{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:43:32Z","timestamp":1757310212089,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T00:00:00Z","timestamp":1515974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,15]]},"DOI":"10.1145\/3270101.3270108","type":"proceedings-article","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T13:23:10Z","timestamp":1539696190000},"page":"37-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Adaptive Grey-Box Fuzz-Testing with Thompson Sampling"],"prefix":"10.1145","author":[{"given":"Siddharth","family":"Karamcheti","sequence":"first","affiliation":[{"name":"Bloomberg, New York, NY, USA"}]},{"given":"Gideon","family":"Mann","sequence":"additional","affiliation":[{"name":"Bloomberg, New York, NY, USA"}]},{"given":"David","family":"Rosenberg","sequence":"additional","affiliation":[{"name":"Bloomberg, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,1,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 25th Annual Conference on Learning Theory (Proceedings of Machine Learning Research), Shie Mannor, Nathan Srebro, and Robert C. Williamson (Eds.)","volume":"23","author":"Agrawal Shipra","year":"2012"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Marcel B\u00f6hme Van-Thuan Pham Manh-Dung Nguyen and Abhik Roychoudhury. 2017. Directed Greybox Fuzzing. In CCS .  Marcel B\u00f6hme Van-Thuan Pham Manh-Dung Nguyen and Abhik Roychoudhury. 2017. Directed Greybox Fuzzing. In CCS .","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Konstantin B\u00f6ttinger Patrice Godefroid and Rishabh Singh. 2018. Deep Reinforcement Fuzzing. CoRR Vol. abs\/1801.04589 (2018).  Konstantin B\u00f6ttinger Patrice Godefroid and Rishabh Singh. 2018. Deep Reinforcement Fuzzing. CoRR Vol. abs\/1801.04589 (2018).","DOI":"10.1109\/SPW.2018.00026"},{"key":"e_1_3_2_1_6_1","unstructured":"Cristian Cadar Daniel Dunbar and Dawson R. Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI .   Cristian Cadar Daniel Dunbar and Dawson R. Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In OSDI ."},{"key":"e_1_3_2_1_7_1","unstructured":"DARPA CGC. 2016. Darpa cyber grand challenge binaries . https:\/\/github.com\/CyberGrandChallenge . (2016).  DARPA CGC. 2016. Darpa cyber grand challenge binaries . https:\/\/github.com\/CyberGrandChallenge . (2016)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_9_1","volume-title":"BINSEC\/SE: A Dynamic Symbolic Execution Toolkit for Binary-Level Analysis. 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)","volume":"1","author":"David Robin","year":"2016"},{"volume-title":"LAVA: Large-Scale Automated Vulnerability Addition. 2016 IEEE Symposium on Security and Privacy (SP)","year":"2016","author":"Dolan-Gavitt Brendan","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"volume-title":"Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. In SecureComm .","year":"2015","author":"Gascon Hugo","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Patrice Godefroid Michael Y. Levin and David A. Molnar. 2008. Automated Whitebox Fuzz Testing. In NDSS .  Patrice Godefroid Michael Y. Levin and David A. Molnar. 2008. Automated Whitebox Fuzz Testing. In NDSS ."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"key":"e_1_3_2_1_15_1","unstructured":"Aki Helin. 2006. Radamsa fuzzer. https:\/\/github.com\/aoh\/radamsa . (2006).  Aki Helin. 2006. Radamsa fuzzer. https:\/\/github.com\/aoh\/radamsa . (2006)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ATS.2010.19"},{"key":"e_1_3_2_1_17_1","unstructured":"Caca Labs. 2007. ZZUF - Multipurpose fuzzer . http:\/\/caca.zoy.org\/wiki\/zzuf . (2007).  Caca Labs. 2007. ZZUF - Multipurpose fuzzer . http:\/\/caca.zoy.org\/wiki\/zzuf . (2007)."},{"key":"e_1_3_2_1_18_1","unstructured":"Caroline Lemieux and Koushik Sen. 2017. FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage. CoRR Vol. abs\/1709.07101 (2017).  Caroline Lemieux and Koushik Sen. 2017. FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage. CoRR Vol. abs\/1709.07101 (2017)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509553"},{"key":"e_1_3_2_1_21_1","unstructured":"Kin-Keung Ma Yit Phang Khoo Jeffrey S. Foster and Michael Hicks. 2011. Directed Symbolic Execution. In SAS .   Kin-Keung Ma Yit Phang Khoo Jeffrey S. Foster and Michael Hicks. 2011. Directed Symbolic Execution. In SAS ."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Corina S. Pasareanu Neha Rungta and Willem Visser. 2011. Symbolic execution with mixed concrete-symbolic solving. In ISSTA .  Corina S. Pasareanu Neha Rungta and Willem Visser. 2011. Symbolic execution with mixed concrete-symbolic solving. In ISSTA .","DOI":"10.1145\/2001420.2001425"},{"key":"e_1_3_2_1_24_1","unstructured":"Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR Vol. abs\/1711.04596 (2017).  Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR Vol. abs\/1711.04596 (2017)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS .  Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS .","DOI":"10.14722\/ndss.2017.23404"},{"volume-title":"Optimizing Seed Selection for Fuzzing. In USENIX Security Symposium .","year":"2014","author":"Rebert Alexandre","key":"e_1_3_2_1_26_1"},{"volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS .","year":"2016","author":"Stephens Nick","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Fish Wang and Yan Shoshitaishvili. 2017. Angr - The Next Generation of Binary Analysis. 2017 IEEE Cybersecurity Development (SecDev) (2017) 8--9.  Fish Wang and Yan Shoshitaishvili. 2017. Angr - The Next Generation of Binary Analysis. 2017 IEEE Cybersecurity Development (SecDev) (2017) 8--9.","DOI":"10.1109\/SecDev.2017.14"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992698"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_31_1","unstructured":"Michal Zalewski. 2016. FidgetyAFL . https:\/\/groups.google.com\/d\/msg\/afl-users\/ fOPeb62FZUg\/CES5lhznDgAJ. (2016).  Michal Zalewski. 2016. FidgetyAFL . https:\/\/groups.google.com\/d\/msg\/afl-users\/ fOPeb62FZUg\/CES5lhznDgAJ. (2016)."},{"key":"e_1_3_2_1_32_1","unstructured":"Michal Zawlewski. 2017. American Fuzzy Lop (AFL) Fuzzer . http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt . (2017).  Michal Zawlewski. 2017. American Fuzzy Lop (AFL) Fuzzer . http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt . (2017)."},{"key":"e_1_3_2_1_33_1","unstructured":"Michal Zawlewski. 2018a. AFL Bug-O-Rama Trophy Case . http:\/\/lcamtuf.coredump.cx\/afl\/#bugs . (2018).  Michal Zawlewski. 2018a. AFL Bug-O-Rama Trophy Case . http:\/\/lcamtuf.coredump.cx\/afl\/#bugs . (2018)."},{"key":"e_1_3_2_1_34_1","unstructured":"Michal Zawlewski. 2018b. AFL Technical Details . http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt . (2018).  Michal Zawlewski. 2018b. AFL Technical Details . http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt . (2018)."}],"event":{"name":"CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Toronto Canada","acronym":"CCS '18"},"container-title":["Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3270101.3270108","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3270101.3270108","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:26Z","timestamp":1750208546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3270101.3270108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,15]]},"references-count":34,"alternative-id":["10.1145\/3270101.3270108","10.1145\/3270101"],"URL":"https:\/\/doi.org\/10.1145\/3270101.3270108","relation":{},"subject":[],"published":{"date-parts":[[2018,1,15]]},"assertion":[{"value":"2018-01-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}