{"id":"https://openalex.org/W4411088292","doi":"https://doi.org/10.1145/3713081.3731743","title":"Reversing Programs for Error Reachability Analysis","display_name":"Reversing Programs for Error Reachability Analysis","publication_year":2025,"publication_date":"2025-06-06","ids":{"openalex":"https://openalex.org/W4411088292","doi":"https://doi.org/10.1145/3713081.3731743"},"language":"en","primary_location":{"id":"doi:10.1145/3713081.3731743","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3713081.3731743","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3713081.3731743","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117852461","display_name":"Ad\u00e9la \u0160t\u011bpkov\u00e1","orcid":null},"institutions":[{"id":"https://openalex.org/I21449261","display_name":"Masaryk University","ror":"https://ror.org/02j46qs45","country_code":"CZ","type":"education","lineage":["https://openalex.org/I21449261"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Ad\u00e9la \u0160t\u011bpkov\u00e1","raw_affiliation_strings":["Masaryk University, Brno, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Masaryk University, Brno, Czech Republic","institution_ids":["https://openalex.org/I21449261"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5117852461"],"corresponding_institution_ids":["https://openalex.org/I21449261"],"apc_list":null,"apc_paid":null,"fwci":1.3746,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.82936407,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"80","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reversing","display_name":"Reversing","score":0.9381930828094482},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.9195822477340698},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6810387372970581},{"id":"https://openalex.org/keywords/error-analysis","display_name":"Error analysis","score":0.5227656364440918},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.41233396530151367},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3737749457359314},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.22183990478515625},{"id":"https://openalex.org/keywords/applied-mathematics","display_name":"Applied mathematics","score":0.09698948264122009},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08356475830078125}],"concepts":[{"id":"https://openalex.org/C2781085045","wikidata":"https://www.wikidata.org/wiki/Q7318308","display_name":"Reversing","level":2,"score":0.9381930828094482},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.9195822477340698},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6810387372970581},{"id":"https://openalex.org/C3018824978","wikidata":"https://www.wikidata.org/wiki/Q2894891","display_name":"Error analysis","level":2,"score":0.5227656364440918},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.41233396530151367},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3737749457359314},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.22183990478515625},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.09698948264122009},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08356475830078125},{"id":"https://openalex.org/C171146098","wikidata":"https://www.wikidata.org/wiki/Q124192","display_name":"Automotive engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3713081.3731743","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3713081.3731743","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3713081.3731743","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3713081.3731743","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 34th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.5899999737739563}],"awards":[{"id":"https://openalex.org/G182591475","display_name":null,"funder_award_id":"GA23-06506S","funder_id":"https://openalex.org/F4320321006","funder_display_name":"Grantov\u00e1 Agentura \u010cesk\u00e9 Republiky"}],"funders":[{"id":"https://openalex.org/F4320321006","display_name":"Grantov\u00e1 Agentura \u010cesk\u00e9 Republiky","ror":"https://ror.org/01pv73b02"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1495266209","https://openalex.org/W1787074469","https://openalex.org/W1965397772","https://openalex.org/W1972368044","https://openalex.org/W2101512909","https://openalex.org/W2114337691","https://openalex.org/W2736628975","https://openalex.org/W2799098646","https://openalex.org/W2888321432","https://openalex.org/W3138459719","https://openalex.org/W3205083328","https://openalex.org/W4236785520","https://openalex.org/W4241463772"],"related_works":["https://openalex.org/W2354780065","https://openalex.org/W3011985225","https://openalex.org/W2482155543","https://openalex.org/W2475618665","https://openalex.org/W4224280204","https://openalex.org/W2380977331","https://openalex.org/W2373606770","https://openalex.org/W1995189325","https://openalex.org/W2885769062","https://openalex.org/W2374738829"],"abstract_inverted_index":{"Reachability":[0],"analysis,":[1],"used":[2],"to":[3,64],"determine":[4],"whether":[5],"an":[6],"error":[7,41],"location":[8,42],"in":[9,22,32,47,70],"a":[10,19,53,78],"program":[11,69],"is":[12,18],"reachable":[13],"from":[14,39],"the":[15,33,40,67,87],"initial":[16],"state,":[17],"key":[20],"problem":[21],"software":[23],"verification.":[24],"While":[25],"standard":[26],"techniques":[27],"typically":[28],"perform":[29],"this":[30],"analysis":[31],"forward":[34,61],"direction,":[35],"analyzing":[36],"reachability":[37,62],"backward":[38],"can":[43,82],"be":[44,75,83],"more":[45],"efficient":[46],"some":[48],"instances.":[49],"This":[50],"research":[51],"introduces":[52],"technique":[54,73],"for":[55],"reversing":[56],"C":[57],"programs,":[58],"allowing":[59],"existing":[60,90],"methods":[63],"effectively":[65],"traverse":[66],"original":[68],"reverse.":[71],"The":[72],"will":[74],"implemented":[76],"as":[77],"standalone":[79],"tool":[80],"that":[81],"easily":[84],"integrated":[85],"into":[86],"pipelines":[88],"of":[89],"verification":[91],"tools.":[92]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
