{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:58Z","timestamp":1750220098335,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T00:00:00Z","timestamp":1634601600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,19]]},"DOI":"10.1145\/3487075.3487124","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:35:46Z","timestamp":1638909346000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["HDBFuzzer\u2013Target-oriented Hybrid Directed Binary Fuzzer"],"prefix":"10.1145","author":[{"given":"Yingchao","family":"Yu","sequence":"first","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]},{"given":"Xiaojun","family":"Qin","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]},{"given":"Shuitao","family":"Gan","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Mathematical Engineering and Advanced Computing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,12,7]]},"reference":[{"issue":"01","key":"e_1_3_2_1_1_1","first-page":"1145","volume":"34","author":"Yu Z","unstructured":"Yu Z , Cao R , Tang Q , (2020). Order matters: Semantic-aware neural networks for binary code similarity detection[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 34 ( 01 ): 1145 - 1152 . Yu Z, Cao R, Tang Q, (2020). Order matters: Semantic-aware neural networks for binary code similarity detection[C]\/\/Proceedings of the AAAI Conference on Artificial Intelligence. 34(01): 1145-1152.","journal-title":"Artificial Intelligence."},{"key":"e_1_3_2_1_2_1","volume-title":"\u03b1diff: cross-version binary code similarity detection with dnn[C]\/\/Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering. 667-678","author":"Liu B","year":"2018","unstructured":"Liu B , Huo W , Zhang C , ( 2018 ). \u03b1diff: cross-version binary code similarity detection with dnn[C]\/\/Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering. 667-678 . Liu B, Huo W, Zhang C, (2018). \u03b1diff: cross-version binary code similarity detection with dnn[C]\/\/Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering. 667-678."},{"key":"e_1_3_2_1_3_1","volume-title":"Petroni F","author":"Massarelli L","year":"2019","unstructured":"Massarelli L , Di Luna G A , Petroni F , ( 2019 ). Safe : Self-attentive function embeddings for binary similarity[C]\/\/International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer , Cham, 309-329. Massarelli L, Di Luna G A, Petroni F, (2019). Safe: Self-attentive function embeddings for binary similarity[C]\/\/International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. Springer, Cham, 309-329."},{"key":"e_1_3_2_1_4_1","volume-title":"Deepbindiff: Learning program-wide code representations for binary diffing[C]\/\/Network and Distributed System Security Symposium","author":"Duan Y","year":"2020","unstructured":"Duan Y , Li X , Wang J , ( 2020 ). Deepbindiff: Learning program-wide code representations for binary diffing[C]\/\/Network and Distributed System Security Symposium . Duan Y, Li X, Wang J, (2020). Deepbindiff: Learning program-wide code representations for binary diffing[C]\/\/Network and Distributed System Security Symposium."},{"key":"e_1_3_2_1_5_1","volume-title":"Fuzzing: brute force vulnerability discovery[M]. Pearson Education","author":"Sutton M","year":"2007","unstructured":"Sutton M , Greene A , Amini P ( 2007 ). Fuzzing: brute force vulnerability discovery[M]. Pearson Education . Sutton M, Greene A, Amini P (2007). Fuzzing: brute force vulnerability discovery[M]. Pearson Education."},{"key":"e_1_3_2_1_6_1","volume-title":"Directed greybox fuzzing[C]\/\/Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2329-2344","author":"B\u00f6hme M","year":"2017","unstructured":"B\u00f6hme M , Pham V T , Nguyen M D , ( 2017 ). Directed greybox fuzzing[C]\/\/Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2329-2344 . B\u00f6hme M, Pham V T, Nguyen M D, (2017). Directed greybox fuzzing[C]\/\/Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2329-2344."},{"key":"e_1_3_2_1_7_1","volume-title":"Hawkeye: Towards a desired directed grey-box fuzzer[C]\/\/Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2095-2108","author":"Chen H","year":"2018","unstructured":"Chen H , Xue Y , Li Y , ( 2018 ). Hawkeye: Towards a desired directed grey-box fuzzer[C]\/\/Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2095-2108 . Chen H, Xue Y, Li Y, (2018). Hawkeye: Towards a desired directed grey-box fuzzer[C]\/\/Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2095-2108."},{"key":"e_1_3_2_1_8_1","volume-title":"Driller: Augmenting fuzzing through selective symbolic execution[C]\/\/NDSS. 16(2016): 1-16","author":"Stephens N","year":"2016","unstructured":"Stephens N , Grosen J , Salls C , ( 2016 ). Driller: Augmenting fuzzing through selective symbolic execution[C]\/\/NDSS. 16(2016): 1-16 . Stephens N, Grosen J, Salls C, (2016). Driller: Augmenting fuzzing through selective symbolic execution[C]\/\/NDSS. 16(2016): 1-16."},{"key":"e_1_3_2_1_9_1","first-page":"745","volume":"1","author":"Yun I","unstructured":"Yun I , Lee S , Xu M , (2018). {QSYM}: A practical concolic execution engine tailored for hybrid fuzzing[C]\/\/27th {USENIX} Security Symposium ({USENIX} Security 1 8). 745 - 761 . Yun I, Lee S, Xu M, (2018). {QSYM}: A practical concolic execution engine tailored for hybrid fuzzing[C]\/\/27th {USENIX} Security Symposium ({USENIX} Security 18). 745-761.","journal-title":"Security"},{"key":"e_1_3_2_1_10_1","volume-title":"Satisfiability modulo theories[M]\/\/Handbook of model checking","author":"Barrett C","year":"2018","unstructured":"Barrett C , Tinelli C ( 2018 ). Satisfiability modulo theories[M]\/\/Handbook of model checking . Springer , Cham , 305-343. Barrett C, Tinelli C (2018). Satisfiability modulo theories[M]\/\/Handbook of model checking. Springer, Cham, 305-343."},{"key":"e_1_3_2_1_11_1","first-page":"2289","volume":"2","author":"\u00d6sterlund S","unstructured":"\u00d6sterlund S , Razavi K , Bos H , (2020). Parmesan : Sanitizer-guided greybox fuzzing[C]\/\/29th {USENIX} Security Symposium ({USENIX} Security 2 0). 2289 - 2306 . \u00d6sterlund S, Razavi K, Bos H, (2020). Parmesan: Sanitizer-guided greybox fuzzing[C]\/\/29th {USENIX} Security Symposium ({USENIX} Security 20). 2289-2306.","journal-title":"Security"},{"key":"e_1_3_2_1_12_1","first-page":"2255","volume":"2","author":"Zong P","unstructured":"Zong P , Lv T , Wang D , (2020). Fuzzguard : Filtering out unreachable inputs in directed grey-box fuzzing through deep learning[C]\/\/29th {USENIX} Security Symposium ({USENIX} Security 2 0). 2255 - 2269 . Zong P, Lv T, Wang D, (2020). Fuzzguard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning[C]\/\/29th {USENIX} Security Symposium ({USENIX} Security 20). 2255-2269.","journal-title":"Security"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3042259"},{"key":"e_1_3_2_1_14_1","volume-title":"Evaluating fuzz testing[C]\/\/Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2123-2138","author":"Klees G","year":"2018","unstructured":"Klees G , Ruef A , Cooper B , ( 2018 ). Evaluating fuzz testing[C]\/\/Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2123-2138 . Klees G, Ruef A, Cooper B, (2018). Evaluating fuzz testing[C]\/\/Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2123-2138."},{"key":"e_1_3_2_1_15_1","volume-title":"Lava: Large-scale automated vulnerability addition[C]\/\/2016 IEEE Symposium on Security and Privacy (SP)","author":"Dolan-Gavitt B","year":"2016","unstructured":"Dolan-Gavitt B , Hulin P , Kirda E , ( 2016 ). Lava: Large-scale automated vulnerability addition[C]\/\/2016 IEEE Symposium on Security and Privacy (SP) . IEEE , 110-121. Dolan-Gavitt B, Hulin P, Kirda E, (2016). Lava: Large-scale automated vulnerability addition[C]\/\/2016 IEEE Symposium on Security and Privacy (SP). IEEE, 110-121."}],"event":{"name":"CSAE 2021: The 5th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2021","location":"Sanya China"},"container-title":["Proceedings of the 5th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487075.3487124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:10Z","timestamp":1750183810000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487075.3487124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,19]]},"references-count":15,"alternative-id":["10.1145\/3487075.3487124","10.1145\/3487075"],"URL":"https:\/\/doi.org\/10.1145\/3487075.3487124","relation":{},"subject":[],"published":{"date-parts":[[2021,10,19]]},"assertion":[{"value":"2021-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}