{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T01:01:25Z","timestamp":1773277285717,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,31]],"date-time":"2021-05-31T00:00:00Z","timestamp":1622419200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["850868"],"award-info":[{"award-number":["850868"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,31]]},"DOI":"10.1145\/3410220.3456276","type":"proceedings-article","created":{"date-parts":[[2021,6,6]],"date-time":"2021-06-06T06:11:02Z","timestamp":1622959862000},"page":"81-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Magma: A Ground-Truth Fuzzing Benchmark"],"prefix":"10.1145","author":[{"given":"Ahmad","family":"Hazimeh","sequence":"first","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Adrian","family":"Herrera","sequence":"additional","affiliation":[{"name":"ANU &amp; DST, Canberra, Australia"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2021,6,6]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Mike Aizatsky Kostya Serebryany Oliver Chang Abhishek Arya and Meredith Whittaker. 2016.Announcing OSS-Fuzz: Continuous fuzzing for open source software. https:\/\/opensource.googleblog.com\/2016\/12\/announcing-oss-fuzz-continuous-fuzzing.html. Accessed: 2019-09-09."},{"key":"e_1_3_2_2_2_1","volume-title":"Adobe Reader and Acrobat Security Initiative","author":"Arkin Brad","unstructured":"Brad Arkin. 2009. Adobe Reader and Acrobat Security Initiative. http:\/\/blogs.adobe.com\/security\/2009\/05\/adobe_reader_and_acrobat_secur.html. Accessed:2019-09-09."},{"key":"e_1_3_2_2_3_1","unstructured":"Abhishek Arya and Cris Neckar. 2012. Fuzzing for security. https:\/\/blog.chromium.org\/2012\/04\/fuzzing-for-security.html. Accessed: 2019-09-09."},{"key":"e_1_3_2_2_4_1","volume-title":"AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. In 29th USENIX Security Symposium(USENIX Security 20)","author":"Blazytko Tim","year":"2020","unstructured":"Tim Blazytko, Moritz Schl\u00f6gel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon W\u00f6rner, and Thorsten Holz. 2020. AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. In 29th USENIX Security Symposium(USENIX Security 20). USENIX Association, 235--252. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/blazytko"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_2_6_1","volume-title":"IN-STRIM: Lightweight Instrumentation for Coverage-guided Fuzzing. In Workshop on Binary Analysis Research (BAR). The Internet Society.","author":"Hsu Chin-Chia","year":"2018","unstructured":"Chin-Chia Hsu, Che-Yu Wu, Hsu-Chun Hsiao, and Shih-Kun Huang. 2018. IN-STRIM: Lightweight Instrumentation for Coverage-guided Fuzzing. In Workshop on Binary Analysis Research (BAR). The Internet Society."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_2_9_1","volume-title":"The Industrial Age of Hacking. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Nosco Timothy","unstructured":"Timothy Nosco, Jared Ziegler, Zechariah Clark, Davy Marrero, Todd Finkler, Andrew Barbarello, and W. Michael Petullo. 2020. The Industrial Age of Hacking. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 1129--1146. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/nosco"},{"key":"e_1_3_2_2_10_1","unstructured":"Tim Rains. 2012. Security Development Lifecycle: A Living Process. https:\/\/www.microsoft.com\/security\/blog\/2012\/02\/01\/security-development-lifecycle-a-living-process\/. Accessed: 2019-09-09."}],"event":{"name":"SIGMETRICS '21: ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems","location":"Virtual Event China","acronym":"SIGMETRICS '21","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Abstract Proceedings of the 2021 ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410220.3456276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3410220.3456276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:40:59Z","timestamp":1750185659000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3410220.3456276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,31]]},"references-count":10,"alternative-id":["10.1145\/3410220.3456276","10.1145\/3410220"],"URL":"https:\/\/doi.org\/10.1145\/3410220.3456276","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3543516.3456276","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2021,5,31]]},"assertion":[{"value":"2021-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}