{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:14:13Z","timestamp":1775873653683,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014402","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DE190100046"],"award-info":[{"award-number":["DE190100046"]}],"id":[{"id":"10.13039\/100014402","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["No. 2019-0-01697"],"award-info":[{"award-number":["No. 2019-0-01697"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409748","type":"proceedings-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T06:03:52Z","timestamp":1604815432000},"page":"678-689","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":99,"title":["Boosting fuzzer efficiency: an information theoretic perspective"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4470-1824","authenticated-orcid":false,"given":"Marcel","family":"B\u00f6hme","sequence":"first","affiliation":[{"name":"Monash University, Australia"}]},{"given":"Valentin J. M.","family":"Man\u00e8s","sequence":"additional","affiliation":[{"name":"KAIST, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6012-7228","authenticated-orcid":false,"given":"Sang Kil","family":"Cha","sequence":"additional","affiliation":[{"name":"KAIST, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Abhishek Aarya Oliver Chang Max Moroz Martin Barbella and Jonathan Metzman. 2019. Open sourcing ClusterFuzz. https:\/\/security.googleblog.com\/ 2019 \/02\/ open-sourcing-clusterfuzz.html. ( 2019 ). Accessed: 2020-09-30.  Abhishek Aarya Oliver Chang Max Moroz Martin Barbella and Jonathan Metzman. 2019. Open sourcing ClusterFuzz. https:\/\/security.googleblog.com\/ 2019 \/02\/ open-sourcing-clusterfuzz.html. ( 2019 ). Accessed: 2020-09-30."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610413"},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft '15)","author":"Amalfitano Domenico","unstructured":"Domenico Amalfitano , Nicola Amatucci , Anna Rita Fasolino , Porfirio Tramontana , Emily Kowalczyk , and Atif M. Memon . 2015. Exploiting the Saturation Efect in Automatic Random Testing of Android Applications . In Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft '15) . 33\u015b43. Domenico Amalfitano, Nicola Amatucci, Anna Rita Fasolino, Porfirio Tramontana, Emily Kowalczyk, and Atif M. Memon. 2015. Exploiting the Saturation Efect in Automatic Random Testing of Android Applications. In Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft '15). 33\u015b43."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00117"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210309"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409729"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2487274"},{"key":"e_1_3_2_2_9_1","volume-title":"Coveragebased Greybox Fuzzing as Markov Chain","author":"B\u00f6hme Marcel","year":"2017","unstructured":"Marcel B\u00f6hme , Van-Thuan Pham , and Abhik Roychoudhury . 2017. Coveragebased Greybox Fuzzing as Markov Chain . IEEE Transactions on Software Engineering ( 2017 ), 1\u015b18. Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. 2017. Coveragebased Greybox Fuzzing as Markov Chain. IEEE Transactions on Software Engineering ( 2017 ), 1\u015b18."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2008.4517003"},{"key":"e_1_3_2_2_11_1","unstructured":"Justin Campbell and Mike Walker. 2020. Microsoft announces new Project OneFuzz framework an open source developer tool to find and fix bugs at scale. https:\/\/www.microsoft.com\/security\/blog\/2020\/09\/15\/microsoft-onefuzzframework-open-source-developer-tool-fix-bugs\/. ( 2020 ). Accessed: 2020-09-30.  Justin Campbell and Mike Walker. 2020. Microsoft announces new Project OneFuzz framework an open source developer tool to find and fix bugs at scale. https:\/\/www.microsoft.com\/security\/blog\/2020\/09\/15\/microsoft-onefuzzframework-open-source-developer-tool-fix-bugs\/. ( 2020 ). Accessed: 2020-09-30."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693085"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the IEEE International Conference on Robotics and Automation (ICRA '12). 2080","author":"Carrillo Henry","year":"2087","unstructured":"Henry Carrillo , Ian Reid , and Jos\u00e9 A. Castellanos . 2012. On the Comparison of Uncertainty Criteria for Active SLAM . In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA '12). 2080 \u015b 2087 . Henry Carrillo, Ian Reid, and Jos\u00e9 A. Castellanos. 2012. On the Comparison of Uncertainty Criteria for Active SLAM. In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA '12). 2080\u015b2087."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Anne Chao Y. T. Wang and Lou Jost. 2013. Entropy and the species accumulation curve: a novel entropy estimator via discovery rates of new species. Methods in Ecology and Evolution 4 11 ( 2013 ) 1091\u015b1100.  Anne Chao Y. T. Wang and Lou Jost. 2013. Entropy and the species accumulation curve: a novel entropy estimator via discovery rates of new species. Methods in Ecology and Evolution 4 11 ( 2013 ) 1091\u015b1100.","DOI":"10.1111\/2041-210X.12108"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the IEEE International Conference on Software Testing, Verification and Validation. 223\u015b233","author":"Feldt R.","unstructured":"R. Feldt , S. Poulding , D. Clark , and S. Yoo . 2016. Test Set Diameter: Quantifying the Diversity of Sets of Test Cases . In Proceedings of the IEEE International Conference on Software Testing, Verification and Validation. 223\u015b233 . R. Feldt, S. Poulding, D. Clark, and S. Yoo. 2016. Test Set Diameter: Quantifying the Diversity of Sets of Test Cases. In Proceedings of the IEEE International Conference on Software Testing, Verification and Validation. 223\u015b233."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486870"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 14th USENIX Workshop on Ofensive Technologies (WOOT '20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi , Dominik Maier , Heiko Ei\u00dffeldt , and Marc Heuse . 2020 . AFL++: Combining Incremental Steps of Fuzzing Research . In Proceedings of the 14th USENIX Workshop on Ofensive Technologies (WOOT '20) . 1\u015b12. Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In Proceedings of the 14th USENIX Workshop on Ofensive Technologies (WOOT '20). 1\u015b12."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336773"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23263"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409767"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_2_27_1","volume-title":"LibFuzzer: A library for coverage-guided fuzz testing","unstructured":"LibFuzzer. 2019. LibFuzzer: A library for coverage-guided fuzz testing . http:\/\/llvm.org\/docs\/LibFuzzer.html. ( 2019 ). Accessed: 2019-02-20. LibFuzzer. 2019. LibFuzzer: A library for coverage-guided fuzz testing. http:\/\/llvm.org\/docs\/LibFuzzer.html. ( 2019 ). Accessed: 2019-02-20."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the International Conference on Software Engineering. 1024\u015b1036","author":"Man\u00e8s Valentin J. M.","year":"2020","unstructured":"Valentin J. M. Man\u00e8s , Soomin Kim , and Sang Kil Cha . 2020 . Ankou: Guiding Greybox Fuzzing towards Combinatorial Diference . In Proceedings of the International Conference on Software Engineering. 1024\u015b1036 . Valentin J. M. Man\u00e8s, Soomin Kim, and Sang Kil Cha. 2020. Ankou: Guiding Greybox Fuzzing towards Combinatorial Diference. In Proceedings of the International Conference on Software Engineering. 1024\u015b1036."},{"key":"e_1_3_2_2_30_1","unstructured":"Jonathan Metzmann Abhishek Arya and L\u00e1szl'o Szekeres. 2020. FuzzBench: Fuzzer Benchmarking as a Service. https:\/\/security.googleblog.com\/ 2020 \/03\/ fuzzbench-fuzzer-benchmarking-as-service.html. ( 2020 ). Accessed: 2020-09-17.  Jonathan Metzmann Abhishek Arya and L\u00e1szl'o Szekeres. 2020. FuzzBench: Fuzzer Benchmarking as a Service. https:\/\/security.googleblog.com\/ 2020 \/03\/ fuzzbench-fuzzer-benchmarking-as-service.html. ( 2020 ). Accessed: 2020-09-17."},{"key":"e_1_3_2_2_31_1","unstructured":"OSS-Fuzz. 2019. Continuous Fuzzing Platform. https:\/\/github.com\/google\/ossfuzz\/tree\/master\/infra. ( 2019 ). Accessed: 2019-02-20.  OSS-Fuzz. 2019. Continuous Fuzzing Platform. https:\/\/github.com\/google\/ossfuzz\/tree\/master\/infra. ( 2019 ). Accessed: 2019-02-20."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2941681"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the USENIX Security Symposium (SEC '14)","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert , Sang Kil Cha , Thanassis Avgerinos , Jonathan Foote , David Warren , Gustavo Grieco , and David Brumley . 2014 . Optimizing Seed Selection for Fuzzing . In Proceedings of the USENIX Security Symposium (SEC '14) . 861\u015b875. Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing Seed Selection for Fuzzing. In Proceedings of the USENIX Security Symposium (SEC '14). 861\u015b875."},{"key":"e_1_3_2_2_36_1","volume-title":"HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020","author":"Schumilo Sergej","year":"2020","unstructured":"Sergej Schumilo , Cornelius Aschermann , Ali Abbasi , Simon W\u00f6rner , and Thorsten Holz . 2020 . HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020 , San Diego, California, USA , February 23-26, 2020. Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon W\u00f6rner, and Thorsten Holz. 2020. HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23-26, 2020."},{"key":"e_1_3_2_2_37_1","unstructured":"Konstantin Serebryany. 2017. https:\/\/github.com\/google\/fuzzer-test-suite\/blob\/ master\/engine-comparison\/tutorial\/abTestingTutorial.md. ( 2017 ). Accessed: 2019-02-20.  Konstantin Serebryany. 2017. https:\/\/github.com\/google\/fuzzer-test-suite\/blob\/ master\/engine-comparison\/tutorial\/abTestingTutorial.md. ( 2017 ). Accessed: 2019-02-20."},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedings of the 2012 USENIX Conference on Annual Technical Conference (USENIX ATC '12). 28\u015b28","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitry Vyukov . 2012 . AddressSanitizer: A Fast Address Sanity Checker . In Proceedings of the 2012 USENIX Conference on Annual Technical Conference (USENIX ATC '12). 28\u015b28 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In Proceedings of the 2012 USENIX Conference on Annual Technical Conference (USENIX ATC '12). 28\u015b28."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"crossref","unstructured":"Claude E. Shannon. 1948. A Mathematical Theory of Communication. Bell System Technical Journal 27 ( 1948 ).  Claude E. Shannon. 1948. A Mathematical Theory of Communication. Bell System Technical Journal 27 ( 1948 ).","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595706"},{"key":"e_1_3_2_2_41_1","unstructured":"Sebastian Thrun. 2003. Exploring Artificial Intelligence in the New Millennium. Chapter Robotic Mapping: A Survey 1\u015b35.  Sebastian Thrun. 2003. Exploring Artificial Intelligence in the New Millennium. Chapter Robotic Mapping: A Survey 1\u015b35."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_2_44_1","volume-title":"Fischer","author":"Yang Linmin","year":"2011","unstructured":"Linmin Yang , Zhe Dang , and Thomas R . Fischer . 2011 . Information gain of black-box testing. Formal Aspects of Computing 23, 4 ( 01 Jul 2011 ), 513\u015b539. Linmin Yang, Zhe Dang, and Thomas R. Fischer. 2011. Information gain of black-box testing. Formal Aspects of Computing 23, 4 ( 01 Jul 2011 ), 513\u015b539."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491509.2491513"},{"key":"e_1_3_2_2_46_1","volume-title":"AFL: American Fuzzy Lop Fuzzer","author":"Zalewski Michal","year":"2019","unstructured":"Michal Zalewski . 2019 . AFL: American Fuzzy Lop Fuzzer . http:\/\/lcamtuf. coredump.cx\/afl\/technical_details.txt. ( 2019 ). Accessed: 2019-02-20. Michal Zalewski. 2019. AFL: American Fuzzy Lop Fuzzer. http:\/\/lcamtuf. coredump.cx\/afl\/technical_details.txt. ( 2019 ). Accessed: 2019-02-20."}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:57Z","timestamp":1750197717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409748"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":45,"alternative-id":["10.1145\/3368089.3409748","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409748","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}