{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T17:55:07Z","timestamp":1773078907765,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409769","type":"proceedings-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T06:03:47Z","timestamp":1604815427000},"page":"690-700","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["CrFuzz: fuzzing multi-purpose programs through input validation"],"prefix":"10.1145","author":[{"given":"Suhwan","family":"Song","sequence":"first","affiliation":[{"name":"Seoul National University, South Korea"}]},{"given":"Chengyu","family":"Song","sequence":"additional","affiliation":[{"name":"University of California at Riverside, USA"}]},{"given":"Yeongjin","family":"Jang","sequence":"additional","affiliation":[{"name":"Oregon State University, USA"}]},{"given":"Byoungyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Mopt source code. https:\/\/github.com\/puppet-meteor\/MOpt-AFL.  Mopt source code. https:\/\/github.com\/puppet-meteor\/MOpt-AFL."},{"key":"e_1_3_2_2_2_1","unstructured":"Qsym source code. https:\/\/github.com\/sslab-gatech\/qsym.  Qsym source code. https:\/\/github.com\/sslab-gatech\/qsym."},{"key":"e_1_3_2_2_3_1","unstructured":"American fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/.  American fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_2_4_1","unstructured":"Circumventing fuzzing roadblocks with compiler transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzing-roadblockswith-compiler-transformations\/.  Circumventing fuzzing roadblocks with compiler transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzing-roadblockswith-compiler-transformations\/."},{"key":"e_1_3_2_2_5_1","unstructured":"syzkaller is an unsupervised coverage-guided kernel fuzzer. https:\/\/github.com\/ google\/syzkaller.  syzkaller is an unsupervised coverage-guided kernel fuzzer. https:\/\/github.com\/ google\/syzkaller."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23412"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security), SANTA CLARA, CA","author":"Blazytko T.","year":"2019"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363225"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354249"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155573"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23014"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 27th International Symposium on Software Testing and Analysis (ISSTA)","author":"Lemieux C.","year":"2018"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"e_1_3_2_2_23_1","unstructured":"libfuzzer. libfuzzer. https:\/\/llvm.org\/docs\/LibFuzzer.html.  libfuzzer. libfuzzer. https:\/\/llvm.org\/docs\/LibFuzzer.html."},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security), SANTA CLARA, CA","author":"Lyu C.","year":"2019"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380421"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 28th International Symposium on Software Testing and Analysis (ISSTA)","author":"Padhye R.","year":"2014"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183494"},{"key":"e_1_3_2_2_35_1","volume-title":"Not all coverage measurements are equal: Fuzzing by coverage accounting for input prioritization","author":"Wang Y.","year":"2020"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236039"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00057"},{"key":"e_1_3_2_2_38_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security), BALTIMORE, MD","author":"Yun I.","year":"2018"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23504"},{"key":"e_1_3_2_2_40_1","volume-title":"Fuzzguard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning","author":"Zong P.","year":"2020"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409769","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409769","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:58Z","timestamp":1750197718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":40,"alternative-id":["10.1145\/3368089.3409769","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409769","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}