{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T23:07:09Z","timestamp":1769123229465,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["EXC-2092 CaSa - 390781972"],"award-info":[{"award-number":["EXC-2092 CaSa - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["786669"],"award-info":[{"award-number":["786669"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427266","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"360-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing"],"prefix":"10.1145","author":[{"given":"Emre","family":"G\u00fcler","sequence":"first","affiliation":[{"name":"Ruhr-Universtit\u00e4t Bochum"}]},{"given":"Philipp","family":"G\u00f6rz","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum"}]},{"given":"Elia","family":"Geretto","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Andrea","family":"Jemmett","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Sebastian","family":"\u00d6sterlund","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-Universtit\u00e4t Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence. In Symposium on Network and Distributed System Security (NDSS).","author":"Aschermann Cornelius","year":"2019"},{"key":"e_1_3_2_1_2_1","volume-title":"Fuzzing: On the Exponential Cost of Vulnerability Discovery. In ESEC\/FSE.","author":"B\u00f6hme Marcel","year":"2020"},{"key":"e_1_3_2_1_3_1","volume-title":"Coverage-based Greybox Fuzzing As Markov Chain","author":"B\u00f6hme Marcel"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium.","author":"Chen Yuanliang","year":"2019"},{"key":"e_1_3_2_1_6_1","unstructured":"Chrome25 [n.d.]. The Chromium (Google Chrome) Open Source Project on Open Hub: Languages Page. https:\/\/www.openhub.net\/p\/chrome\/analyses\/latest\/languages_summary. Accessed: 2020\/10\/27 08:05:39.  Chrome25 [n.d.]. The Chromium (Google Chrome) Open Source Project on Open Hub: Languages Page. https:\/\/www.openhub.net\/p\/chrome\/analyses\/latest\/languages_summary. Accessed: 2020\/10\/27 08:05:39."},{"key":"e_1_3_2_1_7_1","unstructured":"James\u00a0D Evans. 1996. Straightforward statistics for the behavioral sciences.Thomson Brooks\/Cole Publishing Co.  James\u00a0D Evans. 1996. Straightforward statistics for the behavioral sciences.Thomson Brooks\/Cole Publishing Co."},{"key":"e_1_3_2_1_8_1","volume-title":"USENIX Workshop on Offensive Technologies (WOOT).","author":"Fioraldi Andrea","year":"2020"},{"key":"e_1_3_2_1_9_1","unstructured":"Sijia Geng Yuekang Li Yunlan Du Jun Xu Yang Liu and Bing Mao. 2020. An Empirical Study on Benchmarks of Artificial Software Vulnerabilities. CoRR abs\/2003.09561(2020). https:\/\/arxiv.org\/abs\/2003.09561  Sijia Geng Yuekang Li Yunlan Du Jun Xu Yang Liu and Bing Mao. 2020. An Empirical Study on Benchmarks of Artificial Software Vulnerabilities. CoRR abs\/2003.09561(2020). https:\/\/arxiv.org\/abs\/2003.09561"},{"key":"e_1_3_2_1_10_1","volume-title":"AntiFuzz: Impeding Fuzzing Audits of Binary Executables. In USENIX Security Symposium.","author":"G\u00fcler Emre","year":"2019"},{"key":"e_1_3_2_1_11_1","unstructured":"Aki Helin. [n.d.]. A general-purpose fuzzer. https:\/\/gitlab.com\/akihe\/radamsa. Accessed: 2020\/10\/27 08:05:39.  Aki Helin. [n.d.]. A general-purpose fuzzer. https:\/\/gitlab.com\/akihe\/radamsa. Accessed: 2020\/10\/27 08:05:39."},{"key":"e_1_3_2_1_12_1","unstructured":"Honggfuzz [n.d.]. Security oriented fuzzer with powerful analysis options. https:\/\/github.com\/google\/honggfuzz. Accessed: 2020\/10\/27 08:05:39.  Honggfuzz [n.d.]. Security oriented fuzzer with powerful analysis options. https:\/\/github.com\/google\/honggfuzz. Accessed: 2020\/10\/27 08:05:39."},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium.","author":"Jung Jinho","year":"2019"},{"key":"e_1_3_2_1_14_1","volume-title":"Evaluating Fuzz Testing. In ACM Conference on Computer and Communications Security (CCS).","author":"Klees George","year":"2018"},{"key":"e_1_3_2_1_15_1","unstructured":"LAF-Intel [n.d.]. Circumventing Fuzzing Roadblocks with Compiler Transformations. https:\/\/lafintel.wordpress.com\/. Accessed: 2020\/10\/27 08:05:39.  LAF-Intel [n.d.]. Circumventing Fuzzing Roadblocks with Compiler Transformations. https:\/\/lafintel.wordpress.com\/. Accessed: 2020\/10\/27 08:05:39."},{"key":"e_1_3_2_1_16_1","volume-title":"ACM International Conference on Automated Software Engineering (ASE).","author":"Lemieux Caroline","year":"2018"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239576.3239615"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275525"},{"key":"e_1_3_2_1_19_1","unstructured":"LibFuzzer [n.d.]. LibFuzzer. https:\/\/www.llvm.org\/docs\/LibFuzzer.html. Accessed: 2020\/10\/27 08:05:39.  LibFuzzer [n.d.]. LibFuzzer. https:\/\/www.llvm.org\/docs\/LibFuzzer.html. Accessed: 2020\/10\/27 08:05:39."},{"key":"e_1_3_2_1_20_1","volume-title":"Docker: lightweight linux containers for consistent development and deployment. Linux journal","author":"Merkel Dirk","year":"2014"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_22_1","volume-title":"NumPy: A guide to NumPy","author":"Oliphant Travis","year":"2020"},{"key":"e_1_3_2_1_23_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In Symposium on Network and Distributed System Security (NDSS).","author":"Rawat Sanjay","year":"2017"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security Symposium.","author":"Serebryany Kostya","year":"2017"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_26_1","volume-title":"Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In Symposium on Recent Advances in Intrusion Detection (RAID).","author":"Wang Jinghan","year":"2019"},{"key":"e_1_3_2_1_27_1","volume-title":"Designing new operating primitives to improve fuzzing performance","author":"Xu Wen"},{"key":"e_1_3_2_1_28_1","volume-title":"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium.","author":"Yun Insu","year":"2018"},{"key":"e_1_3_2_1_29_1","unstructured":"Micha\u0142 Zalewski. [n.d.]. american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/. Accessed: 2020\/10\/27 08:05:39.  Micha\u0142 Zalewski. [n.d.]. american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/. Accessed: 2020\/10\/27 08:05:39."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23504"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":30,"alternative-id":["10.1145\/3427228.3427266","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427266","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}