{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:16:45Z","timestamp":1776122205974,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T00:00:00Z","timestamp":1464825600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,2]]},"DOI":"10.1145\/2908080.2908095","type":"proceedings-article","created":{"date-parts":[[2016,6,2]],"date-time":"2016-06-02T15:23:42Z","timestamp":1464881022000},"page":"85-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":138,"title":["Coverage-directed differential testing of JVM implementations"],"prefix":"10.1145","author":[{"given":"Yuting","family":"Chen","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, China"}]},{"given":"Ting","family":"Su","sequence":"additional","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Chengnian","family":"Sun","sequence":"additional","affiliation":[{"name":"University of California at Davis, USA"}]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[{"name":"University of California at Davis, USA"}]},{"given":"Jianjun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, China \/ Kyushu University, Japan"}]}],"member":"320","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/lcamtuf.coredump.cx\/afl\/. https:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/gcc.gnu.org\/onlinedocs\/gcj\/index. html. https:\/\/gcc.gnu.org\/onlinedocs\/gcj\/index. html."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259056"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2013.99"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2013.35"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.10"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786835"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462173"},{"issue":"4","key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1080\/00031305.1995.10476177","article-title":"Understanding the Metropolis-Hastings algorithm","volume":"49","author":"Chib S.","year":"1995","unstructured":"S. Chib and E. Greenberg . Understanding the Metropolis-Hastings algorithm . The American Statistician , 49 ( 4 ): 327 \u2013 335 , Nov. 1995 . S. Chib and E. Greenberg. Understanding the Metropolis-Hastings algorithm. The American Statistician, 49(4):327\u2013335, Nov. 1995.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.116"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2008","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Y. Levin , and D. A. Molnar . Automated whitebox fuzz testing . In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008 , 2008 . P. Godefroid, M. Y. Levin, and D. A. Molnar. Automated whitebox fuzz testing. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, 2008."},{"key":"e_1_3_2_1_13_1","volume-title":"Java SE 8 Edition.","author":"Gosling J.","year":"2015","unstructured":"J. Gosling , B. Joy , G. Steele , G. Bracha , and A. Buckley . The Java Language Specification , Java SE 8 Edition. 2015 . URL http:\/\/docs.oracle.com\/javase\/ specs\/jls\/se8\/jls8.pdf. J. Gosling, B. Joy, G. Steele, G. Bracha, and A. Buckley. The Java Language Specification, Java SE 8 Edition. 2015. URL http:\/\/docs.oracle.com\/javase\/ specs\/jls\/se8\/jls8.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.68"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 21st USENIX Security Symposium (USENIX Security 2012)","author":"Holler C.","year":"2012","unstructured":"C. Holler , K. Herzig , and A. Zeller . Fuzzing with code fragments . In Proceedings of the 21st USENIX Security Symposium (USENIX Security 2012) , 2012 . C. Holler, K. Herzig, and A. Zeller. Fuzzing with code fragments. In Proceedings of the 21st USENIX Security Symposium (USENIX Security 2012), 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390645"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2731186.2731198"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594334"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814319"},{"key":"e_1_3_2_1_20_1","volume-title":"The Java Virtual Machine Specification: Java SE 7 Edition","author":"Lindholm T.","year":"2013","unstructured":"T. Lindholm , F. Yellin , G. Bracha , and A. Buckley . The Java Virtual Machine Specification: Java SE 7 Edition . 2013 . URL http:\/\/docs.oracle.com\/javase\/ specs\/jvms\/se7\/html\/index.html. T. Lindholm, F. Yellin, G. Bracha, and A. Buckley. The Java Virtual Machine Specification: Java SE 7 Edition. 2013. URL http:\/\/docs.oracle.com\/javase\/ specs\/jvms\/se7\/html\/index.html."},{"key":"e_1_3_2_1_21_1","volume-title":"The Java Virtual Machine Specification: Java SE 8 Edition","author":"Lindholm T.","year":"2015","unstructured":"T. Lindholm , F. Yellin , G. Bracha , and A. Buckley . The Java Virtual Machine Specification: Java SE 8 Edition . 2015 . URL http:\/\/docs.oracle.com\/javase\/ specs\/jvms\/se8\/html\/index.html. T. Lindholm, F. Yellin, G. Bracha, and A. Buckley. The Java Virtual Machine Specification: Java SE 8 Edition. 2015. URL http:\/\/docs.oracle.com\/javase\/ specs\/jvms\/se8\/html\/index.html."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831730"},{"issue":"1","key":"e_1_3_2_1_23_1","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman W. M.","year":"1998","unstructured":"W. M. McKeeman . Differential testing for software . Digital Technical Journal , 10 ( 1 ): 100 \u2013 107 , 1998 . W. M. McKeeman. Differential testing for software. Digital Technical Journal, 10(1):100\u2013107, 1998.","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1063\/1.1699114"},{"key":"e_1_3_2_1_25_1","volume-title":"O\u2019Reilly","author":"Meyer J.","year":"1997","unstructured":"J. Meyer and T. Downing . Java Virtual Machine . O\u2019Reilly , 1997 . J. Meyer and T. Downing. Java Virtual Machine. O\u2019Reilly, 1997."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_28_1","unstructured":"J. Ruderman. Introducing jsfunfuzz. URL http:\/\/www.squarefree.com\/2007\/08\/02\/ introducing-jsfunfuzz\/. J. Ruderman. Introducing jsfunfuzz. URL http:\/\/www.squarefree.com\/2007\/08\/02\/ introducing-jsfunfuzz\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451150"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/331960.331965"},{"key":"e_1_3_2_1_31_1","first-page":"130","volume-title":"Proceedings of the 8th Asian Symposium on Programming Languages and Systems (APLAS 2010","author":"Tan G.","year":"2010","unstructured":"G. Tan . JNI light : An operational model for the core JNI . In Proceedings of the 8th Asian Symposium on Programming Languages and Systems (APLAS 2010 ), pages 114\u2013 130 , 2010 . G. Tan. JNI light: An operational model for the core JNI. In Proceedings of the 8th Asian Symposium on Programming Languages and Systems (APLAS 2010), pages 114\u2013130, 2010."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2663608.2663610"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483787"},{"key":"e_1_3_2_1_34_1","unstructured":"S. T.V. Oracle JRockit Diagnostics and Troubleshooting Guide Release R28. 2011. URL http:\/\/docs.oracle.com\/ cd\/E15289_01\/doc.40\/e15059.pdf. S. T.V. Oracle JRockit Diagnostics and Troubleshooting Guide Release R28. 2011. URL http:\/\/docs.oracle.com\/ cd\/E15289_01\/doc.40\/e15059.pdf."},{"key":"e_1_3_2_1_35_1","first-page":"13","volume-title":"Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research","author":"Vall\u00e9e-Rai R.","year":"1999","unstructured":"R. Vall\u00e9e-Rai , P. Co , E. Gagnon , L. J. Hendren , P. Lam , and V. Sundaresan . Soot - a Java bytecode optimization framework . In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research , page 13 , 1999 . R. Vall\u00e9e-Rai, P. Co, E. Gagnon, L. J. Hendren, P. Lam, and V. Sundaresan. Soot - a Java bytecode optimization framework. In Proceedings of the 1999 conference of the Centre for Advanced Studies on Collaborative Research, page 13, 1999."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/950789.951280"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875558.1875601"}],"event":{"name":"PLDI '16: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Santa Barbara CA USA","acronym":"PLDI '16","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908080.2908095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2908080.2908095","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:54:49Z","timestamp":1750208089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2908080.2908095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,2]]},"references-count":38,"alternative-id":["10.1145\/2908080.2908095","10.1145\/2908080"],"URL":"https:\/\/doi.org\/10.1145\/2908080.2908095","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2980983.2908095","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2016,6,2]]},"assertion":[{"value":"2016-06-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}