{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T01:32:58Z","timestamp":1771983178335,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,30]],"date-time":"2022-05-30T00:00:00Z","timestamp":1653868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"BU Hariri Research Incubation Award","award":["2020-06-005"],"award-info":[{"award-number":["2020-06-005"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,30]]},"DOI":"10.1145\/3488932.3501276","type":"proceedings-article","created":{"date-parts":[[2022,5,24]],"date-time":"2022-05-24T04:23:26Z","timestamp":1653366206000},"page":"561-573","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["TargetFuzz"],"prefix":"10.1145","author":[{"given":"Sadullah","family":"Canakci","sequence":"first","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Nikolay","family":"Matyunin","sequence":"additional","affiliation":[{"name":"Honda Research Institute Europe GmbH, Offenbach, Germany"}]},{"given":"Kalman","family":"Graffi","sequence":"additional","affiliation":[{"name":"Honda Research Institute Europe GmbH, Offenbach, Germany"}]},{"given":"Ajay","family":"Joshi","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Manuel","family":"Egele","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Obes Jorge Lucangeli, and Olivier Festor","author":"Abdelnur Humberto","year":"2010","unstructured":"Humberto Abdelnur , Obes Jorge Lucangeli, and Olivier Festor . 2010 . Spectral Fuzzing : Evaluation & Feedback. Ph.D. Dissertation. INRIA. Humberto Abdelnur, Obes Jorge Lucangeli, and Olivier Festor. 2010. Spectral Fuzzing: Evaluation & Feedback. Ph.D. Dissertation. INRIA."},{"key":"e_1_3_2_1_2_1","volume-title":"AFLGO: Directed Greybox Fuzzing. https:\/\/github.com\/aflgo\/aflgo.","year":"2017","unstructured":"aflgo. 2017 . AFLGO: Directed Greybox Fuzzing. https:\/\/github.com\/aflgo\/aflgo. aflgo. 2017. AFLGO: Directed Greybox Fuzzing. https:\/\/github.com\/aflgo\/aflgo."},{"key":"e_1_3_2_1_3_1","volume-title":"Ijon: Exploring deep state spaces via fuzzing","author":"Aschermann Cornelius","year":"2020","unstructured":"Cornelius Aschermann , Sergej Schumilo , Ali Abbasi , and Thorsten Holz . 2020 . Ijon: Exploring deep state spaces via fuzzing . In IEEE S &P. 1597--1612. Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, and Thorsten Holz. 2020. Ijon: Exploring deep state spaces via fuzzing. In IEEE S&P. 1597--1612."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Marcel B\u00f6hme Van-Thuan Pham Manh-Dung Nguyen and Abhik Roychoudhury. 2017. Directed greybox fuzzing. In ACM CCS. 2329--2344.  Marcel B\u00f6hme Van-Thuan Pham Manh-Dung Nguyen and Abhik Roychoudhury. 2017. Directed greybox fuzzing. In ACM CCS. 2329--2344.","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2012.10.001"},{"key":"e_1_3_2_1_7_1","volume-title":"Hawkeye: Towards a desired directed grey-box fuzzer. In ACM CCS. 2095--2108.","author":"Chen Hongxu","year":"2018","unstructured":"Hongxu Chen , Yinxing Xue , Yuekang Li , Bihuan Chen , Xiaofei Xie , Xiuheng Wu , and Yang Liu . 2018 . Hawkeye: Towards a desired directed grey-box fuzzer. In ACM CCS. 2095--2108. Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu, and Yang Liu. 2018. Hawkeye: Towards a desired directed grey-box fuzzer. In ACM CCS. 2095--2108."},{"key":"e_1_3_2_1_8_1","volume-title":"Angora: Efficient fuzzing by principled search","author":"Chen Peng","year":"2018","unstructured":"Peng Chen and Hao Chen . 2018 . Angora: Efficient fuzzing by principled search . In IEEE S &P. 711--725. Peng Chen and Hao Chen. 2018. Angora: Efficient fuzzing by principled search. In IEEE S&P. 711--725."},{"key":"e_1_3_2_1_9_1","volume-title":"Savior: Towards bug-driven hybrid testing","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen , Peng Li , Jun Xu , Shengjian Guo , Rundong Zhou , Yulong Zhang , Tao Wei , and Long Lu . 2020 . Savior: Towards bug-driven hybrid testing . In IEEE S &P. 1580--1596. Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, and Long Lu. 2020. Savior: Towards bug-driven hybrid testing. In IEEE S&P. 1580--1596."},{"key":"e_1_3_2_1_10_1","volume-title":"Memfuzz: Using memory accesses to guide fuzzing","author":"Coppik Nicolas","year":"2019","unstructured":"Nicolas Coppik , Oliver Schwahn , and Neeraj Suri . 2019 . Memfuzz: Using memory accesses to guide fuzzing . In IEEE ICST. 48--58. Nicolas Coppik, Oliver Schwahn, and Neeraj Suri. 2019. Memfuzz: Using memory accesses to guide fuzzing. In IEEE ICST. 48--58."},{"key":"e_1_3_2_1_11_1","unstructured":"Leila Delshadtehrani Sadullah Canakci Boyou Zhou Schuyler Eldridge Ajay Joshi and Manuel Egele. 2020. Phmon: a programmable hardware monitor and its security use cases. In USENIX Security. 807--824.  Leila Delshadtehrani Sadullah Canakci Boyou Zhou Schuyler Eldridge Ajay Joshi and Manuel Egele. 2020. Phmon: a programmable hardware monitor and its security use cases. In USENIX Security. 807--824."},{"key":"e_1_3_2_1_12_1","unstructured":"Firefox. 2021. Fuzzing. https:\/\/firefox-source-docs.mozilla.org\/tools\/fuzzing.  Firefox. 2021. Fuzzing. https:\/\/firefox-source-docs.mozilla.org\/tools\/fuzzing."},{"key":"e_1_3_2_1_13_1","volume-title":"Collafl: Path sensitive fuzzing","author":"Gan Shuitao","year":"2018","unstructured":"Shuitao Gan , Chao Zhang , Xiaojun Qin , Xuwen Tu , Kang Li , Zhongyu Pei , and Zuoning Chen . 2018 . Collafl: Path sensitive fuzzing . In IEEE S &P. 679--696. Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, and Zuoning Chen. 2018. Collafl: Path sensitive fuzzing. In IEEE S&P. 679--696."},{"key":"e_1_3_2_1_14_1","unstructured":"glennrp. 2018. https:\/\/github.com\/glennrp\/libpng\/tree\/libpng16\/contrib\/testpngs.  glennrp. 2018. https:\/\/github.com\/glennrp\/libpng\/tree\/libpng16\/contrib\/testpngs."},{"key":"e_1_3_2_1_15_1","unstructured":"Google. 2016. OSS-Fuzz. https:\/\/github.com\/google\/oss-fuzz\/.  Google. 2016. OSS-Fuzz. https:\/\/github.com\/google\/oss-fuzz\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Google. 2020. AFL dictionaries. https:\/\/github.com\/google\/AFL\/tree\/master\/dictionaries.  Google. 2020. AFL dictionaries. https:\/\/github.com\/google\/AFL\/tree\/master\/dictionaries."},{"key":"e_1_3_2_1_17_1","unstructured":"Google. 2020. AFL test cases. https:\/\/github.com\/google\/AFL\/tree\/master\/testcases.  Google. 2020. AFL test cases. https:\/\/github.com\/google\/AFL\/tree\/master\/testcases."},{"key":"e_1_3_2_1_18_1","unstructured":"Google. 2020. American Fuzzy Lop. https:\/\/github.com\/google\/AFL.  Google. 2020. American Fuzzy Lop. https:\/\/github.com\/google\/AFL."},{"key":"e_1_3_2_1_19_1","unstructured":"Google. 2021. ClusterFuzz. https:\/\/google.github.io\/clusterfuzz\/setting-up-fuzzing\/libfuzzer-and-afl\/#afl-limitations.  Google. 2021. ClusterFuzz. https:\/\/google.github.io\/clusterfuzz\/setting-up-fuzzing\/libfuzzer-and-afl\/#afl-limitations."},{"key":"e_1_3_2_1_20_1","unstructured":"Google. 2021. Continuous Integration. https:\/\/google.github.io\/oss-fuzz\/getting-started\/continuous-integration\/.  Google. 2021. Continuous Integration. https:\/\/google.github.io\/oss-fuzz\/getting-started\/continuous-integration\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Google. 2021. Honggfuzz. https:\/\/github.com\/google\/honggfuzz.  Google. 2021. Honggfuzz. https:\/\/github.com\/google\/honggfuzz."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241625.2976017"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Ahmad Hazimeh Adrian Herrera and Mathias Payer. 2020. Magma. hexhive.epfl.ch\/magma\/docs\/bugs.html.  Ahmad Hazimeh Adrian Herrera and Mathias Payer. 2020. Magma. hexhive.epfl.ch\/magma\/docs\/bugs.html.","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_1_24_1","first-page":"1","article-title":"Magma: A Ground-Truth Fuzzing Benchmark","volume":"4","author":"Hazimeh Ahmad","year":"2020","unstructured":"Ahmad Hazimeh , Adrian Herrera , and Mathias Payer . 2020 . Magma: A Ground-Truth Fuzzing Benchmark . ACM POMACS 4 , 3 (2020), 1 -- 29 . Ahmad Hazimeh, Adrian Herrera, and Mathias Payer. 2020. Magma: A Ground-Truth Fuzzing Benchmark. ACM POMACS 4, 3 (2020), 1--29.","journal-title":"ACM POMACS"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Adrian Herrera Hendra Gunadi Shane Magrath Michael Norrish Mathias Payer and Antony L Hosking. 2021. Seed selection for successful fuzzing. In ACM SIGSOFT ISSTA. 230--243.  Adrian Herrera Hendra Gunadi Shane Magrath Michael Norrish Mathias Payer and Antony L Hosking. 2021. Seed selection for successful fuzzing. In ACM SIGSOFT ISSTA. 230--243.","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_26_1","unstructured":"Christian Holler Kim Herzig and Andreas Zeller. 2012. Fuzzing with code fragments. In USENIX Security. 445--458.  Christian Holler Kim Herzig and Andreas Zeller. 2012. Fuzzing with code fragments. In USENIX Security. 445--458."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"George Klees Andrew Ruef Benji Cooper Shiyi Wei and Michael Hicks. 2018. Evaluating fuzz testing. In ACM SIGSAC CCS. 2123--2138.  George Klees Andrew Ruef Benji Cooper Shiyi Wei and Michael Hicks. 2018. Evaluating fuzz testing. In ACM SIGSAC CCS. 2123--2138.","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_28_1","unstructured":"Gwangmu Lee Woochul Shim and Byoungyoung Lee. 2021. Constraint-guided Directed Greybox Fuzzing. In USENIX Security.  Gwangmu Lee Woochul Shim and Byoungyoung Lee. 2021. Constraint-guided Directed Greybox Fuzzing. In USENIX Security."},{"key":"e_1_3_2_1_29_1","volume-title":"Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers. In USENIX Security.","author":"Li Yuwei","year":"2021","unstructured":"Yuwei Li , Shouling Ji , Yuan Chen , Sizhuang Liang , Wei-Han Lee , Yueyao Chen , Chenyang Lyu , Chunming Wu , Raheem Beyah , and Peng Cheng . 2021 . Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers. In USENIX Security. Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, and Peng Cheng. 2021. Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers. In USENIX Security."},{"key":"e_1_3_2_1_30_1","volume-title":"Sequence coverage directed greybox fuzzing","author":"Liang Hongliang","unstructured":"Hongliang Liang , Yini Zhang , Yue Yu , Zhuosi Xie , and Lin Jiang . 2019. Sequence coverage directed greybox fuzzing . In IEEE\/ACM ICPC. 249--259. Hongliang Liang, Yini Zhang, Yue Yu, Zhuosi Xie, and Lin Jiang. 2019. Sequence coverage directed greybox fuzzing. In IEEE\/ACM ICPC. 249--259."},{"key":"e_1_3_2_1_31_1","unstructured":"LLVM. 2021. libFuzzer. https:\/\/llvm.or\/docs\/LibFuzzer.html#corpus.  LLVM. 2021. libFuzzer. https:\/\/llvm.or\/docs\/LibFuzzer.html#corpus."},{"key":"e_1_3_2_1_32_1","volume-title":"MOPT: Optimized mutation scheduling for fuzzers. In USENIX Security. 1949--1966.","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu , Shouling Ji , Chao Zhang , Yuwei Li , Wei-Han Lee , Yu Song , and Raheem Beyah . 2019 . MOPT: Optimized mutation scheduling for fuzzers. In USENIX Security. 1949--1966. Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. MOPT: Optimized mutation scheduling for fuzzers. In USENIX Security. 1949--1966."},{"key":"e_1_3_2_1_33_1","volume-title":"Manuel Egele, Edward J Schwartz, and Maverick Woo.","author":"Marie Man\u00e8s Valentin Jean","year":"2019","unstructured":"Valentin Jean Marie Man\u00e8s , HyungSeok Han , Choongwoo Han , Sang Kil Cha , Manuel Egele, Edward J Schwartz, and Maverick Woo. 2019 . The art, science, and engineering of fuzzing: A survey. IEEE TSE ( 2019). Valentin Jean Marie Man\u00e8s, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J Schwartz, and Maverick Woo. 2019. The art, science, and engineering of fuzzing: A survey. IEEE TSE (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"Statistical applications for the behavioral and social sciences","author":"Jr K Paul Nesselroade","unstructured":"K Paul Nesselroade Jr and Laurence G Grimm . 2018. Statistical applications for the behavioral and social sciences . John Wiley & Sons . K Paul Nesselroade Jr and Laurence G Grimm. 2018. Statistical applications for the behavioral and social sciences. John Wiley & Sons."},{"key":"e_1_3_2_1_35_1","unstructured":"Manh-Dung Nguyen S\u00e9bastien Bardin Richard Bonichon Roland Groz and Matthieu Lemerre. 2020. Binary-level directed fuzzing for use-after-free vulnerabilities. In RAID. 47--62.  Manh-Dung Nguyen S\u00e9bastien Bardin Richard Bonichon Roland Groz and Matthieu Lemerre. 2020. Binary-level directed fuzzing for use-after-free vulnerabilities. In RAID. 47--62."},{"key":"e_1_3_2_1_36_1","volume-title":"Parmesan: Sanitizer-guided greybox fuzzing. In USENIX Security. 2289--2306.","author":"\u00d6sterlund Sebastian","year":"2020","unstructured":"Sebastian \u00d6sterlund , Kaveh Razavi , Herbert Bos , and Cristiano Giuffrida . 2020 . Parmesan: Sanitizer-guided greybox fuzzing. In USENIX Security. 2289--2306. Sebastian \u00d6sterlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2020. Parmesan: Sanitizer-guided greybox fuzzing. In USENIX Security. 2289--2306."},{"key":"e_1_3_2_1_37_1","volume-title":"Moonshine: Optimizing OS fuzzer seed selection with trace distillation. In USENIX Security. 729--743.","author":"Pailoor Shankara","year":"2018","unstructured":"Shankara Pailoor , Andrew Aday , and Suman Jana . 2018 . Moonshine: Optimizing OS fuzzer seed selection with trace distillation. In USENIX Security. 729--743. Shankara Pailoor, Andrew Aday, and Suman Jana. 2018. Moonshine: Optimizing OS fuzzer seed selection with trace distillation. In USENIX Security. 729--743."},{"key":"e_1_3_2_1_38_1","volume-title":"1dvul: Discovering 1-day vulnerabilities through binary patches","author":"Peng Jiaqi","unstructured":"Jiaqi Peng , Feng Li , Bingchang Liu , Lili Xu , Binghong Liu , Kai Chen , and Wei Huo . 2019. 1dvul: Discovering 1-day vulnerabilities through binary patches . In IEEE\/IFIP DSN. 605--616. Jiaqi Peng, Feng Li, Bingchang Liu, Lili Xu, Binghong Liu, Kai Chen, and Wei Huo. 2019. 1dvul: Discovering 1-day vulnerabilities through binary patches. In IEEE\/IFIP DSN. 605--616."},{"key":"e_1_3_2_1_39_1","volume-title":"Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley.","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert , Sang Kil Cha , Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014 . Optimizing seed selection for fuzzing. In USENIX Security . 861--875. Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing seed selection for fuzzing. In USENIX Security. 861--875."},{"key":"e_1_3_2_1_40_1","unstructured":"sqlite. 2021. SQLite Source Repository. https:\/\/github.com\/sqlite\/sqlite\/tree\/master\/test.  sqlite. 2021. SQLite Source Repository. https:\/\/github.com\/sqlite\/sqlite\/tree\/master\/test."},{"key":"e_1_3_2_1_41_1","volume-title":"Ifuzzer: An evolutionary interpreter fuzzer using genetic programming. In ESORICS. 581--601.","author":"Veggalam Spandan","year":"2016","unstructured":"Spandan Veggalam , Sanjay Rawat , Istvan Haller , and Herbert Bos . 2016 . Ifuzzer: An evolutionary interpreter fuzzer using genetic programming. In ESORICS. 581--601. Spandan Veggalam, Sanjay Rawat, Istvan Haller, and Herbert Bos. 2016. Ifuzzer: An evolutionary interpreter fuzzer using genetic programming. In ESORICS. 581--601."},{"key":"e_1_3_2_1_42_1","volume-title":"Typestate-guided fuzzer for discovering use-after-free vulnerabilities","author":"Wang Haijun","unstructured":"Haijun Wang , Xiaofei Xie , Yi Li , Cheng Wen , Yuekang Li , Yang Liu , Shengchao Qin , Hongxu Chen , and Yulei Sui . 2020. Typestate-guided fuzzer for discovering use-after-free vulnerabilities . In ACM\/IEEE ICSE. 999--1010. Haijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, and Yulei Sui. 2020. Typestate-guided fuzzer for discovering use-after-free vulnerabilities. In ACM\/IEEE ICSE. 999--1010."},{"key":"e_1_3_2_1_43_1","volume-title":"Skyfire: Data-driven seed generation for fuzzing","author":"Wang Junjie","year":"2017","unstructured":"Junjie Wang , Bihuan Chen , Lei Wei , and Yang Liu . 2017 . Skyfire: Data-driven seed generation for fuzzing . In IEEE S &P. 579--594. Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. 2017. Skyfire: Data-driven seed generation for fuzzing. In IEEE S&P. 579--594."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Yanhao Wang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao Dinghao Wu and Purui Su. 2020. Not all coverage measurements are equal: Fuzzing by coverage accounting for input prioritization. NDSS.  Yanhao Wang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao Dinghao Wu and Purui Su. 2020. Not all coverage measurements are equal: Fuzzing by coverage accounting for input prioritization. NDSS.","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380396"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Wen Xu Sanidhya Kashyap Changwoo Min and Taesoo Kim. 2017. Designing new operating primitives to improve fuzzing performance. In ACM SIGSAC CCS.  Wen Xu Sanidhya Kashyap Changwoo Min and Taesoo Kim. 2017. Designing new operating primitives to improve fuzzing performance. In ACM SIGSAC CCS.","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_1_47_1","volume-title":"Blendfuzz: A model-based framework for fuzz testing programs with grammatical inputs","author":"Yang Dingning","year":"2012","unstructured":"Dingning Yang , Yuqing Zhang , and Qixu Liu . 2012 . Blendfuzz: A model-based framework for fuzz testing programs with grammatical inputs . In IEEE TrustCom . 1070--1076. Dingning Yang, Yuqing Zhang, and Qixu Liu. 2012. Blendfuzz: A model-based framework for fuzz testing programs with grammatical inputs. In IEEE TrustCom. 1070--1076."},{"key":"e_1_3_2_1_48_1","volume-title":"Ecofuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit. In USENIX Security. 2307--2324.","author":"Yue Tai","year":"2020","unstructured":"Tai Yue , Pengfei Wang , Yong Tang , Enze Wang , Bo Yu , Kai Lu , and Xu Zhou . 2020 . Ecofuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit. In USENIX Security. 2307--2324. Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou. 2020. Ecofuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit. In USENIX Security. 2307--2324."},{"key":"e_1_3_2_1_49_1","unstructured":"Michal Zalewski. 2017. afl-cmin. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/aflcmin.  Michal Zalewski. 2017. afl-cmin. https:\/\/github.com\/mirrorer\/afl\/blob\/master\/aflcmin."},{"key":"e_1_3_2_1_50_1","unstructured":"Michal Zalewski. 2020. afl-tmin. https:\/\/github.com\/google\/AFL\/blob\/master\/afl-tmin.c.  Michal Zalewski. 2020. afl-tmin. https:\/\/github.com\/google\/AFL\/blob\/master\/afl-tmin.c."},{"key":"e_1_3_2_1_51_1","volume-title":"Fuzzguard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In USENIX Security. 2255--2269.","author":"Zong Peiyuan","year":"2020","unstructured":"Peiyuan Zong , Tao Lv , Dawei Wang , Zizhuang Deng , Ruigang Liang , and KaiChen. 2020 . Fuzzguard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In USENIX Security. 2255--2269. Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, and KaiChen. 2020. Fuzzguard: Filtering out unreachable inputs in directed grey-box fuzzing through deep learning. In USENIX Security. 2255--2269."}],"event":{"name":"ASIA CCS '22: ACM Asia Conference on Computer and Communications Security","location":"Nagasaki Japan","acronym":"ASIA CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3501276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488932.3501276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:29Z","timestamp":1750193309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488932.3501276"}},"subtitle":["Using DARTs to Guide Directed Greybox Fuzzers"],"short-title":[],"issued":{"date-parts":[[2022,5,30]]},"references-count":51,"alternative-id":["10.1145\/3488932.3501276","10.1145\/3488932"],"URL":"https:\/\/doi.org\/10.1145\/3488932.3501276","relation":{},"subject":[],"published":{"date-parts":[[2022,5,30]]},"assertion":[{"value":"2022-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}