{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:03:13Z","timestamp":1766484193536,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484811","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2197-2213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing"],"prefix":"10.1145","author":[{"given":"Gaoning","family":"Pan","sequence":"first","affiliation":[{"name":"Zhejiang University &amp; Ant Group, Hangzhou, China"}]},{"given":"Xingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"given":"Xuhong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; Binjiang Institute of Zhejiang University, Hangzhou, China"}]},{"given":"Yongkang","family":"Jia","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Shouling","family":"Ji","sequence":"additional","affiliation":[{"name":"Zhejiang University &amp; Binjiang Institute of Zhejiang University, Hangzhou, China"}]},{"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China"}]},{"given":"Xinlei","family":"Ying","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"given":"Jiashui","family":"Wang","sequence":"additional","affiliation":[{"name":"Ant Group, Hangzhou, China"}]},{"given":"Yanjun","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute of Software, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"volume-title":"CVE-2020--14364 QEMU: usb: out-of-bounds r\/w access issue while processing usb packets","year":"2020","key":"e_1_3_2_1_1_1","unstructured":"2020. CVE-2020--14364 QEMU: usb: out-of-bounds r\/w access issue while processing usb packets, 2020. https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=1869201."},{"volume-title":"Pwn2Own 2020: Oracle VirtualBox Escape","year":"2020","key":"e_1_3_2_1_2_1","unstructured":"2020. Pwn2Own 2020: Oracle VirtualBox Escape, 2020. https:\/\/starlabs.sg\/blog\/2020\/09\/pwn2own-2020-oracle-virtualbox-escape\/."},{"key":"e_1_3_2_1_3_1","volume-title":"Part 2: ZDI-19--421, a UHCI bug","author":"Mware Pwning","year":"2020","unstructured":"2020. Pwning VMware, Part 2: ZDI-19--421, a UHCI bug, 2020. https:\/\/nafod.net\/blog\/2020\/02\/29\/zdi-19--421-uhci.html."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Adventures in Hypervisor: Oracle VirtualBox Research. https:\/\/starlabs.sg\/blog\/2020\/04\/adventures-in-hypervisor-oracle-virtualbox-research\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. CodeQL for research. https:\/\/securitylab.github.com\/tools\/codeql\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. CVE details. https:\/\/www.cvedetails.com\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Fuzzing QEMU Device Emulation. https:\/\/qemu.readthedocs.io\/en\/latest\/deve\/fuzzing.html."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Microsoft Security Research and Defense. Fuzzing para-virtualized devices in Hyper-V. https:\/\/blogs.technet.microsoft.com\/srd\/2019\/01\/28\/fuzzing-paravirtualized-devices-in-hyper-v\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2021. PWN2OWN. https:\/\/www.zerodayinitiative.com\/blog\/2021\/4\/2\/pwn2own-2021-schedule-and-live-results."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Tianfu Cup International Cybersecurity Contest. http:\/\/tianfucup.com\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2021. Universal Host Controller Interface. https:\/\/wiki.osdev.or\/Universal_Host_Controller_Interface."},{"key":"e_1_3_2_1_13_1","unstructured":"2021. Viridian Fuzzer. https:\/\/github.com\/mwrlabs\/ViridianFuzzer."},{"key":"e_1_3_2_1_14_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00117"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence","volume":"19","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS, Vol. 19. 1--15.","journal-title":"NDSS"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 975--985","author":"Domagoj","year":"2019","unstructured":"Domagoj Babi?, Stefan Bucur, Yaohui Chen, Franjo Ivan?i?, Tim King, Markus Kusano, Caroline Lemieux, L\u00e1szl\u00f3 Szekeres, and Wei Wang. 2019. Fudge: fuzz driver generation at scale. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 975--985."},{"key":"e_1_3_2_1_18_1","volume-title":"HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. arXiv preprint arXiv:2002.03416","author":"Blair William","year":"2020","unstructured":"William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, and Manuel Egele. 2020. HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing. arXiv preprint arXiv:2002.03416 (2020)."},{"key":"e_1_3_2_1_19_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko, Matt Bishop, Cornelius Aschermann, Justin Cappos, Moritz Schl\u00f6gel, Nadia Korshun, Ali Abbasi, Marco Schweighauser, Sebastian Schinzel, Sergej Schumilo, et al. 2019. GRIMOIRE: Synthesizing structure while fuzzing. In 28th USENIX Security Symposium (USENIX Security 19). 1985--2002."},{"key":"e_1_3_2_1_20_1","unstructured":"S\u00f6ren Bleikertz. 2021. XenFuzz. https:\/\/www.openfoo.org\/blog\/xen-fuzz.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_22_1","unstructured":"Amardeep Chana. 2021. MWR-Labs: Ventures into Hyper-V - Fuzzing hypercalls. https:\/\/labs.mwrinfosecurity.com\/blog\/ventures-into-hyper-v-part-1-fuzzing-hypercalls\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Menghan Sun, Ronghai Yang, and Kehuan Zhang.","author":"Chen Jiongyi","year":"2018","unstructured":"Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang. 2018. IoTFuzzer: Discovering Memory Corruptions in IoT Through Appbased Fuzzing.. In NDSS."},{"key":"e_1_3_2_1_24_1","volume-title":"MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen, Mansour Ahmadi, Boyu Wang, Long Lu, et al. 2020. MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 77--92."},{"key":"e_1_3_2_1_25_1","volume-title":"Enfuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers. In 28th {USENIX} Security Symposium (USENIX Security 19). 1967--1983.","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. 2019. Enfuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers. In 28th {USENIX} Security Symposium (USENIX Security 19). 1967--1983."},{"key":"e_1_3_2_1_26_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Clements Abraham A","year":"2020","unstructured":"Abraham A Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, and Mathias Payer. 2020. HALucinator: Firmware re-hosting through abstraction layer emulation. In 29th USENIX Security Symposium (USENIX Security 20). 1201--1218."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"e_1_3_2_1_28_1","volume-title":"Black Hat USA 2011","author":"Elhage Nelson","year":"2011","unstructured":"Nelson Elhage. 2011. Virtunoid: A kvm guest! host privilege escalation exploit. Black Hat USA 2011 (2011)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"volume-title":"syzkaller - kernel fuzzer","year":"2019","key":"e_1_3_2_1_30_1","unstructured":"Google. 2021. syzkaller - kernel fuzzer, 2019. https:\/\/github.com\/google\/syzkaller."},{"key":"e_1_3_2_1_31_1","volume-title":"Attacking hypervisors via firmware and hardware. Black Hat USA","author":"Gorobets Mikhail","year":"2015","unstructured":"Mikhail Gorobets, Oleksandr Bazhaniuk, Alex Matrosov, Andrew Furtak, and Yuriy Bulygin. 2015. Attacking hypervisors via firmware and hardware. Black Hat USA (2015)."},{"key":"e_1_3_2_1_32_1","volume-title":"Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. In Annual Computer Security Applications Conference. 360--372","author":"G\u00fcler Emre","year":"2020","unstructured":"Emre G\u00fcler, Philipp G\u00f6rz, Elia Geretto, Andrea Jemmett, Sebastian \u00d6sterlund, Herbert Bos, Cristiano Giuffrida, and Thorsten Holz. 2020. Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. In Annual Computer Security Applications Conference. 360--372."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134103"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66332-6_1"},{"key":"e_1_3_2_1_35_1","volume-title":"Vishwath Mohan, and Mathias Payer.","author":"Ispoglou Kyriakos","year":"2020","unstructured":"Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, and Mathias Payer. 2020. Fuzzgen: Automatic fuzzer generation. In 29th {USENIX} Security Symposium (USENIX Security 20). 2271--2287."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"e_1_3_2_1_37_1","volume-title":"Yeongjin Jang, Insik Shin, and Byoungyoung Lee.","author":"Kim Kyungtae","year":"2020","unstructured":"Kyungtae Kim, Dae R Jeong, Chung Hwan Kim, Yeongjin Jang, Insik Shin, and Byoungyoung Lee. 2020. HFL: Hybrid Fuzzing on the Linux Kernel.. In NDSS."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_39_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Yuwei","year":"2021","unstructured":"Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, et al. 2021. Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"e_1_3_2_1_41_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. {MOPT}: Optimized mutation scheduling for fuzzers. In 28th USENIX Security Symposium (USENIX Security 19). 1949--1966."},{"key":"e_1_3_2_1_42_1","volume-title":"Manuel Egele, Edward J Schwartz, and Maverick Woo.","author":"Marie Man\u00e8s Valentin Jean","year":"2019","unstructured":"Valentin Jean Marie Man\u00e8s, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J Schwartz, and Maverick Woo. 2019. The art, science, and engineering of fuzzing: A survey. IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_43_1","unstructured":"Tavis Ormandy. 2007. An empirical study into the security exposure to hosts of hostile virtualized environments."},{"key":"e_1_3_2_1_44_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"\u00d6sterlund Sebastian","year":"2020","unstructured":"Sebastian \u00d6sterlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2020. Parmesan: Sanitizer-guided greybox fuzzing. In 29th USENIX Security Symposium (USENIX Security 20). 2289--2306."},{"key":"e_1_3_2_1_45_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Pailoor Shankara","year":"2018","unstructured":"Shankara Pailoor, Andrew Aday, and Suman Jana. 2018. Moonshine: Optimizing OS fuzzer seed selection with trace distillation. In 27th USENIX Security Symposium (USENIX Security 18). 729--743."},{"key":"e_1_3_2_1_46_1","volume-title":"Scavenger: Misuse Error Handling Leading To QEMU\/KVM Escape. Black Hat Asia","author":"Pan Gaoning","year":"2021","unstructured":"Gaoning Pan, Xingwei Lin, Xinlei Ying, Jiashui Wang, and Chunming Wu. 2021. Scavenger: Misuse Error Handling Leading To QEMU\/KVM Escape. Black Hat Asia (2021)."},{"volume-title":"29th {USENIX} Security Symposium (USENIX Security 20). 2559--2575.","author":"Peng Hui","key":"e_1_3_2_1_47_1","unstructured":"Hui Peng and Mathias Payer. 2020. USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. In 29th {USENIX} Security Symposium (USENIX Security 20). 2559--2575."},{"key":"e_1_3_2_1_48_1","unstructured":"Aaron Portnoy and Pedram Amini. 2021. Sulley. https:\/\/github.com\/OpenRCE\/sulley."},{"key":"e_1_3_2_1_49_1","first-page":"1","article-title":"VUzzer: Application-aware Evolutionary Fuzzing","volume":"17","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing.. In NDSS, Vol. 17. 1--14.","journal-title":"NDSS"},{"key":"e_1_3_2_1_50_1","volume-title":"HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS. 23--26","author":"Schumilo Sergej","year":"2020","unstructured":"Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon W\u00f6rner, and Thorsten Holz. 2020. HYPER-CUBE: High-Dimensional Hypervisor Fuzzing. In 27th Annual Network and Distributed System Security Symposium, NDSS. 23--26."},{"key":"e_1_3_2_1_51_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Schumilo Sergej","year":"2021","unstructured":"Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon W\u00f6rner, and Thorsten Holz. 2021. Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types. In 30th USENIX Security Symposium (USENIX Security 21)."},{"key":"e_1_3_2_1_52_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Schumilo Sergej","year":"2017","unstructured":"Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, and Thorsten Holz. 2017. kafl: Hardware-assisted feedback fuzzing for OS kernels. In 26th USENIX Security Symposium (USENIX Security 17). 167--182."},{"key":"e_1_3_2_1_53_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2012. AddressSanitizer: A fast address sanity checker. In Presented as part of the 2012 USENIX Annual Technical Conference (USENIX ATC 12). 309--318."},{"key":"e_1_3_2_1_54_1","volume-title":"A Guest-to-Host Escape on QEMU\/KVM Virtio Device. Black Hat Asia","author":"Shao Zhijian","year":"2020","unstructured":"Zhijian Shao, Jian Weng, and Yue Zhang. 2020. A Guest-to-Host Escape on QEMU\/KVM Virtio Device. Black Hat Asia (2020)."},{"key":"e_1_3_2_1_55_1","volume-title":"Periscope: An effective probing and fuzzing framework for the hardware-os boundary. In NDSS.","author":"Song Dokyung","year":"2019","unstructured":"Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. 2019. Periscope: An effective probing and fuzzing framework for the hardware-os boundary. In NDSS."},{"key":"e_1_3_2_1_56_1","volume-title":"Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Song Dokyung","year":"2020","unstructured":"Dokyung Song, Felicitas Hetzelt, Jonghwan Kim, Brent Byunghoon Kang, Jean-Pierre Seifert, and Michael Franz. 2020. Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. In 29th USENIX Security Symposium (USENIX Security 20). 2541--2557."},{"key":"e_1_3_2_1_57_1","first-page":"1","article-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS, Vol. 16. 1--16.","journal-title":"NDSS"},{"key":"e_1_3_2_1_58_1","volume-title":"When virtualization encounter AFL. Black Hat Europe","author":"Tang Jack","year":"2016","unstructured":"Jack Tang and Moony Li. 2016. When virtualization encounter AFL. Black Hat Europe (2016)."},{"key":"e_1_3_2_1_59_1","unstructured":"Peach Tech. 2021. Peach. http:\/\/www.peachfuzzer.com\/."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"YanhaoWang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao DinghaoWu and Purui Su. 2020. Not all coverage measurements are equal: Fuzzing by coverage accounting for input prioritization. NDSS.","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380396"},{"key":"e_1_3_2_1_63_1","volume-title":"Krace: Data Race Fuzzing for Kernel File Systems. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1643--1660","author":"Xu Meng","year":"2020","unstructured":"Meng Xu, Sanidhya Kashyap, Hanqing Zhao, and Taesoo Kim. 2020. Krace: Data Race Fuzzing for Kernel File Systems. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 1643--1660."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00035"},{"key":"e_1_3_2_1_65_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Yun Insu","year":"2018","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A practical concolic execution engine tailored for hybrid fuzzing. In 27th USENIX Security Symposium (USENIX Security 18). 745--761."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Lei Zhao Yue Duan Heng Yin and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing.. In NDSS.","DOI":"10.14722\/ndss.2019.23504"},{"key":"e_1_3_2_1_67_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zheng Yaowen","year":"2019","unstructured":"Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, and Limin Sun. 2019. FIRM-AFL: high-throughput greybox fuzzing of iot firmware via augmented process emulation. In 28th USENIX Security Symposium (USENIX Security 19). 1099--1114."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484811","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:47:52Z","timestamp":1763498872000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":67,"alternative-id":["10.1145\/3460120.3484811","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484811","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}