{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:59:15Z","timestamp":1760043555122,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,17]],"date-time":"2021-04-17T00:00:00Z","timestamp":1618617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3445814.3446691","type":"proceedings-article","created":{"date-parts":[[2021,4,11]],"date-time":"2021-04-11T17:06:26Z","timestamp":1618160786000},"page":"487-502","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["PMFuzz: test case generation for persistent memory programs"],"prefix":"10.1145","author":[{"given":"Sihang","family":"Liu","sequence":"first","affiliation":[{"name":"University of Virginia, USA"}]},{"given":"Suyash","family":"Mahar","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"Baishakhi","family":"Ray","sequence":"additional","affiliation":[{"name":"Columbia University, USA"}]},{"given":"Samira","family":"Khan","sequence":"additional","affiliation":[{"name":"University of Virginia, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,17]]},"reference":[{"unstructured":"AFLplusplus. American fuzzy lop plus plus (afl++). https:\/\/github.com\/ AFLplusplus\/AFLplusplus\/tree\/2.63c.  AFLplusplus. American fuzzy lop plus plus (afl++). https:\/\/github.com\/ AFLplusplus\/AFLplusplus\/tree\/2.63c.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"ARM architecture reference manual ARMv8, for ARMv8-A architecture profile. https:\/\/static.docs.arm.com\/ddi0487\/da\/DDI0487D_a_armv8_arm.pdf","author":"ARM.","year":"2018","unstructured":"ARM. ARM architecture reference manual ARMv8, for ARMv8-A architecture profile. https:\/\/static.docs.arm.com\/ddi0487\/da\/DDI0487D_a_armv8_arm.pdf , 2018 . ARM. ARM architecture reference manual ARMv8, for ARMv8-A architecture profile. https:\/\/static.docs.arm.com\/ddi0487\/da\/DDI0487D_a_armv8_arm.pdf, 2018."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. VLDB Endow.","author":"Arulraj Joy","year":"2018","unstructured":"Joy Arulraj , Justin Levandoski , Umar Farooq Minhas , and Per-Ake Larson . Bztree : A high-performance latch-free range index for non-volatile memory . Proc. VLDB Endow. , 2018 . Joy Arulraj, Justin Levandoski, Umar Farooq Minhas, and Per-Ake Larson. Bztree: A high-performance latch-free range index for non-volatile memory. Proc. VLDB Endow., 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/2527792.2527799"},{"unstructured":"Jef Barr. Now available-Amazon EC2 high memory instances with 6 9 and 12 TB of memory perfect for SAP HANA. https:\/\/aws.amazon.com\/blogs\/aws\/nowavailable-amazon-ec2-high-memory-instances-with-6-9-and-12-tb-ofmemory-perfect-for-sap-hana \/ 2018.  Jef Barr. Now available-Amazon EC2 high memory instances with 6 9 and 12 TB of memory perfect for SAP HANA. https:\/\/aws.amazon.com\/blogs\/aws\/nowavailable-amazon-ec2-high-memory-instances-with-6-9-and-12-tb-ofmemory-perfect-for-sap-hana \/ 2018.","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","volume-title":"Available first on Google cloud: Intel Optane DC persistent memory. https:\/\/cloud.google.com\/blog\/topics\/partners\/available-first-on-googlecloud-intel-optane-dc-persistent-memory","author":"Boden Nan","year":"2018","unstructured":"Nan Boden . Available first on Google cloud: Intel Optane DC persistent memory. https:\/\/cloud.google.com\/blog\/topics\/partners\/available-first-on-googlecloud-intel-optane-dc-persistent-memory , 2018 . Nan Boden. Available first on Google cloud: Intel Optane DC persistent memory. https:\/\/cloud.google.com\/blog\/topics\/partners\/available-first-on-googlecloud-intel-optane-dc-persistent-memory, 2018."},{"key":"e_1_3_2_1_7_1","volume-title":"Linux and ASLR: kernel\/randomize_va_space. https:\/\/linuxaudit.com \/linux-aslr-and-kernelrandomize_va_space-setting\/","author":"Boelen Michael","year":"2016","unstructured":"Michael Boelen . Linux and ASLR: kernel\/randomize_va_space. https:\/\/linuxaudit.com \/linux-aslr-and-kernelrandomize_va_space-setting\/ , 2016 . Michael Boelen. Linux and ASLR: kernel\/randomize_va_space. https:\/\/linuxaudit.com \/linux-aslr-and-kernelrandomize_va_space-setting\/, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2976749.2978428"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.5555\/1077084"},{"key":"e_1_3_2_1_10_1","volume-title":"Discover persistent memory programming errors with pmemcheck. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/discoverpersistent-memory-programming-errors-with-pmemcheck.html","author":"Carellan Eduardo","year":"2018","unstructured":"Eduardo Carellan . Discover persistent memory programming errors with pmemcheck. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/discoverpersistent-memory-programming-errors-with-pmemcheck.html , 2018 . Eduardo Carellan. Discover persistent memory programming errors with pmemcheck. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/discoverpersistent-memory-programming-errors-with-pmemcheck.html, 2018."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2660193.2660224"},{"key":"e_1_3_2_1_12_1","volume-title":"The Proceedings of the VLDB Endowment","author":"Chen Shimin","year":"2015","unstructured":"Shimin Chen and Qin Jin . Persistent B+- Trees in non-volatile main memory . In The Proceedings of the VLDB Endowment , 2015 . Shimin Chen and Qin Jin. Persistent B+-Trees in non-volatile main memory. In The Proceedings of the VLDB Endowment, 2015."},{"key":"e_1_3_2_1_13_1","author":"Chi P.","year":"2016","unstructured":"P. Chi , W. Lee , and Y. Xie . Adapting B +-Tree for emerging nonvolatile memorybased main memory. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD) , 2016 . P. Chi, W. Lee, and Y. Xie. Adapting B +-Tree for emerging nonvolatile memorybased main memory. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2016.","journal-title":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1145\/2517349.2522724"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1950365.1950380"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/3276523"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ACM Symposium on Operating Systems Principles (SOSP)","author":"Condit Jeremy","year":"2009","unstructured":"Jeremy Condit , Edmund B. Nightingale , Christopher Frost , Engin Ipek , Benjamin Lee , Doug Burger , and Derrick Coetzee . Better I\/O through byte-addressable, persistent memory. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP) , 2009 . Jeremy Condit, Edmund B. Nightingale, Christopher Frost, Engin Ipek, Benjamin Lee, Doug Burger, and Derrick Coetzee. Better I\/O through byte-addressable, persistent memory. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), 2009."},{"unstructured":"David Drysdale. Coverage-guided kernel fuzzing with syzkaller.  David Drysdale. Coverage-guided kernel fuzzing with syzkaller.","key":"e_1_3_2_1_18_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2592798.2592814"},{"key":"e_1_3_2_1_20_1","volume-title":"14th USENIX Workshop on Ofensive Technologies (WOOT)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi , Dominik Maier , Heiko Ei\u00dffeldt , and Marc Heuse . AFL++ : Combining incremental steps of fuzzing research . In 14th USENIX Workshop on Ofensive Technologies (WOOT) , 2020 . Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. AFL++ : Combining incremental steps of fuzzing research. In 14th USENIX Workshop on Ofensive Technologies (WOOT), 2020."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/3092255.3092270"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/3155562.3155573"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3192366.3192367"},{"unstructured":"Google. OSS-Fuzz: Continuous fuzzing for open source software. https:\/\/github. com\/google\/oss-fuzz.  Google. OSS-Fuzz: Continuous fuzzing for open source software. https:\/\/github. com\/google\/oss-fuzz.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Gu Jinyu","year":"2019","unstructured":"Jinyu Gu , Qianqian Yu , Xiayang Wang , Zhaoguo Wang , Binyu Zang , Haibing Guan , and Haibo Chen . Pisces : A scalable and eficient persistent transactional memory . In USENIX Annual Technical Conference (ATC) , 2019 . Jinyu Gu, Qianqian Yu, Xiayang Wang, Zhaoguo Wang, Binyu Zang, Haibing Guan, and Haibo Chen. Pisces: A scalable and eficient persistent transactional memory. In USENIX Annual Technical Conference (ATC), 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/3373376.3378472"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Twelfth European Conference on Computer Systems (EuroSys)","author":"Ching-Hsiang Hsu Terry","year":"2017","unstructured":"Terry Ching-Hsiang Hsu , Helge Br\u00fcgner , Indrajit Roy , Kimberly Keeton , and Patrick Eugster . NVthreads : Practical persistence for multi-threaded applications . In Proceedings of the Twelfth European Conference on Computer Systems (EuroSys) , 2017 . Terry Ching-Hsiang Hsu, Helge Br\u00fcgner, Indrajit Roy, Kimberly Keeton, and Patrick Eugster. NVthreads: Practical persistence for multi-threaded applications. In Proceedings of the Twelfth European Conference on Computer Systems (EuroSys), 2017."},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Hu Qingda","year":"2017","unstructured":"Qingda Hu , Jinglei Ren , Anirudh Badam , Jiwu Shu , and Thomas Moscibroda . Logstructured non-volatile main memory . In USENIX Annual Technical Conference (ATC) , 2017 . Qingda Hu, Jinglei Ren, Anirudh Badam, Jiwu Shu, and Thomas Moscibroda. Logstructured non-volatile main memory. In USENIX Annual Technical Conference (ATC), 2017."},{"unstructured":"Intel. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/codesample-enable-your-application-for-persistent-memory-with-mysql-storageengine.html.  Intel. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/codesample-enable-your-application-for-persistent-memory-with-mysql-storageengine.html.","key":"e_1_3_2_1_29_1"},{"unstructured":"Intel. Intel Optane DC persistent memory. https:\/\/www.intel.com\/content\/www\/ us\/en\/architecture-and-technology\/optane-dc-persistent-memory.html.  Intel. Intel Optane DC persistent memory. https:\/\/www.intel.com\/content\/www\/ us\/en\/architecture-and-technology\/optane-dc-persistent-memory.html.","key":"e_1_3_2_1_30_1"},{"unstructured":"Intel. Key\/value datastore for persistent memory. https:\/\/github.com\/pmem\/ pmemkv.  Intel. Key\/value datastore for persistent memory. https:\/\/github.com\/pmem\/ pmemkv.","key":"e_1_3_2_1_31_1"},{"unstructured":"Intel. Persistent memory programming. https:\/\/pmem.io\/.  Intel. Persistent memory programming. https:\/\/pmem.io\/.","key":"e_1_3_2_1_32_1"},{"unstructured":"intel. Pmdk examples. https:\/\/github.com\/pmem\/pmdk\/tree\/stable-1.8\/src\/ examples\/libpmemobj.  intel. Pmdk examples. https:\/\/github.com\/pmem\/pmdk\/tree\/stable-1.8\/src\/ examples\/libpmemobj.","key":"e_1_3_2_1_33_1"},{"unstructured":"Intel. PMDK man page: libpmem. https:\/\/pmem.io\/pmdk\/manpages\/linux\/master\/ libpmem\/libpmem.7.html.  Intel. PMDK man page: libpmem. https:\/\/pmem.io\/pmdk\/manpages\/linux\/master\/ libpmem\/libpmem.7.html.","key":"e_1_3_2_1_34_1"},{"unstructured":"Intel. PMDK man page: libpmem. https:\/\/pmem.io\/pmdk\/manpages\/linux\/master\/ libpmemobj\/libpmemobj.7.html.  Intel. PMDK man page: libpmem. https:\/\/pmem.io\/pmdk\/manpages\/linux\/master\/ libpmemobj\/libpmemobj.7.html.","key":"e_1_3_2_1_35_1"},{"unstructured":"Intel. Pmdk mapcli. https:\/\/github.com\/pmem\/pmdk\/blob\/master\/src\/examples\/ libpmemobj\/map\/mapcli.c.  Intel. Pmdk mapcli. https:\/\/github.com\/pmem\/pmdk\/blob\/master\/src\/examples\/ libpmemobj\/map\/mapcli.c.","key":"e_1_3_2_1_36_1"},{"volume-title":"Btree: remove not needed snapshot (PMDK). https:\/\/github.com\/ pmem\/pmdk\/commit\/b9232407a794040102e769ed98b967d797c173fd\/#difc1ecccb1fea662a18db843553f5a09b00494692dc699f11c784b65d9a22535f8","year":"2018","unstructured":"Intel. Btree: remove not needed snapshot (PMDK). https:\/\/github.com\/ pmem\/pmdk\/commit\/b9232407a794040102e769ed98b967d797c173fd\/#difc1ecccb1fea662a18db843553f5a09b00494692dc699f11c784b65d9a22535f8 , 2018 . Intel. Btree: remove not needed snapshot (PMDK). https:\/\/github.com\/ pmem\/pmdk\/commit\/b9232407a794040102e769ed98b967d797c173fd\/#difc1ecccb1fea662a18db843553f5a09b00494692dc699f11c784b65d9a22535f8, 2018.","key":"e_1_3_2_1_37_1"},{"volume-title":"Intel 64 and IA-32 architectures software developer's manual. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdmvol-1-2abcd-3abcd.pdf","year":"2019","unstructured":"Intel. Intel 64 and IA-32 architectures software developer's manual. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdmvol-1-2abcd-3abcd.pdf , 2019 . Intel. Intel 64 and IA-32 architectures software developer's manual. https:\/\/software.intel.com\/sites\/default\/files\/managed\/39\/c5\/325462-sdmvol-1-2abcd-3abcd.pdf, 2019.","key":"e_1_3_2_1_38_1"},{"volume-title":"https:\/\/github.com\/pmem\/redis\/tree\/3.2-nvml","year":"2019","unstructured":"Intel. Redis. https:\/\/github.com\/pmem\/redis\/tree\/3.2-nvml , 2019 . Intel. Redis. https:\/\/github.com\/pmem\/redis\/tree\/3.2-nvml, 2019.","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","volume-title":"Circumventing fuzzing roadblocks with compiler transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzingroadblocks-with-compiler-transformations \/","author":"Intel Laf","year":"2016","unstructured":"Laf Intel . Circumventing fuzzing roadblocks with compiler transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzingroadblocks-with-compiler-transformations \/ , 2016 . Laf Intel. Circumventing fuzzing roadblocks with compiler transformations. https:\/\/lafintel.wordpress.com\/ 2016 \/08\/15\/circumventing-fuzzingroadblocks-with-compiler-transformations \/, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/HPCA.2017.50"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/3341301.3359631"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1109\/IPDPS.2013.69"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_44_1","DOI":"10.1145\/3341301.3359662"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_45_1","DOI":"10.1145\/3079856.3080229"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_46_1","DOI":"10.1145\/2872362.2872381"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_47_1","DOI":"10.5555\/3195638.3195709"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_48_1","DOI":"10.1145\/3132747.3132770"},{"key":"e_1_3_2_1_49_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Lantz Philip","year":"2014","unstructured":"Philip Lantz , Dulloor Subramanya Rao , Sanjay Kumar , Rajesh Sankaran , and Jef Jackson . Yat : A validation framework for persistent memory software . In USENIX Annual Technical Conference (ATC) , 2014 . Philip Lantz, Dulloor Subramanya Rao, Sanjay Kumar, Rajesh Sankaran, and Jef Jackson. Yat: A validation framework for persistent memory software. In USENIX Annual Technical Conference (ATC), 2014."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_50_1","DOI":"10.1109\/CGO.2004.1281665"},{"volume-title":"https:\/\/github.com\/lenovo\/memcached-pmem","year":"2018","unstructured":"Lenovo. Memcached-pmem. https:\/\/github.com\/lenovo\/memcached-pmem , 2018 . Lenovo. Memcached-pmem. https:\/\/github.com\/lenovo\/memcached-pmem, 2018.","key":"e_1_3_2_1_51_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_52_1","DOI":"10.1145\/3106237.3106295"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_53_1","DOI":"10.1145\/3037697.3037714"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_54_1","DOI":"10.1109\/MICRO.2018.00029"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_55_1","DOI":"10.1109\/HPCA.2018.00035"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_56_1","DOI":"10.1145\/3307650.3322206"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_57_1","DOI":"10.1145\/3373376.3378452"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_58_1","DOI":"10.1145\/3297858.3304015"},{"key":"e_1_3_2_1_59_1","volume-title":"2nd Summit on Advances in Programming Languages (SNAPL)","author":"Lucia Brandon","year":"2017","unstructured":"Brandon Lucia , Vignesh Balaji , Alexei Colin , Kiwan Maeng , and Emily Ruppel . Intermittent Computing : Challenges and Opportunities . In 2nd Summit on Advances in Programming Languages (SNAPL) , 2017 . Brandon Lucia, Vignesh Balaji, Alexei Colin, Kiwan Maeng, and Emily Ruppel. Intermittent Computing: Challenges and Opportunities. In 2nd Summit on Advances in Programming Languages (SNAPL), 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_60_1","DOI":"10.1145\/2737924.2737978"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_61_1","DOI":"10.1145\/1065010.1065034"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_62_1","DOI":"10.1145\/3037697.3037730"},{"key":"e_1_3_2_1_63_1","volume-title":"Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Neal Ian","year":"2020","unstructured":"Ian Neal , B. Reeves , Ben Stoler , Andrew Quinn , Youngjin Kwon , S. Peter , and Baris Kasikci . AGAMOTTO : How persistent is your persistent memory application ? In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI) , 2020 . Ian Neal, B. Reeves, Ben Stoler, Andrew Quinn, Youngjin Kwon, S. Peter, and Baris Kasikci. AGAMOTTO: How persistent is your persistent memory application ? In Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2020."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_64_1","DOI":"10.1109\/MICRO.2018.00048"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_65_1","DOI":"10.5555\/3277332.3277354"},{"unstructured":"Kevin Oleary. How to detect persistent memory programming errors using Intel Inspector-Persistence Inspector. https:\/\/software.intel.com\/content\/www\/ us\/en\/develop\/articles\/detect-persistent-memory-programming-errors-withintel-inspector-persistence-inspector.html 2018.  Kevin Oleary. How to detect persistent memory programming errors using Intel Inspector-Persistence Inspector. https:\/\/software.intel.com\/content\/www\/ us\/en\/develop\/articles\/detect-persistent-memory-programming-errors-withintel-inspector-persistence-inspector.html 2018.","key":"e_1_3_2_1_66_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_67_1","DOI":"10.1145\/2043556.2043560"},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the IEEE Symposium on Security & Privacy","author":"Peng Hui","year":"2018","unstructured":"Hui Peng , Yan Shoshitaishvili , and Mathias Payer . T-Fuzz : fuzzing by program transformation . In Proceedings of the IEEE Symposium on Security & Privacy , 2018 . Hui Peng, Yan Shoshitaishvili, and Mathias Payer. T-Fuzz: fuzzing by program transformation. In Proceedings of the IEEE Symposium on Security & Privacy, 2018."},{"key":"e_1_3_2_1_69_1","volume-title":"9th RoEduNet IEEE International Conference","author":"Purdila O.","year":"2010","unstructured":"O. Purdila , L. A. Grijincu , and N. Tapus . LKL: The linux kernel library . In 9th RoEduNet IEEE International Conference , 2010 . O. Purdila, L. A. Grijincu, and N. Tapus. LKL: The linux kernel library. In 9th RoEduNet IEEE International Conference, 2010."},{"key":"e_1_3_2_1_70_1","first-page":"1","volume-title":"Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596","author":"Rajpal Mohit","year":"2017","unstructured":"Mohit Rajpal , William Blum , and Rishabh Singh . Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596 , pages 1 - 10 , 2017 . Mohit Rajpal, William Blum, and Rishabh Singh. Not all bytes are equal: Neural byte sieve for fuzzing. arXiv preprint arXiv:1711.04596, pages 1-10, 2017."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_71_1","DOI":"10.1145\/3124680.3124729"},{"key":"e_1_3_2_1_72_1","volume-title":"Proceedings of the 48th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO)","author":"Ren Jinglei","year":"2015","unstructured":"Jinglei Ren , Jishen Zhao , Samira Khan , Jongmoo Choi , Yongwei Wu , and Onur Mutlu . ThyNVM : Enabling software-transparent crash consistency in persistent memory systems . In Proceedings of the 48th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO) , 2015 . Jinglei Ren, Jishen Zhao, Samira Khan, Jongmoo Choi, Yongwei Wu, and Onur Mutlu. ThyNVM: Enabling software-transparent crash consistency in persistent memory systems. In Proceedings of the 48th Annual IEEE\/ACM International Symposium on Microarchitecture (MICRO), 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_73_1","DOI":"10.1109\/MICRO50266.2020.00052"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_74_1","DOI":"10.1145\/3368089.3409723"},{"key":"e_1_3_2_1_75_1","volume-title":"Proceedings of the IEEE Symposium on Security & Privacy (SP)","author":"She Dongdong","year":"2019","unstructured":"Dongdong She , Kexin Pei , Dave Epstein , Junfeng Yang , Baishakhi Ray , and Suman Jana . Neuzz : Eficient fuzzing with neural program learning . In Proceedings of the IEEE Symposium on Security & Privacy (SP) , 2019 . Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, and Suman Jana. Neuzz: Eficient fuzzing with neural program learning. In Proceedings of the IEEE Symposium on Security & Privacy (SP), 2019."},{"unstructured":"Yan Shoshitaishvili. Preeny. https:\/\/github.com\/zardus\/preeny\/.  Yan Shoshitaishvili. Preeny. https:\/\/github.com\/zardus\/preeny\/.","key":"e_1_3_2_1_76_1"},{"key":"e_1_3_2_1_77_1","volume-title":"Quick start guide: Provision intel optane dc persistent memory. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/quickstart-guide-configure-intel-optane-dc-persistent-memory-on-linux.html","author":"Upadhyayula Usharani","year":"2019","unstructured":"Usharani Upadhyayula . Quick start guide: Provision intel optane dc persistent memory. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/quickstart-guide-configure-intel-optane-dc-persistent-memory-on-linux.html , 2019 . Usharani Upadhyayula. Quick start guide: Provision intel optane dc persistent memory. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/quickstart-guide-configure-intel-optane-dc-persistent-memory-on-linux.html, 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_78_1","DOI":"10.5555\/1960475.1960480"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_79_1","DOI":"10.1145\/1950365.1950379"},{"key":"e_1_3_2_1_80_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID)","author":"Wang Jinghan","year":"2019","unstructured":"Jinghan Wang , Yue Duan , Wei Song , Heng Yin , and Chengyu Song . Be sensitive and collaborative: Analyzing impact of coverage metrics in greybox fuzzing . In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID) , 2019 . Jinghan Wang, Yue Duan, Wei Song, Heng Yin, and Chengyu Song. Be sensitive and collaborative: Analyzing impact of coverage metrics in greybox fuzzing. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2019."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_81_1","DOI":"10.1145\/3323165.3323166"},{"key":"e_1_3_2_1_82_1","first-page":"2019","volume":"15","author":"Wu Song","unstructured":"Song Wu , Fang Zhou , Xiang Gao , Hai Jin , and Jinglei Ren . Dual-page checkpointing: An architectural approach to eficient data persistence for in-memory applications. ACM Trans. Archit. Code Optim. , 15 ( 4 ), January 2019 . Song Wu, Fang Zhou, Xiang Gao, Hai Jin, and Jinglei Ren. Dual-page checkpointing: An architectural approach to eficient data persistence for in-memory applications. ACM Trans. Archit. Code Optim., 15 ( 4 ), January 2019.","journal-title":"Trans. Archit. Code Optim."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_83_1","DOI":"10.1145\/2063384.2063436"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_84_1","DOI":"10.1145\/2967360.2967374"},{"key":"e_1_3_2_1_85_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Xia Fei","year":"2017","unstructured":"Fei Xia , Dejun Jiang , Jin Xiong , and Ninghui Sun . HiKV : A hybrid index key-value store for DRAM-NVM memory systems . In USENIX Annual Technical Conference (ATC) , 2017 . Fei Xia, Dejun Jiang, Jin Xiong, and Ninghui Sun. HiKV: A hybrid index key-value store for DRAM-NVM memory systems. In USENIX Annual Technical Conference (ATC), 2017."},{"key":"e_1_3_2_1_86_1","volume-title":"Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST)","author":"Xu Jian","year":"2016","unstructured":"Jian Xu and Steven Swanson . NOVA : A log-structured file system for hybrid volatile\/non-volatile main memories . In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST) , 2016 . Jian Xu and Steven Swanson. NOVA: A log-structured file system for hybrid volatile\/non-volatile main memories. In Proceedings of the 14th USENIX Conference on File and Storage Technologies (FAST), 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_87_1","DOI":"10.1145\/3132747.3132761"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_88_1","DOI":"10.1109\/SP.2019.00035"},{"key":"e_1_3_2_1_89_1","volume-title":"Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST)","author":"Yang Jun","year":"2015","unstructured":"Jun Yang , Qingsong Wei , Cheng Chen , Chundong Wang , Khai Leong Yong , and Bingsheng He. NV- Tree : Reducing consistency cost for NVM-based single level systems . In Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST) , 2015 . Jun Yang, Qingsong Wei, Cheng Chen, Chundong Wang, Khai Leong Yong, and Bingsheng He. NV-Tree: Reducing consistency cost for NVM-based single level systems. In Proceedings of the 13th USENIX Conference on File and Storage Technologies (FAST), 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_90_1","DOI":"10.1109\/MICRO.2018.00040"},{"unstructured":"Michal Zalewski. American fuzzy lop. https:\/\/lcamtuf.coredump.cx\/afl\/.  Michal Zalewski. American fuzzy lop. https:\/\/lcamtuf.coredump.cx\/afl\/.","key":"e_1_3_2_1_91_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_92_1","DOI":"10.1145\/2540708.2540744"},{"key":"e_1_3_2_1_93_1","author":"Ziv J.","year":"1977","unstructured":"J. Ziv and A. Lempel . A universal algorithm for sequential data compression. IEEE Transactions on Information Theory , 1977 . J. Ziv and A. Lempel. A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, 1977.","journal-title":"A universal algorithm for sequential data compression. IEEE Transactions on Information Theory"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_94_1","DOI":"10.1145\/3307650.3322252"}],"event":{"sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"acronym":"ASPLOS '21","name":"ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Virtual USA"},"container-title":["Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445814.3446691","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445814.3446691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:13Z","timestamp":1750195693000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445814.3446691"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,17]]},"references-count":94,"alternative-id":["10.1145\/3445814.3446691","10.1145\/3445814"],"URL":"https:\/\/doi.org\/10.1145\/3445814.3446691","relation":{},"subject":[],"published":{"date-parts":[[2021,4,17]]},"assertion":[{"value":"2021-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}