{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T02:09:42Z","timestamp":1777342182814,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Research Foundation of Korea","award":["2017K1A3A1A17092614"],"award-info":[{"award-number":["2017K1A3A1A17092614"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359846","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"627-637","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["FuzzBuilder"],"prefix":"10.1145","author":[{"given":"Joonun","family":"Jang","sequence":"first","affiliation":[{"name":"Samsung Research, Seoul, Republic of Korea"}]},{"given":"Huy Kang","family":"Kim","sequence":"additional","affiliation":[{"name":"Korea University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1997. expat. https:\/\/github.com\/libexpat\/libexpat  1997. expat. https:\/\/github.com\/libexpat\/libexpat"},{"key":"e_1_3_2_1_2_1","unstructured":"2003. c-ares. https:\/\/github.com\/c-ares\/c-ares  2003. c-ares. https:\/\/github.com\/c-ares\/c-ares"},{"key":"e_1_3_2_1_3_1","unstructured":"2008. Google Test. https:\/\/github.com\/google\/googletest  2008. Google Test. https:\/\/github.com\/google\/googletest"},{"key":"e_1_3_2_1_4_1","unstructured":"2008. yara. https:\/\/github.com\/VirusTotal\/yara  2008. yara. https:\/\/github.com\/VirusTotal\/yara"},{"key":"e_1_3_2_1_5_1","unstructured":"2009. cJSON. https:\/\/github.com\/DaveGamble\/cJSON  2009. cJSON. https:\/\/github.com\/DaveGamble\/cJSON"},{"key":"e_1_3_2_1_6_1","unstructured":"2012. JUnit Best Practices Guide. https:\/\/howtodoinjava.com\/best-practices\/unit-testing-best-practices-junit-reference-guide\/  2012. JUnit Best Practices Guide. https:\/\/howtodoinjava.com\/best-practices\/unit-testing-best-practices-junit-reference-guide\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2013. mpc. https:\/\/github.com\/orangeduck\/mpc  2013. mpc. https:\/\/github.com\/orangeduck\/mpc"},{"key":"e_1_3_2_1_8_1","unstructured":"2014. boringssl. https:\/\/github.com\/google\/boringssl  2014. boringssl. https:\/\/github.com\/google\/boringssl"},{"key":"e_1_3_2_1_9_1","unstructured":"2016. lafintel. https:\/\/lafintel.wordpress.com\/  2016. lafintel. https:\/\/lafintel.wordpress.com\/"},{"key":"e_1_3_2_1_10_1","unstructured":"2017. notes for asan. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/docs\/notes_for_asan.txt  2017. notes for asan. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/docs\/notes_for_asan.txt"},{"key":"e_1_3_2_1_11_1","unstructured":"2019. clusterfuzz. https:\/\/github.com\/google\/clusterfuzz  2019. clusterfuzz. https:\/\/github.com\/google\/clusterfuzz"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Marcel B\u00f6hme Van-Thuan Pham and Abhik Roychoudhury. 2017. Coverage-based greybox fuzzing as markov chain. IEEE Transactions on Software Engineering (2017).  Marcel B\u00f6hme Van-Thuan Pham and Abhik Roychoudhury. 2017. Coverage-based greybox fuzzing as markov chain. IEEE Transactions on Software Engineering (2017).","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_15_1","volume-title":"Greybox Concolic Testing on Binary Code. In International Conference on Software Engineering (ICSE).","author":"Choi Jaeseung","year":"2019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2019.00015"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274746"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"VUzzer: Application-aware Evolutionary Fuzzing","volume":"17","author":"Rawat Sanjay","year":"2017","journal-title":"NDSS"},{"key":"e_1_3_2_1_25_1","unstructured":"Alexandre Rebert Sang Kil Cha Thanassis Avgerinos Jonathan Foote David Warren Gustavo Grieco and David Brumley. 2014. Optimizing seed selection for fuzzing. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 861--875.  Alexandre Rebert Sang Kil Cha Thanassis Avgerinos Jonathan Foote David Warren Gustavo Grieco and David Brumley. 2014. Optimizing seed selection for fuzzing. In 23rd { USENIX } Security Symposium ( { USENIX } Security 14). 861--875."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Kosta Serebryany. 2016. Continuous fuzzing with libfuzzer and addresssanitizer. In 2016 IEEE Cybersecurity Development (SecDev). IEEE 157--157.  Kosta Serebryany. 2016. Continuous fuzzing with libfuzzer and addresssanitizer. In 2016 IEEE Cybersecurity Development (SecDev). IEEE 157--157.","DOI":"10.1109\/SecDev.2016.043"},{"key":"e_1_3_2_1_27_1","unstructured":"Kostya Serebryany. 2017. OSS-Fuzz-Google's continuous fuzzing service for open source software. (2017).  Kostya Serebryany. 2017. OSS-Fuzz-Google's continuous fuzzing service for open source software. (2017)."},{"key":"e_1_3_2_1_28_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanity checker. In Presented as part of the 2012 {USENIX} Annual Technical Conference ({USENIX}{ATC} 12). 309--318.  Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanity checker. In Presented as part of the 2012 { USENIX } Annual Technical Conference ( { USENIX }{ ATC } 12). 309--318."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00109"},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution","volume":"16","author":"Stephens Nick","year":"2016","journal-title":"NDSS"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"e_1_3_2_1_34_1","volume-title":"27th {USENIX} Security Symposium ({USENIX} Security 18). 745--761.","author":"Yun Insu"},{"key":"e_1_3_2_1_35_1","unstructured":"Michal Zalewski. 2014. American Fuzzy Lob. http:\/\/lcamtuf.coredump.cx\/afl\/  Michal Zalewski. 2014. American Fuzzy Lob. http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_36_1","unstructured":"Michal Zalewski. 2015. american fuzzy lop technical whitepaper. http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt (2015).  Michal Zalewski. 2015. american fuzzy lop technical whitepaper. http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt (2015)."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","location":"San Juan Puerto Rico USA","acronym":"ACSAC '19"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359846","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359846","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359846"}},"subtitle":["automated building greybox fuzzing environment for C\/C++ library"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":36,"alternative-id":["10.1145\/3359789.3359846","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359846","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}