{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T03:43:16Z","timestamp":1773546196808,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T00:00:00Z","timestamp":1523232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,4,9]]},"DOI":"10.1145\/3167132.3167289","type":"proceedings-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T13:54:10Z","timestamp":1530626050000},"page":"1475-1482","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Improving function coverage with munch"],"prefix":"10.1145","author":[{"given":"Saahil","family":"Ognawala","sequence":"first","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Thomas","family":"Hutzelmann","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Eirini","family":"Psallida","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"given":"Alexander","family":"Pretschner","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,4,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. AFL Coverage. https:\/\/github.com\/mrash\/afl-cov. ({n. d.}). Accessed: 2017-09-09.  {n. d.}. AFL Coverage. https:\/\/github.com\/mrash\/afl-cov. ({n. d.}). Accessed: 2017-09-09."},{"key":"e_1_3_2_1_2_1","volume-title":"d.}. AFL Fuzzer"},{"key":"e_1_3_2_1_3_1","volume-title":"d.}. Peach fuzzing platform"},{"key":"e_1_3_2_1_4_1","unstructured":"D. Aitel. 2002. An introduction to SPIKE. (2002).  D. Aitel. 2002. An introduction to SPIKE. (2002)."},{"key":"e_1_3_2_1_5_1","unstructured":"S. Anand P. Godefroid and N. Tillmann. 2008. Demand-driven compositional symbolic execution. In TACAS.   S. Anand P. Godefroid and N. Tillmann. 2008. Demand-driven compositional symbolic execution. In TACAS."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991114"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"A. Biere A. Cimatti etal 2003. Bounded model checking. Advances in computers (2003).  A. Biere A. Cimatti et al. 2003. Bounded model checking. Advances in computers (2003).","DOI":"10.1016\/S0065-2458(03)58003-2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"K. B\u00f6ttinger and C. Eckert. 2016. DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries. In DIMVA.  K. B\u00f6ttinger and C. Eckert. 2016. DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries. In DIMVA.","DOI":"10.1007\/978-3-319-40667-1_2"},{"key":"e_1_3_2_1_9_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.. In OSDI.","author":"Cadar C.","year":"2008"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23404-5_19"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. Fangquan D. Chaoqun etal 2015. Binary-oriented hybrid fuzz testing. In ICSESS.  D. Fangquan D. Chaoqun et al. 2015. Binary-oriented hybrid fuzz testing. In ICSESS.","DOI":"10.1109\/ICSESS.2015.7339071"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190215.1190226"},{"key":"e_1_3_2_1_15_1","unstructured":"P. Godefroid M. Levin etal 2008. Automated Whitebox Fuzz Testing.. In NDSS.  P. Godefroid M. Levin et al. 2008. Automated Whitebox Fuzz Testing.. In NDSS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254088"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"K. Ma K. Phang etal 2011. Directed symbolic execution. In SAS.   K. Ma K. Phang et al. 2011. Directed symbolic execution. In SAS.","DOI":"10.1007\/978-3-642-23702-7_11"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970281"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"e_1_3_2_1_24_1","unstructured":"A. Pretschner. 2001. Classical search strategies for test case generation With Constraint Logic Programming. In Formal Approaches to Testing of Software.  A. Pretschner. 2001. Classical search strategies for test case generation With Constraint Logic Programming. In Formal Approaches to Testing of Software."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"R. Qiu G. Yang C. S. Pasareanu and S. Khurshid. 2015. Compositional Symbolic Execution with Memoized Replay. In ICSE.   R. Qiu G. Yang C. S. Pasareanu and S. Khurshid. 2015. Compositional Symbolic Execution with Memoized Replay. In ICSE.","DOI":"10.1109\/ICSE.2015.79"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786830"},{"key":"e_1_3_2_1_28_1","volume-title":"Driller: Augmenting fuzzing through selective symbolic execution. In NDSS.","author":"Stephens N.","year":"2016"},{"key":"e_1_3_2_1_29_1","unstructured":"M. Sutton A. Greene and P. Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education.   M. Sutton A. Greene and P. Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"}],"event":{"name":"SAC 2018: Symposium on Applied Computing","location":"Pau France","acronym":"SAC 2018","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 33rd Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167132.3167289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:06Z","timestamp":1750213566000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167132.3167289"}},"subtitle":["a hybrid fuzzing and directed symbolic execution approach"],"short-title":[],"issued":{"date-parts":[[2018,4,9]]},"references-count":29,"alternative-id":["10.1145\/3167132.3167289","10.1145\/3167132"],"URL":"https:\/\/doi.org\/10.1145\/3167132.3167289","relation":{},"subject":[],"published":{"date-parts":[[2018,4,9]]},"assertion":[{"value":"2018-04-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}