{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:57:32Z","timestamp":1776333452549,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416629","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"54-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Legion"],"prefix":"10.1145","author":[{"given":"Dongge","family":"Liu","sequence":"first","affiliation":[{"name":"The University of Melbourne, Melbourne, Victoria, Australia"}]},{"given":"Gidon","family":"Ernst","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Bavaria, Germany"}]},{"given":"Toby","family":"Murray","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Victoria, Australia"}]},{"given":"Benjamin I. P.","family":"Rubinstein","sequence":"additional","affiliation":[{"name":"The University of Melbourne, Melbourne, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Raveendra Kumar Medicherla, and Venkatesh R","author":"Chowdhury Animesh Basak","year":"2019","unstructured":"Animesh Basak Chowdhury, Raveendra Kumar Medicherla, and Venkatesh R. 2019. VeriFuzz: Program Aware Fuzzing. In Tools and Algorithms for the Construction and Analysis of Systems, Dirk Beyer, Marieke Huisman, Fabrice Kordon, and Bernhard Steffen (Eds.). Springer International Publishing, Cham, 244--249."},{"key":"e_1_3_2_1_2_1","volume-title":"Second Competition on Software Testing: Test-Comp","author":"Beyer D.","year":"2020","unstructured":"D. Beyer. 2020. Second Competition on Software Testing: Test-Comp 2020. In Proc. FASE (LNCS). Springer. https:\/\/www.sosy-lab.org\/research\/pub\/2020-FASE.Second_Competition_on_Software_Testing_Test-Comp_2020.pdf"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-16722-6_23"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-017-0469-y"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"e_1_3_2_1_8_1","first-page":"209","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, Dawson R Engler, et al. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.. In OSDI, Vol. 8. 209--224.","journal-title":"OSDI"},{"key":"e_1_3_2_1_9_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Chalupa Marek","unstructured":"Marek Chalupa, Tom\u00e1\u0161 Ja\u0161ek, Luk\u00e1\u0161 Tomovi\u010d, Martin Hru\u0161ka, Veronika \u0160okov\u00e1, Paul\u00edna Ayaziov\u00e1, Jan Strej\u010dek, and Tom\u00e1\u0161 Vojnar. 2020. Symbiotic 7: Integration of Predator and More. In Tools and Algorithms for the Construction and Analysis of Systems, Armin Biere and David Parker (Eds.). Springer International Publishing, Cham, 413--417."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180248"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_28"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11871842_29"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_20_1","volume-title":"2018 IEEE Symposium on Security and Privacy (SP). 697--710","author":"Peng H.","unstructured":"H. Peng, Y. Shoshitaishvili, and M. Payer. 2018. T-Fuzz: Fuzzing by Program Transformation. In 2018 IEEE Symposium on Security and Privacy (SP). 697--710."},{"key":"e_1_3_2_1_21_1","volume-title":"In Proc. of the","author":"Reed Hastings BobJoyce","year":"1991","unstructured":"BobJoyce Reed Hastings. 1991. Purify: Fast detection of memory leaks and access errors. In In Proc. of the Winter 1992 USENIX Conference. Citeseer."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_26"},{"key":"e_1_3_2_1_23_1","volume-title":"UBSan: run-time undefined behavior sanity checker. E-mail publi\u00e9 sur la liste de d\u00e9veloppement du noyau Linux 20","author":"Ryabinin Andrey","year":"2014","unstructured":"Andrey Ryabinin. 2014. UBSan: run-time undefined behavior sanity checker. E-mail publi\u00e9 sur la liste de d\u00e9veloppement du noyau Linux 20 (2014)."},{"key":"e_1_3_2_1_24_1","volume-title":"libFuzzer-a library for coverage-guided fuzz testing. LLVM project","author":"Serebryany Kostya","year":"2015","unstructured":"Kostya Serebryany. 2015. libFuzzer-a library for coverage-guided fuzz testing. LLVM project (2015)."},{"key":"e_1_3_2_1_25_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanitychecker. In Presented as part of the 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12). 309--318."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_27_1","volume-title":"Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al.","author":"Silver David","year":"2016","unstructured":"David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George Van Den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al. 2016. Mastering the game of Go with deep neural networks and tree search. Nature 529, 7587 (2016), 484."},{"key":"e_1_3_2_1_28_1","first-page":"1","article-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS, Vol. 16. 1--16.","journal-title":"NDSS"},{"key":"e_1_3_2_1_29_1","volume-title":"Advances in Computer Games, H. Jaap van den Herik and Pieter Spronck (Eds.)","author":"Szita Istv\u00e1n","unstructured":"Istv\u00e1n Szita, Guillaume Chaslot, and Pieter Spronck. 2010. Monte-Carlo Tree Search in Settlers of Catan. In Advances in Computer Games, H. Jaap van den Herik and Pieter Spronck (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 21--32."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05224-8_28"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180177"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","unstructured":"C.D. Ward and Peter Cowling. 2009. Monte Carlo search applied to card selection in Magic: The Gathering. 9 -- 16. 10.1109\/CIG.2009.5286501","DOI":"10.1109\/CIG.2009.5286501"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAAI.2017.26"},{"key":"e_1_3_2_1_35_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 745--761.","author":"Yun Insu","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. {QSYM}: A practical concolic execution engine tailored for hybrid fuzzing. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 745--761."},{"key":"e_1_3_2_1_36_1","unstructured":"Michal Zalewski. 2017. American fuzzy lop (AFL) fuzzer."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Lei Zhao Yue Duan Heng Yin and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.. In NDSS.","DOI":"10.14722\/ndss.2019.23504"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416629"}},"subtitle":["best-first concolic testing"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":37,"alternative-id":["10.1145\/3324884.3416629","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416629","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}