{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T02:52:41Z","timestamp":1777949561065,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510228","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"1070-1081","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["GraphFuzz"],"prefix":"10.1145","author":[{"given":"Harrison","family":"Green","sequence":"first","affiliation":[{"name":"ForAllSecure"}]},{"given":"Thanassis","family":"Avgerinos","sequence":"additional","affiliation":[{"name":"ForAllSecure"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"K. Serebryany \"Oss-fuzz-google's continuous fuzzing service for open source software \" 2017."},{"key":"e_1_3_2_1_2_1","unstructured":"\"Fuzzing for safety critical systems.\" https:\/\/forallsecure.com\/safety-critical. Accessed: 2021-09-03."},{"key":"e_1_3_2_1_3_1","unstructured":"K. Serebryany \"libfuzzer-a library for coverage-guided fuzz testing \" LLVM project 2015."},{"key":"e_1_3_2_1_4_1","first-page":"75","volume-title":"CGO 2004","author":"Lattner C.","year":"2004","unstructured":"C. Lattner and V. Adve, \"Llvm: A compilation framework for lifelong program analysis & transformation,\" in International Symposium on Code Generation and Optimization, 2004. CGO 2004., pp. 75--86, IEEE, 2004."},{"key":"e_1_3_2_1_5_1","unstructured":"\"google\/libprotobuf-mutator \" June 2021. original-date: 2017-01-11T22:57:02Z."},{"key":"e_1_3_2_1_6_1","first-page":"283","volume-title":"Finding and understanding bugs in c compilers,\" in Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation","author":"Yang X.","year":"2011","unstructured":"X. Yang, Y. Chen, E. Eide, and J. Regehr, \"Finding and understanding bugs in c compilers,\" in Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation, pp. 283--294, 2011."},{"key":"e_1_3_2_1_7_1","first-page":"975","volume-title":"Fudge: fuzz driver generation at scale,\" in Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering","author":"Babi\u0107 D.","year":"2019","unstructured":"D. Babi\u0107, S. Bucur, Y. Chen, F. Ivan\u010di\u0107, T. King, M. Kusano, C. Lemieux, L. Szekeres, and W. Wang, \"Fudge: fuzz driver generation at scale,\" in Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 975--985, 2019."},{"key":"e_1_3_2_1_8_1","first-page":"309","volume-title":"Addresssanitizer: A fast address sanity checker,\" in 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12)","author":"Serebryany K.","year":"2012","unstructured":"K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov, \"Addresssanitizer: A fast address sanity checker,\" in 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12), pp. 309--318, 2012."},{"key":"e_1_3_2_1_9_1","unstructured":"J. Ruderman \"Introducing jsfunfuzz \" URL http:\/\/www.squarefree.com\/2007\/08\/02\/introducing-jsfunfuzz vol. 20 pp. 25--29 2007."},{"key":"e_1_3_2_1_10_1","volume-title":"Nautilus: Fishing for deep bugs with grammars.\" in NDSS","author":"Aschermann C.","year":"2019","unstructured":"C. Aschermann, T. Frassetto, T. Holz, P. Jauernig, A.-R. Sadeghi, and D. Teuchert, \"Nautilus: Fishing for deep bugs with grammars.\" in NDSS, 2019."},{"key":"e_1_3_2_1_11_1","volume-title":"Pythia: grammar-based fuzzing of rest apis with coverage-guided feedback and learning-based mutations\" arXiv preprint arXiv:2005.11498","author":"Atlidakis V.","year":"2020","unstructured":"V. Atlidakis, R. Geambasu, P. Godefroid, M. Polishchuk, and B. Ray, \"Pythia: grammar-based fuzzing of rest apis with coverage-guided feedback and learning-based mutations\" arXiv preprint arXiv:2005.11498, 2020."},{"key":"e_1_3_2_1_12_1","unstructured":"\"chromium\/src.git - Git at Google.\""},{"key":"e_1_3_2_1_13_1","volume-title":"Codealchemist: Semantics-aware code generation to find vulnerabilities in javascript engines.,\" in NDSS","author":"Han H.","year":"2019","unstructured":"H. Han, D. Oh, and S. K. Cha, \"Codealchemist: Semantics-aware code generation to find vulnerabilities in javascript engines.,\" in NDSS, 2019."},{"key":"e_1_3_2_1_14_1","first-page":"2345","volume-title":"Imf: Inferred model-based fuzzer\" in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Han H.","year":"2017","unstructured":"H. Han and S. K. Cha, \"Imf: Inferred model-based fuzzer\" in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 2345--2358, 2017."},{"key":"e_1_3_2_1_15_1","first-page":"2271","volume-title":"Fuzzgen: Automatic fuzzer generation\" in 29th {USENIX} Security Symposium ({USENIX} Security 20)","author":"Ispoglou K.","year":"2020","unstructured":"K. Ispoglou, D. Austin, V. Mohan, and M. Payer, \"Fuzzgen: Automatic fuzzer generation\" in 29th {USENIX} Security Symposium ({USENIX} Security 20), pp. 2271--2287, 2020."},{"key":"e_1_3_2_1_16_1","unstructured":"D. Vyukov \"Syzkaller \" 2015."},{"key":"e_1_3_2_1_17_1","first-page":"1","author":"Manes V. J. M.","year":"2019","unstructured":"V. J. M. Manes, H. Han, C. Han, S. K. Cha, M. Egele, E. J. Schwartz, and M. Woo, \"The Art, Science, and Engineering of Fuzzing: A Survey\" IEEE Transactions on Software Engineering, pp. 1--1, 2019.","journal-title":"\"The Art, Science, and Engineering of Fuzzing: A Survey\" IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_18_1","first-page":"445","volume-title":"Fuzzing with code fragments\" in 21st {USENIX} Security Symposium ({USENIX} Security 12)","author":"Holler C.","year":"2012","unstructured":"C. Holler, K. Herzig, and A. Zeller, \"Fuzzing with code fragments\" in 21st {USENIX} Security Symposium ({USENIX} Security 12), pp. 445--458, 2012."},{"key":"e_1_3_2_1_19_1","first-page":"581","volume-title":"Ifuzzer: An evolutionary interpreter fuzzer using genetic programming\" in European Symposium on Research in Computer Security","author":"Veggalam S.","year":"2016","unstructured":"S. Veggalam, S. Rawat, I. Haller, and H. Bos, \"Ifuzzer: An evolutionary interpreter fuzzer using genetic programming\" in European Symposium on Research in Computer Security, pp. 581--601, Springer, 2016."},{"key":"e_1_3_2_1_20_1","first-page":"748","volume-title":"Restler: Stateful rest api fuzzing\" in 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE)","author":"Atlidakis V.","year":"2019","unstructured":"V. Atlidakis, P. Godefroid, and M. Polishchuk, \"Restler: Stateful rest api fuzzing\" in 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 748--758, IEEE, 2019."},{"key":"e_1_3_2_1_21_1","unstructured":"\"MozillaSecurity\/dharma \" May 2021. original-date: 2015-03-25T17:56:23Z."},{"key":"e_1_3_2_1_22_1","volume-title":"Rulf: Rust library fuzzing via api dependency graph traversal,\" arXiv preprint arXiv:2104.12064","author":"Jiang J.","year":"2021","unstructured":"J. Jiang, H. Xu, and Y. Zhou, \"Rulf: Rust library fuzzing via api dependency graph traversal,\" arXiv preprint arXiv:2104.12064, 2021."},{"key":"e_1_3_2_1_23_1","unstructured":"\"Skia: The 2d graphics library.\" https:\/\/skia.org\/. Accessed: 2021-09-03."},{"key":"e_1_3_2_1_24_1","unstructured":"\"Rdkit: Open-source cheminformatics\" http:\/\/www.rdkit.org. Accessed: 2021-09-03."},{"key":"e_1_3_2_1_25_1","unstructured":"\"Sqlite: In-memory database\" https:\/\/www.sqlite.org\/. Accessed: 2021-09-03."},{"key":"e_1_3_2_1_26_1","volume-title":"Eigen v3.\" http:\/\/eigen.tuxfamily.org","author":"Guennebaud G.","year":"2010","unstructured":"G. Guennebaud, B. Jacob, et al., \"Eigen v3.\" http:\/\/eigen.tuxfamily.org, 2010."},{"key":"e_1_3_2_1_27_1","unstructured":"\"Iowow: C11 key\/value database engine.\" https:\/\/iowow.io\/. Accessed: 2021-09-03."}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510228","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:24Z","timestamp":1750191144000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510228"}},"subtitle":["library API fuzzing with lifetime-aware dataflow graphs"],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":27,"alternative-id":["10.1145\/3510003.3510228","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510228","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}