{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:42:17Z","timestamp":1775054537102,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3471621.3471852","type":"proceedings-article","created":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T14:50:46Z","timestamp":1633618246000},"page":"62-77","source":"Crossref","is-referenced-by-count":12,"title":["LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating"],"prefix":"10.1145","author":[{"given":"Xianya","family":"Mi","sequence":"first","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Sanjay","family":"Rawat","sequence":"additional","affiliation":[{"name":"University of Bristol, UK, UK"}]},{"given":"Cristiano","family":"Giuffrida","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}]},{"given":"Herbert","family":"Bos","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2021,10,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. crashwalk. https:\/\/github.com\/bnagy\/crashwalk.  [n.d.]. crashwalk. https:\/\/github.com\/bnagy\/crashwalk."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Google Fuzzer Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite  [n.d.]. Google Fuzzer Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite"},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. libdft64. https:\/\/github.com\/vusec\/vuzzer64\/.  [n.d.]. libdft64. https:\/\/github.com\/vusec\/vuzzer64\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71209-1_11"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. OSDI\u201908","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In Proc. OSDI\u201908 . 209\u2013224. Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proc. OSDI\u201908. 209\u2013224."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Lorenzo Cavallaro Prateek Saxena and R. Sekar. 2008. On the Limits of Information Flow Techniques for Malware Analysis and Containment. In DIMVA. Springer Berlin Heidelberg Berlin Heidelberg 143\u2013163.  Lorenzo Cavallaro Prateek Saxena and R. Sekar. 2008. On the Limits of Information Flow Techniques for Malware Analysis and Containment. In DIMVA. Springer Berlin Heidelberg Berlin Heidelberg 143\u2013163.","DOI":"10.1007\/978-3-540-70542-0_8"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"e_1_3_2_1_9_1","volume-title":"Angora: Efficient fuzzing by principled search","author":"Chen Peng","year":"2018","unstructured":"Peng Chen and Hao Chen . 2018 . Angora: Efficient fuzzing by principled search . In IEEE S&P\u201918. San Francisco, CA, USA. Peng Chen and Hao Chen. 2018. Angora: Efficient fuzzing by principled search. In IEEE S&P\u201918. San Francisco, CA, USA."},{"key":"e_1_3_2_1_10_1","volume-title":"MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. arXiv preprint arXiv:2002.08568(2020).","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen , Mansour Ahmadi , Boyu Wang , Long Lu , 2020 . MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. arXiv preprint arXiv:2002.08568(2020). Yaohui Chen, Mansour Ahmadi, Boyu Wang, Long Lu, 2020. MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. arXiv preprint arXiv:2002.08568(2020)."},{"key":"e_1_3_2_1_11_1","volume-title":"SAVIOR: Towards Bug-Driven Hybrid Testing. In 2020 IEEE Symposium on Security and Privacy (SP). 15\u201331","author":"Chen Yaohui","unstructured":"Yaohui Chen , Peng Li , Jun Xu , Shengjian Guo , Rundong Zhou , Yulong Zhang , Tao Wei , and Long Lu. [n.d.]. SAVIOR: Towards Bug-Driven Hybrid Testing. In 2020 IEEE Symposium on Security and Privacy (SP). 15\u201331 . Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, and Long Lu. [n.d.]. SAVIOR: Towards Bug-Driven Hybrid Testing. In 2020 IEEE Symposium on Security and Privacy (SP). 15\u201331."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110358"},{"key":"e_1_3_2_1_13_1","unstructured":"Jim Chow Ben Pfaff Tal Garfinkel Kevin Christopher and Mendel Rosenblum. 2004. Understanding Data Lifetime via Whole System Simulation. In Usenix Sec\u201904(SSYM\u201904). 22.  Jim Chow Ben Pfaff Tal Garfinkel Kevin Christopher and Mendel Rosenblum. 2004. Understanding Data Lifetime via Whole System Simulation. In Usenix Sec\u201904(SSYM\u201904). 22."},{"key":"e_1_3_2_1_14_1","volume-title":"Evaluation of Novel Approaches to Software Engineering","author":"Do TheAnh","unstructured":"TheAnh Do , A.\u00a0C.\u00a0 M. Fong , and Russel Pears . 2013. Dynamic Symbolic Execution Guided by Data Dependency Analysis for High Structural Coverage . In Evaluation of Novel Approaches to Software Engineering . Springer Berlin Heidelberg , 3\u201315. TheAnh Do, A.\u00a0C.\u00a0M. Fong, and Russel Pears. 2013. Dynamic Symbolic Execution Guided by Data Dependency Analysis for High Structural Coverage. In Evaluation of Novel Approaches to Software Engineering. Springer Berlin Heidelberg, 3\u201315."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Brendan Dolan-Gavitt Josh Hodosh Patrick Hulin Tim Leek and Ryan Whelan. 2015. Repeatable Reverse Engineering with PANDA. In PPREW\u201915. Article 4.  Brendan Dolan-Gavitt Josh Hodosh Patrick Hulin Tim Leek and Ryan Whelan. 2015. Repeatable Reverse Engineering with PANDA. In PPREW\u201915. Article 4.","DOI":"10.1145\/2843859.2843867"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/226155.226158"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_1_18_1","volume-title":"NDSS\u201908","author":"Godefroid Patrice","unstructured":"Patrice Godefroid , Michael\u00a0 Y. Levin , and David Molnar . 2008. Automated Whitebox Fuzz Testing . In NDSS\u201908 . Internet Society . Patrice Godefroid, Michael\u00a0Y. Levin, and David Molnar. 2008. Automated Whitebox Fuzz Testing. In NDSS\u201908. Internet Society."},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"SAGE","volume":"10","author":"Godefroid Patrice","year":"2012","unstructured":"Patrice Godefroid , Michael\u00a0 Y. Levin , and David Molnar . 2012 . SAGE : Whitebox Fuzzing for Security Testing. Queue 10 , 1 (Jan. 2012), 20\u201327. Patrice Godefroid, Michael\u00a0Y. Levin, and David Molnar. 2012. SAGE: Whitebox Fuzzing for Security Testing. Queue 10, 1 (Jan. 2012), 20\u201327.","journal-title":"Whitebox Fuzzing for Security Testing. Queue"},{"key":"e_1_3_2_1_20_1","unstructured":"Istvan Haller Asia Slowinska Matthias Neugschwandtner and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. In USENIX Sec\u201913). 49\u201364.  Istvan Haller Asia Slowinska Matthias Neugschwandtner and Herbert Bos. 2013. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. In USENIX Sec\u201913). 49\u201364."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. PLDI\u201988","author":"Horwitz S.","unstructured":"S. Horwitz , T. Reps , and D. Binkley . 1988. Interprocedural Slicing Using Dependence Graphs . In Proc. PLDI\u201988 . ACM, 35\u201346. S. Horwitz, T. Reps, and D. Binkley. 1988. Interprocedural Slicing Using Dependence Graphs. In Proc. PLDI\u201988. ACM, 35\u201346."},{"key":"e_1_3_2_1_22_1","volume-title":"Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction. In IEEE Symposium SP\u201920","author":"Huang H.","unstructured":"H. Huang , P. Yao , R. Wu , Q. Shi , and C. Zhang . 2020 . Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction. In IEEE Symposium SP\u201920 . 1199\u20131213. H. Huang, P. Yao, R. Wu, Q. Shi, and C. Zhang. 2020. Pangolin: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction. In IEEE Symposium SP\u201920. 1199\u20131213."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274694.3274746"},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Security 20","author":"Jiang Zu-Ming","unstructured":"Zu-Ming Jiang , Jia-Ju Bai , Kangjie Lu , and Shi-Min Hu. 2020. Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection . In USENIX Security 20 . USENIX Association , 2595\u20132612. Zu-Ming Jiang, Jia-Ju Bai, Kangjie Lu, and Shi-Min Hu. 2020. Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection. In USENIX Security 20. USENIX Association, 2595\u20132612."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_1_26_1","volume-title":"HFL: Hybrid Fuzzing on the Linux Kernel. In NDSS\u201920.","author":"Kim Kyungtae","year":"2020","unstructured":"Kyungtae Kim , Dae\u00a0 R. Jeong , Chung\u00a0Hwan Kim , Yeongjin Jang , Insik Shin , and Byoungyoung Lee . 2020 . HFL: Hybrid Fuzzing on the Linux Kernel. In NDSS\u201920. Kyungtae Kim, Dae\u00a0R. Jeong, Chung\u00a0Hwan Kim, Yeongjin Jang, Insik Shin, and Byoungyoung Lee. 2020. HFL: Hybrid Fuzzing on the Linux Kernel. In NDSS\u201920."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"George Klees Andrew Ruef Benji Cooper Shiyi Wei and Michael Hicks. 2018. Evaluating Fuzz Testing. In CCS18\u201918. 2123\u20132138.  George Klees Andrew Ruef Benji Cooper Shiyi Wei and Michael Hicks. 2018. Evaluating Fuzz Testing. In CCS18\u201918. 2123\u20132138.","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. SANER\u201920","author":"Liang H.","unstructured":"H. Liang , L. Jiang , L. Ai , and J. Wei . 2020. Sequence Directed Hybrid Fuzzing . In Proc. SANER\u201920 . 127\u2013137. H. Liang, L. Jiang, L. Ai, and J. Wei. 2020. Sequence Directed Hybrid Fuzzing. In Proc. SANER\u201920. 127\u2013137."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416629"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_31_1","volume-title":"USENIX SEC\u201920","author":"\u00d6sterlund Sebastian","unstructured":"Sebastian \u00d6sterlund , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing . In USENIX SEC\u201920 . USENIX Association . Sebastian \u00d6sterlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In USENIX SEC\u201920. USENIX Association."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359796"},{"key":"e_1_3_2_1_34_1","unstructured":"Sebastian Poeplau and Aur\u00e9lien Francillon. 2020. Symbolic execution with SymCC: Don\u2019t interpret compile!. In USENIX Security 20. 181\u2013198.  Sebastian Poeplau and Aur\u00e9lien Francillon. 2020. Symbolic execution with SymCC: Don\u2019t interpret compile!. In USENIX Security 20. 181\u2013198."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Sebastian Poeplau and Aur\u00e9lien Francillon. 2021. SymQEMU: Compilation-based symbolic execution for binaries. In NDSS\u201921.  Sebastian Poeplau and Aur\u00e9lien Francillon. 2021. SymQEMU: Compilation-based symbolic execution for binaries. In NDSS\u201921.","DOI":"10.14722\/ndss.2021.24118"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390635"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS.  Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS.","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_38_1","volume-title":"Triton: A Dynamic Symbolic Execution Framework. In Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications, SSTIC","author":"Saudel Florent","year":"2015","unstructured":"Florent Saudel and Jonathan Salwan . 2015 . Triton: A Dynamic Symbolic Execution Framework. In Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications, SSTIC , France, Rennes , June 3-5 2015. SSTIC, 31\u201354. Florent Saudel and Jonathan Salwan. 2015. Triton: A Dynamic Symbolic Execution Framework. In Symposium sur la s\u00e9curit\u00e9 des technologies de l\u2019information et des communications, SSTIC, France, Rennes, June 3-5 2015. SSTIC, 31\u201354."},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. NDSS\u201920","author":"Shen Shiqi","year":"2019","unstructured":"Shiqi Shen , Shweta Shinde , Soundarya Ramesh , Abhik Roychoudhury , and Prateek Saxena . 2019 . Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints . In Proc. NDSS\u201920 . Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, and Prateek Saxena. 2019. Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints. In Proc. NDSS\u201920."},{"key":"e_1_3_2_1_40_1","volume-title":"(State of) The Art of War: Offensive Techniques in Binary Analysis","author":"Shoshitaishvili Yan","unstructured":"Yan Shoshitaishvili , Ruoyu Wang , Christopher Salls , Nick Stephens , Mario Polino , Andrew Dutcher , Grosen John , Siji Feng , Christophe Hauser , Christopher Kruegel , and Giovanni Vigna . 2016. SoK : (State of) The Art of War: Offensive Techniques in Binary Analysis . In IEEE S&P\u201916(SAN JOSE, CA, USA). IEEE CSP. Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, Grosen John, Siji Feng, Christophe Hauser, Christopher Kruegel, and Giovanni Vigna. 2016. SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In IEEE S&P\u201916(SAN JOSE, CA, USA). IEEE CSP."},{"key":"e_1_3_2_1_41_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS\u201916","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Andrew Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS\u201916 . Internet Society , 1\u201316. Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS\u201916. Internet Society, 1\u201316."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180251"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2584063"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771818"},{"key":"e_1_3_2_1_45_1","volume-title":"QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Sec\u201918).","author":"Yun Insu","year":"2018","unstructured":"Insu Yun , Sangho Lee , Meng Xu , Yeongjin Jang , and Taesoo Kim . 2018 . QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Sec\u201918). Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Sec\u201918)."},{"key":"e_1_3_2_1_46_1","unstructured":"Michal Zalewski. [n.d.]. American Fuzzy Lop. At: http:\/\/lcamtuf.coredump.cx\/afl\/.  Michal Zalewski. [n.d.]. American Fuzzy Lop. At: http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Lei Zhao Yue Duan Heng Yin and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In NDSS\u201919.  Lei Zhao Yue Duan Heng Yin and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In NDSS\u201919.","DOI":"10.14722\/ndss.2019.23504"}],"event":{"name":"RAID '21: 24th International Symposium on Research in Attacks, Intrusions and Defenses","location":"San Sebastian Spain","acronym":"RAID '21"},"container-title":["24th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471852","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3471621.3471852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:49Z","timestamp":1750195489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3471621.3471852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":47,"alternative-id":["10.1145\/3471621.3471852","10.1145\/3471621"],"URL":"https:\/\/doi.org\/10.1145\/3471621.3471852","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}