{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:05:59Z","timestamp":1775815559541,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","award":["NRF2014NCR-NCR001-30"],"award-info":[{"award-number":["NRF2014NCR-NCR001-30"]}],"id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61370079"],"award-info":[{"award-number":["61370079"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106295","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"627-637","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":192,"title":["Steelix: program-state based binary fuzzing"],"prefix":"10.1145","author":[{"given":"Yuekang","family":"Li","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Bihuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Fudan University, China \/ Nanyang Technological University, Singapore"}]},{"given":"Mahinthan","family":"Chandramohan","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Shang-Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Alwen","family":"Tiu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1999. Tcpdump &amp; Libpcap. (1999). http:\/\/www.tcpdump.org. 2001. Libtiff. (2001). http:\/\/www.libtiff.org. 2002. Libpng. (2002). http:\/\/www.libpng.org. 2003. Gzip. (2003). http:\/\/www.gzip.org. 2005. Defense Advanced Research Projects Agency. (2005). http:\/\/www.darpa. mil\/. 2005. Dyninst API. (2005). http:\/\/www.dyninst.org\/dyninst. 2006. The Patroit Missile Failure. (2006). https:\/\/www.ima.umn.edu\/~arnold\/ disasters\/patriot.html. 2014. American fuzzy lop. (2014). http:\/\/lcamtuf.coredump.cx\/afl\/. 2014. Cyber Grand Challenge. (2014). http:\/\/archive.darpa.mil\/ cybergrandchallenge\/about.html. 2014. Spike fuzzer platform. (2014). http:\/\/www.immunitysec.com\/. 2015. AFL-dyninst. (2015). https:\/\/github.com\/vrtadmin\/moflow\/tree\/master\/ afl-dyninst. 2015. AFL-QEMU. (2015). http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt. 2015. AFLPIN. (2015). https:\/\/github.com\/mothran\/aflpin. 2015. Peach fuzzer platform. (2015). http:\/\/www.peachfuzzer.com\/products\/ peach-platform\/. 2015. Sdl Process: Verification. (2015). https:\/\/www.microsoft.com\/en-us\/sdl\/ process\/verification.aspx. 2016. The bug-o-rama trophy case of AFL. (2016). http:\/\/lcamtuf.coredump.cx\/ afl\/#bugs. 2016. Circumventing fuzzing roadblocks with compiler transformations. (2016).  1999. Tcpdump &amp; Libpcap. (1999). http:\/\/www.tcpdump.org. 2001. Libtiff. (2001). http:\/\/www.libtiff.org. 2002. Libpng. (2002). http:\/\/www.libpng.org. 2003. Gzip. (2003). http:\/\/www.gzip.org. 2005. Defense Advanced Research Projects Agency. (2005). http:\/\/www.darpa. mil\/. 2005. Dyninst API. (2005). http:\/\/www.dyninst.org\/dyninst. 2006. The Patroit Missile Failure. (2006). https:\/\/www.ima.umn.edu\/~arnold\/ disasters\/patriot.html. 2014. American fuzzy lop. (2014). http:\/\/lcamtuf.coredump.cx\/afl\/. 2014. Cyber Grand Challenge. (2014). http:\/\/archive.darpa.mil\/ cybergrandchallenge\/about.html. 2014. Spike fuzzer platform. (2014). http:\/\/www.immunitysec.com\/. 2015. AFL-dyninst. (2015). https:\/\/github.com\/vrtadmin\/moflow\/tree\/master\/ afl-dyninst. 2015. AFL-QEMU. (2015). http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt. 2015. AFLPIN. (2015). https:\/\/github.com\/mothran\/aflpin. 2015. Peach fuzzer platform. (2015). http:\/\/www.peachfuzzer.com\/products\/ peach-platform\/. 2015. Sdl Process: Verification. (2015). https:\/\/www.microsoft.com\/en-us\/sdl\/ process\/verification.aspx. 2016. The bug-o-rama trophy case of AFL. (2016). http:\/\/lcamtuf.coredump.cx\/ afl\/#bugs. 2016. Circumventing fuzzing roadblocks with compiler transformations. (2016)."},{"key":"e_1_3_2_1_2_1","volume-title":"DARPA Challenge Binaries on Linux and OS X. (2016). https:\/\/github. com\/trailofbits\/cb-multios\/","year":"2016","unstructured":"https:\/\/lafintel.wordpress.com\/2016\/08\/15\/ circumventing-fuzzing-roadblocks-with-compiler-transformations\/. 2016. DARPA Challenge Binaries on Linux and OS X. (2016). https:\/\/github. com\/trailofbits\/cb-multios\/ . 2016 . Driller Source Code. (2016). https:\/\/github.com\/shellphish\/driller. 2016. IDAPython . (2016). https:\/\/www.hex-rays.com\/products\/ida\/support\/ idapython_docs\/. 2017. Steelix. (2017). https:\/\/sites.google.com\/site\/steelix2017\/. https:\/\/lafintel.wordpress.com\/2016\/08\/15\/ circumventing-fuzzing-roadblocks-with-compiler-transformations\/. 2016. DARPA Challenge Binaries on Linux and OS X. (2016). https:\/\/github. com\/trailofbits\/cb-multios\/. 2016. Driller Source Code. (2016). https:\/\/github.com\/shellphish\/driller. 2016. IDAPython. (2016). https:\/\/www.hex-rays.com\/products\/ida\/support\/ idapython_docs\/. 2017. Steelix. (2017). https:\/\/sites.google.com\/site\/steelix2017\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Brad Arkin. 2009. Adobe Reader and Acrobat Security Initiative. (2009). http: \/\/blogs.adobe.com\/security\/2009\/05\/adobe_reader_and_acrobat_secur.html.  Brad Arkin. 2009. Adobe Reader and Acrobat Security Initiative. (2009). http: \/\/blogs.adobe.com\/security\/2009\/05\/adobe_reader_and_acrobat_secur.html."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642963"},{"key":"e_1_3_2_1_8_1","volume-title":"LAVA: Large-Scale Automated Vulnerability Addition. In SP. 110\u2013121.","author":"Dolan-Gavitt Brendan","year":"2016","unstructured":"Brendan Dolan-Gavitt , Patrick Hulin , Engin Kirda , Tim Leek , Andrea Mambretti , Wil Robertson , Frederick Ulrich , and Ryan Whelan . 2016 . LAVA: Large-Scale Automated Vulnerability Addition. In SP. 110\u2013121. Brendan Dolan-Gavitt, Patrick Hulin, Engin Kirda, Tim Leek, Andrea Mambretti, Wil Robertson, Frederick Ulrich, and Ryan Whelan. 2016. LAVA: Large-Scale Automated Vulnerability Addition. In SP. 110\u2013121."},{"key":"e_1_3_2_1_9_1","unstructured":"Chris Evans Matt Moore and Tavis Ormandy. 2011. Google online security blog \u2013 Fuzzing at scale. (2011).  Chris Evans Matt Moore and Tavis Ormandy. 2011. Google online security blog \u2013 Fuzzing at scale. (2011)."},{"key":"e_1_3_2_1_10_1","unstructured":"https:\/\/security.googleblog.com\/2011\/08\/ fuzzing-at-scale.html.  https:\/\/security.googleblog.com\/2011\/08\/ fuzzing-at-scale.html."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_13_1","unstructured":"Patrice Godefroid Michael Y. Levin and David Molnar. 2008. Automated whitebox fuzz testing. In NDSS.  Patrice Godefroid Michael Y. Levin and David Molnar. 2008. Automated whitebox fuzz testing. In NDSS."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"key":"e_1_3_2_1_15_1","unstructured":"Istvan Haller Asia Slowinska Matthias Neugschwandtner and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. In USENIX Security. 49\u201364.   Istvan Haller Asia Slowinska Matthias Neugschwandtner and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. In USENIX Security. 49\u201364."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872380"},{"key":"e_1_3_2_1_17_1","unstructured":"Christian Holler Kim Herzig and Andreas Zeller. 2012. Fuzzing with code fragments. In USENIX Security. 445\u2013458.   Christian Holler Kim Herzig and Andreas Zeller. 2012. Fuzzing with code fragments. In USENIX Security. 445\u2013458."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Ulf Karg\u00e9n and Nahid Shahmehri. 2015. Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing. In FSE. 782\u2013792.  Ulf Karg\u00e9n and Nahid Shahmehri. 2015. Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing. In FSE. 782\u2013792.","DOI":"10.1145\/2786805.2786844"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699098"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS.  Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS.","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_23_1","volume-title":"Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert , Sang Kil Cha , Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014 . Optimizing seed selection for fuzzing. In USENIX Security . 861\u2013875. Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing seed selection for fuzzing. In USENIX Security. 861\u2013875."},{"key":"e_1_3_2_1_24_1","unstructured":"Jesse Ruderman. 2007. Introducing jsfunfuzz. (2007). http:\/\/www.squarefree. com\/2007\/08\/02\/introducing-jsfunfuzz  Jesse Ruderman. 2007. Introducing jsfunfuzz. (2007). http:\/\/www.squarefree. com\/2007\/08\/02\/introducing-jsfunfuzz"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Andrew Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In S&amp;P. 138\u2013157.  Yan Shoshitaishvili Ruoyu Wang Christopher Salls Nick Stephens Mario Polino Andrew Dutcher John Grosen Siji Feng Christophe Hauser Christopher Kruegel and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In S&amp;P. 138\u2013157.","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_26_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS.","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Andrew Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS. Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Spandan Veggalam Sanjay Rawat Istvan Haller and Herbert Bos. 2016. IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming. In ESORICS. 581\u2013601.  Spandan Veggalam Sanjay Rawat Istvan Haller and Herbert Bos. 2016. IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming. In ESORICS. 581\u2013601.","DOI":"10.1007\/978-3-319-45744-4_29"},{"key":"e_1_3_2_1_28_1","first-page":"1","article-title":"Experiences with Model Inference Assisted Fuzzing","volume":"2","author":"Viide Joachim","year":"2008","unstructured":"Joachim Viide , Aki Helin , Marko Laakso , Pekka Pietik\u00e4inen , Mika Sepp\u00e4nen , Kimmo Halunen , Rauli Puuper\u00e4 , and Juha R\u00f6ning . 2008 . Experiences with Model Inference Assisted Fuzzing . In WOOT. 2 : 1 \u2013 2 :6. Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietik\u00e4inen, Mika Sepp\u00e4nen, Kimmo Halunen, Rauli Puuper\u00e4, and Juha R\u00f6ning. 2008. Experiences with Model Inference Assisted Fuzzing. In WOOT. 2:1\u20132:6.","journal-title":"WOOT."},{"key":"e_1_3_2_1_29_1","volume-title":"Skyfire: Data-Driven Seed Generation for Fuzzing. In SP. 579\u2013594.","author":"Wang Junjie","year":"2017","unstructured":"Junjie Wang , Bihuan Chen , Lei Wei , and Yang Liu . 2017 . Skyfire: Data-Driven Seed Generation for Fuzzing. In SP. 579\u2013594. Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. 2017. Skyfire: Data-Driven Seed Generation for Fuzzing. In SP. 579\u2013594."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Paderborn Germany","acronym":"ESEC\/FSE'17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106295","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:37Z","timestamp":1750217437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106295"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":31,"alternative-id":["10.1145\/3106237.3106295","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106295","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}