{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:28Z","timestamp":1773510928559,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T00:00:00Z","timestamp":1601856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of TianJin","award":["17JCZDJC30500"],"award-info":[{"award-number":["17JCZDJC30500"]}]},{"name":"National Natural Science Foundation of China","award":["61972215,61702399,61972073"],"award-info":[{"award-number":["61972215,61702399,61972073"]}]},{"name":"National Key R&D Program of China","award":["2018YFA0704703"],"award-info":[{"award-number":["2018YFA0704703"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,5]]},"DOI":"10.1145\/3320269.3384736","type":"proceedings-article","created":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T16:33:23Z","timestamp":1601915603000},"page":"598-609","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["PathAFL: Path-Coverage Assisted Fuzzing"],"prefix":"10.1145","author":[{"given":"Shengbo","family":"Yan","sequence":"first","affiliation":[{"name":"Nankai University, TianJin, China"}]},{"given":"Chenlu","family":"Wu","sequence":"additional","affiliation":[{"name":"Nankai University, TianJin, China"}]},{"given":"Hang","family":"Li","sequence":"additional","affiliation":[{"name":"Nankai University, TianJin, China"}]},{"given":"Wei","family":"Shao","sequence":"additional","affiliation":[{"name":"Nankai University, TianJin, China"}]},{"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[{"name":"Nankai University, TianJin, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence","volume":"19","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann , Sergej Schumilo , Tim Blazytko , Robert Gawlik , and Thorsten Holz . 2019 . REDQUEEN: Fuzzing with Input-to-State Correspondence .. In NDSS , Vol. 19. 1 -- 15 . Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS , Vol. 19. 1--15.","journal-title":"NDSS"},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX Annual Technical Conference, FREENIX Track","volume":"41","author":"Bellard Fabrice","year":"2005","unstructured":"Fabrice Bellard . 2005 . QEMU, a fast and portable dynamic translator .. In USENIX Annual Technical Conference, FREENIX Track , Vol. 41 . 46. Fabrice Bellard. 2005. QEMU, a fast and portable dynamic translator.. In USENIX Annual Technical Conference, FREENIX Track, Vol. 41. 46."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_1_5_1","first-page":"209","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , Dawson R Engler , 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs .. In OSDI , Vol. 8. 209 -- 224 . Cristian Cadar, Daniel Dunbar, Dawson R Engler, et almbox. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.. In OSDI, Vol. 8. 209--224.","journal-title":"OSDI"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.002"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329828"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00082"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155573"},{"key":"e_1_3_2_1_14_1","first-page":"76","article-title":"Method to improve edge coverage in fuzzing","volume":"40","author":"Jia Chunfu","year":"2019","unstructured":"Chunfu Jia , Shengbo Yan , Zhi Wang , Chenlu Wu , and Hang Li . 2019 . Method to improve edge coverage in fuzzing . Journal on Communications , Vol. 40 , 11 (2019), 76 -- 85 . https:\/\/doi.org\/10.11959\/j.issn.1000--436x.2019223 10.11959\/j.issn.1000--436x.2019223 Chunfu Jia, Shengbo Yan, Zhi Wang, Chenlu Wu, and Hang Li. 2019. Method to improve edge coverage in fuzzing. Journal on Communications , Vol. 40, 11 (2019), 76--85. https:\/\/doi.org\/10.11959\/j.issn.1000--436x.2019223","journal-title":"Journal on Communications"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_16_1","volume-title":"Optimization by simulated annealing. science","author":"Kirkpatrick Scott","year":"1983","unstructured":"Scott Kirkpatrick , C Daniel Gelatt , and Mario P Vecchi . 1983. Optimization by simulated annealing. science , Vol. 220 , 4598 ( 1983 ), 671--680. Scott Kirkpatrick, C Daniel Gelatt, and Mario P Vecchi. 1983. Optimization by simulated annealing. science , Vol. 220, 4598 (1983), 671--680."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_1_23_1","volume-title":"Compositional Fuzzing Aided by Targeted Symbolic Execution. arXiv preprint arXiv:1903.02981","author":"Ognawala Saahil","year":"2019","unstructured":"Saahil Ognawala , Fabian Kilger , and Alexander Pretschner . 2019. Compositional Fuzzing Aided by Targeted Symbolic Execution. arXiv preprint arXiv:1903.02981 ( 2019 ). Saahil Ognawala, Fabian Kilger, and Alexander Pretschner. 2019. Compositional Fuzzing Aided by Targeted Symbolic Execution. arXiv preprint arXiv:1903.02981 (2019)."},{"key":"e_1_3_2_1_24_1","volume-title":"27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18) . 729--743.","author":"Pailoor Shankara","unstructured":"Shankara Pailoor , Andrew Aday , and Suman Jana . 2018. MoonShine : Optimizing $$OS$$ Fuzzer Seed Selection with Trace Distillation . In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18) . 729--743. Shankara Pailoor, Andrew Aday, and Suman Jana. 2018. MoonShine: Optimizing $$OS$$ Fuzzer Seed Selection with Trace Distillation. In 27th $$USENIX$$ Security Symposium ($$USENIX$$ Security 18) . 729--743."},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"VUzzer: Application-aware Evolutionary Fuzzing","volume":"17","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat , Vivek Jain , Ashish Kumar , Lucian Cojocar , Cristiano Giuffrida , and Herbert Bos . 2017 . VUzzer: Application-aware Evolutionary Fuzzing .. In NDSS , Vol. 17. 1 -- 14 . Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing.. In NDSS, Vol. 17. 1--14.","journal-title":"NDSS"},{"key":"e_1_3_2_1_26_1","volume-title":"Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert , Sang Kil Cha , Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014 . Optimizing seed selection for fuzzing. In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14). 861--875. Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing seed selection for fuzzing. In 23rd $$USENIX$$ Security Symposium ($$USENIX$$ Security 14). 861--875."},{"key":"e_1_3_2_1_27_1","volume-title":"Continuous fuzzing with libfuzzer and addresssanitizer. In 2016 IEEE Cybersecurity Development (SecDev)","author":"Serebryany Kosta","unstructured":"Kosta Serebryany . 2016. Continuous fuzzing with libfuzzer and addresssanitizer. In 2016 IEEE Cybersecurity Development (SecDev) . IEEE , 157--157. Kosta Serebryany. 2016. Continuous fuzzing with libfuzzer and addresssanitizer. In 2016 IEEE Cybersecurity Development (SecDev). IEEE, 157--157."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_29_1","volume-title":"ICISC","author":"Shudrak Maksim O","year":"2015","unstructured":"Maksim O Shudrak and Vyacheslav V Zolotarev . 2015 . Improving fuzzing using software complexity metrics . In ICISC 2015. Springer, 246--261. Maksim O Shudrak and Vyacheslav V Zolotarev. 2015. Improving fuzzing using software complexity metrics. In ICISC 2015. Springer, 246--261."},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Andrew Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: Augmenting Fuzzing Through Selective Symbolic Execution .. In NDSS , Vol. 16. 1 -- 16 . Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS , Vol. 16. 1--16.","journal-title":"NDSS"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.15"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"}],"event":{"name":"ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"ASIA CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 15th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384736","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3320269.3384736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:27Z","timestamp":1750200087000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3320269.3384736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,5]]},"references-count":33,"alternative-id":["10.1145\/3320269.3384736","10.1145\/3320269"],"URL":"https:\/\/doi.org\/10.1145\/3320269.3384736","relation":{},"subject":[],"published":{"date-parts":[[2020,10,5]]},"assertion":[{"value":"2020-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}