{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:56:52Z","timestamp":1776092212990,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1704253"],"award-info":[{"award-number":["CNS-1704253"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ONR","award":["N00014-15-1-2948"],"award-info":[{"award-number":["N00014-15-1-2948"]}]},{"name":"DARPA","award":["FA8750-15-2-0084"],"award-info":[{"award-number":["FA8750-15-2-0084"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134105","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"347-362","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Rise of the HaCRS"],"prefix":"10.1145","author":[{"given":"Yan","family":"Shoshitaishvili","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Michael","family":"Weissbacher","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Lukas","family":"Dresel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Christopher","family":"Salls","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Ruoyu","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Christopher","family":"Kruegel","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142055.1142067"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653737"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_2_6_1","volume-title":"A Concise Economic History of the World: From Paleolithic Times to the Present","author":"Cameron Rondo E","unstructured":"Rondo E Cameron. 1993. A Concise Economic History of the World: From Paleolithic Times to the Present. Oxford University Press, USA."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_2_8_1","unstructured":"DARPA. 2016. CFE File Archive. (2016). http:\/\/repo.cybergrandchallenge.com\/cfe\/."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2318202.2318210"},{"key":"e_1_3_2_2_10_1","unstructured":"Joshua Drake. 2015. Stagefright - Blackhat 2015 Slides. (2015). https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Drake-StagefrightScary-Code-In-The-Heart-Of-Android.pdf."},{"key":"e_1_3_2_2_11_1","volume-title":"Increased Diels-Alderase Activity through Backbone Remodeling Guided by Foldit Players. Nature biotechnology 30, 2","author":"Eiben Christopher B","year":"2012","unstructured":"Christopher B Eiben, Justin B Siegel, Jacob B Bale, Seth Cooper, Firas Khatib, Betty W Shen, Barry L Stoddard, Zoran Popovic, and David Baker. 2012. Increased Diels-Alderase Activity through Backbone Remodeling Guided by Foldit Players. Nature biotechnology 30, 2 (2012)."},{"key":"e_1_3_2_2_12_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid, Michael Y Levin, and David A Molnar. 2008. Automated Whitebox Fuzz Testing. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.20"},{"key":"e_1_3_2_2_15_1","volume-title":"https:\/\/www.iarpa.gov\/index.php\/research-programs\/stonesoup","author":"Program IARPA.","year":"2010","unstructured":"IARPA. 2010. STONESOUP Program. (2010). https:\/\/www.iarpa.gov\/index.php\/research-programs\/stonesoup."},{"key":"e_1_3_2_2_16_1","volume-title":"Peach Fuzzer: Discover unknown vulnerabilities.","author":"Peach Inc.","year":"2013","unstructured":"Peach Inc. 2013. Peach Fuzzer: Discover unknown vulnerabilities. (2013). http:\/\/peachfuzzer.com."},{"key":"e_1_3_2_2_17_1","volume-title":"The Disappearing Spoon: And Other True Tales of Madness, Love, and the History of the World from the Periodic Table of the Elements. Little","author":"Kean Sam","unstructured":"Sam Kean. 2010. The Disappearing Spoon: And Other True Tales of Madness, Love, and the History of the World from the Periodic Table of the Elements. Little, Brown and Company."},{"key":"e_1_3_2_2_18_1","volume-title":"Social Classification Structures: Optimal Decision Making in an Organization. Late breaking papers of GECCO","author":"Kosoruko Alexander","year":"2000","unstructured":"Alexander Kosoruko. 2000. Social Classification Structures: Optimal Decision Making in an Organization. Late breaking papers of GECCO (2000), 175--178."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2001.972056"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228590"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the Symposium on Network and Distributed System Security (NDSS).","author":"Lin Zhiqiang","year":"2008","unstructured":"Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, and Xiangyu Zhang. 2008. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In Proceedings of the Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 9th International Conference on the Foundations of Digital Games (FDG). Society for the Advancement of the Science of Digital Games, Liberty of the Seas, Caribbean.","author":"Logas Heather","year":"2014","unstructured":"Heather Logas, Jim Whitehead, Michael Mateas, Richard Vallejos, Lauren Scott, Dan Shapiro, John Murray, Kate Compton, Joseph Osborn, Orlando Salvatore, Zhongpeng Lin, Michael Shavlovsky, Daniel Cetina, Shayne Clementi, and Chris Lewis. 2014. Software Verification Games: Designing Xylem, The Code of Plants. In Proceedings of the 9th International Conference on the Foundations of Digital Games (FDG). Society for the Advancement of the Science of Digital Games, Liberty of the Seas, Caribbean."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491450"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_2_25_1","volume-title":"AAAI Spring Symposium: Logical Formalizations of Commonsense Reasoning.","author":"Shahaf Dafna","year":"2007","unstructured":"Dafna Shahaf and Eyal Amir. 2007. Towards a Theory of AI Completeness. In AAAI Spring Symposium: Logical Formalizations of Commonsense Reasoning."},{"key":"e_1_3_2_2_26_1","unstructured":"Shellphish. 2016. Shellphish - The Cyber Grand Challenge. (2016). http:\/\/shellphish.net\/cgc."},{"key":"e_1_3_2_2_27_1","unstructured":"Shellphish. 2017. Cyber Grand Shellphish. (2017). http:\/\/phrack.org\/papers\/cyber_grand_shellphish.html."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_2_30_1","unstructured":"The Verge. 2016. Google rebuilt a core part of Android to kill the Stagefright vulnerability for good. (2016). http:\/\/www.theverge.com\/2016\/9\/6\/12816386\/android-nougat-stagefright-security-update-mediaserver."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985733"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124782"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1160379"},{"key":"e_1_3_2_2_34_1","unstructured":"Mike Walker. 2016. The DARPA Cyber Grand Challenge. https:\/\/www.cybergrandchallenge.com\/. (2016)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23225"},{"key":"e_1_3_2_2_36_1","volume-title":"Reassembleable Disassembling. In Proceedings of the USENIX Security Symposium.","author":"Wang Shuai","year":"2015","unstructured":"Shuai Wang, Pei Wang, and Dinghao Wu. 2015. Reassembleable Disassembling. In Proceedings of the USENIX Security Symposium."},{"key":"e_1_3_2_2_37_1","volume-title":"Edward M Edmondson, Lucy F Fortson, Sugata Kaviraj, William C Keel, et al.","author":"Willett Kyle W","year":"2013","unstructured":"Kyle W Willett, Chris J Lintott, Steven P Bamford, Karen L Masters, Brooke D Simmons, Kevin RV Casteels, Edward M Edmondson, Lucy F Fortson, Sugata Kaviraj, William C Keel, et al. 2013. Galaxy Zoo 2: detailed morphological classifications for 304,122 galaxies from the Sloan Digital Sky Survey. Monthly Notices of the Royal Astronomical Society (2013)."},{"key":"e_1_3_2_2_38_1","unstructured":"Michal Zalewski. 2014. American Fuzzy Lop. (2014). http:\/\/lcamtuf.coredump.cx\/afl\/."}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134105","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134105"}},"subtitle":["Augmenting Autonomous Cyber Reasoning Systems with Human Assistance"],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":37,"alternative-id":["10.1145\/3133956.3134105","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134105","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}