiliation":[{"name":"Raytheon BBN Technologies, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4706-8999","authenticated-orcid":false,"given":"Ryan","family":"Williams","sequence":"additional","affiliation":[{"name":"Raytheon BBN Technologies, USA"}]},{"given":"Ava","family":"Klingbeil","sequence":"additional","affiliation":[{"name":"Raytheon BBN Technologies, USA"}]},{"given":"Alex","family":"Jordan","sequence":"additional","affiliation":[{"name":"Raytheon BBN Technologies, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. Eclipse Mosquitto. https:\/\/mosquitto.org\/  2018. Eclipse Mosquitto. https:\/\/mosquitto.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2020. honggfuzz. https:\/\/github.com\/google\/honggfuzz  2020. honggfuzz. https:\/\/github.com\/google\/honggfuzz"},{"key":"e_1_3_2_1_3_1","unstructured":"2021. AFL. https:\/\/github.com\/google\/AFL  2021. AFL. https:\/\/github.com\/google\/AFL"},{"key":"e_1_3_2_1_4_1","unstructured":"2021. angr. https:\/\/github.com\/angr\/angr  2021. angr. https:\/\/github.com\/angr\/angr"},{"key":"e_1_3_2_1_5_1","unstructured":"2021. DSVPN. https:\/\/github.com\/jedisct1\/dsvpn  2021. DSVPN. https:\/\/github.com\/jedisct1\/dsvpn"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2001.948499"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1953122.1953145"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(88)90098-9"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908)","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908) . USENIX Association, USA. 209\u2013224. Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908). USENIX Association, USA. 209\u2013224."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_1_11_1","first-page":"08866","volume-title":"Armin Biere and Roderick Bloem (Eds.) (Lecture Notes in Computer Science","volume":"342","author":"Cavada Roberto","year":"2014","unstructured":"Roberto Cavada , Alessandro Cimatti , Michele Dorigatti , Alberto Griggio , Alessandro Mariotti , Andrea Micheli , Sergio Mover , Marco Roveri , and Stefano Tonetta . 2014 . The nuXmv Symbolic Model Checker. In CAV , Armin Biere and Roderick Bloem (Eds.) (Lecture Notes in Computer Science , Vol. 8559). Springer, 334\u2013 342 . isbn:978-3-319- 08866 - 08862 Roberto Cavada, Alessandro Cimatti, Michele Dorigatti, Alberto Griggio, Alessandro Mariotti, Andrea Micheli, Sergio Mover, Marco Roveri, and Stefano Tonetta. 2014. The nuXmv Symbolic Model Checker. In CAV, Armin Biere and Roderick Bloem (Eds.) (Lecture Notes in Computer Science, Vol. 8559). Springer, 334\u2013342. isbn:978-3-319-08866-2"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950396"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"volume-title":"Spin Model Checker, the: Primer and Reference Manual","author":"Holzmann Gerard","key":"e_1_3_2_1_14_1","unstructured":"Gerard Holzmann . 2003. Spin Model Checker, the: Primer and Reference Manual ( first ed.). Addison-Wesley Professional . isbn:0321228626 Gerard Holzmann. 2003. Spin Model Checker, the: Primer and Reference Manual (first ed.). Addison-Wesley Professional. isbn:0321228626"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/390016.808444"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321653"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859035"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.22"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647170.718289"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/301631.301645"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376789.1376803"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_24_1","volume-title":"Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena.","author":"Song Dawn","year":"2008","unstructured":"Dawn Song , David Brumley , Heng Yin , Juan Caballero , Ivan Jager , Min Gyung Kang , Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena. 2008 . BitBlaze: A New Approach to Computer Security via Binary Analysis. In Information Systems Security, R. Sekar and Arun K. Pujari (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg. 1\u201325. isbn:978-3-540-89862-7 Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, and Prateek Saxena. 2008. BitBlaze: A New Approach to Computer Security via Binary Analysis. In Information Systems Security, R. Sekar and Arun K. Pujari (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg. 1\u201325. isbn:978-3-540-89862-7"}],"event":{"name":"PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Virtual Canada","acronym":"PLDI '21"},"container-title":["Proceedings of the 10th ACM SIGPLAN International Workshop on the State Of the Art in Program Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460946.3464320","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460946.3464320","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:22Z","timestamp":1750193302000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460946.3464320"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,20]]},"references-count":24,"alternative-id":["10.1145\/3460946.3464320","10.1145\/3460946"],"URL":"https:\/\/doi.org\/10.1145\/3460946.3464320","relation":{},"subject":[],"published":{"date-parts":[[2021,6,20]]},"assertion":[{"value":"2021-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}