{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T08:37:38Z","timestamp":1777106258444,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DE190100046"],"award-info":[{"award-number":["DE190100046"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484596","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"2169-2182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["Regression Greybox Fuzzing"],"prefix":"10.1145","author":[{"given":"Xiaogang","family":"Zhu","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"given":"Marcel","family":"B\u00f6hme","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3016773"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486829"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491430"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_5_1","volume-title":"OSS-Fuzz: Continuous Fuzzing for Open Source Software. https:\/\/github.com\/google\/oss-fuzz [Online","author":"Chang Oliver","year":"2021","unstructured":"Oliver Chang, Jonathan Metzman, Max Moroz, Martin Barbella, and Abhishek Arya. 2016. OSS-Fuzz: Continuous Fuzzing for Open Source Software. https:\/\/github.com\/google\/oss-fuzz [Online; accessed 19-January-2021]."},{"key":"e_1_3_2_1_6_1","volume-title":"MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Chen Hongxu","year":"2020","unstructured":"Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, and Yang Liu. 2020 a. MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2325--2342."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"e_1_3_2_1_8_1","volume-title":"SAVIOR: Towards Bug-Driven Hybrid Testing. In IEEE Symposium on Security and Privacy (SP). IEEE Computer Society.","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Long Lu, et al. 2020 b. SAVIOR: Towards Bug-Driven Hybrid Testing. In IEEE Symposium on Security and Privacy (SP). IEEE Computer Society."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00026"},{"key":"e_1_3_2_1_10_1","volume-title":"Ant colony optimization","author":"Dorigo Marco","year":"2006","unstructured":"Marco Dorigo, Mauro Birattari, and Thomas Stutzle. 2006. Ant colony optimization. IEEE computational intelligence magazine, Vol. 1, 4 (2006), 28--39."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00024"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Istvan Haller Yuseok Jeon Hui Peng Mathias Payer Cristiano Giuffrida Herbert Bos and Erik van der Kouwe. 2016. TypeSan: Practical Type Confusion Detection. In CCS. 517--528.","DOI":"10.1145\/2976749.2978405"},{"key":"e_1_3_2_1_13_1","unstructured":"Istvan Haller Asia Slowinska Matthias Neugschwandtner and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. In USENIX. 49--64."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3208952"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041552.2041563"},{"key":"e_1_3_2_1_17_1","volume-title":"KATCH: High-Coverage Testing of Software Patches. In ESEC\/FSE. 235--245.","author":"Marinescu Paul Dan","year":"2013","unstructured":"Paul Dan Marinescu and Cristian Cadar. 2013a. KATCH: High-Coverage Testing of Software Patches. In ESEC\/FSE. 235--245."},{"key":"e_1_3_2_1_18_1","volume-title":"KATCH: High-Coverage Testing of Software Patches. In European Software Engineering Conference \/ ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE 2013)","author":"Marinescu Paul Dan","year":"2013","unstructured":"Paul Dan Marinescu and Cristian Cadar. 2013b. KATCH: High-Coverage Testing of Software Patches. In European Software Engineering Conference \/ ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE 2013) (Saint Petersburg, Russia). 235--245."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Jonathan Metzman Abhishek Arya and Laszlo Szekeres. 2020. FuzzBench: Fuzzer Benchmarking as a Service. https:\/\/security.googleblog.com\/2020\/03\/fuzzbench-fuzzer-benchmarking-as-service.html","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Raimund Moser Witold Pedrycz and Giancarlo Succi. 2008. A Comparative Analysis of the Efficiency of Change Metrics and Static Code Attributes for Defect Prediction. In ICSE. 181--190.","DOI":"10.1145\/1368088.1368114"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2010.25"},{"key":"e_1_3_2_1_22_1","volume-title":"Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). USENIX Association, 47--62","author":"Nguyen Manh-Dung","year":"2020","unstructured":"Manh-Dung Nguyen, S\u00e9bastien Bardin, Richard Bonichon, Roland Groz, and Matthieu Lemerre. 2020. Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID). USENIX Association, 47--62."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380363"},{"key":"e_1_3_2_1_24_1","volume-title":"ParmeSan: Sanitizer-guided Greybox Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20)","author":"\u00d6sterlund Sebastian","year":"2020","unstructured":"Sebastian \u00d6sterlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA."},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX Security","volume":"6","author":"Ozment Andy","year":"2006","unstructured":"Andy Ozment and Stuart E Schechter. 2006. Milk or wine: does software security improve with age?. In USENIX Security, Vol. 6."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00066"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416612"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134073"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970316"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_1_31_1","volume-title":"Richard Torkar, and Alevs vZ ivkovivc.","author":"Radjenovi\u0107 Danijel","year":"2013","unstructured":"Danijel Radjenovi\u0107, Marjan Herivc ko, Richard Torkar, and Alevs vZ ivkovivc. 2013. Software fault prediction metrics: A systematic literature review. Information and software technology, Vol. 55, 8 (2013), 1397--1418."},{"key":"e_1_3_2_1_32_1","unstructured":"David A Ramos and Dawson Engler. 2015. Under-constrained symbolic execution: Correctness checking for real code. In USENIX Security. 49--64."},{"key":"e_1_3_2_1_33_1","volume-title":"2010 IEEE Symposium on Security and Privacy. 317--331","author":"Schwartz E. J.","unstructured":"E. J. Schwartz, T. Avgerinos, and D. Brumley. 2010. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). In 2010 IEEE Symposium on Security and Privacy. 317--331."},{"key":"e_1_3_2_1_34_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX ATC. 28."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064211"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/355744.355749"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Yanhao Wang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao Dinghao Wu and Purui Su. 2020. Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. In NDSS .","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Valentin W\u00fcstholz and Maria Christakis. 2020. Targeted greybox fuzzing with static lookahead analysis. In ICSE. 789--800.","DOI":"10.1145\/3377811.3380388"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2629536"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Andreas Zeller. 1999. Yesterday My Program Worked. Today It Does Not. Why?. In ESEC'FSE. 253--267.","DOI":"10.1007\/3-540-48166-4_16"},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX","author":"Zong Peiyuan","year":"2020","unstructured":"Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, and Kai Chen. 2020. FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning. In USENIX 2020."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484596","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:45:25Z","timestamp":1763498725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":41,"alternative-id":["10.1145\/3460120.3484596","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484596","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}