{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:37:16Z","timestamp":1766137036487,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T00:00:00Z","timestamp":1531353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1409872, CCF-1423645, TWC-1409915"],"award-info":[{"award-number":["CCF-1409872, CCF-1423645, TWC-1409915"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-15-2-0104"],"award-info":[{"award-number":["FA8750-15-2-0104"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,12]]},"DOI":"10.1145\/3213846.3213874","type":"proceedings-article","created":{"date-parts":[[2018,7,12]],"date-time":"2018-07-12T17:46:44Z","timestamp":1531417604000},"page":"254-265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":127,"title":["PerfFuzz: automatically generating pathological inputs"],"prefix":"10.1145","author":[{"given":"Caroline","family":"Lemieux","sequence":"first","affiliation":[{"name":"University of California at Berkeley, USA"}]},{"given":"Rohan","family":"Padhye","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, USA"}]},{"given":"Koushik","family":"Sen","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, USA"}]},{"given":"Dawn","family":"Song","sequence":"additional","affiliation":[{"name":"University of California at Berkeley, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,7,12]]},"reference":[{"volume-title":"Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2011-3414","year":"2011","key":"e_1_3_2_1_1_1","unstructured":"2011. CVE-2011-3414. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2011-3414 2011 . CVE- 2011-4858. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2011-4858 2014. CVE-2014-5265. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2014-5265 2016. libFuzzer. http:\/\/llvm.org\/docs\/LibFuzzer.html. Accessed Jan 2018. 2017. CVE-2017-9804. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2017-9804 2017. wf - Simple word frequency counter. https:\/\/fedora.pkgs.org\/27\/ fedora-x86_64\/wf-0.41-16.fc27.x86_64.rpm.html Accessed Jan 2018. 2011. CVE-2011-3414. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2011-3414 2011. CVE-2011-4858. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2011-4858 2014. CVE-2014-5265. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2014-5265 2016. libFuzzer. http:\/\/llvm.org\/docs\/LibFuzzer.html. Accessed Jan 2018. 2017. CVE-2017-9804. Available from MITRE. https:\/\/cve.mitre.org\/cgi-bin\/ cvename.cgi?name=CVE-2017-9804 2017. wf - Simple word frequency counter. https:\/\/fedora.pkgs.org\/27\/ fedora-x86_64\/wf-0.41-16.fc27.x86_64.rpm.html Accessed Jan 2018."},{"key":"e_1_3_2_1_2_1","volume-title":"Announcing OSS-Fuzz: Continuous Fuzzing for Open Source Software. https:\/\/github.com\/google\/oss-fuzz. Accessed","author":"Aizatsky Mike","year":"2018","unstructured":"Mike Aizatsky , Kostya Serebryany , Oliver Chang , Abhishek Arya , and Meredith Whittaker . 2016. Announcing OSS-Fuzz: Continuous Fuzzing for Open Source Software. https:\/\/github.com\/google\/oss-fuzz. Accessed Jan 2018 . Mike Aizatsky, Kostya Serebryany, Oliver Chang, Abhishek Arya, and Meredith Whittaker. 2016. Announcing OSS-Fuzz: Continuous Fuzzing for Open Source Software. https:\/\/github.com\/google\/oss-fuzz. Accessed Jan 2018."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792771"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.47"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1994.342718"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568293"},{"volume-title":"Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 29)","author":"Ball Thomas","key":"e_1_3_2_1_7_1","unstructured":"Thomas Ball and James R. Larus . 1996. Efficient Path Profiling . In Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 29) . IEEE Computer Society, Washington, DC, USA, 46\u201357. http:\/\/dl.acm.org\/ citation.cfm?id=243846.243857 Thomas Ball and James R. Larus. 1996. Efficient Path Profiling. In Proceedings of the 29th Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO 29). IEEE Computer Society, Washington, DC, USA, 46\u201357. http:\/\/dl.acm.org\/ citation.cfm?id=243846.243857"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268958"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/827272.829144"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070545"},{"key":"e_1_3_2_1_12_1","unstructured":"Mathias Bynens. 2014. In search of the perfect  Mathias Bynens. 2014. In search of the perfect"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908)","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908) . Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201908)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884794"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110358"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254076"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 12th Conference on USENIX Security Symposium -","volume":"12","author":"Scott","unstructured":"Scott A. Crosby and Dan S. Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks . In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 (SSYM\u201903). USENIX Association, Berkeley, CA, USA, 3\u20133. http:\/\/dl.acm.org\/citation.cfm?id=1251353.1251356 Scott A. Crosby and Dan S. Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks. In Proceedings of the 12th Conference on USENIX Security Symposium - Volume 12 (SSYM\u201903). USENIX Association, Berkeley, CA, USA, 3\u20133. http:\/\/dl.acm.org\/citation.cfm?id=1251353.1251356"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_24"},{"key":"e_1_3_2_1_21_1","unstructured":"Christian Ferdinand Reinhold Heckmann Marc Langenbach Florian Martin Michael Schmidt Henrik Theiling Stephan Thesing and Reinhard Wilhelm. 2001.  Christian Ferdinand Reinhold Heckmann Marc Langenbach Florian Martin Michael Schmidt Henrik Theiling Stephan Thesing and Reinhard Wilhelm. 2001."},{"volume-title":"International Workshop on Embedded Software. Springer, 469\u2013485","author":"Reliable","key":"e_1_3_2_1_22_1","unstructured":"Reliable and precise WCET determination for a real-life processor . In International Workshop on Embedded Software. Springer, 469\u2013485 . Reliable and precise WCET determination for a real-life processor. In International Workshop on Embedded Software. Springer, 469\u2013485."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287681"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/872726.806987"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337242"},{"key":"e_1_3_2_1_30_1","unstructured":"2337242  2337242"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966955"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"key":"e_1_3_2_1_33_1","volume-title":"Search-based software engineering. Information and software Technology 43, 14","author":"Harman Mark","year":"2001","unstructured":"Mark Harman and Bryan F Jones . 2001. Search-based software engineering. Information and software Technology 43, 14 ( 2001 ), 833\u2013839. Mark Harman and Bryan F Jones. 2001. Search-based software engineering. Information and software Technology 43, 14 (2001), 833\u2013839."},{"key":"e_1_3_2_1_34_1","unstructured":"Sam Hocevar. 2007. zzuf. http:\/\/caca.zoy.org\/wiki\/zzuf. Accessed Jan 2018.  Sam Hocevar. 2007. zzuf. http:\/\/caca.zoy.org\/wiki\/zzuf. Accessed Jan 2018."},{"volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12).","author":"Holler Christian","key":"e_1_3_2_1_35_1","unstructured":"Christian Holler , Kim Herzig , and Andreas Zeller . 2012. Fuzzing with Code Fragments . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with Code Fragments. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"e_1_3_2_1_37_1","volume-title":"Rajan","author":"Li Guodong","year":"2011","unstructured":"Guodong Li , Indradeep Ghosh , and Sreeranga P . Rajan . 2011 . KLOVER : A Symbolic Execution and Automatic Test Generation Tool for C++ Programs. In CAV. 609\u2013615. Guodong Li, Indradeep Ghosh, and Sreeranga P. Rajan. 2011. KLOVER: A Symbolic Execution and Automatic Test Generation Tool for C++ Programs. In CAV. 609\u2013615."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889164"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"volume-title":"Art of Software Testing","author":"Myers Glenford J.","key":"e_1_3_2_1_40_1","unstructured":"Glenford J. Myers . 1979. Art of Software Testing . John Wiley & amp; Sons, Inc., New York, NY, USA. Glenford J. Myers. 1979. Art of Software Testing. John Wiley &amp; Sons, Inc., New York, NY, USA."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)81042-9"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486862"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737966"},{"key":"e_1_3_2_1_44_1","unstructured":"2737966  2737966"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297902"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.50"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610393"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771816"},{"key":"e_1_3_2_1_52_1","unstructured":"2771816  2771816"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660234"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792786.1792798"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168830"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273483"},{"key":"e_1_3_2_1_59_1","unstructured":"Micha\u0142 Zalewski. 2014. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl. Accessed Jan 2018.  Micha\u0142 Zalewski. 2014. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl. Accessed Jan 2018."},{"key":"e_1_3_2_1_60_1","unstructured":"Micha\u0142 Zalewski. 2014. American Fuzzy Lop Technical Details. http:\/\/lcamtuf. coredump.cx\/afl\/technical_details.txt. Accessed Jan 2018.  Micha\u0142 Zalewski. 2014. American Fuzzy Lop Technical Details. http:\/\/lcamtuf. coredump.cx\/afl\/technical_details.txt. Accessed Jan 2018."},{"key":"e_1_3_2_1_61_1","volume-title":"https:\/\/groups.google.com\/d\/msg\/afl-users\/ fOPeb62FZUg\/CES5lhznDgAJ. Accessed","author":"Zalewski Micha\u0142","year":"2018","unstructured":"Micha\u0142 Zalewski . 2016. Fidgety AFL. https:\/\/groups.google.com\/d\/msg\/afl-users\/ fOPeb62FZUg\/CES5lhznDgAJ. Accessed Jan 2018 . Micha\u0142 Zalewski. 2016. FidgetyAFL. https:\/\/groups.google.com\/d\/msg\/afl-users\/ fOPeb62FZUg\/CES5lhznDgAJ. Accessed Jan 2018."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254074"},{"key":"e_1_3_2_1_63_1","volume-title":"A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks","author":"Zargar Saman Taghavi","year":"2013","unstructured":"Saman Taghavi Zargar , James Joshi , and David Tipper . 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks . IEEE Communications Surveys &amp; Tutorials 15, 4 ( 2013 ), 2046\u20132069. Saman Taghavi Zargar, James Joshi, and David Tipper. 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Communications Surveys &amp; Tutorials 15, 4 (2013), 2046\u20132069."}],"event":{"name":"ISSTA '18: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Amsterdam Netherlands","acronym":"ISSTA '18"},"container-title":["Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3213846.3213874","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3213846.3213874","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3213846.3213874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:42Z","timestamp":1750212462000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3213846.3213874"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,12]]},"references-count":62,"alternative-id":["10.1145\/3213846.3213874","10.1145\/3213846"],"URL":"https:\/\/doi.org\/10.1145\/3213846.3213874","relation":{},"subject":[],"published":{"date-parts":[[2018,7,12]]},"assertion":[{"value":"2018-07-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}