{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:48:59Z","timestamp":1760042939801},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111933"},{"type":"electronic","value":"9783319111940"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11194-0_12","type":"book-chapter","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T10:25:55Z","timestamp":1407839155000},"page":"150-163","source":"Crossref","is-referenced-by-count":3,"title":["Conpy: Concolic Execution Engine for Python Applications"],"prefix":"10.1007","author":[{"given":"Ting","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xiao-song","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rui-dong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Bai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"12_CR1","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J.C. King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. J. ACM\u00a019(7), 385\u2013394 (1976)","journal-title":"J. ACM"},{"key":"12_CR2","unstructured":"Godefroid, P., Levin, M., Molnar, D.: Automated whitebox fuzz testing. In: NDSS, pp. 151\u2013166 (2008)"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-540-79124-9_10","volume-title":"Tests and Proofs","author":"N. Tillmann","year":"2008","unstructured":"Tillmann, N., de Halleux, J.: Pex-white box test generation for.NET. In: Beckert, B., H\u00e4hnle, R. (eds.) TAP 2008. LNCS, vol.\u00a04966, pp. 134\u2013153. Springer, Heidelberg (2008)"},{"key":"12_CR4","unstructured":"Cadar, C., Dunbar, D., Engler, D.: Klee: unassisted and automatic generation of high-coverage tests for complex systems programs. In: OSDI, pp. 209\u2013224 (2008)"},{"issue":"6","key":"12_CR5","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/1064978.1065036","volume":"40","author":"P. Godefroid","year":"2005","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. ACM Sigplan Notices\u00a040(6), 213\u2013223 (2005)","journal-title":"ACM Sigplan Notices"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., Agha, G.: CUTE: A concolic unit testing engine for C. In: ESEC\/FSE, pp. 263\u2013272 (2005)","DOI":"10.21236\/ADA482657"},{"key":"12_CR7","unstructured":"Fuzzgrind: An automatic fuzzing tool, \n                  \n                    http:\/\/esec-lab.sogeti.com\/dotclear\/index.php?pages\/Fuzzgrind"},{"key":"12_CR8","unstructured":"Molnar, D.A., Wagner, D.: Catchconv: symbolic execution and run-time type inference for integer conversion errors. Tech. Rep. UC Berkeley EECS, 2007\u201323 (2007)"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/1961295.1950396","volume":"39","author":"V. Chipounov","year":"2011","unstructured":"Chipounov, V., Kuznetsov, V., Candea, G.: S2E: A platform for in-vivo multi-path analysis of software systems. Sigarch Comput. Archit. News\u00a039(1), 265\u2013278 (2011)","journal-title":"Sigarch Comput. Archit. News"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Xu, R.G., Godefroid, P., Majumdar, R.: Testing for buffer overflows with length abstraction. In: ISSTA, pp. 27\u201337 (2008)","DOI":"10.1145\/1390630.1390636"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Wang, T.L., Wei, T., Gu, G.F., Zou, W.: TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: S&P, pp. 497\u2013512 (2010)","DOI":"10.1109\/SP.2010.37"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security","author":"D. Song","year":"2008","unstructured":"Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A new approach to computer security via binary analysis. In: Sekar, R., Pujari, A.K. (eds.) ICISS 2008. LNCS, vol.\u00a05352, pp. 1\u201325. Springer, Heidelberg (2008)"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Burnim, J., Sen, K.: Heuristics for scalable dynamic test generation. In: ASE, pp. 443\u2013446 (2008)","DOI":"10.1109\/ASE.2008.69"},{"key":"12_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/3-540-36577-X_40","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Khurshid","year":"2003","unstructured":"Khurshid, S., P\u0103s\u0103reanu, C.S., Visser, W.: Generalized symbolic execution for model checking and testing. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 553\u2013568. Springer, Heidelberg (2003)"},{"issue":"12","key":"12_CR15","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1002\/smr.1601","volume":"25","author":"T. Chen","year":"2013","unstructured":"Chen, T., Zhang, X.S., Zhu, C., Ji, X.L., Guo, S.Z., Wu, Y.: Design and implementation of a dynamic symbolic execution tool for windows executables. J. Softw-Evol. Proc.\u00a025(12), 1249\u20131272 (2013)","journal-title":"J. Softw-Evol. Proc."},{"issue":"2","key":"12_CR16","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1108\/03321641311297016","volume":"32","author":"T. Chen","year":"2013","unstructured":"Chen, T., Zhang, X.S., Xiao, X., Wu, Y., Xu, C.X., Zhao, H.T.: SEVE: Symbolic execution based vulnerability exploring system. COMPEL.\u00a032(2), 620\u2013637 (2013)","journal-title":"COMPEL."},{"key":"12_CR17","unstructured":"Python (programming language), \n                  \n                    http:\/\/en.wikipedia.org\/wiki\/Python_programming_language"},{"issue":"7","key":"12_CR18","doi-asserted-by":"publisher","first-page":"1758","DOI":"10.1016\/j.future.2012.02.006","volume":"29","author":"T. Chen","year":"2013","unstructured":"Chen, T., Zhang, X.S., Guo, S.Z., Li, H.Y., Wu, Y.: State of the art: dynamic symbolic execution for automated test generation. Future Gener. Comp. Sy.\u00a029(7), 1758\u20131773 (2013)","journal-title":"Future Gener. Comp. Sy."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Brumley, D., Hartwig, C., Liang, Z.K., Newsome, J., Poosankam, P., Song, D., Yin, H.: Automatically identifying trigger-based behavior in malware. In: Botnet Detection, pp. 65\u201388 (2008)","DOI":"10.1007\/978-0-387-68768-1_4"},{"key":"12_CR20","unstructured":"Brumley, D., Hartwig, C., Kang, M.G., Liang, Z.K., Newsome, J., Poosankam, P., Song, D.: BitScope: automatically dissecting malicious binaries. Tech. Rep. CMU-CS-07-133 (2007)"},{"key":"12_CR21","unstructured":"Dive into python, everything is an object, \n                  \n                    http:\/\/www.diveintopython.net\/getting_to_know_python\/everything_is_an_object.html"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11194-0_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T11:29:57Z","timestamp":1558956597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11194-0_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111933","9783319111940"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11194-0_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}