{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T23:10:05Z","timestamp":1752275405246,"version":"3.41.2"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T00:00:00Z","timestamp":1751328000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSFC for Young Scientists of China","award":["62202400"],"award-info":[{"award-number":["62202400"]}]},{"name":"Early Career Scheme","award":["27210024"],"award-info":[{"award-number":["27210024"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1109\/tdsc.2025.3530010","type":"journal-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T15:29:31Z","timestamp":1736954971000},"page":"3324-3336","source":"Crossref","is-referenced-by-count":0,"title":["CherryPicker: A Parallel Solving and State Sharing Hybrid Fuzzing System"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-4422-3971","authenticated-orcid":false,"given":"Qingyu","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computing and Data Science, The University of Hong Kong, Hong Kong, China"}]},{"given":"Jiayi","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computing and Data Science, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5057-6089","authenticated-orcid":false,"given":"Chenxin","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computing and Data Science, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6201-6011","authenticated-orcid":false,"given":"Chenxiong","family":"Qian","sequence":"additional","affiliation":[{"name":"School of Computing and Data Science, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]}],"member":"263","reference":[{"article-title":"{AFL} : Combining incremental steps of fuzzing research","volume-title":"Proc. 14th USENIX Workshop Offensive Technol.","author":"Fioraldi","key":"ref1"},{"article-title":"Honggfuzz: A general-purpose, easy-to-use fuzzer with interesting analysis options","year":"2017","author":"Swiecki","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560602"},{"year":"2022","key":"ref4","article-title":"OSS-fuzz: Continuous fuzzing for open source software"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321746"},{"key":"ref8","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proc. 8th USENIX Conf. Operating Syst. Des. Implementation","author":"Cadar"},{"key":"ref9","first-page":"151","article-title":"Automated whitebox fuzz testing","volume-title":"Proc. Netw. Distrib. Syst. Secur. Symp.","author":"Godefroid"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1961296.1950396"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606558"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"ref15","first-page":"745","article-title":"{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Yun"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354249"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23504"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24118"},{"article-title":"Symbolic execution with {SYMCC}: Don\u2019t interpret, compile!","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Poeplau","key":"ref19"},{"key":"ref20","first-page":"181","article-title":"{MEUZZ}: Smart seed scheduling for hybrid fuzzing","volume-title":"23 rd Int. Symp. Res. Attacks Intrusions Defenses","author":"Chen"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00063"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3471621.3471852"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102368"},{"key":"ref25","first-page":"2531","article-title":"SYMSAN: Time and space efficient concolic execution via dynamic data-flow analysis","volume-title":"Proc. USENIX Secur. Symp.","author":"Chen"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833796"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180177"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"year":"2017","key":"ref30","article-title":"Cyber grand challenge"},{"article-title":"AFL: American fuzzy lop","year":"2015","author":"Zalewski","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.043"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.4135\/9781412985116","volume-title":"Monte Carlo Simulation","author":"Mooney","year":"1997"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/11077775\/10842464.pdf?arnumber=10842464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T22:48:42Z","timestamp":1752274122000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10842464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7]]},"references-count":36,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2025.3530010","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,7]]}}}