{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:14:14Z","timestamp":1775873654203,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338975","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"533-544","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":75,"title":["Cerebro: context-aware adaptive fuzzing for effective vulnerability detection"],"prefix":"10.1145","author":[{"given":"Yuekang","family":"Li","sequence":"first","affiliation":[{"name":"University of Science and Technology of China, China \/ Nanyang Technological University, Singapore"}]},{"given":"Yinxing","family":"Xue","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"given":"Hongxu","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Xiuheng","family":"Wu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Cen","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Xiaofei","family":"Xie","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Haijun","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore \/ Zhejiang Sci-Tech University, China"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_2_1","volume-title":"A survey of some free fuzzing tools","year":"2018","unstructured":"\u201c A survey of some free fuzzing tools ,\u201d https:\/\/lwn.net\/Articles\/744269\/, accessed: 2018 -04-01. \u201cA survey of some free fuzzing tools,\u201d https:\/\/lwn.net\/Articles\/744269\/, accessed: 2018-04-01."},{"key":"e_1_3_2_1_3_1","volume-title":"Basic blackbox fuzzing \u2013 ansvif","year":"2018","unstructured":"\u201c Basic blackbox fuzzing \u2013 ansvif ,\u201d https:\/\/github.com\/oxagast\/ansvif\/wiki\/Basic-Blackbox-Fuzzing, accessed: 2018 -04-01. \u201cBasic blackbox fuzzing \u2013 ansvif,\u201d https:\/\/github.com\/oxagast\/ansvif\/wiki\/Basic-Blackbox-Fuzzing, accessed: 2018-04-01."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"e_1_3_2_1_5_1","volume-title":"American fuzzy lop","year":"2018","unstructured":"\u201c American fuzzy lop ,\u201d http:\/\/lcamtuf.coredump.cx\/afl\/, accessed: 2018 -04-01. \u201cAmerican fuzzy lop,\u201d http:\/\/lcamtuf.coredump.cx\/afl\/, accessed: 2018-04-01."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_8_1","first-page":"637","volume-title":"NY","author":"York New","year":"2017","unstructured":"New York , NY , USA : ACM , 2017 , pp. 627\u2013 637 . {Online}. Available: New York, NY, USA: ACM, 2017, pp. 627\u2013637. {Online}. Available:"},{"key":"e_1_3_2_1_9_1","first-page":"01307","article-title":"Angora: Efficient fuzzing by principled search","volume":"1803","author":"Chen P.","year":"2018","unstructured":"P. Chen and H. Chen , \u201c Angora: Efficient fuzzing by principled search ,\u201d CoRR , vol. abs\/ 1803 . 01307 , 2018 . {Online}. Available: https:\/\/arxiv.org\/abs\/1803.01307v2 P. Chen and H. Chen, \u201cAngora: Efficient fuzzing by principled search,\u201d CoRR, vol. abs\/1803.01307, 2018. {Online}. Available: https:\/\/arxiv.org\/abs\/1803.01307v2","journal-title":"CoRR"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_11_1","first-page":"261","volume-title":"ICISC 2015 - 18th International Conference","author":"Shudrak M. O.","year":"2015","unstructured":"M. O. Shudrak and V. V. Zolotarev , \u201c Improving fuzzing using software complexity metrics,\u201d in Information Security and Cryptology - ICISC 2015 - 18th International Conference , Seoul, South Korea , November 25-27, 2015 , Revised Selected Papers, 2015, pp. 246\u2013 261 . {Online}. Available: M. O. Shudrak and V. V. Zolotarev, \u201cImproving fuzzing using software complexity metrics,\u201d in Information Security and Cryptology - ICISC 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers, 2015, pp. 246\u2013261. {Online}. Available:"},{"key":"e_1_3_2_1_12_1","volume-title":"mjs","year":"2018","unstructured":"\u201c mjs ,\u201d https:\/\/github.com\/cesanta\/mjs, accessed: 2018 -04-01. \u201cmjs,\u201d https:\/\/github.com\/cesanta\/mjs, accessed: 2018-04-01."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/540137"},{"key":"e_1_3_2_1_15_1","volume-title":"Gnu gcov","year":"2018","unstructured":"\u201c Gnu gcov ,\u201d https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html, accessed: 2018 -04-01. \u201cGnu gcov,\u201d https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html, accessed: 2018-04-01."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4631121"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_2_1_18_1","unstructured":"Clang. Clang: a c language family frontend for llvm. {Online}. Available: https:\/\/clang.llvm.org\/  Clang. Clang: a c language family frontend for llvm. {Online}. Available: https:\/\/clang.llvm.org\/"},{"key":"e_1_3_2_1_19_1","unstructured":"\u201cLizard.\u201d {Online}. Available: https:\/\/github.com\/terryyin\/lizard  \u201cLizard.\u201d {Online}. Available: https:\/\/github.com\/terryyin\/lizard"},{"key":"e_1_3_2_1_20_1","volume-title":"Llvm","year":"2018","unstructured":"\u201c Llvm ,\u201d https:\/\/llvm.org\/, accessed: 2018 -04-01. \u201cLlvm,\u201d https:\/\/llvm.org\/, accessed: 2018-04-01."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264593"},{"key":"e_1_3_2_1_22_1","volume-title":"Sqlite: a sql database engine","year":"2018","unstructured":"\u201c Sqlite: a sql database engine ,\u201d https:\/\/www.sqlite.org\/index.html, accessed: 2018 - 04-01. \u201cSqlite: a sql database engine,\u201d https:\/\/www.sqlite.org\/index.html, accessed: 2018- 04-01."},{"key":"e_1_3_2_1_23_1","volume-title":"Gnu binutils","year":"2018","unstructured":"\u201c Gnu binutils ,\u201d https:\/\/www.gnu.org\/software\/binutils\/, accessed: 2018 -04-01. \u201cGnu binutils,\u201d https:\/\/www.gnu.org\/software\/binutils\/, accessed: 2018-04-01."},{"key":"e_1_3_2_1_24_1","volume-title":"libpng","year":"2018","unstructured":"\u201c libpng ,\u201d http:\/\/www.libpng.org\/pub\/png\/libpng.html, accessed: 2018 -04-01. \u201clibpng,\u201d http:\/\/www.libpng.org\/pub\/png\/libpng.html, accessed: 2018-04-01."},{"key":"e_1_3_2_1_25_1","volume-title":"radare2: reverse engineering framework","year":"2018","unstructured":"\u201c radare2: reverse engineering framework ,\u201d https:\/\/github.com\/radare\/radare2, accessed: 2018 -04-01. \u201cradare2: reverse engineering framework,\u201d https:\/\/github.com\/radare\/radare2, accessed: 2018-04-01."},{"key":"e_1_3_2_1_26_1","volume-title":"Intel x86 encoder decoder (intel xed)","year":"2018","unstructured":"\u201c Intel x86 encoder decoder (intel xed) ,\u201d https:\/\/github.com\/intelxed\/xed, accessed: 2018 -04-01. \u201cIntel x86 encoder decoder (intel xed),\u201d https:\/\/github.com\/intelxed\/xed, accessed: 2018-04-01."},{"key":"e_1_3_2_1_27_1","volume-title":"Pin - a dynamic binary instrumentation tool","year":"2018","unstructured":"\u201c Pin - a dynamic binary instrumentation tool ,\u201d https:\/\/software.intel.com\/enus\/articles\/pin-a-dynamic-binary-instrumentation-tool, accessed: 2018 -04-01. \u201cPin - a dynamic binary instrumentation tool,\u201d https:\/\/software.intel.com\/enus\/articles\/pin-a-dynamic-binary-instrumentation-tool, accessed: 2018-04-01."},{"key":"e_1_3_2_1_28_1","volume-title":"Aflfast (extends afl with power schedules)","year":"2018","unstructured":"\u201c Aflfast (extends afl with power schedules) ,\u201d https:\/\/github.com\/mboehme\/aflfast, accessed: 2018 -04-01. \u201cAflfast (extends afl with power schedules),\u201d https:\/\/github.com\/mboehme\/aflfast, accessed: 2018-04-01."},{"key":"e_1_3_2_1_29_1","volume-title":"Technical \"whitepaper\" for afl-fuzz","year":"2018","unstructured":"\u201c Technical \"whitepaper\" for afl-fuzz ,\u201d http:\/\/lcamtuf.coredump.cx\/afl\/technical_ details.txt, accessed: 2018 -04-01. \u201cTechnical \"whitepaper\" for afl-fuzz,\u201d http:\/\/lcamtuf.coredump.cx\/afl\/technical_ details.txt, accessed: 2018-04-01."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"issue":"2","key":"e_1_3_2_1_32_1","first-page":"101","article-title":"A critique and improvement of the cl common language effect size statistics of mcgraw and wong","volume":"25","author":"Vargha A.","year":"2000","unstructured":"A. Vargha and H. D. Delaney , \u201c A critique and improvement of the cl common language effect size statistics of mcgraw and wong ,\u201d Journal of Educational and Behavioral Statistics , vol. 25 , no. 2 , pp. 101 \u2013 132 , 2000 . A. Vargha and H. D. Delaney, \u201cA critique and improvement of the cl common language effect size statistics of mcgraw and wong,\u201d Journal of Educational and Behavioral Statistics, vol. 25, no. 2, pp. 101\u2013132, 2000.","journal-title":"Journal of Educational and Behavioral Statistics"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_34_1","volume-title":"More complex = less secure","year":"2018","unstructured":"\u201c More complex = less secure ,\u201d http:\/\/www.mccabe.com\/pdf\/More%20Complex% 20Equals%20Less%20Secure-McCabe.pdf, accessed: 2018 -04-01. \u201cMore complex = less secure,\u201d http:\/\/www.mccabe.com\/pdf\/More%20Complex% 20Equals%20Less%20Secure-McCabe.pdf, accessed: 2018-04-01."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456362.1456372"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1875255"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00024"},{"key":"e_1_3_2_1_38_1","volume-title":"Cerebro","year":"2018","unstructured":"\u201c Cerebro ,\u201d http:\/\/sites.google.com\/site\/cerebrofuzzer\/, accessed: 2018 -04-01. \u201cCerebro,\u201d http:\/\/sites.google.com\/site\/cerebrofuzzer\/, accessed: 2018-04-01."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99241-9_1"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2510633"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771788"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2364175"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.92"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491438"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA610472"},{"key":"e_1_3_2_1_47_1","first-page":"875","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Rebert A.","year":"2014","unstructured":"A. Rebert , S. K. Cha , T. Avgerinos , J. Foote , D. Warren , G. Grieco , and D. Brumley , \u201c Optimizing seed selection for fuzzing ,\u201d in Proceedings of the 23rd USENIX Security Symposium , San Diego, CA, USA , August 20-22, 2014 ., 2014, pp. 861\u2013 875 . {Online}. Available: https:\/\/www.usenix.org\/conference\/ usenixsecurity14\/technical-sessions\/presentation\/rebert A. Rebert, S. K. Cha, T. Avgerinos, J. Foote, D. Warren, G. Grieco, and D. Brumley, \u201cOptimizing seed selection for fuzzing,\u201d in Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014, pp. 861\u2013875. {Online}. Available: https:\/\/www.usenix.org\/conference\/ usenixsecurity14\/technical-sessions\/presentation\/rebert"},{"key":"e_1_3_2_1_48_1","first-page":"362","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Jana S.","year":"2016","unstructured":"S. Jana , Y. J. Kang , S. Roth , and B. Ray , \u201c Automatically detecting error handling bugs using error specifications ,\u201d in 25th USENIX Security Symposium (USENIX Security 16) . Austin, TX: USENIX Association , 2016 , pp. 345\u2013 362 . {Online}. Available: https:\/\/www.usenix.org\/conference\/usenixsecurity16\/ technical-sessions\/presentation\/jana S. Jana, Y. J. Kang, S. Roth, and B. Ray, \u201cAutomatically detecting error handling bugs using error specifications,\u201d in 25th USENIX Security Symposium (USENIX Security 16). Austin, TX: USENIX Association, 2016, pp. 345\u2013 362. {Online}. Available: https:\/\/www.usenix.org\/conference\/usenixsecurity16\/ technical-sessions\/presentation\/jana"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2016.15"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_1_56_1","first-page":"07101","article-title":"Fairfuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage","volume":"1709","author":"Lemieux C.","year":"2017","unstructured":"C. Lemieux and K. Sen , \u201c Fairfuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage ,\u201d CoRR , vol. abs\/ 1709 . 07101 , 2017 . {Online}. Available: http:\/\/arxiv.org\/abs\/1709.07101 C. Lemieux and K. Sen, \u201cFairfuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage,\u201d CoRR, vol. abs\/1709.07101, 2017. {Online}. Available: http:\/\/arxiv.org\/abs\/1709.07101","journal-title":"CoRR"},{"key":"e_1_3_2_1_57_1","volume-title":"American fuzzy lop - file format analyzer","year":"2018","unstructured":"\u201c American fuzzy lop - file format analyzer ,\u201d https:\/\/github.com\/mirrorer\/afl\/blob\/ master\/afl-analyze.c, accessed: 2018 -07-01. \u201cAmerican fuzzy lop - file format analyzer,\u201d https:\/\/github.com\/mirrorer\/afl\/blob\/ master\/afl-analyze.c, accessed: 2018-07-01."},{"key":"e_1_3_2_1_58_1","volume-title":"libfuzzer","year":"2018","unstructured":"\u201c libfuzzer ,\u201d https:\/\/llvm.org\/docs\/LibFuzzer.html, accessed: 2018 -04-01. \u201clibfuzzer,\u201d https:\/\/llvm.org\/docs\/LibFuzzer.html, accessed: 2018-04-01."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950340"},{"key":"e_1_3_2_1_61_1","article-title":"Automatic loop summarization via path dependency analysis","author":"Xie X.","year":"2018","unstructured":"X. Xie , B. Chen , L. Zou , Y. Liu , W. Le , and X. Li , \u201c Automatic loop summarization via path dependency analysis ,\u201d IEEE Transactions on Software Engineering , 2018 . X. Xie, B. Chen, L. Zou, Y. Liu, W. Le, and X. Li, \u201cAutomatic loop summarization via path dependency analysis,\u201d IEEE Transactions on Software Engineering, 2018.","journal-title":"IEEE Transactions on Software Engineering"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Tallinn Estonia","acronym":"ESEC\/FSE '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338975","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338975","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:21Z","timestamp":1750206381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":61,"alternative-id":["10.1145\/3338906.3338975","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338975","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}