{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:43:08Z","timestamp":1773193388486,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSFC Program","award":["U1911401, 61802223"],"award-info":[{"award-number":["U1911401, 61802223"]}]},{"name":"Huawei-Tsinghua Trustworthy Research Project","award":["20192000794"],"award-info":[{"award-number":["20192000794"]}]},{"name":"National Key Research and Development Project","award":["2019YFB1706200"],"award-info":[{"award-number":["2019YFB1706200"]}]},{"name":"Equipment Pre-research Project","award":["61400010107"],"award-info":[{"award-number":["61400010107"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416572","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"858-870","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Zeror"],"prefix":"10.1145","author":[{"given":"Chijin","family":"Zhou","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Mingzhe","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Jie","family":"Liang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Zhe","family":"Liu","sequence":"additional","affiliation":[{"name":"NUAA, Nanjing, China"}]},{"given":"Yu","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00117"},{"key":"e_1_3_2_1_2_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24--27, 2019. https:\/\/www.ndss-symposium.org\/ndss-paper\/redqueen-fuzzing-with-input-to-state-correspondence\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349303"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2307\/2347257"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363225"},{"key":"e_1_3_2_1_9_1","volume-title":"28th USENIX Security Symposium, USENIX Security 2019","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. 2019. EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019. 1967--1983. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/chen-yuanliang"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00093"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512542"},{"key":"e_1_3_2_1_13_1","unstructured":"FoRTE-Research. 2020. Illegal pointer to buffer in Dyninst. https:\/\/github.com\/FoRTE-Research\/UnTracer-AFL\/issues\/5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/for.3980040103"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2020. Google fuzzer-test-suite. https:\/\/github.com\/google\/fuzzer-test-suite"},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2020. OSS-Fuzz - continuous fuzzing of open source software. https:\/\/google.github.io\/oss-fuzz\/"},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2020. SanitizerCoverage. https:\/\/clang.llvm.org\/docs\/SanitizerCoverage.html"},{"key":"e_1_3_2_1_20_1","volume-title":"Large sample properties of generalized method of moments estimators. Econometrica: Journal of the Econometric Society","author":"Hansen Lars Peter","year":"1982","unstructured":"Lars Peter Hansen. 1982. Large sample properties of generalized method of moments estimators. Econometrica: Journal of the Econometric Society (1982), 1029--1054."},{"key":"e_1_3_2_1_21_1","unstructured":"honggfuzz@googlegroups.com. 2020. hongfuzz - security oriented fuzzer with powerful analysis options. http:\/\/honggfuzz.com"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23014"},{"key":"e_1_3_2_1_23_1","unstructured":"Intel. 2017. Intel Processor Trace Tools. https:\/\/software.intel.com\/en-us\/node\/721535"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2003.1245338"},{"key":"e_1_3_2_1_25_1","unstructured":"lcamtuf. 2017. American Fuzzy Lop (AFL). http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_26_1","unstructured":"lcamtuf. 2017. Fast LLVM-based instrumentation for afl-fuzz. https:\/\/github.com\/google\/AFL\/blob\/master\/llvm_mode\/README.llvm"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231407"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2019.00018"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275525"},{"key":"e_1_3_2_1_32_1","volume-title":"DeepFuzzer: Accelerated Deep Greybox Fuzzing","author":"Liang Jie","year":"2019","unstructured":"Jie Liang, Yu Jiang, Mingzhe Wang, Xun Jiao, Yuanliang Chen, Houbing Song, and Kim-Kwang Raymond Choo. 2019. DeepFuzzer: Accelerated Deep Greybox Fuzzing. IEEE Transactions on Dependable and Secure Computing (2019)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330260"},{"key":"e_1_3_2_1_34_1","unstructured":"libfuzzer@googlegroups.com. 2020. libFuzzer - a library for coverage-guided fuzz testing. https:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_36_1","volume-title":"MOPT: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium, USENIX Security 2019","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. MOPT: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019. 1949--1966. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lyu"},{"key":"e_1_3_2_1_37_1","volume-title":"Synthesis: An efficient implementation of fundamental operating system services.","author":"Massalin Henry","year":"1993","unstructured":"Henry Massalin. 1993. Synthesis: An efficient implementation of fundamental operating system services. (1993)."},{"key":"e_1_3_2_1_38_1","unstructured":"Thomas Minka. 2000. Estimating a Dirichlet distribution."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330554"},{"key":"e_1_3_2_1_41_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/vuzzer-application-aware-evolutionary-fuzzing\/"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing Seed Selection for Fuzzing. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014. 861--875. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/rebert"},{"key":"e_1_3_2_1_43_1","volume-title":"26th USENIX Security Symposium, USENIX Security 2017","author":"Schumilo Sergej","year":"2017","unstructured":"Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, and Thorsten Holz. 2017. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. In 26th USENIX Security Symposium, USENIX Security 2017, Vancouver, BC, Canada, August 16--18, 2017. 167--182. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/schumilo"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134105"},{"key":"e_1_3_2_1_46_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21--24, 2016. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf"},{"key":"e_1_3_2_1_47_1","unstructured":"syzkaller@googlegroups.com. 2020. syzkaller - an unsupervised coverage-guided kernel fuzzer. https:\/\/github.com\/google\/syzkaller"},{"key":"e_1_3_2_1_48_1","unstructured":"LLVM team. 2020. The LLVM Compiler Infrastructure. https:\/\/llvm.org\/"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183494"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Xuerui Wang Wei Li Ying Cui Ruofei Zhang and Jianchang Mao. 2011. Click-through rate estimation for rare events in online advertising. In Online multimedia advertising: Techniques and technologies. IGI Global 1--12.","DOI":"10.4018\/978-1-60960-189-8.ch001"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_1_52_1","volume-title":"27th USENIX Security Symposium, USENIX Security 2018","author":"Yun Insu","year":"2018","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15--17, 2018. 745--761. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yun"},{"key":"e_1_3_2_1_53_1","volume-title":"Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Zhao Lei","year":"2019","unstructured":"Lei Zhao, Yue Duan, Heng Yin, and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24--27, 2019. https:\/\/www.ndss-symposium.org\/ndss-paper\/send-hardest-problems-my-way-probabilistic-path-prioritization-for-hybrid-fuzzing\/"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00106"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416572"}},"subtitle":["speed up fuzzing with coverage-sensitive tracing and scheduling"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":53,"alternative-id":["10.1145\/3324884.3416572","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416572","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}