{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:29Z","timestamp":1773510929953,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CNS-1652790"],"award-info":[{"award-number":["CNS-1652790"]}]},{"DOI":"10.13039\/100007297","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-16-1-2912,N00014-16-1-2265,N00014- 17-1-2894,N00014-17-1-2895,N00014-18-1-2662"],"award-info":[{"award-number":["N00014-16-1-2912,N00014-16-1-2265,N00014- 17-1-2894,N00014-17-1-2895,N00014-18-1-2662"]}],"id":[{"id":"10.13039\/100007297","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417260","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:02Z","timestamp":1604341622000},"page":"955-970","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback"],"prefix":"10.1145","author":[{"given":"Rui","family":"Zhong","sequence":"first","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Yongheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Hong","family":"Hu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Hangfan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]},{"given":"Wenke","family":"Lee","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Dinghao","family":"Wu","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, State College, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"MariaDB. https:\/\/www.mariadb.org\/.  MariaDB. https:\/\/www.mariadb.org\/."},{"key":"e_1_3_2_2_2_1","unstructured":"MySQL. https:\/\/www.mysql.com\/.  MySQL. https:\/\/www.mysql.com\/."},{"key":"e_1_3_2_2_3_1","unstructured":"PostgreSQL. https:\/\/www.postgresql.org\/.  PostgreSQL. https:\/\/www.postgresql.org\/."},{"key":"e_1_3_2_2_4_1","unstructured":"SQLite. https:\/\/www.sqlite.org\/index.html.  SQLite. https:\/\/www.sqlite.org\/index.html."},{"key":"e_1_3_2_2_5_1","volume-title":"https:\/\/github.com\/anse1\/sqlsmith","year":"2016"},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/docs.microsoft.com\/en-us\/sql\/odbc\/reference\/processing-a-sql-statement?view=sql-server-ver15","author":"Statement Processing","year":"2017"},{"key":"e_1_3_2_2_7_1","volume-title":"October","author":"All Three Billion Accounts Yahoo Says","year":"2017"},{"key":"e_1_3_2_2_8_1","volume-title":"https:\/\/www.mysql.com\/customers\/","author":"Customers SQL","year":"2020"},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/wiki.postgresql.org\/wiki\/PostgreSQL_Clients","author":"Clients SQL","year":"2020"},{"key":"e_1_3_2_2_10_1","volume-title":"https:\/\/www.w3schools.com\/sql\/sql_ref_keywords.asp","author":"Keywords Reference SQL","year":"2020"},{"key":"e_1_3_2_2_11_1","volume-title":"https:\/\/www.w3schools.com\/sql\/sql_operators.asp","author":"Operators SQL","year":"2020"},{"key":"e_1_3_2_2_12_1","volume-title":"https:\/\/www.sqlite.org\/famous.html","author":"Lite Well-Known","year":"2020"},{"key":"e_1_3_2_2_13_1","volume-title":"https:\/\/github.com\/anse1\/sqlsmith#description","author":"Description Lsmith","year":"2020"},{"key":"e_1_3_2_2_14_1","volume-title":"Khalek and S. Khurshid. Automated SQL Query Generation for Systematic Testing of Database Engines. In Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, ASE10","author":"Abdul S.","year":"2010"},{"key":"e_1_3_2_2_15_1","volume-title":"May","author":"Acohido B.","year":"2013"},{"key":"e_1_3_2_2_16_1","volume-title":"Alloy - Documentation of Alloy SAT solver","year":"2019"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23412"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1325851.1325993"},{"key":"e_1_3_2_2_20_1","volume-title":"USENIX Security Symposium","author":"Blazytko T.","year":"2019"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_2_23_1","volume-title":"Au-gust","author":"Buskirk E. V.","year":"2009"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0395-0"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_2_27_1","volume-title":"December","author":"Cimpanu C.","year":"2019"},{"key":"e_1_3_2_2_28_1","volume-title":"Data Science Revealed: A Data-Driven Glimpse into the BurgeoningNew Field. https:\/\/fayyad.com\/data-science-revealed-a-data-driven-glimpse-into-the-burgeoning-new-field\/","author":"Fayyad U. M.","year":"2011"},{"key":"e_1_3_2_2_29_1","volume-title":"May","author":"Franceschi-Bicchierai L.","year":"2016"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_2_31_1","volume-title":"Proceedings of the 29th USENIX Security Symposium(Security), BOSTON, MA","author":"Gan S.","year":"2020"},{"key":"e_1_3_2_2_32_1","unstructured":"Google. Honggfuzz 2016. https:\/\/google.github.io\/honggfuzz\/.  Google. Honggfuzz 2016. https:\/\/google.github.io\/honggfuzz\/."},{"key":"e_1_3_2_2_33_1","volume-title":"OSS-Fuzz - Continuous Fuzzing For Open Source Software. https:\/\/github.com\/google\/oss-fuzz","year":"2018"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23263"},{"key":"e_1_3_2_2_35_1","volume-title":"January","author":"Hunt T.","year":"2020"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 46th International Conference on Very Large Data Bases (VLDB)","author":"Jung J.","year":"2020"},{"key":"e_1_3_2_2_37_1","unstructured":"V. V. Koushik. ALERT: SQLite database Remote Code Execution Vulnerability. https:\/\/www.secpod.com\/blog\/sqlite-database-remote-code-execution\/ August2019.  V. V. Koushik. ALERT: SQLite database Remote Code Execution Vulnerability. https:\/\/www.secpod.com\/blog\/sqlite-database-remote-code-execution\/ August2019."},{"key":"e_1_3_2_2_38_1","volume-title":"Feb.","author":"Laney D.","year":"2001"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.14778\/3352063.3352129"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_2_42_1","volume-title":"LibFuzzer - A Library For Coverage-guided Fuzz Testing","author":"LLVM.","year":"2017"},{"issue":"2","key":"e_1_3_2_2_43_1","first-page":"203","volume":"19","author":"Lo E.","year":"2010","journal-title":"-K. Hon. A Framework for Testing DBMS Features. The VLDB Journal"},{"key":"e_1_3_2_2_44_1","volume-title":"Hainaut. Test Input Generation for Database Programs Using Relational Constraints. In Proceedings of the Fifth International Workshop on Testing Database Systems, DBTest 12","author":"Marcozzi M.","year":"2012"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376668"},{"key":"e_1_3_2_2_47_1","volume-title":"funfuzz. https:\/\/github.com\/MozillaSecurity\/funfuzz","author":"Security Mozilla","year":"2020"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_2_50_1","volume-title":"Proceedings of the 39th IEEE Symposium on Security and Privacy(Oakland)","author":"Peng H.","year":"2018"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897356.2897362"},{"key":"e_1_3_2_2_52_1","first-page":"04174","author":"Rigger M.","year":"2001","journal-title":"Testing Database Engines via Pivoted Query Synthesis. arXiv preprint arXiv"},{"key":"e_1_3_2_2_53_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Schumilo S.","year":"2017"},{"key":"e_1_3_2_2_54_1","volume-title":"And Harden Your C++ Code","author":"Serebryany K.","year":"2016"},{"key":"e_1_3_2_2_55_1","volume-title":"Technical Report MSR-TR-98--21","author":"Slutz D.","year":"1998"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481528.2481537"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ChinaCom.2013.6694634"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250739"},{"key":"e_1_3_2_2_61_1","volume-title":"December","author":"Xu R.","year":"2019"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209950.3209958"},{"key":"e_1_3_2_2_64_1","volume-title":"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Yun I.","year":"2018"},{"key":"e_1_3_2_2_65_1","unstructured":"M. Zalewski. American Fuzzy Lop (2.52b). http:\/\/lcamtuf.coredump.cx\/afl 2019.  M. Zalewski. American Fuzzy Lop (2.52b). http:\/\/lcamtuf.coredump.cx\/afl 2019."},{"key":"e_1_3_2_2_66_1","volume-title":"http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt","author":"Zalewski M.","year":"2019"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417260","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:30Z","timestamp":1750197690000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":66,"alternative-id":["10.1145\/3372297.3417260","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417260","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}