{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T23:19:37Z","timestamp":1776381577298,"version":"3.51.2"},"reference-count":103,"publisher":"IEEE","funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CCF-1941816"],"award-info":[{"award-number":["CCF-1941816"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1109\/icse55347.2025.00042","type":"proceedings-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T17:24:29Z","timestamp":1750699469000},"page":"795-807","source":"Crossref","is-referenced-by-count":6,"title":["A Little Goes a Long Way: Tuning Configuration Selection for Continuous Kernel Fuzzing"],"prefix":"10.1109","author":[{"given":"Sanan","family":"Hasanov","sequence":"first","affiliation":[{"name":"University of Central Florida"}]},{"given":"Stefan","family":"Nagy","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"given":"Paul","family":"Gazzillo","sequence":"additional","affiliation":[{"name":"University of Central Florida"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Top 500","year":"2020"},{"key":"ref2","volume-title":"W3Techs Surveys: Usage statistics of Unix for websites","year":"2019"},{"key":"ref3","volume-title":"lot developer survey results","year":"2018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15579-6_10"},{"key":"ref5","article-title":"Is the linux kernel a software product line","volume-title":"Proc. SP LC Workshop on Open Source Software and Product Lines","author":"Sincero","year":"2007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37521-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2012.6170935"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417041"},{"key":"ref9","article-title":"Exploit brokers and offensive cyber operations","author":"Dellago","year":"2022","journal-title":"The Cyber Defense Review"},{"key":"ref10","volume-title":"syzkaller","author":"Vyukov","year":"2023"},{"key":"ref11","article-title":"kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels","volume-title":"USENIX Security Symposium, ser. USENIX","author":"Schumilo","year":"2017"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833593"},{"key":"ref13","first-page":"2559","article-title":"{USBFuzz}: A framework for fuzzing {USB} drivers by device emulation","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Peng","year":"2020"},{"key":"ref14","article-title":"Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints","volume-title":"USENIX Security Symposium","author":"Song","year":"2020"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179298"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24688"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534226"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179293"},{"key":"ref19","article-title":"SyzScope: Revealing High-Risk security impacts of Fuzzer-Exposed bugs in linux kernel","volume-title":"USENIX Security Symposium","author":"Zou","year":"2022"},{"key":"ref20","volume-title":"Some 5.5 kernel development statistics","author":"Corbet","year":"2020"},{"key":"ref21","volume-title":"Some 5.12 development statistics","author":"Corbet","year":"2021"},{"key":"ref22","volume-title":"Some 5.19 development statistics","author":"Corbet","year":"2022"},{"key":"ref23","volume-title":"The linux-next integration testing tree","year":"2024"},{"key":"ref24","volume-title":"Linux kernel mailing list","author":"Spaans","year":"2024"},{"key":"ref25","volume-title":"syzbot","year":"2024"},{"key":"ref26","volume-title":"ci-upstream-linux-next-kasan-gce-root","year":"2024"},{"key":"ref27","volume-title":"Re: syzkaller use","author":"Nogikh","year":"2024"},{"key":"ref28","volume-title":"config.vanilla.virtio","year":"2024"},{"key":"ref29","volume-title":"syz-kconf in syzkaller on go.dev","year":"2023"},{"key":"ref30","volume-title":"syzkaller\/dashboard\/config\/linux\/","year":"2022"},{"key":"ref31","volume-title":"syzkaller settings","year":"2023"},{"key":"ref32","volume-title":"Configure and build target kernel","year":"2024"},{"key":"ref33","volume-title":"Building Embedded Linux Systems","author":"Yaghmour","year":"2003"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3643746"},{"key":"ref35","volume-title":"Learning very large configuration spaces: What matters for linux kernel sizes","author":"Acher","year":"2019"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/32.979992"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884793"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/52.536462"},{"key":"ref39","article-title":"Static analysis of variability in system software: The 90,000 #ifdefs issue","volume-title":"USENIX Annual Technical Conference","author":"Tartler"},{"key":"ref40","volume-title":"Mainline Linux git repository","year":"2021"},{"key":"ref41","volume-title":"A zoological guide to kernel data structures","author":"Maguire","year":"2021"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3379469"},{"key":"ref43","volume-title":"Linux objtool Improvements Help Reduce RAM Usage & Build Time During Large Kernel Builds","author":"Michael Larabel","year":"2023"},{"key":"ref44","volume-title":"CVE-2023\u20133161"},{"key":"ref45","article-title":"AFL++: Combining Incremental Steps of Fuzzing Research","volume-title":"USENIX Workshop on Offensive Technologies, ser. WOOT","author":"Fioraldi","year":"2020"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"ref47","first-page":"2829","article-title":"The use of likely in-variants as feedback for fuzzers","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Fioraldi","year":"2021"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/secdev.2016.043"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"ref50","article-title":"ACTOR: Action-Guided kernel fuzzing","volume-title":"USENIX Security Symposium","author":"Fleischer","year":"2023"},{"key":"ref51","volume-title":"Kconfig language","year":"2023"},{"key":"ref52","volume-title":"FreeBSD Handbook: Chapter 10. Configuring the FreeBSD Kernel","year":"2023"},{"key":"ref53","volume-title":"Kconfig language","year":"2023"},{"key":"ref54","volume-title":"The netbsd guide: Tuning netbsd, 19.9.2. configuring the kernel","year":"2023"},{"key":"ref55","volume-title":"Openbsd faq: Building the system from source","year":"2023"},{"key":"ref56","volume-title":"How to build xnu","year":"2023"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3579639"},{"key":"ref58","volume-title":"Artifact from \u201cMaximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times\u201d","author":"Yildiran","year":"2024"},{"key":"ref59","volume-title":"Artifact from \u201cA Little Goes a Long Way: Tuning Configuration Selection for Continuous Kernel Fuzzing\u201d","author":"Hasanov","year":"2024"},{"key":"ref60","volume-title":"Linux kernel patch submission checklist","year":"2024"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623146"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484564"},{"key":"ref64","volume-title":"Common Vulnerabilities and Exposures Database","year":"2024"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642990"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484787"},{"key":"ref67","doi-asserted-by":"crossref","DOI":"10.1145\/3324884.3416572","article-title":"Zeror: speed up fuzzing with coverage-sensitive tracing and scheduling","volume-title":"IEEE\/ACM International Conference on Automated Software Engineering","author":"Zhou","year":"2020"},{"key":"ref68","article-title":"No linux, no problem: Fast and correct windows binary fuzzing via target-embedded snap-shotting","volume-title":"USENIX Security Symposium","author":"Stone","year":"2023"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"ref71","volume-title":"The Linux Kernel Archives","year":"2024"},{"key":"ref73","volume-title":"Warning about WARN_ONO","year":"2024"},{"key":"ref74","volume-title":"What to do in response to a kernel warning","year":"2021"},{"key":"ref75","volume-title":"Deprecated Interfaces, Language Features, Attributes, and Conventions","year":"2024"},{"key":"ref76","volume-title":"Development tools for the kernel","year":"2024"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00078"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"ref79","article-title":"Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing","volume-title":"USENIX Security Symposium","author":"Nagy","year":"2021"},{"key":"ref80","volume-title":"Re: Syzkaller found a bug: KASAN: use-after-free Read in do_update_region","author":"Kroah-Hartman","year":"2022"},{"key":"ref81","volume-title":"general_protection_fault","year":"2023"},{"key":"ref82","volume-title":"using random seeds of syzkaller","author":"Nogikh","year":"2022"},{"key":"ref83","volume-title":"add qemu snapshotting mode","author":"Vyukov"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.34"},{"key":"ref85","article-title":"Busybox: A swiss army knife for linux","author":"Wells","journal-title":"Linux Journal"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/4236.612229"},{"key":"ref87","article-title":"Effective analysis of C programs by rewriting variability","volume":"abs\/1701.08114","author":"Iosif-Lazar","year":"2017","journal-title":"CoRR"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568300"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3512763"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510174"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.34"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338967"},{"key":"ref93","doi-asserted-by":"crossref","DOI":"10.1145\/2934466.2934467","article-title":"Do# ifdefs influence the occurrence of vulnerabilities? an empirical study of the linux kernel","volume-title":"Software Product Line Conference","author":"Ferreira","year":"2016"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2015.06.007"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3623323"},{"key":"ref96","doi-asserted-by":"crossref","DOI":"10.1145\/2970276.2970322","article-title":"On essential configuration complexity: Measuring interactions in highly-configurable systems","volume-title":"IEEE\/ACM International Conference on Automated Software Engineering","author":"Meinicke","year":"2016"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2746194.2746211"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/SPW59333.2023.00022"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2382756.2382783"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00032"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00114"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24345"},{"key":"ref103","first-page":"1275","article-title":"Drifuzz: Harvesting bugs in device drivers from golden seeds","volume-title":"31 st USENIX Security Symposium (USENIX Security 22)","author":"Shen","year":"2022"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3611665"}],"event":{"name":"2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE)","location":"Ottawa, ON, Canada","start":{"date-parts":[[2025,4,26]]},"end":{"date-parts":[[2025,5,6]]}},"container-title":["2025 IEEE\/ACM 47th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11029684\/11029718\/11029826.pdf?arnumber=11029826","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:03:18Z","timestamp":1750744998000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11029826\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,26]]},"references-count":103,"URL":"https:\/\/doi.org\/10.1109\/icse55347.2025.00042","relation":{},"subject":[],"published":{"date-parts":[[2025,4,26]]}}}