{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:44Z","timestamp":1750306604777,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2714576.2714607","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"31-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile Devices"],"prefix":"10.1145","author":[{"given":"Wang Hao","family":"Lee","sequence":"first","affiliation":[{"name":"Institute for Infocomm Research, Singapore, Singapore"}]},{"given":"Murali","family":"Srirangam Ramanujam","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore, Singapore"}]},{"given":"S.P.T.","family":"Krishnan","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"volume-title":"Install It Now To Help Community Find Exploits For Untethered Jailbreak redmonpie.com","year":"2011","author":"Imran A.","key":"e_1_3_2_1_1_1"},{"volume-title":"June","year":"2013","author":"Drake J.","key":"e_1_3_2_1_2_1"},{"volume-title":"Fuzzing: Brute Force Vulnerability Discovery","year":"2007","author":"Sutton Michael","key":"e_1_3_2_1_3_1"},{"volume-title":"New Sophos Survey Reveals","year":"2013","author":"Release Sophos Press","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"National Cyber Awareness System - Vulnerability Summary for CVE-2012-0003 http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2012-0003  National Cyber Awareness System - Vulnerability Summary for CVE-2012-0003 http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2012-0003"},{"key":"e_1_3_2_1_6_1","unstructured":"National Cyber Awareness System - Vulnerability Summary for CVE-2013-0976: http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-0976  National Cyber Awareness System - Vulnerability Summary for CVE-2013-0976: http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-0976"},{"key":"e_1_3_2_1_7_1","unstructured":"National Cyber Awareness System - Vulnerability Summary for CVE-2013-1750 http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-1750  National Cyber Awareness System - Vulnerability Summary for CVE-2013-1750 http:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2013-1750"},{"volume-title":"23rd USENIX Security Symposium","year":"2014","author":"Rebert A.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","first-page":"31","volume":"89","author":"Format Graphics Interchange","year":"1990","journal-title":"Version"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2010.03.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_12_1","unstructured":"Open-source software for volunteer computing and grid computing. https:\/\/boinc.berkeley.edu\/  Open-source software for volunteer computing and grid computing. https:\/\/boinc.berkeley.edu\/"},{"key":"e_1_3_2_1_13_1","unstructured":"SETI@home http:\/\/setiathome.ssl.berkeley.edu\/  SETI@home http:\/\/setiathome.ssl.berkeley.edu\/"},{"volume-title":"Independent Security Evaluators","year":"2007","author":"Miller C.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"Google Custom Search Engine. https:\/\/www.google.com\/cse\/  Google Custom Search Engine. https:\/\/www.google.com\/cse\/"},{"key":"e_1_3_2_1_16_1","unstructured":"Bing Search API. http:\/\/datamarket.azure.com\/dataset\/bing\/search  Bing Search API. http:\/\/datamarket.azure.com\/dataset\/bing\/search"},{"key":"e_1_3_2_1_17_1","unstructured":"Hachoir Project. https:\/\/pypi.python.org\/pypi\/hachoir-core  Hachoir Project. https:\/\/pypi.python.org\/pypi\/hachoir-core"},{"key":"e_1_3_2_1_18_1","first-page":"10","volume":"15948","author":"Portable Network Information","year":"2003","journal-title":"ISO\/IEC"},{"key":"e_1_3_2_1_19_1","unstructured":"Skia 2D graphics library - https:\/\/code.google.com\/p\/skia\/  Skia 2D graphics library - https:\/\/code.google.com\/p\/skia\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Apple iOS ImageIO - https:\/\/developer.apple.com\/library\/ios\/documentation\/GraphicsImaging\/Conceptual\/ImageIOGuide  Apple iOS ImageIO - https:\/\/developer.apple.com\/library\/ios\/documentation\/GraphicsImaging\/Conceptual\/ImageIOGuide"},{"key":"e_1_3_2_1_22_1","unstructured":"!exploitable http:\/\/msecdbg.codeplex.com\/  !exploitable http:\/\/msecdbg.codeplex.com\/"},{"key":"e_1_3_2_1_23_1","unstructured":"Binary Diff Utility FreeBSD Man Pages  Binary Diff Utility FreeBSD Man Pages"},{"volume-title":"Accessing CrashWrangler to analyze crashes for security implications","year":"2014","author":"Library Mac Developer","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"(SIGSEGV) fault addr deadbaad https:\/\/groups.google.com\/forum\/#!topic\/android-ndk\/jQg6DM6-D6o  (SIGSEGV) fault addr deadbaad https:\/\/groups.google.com\/forum\/#!topic\/android-ndk\/jQg6DM6-D6o"},{"key":"e_1_3_2_1_26_1","unstructured":"C. Labs. zzuf: multi-purpose fuzzer. http:\/\/caca.zoy.org\/wiki\/zzuf.  C. Labs. zzuf: multi-purpose fuzzer. http:\/\/caca.zoy.org\/wiki\/zzuf."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"volume-title":"Google Security Team: Fuzzing at scale http:\/\/googleonlinesecurity.blogspot.sg\/2011\/08\/fuzzing-at-scale.html Friday","year":"2011","author":"Evans Chris","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"Basic Fuzzing Framework. http:\/\/www.cert.org\/vulnerability-analysis\/tools\/bff.cfm  Basic Fuzzing Framework. http:\/\/www.cert.org\/vulnerability-analysis\/tools\/bff.cfm"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"e_1_3_2_1_31_1","unstructured":"Hex-Rays IDA. https:\/\/www.hex-rays.com\/products\/ida\/  Hex-Rays IDA. https:\/\/www.hex-rays.com\/products\/ida\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3711-7"}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15"},"container-title":["Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714607","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714576.2714607","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:54Z","timestamp":1750227414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714607"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":31,"alternative-id":["10.1145\/2714576.2714607","10.1145\/2714576"],"URL":"https:\/\/doi.org\/10.1145\/2714576.2714607","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}