{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:11:44Z","timestamp":1775873504586,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409679","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:08:44Z","timestamp":1605042524000},"page":"172-183","source":"Crossref","is-referenced-by-count":51,"title":["Mining input grammars from dynamic control flow"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9953-0930","authenticated-orcid":false,"given":"Rahul","family":"Gopinath","sequence":"first","affiliation":[{"name":"CISPA, Germany"}]},{"given":"Bj\u00f6rn","family":"Mathis","sequence":"additional","affiliation":[{"name":"CISPA, Germany"}]},{"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[{"name":"CISPA, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. The Codeproject. https:\/\/www.codeproject.com\/Articles\/88435\/SimpleGuide-to-Mathematical-Expression-Parsing.  [n.d.]. The Codeproject. https:\/\/www.codeproject.com\/Articles\/88435\/SimpleGuide-to-Mathematical-Expression-Parsing."},{"key":"e_1_3_2_2_2_1","unstructured":"[n.d.]. Home of the International Community interested in Grammatical Inference. https:\/\/grammarlearning.org.  [n.d.]. Home of the International Community interested in Grammatical Inference. https:\/\/grammarlearning.org."},{"key":"e_1_3_2_2_3_1","unstructured":"[n.d.]. JSON Parser. https:\/\/github.com\/HarryDC\/JsonParser.  [n.d.]. JSON Parser. https:\/\/github.com\/HarryDC\/JsonParser."},{"key":"e_1_3_2_2_4_1","unstructured":"[n.d.]. Lisp Parser. https:\/\/hackage.haskell.org\/package\/lispparser.  [n.d.]. Lisp Parser. https:\/\/hackage.haskell.org\/package\/lispparser."},{"key":"e_1_3_2_2_5_1","unstructured":"[n.d.]. Mathematical Expressions Parser. https:\/\/github.com\/louisfisch\/ mathematical-expressions-parser.  [n.d.]. Mathematical Expressions Parser. https:\/\/github.com\/louisfisch\/ mathematical-expressions-parser."},{"key":"e_1_3_2_2_6_1","unstructured":"[n.d.]. Microjson-a minimal JSON parser. https:\/\/github.com\/phensley\/ microjson.  [n.d.]. Microjson-a minimal JSON parser. https:\/\/github.com\/phensley\/ microjson."},{"key":"e_1_3_2_2_7_1","unstructured":"[n.d.]. MJS. https:\/\/github.com\/cesanta\/mjs.  [n.d.]. MJS. https:\/\/github.com\/cesanta\/mjs."},{"key":"e_1_3_2_2_8_1","unstructured":"[n.d.]. TinyC. https:\/\/github.com\/TinyCC\/TinyCC.  [n.d.]. TinyC. https:\/\/github.com\/TinyCC\/TinyCC."},{"key":"e_1_3_2_2_9_1","unstructured":"[n.d.]. URL Lib Parser. https:\/\/github.com\/python\/cpython\/blob\/3.6\/Lib\/urllib\/ parse.py.  [n.d.]. URL Lib Parser. https:\/\/github.com\/python\/cpython\/blob\/3.6\/Lib\/urllib\/ parse.py."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1995.1026"},{"key":"e_1_3_2_2_12_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars. In The Network and Distributed System Security Symposium.","author":"Aschermann Cornelius","year":"2019"},{"key":"e_1_3_2_2_13_1","volume-title":"The Network and Distributed System Security Symposium. The Internet Society.","author":"Bai Guangdong","year":"2013"},{"key":"e_1_3_2_2_14_1","first-page":"95","volume-title":"Synthesizing Program Input Grammars. In ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM","author":"Bastani Osbert","year":"2017"},{"key":"e_1_3_2_2_15_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Blazytko Tim","year":"2019"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17040-4_8"},{"key":"e_1_3_2_2_17_1","unstructured":"Sergey Bratus Lars Hermerschmidt Sven M. Hallberg Michael E. Locasto Falcon Momot Meredith L. Patterson and Anna Shubina. 2017. Curing the Vulnerable Parser: Design Patterns for Secure Input Handling. ;login: 42 ( 2017 ).  Sergey Bratus Lars Hermerschmidt Sven M. Hallberg Michael E. Locasto Falcon Momot Meredith L. Patterson and Anna Shubina. 2017. Curing the Vulnerable Parser: Design Patterns for Secure Input Handling. ;login: 42 ( 2017 )."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315286"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2017.39"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","volume-title":"Grammatical inference: learning automata and grammars","author":"la Higuera Colin De","DOI":"10.1017\/CBO9781139194655"},{"key":"e_1_3_2_2_23_1","first-page":"69","article-title":"A Formalism to Automate Mapping from Program Features to Code","author":"Deprez Jean-Christophe","year":"2000","journal-title":"IWPC."},{"key":"e_1_3_2_2_24_1","volume-title":"NEUZZ: Eficient Fuzzing with Neural Program Smoothing","author":"Dongdong Shi Kexin Pei","year":"2019"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Henning Fernau. 2009. Algorithms for learning regular expressions from positive data. Information and Computation 207 4 ( 2009 ) 521-541.  Henning Fernau. 2009. Algorithms for learning regular expressions from positive data. Information and Computation 207 4 ( 2009 ) 521-541.","DOI":"10.1016\/j.ic.2008.12.008"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28865-9_18"},{"key":"e_1_3_2_2_27_1","first-page":"206","volume-title":"Grammar-based Whitebox Fuzzing. In ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM","author":"Godefroid Patrice"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2015.20"},{"key":"e_1_3_2_2_30_1","volume-title":"Colin De la Higuera, and Menno Van Zaanen","author":"Heinz Jefrey","year":"2015"},{"key":"e_1_3_2_2_31_1","volume-title":"Topics in grammatical inference","author":"Heinz Jefrey"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362831"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970321"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.2003.1271205"},{"key":"e_1_3_2_2_35_1","article-title":"Generating LR syntax error messages from examples","volume":"25","author":"Jefery Clinton L","year":"2003","journal-title":"ACM Transactions on Programming Languages and Systems (TOPLAS)"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Trevor Jim and Yitzhak Mandelbaum. 2010. Eficient Earley parsing with regular right-hand sides. Electronic Notes in Theoretical Computer Science 253 7 ( 2010 ) 135-148.  Trevor Jim and Yitzhak Mandelbaum. 2010. Eficient Earley parsing with regular right-hand sides. Electronic Notes in Theoretical Computer Science 253 7 ( 2010 ) 135-148.","DOI":"10.1016\/j.entcs.2010.08.037"},{"key":"e_1_3_2_2_37_1","volume-title":"Debugging Inputs. In International Conference on Software Engineering. ACM.","author":"Kirschner Lukas","year":"2020"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2997364.2997370"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453114"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.54"},{"key":"e_1_3_2_2_41_1","volume-title":"Parser Directed Fuzzing. In ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM","author":"Mathis Bj\u00f6rn","year":"2019"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134307"},{"key":"e_1_3_2_2_43_1","unstructured":"F. Momot S. Bratus S. M. Hallberg and M. L. Patterson. 2016. The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them. In 2016 IEEE Cybersecurity Development (SecDev). 45-52. https:\/\/doi.org\/10.1109\/SecDev. 2016.019 10.1109\/SecDev.2016.019  F. Momot S. Bratus S. M. Hallberg and M. L. Patterson. 2016. The Seven Turrets of Babel: A Taxonomy of LangSec Errors and How to Expunge Them. In 2016 IEEE Cybersecurity Development (SecDev). 45-52. https:\/\/doi.org\/10.1109\/SecDev. 2016.019 10.1109\/SecDev.2016.019"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2002.1021348"},{"key":"e_1_3_2_2_45_1","unstructured":"Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR abs\/1711.04596 ( 2017 ). arXiv: 1711.04596 http:\/\/arxiv.org\/abs\/1711.04596  Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR abs\/1711.04596 ( 2017 ). arXiv: 1711.04596 http:\/\/arxiv.org\/abs\/1711.04596"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.05.008"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2007.45"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338958"},{"key":"e_1_3_2_2_49_1","volume-title":"Generating Software Tests","author":"Zeller Andreas"},{"key":"e_1_3_2_2_50_1","volume-title":"Generating Software Tests","author":"Zeller Andreas"},{"key":"e_1_3_2_2_51_1","volume-title":"Generating Software Tests","author":"Zeller Andreas"},{"key":"e_1_3_2_2_52_1","volume-title":"Generating Software Tests","author":"Zeller Andreas"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:39Z","timestamp":1750203879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":52,"alternative-id":["10.1145\/3368089.3409679","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409679","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]}}}