{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:37:12Z","timestamp":1763105832356,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030900212"},{"type":"electronic","value":"9783030900229"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90022-9_10","type":"book-chapter","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T08:06:08Z","timestamp":1635926768000},"page":"185-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Facilitating Parallel Fuzzing with Mutually-Exclusive Task Distribution"],"prefix":"10.1007","author":[{"given":"Yifan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuchen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chenbin","family":"Pang","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Triandopoulos","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,4]]},"reference":[{"key":"10_CR1","unstructured":"Abdelnur, H., State, R., Lucangeli, O.J., Festor, O.: Spectral fuzzing: Evaluation & feedback. [Research Report] RR-7193, NRIA (2010)"},{"key":"10_CR2","unstructured":"Aitel, D.: An introduction to spike, the fuzzer creation kit. Proceedings of the Black Hat USA (2002)"},{"key":"10_CR3","unstructured":"Anvin, H.P., Gorcunov, C., Chang Seok Bae, J.K., Kotler, F.B.: Nasm source code, July 1996. https:\/\/repo.or.cz\/w\/nasm.git"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Aschermann, C., Schumilo, S., Blazytko, T., Gawlik, R., Holz, T.: Redqueen: Fuzzing with input-to-state correspondence. In: Proceedings of the 2019 Network and Distributed System Security Symposium, vol. 19, pp. 1\u201315. NDSS, Universit\u00e4tsstra\u00dfe 150, 44801 Bochum, Germany (2019)","DOI":"10.14722\/ndss.2019.23371"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Beizer, B.: Black-Box Testing: Techniques for Functional Testing of Software and Systems. Wiley, Hoboken (1995)","DOI":"10.1109\/MS.1996.536464"},{"key":"10_CR6","unstructured":"Bellard, F.: Ffmpeg source code. https:\/\/ffmpeg.org\/releases\/ffmpeg-4.1.tar.bz2"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"B\u00f6hme, M., Pham, V.T., Roychoudhury, A.: Coverage-based greybox fuzzing as markov chain. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1032\u20131043. ACM, google (2016)","DOI":"10.1145\/2976749.2978428"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Chen, P., Chen, H.: Angora: efficient fuzzing by principled search. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy, pp. 711\u2013725. IEEE, Symposium on Security and Privacy, 1 Shields Ave, Davis, CA 95616 (2018)","DOI":"10.1109\/SP.2018.00046"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Savior: towards bug-driven hybrid testing. In: Proceedings of the 2020 IEEE Symposium on Security and Privacy, pp. 1\u201314. IEEE, Symposium on Security and Privacy, San Francisco, CA, USA (2020)","DOI":"10.1109\/SP40000.2020.00002"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Ptrix: efficient hardware-assisted fuzzing for cots binary. In: Proceedings of the 2019 ACM on Asia Conference on Computer and Communications Security, pp. 633\u2013645. ACM, AsiaCCS, Auckland, New Zealand (2019)","DOI":"10.1145\/3321705.3329828"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Dinesh, S.: RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. Ph.D. thesis, figshare (2019)","DOI":"10.1109\/SP40000.2020.00009"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Dolan-Gavitt, B., et al.: Lava: large-scale automated vulnerability addition. In: Proceedings of the 2016 IEEE Symposium on Security and Privacy, pp. 110\u2013121. IEEE (2016)","DOI":"10.1109\/SP.2016.15"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Gan, S., et al.: Collafl: path sensitive fuzzing. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy, pp. 660\u2013677. No. 6, Symposium on Security and Privacy, San Francisco, CA, USA, May 2018","DOI":"10.1109\/SP.2018.00040"},{"key":"10_CR14","unstructured":"Gan, S., et al.: GREYONE: data flow sensitive fuzzing. In: Proceedings of the 29th USENIX Security Symposium, pp. 1\u201318. USENIX Association, Boston, MA, August 2020. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/gan"},{"key":"10_CR15","unstructured":"GNU: Index of \/gnu\/binutils, October 2019. https:\/\/ftp.gnu.org\/gnu\/binutils\/"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Levin, M.Y., Molnar, D.: Sage: whitebox fuzzing for security testing. Commun. ACM 55(3), 40\u201344 (2012)","DOI":"10.1145\/2093548.2093564"},{"key":"10_CR17","unstructured":"Hayes, L., et al.: Moonlight: Effective fuzzing with near-optimal corpus distillation. arXiv:1905.13055v1 (2019)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Klees, G., Ruef, A., Cooper, B., Wei, S., Hicks, M.: Evaluating fuzz testing. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 2123\u20132138. ACM, CCS, Toronto, ON, Canada (2018)","DOI":"10.1145\/3243734.3243804"},{"key":"10_CR19","unstructured":"Leffler, S.: Libtiff source code, November 2019. https:\/\/download.osgeo.org\/libtiff\/"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Lemieux, C., Sen, K.: Fairfuzz: A targeted mutation strategy for increasing greybox fuzz testing coverage. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 475\u2013485. ase, Montpellier, France (2018)","DOI":"10.1145\/3238147.3238176"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., Chen, B., Chandramohan, M., Lin, S.W., Liu, Y., Tiu, A.: Steelix: program-state based binary fuzzing. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 627\u2013637. ACM, fse, PADERBORN, GERMANY (2017)","DOI":"10.1145\/3106237.3106295"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Liang, J., Jiang, Y., Chen, Y., Wang, M., Zhou, C., Sun, J.: Pafl: extend fuzzing optimizations of single mode to industrial parallel mode. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 809\u2013814 (2018)","DOI":"10.1145\/3236024.3275525"},{"key":"10_CR23","unstructured":"Lyu, C., Ji, S., Zhang, C., Li, Y., Lee, W.H., Song, Y., Beyah, R.: Mopt: Optimized mutation scheduling for fuzzers. In: Proceedings of the 28th USENIX Security Symposium, pp. 1949\u20131966. USENIX, Santa Clara, CA, USA (2019)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Majumdar, R., Sen, K.: Hybrid concolic testing. In: Software Engineering, 2007. ICSE 2007. 29th International Conference on. pp. 416\u2013426. IEEE, ICSE, Minneapolis, MN, USA (2007)","DOI":"10.1109\/ICSE.2007.41"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Man\u00e8s, V.J.M., et al.: The art, science, and engineering of fuzzing: a survey. IEEE Trans. Softw. Eng. PP(21), 21 (2019)","DOI":"10.1109\/TSE.2019.2946563"},{"key":"10_CR26","unstructured":"Sergeant, M., Christian Glahn, P.P.: Libxml2 source code, September 1999. http:\/\/xmlsoft.org\/libxml2\/libxml2-git-snapshot.tar.gz"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"McKnight, P.E., Najab, J.: Mann-whitney u test. The Corsini encyclopedia of psychology 3, 960\u2013961 (2010)","DOI":"10.1002\/9780470479216.corpsy0524"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Myers, G.J., Sandler, C., Badgett, T.: The Art of Software Testing. Wiley, Hoboken (2011)","DOI":"10.1002\/9781119202486"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Nagy, S., Hicks, M.: Full-speed fuzzing: reducing fuzzing overhead through coverage-guided tracing. In: Proceedings of the 2019 IEEE Symposium on Security and Privacy, pp. 787\u2013802. IEEE, Symposium on Security and Privacy, SAN FRANCISCO, CA, USA (2019)","DOI":"10.1109\/SP.2019.00069"},{"key":"10_CR30","unstructured":"Pak, B.S.: Hybrid fuzz testing: Discovering software bugs via fuzzing and symbolic execution. School of Computer Science Carnegie Mellon University 0, 1\u20139 (2012)"},{"key":"10_CR31","unstructured":"R., J.: Intel processor trace (2013). https:\/\/software.intel.com\/en-us\/blogs\/2013\/09\/18\/processor-tracing"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C., Bos, H.: Vuzzer: application-aware evolutionary fuzzing. In: Proceedings of the Network and Distributed System Security Symposium, pp. 1\u201314. NDSS, San Diego, California, USA (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"10_CR33","unstructured":"Rebert, A., et al.: Optimizing seed selection for fuzzing. In: Proceedings of the 23rd USENIX Conference on Security Symposium, pp. 861\u2013875. USENIX Association (2014)"},{"key":"10_CR34","unstructured":"Scale, F.: Top 10 software testing trends, February 2019. https:\/\/fullscale.io\/top-10-software-testing-trends\/"},{"key":"10_CR35","unstructured":"Schumilo, S., Aschermann, C., Gawlik, R., Schinzel, S., Holz, T.: kafl: hardware-assisted feedback fuzzing for OS kernels. In: Proceedings of the 26th USENIX Conference on Security Symposium, pp. 167\u2013182. USENIX Association, Vancouver, BC, Canada (2017)"},{"key":"10_CR36","unstructured":"Serebryany, K., Bruening, D., Potapenko, A., Vyukov, D.: Addresssanitizer: a fast address sanity checker. In: Proceedings of the 2012 USENIX Conference on Annual Technical Conference. pp. 28\u201328. USENIX Association, Bellevue, WA, USA (2012)"},{"key":"10_CR37","unstructured":"Serebryany, K.: libfuzzer-a library for coverage-guided fuzz testing. LLVM project, p. 1 (2015)"},{"key":"10_CR38","doi-asserted-by":"crossref","unstructured":"She, D., Pei, K., Epstein, D., Yang, J., Ray, B., Jana, S.: Neuzz: efficient fuzzing with neural program smoothing. In: Proceedings of the 2019 IEEE Symposium on Security and Privacy, pp. 1\u201315. IEEE, Symposium on Security and Privacy, San Francisco, CA, USA (2018)","DOI":"10.1109\/SP.2019.00052"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Song, C., Zhou, X., Yin, Q., He, X., Zhang, H., Lu, K.: P-fuzz: a parallel grey-box fuzzing framework. Appl. Sci. 9(23), 5100 (2019)","DOI":"10.3390\/app9235100"},{"key":"10_CR40","doi-asserted-by":"crossref","unstructured":"Stephens, N., et al.: Driller: augmenting fuzzing through selective symbolic execution. In: In Proceedings of the 2016 Network and Distributed System Security Symposium, vol. 16, pp. 1\u201316. NDSS, San Diego, California, USA (2016)","DOI":"10.14722\/ndss.2016.23368"},{"key":"10_CR41","unstructured":"McCanne, S., Craig Leres, V.J.: Tcpdump source code, October 2019. http:\/\/www.tcpdump.org\/release\/"},{"key":"10_CR42","unstructured":"Swiecki, R.: Honggfuzz (2015). http:\/\/honggfuzz.com"},{"key":"10_CR43","unstructured":"Teams, T.G.: Oss-fuzz - continuous fuzzing for open source software (2015). https:\/\/github.com\/google\/oss-fuzz"},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Wang, T., Wei, T., Gu, G., Zou, W.: Taintscope: a checksum-aware directed fuzzing tool for automatic software vulnerability detection. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 497\u2013512. IEEE, Oakland, CA, United States (2010)","DOI":"10.1109\/SP.2010.37"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Woo, M., Cha, S.K., Gottlieb, S., Brumley, D.: Scheduling black-box mutational fuzzing. In: Proceedings of the Computer and Communications Security 2013. Association for Computing Machinery, New York, NY, USA (2013)","DOI":"10.1145\/2508859.2516736"},{"key":"10_CR46","doi-asserted-by":"crossref","unstructured":"Xu, W., Kashyap, S., Min, C., Kim, T.: Designing new operating primitives to improve fuzzing performance. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2313\u20132328. Association for Computing Machinery, New York, NY, United States (2017)","DOI":"10.1145\/3133956.3134046"},{"key":"10_CR47","doi-asserted-by":"crossref","unstructured":"Ye, J., Zhang, B., Li, R., Feng, C., Tang, C.: Program state sensitive parallel fuzzing for real world software. IEEE Access 7, 42557\u201342564 (2019)","DOI":"10.1109\/ACCESS.2019.2905744"},{"key":"10_CR48","doi-asserted-by":"crossref","unstructured":"You, W., et al.: Profuzzer: on-the-fly input type probing for better zero-day vulnerability discovery. In: Proceedings of the 2019 IEEE Symposium on Security and Privacy. IEEE, San Fransisco (2019)","DOI":"10.1109\/SP.2019.00057"},{"key":"10_CR49","unstructured":"Yun, I., Lee, S., Xu, M., Jang, Y., Kim, T.: QSYM: a practical concolic execution engine tailored for hybrid fuzzing. In: Proceedings of the 27th USENIX Conference on Security Symposium, pp. 745\u2013761. USENIX Association, Baltimore, MD, USA (2018)"},{"key":"10_CR50","unstructured":"Zalewski, M.: afl-cmin, November 2013. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/afl-cmin"},{"key":"10_CR51","unstructured":"Zalewski, M., Google: Tips for parallel fuzzing, November 2013. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/docs\/parallel_fuzzing.txt"},{"key":"10_CR52","unstructured":"Zalewski, M.: Afl technical details (2013). http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Zhao, L., Duan, Y., Yin, H., Xuan, J.: Send hardest problems my way: Probabilistic path prioritization for hybrid fuzzing. In: Proceedings of the 2019 Network and Distributed System Security Symposium, p. 15. NDSS Symposium, San Diego, California (2019)","DOI":"10.14722\/ndss.2019.23504"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90022-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T08:08:04Z","timestamp":1635926884000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90022-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030900212","9783030900229"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90022-9_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}