{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:41:04Z","timestamp":1762508464564,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Cisco Systems Inc.","award":["1138109"],"award-info":[{"award-number":["1138109"]}]},{"name":"European Union Horizon 2020","award":["786669"],"award-info":[{"award-number":["786669"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390781972"],"award-info":[{"award-number":["390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3447852.3458720","type":"proceedings-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T09:54:20Z","timestamp":1619344460000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["CollabFuzz"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"\u00d6sterlund","sequence":"first","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Elia","family":"Geretto","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Andrea","family":"Jemmett","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Emre","family":"G\u00fcler","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum"}]},{"given":"Philipp","family":"G\u00f6rz","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"Ruhr-Universit\u00e4t Bochum"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence. In Symposium on Network and Distributed System Security (NDSS).","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann , Sergej Schumilo , Tim Blazytko , Robert Gawlik , and Thorsten Holz . 2019 . REDQUEEN: Fuzzing with Input-to-State Correspondence. In Symposium on Network and Distributed System Security (NDSS). Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"volume-title":"Coverage-based Greybox Fuzzing As Markov Chain","author":"B\u00f6hme Marcel","key":"e_1_3_2_1_3_1","unstructured":"Marcel B\u00f6hme , Van-Thuan Pham , and Abhik Roychoudhury . 2017. Coverage-based Greybox Fuzzing As Markov Chain . In IEEE Transactions on Software Engineering . Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. 2017. Coverage-based Greybox Fuzzing As Markov Chain. In IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_6_1","volume-title":"MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen , Mansour Ahmadi , Boyu Wang , Long Lu , 2020 . MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 77--92. Yaohui Chen, Mansour Ahmadi, Boyu Wang, Long Lu, et al. 2020. MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 77--92."},{"key":"e_1_3_2_1_7_1","volume-title":"USENIX Security Symposium.","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen , Yu Jiang , Fuchen Ma , Jie Liang , Mingzhe Wang , Chijin Zhou , Xun Jiao , and Zhuo Su . 2019 . EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers . In USENIX Security Symposium. Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. 2019. EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. In USENIX Security Symposium."},{"key":"e_1_3_2_1_8_1","volume-title":"Accessed","author":"Google The Chromium","year":"2021","unstructured":"Chrome25 [n.d.]. The Chromium ( Google Chrome) Open Source Project on Open Hub : Languages Page. https:\/\/www.openhub.net\/p\/chrome\/analyses\/latest\/languages_summary . Accessed : March 31, 2021 . Chrome25 [n.d.]. The Chromium (Google Chrome) Open Source Project on Open Hub: Languages Page. https:\/\/www.openhub.net\/p\/chrome\/analyses\/latest\/languages_summary. Accessed: March 31, 2021."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"e_1_3_2_1_10_1","volume-title":"Accessed","author":"Inc.","year":"2018","unstructured":"Google, Inc. 2018 . fuzzer-test-suite. https:\/\/github.com\/google\/fuzzer-test-suite . Accessed : March 31, 2021. Google, Inc. 2018. fuzzer-test-suite. https:\/\/github.com\/google\/fuzzer-test-suite. Accessed: March 31, 2021."},{"key":"e_1_3_2_1_11_1","volume-title":"Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. In Annual Computer Security Applications Conference (ACSAC). https:\/\/doi.org\/10","author":"G\u00fcler Emre","year":"2020","unstructured":"Emre G\u00fcler , Philipp G\u00f6rz , Elia Geretto , Andrea Jemmett , Sebastian \u00d6sterlund , Herbert Bos , Cristiano Giuffrida , and Thorsten Holz . 2020 . Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. In Annual Computer Security Applications Conference (ACSAC). https:\/\/doi.org\/10 .1145\/3427228.3427266 Emre G\u00fcler, Philipp G\u00f6rz, Elia Geretto, Andrea Jemmett, Sebastian \u00d6sterlund, Herbert Bos, Cristiano Giuffrida, and Thorsten Holz. 2020. Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. In Annual Computer Security Applications Conference (ACSAC). https:\/\/doi.org\/10.1145\/3427228.3427266"},{"volume-title":"ZeroMQ: messaging for many applications. \"O'Reilly Media","author":"Hintjens Pieter","key":"e_1_3_2_1_12_1","unstructured":"Pieter Hintjens . 2013. ZeroMQ: messaging for many applications. \"O'Reilly Media , Inc .\". Pieter Hintjens. 2013. ZeroMQ: messaging for many applications. \"O'Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_13_1","volume-title":"Accessed","author":"Honggfuzz","year":"2021","unstructured":"Honggfuzz [n.d.]. Security oriented fuzzer with powerful analysis options. https:\/\/github.com\/google\/honggfuzz . Accessed : March 31, 2021 . Honggfuzz [n.d.]. Security oriented fuzzer with powerful analysis options. https:\/\/github.com\/google\/honggfuzz. Accessed: March 31, 2021."},{"key":"e_1_3_2_1_14_1","volume-title":"Evaluating Fuzz Testing. In ACM Conference on Computer and Communications Security (CCS).","author":"Klees George","year":"2018","unstructured":"George Klees , Andrew Ruef , Benji Cooper , Shiyi Wei , and Michael Hicks . 2018 . Evaluating Fuzz Testing. In ACM Conference on Computer and Communications Security (CCS). George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, and Michael Hicks. 2018. Evaluating Fuzz Testing. In ACM Conference on Computer and Communications Security (CCS)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_1_16_1","volume-title":"ACM International Conference on Automated Software Engineering (ASE).","author":"Lemieux Caroline","year":"2018","unstructured":"Caroline Lemieux and Koushik Sen . 2018 . Fairfuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage . In ACM International Conference on Automated Software Engineering (ASE). Caroline Lemieux and Koushik Sen. 2018. Fairfuzz: Targeting rare branches to rapidly increase greybox fuzz testing coverage. In ACM International Conference on Automated Software Engineering (ASE)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3239576.3239615"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275525"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2600239.2600241"},{"key":"e_1_3_2_1_20_1","volume-title":"FuzzBench: Fuzzer benchmarking as a service. Google Security Blog","author":"Jonathan Metzman L\u00e1szl\u00f3 Szekeres","year":"2020","unstructured":"L\u00e1szl\u00f3 Szekeres Jonathan Metzman , Abhishek Arya , and L Szekeres . 2020. FuzzBench: Fuzzer benchmarking as a service. Google Security Blog ( 2020 ). L\u00e1szl\u00f3 Szekeres Jonathan Metzman, Abhishek Arya, and L Szekeres. 2020. FuzzBench: Fuzzer benchmarking as a service. Google Security Blog (2020)."},{"key":"e_1_3_2_1_21_1","unstructured":"Sebastian \u00d6sterlund Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In USENIX Security. Paper=https:\/\/download.vusec.net\/papers\/parmesan_sec20.pdfCode=https:\/\/github.com\/vusec\/parmesan  Sebastian \u00d6sterlund Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In USENIX Security. Paper=https:\/\/download.vusec.net\/papers\/parmesan_sec20.pdfCode=https:\/\/github.com\/vusec\/parmesan"},{"key":"e_1_3_2_1_22_1","volume-title":"USENIX Security Symposium.","author":"Serebryany Kostya","year":"2017","unstructured":"Kostya Serebryany . 2017 . OSS-Fuzz-Google's continuous fuzzing service for open source software . In USENIX Security Symposium. Kostya Serebryany. 2017. OSS-Fuzz-Google's continuous fuzzing service for open source software. In USENIX Security Symposium."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_24_1","volume-title":"Samantha Gottlieb, and David Brumley.","author":"Woo Maverick","year":"2013","unstructured":"Maverick Woo , Sang Kil Cha , Samantha Gottlieb, and David Brumley. 2013 . Scheduling black-box mutational fuzzing. In ACM Special Interest Group on Security, Audit and Control (SIGSAC). Maverick Woo, Sang Kil Cha, Samantha Gottlieb, and David Brumley. 2013. Scheduling black-box mutational fuzzing. In ACM Special Interest Group on Security, Audit and Control (SIGSAC)."},{"key":"e_1_3_2_1_25_1","volume-title":"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium.","author":"Yun Insu","year":"2018","unstructured":"Insu Yun , Sangho Lee , Meng Xu , Yeongjin Jang , and Taesoo Kim . 2018 . QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium. Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","volume-title":"Accessed","author":"Zalewski Micha\u0142","year":"2021","unstructured":"Micha\u0142 Zalewski . [n.d.]. american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/ . Accessed : March 31, 2021 . Micha\u0142 Zalewski. [n.d.]. american fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl\/. Accessed: March 31, 2021."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Lei Zhao Yue Duan Heng Yin and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.. In NDSS.  Lei Zhao Yue Duan Heng Yin and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.. In NDSS.","DOI":"10.14722\/ndss.2019.23504"}],"event":{"name":"EuroSys '21: Sixteenth European Conference on Computer Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Online United Kingdom","acronym":"EuroSys '21"},"container-title":["Proceedings of the 14th European Workshop on Systems Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447852.3458720","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447852.3458720","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:27Z","timestamp":1750268967000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447852.3458720"}},"subtitle":["A Framework for Collaborative Fuzzing"],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":27,"alternative-id":["10.1145\/3447852.3458720","10.1145\/3447852"],"URL":"https:\/\/doi.org\/10.1145\/3447852.3458720","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}