{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T05:56:58Z","timestamp":1759730218078,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.23919\/date.2018.8342262","type":"proceedings-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:20:11Z","timestamp":1524511211000},"page":"1550-1555","source":"Crossref","is-referenced-by-count":7,"title":["Symbolic assertion mining for security validation"],"prefix":"10.23919","author":[{"given":"Alessandro","family":"Danese","sequence":"first","affiliation":[]},{"given":"Valeria","family":"Bertacco","sequence":"additional","affiliation":[]},{"given":"Graziano","family":"Pravadelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"41","article-title":"QEMU, a fast and portable dynamic translator","author":"bellard","year":"2005","journal-title":"Proc of USENIX Annual Technical Conference"},{"key":"ref11","article-title":"Symbolic execution for bios security","author":"bazhaniuk","year":"2015","journal-title":"Proc of USENIX WOOT"},{"key":"ref12","article-title":"Testing closed-source binary device drivers with ddt","author":"kuznetsov","year":"2010","journal-title":"Proc of USENIX Annual Technical Conference"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791235"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791234"},{"journal-title":"Defeating Signed BIOS Enforcement","year":"2013","author":"kallenberg","key":"ref4"},{"key":"ref3","article-title":"Setup for failure: defeating secure boot","author":"kallenberg","year":"2014","journal-title":"Proc of SyScan"},{"key":"ref6","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"cadar","year":"2008","journal-title":"Proc of USENIX OSDI"},{"key":"ref5","article-title":"System management mode design and security issues","author":"duflot","year":"2010","journal-title":"IT Defense"},{"key":"ref8","first-page":"463","article-title":"FIE on firmware: Finding vulnerabilities in embedded systems using symbolic execution","author":"davidson","year":"2013","journal-title":"Proc of USENIX Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606608"},{"key":"ref2","article-title":"How Many Million BIOSes Would you Like to Infect?","author":"kallenberg","year":"2015","journal-title":"CanSecWest"},{"journal-title":"2017 Threat Predictions Report","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950396"}],"event":{"name":"2018 Design, Automation & Test in Europe Conference & Exhibition (DATE)","start":{"date-parts":[[2018,3,19]]},"location":"Dresden, Germany","end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8337149\/8341968\/08342262.pdf?arnumber=8342262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T14:31:13Z","timestamp":1525789873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8342262\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.23919\/date.2018.8342262","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}