{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T09:45:27Z","timestamp":1766137527301,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3387940.3391457","type":"proceedings-article","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T15:22:00Z","timestamp":1601047320000},"page":"513-520","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Fitness Guided Vulnerability Detection with Greybox Fuzzing"],"prefix":"10.1145","author":[{"given":"Raveendra Kumar","family":"Medicherla","sequence":"first","affiliation":[{"name":"Tata Consultancy Services, Bangalore, India"}]},{"given":"Raghavan","family":"Komondoor","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Abhik","family":"Roychoudhury","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17502-3_9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17502-3_11"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_16"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_6_1","first-page":"209","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , Dawson R Engler , 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs .. In OSDI , Vol. 8. 209 -- 224 . Cristian Cadar, Daniel Dunbar, Dawson R Engler, et al. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.. In OSDI, Vol. 8. 209--224.","journal-title":"OSDI"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17502-3_22"},{"key":"e_1_3_2_1_9_1","volume-title":"Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing. BlackHat and Defcon","author":"DeMott Jared","year":"2007","unstructured":"Jared DeMott , Richard Enbody , and William F Punch . 2007. Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing. BlackHat and Defcon ( 2007 ). Jared DeMott, Richard Enbody, and William F Punch. 2007. Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing. BlackHat and Defcon (2007)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2743019"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.14"},{"key":"e_1_3_2_1_12_1","volume-title":"1600 faults in 100 projects: automatically finding faults while achieving high coverage with EvoSuite. Empirical software engineering 20, 3","author":"Fraser Gordon","year":"2015","unstructured":"Gordon Fraser and Andrea Arcuri . 2015. 1600 faults in 100 projects: automatically finding faults while achieving high coverage with EvoSuite. Empirical software engineering 20, 3 ( 2015 ), 611--639. Gordon Fraser and Andrea Arcuri. 2015. 1600 faults in 100 projects: automatically finding faults while achieving high coverage with EvoSuite. Empirical software engineering 20, 3 (2015), 611--639."},{"key":"e_1_3_2_1_13_1","first-page":"151","article-title":"Automated Whitebox Fuzz Testing","volume":"8","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid , Michael Y Levin , David A Molnar , 2008 . Automated Whitebox Fuzz Testing .. In NDSS , Vol. 8. 151 -- 166 . Patrice Godefroid, Michael Y Levin, David A Molnar, et al. 2008. Automated Whitebox Fuzz Testing.. In NDSS, Vol. 8. 151--166.","journal-title":"NDSS"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_16_1","volume-title":"ATVA 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings. 246--252","author":"Le Hoang M.","year":"2019","unstructured":"Hoang M. Le . 2019 . KLUZZER: Whitebox Fuzzing on Top of LLVM. In Automated Technology for Verification and Analysis - 17th International Symposium , ATVA 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings. 246--252 . Hoang M. Le. 2019. KLUZZER: Whitebox Fuzzing on Top of LLVM. In Automated Technology for Verification and Analysis - 17th International Symposium, ATVA 2019, Taipei, Taiwan, October 28-31, 2019, Proceedings. 246--252."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077276.1077279"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45937-5_16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360600"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In USENIX security. 1--14.  Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In USENIX security. 1--14.","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA538843"},{"key":"e_1_3_2_1_23_1","volume-title":"USENIX Annual Technical Conference. 309--318","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany , Derek Bruening , Alexander Potapenko , and Dmitriy Vyukov . 2012 . AddressSanitizer: A Fast Address Sanity Checker .. In USENIX Annual Technical Conference. 309--318 . Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker.. In USENIX Annual Technical Conference. 309--318."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200001)30:1<61::AID-SPE292>3.0.CO;2-9"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00190-2"},{"key":"e_1_3_2_1_27_1","unstructured":"Michael Zalewski. [n.d.]. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/  Michael Zalewski. [n.d.]. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029911"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"ICSE '20"},"container-title":["Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387940.3391457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387940.3391457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:43Z","timestamp":1750200103000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387940.3391457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":27,"alternative-id":["10.1145\/3387940.3391457","10.1145\/3387940"],"URL":"https:\/\/doi.org\/10.1145\/3387940.3391457","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}