{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:36:19Z","timestamp":1769726179763,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616296","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"438-449","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Semantic Debugging"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4268-7632","authenticated-orcid":false,"given":"Martin","family":"Eberlein","sequence":"first","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4899-9031","authenticated-orcid":false,"given":"Marius","family":"Smytzek","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4439-7129","authenticated-orcid":false,"given":"Dominic","family":"Steinh\u00f6fel","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8747-3745","authenticated-orcid":false,"given":"Lars","family":"Grunske","sequence":"additional","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Berlin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4719-8803","authenticated-orcid":false,"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Remita Amine. 2021. youtube-dl. https:\/\/github.com\/ytdl-org\/youtube-dl"},{"key":"e_1_3_2_2_2_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars. In 26th Annual Network and Distributed System Security Symposium, NDSS","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss-paper\/nautilus-fishing-for-deep-bugs-with-grammars\/"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106255"},{"key":"e_1_3_2_2_4_1","unstructured":"Eugen Cepoi. 2017. Genson. https:\/\/github.com\/owlike\/genson"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59762-7_8"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","unstructured":"Martin Eberlein Marius Smytzek Dominic Steinh\u00f6fel Lars Grunske and Andreas Zeller. 2023. https:\/\/doi.org\/10.1145\/3580408 10.1145\/3580408","DOI":"10.1145\/3580408"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737977"},{"key":"e_1_3_2_2_10_1","unstructured":"Anil Gajawada. 2016. Heartbleed bug: How it works and how to avoid similar bugs. https:\/\/www.synopsys.com\/blogs\/software-security\/heartbleed-bug\/"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155573"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397349"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"e_1_3_2_2_15_1","unstructured":"Audrey Roy Greenfeld. 2022. Cookiecutter. https:\/\/github.com\/cookiecutter\/cookiecutter"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1561\/2500000010"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115697"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/568438.568455"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","unstructured":"Alexander Kampmann Nikolas Havrikov Ezekiel Soremekun and Andreas Zeller. 2020. When does my Program do this? Learning Circumstances of Software Behavior. In Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE). https:\/\/doi.org\/10.1145\/3368089.3409687 10.1145\/3368089.3409687","DOI":"10.1145\/3368089.3409687"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9422-4"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380329"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278186.3278189"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"e_1_3_2_2_26_1","volume-title":"Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017","author":"Scott","year":"2017","unstructured":"Scott M. Lundberg and Su-In Lee. 2017. A Unified Approach to Interpreting Model Predictions. In Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, December 4-9, 2017, Long Beach, CA, USA, Isabelle Guyon, Ulrike von Luxburg, Samy Bengio, Hanna M. Wallach, Rob Fergus, S. V. N. Vishwanathan, and Roman Garnett (Eds.). 4765\u20134774. https:\/\/proceedings.neurips.cc\/paper\/2017\/hash\/8a20a8621978632d76c43dfd28b67767-Abstract.html"},{"key":"e_1_3_2_2_27_1","unstructured":"Eric Markowitz. 2014. Behind the Scenes: The Crazy 72 Hours Leading Up to the Heartbleed Discovery. https:\/\/www.vocativ.com\/tech\/hacking\/behind-scenes-crazy-72-hours-leading-heartbleed-discovery\/"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_2_30_1","volume-title":"The Definitive ANTLR 4 Reference","author":"Parr Terence","year":"1934","unstructured":"Terence Parr. 2013. The Definitive ANTLR 4 Reference (2nd ed.). Pragmatic Bookshelf. isbn:1934356999, 9781934356999","edition":"2"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908093"},{"key":"e_1_3_2_2_33_1","unstructured":"Ram Rachum. 2019. PySnooper - Never use print for debugging again. https:\/\/github.com\/cool-RR\/pysnooper"},{"key":"e_1_3_2_2_34_1","unstructured":"Sebasti\u00e1n Ram\u00edrez. 2018. FastAPI. https:\/\/github.com\/tiangolo\/fastapi"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454051"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Marius Smytzek Martin Eberlein Batuhan Serce Lars Grunske and Andreas Zeller. 2023. Tests4Py: A Benchmark for System Testing. arxiv:2307.05147.","DOI":"10.1145\/3663529.3663798"},{"key":"e_1_3_2_2_38_1","article-title":"Inputs from Hell: Learning Input Distributions for Grammar-Based Test Generation","author":"Soremekun Ezekiel","year":"2020","unstructured":"Ezekiel Soremekun, Esteban Pavese, Nikolas Havrikov, Lars Grunske, and Andreas Zeller. 2020. Inputs from Hell: Learning Input Distributions for Grammar-Based Test Generation. IEEE Transactions on Software Engineering.","journal-title":"IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Dominic Steinh\u00f6fel and Andreas Zeller. 2022. Input Invariants. In Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE). https:\/\/publications.cispa.saarland\/3596\/","DOI":"10.1145\/3540250.3549139"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180236"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454098"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2483"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062365"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_2_46_1","unstructured":"Mark David Weiser. 1979. Program Slices: Formal Psychological and Practical Investigations of an Automatic Program Abstraction Method. Ph.D. Dissertation. USA. AAI8007856."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417943"},{"key":"e_1_3_2_2_48_1","unstructured":"Wikipedia. Accessed 2022-07-26. Avicenna. https:\/\/en.wikipedia.org\/wiki\/Avicenna"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"e_1_3_2_2_51_1","volume-title":"The Fuzzing Book","author":"Zeller Andreas","unstructured":"Andreas Zeller, Rahul Gopinath, Marcel B\u00f6hme, Gordon Fraser, and Christian Holler. 2019. The Fuzzing Book. In The Fuzzing Book. Saarland University. https:\/\/www.fuzzingbook.org\/"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_2_53_1","volume-title":"Advances in Neural Information Processing Systems","author":"Zheng Alice","year":"2003","unstructured":"Alice Zheng, Michael Jordan, Ben Liblit, and Alex Aiken. 2003. Statistical Debugging of Sampled Programs. In Advances in Neural Information Processing Systems, S. Thrun, L. Saul, and B. Sch\u00f6lkopf (Eds.). 16, MIT Press. https:\/\/proceedings.neurips.cc\/paper\/2003\/file\/0a65e195cb51418279b6fa8d96847a60-Paper.pdf"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:04Z","timestamp":1750178164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":53,"alternative-id":["10.1145\/3611643.3616296","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616296","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}