{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T16:08:35Z","timestamp":1776701315678,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2014NCRNCR001- 21"],"award-info":[{"award-number":["NRF2014NCRNCR001- 21"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970316","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"543-553","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["Model-based whitebox fuzzing for program binaries"],"prefix":"10.1145","author":[{"given":"Van-Thuan","family":"Pham","sequence":"first","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Marcel","family":"B\u00f6hme","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"given":"Abhik","family":"Roychoudhury","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Specification of the DEFLATE Compression Algorithm. https:\/\/tools.ietf.org\/html\/rfc1951. Accessed: 2016-02-13. Specification of the DEFLATE Compression Algorithm. https:\/\/tools.ietf.org\/html\/rfc1951. Accessed: 2016-02-13."},{"key":"e_1_3_2_1_2_1","unstructured":"Tool: IDA multi-processor disassembler and debugger. https:\/\/www.hex-rays.com\/products\/ida\/. Accessed: 2016-04-04. Tool: IDA multi-processor disassembler and debugger. https:\/\/www.hex-rays.com\/products\/ida\/. Accessed: 2016-04-04."},{"key":"e_1_3_2_1_3_1","volume-title":"Peach Fuzzer Platform","unstructured":"Tool : Peach Fuzzer Platform . http:\/\/www.peachfuzzer.com\/products\/peach-platform\/. Accessed: 2016-01-23. Tool: Peach Fuzzer Platform. http:\/\/www.peachfuzzer.com\/products\/peach-platform\/. Accessed: 2016-01-23."},{"key":"e_1_3_2_1_4_1","volume-title":"Peach Fuzzer Platform (Input Model)","unstructured":"Tool : Peach Fuzzer Platform (Input Model) . http:\/\/community.peachfuzzer.com\/v3\/DataModeling.html. Accessed: 2016-01-23. Tool: Peach Fuzzer Platform (Input Model). http:\/\/community.peachfuzzer.com\/v3\/DataModeling.html. Accessed: 2016-01-23."},{"key":"e_1_3_2_1_5_1","volume-title":"SPIKE Fuzzer Platform","unstructured":"Tool : SPIKE Fuzzer Platform . http:\/\/www.immunitysec.com. Accessed: 2016-01-23. Tool: SPIKE Fuzzer Platform. http:\/\/www.immunitysec.com. Accessed: 2016-01-23."},{"key":"e_1_3_2_1_6_1","unstructured":"Tool: Suley Fuzzer. https:\/\/github.com\/OpenRCE\/sulley. Accessed: 2016-01-23. Tool: Suley Fuzzer. https:\/\/github.com\/OpenRCE\/sulley. Accessed: 2016-01-23."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_25"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"N. Bjorner and A.-D. Phan . vz - maximal satisfaction with z3 . In T. Kutsia and A. Voronkov editors SCSS 2014 . 6th International Symposium on Symbolic Computation in Software Science volume 30 of EPiC Series in Computing pages 1\u2013 9 2014. N. Bjorner and A.-D. Phan. vz - maximal satisfaction with z3. In T. Kutsia and A. Voronkov editors SCSS 2014. 6th International Symposium on Symbolic Computation in Software Science volume 30 of EPiC Series in Computing pages 1\u20139 2014.","DOI":"10.29007\/jmxj"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635923"},{"key":"e_1_3_2_1_10_1","first-page":"224","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201908","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201908 , pages 209\u2013 224 , 2008 . C. Cadar, D. Dunbar, and D. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201908, pages 209\u2013224, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_15_1","first-page":"166","volume-title":"Proceedings of the 2008 Network and Distributed System Security Symposium","volume":"8","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Y. Levin , and D. A. Molnar . Automated whitebox fuzz testing . In Proceedings of the 2008 Network and Distributed System Security Symposium , volume 8 of NDSS \u201908, pages 151\u2013 166 , 2008 . P. Godefroid, M. Y. Levin, and D. A. Molnar. Automated whitebox fuzz testing. In Proceedings of the 2008 Network and Distributed System Security Symposium, volume 8 of NDSS \u201908, pages 151\u2013166, 2008."},{"key":"e_1_3_2_1_16_1","first-page":"64","volume-title":"Proceedings of the 22Nd USENIX Conference on Security, SEC\u201913","author":"Haller I.","year":"2013","unstructured":"I. Haller , A. Slowinska , M. Neugschwandtner , and H. Bos . Dowsing for overflows: A guided fuzzer to find buffer boundary violations . In Proceedings of the 22Nd USENIX Conference on Security, SEC\u201913 , pages 49\u2013 64 , 2013 . I. Haller, A. Slowinska, M. Neugschwandtner, and H. Bos. Dowsing for overflows: A guided fuzzer to find buffer boundary violations. In Proceedings of the 22Nd USENIX Conference on Security, SEC\u201913, pages 49\u201364, 2013."},{"key":"e_1_3_2_1_17_1","first-page":"34","volume-title":"Empirical Software Engineering","author":"Kifetew F. M.","year":"2016","unstructured":"F. M. Kifetew , R. Tiella , and P. Tonella . Generating valid grammar-based test inputs by means of genetic programming and annotated grammars . Empirical Software Engineering , pages 1\u2013 34 , 2016 . F. M. Kifetew, R. Tiella, and P. Tonella. Generating valid grammar-based test inputs by means of genetic programming and annotated grammars. Empirical Software Engineering, pages 1\u201334, 2016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.02.001"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453114"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818862"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_24_1","unstructured":"Tool. LibPNG Library. http:\/\/www.libpng.org\/pub\/png\/libpng.html. Accessed: 2016-02-13. Tool. LibPNG Library. http:\/\/www.libpng.org\/pub\/png\/libpng.html. Accessed: 2016-02-13."},{"key":"e_1_3_2_1_25_1","volume-title":"Video Lan Client (VLC)","unstructured":"Tool. Video Lan Client (VLC) . http:\/\/www.videolan.org\/index.html. Accessed: 2016-02-13. Tool. Video Lan Client (VLC). http:\/\/www.videolan.org\/index.html. Accessed: 2016-02-13."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771818"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","location":"Singapore Singapore","acronym":"ASE'16","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:00Z","timestamp":1750218600000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":27,"alternative-id":["10.1145\/2970276.2970316","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970316","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}