{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:46Z","timestamp":1763507746053,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004801","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1749895"],"award-info":[{"award-number":["CNS-1749895"]}],"id":[{"id":"10.13039\/501100004801","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000005","name":"U.S. Department of Defense","doi-asserted-by":"publisher","award":["FA8750-17-C-0016"],"award-info":[{"award-number":["FA8750-17-C-0016"]}],"id":[{"id":"10.13039\/100000005","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427269","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"345-359","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs"],"prefix":"10.1145","author":[{"given":"Sanjeev","family":"Das","sequence":"first","affiliation":[{"name":"IBM Research"}]},{"given":"Kedrian","family":"James","sequence":"additional","affiliation":[{"name":"University of North Carolina-Chapel Hill"}]},{"given":"Jan","family":"Werner","sequence":"additional","affiliation":[{"name":"University of North Carolina-Chapel Hill"}]},{"given":"Manos","family":"Antonakakis","sequence":"additional","affiliation":[{"name":"Georgia Tech, United States of America"}]},{"given":"Michalis","family":"Polychronakis","sequence":"additional","affiliation":[{"name":"Stony Brook University, United States of America"}]},{"given":"Fabian","family":"Monrose","sequence":"additional","affiliation":[{"name":"University of North Carolina-Chapel Hill, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"volume-title":"AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. In USENIX Security Symposium. 235\u2013252","year":"2020","author":"Blazytko Tim","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"volume-title":"Directed Greybox Fuzzing. In ACM Conference on Computer and Communications Security. 2329\u20132344","year":"2017","author":"B\u00f6hme Marcel","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_5_1","unstructured":"Augusto Born\u00a0de Oliveira. 2015. Measuring and Predicting Computer Software Performance: Tools and Approaches. http:\/\/hdl.handle.net\/10012\/9259  Augusto Born\u00a0de Oliveira. 2015. Measuring and Predicting Computer Software Performance: Tools and Approaches. http:\/\/hdl.handle.net\/10012\/9259"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"volume-title":"Pinpointing Vulnerabilities. In ACM Asia Conference on Computer and Communications Security. 334\u2013345","year":"2017","author":"Chen Yue","key":"e_1_3_2_1_8_1"},{"volume-title":"SAVIOR: Towards Bug-Driven Hybrid Testing. In IEEE Symposium on Security & Privacy.","year":"2020","author":"Chen Yaohui","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329828"},{"volume-title":"REPT: Reverse Debugging of Failures in Deployed Software. In USENIX Symposium on Operating Systems Design and Implementation. 17\u201332","year":"2018","author":"Cui Weidong","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884844"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227111"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00021"},{"volume-title":"PHMon: A Programmable Hardware Monitor and Its Security Use Cases. In USENIX Security Symposium.","year":"2020","author":"Delshadtehrani Leila","key":"e_1_3_2_1_15_1"},{"volume-title":"CollAFL: Path Sensitive Fuzzing. In IEEE Symposium on Security & Privacy. 679\u2013696","year":"2018","author":"Gan Shuitao","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363824"},{"volume-title":"Deep Learning","author":"Goodfellow Ian","key":"e_1_3_2_1_18_1"},{"volume-title":"AntiFuzz: Impeding Fuzzing Audits of Binary Executables. In USENIX Security Symposium. 1931\u20131947","year":"2019","author":"G\u00fcler Emre","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Mark\u00a0Andrew Hall. 1999. Correlation-based Feature Selection for Machine Learning. (1999).  Mark\u00a0Andrew Hall. 1999. Correlation-based Feature Selection for Machine Learning. (1999)."},{"key":"e_1_3_2_1_21_1","unstructured":"Liam Hayes Hendra Gunadi Adrian Herrera Jonathon Milford Shane Magrath Maggi Sebastian Michael Norrish and Antony\u00a0L Hosking. 2019. MoonLight: Effective Fuzzing with Near-Optimal Corpus Distillation. arXiv preprint arXiv:1905.13055(2019).  Liam Hayes Hendra Gunadi Adrian Herrera Jonathon Milford Shane Magrath Maggi Sebastian Michael Norrish and Antony\u00a0L Hosking. 2019. MoonLight: Effective Fuzzing with Near-Optimal Corpus Distillation. arXiv preprint arXiv:1905.13055(2019)."},{"volume-title":"Fuzzification: Anti-Fuzzing Techniques. In USENIX Security Symposium. 1913\u20131930","year":"2019","author":"Jung Jinho","key":"e_1_3_2_1_22_1"},{"volume-title":"Evaluating Fuzz Testing. In ACM Conference on Computer and Communications Security. 2123\u20132138","year":"2018","author":"Klees George","key":"e_1_3_2_1_23_1"},{"volume-title":"FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage. In ACM\/IEEE International Conference on Automated Software Engineering.","year":"2018","author":"Lemieux Caroline","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","unstructured":"Yuwei Li Shouling Ji Chenyang Lv Yuan Chen Jianhai Chen Qinchen Gu and Chunming Wu. 2019. V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. arXiv preprint arXiv:1901.01142.  Yuwei Li Shouling Ji Chenyang Lv Yuan Chen Jianhai Chen Qinchen Gu and Chunming Wu. 2019. V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing. arXiv preprint arXiv:1901.01142."},{"volume-title":"AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair. In ACM Asia Conference on Computer and Communications Security. 329\u2013340","year":"2007","author":"Lin Zhiqiang","key":"e_1_3_2_1_26_1"},{"volume-title":"MOPT: Optimized Mutation Scheduling for Fuzzers. In USENIX Security Symposium. 1949\u20131966","year":"2019","author":"Lyu Chenyang","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","article-title":"The Art, Science, and Engineering of Fuzzing: A Survey","author":"Jean\u00a0Marie Man\u00e8s Valentin","year":"2019","journal-title":"IEEE Transactions on Software Engineering."},{"volume-title":"High-Performance Determinism with Total Store Order Consistency. In European Conference on Computer Systems. 1\u201313","year":"2015","author":"Merrifield Timothy","key":"e_1_3_2_1_29_1"},{"volume-title":"Communications of the ACM, Vol.\u00a033. ACM New York","author":"Miller P","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"Charlie Miller. 2010. Babysitting an Army of Monkeys. In CanSecWest.  Charlie Miller. 2010. Babysitting an Army of Monkeys. In CanSecWest."},{"key":"e_1_3_2_1_32_1","unstructured":"David Molnar and Lars Opstad. 2010. Effective fuzzing strategies. In CERT vulnerability discovery workshop.  David Molnar and Lars Opstad. 2010. Effective fuzzing strategies. In CERT vulnerability discovery workshop."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"volume-title":"Hardware Performance Monitoring for the Rest of Us: A Position and Survey. In International Conference on Network and Parallel Computing. 293\u2013312","year":"2011","author":"Moseley Tipp","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","unstructured":"Mozilla. 2018. Mozilla Record & Replay. https:\/\/rr-project.org\/.  Mozilla. 2018. Mozilla Record & Replay. https:\/\/rr-project.org\/."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2939528"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.048"},{"volume-title":"USENIX Annual Technical Conference. 541\u2013548","year":"2015","author":"Nowak Andrzej","key":"e_1_3_2_1_38_1"},{"volume-title":"ParmeSan: Sanitizer-guided Greybox Fuzzing. In USENIX Security Symposium.","year":"2020","author":"\u00d6sterlund Sebastian","key":"e_1_3_2_1_39_1"},{"volume-title":"USENIX Security Symposium. 93\u2013104","year":"2006","author":"Ozment Andy","key":"e_1_3_2_1_40_1"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_42_1","unstructured":"Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. In arXiv preprint arXiv:1711.04596.  Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. In arXiv preprint arXiv:1711.04596."},{"volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In Symposium on Network and Distributed System Security, Vol.\u00a017","year":"2017","author":"Rawat Sanjay","key":"e_1_3_2_1_43_1"},{"volume-title":"Optimizing Seed Selection for Fuzzing. In USENIX Security Symposium. 861\u2013875","year":"2014","author":"Rebert Alexandre","key":"e_1_3_2_1_44_1"},{"key":"e_1_3_2_1_45_1","unstructured":"[\n  45\n  ]  FuzzBench: 2020-04-21 Report.2020. URL: https:\/\/www.fuzzbench.com\/reports \/sample\/index.html.  [45] FuzzBench: 2020-04-21 Report.2020. URL: https:\/\/www.fuzzbench.com\/reports \/sample\/index.html."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Thomas R\u00f6hl Jan Eitzinger Georg Hager and Gerhard Wellein. 2016. Validation of Hardware Events for Successful Performance Pattern Identification in High Performance Computing. In Tools for High Performance Computing. 17\u201328.  Thomas R\u00f6hl Jan Eitzinger Georg Hager and Gerhard Wellein. 2016. Validation of Hardware Events for Successful Performance Pattern Identification in High Performance Computing. In Tools for High Performance Computing. 17\u201328.","DOI":"10.1007\/978-3-319-39589-0_2"},{"volume-title":"KAFL: Hardware-assisted Feedback Fuzzing for OS Kernels. In USENIX Security Symposium. 167\u2013182","year":"2017","author":"Schumilo Sergej","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","unstructured":"K Serebryany. 2015. LibFuzzer a Library for Coverage-guided Fuzz Testing. In LLVM project.  K Serebryany. 2015. LibFuzzer a Library for Coverage-guided Fuzz Testing. In LLVM project."},{"volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In USENIX Annual Technical Conference. 309\u2013318","year":"2012","author":"Serebryany Konstantin","key":"e_1_3_2_1_49_1"},{"volume-title":"Honggfuzz: A General-purpose, easy-to-use fuzzer with interesting analysis options. https:\/\/github.com\/google\/honggfuzz.","year":"2016","author":"Swiecki Robert","key":"e_1_3_2_1_50_1"},{"volume-title":"Bug characteristics in open source software. Empirical software engineering 19, 6","year":"2014","author":"Tan Lin","key":"e_1_3_2_1_51_1"},{"volume-title":"European Workshop on System Security.","year":"2012","author":"Vogl Sebastian","key":"e_1_3_2_1_52_1"},{"volume-title":"Skyfire: Data-driven Seed Generation for Fuzzing. In IEEE Symposium on Security & Privacy. 579\u2013594","year":"2017","author":"Wang Junjie","key":"e_1_3_2_1_53_1"},{"volume-title":"Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In International Symposium on Research in Attacks, Intrusions and Defenses. 1\u201315","year":"2019","author":"Wang Jinghan","key":"e_1_3_2_1_54_1"},{"volume-title":"Few-shot Learning: A Survey. arxiv:1904.05046http:\/\/arxiv.org\/abs\/1904.05046","year":"2019","author":"Wang Yaqing","key":"e_1_3_2_1_55_1"},{"volume-title":"Workshop on Functionality of Hardware Performance Monitoring.","year":"2010","author":"Weaver Vince","key":"e_1_3_2_1_56_1"},{"volume-title":"Scheduling Black-box Mutational Fuzzing. In ACM Conference on Computer and Communications Security. 511\u2013522","year":"2013","author":"Woo Maverick","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978340"},{"volume-title":"Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. In USENIX Security Symposium. 17\u201332","year":"2017","author":"Xu Jun","key":"e_1_3_2_1_59_1"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134085"},{"key":"e_1_3_2_1_61_1","unstructured":"Michal Zalewski. 2017. American Fuzzy Lop (AFL). URL: http:\/\/lcamtuf.coredump.cx\/afl.  Michal Zalewski. 2017. American Fuzzy Lop (AFL). URL: http:\/\/lcamtuf.coredump.cx\/afl."}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427269","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427269","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427269","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427269"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":61,"alternative-id":["10.1145\/3427228.3427269","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427269","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}