{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:46:38Z","timestamp":1773193598621,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":85,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["850868"],"award-info":[{"award-number":["850868"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001119S0089-AMP-FP-034"],"award-info":[{"award-number":["HR001119S0089-AMP-FP-034"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2674"],"award-info":[{"award-number":["N00014-18-1-2674"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772308, 61972224, and U1736209"],"award-info":[{"award-number":["61772308, 61972224, and U1736209"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485364","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"3318-3336","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Igor: Crash Deduplication Through Root-Cause Clustering"],"prefix":"10.1145","author":[{"given":"Zhiyuan","family":"Jiang","sequence":"first","affiliation":[{"name":"National University of Defense Technology, Guizhou, China"}]},{"given":"Xiyue","family":"Jiang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Guizhou, China"}]},{"given":"Ahmad","family":"Hazimeh","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Chaojing","family":"Tang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, Guizhou, China"}]},{"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1821"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Enrique Amig\u00f3 Julio Gonzalo Javier Artiles and Felisa Verdejo. 2009. A comparison of extrinsic clustering evaluation metrics based on formal constraints. (2009) 461--486.","DOI":"10.1007\/s10791-008-9066-8"},{"key":"e_1_3_2_1_3_1","volume-title":"OPTICS: Ordering points to identify the clustering structure. ACM Sigmod record 28, 2","author":"Ankerst Mihael","year":"1999","unstructured":"Mihael Ankerst, Markus M Breunig, Hans-Peter Kriegel, and J\u00f6rg Sander. 1999. OPTICS: Ordering points to identify the clustering structure. ACM Sigmod record 28, 2 (1999)."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple. 2010. Diagnosing Issues Using Crash Reports and Device Logs. https:\/\/developer.apple.com\/library\/archive\/technotes\/tn2004\/tn2123.html"},{"key":"e_1_3_2_1_5_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence. In Network and Distributed System Security Symposium (NDSS). The Internet Society.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Network and Distributed System Security Symposium (NDSS). The Internet Society."},{"key":"e_1_3_2_1_6_1","volume-title":"Camil Demetrescu, and Irene Finocchi.","author":"Baldoni Roberto","year":"2018","unstructured":"Roberto Baldoni, Emilio Coppa, Daniele Cono D'elia, Camil Demetrescu, and Irene Finocchi. 2018. A Survey of Symbolic Execution Techniques. ACM Comput. Surv. 51, 3 (2018)."},{"key":"e_1_3_2_1_7_1","volume-title":"AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Blazytko Tim","year":"2020","unstructured":"Tim Blazytko, Moritz Schl\u00f6gel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon W\u00f6rner, and Thorsten Holz. 2020. AURORA: Statistical Crash Analysis for Automated Root Cause Explanation. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_2_1_9_1","volume-title":"Coveragebased Greybox Fuzzing As Markov Chain. In ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM.","author":"B\u00f6hme Marcel","year":"2016","unstructured":"Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. 2016. Coveragebased Greybox Fuzzing As Markov Chain. In ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM."},{"key":"e_1_3_2_1_10_1","volume-title":"Groenen","author":"Borg Ingwer","year":"2005","unstructured":"Ingwer Borg and Patrick J.F. Groenen. 2005. Springer-Verlag."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-005-4443-8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37456-2_14"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2010.9"},{"key":"e_1_3_2_1_14_1","volume-title":"Menghan Sun, Ronghai Yang, and Kehuan Zhang.","author":"Chen Jiongyi","year":"2018","unstructured":"Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang. 2018. IoTFuzzer: Discovering Memory Corruptions in IoT Through Appbased Fuzzing. In NDSS."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462173"},{"key":"e_1_3_2_1_17_1","volume-title":"Reduce Before You Localize: Delta-Debugging and Spectrum-Based Fault Localization. In 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE Computer Society.","author":"Christi Arpit","year":"2018","unstructured":"Arpit Christi, Matthew Lyle Olson, Mohammad Amin Alipour, and Alex Groce. 2018. Reduce Before You Localize: Delta-Debugging and Spectrum-Based Fault Localization. In 2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW). IEEE Computer Society."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572301"},{"key":"e_1_3_2_1_19_1","volume-title":"REPT: Reverse Debugging of Failures in Deployed Software. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Cui Weidong","year":"2018","unstructured":"Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, and Insu Yun. 2018. REPT: Reverse Debugging of Failures in Deployed Software. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18). USENIX Association."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884844"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227111"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427269"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080800"},{"key":"e_1_3_2_1_24_1","volume-title":"Fuzzergym: A competitive framework for fuzzing and learning. arXiv preprint arXiv:1807.07490","author":"Drozd William","year":"2018","unstructured":"William Drozd and Michael D Wagner. 2018. Fuzzergym: A competitive framework for fuzzing and learning. arXiv preprint arXiv:1807.07490 (2018)."},{"key":"e_1_3_2_1_25_1","volume-title":"Graph Drawing Software","author":"Ellson John","unstructured":"John Ellson, Emden R. Gansner, Eleftherios Koutsofios, Stephen C. North, and Gordon Woodhull. 2004. Graphviz and Dynagraph - Static and Dynamic Graph Drawing Tools. In Graph Drawing Software. Springer-Verlag."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/3001460.3001507"},{"key":"e_1_3_2_1_27_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_30_1","volume-title":"d.]. clusterFuzz. https:\/\/google.github.io\/clusterfuzz (accessed","year":"2021","unstructured":"google. [n. d.]. clusterFuzz. https:\/\/google.github.io\/clusterfuzz (accessed January, 2021)."},{"key":"e_1_3_2_1_31_1","volume-title":"d.]. Syzbot dashboard. https:\/\/syzkaller.appspot.com (accessed","year":"2021","unstructured":"google. [n. d.]. Syzbot dashboard. https:\/\/syzkaller.appspot.com (accessed January, 2021)."},{"key":"e_1_3_2_1_32_1","volume-title":"In Proceedings of the 7th Python in Science Conference.","author":"Hagberg Aric A.","unstructured":"Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. 2008. Exploring network structure, dynamics, and function using networkx. In In Proceedings of the 7th Python in Science Conference."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_1_34_1","volume-title":"Hosking","author":"Herrera Adrian","year":"2020","unstructured":"Adrian Herrera, Hendra Gunadi, Liam Hayes, Shane Magrath, Felix Friedlander, Maggi Sebastian, Michael Norrish, and Antony L. Hosking. 2020. Corpus Distillation for Effective Fuzzing: A Comparative Evaluation. (2020). arXiv:1905.13055"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/322033.322044"},{"key":"e_1_3_2_1_37_1","volume-title":"Using mutants to help developers distinguish and debug (compiler) faults. Software Testing, Verification and Reliability 30, 2","author":"Holmes Josie","year":"2020","unstructured":"Josie Holmes and Alex Groce. 2020. Using mutants to help developers distinguish and debug (compiler) faults. Software Testing, Verification and Reliability 30, 2 (2020)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Allen D Householder and Jonathan M Foote. 2012. Probability-based parameter selection for black-box fuzz testing. Technical Report. CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.","DOI":"10.21236\/ADA610472"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2017.70"},{"key":"e_1_3_2_1_40_1","volume-title":"Complexity of Computer Computations","author":"Karp Richard M.","unstructured":"Richard M. Karp. 1972. Reducibility among Combinatorial Problems. In Complexity of Computer Computations. Springer."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815412"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958261"},{"key":"e_1_3_2_1_43_1","volume-title":"Evaluating Fuzz Testing. In ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM.","author":"Klees George","year":"2018","unstructured":"George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, and Michael Hicks. 2018. Evaluating Fuzz Testing. In ACM SIGSAC Conference on Computer and Communications Security (CCS). ACM."},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. Ecol. Inference Conf","volume":"17","author":"Koutra Danai","year":"2011","unstructured":"Danai Koutra, Ankur Parikh, Aaditya Ramdas, and Jing Xiang. 2011. Algorithms for graph similarity and subgraph matching. In Proc. Ecol. Inference Conf, Vol. 17."},{"key":"e_1_3_2_1_45_1","volume-title":"Wilson","author":"Kriege Nils M.","year":"2017","unstructured":"Nils M. Kriege, Pierre-Louis Giscard, and Richard C. Wilson. 2017. On Valid Optimal Assignment Kernels and Applications to Graph Classification. (2017). arXiv:1606.01141"},{"key":"e_1_3_2_1_46_1","series-title":"SIAM review 25, 2","volume-title":"An overview of sequence comparison: Time warps, string edits, and macromolecules","author":"Kruskal Joseph B","year":"1983","unstructured":"Joseph B Kruskal. 1983. An overview of sequence comparison: Time warps, string edits, and macromolecules. SIAM review 25, 2 (1983)."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312186"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380923"},{"key":"e_1_3_2_1_49_1","volume-title":"Understanding of Internal Clustering Validation Measures. In International Conference on Data Mining. IEEE Computer Society.","author":"Liu Yanchi","year":"2010","unstructured":"Yanchi Liu, Zhongmou Li, Hui Xiong, Xuedong Gao, and JunjieWu. 2010. Understanding of Internal Clustering Validation Measures. In International Conference on Data Mining. IEEE Computer Society."},{"key":"e_1_3_2_1_50_1","volume-title":"Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the 14th Conference on USENIX Security Symposium","volume":"14","author":"Benjamin Livshits V.","unstructured":"V. Benjamin Livshits and Monica S. Lam. 2005. Finding Security Vulnerabilities in Java Applications with Static Analysis. In Proceedings of the 14th Conference on USENIX Security Symposium, Vol. 14. USENIX Association."},{"key":"e_1_3_2_1_51_1","unstructured":"LLVM Developers. 2019. libFuzzer: A Library for Coverage-guided Fuzz Testing. https:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"e_1_3_2_1_52_1","volume-title":"Vijay Janapa Reddi, and Kim Hazelwood","author":"Luk Chi-Keung","year":"2005","unstructured":"Chi-Keung Luk, Robert Cohn, Robert Muth, Harish Patil, Artur Klauser, Geoff Lowney, Steven Wallace, Vijay Janapa Reddi, and Kim Hazelwood. 2005. Pin: building customized program analysis tools with dynamic instrumentation. Acm sigplan notices 40, 6 (2005)."},{"key":"e_1_3_2_1_53_1","volume-title":"34th European Conference on Object-Oriented Programming (ECOOP","author":"David","year":"2020","unstructured":"David R. MacIver and Alastair F. Donaldson. 2020. Test-Case Reduction via Test-Case Generation: Insights from the Hypothesis Reducer (Tool Insights Paper). In 34th European Conference on Object-Oriented Programming (ECOOP 2020). Schloss Dagstuhl--Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association.","author":"Molnar David","unstructured":"David Molnar, Xue Cong Li, and David A.Wagner. 2009. Dynamic Test Generation to Find Integer Bugs in X86 Binary Linux Programs. In Proceedings of the 18th Conference on USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_2_1_56_1","unstructured":"Mozilla. 2012. Crash Reports. http:\/\/crash-stats.mozilla.com"},{"key":"e_1_3_2_1_57_1","article-title":"Playing with ptrace","volume":"2002","author":"Padala Pradeep","year":"2002","unstructured":"Pradeep Padala. 2002. Playing with ptrace, Part I. Linux Journal 2002, 103 (2002).","journal-title":"Part I. Linux Journal"},{"key":"e_1_3_2_1_58_1","unstructured":"Fabian Pedregosa Ga\u00ebl Varoquaux Alexandre Gramfort Vincent Michel Bertrand Thirion Olivier Grisel Mathieu Blondel Peter Prettenhofer Ron Weiss Vincent Dubourg et al. 2011. scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011)."},{"key":"e_1_3_2_1_59_1","volume-title":"29th {USENIX} Security Symposium (USENIX Security 20).","author":"Peng Hui","unstructured":"Hui Peng and Mathias Payer. 2020. USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. In 29th {USENIX} Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54494-5_3"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053038"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/0377-0427(87)90125-7"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.35"},{"key":"e_1_3_2_1_65_1","volume-title":"Hans Peter Kriegel, and Xiaowei Xu","author":"Sander J\u00f6rg","year":"1998","unstructured":"J\u00f6rg Sander, Martin Ester, Hans Peter Kriegel, and Xiaowei Xu. 1998. Density based clustering in spatial databases: The algorithm GDBSCAN and its applications. Data Mining and Knowledge Discovery 2, 2 (1998)."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463280"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"e_1_3_2_1_68_1","unstructured":"Kostya Serebryany. 2017. OSS-Fuzz: Google's continuous fuzzing service for open source software. (2017)."},{"key":"e_1_3_2_1_69_1","article-title":"GraKeL: A Graph Kernel Library in Python","volume":"21","author":"Siglidis Giannis","year":"2020","unstructured":"Giannis Siglidis, Giannis Nikolentzos, Stratis Limnios, Christos Giatsidis, Konstantinos Skianis, and Michalis Vazirgiannis. 2020. GraKeL: A Graph Kernel Library in Python. Journal of Machine Learning Research 21, 54 (2020).","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_3_2_1_70_1","unstructured":"Michael Steinbach George Karypis and Vipin Kumar. 2000. A comparison of document clustering techniques. (2000)."},{"key":"e_1_3_2_1_71_1","unstructured":"Robert Swiecki. 2016. honggfuzz. http:\/\/honggfuzz.com\/"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238200"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595748"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Ulrike von Luxburg. 2007. A Tutorial on Spectral Clustering. (2007). arXiv:0711.0189","DOI":"10.1007\/s11222-007-9033-z"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_77_1","article-title":"RPFuzzer: A framework for discovering router protocols vulnerabilities based on fuzzing","volume":"7","author":"Wang Zhiqiang","year":"2013","unstructured":"Zhiqiang Wang, Yuqing Zhang, and Qixu Liu. 2013. RPFuzzer: A framework for discovering router protocols vulnerabilities based on fuzzing. KSII Transactions on Internet and Information Systems (TIIS) 7, 8 (2013).","journal-title":"KSII Transactions on Internet and Information Systems (TIIS)"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610386"},{"key":"e_1_3_2_1_80_1","volume-title":"Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Xu Jun","year":"2017","unstructured":"Jun Xu, Dongliang Mu, Xinyu Xing, Peng Liu, Ping Chen, and Bing Mao. 2017. Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association."},{"key":"e_1_3_2_1_81_1","volume-title":"29th USENIX Security Symposium ({USENIX} Security 20)","author":"Yue Tai","year":"2020","unstructured":"Tai Yue, PengfeiWang, Yong Tang, EnzeWang, Bo Yu, Kai Lu, and Xu Zhou. 2020. Ecofuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit. In 29th USENIX Security Symposium ({USENIX} Security 20)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1078"},{"key":"e_1_3_2_1_83_1","unstructured":"Michal Zalewski. 2015. American Fuzzy Lop (AFL). http:\/\/lcamtuf.coredump.cx\/afl"},{"key":"e_1_3_2_1_84_1","volume-title":"Automated Debugging for Arbitrarily Long Executions. In 14th Workshop on Hot Topics in Operating Systems (HotOS XIV). USENIX Association.","author":"Zamfir Cristian","year":"2013","unstructured":"Cristian Zamfir, Baris Kasikci, Johannes Kinder, Edouard Bugnion, and George Candea. 2013. Automated Debugging for Arbitrarily Long Executions. In 14th Workshop on Hot Topics in Operating Systems (HotOS XIV). USENIX Association."},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485364","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:48:39Z","timestamp":1763498919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":85,"alternative-id":["10.1145\/3460120.3485364","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485364","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}