{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:14Z","timestamp":1750308494036,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534399","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"89-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Combining solution reuse and bound tightening for efficient analysis of evolving systems"],"prefix":"10.1145","author":[{"given":"Clay","family":"Stevens","sequence":"first","affiliation":[{"name":"University of Nebraska-Lincoln, USA"}]},{"given":"Hamid","family":"Bagheri","sequence":"additional","affiliation":[{"name":"University of Nebraska-Lincoln, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397347"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-017-0445-z"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377816.3381728"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950337"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2419611"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-016-0360-8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09932-6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2018.00044"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882375"},{"volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918)","author":"Celik Z. Berkay","key":"e_1_3_2_1_10_1","unstructured":"Z. Berkay Celik , Leonardo Babun , Amit K. Sikder , Hidayet Aksu , Gang Tan , Patrick McDaniel , and A. Selcuk Uluagac . 2018. Sensitive Information Tracking in Commodity IoT . In Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918) . USENIX Association, Berkeley, CA, USA. 1687\u20131704. Z. Berkay Celik, Leonardo Babun, Amit K. Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC\u201918). USENIX Association, Berkeley, CA, USA. 1687\u20131704."},{"key":"e_1_3_2_1_11_1","first-page":"44","volume-title":"Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Celik Z. Berkay","year":"2018","unstructured":"Z. Berkay Celik , Patrick McDaniel , and Gang Tan . 2018 . Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) . USENIX Association, Boston, MA. 147\u2013158. isbn:978-1-93 1971- 44 - 47 Z. Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA. 147\u2013158. isbn:978-1-931971-44-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96145-3_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECUREWARE.2007.4385334"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-015-0405-y"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_12"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.15"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44880-2_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2007.70225"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411204.1411205"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275534"},{"volume-title":"Add or remove Azure role assignments using the Azure portal. https:\/\/docs.microsoft.com\/en-us\/azure\/role-based-access-control\/role-assignments-portal accessed","year":"2020","key":"e_1_3_2_1_21_1","unstructured":"Microsoft. 2020. Add or remove Azure role assignments using the Azure portal. https:\/\/docs.microsoft.com\/en-us\/azure\/role-based-access-control\/role-assignments-portal accessed : 11 Dec 2020 Microsoft. 2020. Add or remove Azure role assignments using the Azure portal. https:\/\/docs.microsoft.com\/en-us\/azure\/role-based-access-control\/role-assignments-portal accessed: 11 Dec 2020"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985863"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384665"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699417"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001429"},{"key":"e_1_3_2_1_26_1","unstructured":"Jaideep Nijjar Tevfik Bultan and Ivan Bocic. 2020. iDaVer. https:\/\/vlab.cs.ucsb.edu\/idaver\/ \t\t\t\t\t  Jaideep Nijjar Tevfik Bultan and Ivan Bocic. 2020. iDaVer. https:\/\/vlab.cs.ucsb.edu\/idaver\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Towards making formal methods normal: meeting developers where they are. CoRR, abs\/2010.16345","author":"Reid Alastair","year":"2020","unstructured":"Alastair Reid , Luke Church , Shaked Flur , Sarah de Haas , Maritza Johnson , and Ben Laurie . 2020. Towards making formal methods normal: meeting developers where they are. CoRR, abs\/2010.16345 ( 2020 ), arXiv:2010.16345. arxiv:2010.16345 Alastair Reid, Luke Church, Shaked Flur, Sarah de Haas, Maritza Johnson, and Ben Laurie. 2020. Towards making formal methods normal: meeting developers where they are. CoRR, abs\/2010.16345 (2020), arXiv:2010.16345. arxiv:2010.16345"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10623-6_6"},{"key":"e_1_3_2_1_29_1","first-page":"1","article-title":"Minisat v1. 13-a sat solver with conflict-clause minimization","volume":"2005","author":"Sorensson Niklas","year":"2005","unstructured":"Niklas Sorensson and Niklas Een . 2005 . Minisat v1. 13-a sat solver with conflict-clause minimization . SAT , 2005 , 53 (2005), 1 \u2013 2 . Niklas Sorensson and Niklas Een. 2005. Minisat v1. 13-a sat solver with conflict-clause minimization. SAT, 2005, 53 (2005), 1\u20132.","journal-title":"SAT"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3416507.3423188"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380365"},{"key":"e_1_3_2_1_32_1","unstructured":"Clay Stevens and Hamid Bagheri. 2022. SoRBoT website. https:\/\/sites.google.com\/view\/operation-bounder\/home \t\t\t\t\t  Clay Stevens and Hamid Bagheri. 2022. SoRBoT website. https:\/\/sites.google.com\/view\/operation-bounder\/home"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2013.6596058"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-022-00660-4"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_49"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409682"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393665"},{"key":"e_1_3_2_1_38_1","volume-title":"Fear and Logging in the Internet of Things. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018","author":"Wang Qi","year":"2018","unstructured":"Qi Wang , Wajih Ul Hassan , Adam M. Bates , and Carl A. Gunter . 2018 . Fear and Logging in the Internet of Things. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018 , San Diego, California, USA , February 18-21, 2018 . Qi Wang, Wajih Ul Hassan, Adam M. Bates, and Carl A. Gunter. 2018. Fear and Logging in the Internet of Things. In 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18-21, 2018."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17462-0_10"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592436"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_2"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Virtual South Korea","acronym":"ISSTA '22"},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534399","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:41Z","timestamp":1750272221000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":41,"alternative-id":["10.1145\/3533767.3534399","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534399","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}