{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T03:55:40Z","timestamp":1771300540187,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":73,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["CCF-1764077, CCF-1527923, CCF-1723773"],"award-info":[{"award-number":["CCF-1764077, CCF-1527923, CCF-1723773"]}]},{"name":"Samsung"},{"name":"Alexander von Humboldt Foundation"},{"name":"Google PhD Fellowship"},{"name":"Intel"},{"name":"ONR","award":["N00014-18-1-2037"],"award-info":[{"award-number":["N00014-18-1-2037"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416641","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"722-733","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["BigFuzz"],"prefix":"10.1145","author":[{"given":"Qian","family":"Zhang","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Jiyuan","family":"Wang","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Muhammad Ali","family":"Gulzar","sequence":"additional","affiliation":[{"name":"Virginia Tech"}]},{"given":"Rohan","family":"Padhye","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. https:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. https:\/\/spark.apache.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. https:\/\/stackoverflow.com\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. https:\/\/github.com\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2020. https:\/\/asm.ow2.io\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/37525136\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/36015704\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/52083828\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/49505241\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/41708814\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/56478820\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/41143862\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/32028729\/."},{"key":"e_1_3_2_1_14_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/36131942\/."},{"key":"e_1_3_2_1_15_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/45962453\/."},{"key":"e_1_3_2_1_16_1","unstructured":"2020. https:\/\/stackoverflow.com\/questions\/59977879\/is-there-any-convenient-way-to-do-the-debugging-for-spark-program."},{"key":"e_1_3_2_1_17_1","unstructured":"2020. American Fuzz Loop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2020. Microsoft Open Database Connectivity (ODBC). https:\/\/msdn.microsoft.com\/en-us\/library\/ms710252(v=vs.85).aspx."},{"key":"e_1_3_2_1_19_1","unstructured":"2020. Mozilla Security - dharma. https:\/\/github.com\/mozillasecurity\/dharma."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00012"},{"key":"e_1_3_2_1_21_1","volume-title":"RESTler: Stateful REST API Fuzzing. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 748--758","author":"Atlidakis V.","unstructured":"V. Atlidakis, P. Godefroid, and M. Polishchuk. 2019. RESTler: Stateful REST API Fuzzing. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 748--758."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"e_1_3_2_1_23_1","volume-title":"ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC\/FSE '20)","author":"Guoqing Harry Xu Miryung Jaspreet Arora","unstructured":"Jaspreet Arora Guoqing Harry Xu Miryung Kim Bobby Bruce, TianyiZhang. [n. d.]. JShrink: In-Depth Investigation into Debloating Modern Java Applications. In ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC\/FSE '20)."},{"key":"e_1_3_2_1_24_1","volume-title":"Heuristics for Scalable Dynamic Test Generation. In 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering. 443--446","author":"Burnim J.","unstructured":"J. Burnim and K. Sen. 2008. Heuristics for Scalable Dynamic Test Generation. In 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering. 443--446."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI'08)","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI'08). USENIX Association, USA, 209--224."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_27_1","volume-title":"Cosette: An Automated Prover for SQL. In CIDR.","author":"Chu Shumo","year":"2017","unstructured":"Shumo Chu, Chenglong Wang, Konstantin Weitz, and Alvin Cheung. 2017. Cosette: An Automated Prover for SQL. In CIDR."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.602"},{"key":"e_1_3_2_1_29_1","volume-title":"ASE 2006: Proceedings of the 21st Annual International Conference on Automated Software Engineering","author":"Amorim Marcelo","unstructured":"Marcelo d'Amorim, Carlos Pacheco, Darko Marinov, Tao Xie, and Michael D. Ernst. 2006. An empirical comparison of automated generation and classification techniques for object-oriented unit testing. In ASE 2006: Proceedings of the 21st Annual International Conference on Automated Software Engineering. Tokyo, Japan, 59--68."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation -","volume":"6","author":"Dean Jeffrey","year":"2004","unstructured":"Jeffrey Dean and Sanjay Ghemawat. 2004. MapReduce: Simplified Data Processing on Large Clusters. In Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation - Volume 6 (OSDI'04). USENIX Association, 1."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273484"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_34_1","volume-title":"Automated Whitebox Fuzz Testing. In Network Distributed Security Symposium (NDSS). Internet Society. http:\/\/www.truststc.org\/pubs\/499","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid, Michael Y. Levin, and David A Molnar. 2008. Automated Whitebox Fuzz Testing. In Network Distributed Security Symposium (NDSS). Internet Society. http:\/\/www.truststc.org\/pubs\/499.html"},{"key":"e_1_3_2_1_35_1","unstructured":"Rahul Gopinath Bj\u00f6rn Mathis and Andreas Zeller. 2019. Inferring Input Grammars from Dynamic Control Flow. arXiv:cs.SE\/1912.05937"},{"key":"e_1_3_2_1_36_1","unstructured":"Rahul Gopinath and Andreas Zeller. 2019. Building Fast Fuzzers. arXiv:cs.SE\/1911.07707"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00016"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338953"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447862"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.66"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3364452.3364455"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693083"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970325"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509553"},{"key":"e_1_3_2_1_48_1","volume-title":"Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Lion David","year":"2016","unstructured":"David Lion, Adrian Chiu, Hailong Sun, Xin Zhuang, Nikola Grcevski, and Ding Yuan. 2016. Don't Get Caught in the Cold, Warm-up Your JVM: Understand and Eliminate JVM Warm-up Overhead in Data-Parallel Systems. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 383--400. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/lion"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319866"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559873"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593882.2593885"},{"key":"e_1_3_2_1_54_1","volume-title":"Feedback-Directed Random Test Generation. In 29th International Conference on Software Engineering (ICSE'07)","author":"Pacheco C.","unstructured":"C. Pacheco, S. K. Lahiri, M. D. Ernst, and T. Ball. 2007. Feedback-Directed Random Test Generation. In 29th International Conference on Software Engineering (ICSE'07). 75--84."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3339002"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988842.1988846"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100152"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0158-y"},{"key":"e_1_3_2_1_60_1","volume-title":"Taesoo Kim, and Wenke Lee.","author":"Qian Chenxiong","year":"2019","unstructured":"Chenxiong Qian, Hong Hu, Mansour Alharthi, Pak Ho Chung, Taesoo Kim, and Wenke Lee. 2019. {RAZOR}: A Framework for Post-deployment Software Debloating. In 28th {USENIX} Security Symposium ({USENIX} Security 19). 1733--1750."},{"key":"e_1_3_2_1_61_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 869--886.","author":"Quach Anh","unstructured":"Anh Quach, Aravind Prakash, and Lok Yan. 2018. Debloating software through piece-wise compilation and loading. In 27th {USENIX} Security Symposium ({USENIX} Security 18). 869--886."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238160"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_65_1","volume-title":"Jdbc: Database Programming with J2Ee with Cdrom","author":"Taylor Art","year":"2002","unstructured":"Art Taylor. 2002. Jdbc: Database Programming with J2Ee with Cdrom. Prentice Hall Professional Technical Reference."},{"key":"e_1_3_2_1_66_1","volume-title":"Pex-White Box Test Generation for .NET","author":"Tillmann Nikolai","unstructured":"Nikolai Tillmann and Jonathan de Halleux. 2008. Pex-White Box Test Generation for .NET. In Tests and Proofs, Bernhard Beckert and Reiner H\u00e4hnle (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 134--153."},{"key":"e_1_3_2_1_67_1","volume-title":"Automated Decomposition of Build Targets. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering","volume":"1","author":"Vakilian M.","unstructured":"M. Vakilian, R. Sauciuc, J. D. Morgenthaler, and V. Mirrokni. 2015. Automated Decomposition of Build Targets. In 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. 123--133."},{"key":"e_1_3_2_1_68_1","volume-title":"Qex: Symbolic SQL Query Explorer. Technical Report MSR-TR-2009-2015. https:\/\/www.microsoft.com\/en-us\/research\/publication\/qex-symbolic-sql-query-explorer\/ Updated","author":"Veanes Margus","year":"2009","unstructured":"Margus Veanes, Jonathan de Halleux, Nikolai Tillmann, and Peli de Halleux. 2009. Qex: Symbolic SQL Query Explorer. Technical Report MSR-TR-2009-2015. https:\/\/www.microsoft.com\/en-us\/research\/publication\/qex-symbolic-sql-query-explorer\/ Updated January 2010."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_1_71_1","volume-title":"Benchmarking the capability of symbolic execution tools with logic bombs","author":"Xu Hui","year":"2018","unstructured":"Hui Xu, Zirui Zhao, Yangfan Zhou, and Michael R Lyu. 2018. Benchmarking the capability of symbolic execution tools with logic bombs. IEEE Transactions on Dependable and Secure Computing (2018)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693071"},{"key":"e_1_3_2_1_73_1","volume-title":"Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 15--28.","author":"Zaharia Matei","unstructured":"Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauly, Michael J Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 15--28."}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416641","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416641","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:22Z","timestamp":1750193242000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416641"}},"subtitle":["efficient fuzz testing for data analytics using framework abstraction"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":73,"alternative-id":["10.1145\/3324884.3416641","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416641","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}