{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:10:04Z","timestamp":1750201804932,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,15]],"date-time":"2020-04-15T00:00:00Z","timestamp":1586908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1763172"],"award-info":[{"award-number":["CNS-1763172"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,15]]},"DOI":"10.1145\/3342195.3387556","type":"proceedings-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T07:19:58Z","timestamp":1588576798000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Mousse"],"prefix":"10.1145","author":[{"given":"Yingtong","family":"Liu","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Hsin-Wei","family":"Hung","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Ardalan Amiri","family":"Sani","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Nokia 9 PureView. https:\/\/www.nokia.com\/phones\/en_int\/nokia-9-pureview\/. (2019).  2019. Nokia 9 PureView. https:\/\/www.nokia.com\/phones\/en_int\/nokia-9-pureview\/. (2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"2019. Symbion: fusing concrete and symbolic execution. https:\/\/angr.io\/blog\/angr_symbion\/. (2019).  2019. Symbion: fusing concrete and symbolic execution. https:\/\/angr.io\/blog\/angr_symbion\/. (2019)."},{"key":"e_1_3_2_1_3_1","unstructured":"2020. Mousse source code. https:\/\/trusslab.github.io\/mousse\/. (2020).  2020. Mousse source code. https:\/\/trusslab.github.io\/mousse\/. (2020)."},{"volume":"200","journal-title":"J. Wiegert.","author":"Abramson D.","key":"e_1_3_2_1_4_1"},{"volume-title":"Proc. ACM PLDI.","author":"Arzt S.","key":"e_1_3_2_1_5_1"},{"volume-title":"AEG: Automatic Exploit Generation. In Proc","year":"2011","author":"Avgerinos T.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"T. Avgerinos S. K. Cha A. Rebert E. J. Schwartz M. Woo and D. Brumley. 2014. Automatic Exploit Generation. Commun. ACM (2014).  T. Avgerinos S. K. Cha A. Rebert E. J. Schwartz M. Woo and D. Brumley. 2014. Automatic Exploit Generation. Commun. ACM (2014).","DOI":"10.1145\/2560217.2560219"},{"key":"e_1_3_2_1_8_1","unstructured":"F. Bellard. 2005. QEMU a Fast and Portable Dynamic Translator. In USENIX ATC FREENIX Track.  F. Bellard. 2005. QEMU a Fast and Portable Dynamic Translator. In USENIX ATC FREENIX Track."},{"key":"e_1_3_2_1_9_1","unstructured":"F. Bellard. 2020. Tiny Code Generator. https:\/\/git.qemu.org\/?p=qemu.git;a=blob_plain;f=tcg\/README;hb=HEAD. (2020).  F. Bellard. 2020. Tiny Code Generator. https:\/\/git.qemu.org\/?p=qemu.git;a=blob_plain;f=tcg\/README;hb=HEAD. (2020)."},{"volume-title":"Proc. USENIX OSDI.","author":"Ben-Yehuda M.","key":"e_1_3_2_1_10_1"},{"volume":"201","journal-title":"J. Westenberg.","author":"Brown C. S.","key":"e_1_3_2_1_11_1"},{"volume-title":"Proc. USENIX OSDI.","author":"Cadar C.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"L. Ceze M. D. Hill and T. F. Wenisch. 2016. Arch2030: A Vision of Computer Architecture Research over the Next 15 Years. A Computing Community Consortium (CCC) white paper (2016).  L. Ceze M. D. Hill and T. F. Wenisch. 2016. Arch2030: A Vision of Computer Architecture Research over the Next 15 Years. A Computing Community Consortium (CCC) white paper (2016)."},{"volume-title":"Proc. IEEE Symposium on Security and Privacy (S&P).","author":"Cha S. K.","key":"e_1_3_2_1_14_1"},{"volume-title":"Proc. ACM EuroSys.","author":"Chipounov V.","key":"e_1_3_2_1_15_1"},{"volume-title":"Proc. USENIX Workshop on Hot Topics in System Dependability (HotDep).","author":"Chipounov V.","key":"e_1_3_2_1_16_1"},{"volume-title":"Proc. ACM ASPLOS.","author":"Chipounov V.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"V. Chipounov V. Kuznetsov and G. Candea. 2012. The S2E platform: Design implementation and applications. ACM Transactions on Computer Systems (TOCS) (2012).  V. Chipounov V. Kuznetsov and G. Candea. 2012. The S2E platform: Design implementation and applications. ACM Transactions on Computer Systems (TOCS) (2012).","DOI":"10.1145\/2110356.2110358"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"L. Ciortea C. Zamfir S. Bucur V. Chipounov and G. Candea. 2010. Cloud9: A Software Testing Service. SIGOPS Operating System Review (2010).  L. Ciortea C. Zamfir S. Bucur V. Chipounov and G. Candea. 2010. Cloud9: A Software Testing Service. SIGOPS Operating System Review (2010).","DOI":"10.1145\/1713254.1713257"},{"volume-title":"Proc. Int. Symp. on Software Testing and Analysis (ISSTA).","author":"Engler D.","key":"e_1_3_2_1_20_1"},{"volume-title":"Proc. ACM PLDI.","author":"Godefroid P.","key":"e_1_3_2_1_21_1"},{"volume-title":"Proc. Internet Society NDSS.","author":"Godefroid P.","key":"e_1_3_2_1_22_1"},{"volume-title":"SAGE: Whitebox Fuzzing for Security Testing. Commun. ACM","year":"2012","author":"Godefroid P.","key":"e_1_3_2_1_23_1"},{"volume-title":"Proc. ACM ASPLOS.","author":"Gordon A.","key":"e_1_3_2_1_24_1"},{"volume-title":"Proc. Internet Society NDSS.","author":"Gordon M. I.","key":"e_1_3_2_1_25_1"},{"volume-title":"Proc. USENIX ATC.","author":"Kuznetsov V.","key":"e_1_3_2_1_26_1"},{"volume-title":"Proc. USENIX ATC.","author":"Liu J.","key":"e_1_3_2_1_27_1"},{"volume-title":"Proc. IEEE HPCA.","author":"Liu M.","key":"e_1_3_2_1_28_1"},{"volume-title":"Proc. ACM MobiSys.","author":"Luo L.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","unstructured":"I. Malchev. 2017. Here comes Treble: A modular base for Android. https:\/\/android-developers.googleblog.com\/2017\/05\/here-comes-treble-modular-base-for.html. (2017).  I. Malchev. 2017. Here comes Treble: A modular base for Android. https:\/\/android-developers.googleblog.com\/2017\/05\/here-comes-treble-modular-base-for.html. (2017)."},{"volume-title":"Proc. Workshop on Binary Analysis Research (BAR).","author":"Muench M.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","unstructured":"M. Owen. 2018. A deep dive into HomePod's adaptive audio beamforming and why it needs an A8 processor. https:\/\/appleinsider.com\/articles\/18\/01\/27\/a-deep-dive-into-homepods-adaptive-audio-beamforming-and-why-it-needs-an-a8-processor. (2018).  M. Owen. 2018. A deep dive into HomePod's adaptive audio beamforming and why it needs an A8 processor. https:\/\/appleinsider.com\/articles\/18\/01\/27\/a-deep-dive-into-homepods-adaptive-audio-beamforming-and-why-it-needs-an-a8-processor. (2018)."},{"volume-title":"Proc. USENIX Security Symposium.","author":"Ramos D. A.","key":"e_1_3_2_1_33_1"},{"volume-title":"Proc. Int. Conf. on Computer Aided Verification (CAV).","author":"Ramos D. A.","key":"e_1_3_2_1_34_1"},{"volume-title":"Proc. USENIX OSDI.","author":"Renzelmann M. J.","key":"e_1_3_2_1_35_1"},{"volume-title":"Proc. USENIX Security Symposium.","author":"Seyed Talebi S. M.","key":"e_1_3_2_1_36_1"},{"volume-title":"Proc. IEEE Symposium on Security and Privacy (S&P).","author":"Shoshitaishvili Y.","key":"e_1_3_2_1_37_1"},{"volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In Proc","year":"2016","author":"Stephens N.","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660357"},{"key":"e_1_3_2_1_40_1","unstructured":"C. Welch. 2018. Pimax opens preorders for its very expensive 8K and 5K VR headsets. https:\/\/www.theverge.com\/2018\/10\/24\/18019254\/pimax-8k-5k-vr-headset-preorders-now-available-features-price. (2018).  C. Welch. 2018. Pimax opens preorders for its very expensive 8K and 5K VR headsets. https:\/\/www.theverge.com\/2018\/10\/24\/18019254\/pimax-8k-5k-vr-headset-preorders-now-available-features-price. (2018)."},{"volume-title":"Proc. USENIX Security Symposium.","author":"Yun I.","key":"e_1_3_2_1_41_1"},{"volume-title":"Avatar: A framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares. In Proc","year":"2014","author":"Zaddach J.","key":"e_1_3_2_1_42_1"}],"event":{"name":"EuroSys '20: Fifteenth EuroSys Conference 2020","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Heraklion Greece","acronym":"EuroSys '20"},"container-title":["Proceedings of the Fifteenth European Conference on Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387556","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342195.3387556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:33:22Z","timestamp":1750199602000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342195.3387556"}},"subtitle":["a system for selective symbolic execution of programs with untamed environments"],"short-title":[],"issued":{"date-parts":[[2020,4,15]]},"references-count":42,"alternative-id":["10.1145\/3342195.3387556","10.1145\/3342195"],"URL":"https:\/\/doi.org\/10.1145\/3342195.3387556","relation":{},"subject":[],"published":{"date-parts":[[2020,4,15]]},"assertion":[{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}