{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:12:29Z","timestamp":1775873549699,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,16]],"date-time":"2013-06-16T00:00:00Z","timestamp":1371340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,16]]},"DOI":"10.1145\/2491956.2462173","type":"proceedings-article","created":{"date-parts":[[2013,6,11]],"date-time":"2013-06-11T12:03:50Z","timestamp":1370952230000},"page":"197-208","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":119,"title":["Taming compiler fuzzers"],"prefix":"10.1145","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"Alex","family":"Groce","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Chaoqiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Weng-Keen","family":"Wong","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Xiaoli","family":"Fern","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Eric","family":"Eide","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"given":"John","family":"Regehr","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,6,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.12"},{"key":"e_1_3_2_1_2_1","volume-title":"April","author":"Arya Abhishek","year":"2012","unstructured":"Abhishek Arya and Cris Neckar . Fuzzing for security , April 2012 . http:\/\/blog.chromium.org\/2012\/04\/fuzzing-for-security.html. Abhishek Arya and Cris Neckar. Fuzzing for security, April 2012. http:\/\/blog.chromium.org\/2012\/04\/fuzzing-for-security.html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337277"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.26"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029908"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351266"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-007-5026-6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.43"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(85)90224-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.68"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336763"},{"key":"e_1_3_2_1_14_1","first-page":"445","volume-title":"Proc. USENIX Security","author":"Holler Christian","year":"2012","unstructured":"Christian Holler , Kim Herzig , and Andreas Zeller . Fuzzing with code fragments . In Proc. USENIX Security , pages 445 -- 458 , August 2012 . Christian Holler, Kim Herzig, and Andreas Zeller. Fuzzing with code fragments. In Proc. USENIX Security, pages 445--458, August 2012."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273468"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11547662_15"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760267.1760289"},{"key":"e_1_3_2_1_20_1","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"Levenshtein Vladimir I.","year":"1966","unstructured":"Vladimir I. Levenshtein . Binary codes capable of correcting deletions, insertions, and reversals . Soviet Physics Doklady , 10 : 707 -- 710 , 1966 . Vladimir I. Levenshtein. Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady, 10:707--710, 1966.","journal-title":"Soviet Physics Doklady"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781148"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181782"},{"issue":"1","key":"e_1_3_2_1_24_1","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman William M.","year":"1998","unstructured":"William M. McKeeman . Differential testing for software . Digital Technical Journal , 10 ( 1 ): 100 -- 107 , December 1998 . William M. McKeeman. Differential testing for software. Digital Technical Journal, 10(1):100--107, December 1998.","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_26_1","volume-title":"Advances in Neural Information Processing Systems","author":"Pelleg Dan","year":"2004","unstructured":"Dan Pelleg and Andrew Moore . Active learning for anomaly and rare-category detection . In Advances in Neural Information Processing Systems 18, December 2004 . Dan Pelleg and Andrew Moore. Active learning for anomaly and rare-category detection. In Advances in Neural Information Processing Systems 18, December 2004."},{"key":"e_1_3_2_1_27_1","first-page":"727","volume-title":"Proc. ICML","author":"Pelleg Dan","year":"2000","unstructured":"Dan Pelleg and Andrew W. Moore . X-means: Extending K-means with efficient estimation of the number of clusters . In Proc. ICML , pages 727 -- 734 , June\/ July 2000 . Dan Pelleg and Andrew W. Moore. X-means: Extending K-means with efficient estimation of the number of clusters. In Proc. ICML, pages 727--734, June\/July 2000."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776872"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_2_1_31_1","unstructured":"Jesse Ruderman. Introducing jsfunfuzz. http:\/\/www.squarefree.com\/2007\/08\/02\/introducing-jsfunfuzz\/.  Jesse Ruderman. Introducing jsfunfuzz. http:\/\/www.squarefree.com\/2007\/08\/02\/introducing-jsfunfuzz\/."},{"key":"e_1_3_2_1_32_1","unstructured":"Jesse Ruderman. Mozilla bug 349611. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=349611 (A meta-bug containing all bugs found using jsfunfuzz.).  Jesse Ruderman. Mozilla bug 349611. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=349611 (A meta-bug containing all bugs found using jsfunfuzz.)."},{"key":"e_1_3_2_1_33_1","volume-title":"How my DOM fuzzer ignores known bugs","author":"Ruderman Jesse","year":"2010","unstructured":"Jesse Ruderman . How my DOM fuzzer ignores known bugs , 2010 . http:\/\/www.squarefree.com\/2010\/11\/21\/how-my-dom-fuzzer-ignores-known-bugs\/. Jesse Ruderman. How my DOM fuzzer ignores known bugs, 2010. http:\/\/www.squarefree.com\/2010\/11\/21\/how-my-dom-fuzzer-ignores-known-bugs\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1162\/153244303321897735"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595748"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557112"},{"key":"e_1_3_2_1_41_1","volume-title":"Dagstuhl Seminar Proceedings","author":"Walenstein Andrew","year":"2006","unstructured":"Andrew Walenstein , Mohammad El-Ramly , James R. Cordy , William S. Evans , Kiarash Mahdavi , Markus Pizka , Ganesan Ramalingam , and J\u00fcrgen Wolff von Gudenberg . Similarity in programs. In Duplication, Redundancy, and Similarity in Software , Dagstuhl Seminar Proceedings , July 2006 . Andrew Walenstein, Mohammad El-Ramly, James R. Cordy, William S. Evans, Kiarash Mahdavi, Markus Pizka, Ganesan Ramalingam, and J\u00fcrgen Wolff von Gudenberg. Similarity in programs. In Duplication, Redundancy, and Similarity in Software, Dagstuhl Seminar Proceedings, July 2006."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/186025.186103"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"event":{"name":"PLDI '13: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Seattle Washington USA","acronym":"PLDI '13","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491956.2462173","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491956.2462173","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:28:41Z","timestamp":1750217321000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491956.2462173"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,16]]},"references-count":45,"alternative-id":["10.1145\/2491956.2462173","10.1145\/2491956"],"URL":"https:\/\/doi.org\/10.1145\/2491956.2462173","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2499370.2462173","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,6,16]]},"assertion":[{"value":"2013-06-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}