{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:14:12Z","timestamp":1759032852564,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":96,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Research Foundation (DFG)","award":["HA 2936\/4-2, TA 294\/13-2, GR 3634\/7-1"],"award-info":[{"award-number":["HA 2936\/4-2, TA 294\/13-2, GR 3634\/7-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416668","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"1103-1115","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["MoFuzz"],"prefix":"10.1145","author":[{"given":"Hoang Lam","family":"Nguyen","sequence":"first","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Germany"}]},{"given":"Nebras","family":"Nassar","sequence":"additional","affiliation":[{"name":"Philipps-Universit\u00e4t Marburg, Germany"}]},{"given":"Timo","family":"Kehrer","sequence":"additional","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Germany"}]},{"given":"Lars","family":"Grunske","sequence":"additional","affiliation":[{"name":"Humboldt-Universit\u00e4t zu Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"2nd Workshop on Scalability in Model Driven Engineering.","author":"Acretoaie Vlad","year":"2014","unstructured":"Vlad Acretoaie and Harald St\u00f6rrle. 2014. Hypersonic: Model analysis and checking in the cloud. In 2nd Workshop on Scalability in Model Driven Engineering."},{"key":"e_1_3_2_1_2_1","volume-title":"Immunity Inc.","author":"Aitel Dave","year":"2002","unstructured":"Dave Aitel. 2002. The advantages of block-based protocol analysis for security testing. Immunity Inc., February (2002)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_1_4_1","volume-title":"Henshin: Advanced Concepts and Tools for In-Place EMF Model Transformations. In Proc","author":"Arendt Thorsten","year":"2010","unstructured":"Thorsten Arendt, Enrico Biermann, Stefan Jurack, Christian Krause, and Gabriele Taentzer. 2010. Henshin: Advanced Concepts and Tools for In-Place EMF Model Transformations. In Proc. MODELS. Springer, 121--135."},{"volume-title":"Accessed","year":"2015","key":"e_1_3_2_1_5_1","unstructured":"AtlanMod. 2015. EMF Random Instantiator. https:\/\/github.com\/atlanmod\/mondo-atlzoo-benchmark\/tree\/master\/fr.inria.atlanmod.instantiator\/. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_6_1","unstructured":"Amine Benelallam Massimo Tisi Istv\u00e1n R\u00e1th Benedeck Izso and Dimitrios S Kolovos. 2014. Towards an open set of real-world benchmarks for model queries and transformations. In BigMDE@ STAF."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-011-0199-7"},{"key":"e_1_3_2_1_8_1","volume-title":"A local and global tour on MOMoT. SoSyM","author":"Bill Robert","year":"2017","unstructured":"Robert Bill, Martin Fleck, Javier Troya, Tanja Mayerhofer, and Manuel Wimmer. 2017. A local and global tour on MOMoT. SoSyM (2017), 1--30."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_11_1","volume-title":"On the Replicability of Experimental Tool Evaluations in Model-based Development. In Intl. Conference on Systems Modelling and Management.","author":"Boll Alexander","year":"2020","unstructured":"Alexander Boll and Timo Kehrer. 2020. On the Replicability of Experimental Tool Evaluations in Model-based Development. In Intl. Conference on Systems Modelling and Management. to appear."},{"key":"e_1_3_2_1_12_1","volume-title":"Accessed","author":"Brazeau Jean-Fran\u00e7ois","year":"2011","unstructured":"Jean-Fran\u00e7ois Brazeau. 2011. EMF To Graphviz (emf2gv). http:\/\/emftools.tuxfamily.org\/wiki\/doku.php?id=emf2gv:start. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.27"},{"key":"e_1_3_2_1_14_1","volume-title":"Accessed","author":"Labs Caca","year":"2015","unstructured":"Caca Labs. 2015. zzuf - multiple purpose fuzzer. http:\/\/caca.zoy.org\/wiki\/zzuf. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_16_1","volume-title":"International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems. Springer, 46--60","author":"Chowdhury Shafiul Azam","year":"2016","unstructured":"Shafiul Azam Chowdhury, Taylor T Johnson, and Christoph Csallner. 2016. CyFuzz: A differential testing framework for cyber-physical systems development environments. In International Workshop on Design, Modeling, and Evaluation of Cyber Physical Systems. Springer, 46--60."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180231"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380381"},{"key":"e_1_3_2_1_19_1","unstructured":"Gwendal Daniel Gerson Suny\u00e9 Amine Benelallam and Massimo Tisi. 2014. Improving memory efficiency for processing large-scale models. In BigMDE."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59762-7_8"},{"key":"e_1_3_2_1_21_1","volume-title":"Accessed","author":"Foundation Eclipse","year":"2018","unstructured":"Eclipse Foundation. 2018. UML2. https:\/\/wiki.eclipse.org\/MDT\/UML2. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_22_1","volume-title":"Accessed","author":"Foundation Eclipse","year":"2019","unstructured":"Eclipse Foundation. 2019. EMFCompare. https:\/\/www.eclipse.org\/emf\/compare\/. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_23_1","volume-title":"Accessed","author":"Foundation Eclipse","year":"2020","unstructured":"Eclipse Foundation. 2020. Atlas Transformation Language (ATL). https:\/\/www.eclipse.org\/atl\/. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_24_1","volume-title":"Accessed","author":"Foundation Eclipse","year":"2020","unstructured":"Eclipse Foundation. 2020. Eclipse Modeling Framework. https:\/\/www.eclipse.org\/modeling\/emf\/. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_25_1","volume-title":"Accessed","author":"Foundation Eclipse","year":"2020","unstructured":"Eclipse Foundation. 2020. UML to OWL Transformation. https:\/\/www.eclipse.org\/atl\/atlTransformations\/#UML2OWL. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_26_1","unstructured":"H. Ehrig K. Ehrig U. Prange and G. Taentzer. 2006. Fundamentals of Algebraic Graph Transformation. Springer."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-008-0095-y"},{"key":"e_1_3_2_1_28_1","volume-title":"Graphviz - Open Source Graph Drawing Tools. In International Symposium on Graph Drawing.","author":"Ellson John","year":"2001","unstructured":"John Ellson, Emden Gansner, Lefteris Koutsofios, Stephen C. North, and Gordon Woodhull. 2001. Graphviz - Open Source Graph Drawing Tools. In International Symposium on Graph Drawing."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2015.11.003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.156"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MODEVA.2004.1425846"},{"key":"e_1_3_2_1_32_1","volume-title":"Accessed","author":"Foundation Eclipse","year":"2019","unstructured":"Eclipse Foundation. 2019. Acceleo. https:\/\/www.eclipse.org\/acceleo\/. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_33_1","volume-title":"CEUR Workshop Proceedings. CEUR-WS.","author":"Garmendia Antonio","year":"2015","unstructured":"Antonio Garmendia, Antonio Jim\u00e9nez-Pastor, and Juan de Lara. 2015. Scalable model exploration through abstraction and fragmentation strategies. In CEUR Workshop Proceedings. CEUR-WS."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FormSERA.2012.6229788"},{"volume-title":"Accessed","year":"2020","key":"e_1_3_2_1_36_1","unstructured":"Google. 2020. FuzzBench: Fuzzer Benchmarking As a Service. https:\/\/github.com\/google\/fuzzbench. Accessed: August 26, 2020."},{"volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Holler Christian","key":"e_1_3_2_1_37_1","unstructured":"Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with Code Fragments. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). USENIX, Bellevue, WA, 445--458."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/505145.505149"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the Intl. Workshop on Models and Evolution (CEUR Workshop Proceedings)","volume":"1090","author":"Kehrer Timo","year":"2013","unstructured":"Timo Kehrer, Michaela Rindt, Pit Pietsch, and Udo Kelter. 2013. Generating Edit Operations for Profiled UML Models. In Proceedings of the Intl. Workshop on Models and Evolution (CEUR Workshop Proceedings), Vol. 1090. 30--39."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42064-6_12"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244220"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05290-3_86"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.58"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02674-4_10"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_11"},{"key":"e_1_3_2_1_51_1","volume-title":"Rule-based Repair of EMF Models: Formalization and Correctness Proof. In Electronic Pre-Proc. Intl. Workshop on Graph Computation Models.","author":"Nassar Nebras","year":"2017","unstructured":"Nebras Nassar, Jens Kosiol, and Hendrik Radke. 2017. Rule-based Repair of EMF Models: Formalization and Correctness Proof. In Electronic Pre-Proc. Intl. Workshop on Graph Computation Models."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61473-1_12"},{"volume-title":"Accessed","year":"2020","key":"e_1_3_2_1_53_1","unstructured":"Obeo. 2020. UML to Java Generator. https:\/\/marketplace.eclipse.org\/content\/uml-java-generator. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_54_1","unstructured":"Object Management Group (OMG). 2008. MOF Model to Text Transformation Language v1.0. Standard. https:\/\/www.omg.org\/spec\/MOFM2T\/1.0\/PDF"},{"key":"e_1_3_2_1_55_1","unstructured":"Object Management Group (OMG). 2014. Ontology Definition Metamodel. Standard. https:\/\/www.omg.org\/spec\/ODM\/1.1\/PDF"},{"volume-title":"A guide to NumPy","author":"Oliphant Travis E.","key":"e_1_3_2_1_56_1","unstructured":"Travis E. Oliphant. 2006. A guide to NumPy. Vol. 1. Trelgol Publishing USA."},{"key":"e_1_3_2_1_57_1","unstructured":"OMG 2014. Object Constraint Language. OMG. http:\/\/www.omg.org\/spec\/OCL\/"},{"key":"e_1_3_2_1_58_1","unstructured":"OMG 2015. XML Metadata Interchange. OMG. https:\/\/www.omg.org\/spec\/XMI\/"},{"key":"e_1_3_2_1_59_1","unstructured":"OMG 2016. OMG Meta Object Facility (MOF). Version 2.5.1. OMG. http:\/\/www.omg.org\/spec\/MOF\/"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3339002"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_1_62_1","volume-title":"Accessed","author":"Tech Peach","year":"2020","unstructured":"Peach Tech. 2020. Peach Fuzzer Platform. https:\/\/www.peach.tech\/products\/peach-fuzzer\/peach-platform\/. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2941681"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100140"},{"key":"e_1_3_2_1_65_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/vuzzer-application-aware-evolutionary-fuzzing\/"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the Demonstrations Track of the ACM\/IEEE 17th International Conference on Model Driven Engineering Languages and Systems.","author":"Rindt Michaela","year":"2014","unstructured":"Michaela Rindt, Timo Kehrer, and Udo Kelter. 2014. Automatic Generation of Consistency-Preserving Edit Operations for MDE Tools. In Proceedings of the Demonstrations Track of the ACM\/IEEE 17th International Conference on Model Driven Engineering Languages and Systems."},{"key":"e_1_3_2_1_67_1","volume-title":"Accessed","author":"Ruderman Jesse","year":"2007","unstructured":"Jesse Ruderman. 2007. Introducing jsfunfuzz. http:\/\/www.squarefree.com\/2007\/08\/02\/introducing-jsfunfuzz\/. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00034"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180186"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02408-5_11"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_2"},{"key":"e_1_3_2_1_72_1","volume-title":"Workshop on Testing for Deep Learning and Deep Learning for Testing (DeepTest","author":"Shrestha Sohil Lal","year":"2020","unstructured":"Sohil Lal Shrestha, Shafiul Azam Chowdhury, and Christoph Csallner. 2020. DeepFuzzSL: Generating Simulink Models with Deep Learning to Find Bugs in the Simulink Toolchain. In Workshop on Testing for Deep Learning and Deep Learning for Testing (DeepTest 2020)."},{"key":"e_1_3_2_1_73_1","volume-title":"Inputs from Hell: Learning Input Distributions for Grammar-Based Test Generation","author":"Soremekun Ezekiel","year":"2020","unstructured":"Ezekiel Soremekun, Esteban Pavese, Nikolas Havrikov, Lars Grunske, and Andreas Zeller. 2020. Inputs from Hell: Learning Input Distributions for Grammar-Based Test Generation. IEEE Transactions on Software Engineering (2020)."},{"key":"e_1_3_2_1_74_1","volume-title":"Merks","author":"Steinberg Dave","year":"2008","unstructured":"Dave Steinberg, Frank Budinsky, Marcelo Paternostro, and Ed Merks. 2008. EMF: Eclipse Modeling Framework (2 ed.). Addison Wesley, Upper Saddle River, NJ."},{"key":"e_1_3_2_1_75_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21--24, 2016. The Internet Society. http:\/\/wp.internetsociety.org\/ndss\/wp-content\/uploads\/sites\/25\/2017\/09\/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61470-0_12"},{"key":"e_1_3_2_1_77_1","unstructured":"Daniel Str\u00fcber Timo Kehrer Thorsten Arendt Christopher Pietsch and Dennis Reuling. 2016. Scalability of Model Transformations: Position Paper and Benchmark Set. In BigMDE@ STAF. 21--30."},{"volume-title":"Intl. SDL Forum","author":"Svendsen Andreas","key":"e_1_3_2_1_78_1","unstructured":"Andreas Svendsen, \u00d8ystein Haugen, and Birger M\u00f8ller-Pedersen. 2011. Synthesizing software models: generating train station models automatically. In Intl. SDL Forum. Springer, 38--53."},{"key":"e_1_3_2_1_79_1","volume-title":"Instance Generation from Type Graphs with Arbitrary Multiplicities. ECEASST 47","author":"Taentzer Gabriele","year":"2012","unstructured":"Gabriele Taentzer. 2012. Instance Generation from Type Graphs with Arbitrary Multiplicities. ECEASST 47 (2012)."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_29"},{"key":"e_1_3_2_1_81_1","unstructured":"Pauli Virtanen Ralf Gommers Travis E. Oliphant Matt Haberland Tyler Reddy David Cournapeau Evgeni Burovski Pearu Peterson Warren Weckesser Jonathan Bright St\u00e9fan J. van der Walt Matthew Brett Joshua Wilson K. Jarrod Millman Nikolay Mayorov Andrew R. J. Nelson Eric Jones Robert Kern Eric Larson C. J. Carey \u0130lhan Polat Yu Feng Eric W. Moore Jake Vand erPlas Denis Laxalde Josef Perktold Robert Cimrman Ian Henriksen E. A. Quintero Charles R. Harris Anne M. Archibald Ant\u00f4nio H. Ribeiro Fabian Pedregosa Paul van Mulbregt and SciPy 1. 0 Contributors. 2020. SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python. Nature Methods (2020)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2008.4483232"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41533-3_1"},{"key":"e_1_3_2_1_86_1","unstructured":"World Wide Web Consortium (W3C). 2004. OWL Web Ontology Language Reference. Specification. https:\/\/www.w3.org\/TR\/owl-ref\/"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJISMD.2016070102"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.05.010"},{"volume-title":"Advanced Information Systems Engineering Workshops - CAiSE 2014 International Workshops (Lecture Notes in Business Information Processing)","author":"Yazdi Hamed Shariat","key":"e_1_3_2_1_90_1","unstructured":"Hamed Shariat Yazdi, Mahnaz Mirbolouki, Pit Pietsch, Timo Kehrer, and Udo Kelter. 2014. Analysis and Prediction of Design Model Evolution Using Time Series. In Advanced Information Systems Engineering Workshops - CAiSE 2014 International Workshops (Lecture Notes in Business Information Processing), Vol. 178. Springer, 1--15."},{"key":"e_1_3_2_1_91_1","volume-title":"Statistical analysis of changes for synthesizing realistic test models. Software Engineering 2013","author":"Yazdi Hamed Shariat","year":"2013","unstructured":"Hamed Shariat Yazdi, Pit Pietsch, Timo Kehrer, and Udo Kelter. 2013. Statistical analysis of changes for synthesizing realistic test models. Software Engineering 2013 (2013)."},{"key":"e_1_3_2_1_92_1","first-page":"3","article-title":"Synthesizing realistic test models","volume":"30","author":"Yazdi Hamed Shariat","year":"2015","unstructured":"Hamed Shariat Yazdi, Pit Pietsch, Timo Kehrer, and Udo Kelter. 2015. Synthesizing realistic test models. Computer Science-Research and Development 30, 3--4 (2015), 231--253.","journal-title":"Computer Science-Research and Development"},{"key":"e_1_3_2_1_93_1","volume-title":"Accessed","author":"Zalewski Michal","year":"2017","unstructured":"Michal Zalewski. 2017. American Fuzzy Lop (AFL) - Technical Whitepaper. http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt. Accessed: August 26, 2020."},{"key":"e_1_3_2_1_94_1","volume-title":"Accessed","author":"Zalewski Michal","year":"2020","unstructured":"Michal Zalewski. 2020. American Fuzzy Lop (AFL) - a security-oriented fuzzer. http:\/\/lcamtuf.coredump.cx\/afl\/. Accessed: August 26, 2020."},{"volume-title":"The Fuzzing Book","author":"Zeller Andreas","key":"e_1_3_2_1_95_1","unstructured":"Andreas Zeller, Rahul Gopinath, Marcel B\u00f6hme, Gordon Fraser, and Christian Holler. 2019. The Fuzzing Book. In The Fuzzing Book. Saarland University. https:\/\/www.fuzzingbook.org\/"},{"volume-title":"Software Technologies: Applications and Foundations","author":"Zschaler Steffen","key":"e_1_3_2_1_96_1","unstructured":"Steffen Zschaler and Lawrence Mandow. 2016. Towards model-based optimisation: Using domain knowledge explicitly. In Software Technologies: Applications and Foundations. Springer, 317--329."}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416668","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416668","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:23Z","timestamp":1750193243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416668"}},"subtitle":["a fuzzer suite for testing model-driven software engineering tools"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":96,"alternative-id":["10.1145\/3324884.3416668","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416668","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}