{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:43:28Z","timestamp":1772045008205,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T00:00:00Z","timestamp":1636761600000},"content-version":"vor","delay-in-days":1,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["W911NF-18-C-0019"],"award-info":[{"award-number":["W911NF-18-C-0019"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484787","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"351-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing"],"prefix":"10.1145","author":[{"given":"Stefan","family":"Nagy","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Anh","family":"Nguyen-Tuong","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Jason D.","family":"Hiser","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Jack W.","family":"Davidson","sequence":"additional","affiliation":[{"name":"University of Virginia, Charlottesville, VA, USA"}]},{"given":"Matthew","family":"Hicks","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Circumventing Fuzzing Roadblocks with Compiler Transformations","year":"2016","unstructured":"laf-intel: Circumventing Fuzzing Roadblocks with Compiler Transformations, 2016. URL: https:\/\/lafintel.wordpress.com\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Program Coverage. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL","author":"Agrawal Hiralal","year":"1994","unstructured":"Hiralal Agrawal. Dominators, Super Blocks, and Program Coverage. In ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL, 1994."},{"key":"e_1_3_2_1_3_1","volume-title":"Thorsten Holz. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Network and Distributed System Security Symposium, NDSS","author":"Aschermann Cornelius","year":"2018","unstructured":"Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Network and Distributed System Security Symposium, NDSS, 2018."},{"key":"e_1_3_2_1_4_1","volume-title":"Improving AFL's QEMU mode performance","author":"Biondo Andrea","year":"2018","unstructured":"Andrea Biondo. Improving AFL's QEMU mode performance, 2018. URL: https:\/\/abiondo.me\/2018\/09\/21\/improving-afl-qemu-mode\/."},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium, USENIX","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko, Cornelius Aschermann, Moritz Schl\u00f6gel, Ali Abbasi, Sergej Schumilo, Simon W\u00f6rner, and Thorsten Holz. GRIMOIRE: Synthesizing Structure while Fuzzing. In USENIX Security Symposium, USENIX, 2019."},{"key":"e_1_3_2_1_6_1","volume-title":"Abhik Roychoudhury. Directed Greybox Fuzzing. In ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"B\u00f6hme Marcel","year":"2017","unstructured":"Marcel B\u00f6hme, Van-Thuan Pham, Manh-Dung Nguyen, and Abhik Roychoudhury. Directed Greybox Fuzzing. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2017."},{"key":"e_1_3_2_1_7_1","volume-title":"Abhik Roychoudhury. Coverage-based Greybox Fuzzing As Markov Chain. In ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"B\u00f6hme Marcel","year":"2016","unstructured":"Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. Coverage-based Greybox Fuzzing As Markov Chain. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2016."},{"key":"e_1_3_2_1_8_1","volume-title":"Billions and Billions of Constraints: Whitebox Fuzz Testing in Production. Technical report","author":"Bounimova Ella","year":"2012","unstructured":"Ella Bounimova, Patrice Godefroid, and David Molnar. Billions and Billions of Constraints: Whitebox Fuzz Testing in Production. Technical report, 2012. URL: https:\/\/www.microsoft.com\/en-us\/research\/publication\/billions-and-billions-of-constraints-whitebox-fuzz-testing-in-production\/."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_10_1","volume-title":"Hao Chen. Matryoshka: Fuzzing Deeply Nested Branches. In ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"Chen Peng","year":"2019","unstructured":"Peng Chen, Jianzhong Liu, and Hao Chen. Matryoshka: Fuzzing Deeply Nested Branches. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2019."},{"key":"e_1_3_2_1_11_1","volume-title":"Long Lu. SAVIOR: Towards Bug-Driven Hybrid Testing. In IEEE Symposium on Security and Privacy","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Taowei, and Long Lu. SAVIOR: Towards Bug-Driven Hybrid Testing. In IEEE Symposium on Security and Privacy, Oakland, 2020. arXiv: 1906.07327."},{"key":"e_1_3_2_1_12_1","volume-title":"USENIX Security Symposium, USENIX","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. In USENIX Security Symposium, USENIX, 2019."},{"key":"e_1_3_2_1_13_1","volume-title":"Sang Kil Cha. Grey-box Concolic Testing on Binary Code. In International Conference on Software Engineering, ICSE","author":"Choi Jaeseung","year":"2019","unstructured":"Jaeseung Choi, Joonun Jang, Choongwoo Han, and Sang Kil Cha. Grey-box Concolic Testing on Binary Code. In International Conference on Software Engineering, ICSE, 2019."},{"key":"e_1_3_2_1_14_1","volume-title":"McSema: Static Translation of X86 Instructions to LLVM","author":"Dinaburg Artem","year":"2014","unstructured":"Artem Dinaburg and Andrew Ruef. McSema: Static Translation of X86 Instructions to LLVM, 2014. URL: https:\/\/github.com\/trailofbits\/mcsema."},{"key":"e_1_3_2_1_15_1","volume-title":"Mathias Payer. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE Symposium on Security and Privacy","author":"Dinesh Sushant","year":"2020","unstructured":"Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE Symposium on Security and Privacy, Oakland, 2020."},{"key":"e_1_3_2_1_16_1","volume-title":"Vectorized Emulation: Hardware accelerated taint tracking at 2 trillion instructions per second","author":"Falk Brandon","year":"2018","unstructured":"Brandon Falk. Vectorized Emulation: Hardware accelerated taint tracking at 2 trillion instructions per second, 2018. URL: https:\/\/gamozolabs.github.io\/fuzzing\/2018\/10\/14\/vectorized_emulation.html."},{"key":"e_1_3_2_1_17_1","volume-title":"Leonardo Querzoni. Fuzzing Binaries for Memory Safety Errors with QASan. In IEEE Secure Development Conference, SecDev","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Daniele Cono DtextquoterightElia, and Leonardo Querzoni. Fuzzing Binaries for Memory Safety Errors with QASan. In IEEE Secure Development Conference, SecDev, 2020."},{"key":"e_1_3_2_1_18_1","unstructured":"Andrea Fioraldi Dominik Maier Heiko Ei\u00dffeldt and Marc Heuse. AFL"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Workshop on Offensive Technologies, WOOT","year":"2020","unstructured":": Combining Incremental Steps of Fuzzing Research. In USENIX Workshop on Offensive Technologies, WOOT, 2020."},{"key":"e_1_3_2_1_20_1","volume-title":"CollAFL: Path Sensitive Fuzzing. In IEEE Symposium on Security and Privacy","author":"Gan S.","year":"2018","unstructured":"S. Gan, C. Zhang, X. Qin, X. Tu, K. Li, Z. Pei, and Z. Chen. CollAFL: Path Sensitive Fuzzing. In IEEE Symposium on Security and Privacy, Oakland, 2018."},{"key":"e_1_3_2_1_21_1","volume-title":"GNU gprof","author":"Project GNU","year":"2018","unstructured":"GNU Project. GNU gprof, 2018. URL: https:\/\/sourceware.org\/binutils\/docs\/gprof\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_23_1","unstructured":"Google Project Zero. WinAFL 2016. URL: https:\/\/github.com\/googleprojectzero\/winafl."},{"key":"e_1_3_2_1_24_1","unstructured":"Samuel Gro\u00df and Google Project Zero. Fuzzing ImageIO 2020. URL: https:\/\/googleprojectzero.blogspot.com\/2020\/04\/fuzzing-imageio.html."},{"key":"e_1_3_2_1_25_1","unstructured":"Ilfak Guilfanov and Hex-Rays. IDA 2019. URL: https:\/\/www.hex-rays.com\/products\/ida\/."},{"key":"e_1_3_2_1_26_1","volume-title":"Davidson. Zipr: Efficient Static Binary Rewriting for Security. In IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN","author":"Hawkins William H.","year":"2017","unstructured":"William H. Hawkins, Jason D. Hiser, Michele Co, Anh Nguyen-Tuong, and Jack W. Davidson. Zipr: Efficient Static Binary Rewriting for Security. In IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN, 2017."},{"key":"e_1_3_2_1_27_1","unstructured":"Marc Heuse. AFL-Dyninst 2018. URL: https:\/\/github.com\/vanhauser-thc\/afl-dyninst."},{"key":"e_1_3_2_1_28_1","unstructured":"Jason Hiser Anh Nguyen-Tuong William Hawkins Matthew McGill Michele Co and Jack Davidson. Zipr"},{"key":"e_1_3_2_1_29_1","volume-title":"Workshop on Forming an Ecosystem Around Software Transformation, FEAST","year":"2017","unstructured":": Exceptional Binary Rewriting. In Workshop on Forming an Ecosystem Around Software Transformation, FEAST, 2017."},{"key":"e_1_3_2_1_30_1","volume-title":"Shih-Kun Huang. INSTRIM: Lightweight Instrumentation for Coverage-guided Fuzzing. In NDSS Workshop on Binary Analysis Research, BAR","author":"Hsu Chin-Chia","year":"2018","unstructured":"Chin-Chia Hsu, Che-Yu Wu, Hsu-Chun Hsiao, and Shih-Kun Huang. INSTRIM: Lightweight Instrumentation for Coverage-guided Fuzzing. In NDSS Workshop on Binary Analysis Research, BAR, 2018."},{"key":"e_1_3_2_1_31_1","volume-title":"Herbert Bos. TIFF: Using Input Type Inference To Improve Fuzzing. In Annual Computer Security Applications Conference, ACSAC","author":"Jain Vivek","year":"2018","unstructured":"Vivek Jain, Sanjay Rawat, Cristiano Giuffrida, and Herbert Bos. TIFF: Using Input Type Inference To Improve Fuzzing. In Annual Computer Security Applications Conference, ACSAC, 2018."},{"key":"e_1_3_2_1_32_1","volume-title":"Taesoo Kim. WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. In Network and Distributed System Security Symposium, NDSS","author":"Jung Jinho","year":"2021","unstructured":"Jinho Jung, Stephen Tong, Hong Hu, Jungwon Lim, Yonghwi Jin, and Taesoo Kim. WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast Cloning. In Network and Distributed System Security Symposium, NDSS, 2021."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24386"},{"key":"e_1_3_2_1_34_1","volume-title":"Michael Hicks. Evaluating Fuzz Testing. In ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"Klees George","year":"2018","unstructured":"George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, and Michael Hicks. Evaluating Fuzz Testing. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2018."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_36_1","volume-title":"Lemieux and Koushik Sen. FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage. In ACM\/IEEE International Conference on Automated Software Engineering, ASE","author":"Caroline","year":"2018","unstructured":"Caroline Lemieux and Koushik Sen. FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage. In ACM\/IEEE International Conference on Automated Software Engineering, ASE, 2018."},{"key":"e_1_3_2_1_37_1","volume-title":"Alwen Tiu. Steelix: Program-state Based Binary Fuzzing. In ACM Joint Meeting on Foundations of Software Engineering, ESEC\/FSE","author":"Li Yuekang","year":"2017","unstructured":"Yuekang Li, Bihuan Chen, Mahinthan Chandramohan, Shang-Wei Lin, Yang Liu, and Alwen Tiu. Steelix: Program-state Based Binary Fuzzing. In ACM Joint Meeting on Foundations of Software Engineering, ESEC\/FSE, 2017."},{"key":"e_1_3_2_1_38_1","volume-title":"Raheem Beyah. MOPT: Optimize Mutation Scheduling for Fuzzers. In USENIX Security Symposium, USENIX","author":"Lv Chenyang","year":"2019","unstructured":"Chenyang Lv, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. MOPT: Optimize Mutation Scheduling for Fuzzers. In USENIX Security Symposium, USENIX, 2019."},{"key":"e_1_3_2_1_39_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Nagy Stefan","year":"2019","unstructured":"Stefan Nagy and Matthew Hicks. Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing. In IEEE Symposium on Security and Privacy, Oakland, 2019."},{"key":"e_1_3_2_1_40_1","volume-title":"Matthew Hicks. Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. In USENIX Security Symposium, USENIX","author":"Nagy Stefan","year":"2021","unstructured":"Stefan Nagy, Anh Nguyen-Tuong, Jason D Hiser, Jack W Davidson, and Matthew Hicks. Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. In USENIX Security Symposium, USENIX, 2021."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00012"},{"key":"e_1_3_2_1_42_1","unstructured":"Paradyn Tools Project. Dyninst API 2018. URL: https:\/\/dyninst.org\/dyninst."},{"key":"e_1_3_2_1_43_1","volume-title":"Alexandru Ru azvan Cu aciulescu, and Abhik Roychoudhury. Smart Greybox Fuzzing","author":"Pham Van-Thuan","year":"2019","unstructured":"Van-Thuan Pham, Marcel B\u00f6hme, Andrew E. Santosa, Alexandru Ru azvan Cu aciulescu, and Abhik Roychoudhury. Smart Greybox Fuzzing. IEEE Transactions on Software Engineering, 2019."},{"key":"e_1_3_2_1_44_1","volume-title":"ACM transactions on Programming Languages and Systems, page 22","author":"Ramalingam Ganesan","year":"2002","unstructured":"Ganesan Ramalingam. On Loops, Dominators, and Dominance Frontiers. ACM transactions on Programming Languages and Systems, page 22, 2002."},{"key":"e_1_3_2_1_45_1","volume-title":"Herbert Bos. VUzzer: Application-aware Evolutionary Fuzzing. In Network and Distributed System Security Symposium, NDSS","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. VUzzer: Application-aware Evolutionary Fuzzing. In Network and Distributed System Security Symposium, NDSS, 2017."},{"key":"e_1_3_2_1_46_1","volume-title":"Rawat and Laurent Mounier. Finding Buffer Overflow Inducing Loops in Binary Executables. In IEEE International Conference on Software Security and Reliability, SERE","author":"Sanjay","year":"2012","unstructured":"Sanjay Rawat and Laurent Mounier. Finding Buffer Overflow Inducing Loops in Binary Executables. In IEEE International Conference on Software Security and Reliability, SERE, 2012."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.043"},{"key":"e_1_3_2_1_48_1","volume-title":"Suman Jana. NEUZZ: Efficient Fuzzing with Neural Program Smoothing. In IEEE Symposium on Security and Privacy","author":"She Dongdong","year":"2019","unstructured":"Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, and Suman Jana. NEUZZ: Efficient Fuzzing with Neural Program Smoothing. In IEEE Symposium on Security and Privacy, Oakland, 2019."},{"key":"e_1_3_2_1_49_1","volume-title":"drAFL","author":"Shudrak Maksim","year":"2019","unstructured":"Maksim Shudrak and Battelle. drAFL, 2019. URL: https:\/\/github.com\/mxmssh\/drAFL."},{"key":"e_1_3_2_1_50_1","volume-title":"Giovanni Vigna. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In Network and Distributed System Security Symposium, NDSS","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In Network and Distributed System Security Symposium, NDSS, 2016."},{"key":"e_1_3_2_1_51_1","volume-title":"honggfuzz","author":"Swiecki Robert","year":"2018","unstructured":"Robert Swiecki. honggfuzz, 2018. URL: http:\/\/honggfuzz.com\/."},{"key":"e_1_3_2_1_52_1","unstructured":"The Clang Team. SanitizerCoverage 2019. URL: https:\/\/clang.llvm.org\/docs\/SanitizerCoverage.html."},{"key":"e_1_3_2_1_53_1","volume-title":"International Symposium on Research in Attacks, Intrusions and Defenses, RAID","author":"Toepfer Fabian","year":"2021","unstructured":"Fabian Toepfer and Dominik Maier. BSOD: Binary-only Scalable fuzzing Of device Drivers. In International Symposium on Research in Attacks, Intrusions and Defenses, RAID, 2021."},{"key":"e_1_3_2_1_54_1","unstructured":"Nathan Voss and Battelle. AFL-Unicorn 2019. URL: https:\/\/github.com\/Battelle\/afl-unicorn."},{"key":"e_1_3_2_1_55_1","volume-title":"Yang Liu. Superion: Grammar-Aware Greybox Fuzzing. In International Conference on Software Engineering, ICSE, 2019","author":"Wang Junjie","year":"1812","unstructured":"Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. Superion: Grammar-Aware Greybox Fuzzing. In International Conference on Software Engineering, ICSE, 2019. arXiv: 1812.01197."},{"key":"e_1_3_2_1_56_1","volume-title":"From Hack to Elaborate TechniquetextemdashA Survey on Binary Rewriting. ACM Computing Surveys, 52(3)","author":"Wenzl Matthias","year":"2019","unstructured":"Matthias Wenzl, Georg Merzdovnik, Johanna Ullrich, and Edgar Weippl. From Hack to Elaborate TechniquetextemdashA Survey on Binary Rewriting. ACM Computing Surveys, 52(3), 2019."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"e_1_3_2_1_59_1","volume-title":"Bin Liang. ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery. In IEEE Symposium on Security and Privacy","author":"You Wei","year":"2019","unstructured":"Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, and Bin Liang. ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery. In IEEE Symposium on Security and Privacy, Oakland, 2019."},{"key":"e_1_3_2_1_60_1","volume-title":"Taesoo Kim. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium, USENIX","author":"Yun Insu","year":"2018","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium, USENIX, 2018."},{"key":"e_1_3_2_1_61_1","volume-title":"American fuzzy lop","author":"Zalewski Michal","year":"2017","unstructured":"Michal Zalewski. American fuzzy lop, 2017. URL: http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_62_1","volume-title":"Jifeng Xuan. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In Network and Distributed System Security Symposium, NDSS","author":"Zhao Lei","year":"2019","unstructured":"Lei Zhao, Yue Duan, Heng Yin, and Jifeng Xuan. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In Network and Distributed System Security Symposium, NDSS, 2019."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484787","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484787","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484787","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:53:48Z","timestamp":1763499228000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484787"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":62,"alternative-id":["10.1145\/3460120.3484787","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484787","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}