{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:55:30Z","timestamp":1773510930588,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea government (MSIT)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3377811.3380421","type":"proceedings-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T18:25:38Z","timestamp":1601576738000},"page":"1024-1036","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":39,"title":["Ankou"],"prefix":"10.1145","author":[{"given":"Valentin J. M.","family":"Man\u00e8s","sequence":"first","affiliation":[{"name":"KAIST, Daejeon, Korea"}]},{"given":"Soomin","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Korea"}]},{"given":"Sang Kil","family":"Cha","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Data Flow Sanitizer. http:\/\/clang.llvm.org\/docs\/DataFlowSanitizer.html."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Fidgety AFL. https:\/\/groups.google.com\/forum\/#!topic\/afl-users\/fOPeb62FZUg."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. The Go Programming Language. https:\/\/golang.org."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Gonum Numeric Library. https:\/\/www.gonum.org."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. LibFuzzer. http:\/\/llvm.org\/docs\/LibFuzzer.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Mike Aizatsky Kostya Serebryany Oliver Chang Abhishek Arya and Meredith Whittaker. 2016. Announcing OSS-Fuzz: Continuous Fuzzing for Open Source Software. Google Testing Blog."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Andrea Arcuri and Lionel Briand. 2011. A practical guide for using statistical tests to assess randomized algorithms in software engineering. 1--10.","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_1_8_1","unstructured":"Raman Arora Andy Cotter and Nati Srebro. 2013. Stochastic optimization of PCA with capped MSG. In Advances in Neural Information Processing Systems. 1815--1823."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security. 1032--1043","author":"B\u00f6hme Marcel","year":"2016","unstructured":"Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. 2016. Coveragebased Greybox Fuzzing as Markov Chain. In Proceedings of the ACM Conference on Computer and Communications Security. 1032--1043."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00082"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the International Conference on Very Large Data Bases. 426--435","author":"Ciaccia Paolo","year":"1997","unstructured":"Paolo Ciaccia, Marco Patella, and Pavel Zezula. 1997. M-Tree: An Efficient Access Method for Similarity Search in Metric Spaces. In Proceedings of the International Conference on Very Large Data Bases. 426--435."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the International Conference on Software Engineering. 820--831","author":"Cui Weidong","unstructured":"Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, and Vasileios P. Kemerlis. 2016. RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps. In Proceedings of the International Conference on Software Engineering. 820--831."},{"key":"e_1_3_2_1_18_1","unstructured":"Al Danial. [n.d.]. Count Lines of Code: Coverage Tool. http:\/\/cloc.sourceforge.net\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Black Hat USA.","author":"Embleton Shawn","year":"2006","unstructured":"Shawn Embleton, Sherri Sparks, and Ryan Cunningham. 2006. \"Sidewinder\": An Evolutionary Guidance System for Malicious Input Crafting. In Proceedings of the Black Hat USA."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.33"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/4.3.265"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_1_24_1","series-title":"SIAM review 53, 2","volume-title":"Finding Structure with Randomness: Probabilistic Algorithms for Constructing Approximate Matrix Decompositions","author":"Halko Nathan","year":"2011","unstructured":"Nathan Halko, Per-Gunnar Martinsson, and Joel A Tropp. 2011. Finding Structure with Randomness: Probabilistic Algorithms for Constructing Approximate Matrix Decompositions. SIAM review 53, 2 (2011), 217--288."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23263"},{"key":"e_1_3_2_1_27_1","volume-title":"Principal Component Analysis","author":"Jolliffe Ian T.","unstructured":"Ian T. Jolliffe. 2011. Principal Component Analysis. Springer."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_29_1","unstructured":"lafintel. 2016. Circumventing Fuzzing Roadblocks with Compiler Transformations. https:\/\/lafintel.wordpress.com\/2016\/08\/15\/circumventing-fuzzing-roadblocks-with-compiler-transformations\/."},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings of the International Conference on Artificial Life. 329--336","author":"Lehman Joel","year":"2008","unstructured":"Joel Lehman and Kenneth O Stanley. 2008. Exploiting Open-Endedness to Solve Problems through the Search for Novelty. In Proceedings of the International Conference on Artificial Life. 329--336."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338921"},{"key":"e_1_3_2_1_36_1","unstructured":"Jorge Pinilla L\u00f3pez. 2019. Improving fuzzing performance using hardware-accelerated hashing and PCA guidance. https:\/\/cs.anu.edu.au\/courses\/csprojects\/19S1\/reports\/u6759601_report.pdf."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_38_1","unstructured":"Valentin J. M. Man\u00e8s Soomin Kim and Sang Kil Cha. 2020. Ankou. https:\/\/github.com\/SoftSec-KAIST\/Ankou."},{"key":"e_1_3_2_1_39_1","volume-title":"Parser-directed Fuzzing. In Proceedings of the ACM Conference on Programming Language Design and Implementation. 548--560","author":"Mathis Bj\u00f6rn","year":"2019","unstructured":"Bj\u00f6rn Mathis, Rahul Gopinath, Micha\u00ebl Mera, Alexander Kampmann, Matthias H\u00f6schele, and Andreas Zeller. 2019. Parser-directed Fuzzing. In Proceedings of the ACM Conference on Programming Language Design and Implementation. 548--560."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the USENIX Security Symposium. 67--82","author":"Molnar David","unstructured":"David Molnar, Xue Cong Li, and David A. Wagner. 2009. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs. In Proceedings of the USENIX Security Symposium. 67--82."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the International Conference on Algorithmic Learning Theory. 98--112","author":"Nie Jiazhong","unstructured":"Jiazhong Nie, Wojciech Kot\u0142owski, and Manfred K. Warmuth. 2013. Online PCA with Optimal Regrets. In Proceedings of the International Conference on Algorithmic Learning Theory. 98--112."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the USENIX Security Symposium. 729--743","author":"Pailoor Shankara","year":"2018","unstructured":"Shankara Pailoor, Andrew Aday, and Suman Jana. 2018. MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation. In Proceedings of the USENIX Security Symposium. 729--743."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2941681"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the USENIX Security Symposium. 861--875","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing Seed Selection for Fuzzing. In Proceedings of the USENIX Security Symposium. 861--875."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 1997 Conference on Advances in Neural Information Processing Systems. 626--632","author":"Roweis Sam","year":"1997","unstructured":"Sam Roweis. 1997. EM Algorithms for PCA and SPCA. In Proceedings of the 1997 Conference on Advances in Neural Information Processing Systems. 626--632."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the USENIX Annual Technical Conference. 309--318","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In Proceedings of the USENIX Annual Technical Conference. 309--318."},{"key":"e_1_3_2_1_50_1","volume-title":"International Conference on Machine Learning. 144--152","author":"Shamir Ohad","year":"2015","unstructured":"Ohad Shamir. 2015. A stochastic PCA and SVD algorithm with an exponential convergence rate. In International Conference on Machine Learning. 144--152."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340460"},{"key":"e_1_3_2_1_52_1","volume-title":"Introduction to Linear Algebra (3 ed.)","author":"Strang Gilbert","unstructured":"Gilbert Strang. 2003. Introduction to Linear Algebra (3 ed.). Wellesley-Cambridge Press."},{"key":"e_1_3_2_1_53_1","volume-title":"Matrix computations","author":"Van Loan Charles F","unstructured":"Charles F Van Loan and Gene H Golub. 1983. Matrix computations. Johns Hopkins University Press."},{"key":"e_1_3_2_1_54_1","first-page":"2287","article-title":"Randomized Online PCA Algorithms with Regret Bounds that are Logarithmic in the Dimension","volume":"9","author":"Warmuth Manfred K.","year":"2008","unstructured":"Manfred K. Warmuth and Dima Kuzmin. 2008. Randomized Online PCA Algorithms with Regret Bounds that are Logarithmic in the Dimension. Journal of Machine Learning Research 9 (2008), 2287--2320.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978340"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"e_1_3_2_1_58_1","unstructured":"Michal Zalewski. [n.d.]. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_59_1","unstructured":"Michal Zalewski. [n.d.]. Technical \"whitepaper\" for afl-fuzz. http:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt."}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","location":"Seoul South Korea","acronym":"ICSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"]},"container-title":["Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380421","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377811.3380421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:40Z","timestamp":1750200100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377811.3380421"}},"subtitle":["guiding grey-box fuzzing towards combinatorial difference"],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":58,"alternative-id":["10.1145\/3377811.3380421","10.1145\/3377811"],"URL":"https:\/\/doi.org\/10.1145\/3377811.3380421","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}