{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T18:33:34Z","timestamp":1769106814359,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329845","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"658-663","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing"],"prefix":"10.1145","author":[{"given":"Xiaogang","family":"Zhu","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Xiaotao","family":"Feng","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Tengyun","family":"Jiao","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Yang","family":"Xiang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Seyit","family":"Camtepe","sequence":"additional","affiliation":[{"name":"DATA61 CSIRO, Sydney, Australia"}]},{"given":"Jingling","family":"Xue","sequence":"additional","affiliation":[{"name":"The University of New South Wales, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":". 2017. Cyber Grand Challenge Corpus. http:\/\/www.lungetech.com\/cgc-corpus\/.  . 2017. Cyber Grand Challenge Corpus. http:\/\/www.lungetech.com\/cgc-corpus\/."},{"key":"e_1_3_2_1_2_1","unstructured":". 2018a. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/.  . 2018a. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_3_1","unstructured":". 2018b. Fuzze Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite.  . 2018b. Fuzze Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite."},{"key":"e_1_3_2_1_4_1","unstructured":". 2018c. National Institute of Standards and Technology. https:\/\/www.nist.gov.  . 2018c. National Institute of Standards and Technology. https:\/\/www.nist.gov."},{"key":"e_1_3_2_1_5_1","volume-title":"2018 d","unstructured":". 2018 d . Standard Performance Evaluation Corporation . https:\/\/www.spec.org \/benchmarks.html. . 2018 d. Standard Performance Evaluation Corporation. https:\/\/www.spec.org \/benchmarks.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167515.1167488"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"e_1_3_2_1_11_1","volume-title":"Workshop on the Evaluation of Software Defect Detection Tools .","author":"Foster Jeffrey","year":"2005","unstructured":"Jeffrey Foster . 2005 . A call for a public bug and tool registry . In Workshop on the Evaluation of Software Defect Detection Tools . Jeffrey Foster. 2005. A call for a public bug and tool registry. In Workshop on the Evaluation of Software Defect Detection Tools ."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_13_1","volume-title":"Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 49--64.","author":"Haller Istvan","unstructured":"Istvan Haller , Asia Slowinska , Matthias Neugschwandtner , and Herbert Bos . 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations .. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 49--64. Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations.. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). USENIX, Washington, D.C., 49--64."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_16_1","volume-title":"Workshop on the evaluation of software defect detection tools","volume":"5","author":"Lu Shan","year":"2005","unstructured":"Shan Lu , Zhenmin Li , Feng Qin , Lin Tan , Pin Zhou , and Yuanyuan Zhou . 2005 . Bugbench: Benchmarks for evaluating bug detection tools . In Workshop on the evaluation of software defect detection tools , Vol. 5 . Shan Lu, Zhenmin Li, Feng Qin, Lin Tan, Pin Zhou, and Yuanyuan Zhou. 2005. Bugbench: Benchmarks for evaluating bug detection tools. In Workshop on the evaluation of software defect detection tools, Vol. 5."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23166"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_22_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Schumilo Sergej","year":"2017","unstructured":"Sergej Schumilo , Cornelius Aschermann , Robert Gawlik , Sebastian Schinzel , and Thorsten Holz . 2017 . kAFL: Hardware-assisted feedback fuzzing for OS kernels . In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association, Vancouver, BC, 167--182. Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, and Thorsten Holz. 2017. kAFL: Hardware-assisted feedback fuzzing for OS kernels. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 167--182."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321746"},{"key":"e_1_3_2_1_24_1","volume-title":"Workshop on the Evaluation of Software Defect Detection Tools .","author":"Spacco Jaime","year":"2005","unstructured":"Jaime Spacco , David Hovemeyer , and William Pugh . 2005 . Bug specimens are important . In Workshop on the Evaluation of Software Defect Detection Tools . Jaime Spacco, David Hovemeyer, and William Pugh. 2005. Bug specimens are important. In Workshop on the Evaluation of Software Defect Detection Tools ."},{"key":"e_1_3_2_1_25_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 3rd Annual Network and Distributed System Security Symposium, NDSS 2016","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Andrew Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 3rd Annual Network and Distributed System Security Symposium, NDSS 2016 , San Diego, California, USA, February 21--24 , 2016, Vol. 16 . NDSS, The Internet Society, San Diego, California, USA, 1--16. Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 3rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21--24, 2016, Vol. 16. NDSS, The Internet Society, San Diego, California, USA, 1--16."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS","volume":"3","author":"Wilander John","year":"2003","unstructured":"John Wilander and Mariam Kamkar . 2003 . A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention .. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, Vol. 3 . The Internet Society, San Diego, California, USA, 149--162. John Wilander and Mariam Kamkar. 2003. A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention.. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2003, Vol. 3. The Internet Society, San Diego, California, USA, 149--162."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1041685.1029911"}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329845","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329845","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329845"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":28,"alternative-id":["10.1145\/3321705.3329845","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329845","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}