{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T19:24:29Z","timestamp":1769973869124,"version":"3.49.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031157769","type":"print"},{"value":"9783031157776","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_20","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"359-375","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["FuzzBoost: Reinforcement Compiler Fuzzing"],"prefix":"10.1007","author":[{"given":"Xiaoting","family":"Li","sequence":"first","affiliation":[]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lingwei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Rupesh","family":"Prajapati","sequence":"additional","affiliation":[]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"key":"20_CR1","unstructured":"Abadi, M., et al.: TensorFlow: a system for large-scale machine learning. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 265\u2013283 (2016)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-642-13986-4_7","volume-title":"Mechanisms for Autonomous Management of Networks and Services","author":"S Becker","year":"2010","unstructured":"Becker, S., Abdelnur, H., State, R., Engel, T.: An autonomic testing framework for IPv6 configuration protocols. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 65\u201376. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13986-4_7"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Bertsekas, D.P., Tsitsiklis, J.N.: Neuro-dynamic programming: an overview. In: Proceedings of the 34th IEEE Conference on Decision and Control, Piscataway, NJ, pp. 560\u2013564. IEEE Publications (1995)","DOI":"10.1109\/CDC.1995.478953"},{"issue":"5","key":"20_CR4","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TSE.2017.2785841","volume":"45","author":"M B\u00f6hme","year":"2017","unstructured":"B\u00f6hme, M., Pham, V.T., Roychoudhury, A.: Coverage-based greybox fuzzing as Markov chain. IEEE Trans. Softw. Eng. 45(5), 489\u2013506 (2017)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"B\u00f6ttinger, K., Godefroid, P., Singh, R.: Deep reinforcement fuzzing. In: 2018 IEEE Security and Privacy Workshops (SPW), pp. 116\u2013122. IEEE (2018)","DOI":"10.1109\/SPW.2018.00026"},{"key":"20_CR6","unstructured":"Bunel, R., Hausknecht, M., Devlin, J., Singh, R., Kohli, P.: Leveraging grammar and reinforcement learning for neural program synthesis. arXiv preprint arXiv:1805.04276 (2018)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Cummins, C., Petoumenos, P., Murray, A., Leather, H.: Compiler fuzzing through deep learning. In: Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 95\u2013105. ISSTA (2018)","DOI":"10.1145\/3213846.3213848"},{"key":"20_CR8","unstructured":"Duran, J.W., Ntafos, S.: A report on random testing. In: ICSE, pp. 179\u2013183 (1981)"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Duran, J.W., Ntafos, S.C.: An evaluation of random testing. IEEE Trans. Softw. Eng. SE-10(4), 438\u2013444 (1984)","DOI":"10.1109\/TSE.1984.5010257"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Gan, S., et al.: CollAFL: path sensitive fuzzing. In: 2018 IEEE Symposium on Security and Privacy, pp. 679\u2013696. IEEE (2018)","DOI":"10.1109\/SP.2018.00040"},{"key":"20_CR11","unstructured":"GCC, The GNU Compiler Collection. gcc.gnu.org (2019). http:\/\/gcc.gnu.org\/"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Peleg, H., Singh, R.: Learn &Fuzz: machine learning for input fuzzing. In: Proceedings of the 32Nd IEEE\/ACM International Conference on Automated Software Engineering, ASE 2017, pp. 50\u201359. IEEE Press (2017)","DOI":"10.1109\/ASE.2017.8115618"},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: a survey. J. Artif. Intell. Res. 4, 237\u2013285 (1996)","journal-title":"J. Artif. Intell. Res."},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Karg\u00e9n, U., Shahmehri, N.: Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing. In: Proceedings of the 10th Joint Meeting on Foundations of Software Engineering, pp. 782\u2013792. ACM (2015)","DOI":"10.1145\/2786805.2786844"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-319-09940-8_10","volume-title":"Search-Based Software Engineering","author":"FM Kifetew","year":"2014","unstructured":"Kifetew, F.M., Tiella, R., Tonella, P.: Combining stochastic grammars and genetic programming for coverage testing at the system level. In: Le Goues, C., Yoo, S. (eds.) SSBSE 2014. LNCS, vol. 8636, pp. 138\u2013152. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-09940-8_10"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Li, X., Liu, X., Chen, L., Prajapati, R., Wu, D.: ALPHAPROG: reinforcement generation of valid programs for compiler fuzzing. In: Proceedings of the Thirty-Fourth Annual Conference on Innovative Applications of Artificial Intelligence (IAAI-2022) (2022)","DOI":"10.1609\/aaai.v36i11.21527"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Liu, X., Li, X., Prajapati, R., Wu, D.: DeepFuzz: automatic generation of syntax valid C programs for fuzz testing. In: Proceedings of the 33rd AAAI Conference on Artificial Intelligence (2019)","DOI":"10.1609\/aaai.v33i01.33011044"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Luk, C.K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 190\u2013200 (2005)","DOI":"10.1145\/1065010.1065034"},{"issue":"12","key":"20_CR19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/96267.96279","volume":"33","author":"BP Miller","year":"1990","unstructured":"Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of UNIX utilities. Commun. ACM 33(12), 32\u201344 (1990)","journal-title":"Commun. ACM"},{"key":"20_CR20","unstructured":"Mnih, V., et al.: Playing Atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602 (2013)"},{"issue":"7540","key":"20_CR21","doi-asserted-by":"publisher","first-page":"529","DOI":"10.1038\/nature14236","volume":"518","author":"V Mnih","year":"2015","unstructured":"Mnih, V., et al.: Human-level control through deep reinforcement learning. Nature 518(7540), 529 (2015)","journal-title":"Nature"},{"key":"20_CR22","unstructured":"Rajpal, M., Blum, W., Singh, R.: Not all bytes are equal: neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596 (2017)"},{"key":"20_CR23","unstructured":"Rash, M.: A collection of vulnerabilities discovered by the AFL fuzzer (AFL-fuzz) (2019). https:\/\/github.com\/mrash\/afl-cve"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Rawat, S., Jain, V., Kumar, A., Cojocar, L., Giuffrida, C., Bos, H.: VUzzer: application-aware evolutionary fuzzing. In: NDSS, vol. 17, pp. 1\u201314 (2017)","DOI":"10.14722\/ndss.2017.23404"},{"key":"20_CR25","unstructured":"Saavedra, G.J., Rodhouse, K.N., Dunlavy, D.M., Kegelmeyer, P.W.: A review of machine learning applications in fuzzing. arXiv preprint arXiv:1906.11133 (2019)"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"She, D., Pei, K., Epstein, D., Yang, J., Ray, B., Jana, S.: NEUZZ: efficient fuzzing with neural program smoothing. In: 2019 IEEE Symposium on Security and Privacy, pp. 803\u2013817. IEEE (2019)","DOI":"10.1109\/SP.2019.00052"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Sun, C., Le, V., Zhang, Q., Su, Z.: Toward understanding compiler bugs in GCC and LLVM. In: ISSTA, pp. 294\u2013305 (2016)","DOI":"10.1145\/2931037.2931074"},{"key":"20_CR28","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"M Sutton","year":"2007","unstructured":"Sutton, M., Greene, A., Amini, P.: Fuzzing: Brute Force Vulnerability Discovery. Pearson Education, London (2007)"},{"key":"20_CR29","volume-title":"Reinforcement Learning: An Introduction","author":"RS Sutton","year":"2018","unstructured":"Sutton, R.S., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (2018)"},{"key":"20_CR30","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"A Takanen","year":"2018","unstructured":"Takanen, A., Demott, J.D., Miller, C., Kettunen, A.: Fuzzing for Software Security Testing and Quality Assurance. Artech House, Norwood (2018)"},{"key":"20_CR31","unstructured":"Verma, A., Murali, V., Singh, R., Kohli, P., Chaudhuri, S.: Programmatically interpretable reinforcement learning. arXiv preprint arXiv:1804.02477 (2018)"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Wang, J., Chen, B., Wei, L., Liu, Y.: Skyfire: data-driven seed generation for fuzzing. In: 2017 IEEE Symposium on Security and Privacy, pp. 579\u2013594 (2017)","DOI":"10.1109\/SP.2017.23"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Wang, M., et al.: SAFL: increasing and accelerating testing coverage with symbolic execution and guided fuzzing. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings, pp. 61\u201364. ACM (2018)","DOI":"10.1145\/3183440.3183494"},{"issue":"3\u20134","key":"20_CR34","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/BF00992698","volume":"8","author":"CJ Watkins","year":"1992","unstructured":"Watkins, C.J., Dayan, P.: Q-learning. Mach. Learn. 8(3\u20134), 279\u2013292 (1992)","journal-title":"Mach. Learn."},{"key":"20_CR35","doi-asserted-by":"crossref","unstructured":"You, W., Liu, X., Ma, S., Perry, D., Zhang, X., Liang, B.: SLF: fuzzing without valid seed inputs. In: Proceedings of the 41st International Conference on Software Engineering, ICSE (2019)","DOI":"10.1109\/ICSE.2019.00080"},{"key":"20_CR36","unstructured":"Zalewski, M.: American fuzzy lop (2014)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T10:28:42Z","timestamp":1727864922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}