{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:53:47Z","timestamp":1773154427617,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3397372","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["WEIZZ: automatic grey-box fuzzing for structured binary formats"],"prefix":"10.1145","author":[{"given":"Andrea","family":"Fioraldi","sequence":"first","affiliation":[{"name":"Sapienza University of Rome, Italy"}]},{"given":"Daniele Cono","family":"D'Elia","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Italy"}]},{"given":"Emilio","family":"Coppa","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Circumventing Fuzzing Roadblocks with Compiler Transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzingroadblocks-with-compiler-transformations\/. [Online","year":"2019","unstructured":"2016. Circumventing Fuzzing Roadblocks with Compiler Transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzingroadblocks-with-compiler-transformations\/. [Online ; accessed 10- Sep- 2019 ]. 2016. Circumventing Fuzzing Roadblocks with Compiler Transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzingroadblocks-with-compiler-transformations\/. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_2_1","volume-title":"Google OSS-Fuzz: continuous fuzzing of open source software. https: \/\/github.com\/google\/oss-fuzz. [Online","year":"2019","unstructured":"2019. Google OSS-Fuzz: continuous fuzzing of open source software. https: \/\/github.com\/google\/oss-fuzz. [Online ; accessed 10- Sep- 2019 ]. 2019. Google OSS-Fuzz: continuous fuzzing of open source software. https: \/\/github.com\/google\/oss-fuzz. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_3_1","volume-title":"The Advantages of Block-Based Protocol Analysis for Security Testing. https:\/\/www.immunitysec.com\/downloads\/advantages_of_block_based_analysis.html. [Online","author":"Aitel Dave","year":"2019","unstructured":"Dave Aitel . 2002. The Advantages of Block-Based Protocol Analysis for Security Testing. https:\/\/www.immunitysec.com\/downloads\/advantages_of_block_based_analysis.html. [Online ; accessed 10- Sep- 2019 ]. Dave Aitel. 2002. The Advantages of Block-Based Protocol Analysis for Security Testing. https:\/\/www.immunitysec.com\/downloads\/advantages_of_block_based_analysis.html. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Cornelius Aschermann Tommaso Frassetto Thorsten Holz Patrick Jauernig Ahmad-Reza Sadeghi and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars. In 26th Annual Network and Distributed System Security Symposium NDSS. https:\/\/www.ndss-symposium.org\/ndss-paper\/nautilusifshing-for-deep-bugs-with-grammars\/  Cornelius Aschermann Tommaso Frassetto Thorsten Holz Patrick Jauernig Ahmad-Reza Sadeghi and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars. In 26th Annual Network and Distributed System Security Symposium NDSS. https:\/\/www.ndss-symposium.org\/ndss-paper\/nautilusifshing-for-deep-bugs-with-grammars\/","DOI":"10.14722\/ndss.2019.23412"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Cornelius Aschermann Sergej Schumilo Tim Blazytko Robert Gawlik and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence. In 26th Annual Network and Distributed System Security Symposium NDSS. https:\/\/www.ndss-symposium.org\/ndss-paper\/redqueen-fuzzing-withinput-to-state-correspondence\/  Cornelius Aschermann Sergej Schumilo Tim Blazytko Robert Gawlik and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence. In 26th Annual Network and Distributed System Security Symposium NDSS. https:\/\/www.ndss-symposium.org\/ndss-paper\/redqueen-fuzzing-withinput-to-state-correspondence\/","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/phrack.org\/issues\/66\/10. html. [Online","author":"MALLOC","year":"2019","unstructured":"Blackngel. 2019. MALLOC DES-MALEFICARUM. http:\/\/phrack.org\/issues\/66\/10. html. [Online ; accessed 10- Sep- 2019 ]. Blackngel. 2019. MALLOC DES-MALEFICARUM. http:\/\/phrack.org\/issues\/66\/10. html. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_8_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko , Cornelius Aschermann , Moritz Schl\u00f6gel , Ali Abbasi , Sergej Schumilo , Simon W\u00f6rner , and Thorsten Holz . 2019 . GRIMOIRE: Synthesizing Structure while Fuzzing . In 28th USENIX Security Symposium (USENIX Security 19) . 1985-2002. https:\/\/www.usenix.org\/system\/files\/sec19-blazytko.pdf Tim Blazytko, Cornelius Aschermann, Moritz Schl\u00f6gel, Ali Abbasi, Sergej Schumilo, Simon W\u00f6rner, and Thorsten Holz. 2019. GRIMOIRE: Synthesizing Structure while Fuzzing. In 28th USENIX Security Symposium (USENIX Security 19). 1985-2002. https:\/\/www.usenix.org\/system\/files\/sec19-blazytko.pdf"},{"key":"e_1_3_2_1_9_1","volume-title":"Smallest possible syntactically valid files of diferent types. https:\/\/github.com\/mathiasbynens\/small. [Online","author":"Bynens Mathias","year":"2019","unstructured":"Mathias Bynens . 2019. Smallest possible syntactically valid files of diferent types. https:\/\/github.com\/mathiasbynens\/small. [Online ; accessed 10- Sep- 2019 ]. Mathias Bynens. 2019. Smallest possible syntactically valid files of diferent types. https:\/\/github.com\/mathiasbynens\/small. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00082"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329819"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2348"},{"key":"e_1_3_2_1_15_1","volume-title":"Peach fuzzing platform. https:\/\/web.archive.org\/web\/ 20180621074520\/http:\/\/community.peachfuzzer.com\/WhatIsPeach.html. [Online","author":"Eddington M.","year":"2019","unstructured":"M. Eddington . [n.d.]. Peach fuzzing platform. https:\/\/web.archive.org\/web\/ 20180621074520\/http:\/\/community.peachfuzzer.com\/WhatIsPeach.html. [Online ; accessed 10- Sep- 2019 ]. M. Eddington. [n.d.]. Peach fuzzing platform. https:\/\/web.archive.org\/web\/ 20180621074520\/http:\/\/community.peachfuzzer.com\/WhatIsPeach.html. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_16_1","volume-title":"https:\/\/github. com\/vanhauser-thc\/AFLplusplus. [Online","author":"Heuse Marc","year":"2019","unstructured":"Marc Heuse , Heiko Ei\u00dffeldt , and Andrea Fioraldi . 2019. AFL++. https:\/\/github. com\/vanhauser-thc\/AFLplusplus. [Online ; accessed 10- Sep- 2019 ]. Marc Heuse, Heiko Ei\u00dffeldt, and Andrea Fioraldi. 2019. AFL++. https:\/\/github. com\/vanhauser-thc\/AFLplusplus. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362831"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970321"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.14"},{"key":"e_1_3_2_1_20_1","volume-title":"https:\/\/github.com\/googleprojectzero\/ CompareCoverage\/. [Online","author":"Jurczyk Mateusz","year":"2019","unstructured":"Mateusz Jurczyk . 2019. CompareCoverage. https:\/\/github.com\/googleprojectzero\/ CompareCoverage\/. [Online ; accessed 10- Sep- 2019 ]. Mateusz Jurczyk. 2019. CompareCoverage. https:\/\/github.com\/googleprojectzero\/ CompareCoverage\/. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_22_1","unstructured":"Tavis Ormandy. 2009. Making Software Dumberer. http:\/\/taviso.decsystem.org\/ making_software_dumber.pdf. [Online; accessed 10-Sep-2019].  Tavis Ormandy. 2009. Making Software Dumberer. http:\/\/taviso.decsystem.org\/ making_software_dumber.pdf. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2941681"},{"key":"e_1_3_2_1_25_1","volume-title":"24th Annual Network and Distributed System Security Symposium, NDSS. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/ vuzzer-application-aware-evolutionary-fuzzing\/","author":"Rawat Sanjay","unstructured":"Sanjay Rawat , Vivek Jain , Ashish Kumar , Lucian Cojocar , Cristiano Giuffrida , and Herbert Bos . 2017. VUzzer: Application-aware Evolutionary Fuzzing . In 24th Annual Network and Distributed System Security Symposium, NDSS. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/ vuzzer-application-aware-evolutionary-fuzzing\/ Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/ vuzzer-application-aware-evolutionary-fuzzing\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_28_1","volume-title":"honggfuzz. https:\/\/github.com\/google\/honggfuzz. [Online","author":"Swiecki Robert","year":"2019","unstructured":"Robert Swiecki . 2017. honggfuzz. https:\/\/github.com\/google\/honggfuzz. [Online ; accessed 10- Sep- 2019 ]. Robert Swiecki. 2017. honggfuzz. https:\/\/github.com\/google\/honggfuzz. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_29_1","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"Takanen Ari","unstructured":"Ari Takanen , Jared D. Demott , and Charles Miller . 2018. Fuzzing for Software Security Testing and Quality Assurance ( 2 nd ed.). Artech House, Inc. , Norwood, MA, USA . Ari Takanen, Jared D. Demott, and Charles Miller. 2018. Fuzzing for Software Security Testing and Quality Assurance (2nd ed.). Artech House, Inc., Norwood, MA, USA.","edition":"2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2014.43"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.47"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the 27th USENIX Conference on Security Symposium (SEC'18)","author":"Yun Insu","year":"2018","unstructured":"Insu Yun , Sangho Lee , Meng Xu , Yeongjin Jang , and Taesoo Kim . 2018 . QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing . In Proceedings of the 27th USENIX Conference on Security Symposium (SEC'18) . 745-761. http:\/\/dl.acm.org\/citation.cfm?id= 3277203. 3277260 Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In Proceedings of the 27th USENIX Conference on Security Symposium (SEC'18). 745-761. http:\/\/dl.acm.org\/citation.cfm?id= 3277203. 3277260"},{"key":"e_1_3_2_1_36_1","volume-title":"American Fuzzy Lop. https:\/\/github.com\/Google\/AFL. [Online","author":"Zalewski Micha\u0142","year":"2019","unstructured":"Micha\u0142 Zalewski . 2019. American Fuzzy Lop. https:\/\/github.com\/Google\/AFL. [Online ; accessed 10- Sep- 2019 ]. Micha\u0142 Zalewski. 2019. American Fuzzy Lop. https:\/\/github.com\/Google\/AFL. [Online; accessed 10-Sep-2019]."},{"key":"e_1_3_2_1_37_1","unstructured":"A. Zeller R. Gopinath M. B\u00f6hme G. Fraser and C. Holler. 2019. The Fuzzing Book. https:\/\/www.fuzzingbook.org\/. [Online; accessed 10-Sep-2019].  A. Zeller R. Gopinath M. B\u00f6hme G. Fraser and C. Holler. 2019. The Fuzzing Book. https:\/\/www.fuzzingbook.org\/. [Online; accessed 10-Sep-2019]."}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual Event USA","acronym":"ISSTA '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397372","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3397372","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:44Z","timestamp":1750199924000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3397372"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":37,"alternative-id":["10.1145\/3395363.3397372","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3397372","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}