{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:41:14Z","timestamp":1765233674397,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616361","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"592-604","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automata-Based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-6730-9558","authenticated-orcid":false,"given":"Enze","family":"Ma","sequence":"first","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2856-5851","authenticated-orcid":false,"given":"Shan","family":"Huang","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2086-7034","authenticated-orcid":false,"given":"Weigang","family":"He","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1628-9796","authenticated-orcid":false,"given":"Ting","family":"Su","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9866-2624","authenticated-orcid":false,"given":"Jue","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9465-4831","authenticated-orcid":false,"given":"Huiyu","family":"Liu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9750-8334","authenticated-orcid":false,"given":"Geguang","family":"Pu","sequence":"additional","affiliation":[{"name":"East China Normal University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2970-1391","authenticated-orcid":false,"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[{"name":"ETH Zurich, Z\u00fcrich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.55"},{"key":"e_1_3_2_2_2_1","unstructured":"Ape. 2022. Ape\u2019s event generation strategy. https:\/\/github.com\/tianxiaogu\/ape\/blob\/master\/src\/com\/android\/commands\/monkey\/ape\/tree\/GUITreeBuilder.java##L261"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2411"},{"key":"e_1_3_2_2_4_1","unstructured":"ASM team. 2023. ASM: an all purpose Java bytecode manipulation and analysis framework. https:\/\/asm.ow2.io\/"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572300"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970313"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","unstructured":"Ezio Bartocci Yli\u00e8s Falcone Adrian Francalanza and Giles Reger. 2018. Introduction to runtime verification. In Lectures on Runtime Verification. 1\u201333. https:\/\/doi.org\/10.1007\/978-3-319-75632-5_1 10.1007\/978-3-319-75632-5_1","DOI":"10.1007\/978-3-319-75632-5_1"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416567"},{"key":"e_1_3_2_2_9_1","volume-title":"ASM: A code manipulation tool to implement adaptable systems. In Adaptable and extensible component systems.","author":"Bruneton Eric","year":"2002","unstructured":"Eric Bruneton, Romain Lenglet, and Thierry Coupaye. 2002. ASM: A code manipulation tool to implement adaptable systems. In Adaptable and extensible component systems."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387903.3389308"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509552"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.89"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23820-3_24"},{"key":"e_1_3_2_2_14_1","unstructured":"DDroid. 2022. Themis+\u2019s clues. https:\/\/github.com\/DDroid-Android\/home\/blob\/main\/README.md##html-report"},{"key":"e_1_3_2_2_15_1","unstructured":"DDroid. 2023. Supplementary materials for RQ2 and RQ3. https:\/\/github.com\/DDroid-Android\/home\/blob\/main\/supplementary-material.pdf"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380402"},{"key":"e_1_3_2_2_18_1","unstructured":"DroidBot. 2022. DroidBot\u2019s event generation strategy. https:\/\/github.com\/honeynet\/droidbot\/blob\/master\/droidbot\/device_state.py##L401"},{"key":"e_1_3_2_2_19_1","unstructured":"Caleb Evans. 2021. automata-lib(5.0.0). https:\/\/pypi.org\/project\/automata-lib\/"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35632-2_11"},{"key":"e_1_3_2_2_21_1","unstructured":"Fastbot team. 2022. Fastbot(2.0). https:\/\/github.com\/bytedance\/Fastbot_Android"},{"key":"e_1_3_2_2_22_1","unstructured":"gcov team. 2023. gcov-a Test Coverage Program. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html"},{"key":"e_1_3_2_2_23_1","unstructured":"Tegan George. 2022. Semi-Structured Interview: Definition Guide and Examples. https:\/\/www.scribbr.com\/methodology\/semi-structured-interview\/"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989841"},{"key":"e_1_3_2_2_25_1","unstructured":"Google Android team. 2023. Transform. https:\/\/developer.android.com\/reference\/tools\/gradle-api\/7.0\/com\/android\/build\/api\/transform\/Transform"},{"key":"e_1_3_2_2_26_1","unstructured":"Google Inc.. 2022. Monkey. https:\/\/developer.android.com\/studio\/test\/monkey"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00042"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00059"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_2_30_1","volume-title":"Ullman","author":"Hopcroft John E.","year":"2001","unstructured":"John E. Hopcroft, Rajeev Motwani, and Jeffrey D. Ullman. 2001. Introduction to automata theory, languages, and computation, 2nd Edition. isbn:978-0-201-44124-6","edition":"2"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.24"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.19"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2865733"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.8"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00104"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2009.5090273"},{"key":"e_1_3_2_2_41_1","unstructured":"Maubis. 2019. Scarlet Notes. https:\/\/play.google.com\/store\/apps\/details?id=com.bijoysingh.quicknote"},{"key":"e_1_3_2_2_42_1","unstructured":"Maubis. 2019. Scarlet Notes\u2019s issue 114. https:\/\/github.com\/BijoySingh\/Scarlet-Notes\/issues\/114"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/503209.503244"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-011-0198-6"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397354"},{"key":"e_1_3_2_2_46_1","unstructured":"Jay Patel. 2018. JFlap(7.1). https:\/\/www.jflap.org\/"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3194733.3194742"},{"volume-title":"Automata based monitoring and mining of execution traces. Ph. D. Dissertation","author":"Reger Giles","key":"e_1_3_2_2_48_1","unstructured":"Giles Reger. 2014. Automata based monitoring and mining of execution traces. Ph. D. Dissertation. University of Manchester, UK. http:\/\/www.manchester.ac.uk\/escholar\/uk-ac-man-scw:225931"},{"key":"e_1_3_2_2_49_1","unstructured":"Jakub Riegel. 2018. PUTflap(1.0). https:\/\/github.com\/jakubriegel\/PUTflap"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31280-0_8"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115615"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3013438"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468620"},{"key":"e_1_3_2_2_55_1","unstructured":"Ting Su Jue Wang and Zhendong Su. 2021. The Themis Benchmark. https:\/\/github.com\/the-themis-benchmarks\/home"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485533"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.61"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-018-9418-6"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106436"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380382"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3240465"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468554"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00082"},{"key":"e_1_3_2_2_64_1","unstructured":"Wikipedia. 2022. Floyd\u2013Warshall algorithm. https:\/\/en.wikipedia.org\/wiki\/Floyd-Warshall_algorithm"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598138"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983958"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.32"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"San Francisco CA USA","acronym":"ESEC\/FSE '23"},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616361","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616361","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616361"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":68,"alternative-id":["10.1145\/3611643.3616361","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616361","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}