{"id":"https://openalex.org/W3091513274","doi":"https://doi.org/10.1145/3377812.3390895","title":"Summary-guided incremental symbolic execution","display_name":"Summary-guided incremental symbolic execution","publication_year":2020,"publication_date":"2020-06-27","ids":{"openalex":"https://openalex.org/W3091513274","doi":"https://doi.org/10.1145/3377812.3390895","mag":"3091513274"},"language":"en","primary_location":{"id":"doi:10.1145/3377812.3390895","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3377812.3390895","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3377812.3390895","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion Proceedings","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3377812.3390895","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060126620","display_name":"Qiuping Yi","orcid":"https://orcid.org/0009-0007-4680-4820"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Qiuping Yi","raw_affiliation_strings":["Texas State University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas State University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080324388","display_name":"Junye Wen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Junye Wen","raw_affiliation_strings":["Texas State University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas State University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039642499","display_name":"Guowei Yang","orcid":"https://orcid.org/0000-0002-1404-4560"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Guowei Yang","raw_affiliation_strings":["Texas State University"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Texas State University","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060126620"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.17509909,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"310","last_page":"311"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8485203981399536},{"id":"https://openalex.org/keywords/automatic-summarization","display_name":"Automatic summarization","score":0.7501571178436279},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.7394701838493347},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5955766439437866},{"id":"https://openalex.org/keywords/dependency","display_name":"Dependency (UML)","score":0.5406666994094849},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5186887979507446},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.457547128200531},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.32478395104408264},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2662726938724518},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.08040234446525574}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485203981399536},{"id":"https://openalex.org/C170858558","wikidata":"https://www.wikidata.org/wiki/Q1394144","display_name":"Automatic summarization","level":2,"score":0.7501571178436279},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.7394701838493347},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5955766439437866},{"id":"https://openalex.org/C19768560","wikidata":"https://www.wikidata.org/wiki/Q320727","display_name":"Dependency (UML)","level":2,"score":0.5406666994094849},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5186887979507446},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.457547128200531},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.32478395104408264},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2662726938724518},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.08040234446525574}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3377812.3390895","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3377812.3390895","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3377812.3390895","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion Proceedings","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3377812.3390895","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3377812.3390895","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3377812.3390895","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion Proceedings","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":14,"referenced_works":["https://openalex.org/W1710734607","https://openalex.org/W1979693894","https://openalex.org/W2096449544","https://openalex.org/W2101512909","https://openalex.org/W2136601052","https://openalex.org/W2152565783","https://openalex.org/W2279657578","https://openalex.org/W2294434616","https://openalex.org/W2580207986","https://openalex.org/W2795052548","https://openalex.org/W2883947318","https://openalex.org/W2937521294","https://openalex.org/W4236799059","https://openalex.org/W4237492309"],"related_works":["https://openalex.org/W2366403280","https://openalex.org/W1495108544","https://openalex.org/W2091301346","https://openalex.org/W3148229873","https://openalex.org/W4389760904","https://openalex.org/W2150160875","https://openalex.org/W4242223894","https://openalex.org/W4306886878","https://openalex.org/W4239107164","https://openalex.org/W2912813468"],"abstract_inverted_index":{"Symbolic":[0],"execution":[1,14,52],"is":[2,119],"a":[3,46,109],"powerful":[4],"technique":[5],"for":[6,31,49],"systematically":[7],"exploring":[8,124],"program":[9],"paths,":[10],"but":[11],"scaling":[12],"symbolic":[13,51],"to":[15,25,73,90],"practical":[16],"programs":[17,34],"remains":[18],"challenging.":[19],"State-of-the-art":[20],"techniques":[21],"face":[22],"the":[23,68,82,85,100],"challenge":[24],"efficiently":[26],"explore":[27],"incremental":[28,50,96,125],"behaviors,":[29],"especially":[30],"highly":[32],"coupled":[33],"with":[35],"complex":[36],"control":[37],"and":[38,61,105,121],"data":[39],"dependency.":[40],"In":[41],"this":[42],"paper,":[43],"we":[44],"present":[45],"novel":[47],"approach":[48,104],"based":[53],"on":[54,81,108],"an":[55],"iteration":[56],"loop":[57],"between":[58],"path":[59,62,88],"exploration":[60,89],"suffixes":[63],"summarization.":[64],"On":[65],"one":[66],"hand,":[67,84],"explored":[69],"paths":[70,92],"are":[71],"summarized":[72],"enable":[74],"more":[75],"precise":[76],"identification":[77],"of":[78,102,111],"affected":[79],"paths;":[80],"other":[83],"summary":[86],"guides":[87],"prune":[91],"that":[93,117],"have":[94],"no":[95],"behaviors.":[97,126],"We":[98],"implemented":[99],"prototype":[101],"our":[103],"conducted":[106],"experiments":[107],"set":[110],"real-world":[112],"applications.":[113],"The":[114],"results":[115],"show":[116],"it":[118],"efficient":[120],"effective":[122],"in":[123]},"counts_by_year":[],"updated_date":"2026-05-20T08:49:12.498775","created_date":"2025-10-10T00:00:00"}
