{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T04:30:59Z","timestamp":1768710659763,"version":"3.49.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T00:00:00Z","timestamp":1643587200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11390-021-1663-7","type":"journal-article","created":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T05:02:42Z","timestamp":1645160562000},"page":"29-49","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["DeltaFuzz: Historical Version Information Guided Fuzz Testing"],"prefix":"10.1007","volume":"37","author":[{"given":"Jia-Ming","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhan-Qi","family":"Cui","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Huan-Huan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Li-Wei","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Jian-Bin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,31]]},"reference":[{"key":"1663_CR1","doi-asserted-by":"publisher","unstructured":"Masso J, Pino F J, Pardo C et al. Risk management in the software life cycle: A systematic literature review. Computer Standards & Interfaces, 2020, 71: Article No. 103431. https:\/\/doi.org\/10.1016\/j.csi.2020.103431.","DOI":"10.1016\/j.csi.2020.103431"},{"key":"1663_CR2","doi-asserted-by":"publisher","unstructured":"Gu T, Ma X, Xu C et al. Synthesizing object transformation for dynamic software updating. In Proc. the 39th IEEE\/ACM International Conference on Software Engineering Companion, May 2017, pp.336-338. https:\/\/doi.org\/10.1109\/ICSE-C.2017.96.","DOI":"10.1109\/ICSE-C.2017.96"},{"key":"1663_CR3","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.infsof.2017.08.014","volume":"93","author":"M Khatibsyarbini","year":"2018","unstructured":"Khatibsyarbini M, Isa M A, Jawawi D N A et al. Test case prioritization approaches in regression testing: A systematic literature review. Information and Software Technology, 2018, 93: 74-93. https:\/\/doi.org\/10.1016\/j.infsof.2017.08.014.","journal-title":"Information and Software Technology"},{"key":"1663_CR4","doi-asserted-by":"publisher","unstructured":"Han J C, Zhou Z Q. Metamorphic fuzz testing of autonomous vehicles. In Proc. the 42nd IEEE\/ACM International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.380-385. https:\/\/doi.org\/10.1145\/3387940.3392252.","DOI":"10.1145\/3387940.3392252"},{"key":"1663_CR5","doi-asserted-by":"publisher","unstructured":"Dong Z, B\u00f6hme M, Cojocaru L et al. Time-travel testing of Android apps. In Proc. the 42nd IEEE\/ACM International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.481-492. https:\/\/doi.org\/10.1145\/3377811.3380402.","DOI":"10.1145\/3377811.3380402"},{"issue":"5","key":"1663_CR6","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1007\/s11390-016-1670-2","volume":"31","author":"J Qian","year":"2016","unstructured":"Qian J, Zhou D. Prioritizing test cases for memory leaks in Android applications. Journal of Computer Science and Technology, 2016, 31(5): 869-882. https:\/\/doi.org\/10.1007\/s11390-016-1670-2.","journal-title":"Journal of Computer Science and Technology"},{"key":"1663_CR7","doi-asserted-by":"publisher","unstructured":"Chen Y, Su T, Su Z. Deep differential testing of JVM implementations. In Proc. the 41st IEEE\/ACM International Conference on Software Engineering, May 2019, pp.1257-1268. https:\/\/doi.org\/10.1109\/ICSE.2019.00127.","DOI":"10.1109\/ICSE.2019.00127"},{"key":"1663_CR8","doi-asserted-by":"publisher","unstructured":"W\u00fcstholz V, Christakis M. Targeted greybox fuzzing with static lookahead analysis. In Proc. the 42nd IEEE\/ACM International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.789-800. https:\/\/doi.org\/10.1145\/3377811.3380388.","DOI":"10.1145\/3377811.3380388"},{"key":"1663_CR9","doi-asserted-by":"publisher","unstructured":"B\u00f6hme M, Man\u00e8s V J M, Cha S K. Boosting fuzzer efficiency: An information theoretic perspective. In Proc. the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, November 2020, pp.678-689. https:\/\/doi.org\/10.1145\/3368089.3409748.","DOI":"10.1145\/3368089.3409748"},{"key":"1663_CR10","doi-asserted-by":"publisher","unstructured":"Song S, Song C, Jang Y et al. CrFuzz: Fuzzing multipurpose programs through input validation. In Proc. the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, November 2020, pp.690-700. https:\/\/doi.org\/10.1145\/3368089.3409769.","DOI":"10.1145\/3368089.3409769"},{"key":"1663_CR11","doi-asserted-by":"publisher","unstructured":"Havrikov N. Efficient fuzz testing leveraging input, code, and execution. In Proc. the 39th IEEE\/ACM International Conference on Software Engineering Companion, May 2017, pp.417-420. https:\/\/doi.org\/10.1109\/ICSE-C.2017.26.","DOI":"10.1109\/ICSE-C.2017.26"},{"key":"1663_CR12","doi-asserted-by":"publisher","unstructured":"Klees G, Ruef A, Cooper B et al. Evaluating fuzz testing. In Proc. the 2018 ACM SIGSAC Conference on Computer and Communications Security, October 2018, pp.2123-2138. https:\/\/doi.org\/10.1145\/3243734.3243804.","DOI":"10.1145\/3243734.3243804"},{"key":"1663_CR13","doi-asserted-by":"publisher","unstructured":"Zhang M Z, Gong Y Z, Wang YW et al. Unit test data generation for C using rule-directed symbolic execution. Journal of Computer Science and Technology, 2019, 34(3): 670-689. https:\/\/doi.org\/10.1007\/s11390-019-1935-7.","DOI":"10.1007\/s11390-019-1935-7"},{"key":"1663_CR14","doi-asserted-by":"publisher","unstructured":"He J, Balunovi\u0107 M, Ambroladze N et al. Learning to fuzz from symbolic execution with application to smart contracts. In Proc. the 2019 ACM SIGSAC Conference on Computer and Communications Security, November 2019, pp.531-548. https:\/\/doi.org\/10.1145\/3319535.3363230.","DOI":"10.1145\/3319535.3363230"},{"key":"1663_CR15","doi-asserted-by":"publisher","unstructured":"Zhang Q, Wang J, Gulzar M A et al. BigFuzz: Efficient fuzz testing for data analytics using framework abstraction. In Proc. the 35th IEEE\/ACM International Conference on Automated Software Engineering, September 2020, pp.722-733. https:\/\/doi.org\/10.1145\/3324884.3416641.","DOI":"10.1145\/3324884.3416641"},{"key":"1663_CR16","doi-asserted-by":"publisher","unstructured":"Nguyen H L, Nassar N, Kehrer T et al. MoFuzz: A fuzzer suite for testing model-driven software engineering tools. In Proc. the 35th IEEE\/ACM International Conference on Automated Software Engineering, September 2020, pp.1103-1115. https:\/\/doi.org\/10.1145\/3324884.3416668.","DOI":"10.1145\/3324884.3416668"},{"key":"1663_CR17","doi-asserted-by":"publisher","unstructured":"Olsthoorn M, Van Deursen A, Panichella A. Generating highly-structured input data by combining search-based testing and grammar-based fuzzing. In Proc. the 35th IEEE\/ACM International Conference on Automated Software Engineering, September 2020, pp.1224-1228. https:\/\/doi.org\/10.1145\/3324884.3418930.","DOI":"10.1145\/3324884.3418930"},{"key":"1663_CR18","doi-asserted-by":"publisher","unstructured":"Nguyen T D, Pham L H, Sun J et al. sfuzz: An efficient adaptive fuzzer for solidity smart contracts. In Proc. the 42nd ACM\/IEEE International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.778-788. https:\/\/doi.org\/10.1145\/3377811.3380334.","DOI":"10.1145\/3377811.3380334"},{"key":"1663_CR19","doi-asserted-by":"publisher","unstructured":"Man\u00e8s V J M, Kim S, Cha S K. Ankou: Guiding greybox fuzzing towards combinatorial difference. In Proc. the 42nd ACM\/IEEE International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.1024-1036. https:\/\/doi.org\/10.1145\/3377811.3380421.","DOI":"10.1145\/3377811.3380421"},{"key":"1663_CR20","doi-asserted-by":"publisher","unstructured":"B\u00f6hme M, Pham V T, Nguyen M D et al. Directed greybox fuzzing. In Proc. the 2017 ACM SIGSAC Conference on Computer and Communications Security, October 30\u2013November 3, 2017, pp.2329-2344. https:\/\/doi.org\/10.1145\/3133956.3134020.","DOI":"10.1145\/3133956.3134020"},{"key":"1663_CR21","doi-asserted-by":"publisher","unstructured":"Gao X, Saha R K, Prasad M R et al. Fuzz testing based data augmentation to improve robustness of deep neural networks. In Proc. the 42nd IEEE\/ACM International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.1147-1158. https:\/\/doi.org\/10.1145\/3377811.3380415.","DOI":"10.1145\/3377811.3380415"},{"key":"1663_CR22","doi-asserted-by":"publisher","unstructured":"Wen C, Wang H, Li Y et al. MemLock: Memory usage guided fuzzing. In Proc. the 42nd ACM\/IEEE International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.765-777. https:\/\/doi.org\/10.1145\/3377811.3380396.","DOI":"10.1145\/3377811.3380396"},{"key":"1663_CR23","doi-asserted-by":"publisher","unstructured":"Babi\u0107 D, Bucur S, Chen Y et al. FUDGE: Fuzz driver generation at scale. In Proc. the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, August 2019, pp.975-985. https:\/\/doi.org\/10.1145\/3338906.3340456.","DOI":"10.1145\/3338906.3340456"},{"key":"1663_CR24","doi-asserted-by":"publisher","unstructured":"Chen H, Xue Y, Li Y et al. Hawkeye: Towards a desired directed grey-box fuzzer. In Proc. the 2018 ACM SIGSAC Conference on Computer and Communications Security, October 2018, pp.2095-2108. https:\/\/doi.org\/10.1145\/3243734.3243849.","DOI":"10.1145\/3243734.3243849"},{"key":"1663_CR25","doi-asserted-by":"publisher","unstructured":"Medicherla R K, Komondoor R, Roychoudhury A. Fitness guided vulnerability detection with greybox fuzzing. In Proc. the 42nd IEEE\/ACM International Conference on Software Engineering, June 27\u2013July 19, 2020, pp.513-520. https:\/\/doi.org\/10.1145\/3387940.3391457.","DOI":"10.1145\/3387940.3391457"},{"key":"1663_CR26","unstructured":"\u00d6sterlund S, Razavi K, Bos H et al. ParmeSan: Sanitizer-guided greybox fuzzing. In Proc. the 29th USENIX Security Symposium, August 2020, pp.2289-2306."},{"key":"1663_CR27","doi-asserted-by":"publisher","unstructured":"Gao X, Mechtaev S, Roychoudhury A. Crash-avoiding program repair. In Proc. the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2019, pp.8-18. DOI: https:\/\/doi.org\/10.1145\/3293882.3330558.","DOI":"10.1145\/3293882.3330558"},{"key":"1663_CR28","unstructured":"Fioraldi A, Maier D, Ei\u00dffeldt H et al. AFL++: Combining incremental steps of fuzzing research. In Proc. the 14th USENIX Workshop on Offensive Technologies, August 2020."},{"issue":"12","key":"1663_CR29","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/2976002.2976017","volume":"51","author":"G Grieco","year":"2016","unstructured":"Grieco G, Ceresa M, Buiras P. QuickFuzz: An automatic random fuzzer for common file formats. ACM SIGPLAN Notices, 2016, 51(12): 13-20. https:\/\/doi.org\/10.1145\/2976002.2976017.","journal-title":"ACM SIGPLAN Notices"},{"key":"1663_CR30","doi-asserted-by":"publisher","unstructured":"Liang H, Zhang Y, Yu Y et al. Sequence coverage directed greybox fuzzing. In Proc. the 27th IEEE\/ACM International Conference on Program Comprehension, May 2019, pp.249-259. https:\/\/doi.org\/10.1109\/ICPC.2019.00044.","DOI":"10.1109\/ICPC.2019.00044"},{"key":"1663_CR31","doi-asserted-by":"publisher","unstructured":"Zhang M, Liu J, Ma F et al. IntelliGen: Automatic driver synthesis for fuzz testing. In Proc. the 43rd IEEE\/ACM International Conference on Software Engineering, May 2021, pp.318-327. https:\/\/doi.org\/10.1109\/ICSESEIP52600.2021.00041.","DOI":"10.1109\/ICSESEIP52600.2021.00041"},{"key":"1663_CR32","doi-asserted-by":"publisher","unstructured":"You W, Liu X, Ma S et al. SLF: Fuzzing without valid seed inputs. In Proc. the 41st IEEE\/ACM International Conference on Software Engineering, May 2019, pp.712-723. https:\/\/doi.org\/10.1109\/ICSE.2019.00080.","DOI":"10.1109\/ICSE.2019.00080"},{"key":"1663_CR33","doi-asserted-by":"publisher","unstructured":"Choi W, Sen K, Necul G et al. DetReduce: Minimizing Android GUI test suites for regression testing. In Proc. the 40th IEEE\/ACM International Conference on Software Engineering, May 27\u2013June 3, 2018, pp.445-455. https:\/\/doi.org\/10.1145\/3180155.3180173.","DOI":"10.1145\/3180155.3180173"},{"key":"1663_CR34","doi-asserted-by":"crossref","unstructured":"Zhang L. Hybrid regression test selection. In Proc. the 40th IEEE\/ACM International Conference on Software Engineering, May 27\u2013June 3, 2018, pp.199-209. DOI: 10.1145\/3180155.3180198.","DOI":"10.1145\/3180155.3180198"},{"key":"1663_CR35","doi-asserted-by":"publisher","unstructured":"Nagy S, Hicks M. Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing. In Proc. the 2019 IEEE Symposium on Security and Privacy, May 2019, pp.787-802. https:\/\/doi.org\/10.1109\/SP.2019.00069.","DOI":"10.1109\/SP.2019.00069"},{"issue":"6","key":"1663_CR36","doi-asserted-by":"publisher","first-page":"2675","DOI":"10.1109\/TDSC.2019.2961339","volume":"18","author":"J Liang","year":"2019","unstructured":"Liang J, Jiang Y, Wang M et al. DeepFuzzer: Accelerated deep greybox fuzzing. IEEE Transactions on Dependable and Secure Computing, 2019, 18(6): 2675-2688. https:\/\/doi.org\/10.1109\/TDSC.2019.2961339.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1663_CR37","doi-asserted-by":"publisher","unstructured":"Fioraldi A, D'Elia D C, Coppa E. WEIZZ: Automatic grey-box fuzzing for structured binary formats. In Proc. the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2020, pp.1-13. https:\/\/doi.org\/10.1145\/3395363.3397372.","DOI":"10.1145\/3395363.3397372"},{"key":"1663_CR38","doi-asserted-by":"publisher","unstructured":"Chen Y, Poskitt C M, Sun J et al. Learning-guided network fuzzing for testing cyber-physical system defences. In Proc. the 34th IEEE\/ACM International Conference on Automated Software Engineering, November 2019, pp.962-973. https:\/\/doi.org\/10.1109\/ASE.2019.00093.","DOI":"10.1109\/ASE.2019.00093"},{"key":"1663_CR39","doi-asserted-by":"publisher","unstructured":"Peng H, Shoshitaishvili Y, Payer M. T-Fuzz: Fuzzing by program transformation. In Proc. the 2018 IEEE Symposium on Security and Privacy, May 2018, pp.697-710. https:\/\/doi.org\/10.1109\/SP.2018.00056.","DOI":"10.1109\/SP.2018.00056"},{"key":"1663_CR40","doi-asserted-by":"publisher","unstructured":"Padhye R, Lemieux C, Sen K. JQF: Coverage-guided property-based testing in Java. In Proc. the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2019, pp.398-401. https:\/\/doi.org\/10.1145\/3293882.3339002.","DOI":"10.1145\/3293882.3339002"},{"key":"1663_CR41","doi-asserted-by":"publisher","unstructured":"Noller Y, Kersten R, P\u0103s\u0103reanu C S. Badger: Complexity analysis with fuzzing and symbolic execution. In Proc. the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2018, pp.322-332. https:\/\/doi.org\/10.1145\/3213846.3213868.","DOI":"10.1145\/3213846.3213868"},{"key":"1663_CR42","doi-asserted-by":"publisher","unstructured":"Zhou C, Wang M, Liang J et al. Zeror: Speed up fuzzing with coverage-sensitive tracing and scheduling. In Proc. the 35th IEEE\/ACM International Conference on Automated Software Engineering, September 2020, pp.858-870. https:\/\/doi.org\/10.1145\/3324884.3416572.","DOI":"10.1145\/3324884.3416572"},{"key":"1663_CR43","doi-asserted-by":"publisher","unstructured":"Wang T, Wei T, Gu G et al. TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection. In Proc. the 2010 IEEE Symposium on Security and Privacy, May 2010, pp.497-512. https:\/\/doi.org\/10.1109\/SP.2010.37.","DOI":"10.1109\/SP.2010.37"},{"key":"1663_CR44","doi-asserted-by":"publisher","unstructured":"Lemieux C, Sen K. Fairfuzz: A targeted mutation strategy for increasing greybox fuzz testing coverage. In Proc. the 33rd ACM\/IEEE International Conference on Automated Software Engineering, September 2018, pp.475-485. https:\/\/doi.org\/10.1145\/3238147.3238176.","DOI":"10.1145\/3238147.3238176"},{"key":"1663_CR45","doi-asserted-by":"publisher","unstructured":"Situ L, Wang L, Li X, Guan L, Zhang W, Liu P. Energy distribution matters in greybox fuzzing. In Proc. the 41st IEEE\/ACM International Conference on Software Engineering, May 2019, pp.270-271. https:\/\/doi.org\/10.1109\/ICSECompanion.2019.00109.","DOI":"10.1109\/ICSECompanion.2019.00109"},{"key":"1663_CR46","doi-asserted-by":"publisher","unstructured":"B\u00f6hme M, Pham V T, Roychoudhury A. Coverage-based greybox fuzzing as Markov chain. IEEE Transactions on Software Engineering, 2017, 45(5): 489-506. https:\/\/doi.org\/10.1109\/TSE.2017.2785841.","DOI":"10.1109\/TSE.2017.2785841"},{"key":"1663_CR47","doi-asserted-by":"publisher","unstructured":"W\u00fcstholz V, Christakis M. Harvey: A greybox fuzzer for smart contracts. In Proc. the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, November 2020, pp.1398-1409. https:\/\/doi.org\/10.1145\/3368089.3417064.","DOI":"10.1145\/3368089.3417064"},{"key":"1663_CR48","doi-asserted-by":"publisher","unstructured":"Gan S, Zhang C, Qin X et al. CollAFL: Path sensitive fuzzing. In Proc. the 2018 IEEE Symposium on Security and Privacy, May 2018, pp.679-696. https:\/\/doi.org\/10.1109\/SP.2018.00040.","DOI":"10.1109\/SP.2018.00040"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-021-1663-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-021-1663-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-021-1663-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T05:20:30Z","timestamp":1645161630000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-021-1663-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,31]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["1663"],"URL":"https:\/\/doi.org\/10.1007\/s11390-021-1663-7","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,31]]},"assertion":[{"value":"1 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}