{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:58:04Z","timestamp":1772042284802,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534384","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"568-579","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Combining static analysis error traces with dynamic symbolic execution (experience paper)"],"prefix":"10.1145","author":[{"given":"Frank","family":"Busse","sequence":"first","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Pritam","family":"Gharat","sequence":"additional","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Cristian","family":"Cadar","sequence":"additional","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Alastair F.","family":"Donaldson","sequence":"additional","affiliation":[{"name":"Imperial College London, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64354-6_12"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628058"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the 29th USENIX Security Symposium (USENIX Security\u201920)","author":"Brown Fraser","year":"2020","unstructured":"Fraser Brown , Deian Stefan , and Dawson Engler . 2020 . Sys: A Static\/Symbolic Tool for Finding Good Bugs in Good (Browser) Code . In Proc. of the 29th USENIX Security Symposium (USENIX Security\u201920) . Fraser Brown, Deian Stefan, and Dawson Engler. 2020. Sys: A Static\/Symbolic Tool for Finding Good Bugs in Good (Browser) Code. In Proc. of the 29th USENIX Security Symposium (USENIX Security\u201920)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803205"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201908)","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In Proc. of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201908) . Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proc. of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201908)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_33"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2049697.2049700"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21768-5_7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884843"},{"key":"e_1_3_2_1_14_1","unstructured":"2022. https:\/\/clang-analyzer.llvm.org \t\t\t\t\t  2022. https:\/\/clang-analyzer.llvm.org"},{"key":"e_1_3_2_1_15_1","unstructured":"2021. Clang 12 documentation: Cross Translation Unit (CTU) Analysis. https:\/\/clang.llvm.org\/docs\/analyzer\/user-docs\/CrossTranslationUnit.html \t\t\t\t\t  2021. Clang 12 documentation: Cross Translation Unit (CTU) Analysis. https:\/\/clang.llvm.org\/docs\/analyzer\/user-docs\/CrossTranslationUnit.html"},{"key":"e_1_3_2_1_16_1","unstructured":"2022. https:\/\/scan.coverity.com\/ \t\t\t\t\t  2022. https:\/\/scan.coverity.com\/"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062533"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642951"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3015135.3015137"},{"key":"e_1_3_2_1_21_1","unstructured":"2022. https:\/\/engineering.fb.com\/2017\/09\/06\/android\/finding-inter-procedural-bugs-at-scale-with-infer-static-analyzer\/ \t\t\t\t\t  2022. https:\/\/engineering.fb.com\/2017\/09\/06\/android\/finding-inter-procedural-bugs-at-scale-with-infer-static-analyzer\/"},{"key":"e_1_3_2_1_22_1","unstructured":"2022. https:\/\/www.microfocus.com\/en-us\/cyberres\/application-security\/static-code-analyzer \t\t\t\t\t  2022. https:\/\/www.microfocus.com\/en-us\/cyberres\/application-security\/static-code-analyzer"},{"key":"e_1_3_2_1_23_1","unstructured":"2022. https:\/\/frama-c.com \t\t\t\t\t  2022. https:\/\/frama-c.com"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-020-0525-z"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985971"},{"key":"e_1_3_2_1_26_1","unstructured":"2022. https:\/\/www.gnu.org\/software\/coreutils\/ \t\t\t\t\t  2022. https:\/\/www.gnu.org\/software\/coreutils\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. of the 22st USENIX Security Symposium (USENIX Security\u201913)","author":"Haller Istvan","year":"2013","unstructured":"Istvan Haller , Asia Slowinska , Matthias Neugschwandtner , and Herbert Bos . 2013 . Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations . In Proc. of the 22st USENIX Security Symposium (USENIX Security\u201913) . Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. In Proc. of the 22st USENIX Security Symposium (USENIX Security\u201913)."},{"key":"e_1_3_2_1_29_1","unstructured":"GrammaTech Inc.. 2022. CodeSonar.  https:\/\/www.grammatech.com\/codesonar-cc \t\t\t\t\t  GrammaTech Inc.. 2022. CodeSonar.  https:\/\/www.grammatech.com\/codesonar-cc"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337279"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464832"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6539575"},{"key":"e_1_3_2_1_33_1","unstructured":"2022. https:\/\/srg.doc.ic.ac.uk\/projects\/klee-sa\/ \t\t\t\t\t  2022. https:\/\/srg.doc.ic.ac.uk\/projects\/klee-sa\/"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483778"},{"key":"e_1_3_2_1_36_1","volume-title":"BugBench: Benchmarks for Evaluating Bug Detection Tools. In Workshop on the Evaluation of Software Defect Detection Tools.","author":"Lu Shan","year":"2005","unstructured":"Shan Lu , Zhenmin Li , Feng Qin , Lin Tan , Pin Zhou , and Yuanyuan Zhou . 2005 . BugBench: Benchmarks for Evaluating Bug Detection Tools. In Workshop on the Evaluation of Software Defect Detection Tools. Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. 2005. BugBench: Benchmarks for Evaluating Bug Detection Tools. In Workshop on the Evaluation of Software Defect Detection Tools."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041552.2041563"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491438"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CESSER-IP.2019.00015"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-020-00570-3"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.29"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00026"},{"key":"e_1_3_2_1_43_1","volume-title":"Proc. of the 36th European Conference on Object-Oriented Programming (ECOOP\u201922)","author":"Schemmel Daniel","year":"2022","unstructured":"Daniel Schemmel , Julian B\u00fcning , Frank Busse , Martin Nowack , and Cristian Cadar . 2022 . A Deterministic Memory Allocator for Dynamic Symbolic Execution . In Proc. of the 36th European Conference on Object-Oriented Programming (ECOOP\u201922) . Daniel Schemmel, Julian B\u00fcning, Frank Busse, Martin Nowack, and Cristian Cadar. 2022. A Deterministic Memory Allocator for Dynamic Symbolic Execution. In Proc. of the 36th European Conference on Object-Oriented Programming (ECOOP\u201922)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001422"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79124-9_10"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.29"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2016.7515929"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534384","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534384"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":49,"alternative-id":["10.1145\/3533767.3534384","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534384","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}