{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T01:47:18Z","timestamp":1769737638481,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,26]],"date-time":"2022-10-26T00:00:00Z","timestamp":1666742400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["2145482"],"award-info":[{"award-number":["2145482"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,26]]},"DOI":"10.1145\/3545948.3545981","type":"proceedings-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T11:21:49Z","timestamp":1666005709000},"page":"43-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Deceptive Defense in Software Security with Chaff Bugs"],"prefix":"10.1145","author":[{"given":"Zhenghao","family":"Hu","sequence":"first","affiliation":[{"name":"New York University, United States of America"}]},{"given":"Yu","family":"Hu","sequence":"additional","affiliation":[{"name":"New York University, United States of America"}]},{"given":"Brendan","family":"Dolan-Gavitt","sequence":"additional","affiliation":[{"name":"New York University, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2022,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Control-flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security","author":"Abadi Mart\u00edn","year":"2005","unstructured":"Mart\u00edn Abadi , Mihai Budiu , \u00dalfar Erlingsson , and Jay Ligatti . 2005 . Control-flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security ( Alexandria, VA, USA) (CCS \u201905). ACM, New York, NY, USA, 340\u2013353. https:\/\/doi.org\/10.1145\/1102120.1102165 10.1145\/1102120.1102165 Mart\u00edn Abadi, Mihai Budiu, \u00dalfar Erlingsson, and Jay Ligatti. 2005. Control-flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security (Alexandria, VA, USA) (CCS \u201905). ACM, New York, NY, USA, 340\u2013353. https:\/\/doi.org\/10.1145\/1102120.1102165"},{"key":"e_1_3_2_1_2_1","unstructured":"ApacheBench - G-Wan. 2009. abc. http:\/\/gwan.com\/source\/ab.c.  ApacheBench - G-Wan. 2009. abc. http:\/\/gwan.com\/source\/ab.c."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660329"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_6_1","volume-title":"Towards Better Metrics for Measuring Security Improvements Realized Through Software Debloating. In 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19)","author":"D.","unstructured":"Michael\u00a0 D. Brown and Santosh Pande. 2019. Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized Through Software Debloating. In 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19) . Michael\u00a0D. Brown and Santosh Pande. 2019. Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized Through Software Debloating. In 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET 19)."},{"key":"e_1_3_2_1_7_1","unstructured":"Charlie Miller. 2010. Anti-Fuzzing. Unpublished. Available: https:\/\/www.scribd.com\/document\/316851783\/anti-fuzzing-pdf.  Charlie Miller. 2010. Anti-Fuzzing. Unpublished. Available: https:\/\/www.scribd.com\/document\/316851783\/anti-fuzzing-pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"Mark Chen Jerry Tworek Heewoo Jun Qiming Yuan Henrique\u00a0Ponde de Oliveira\u00a0Pinto Jared Kaplan Harrison Edwards Yuri Burda Nicholas Joseph Greg Brockman Alex Ray Raul Puri Gretchen Krueger Michael Petrov Heidy Khlaaf Girish Sastry Pamela Mishkin Brooke Chan Scott Gray Nick Ryder Mikhail Pavlov Alethea Power Lukasz Kaiser Mohammad Bavarian Clemens Winter Philippe Tillet Felipe\u00a0Petroski Such Dave Cummings Matthias Plappert Fotios Chantzis Elizabeth Barnes Ariel Herbert-Voss William\u00a0Hebgen Guss Alex Nichol Alex Paino Nikolas Tezak Jie Tang Igor Babuschkin Suchir Balaji Shantanu Jain William Saunders Christopher Hesse Andrew\u00a0N. Carr Jan Leike Joshua Achiam Vedant Misra Evan Morikawa Alec Radford Matthew Knight Miles Brundage Mira Murati Katie Mayer Peter Welinder Bob McGrew Dario Amodei Sam McCandlish Ilya Sutskever and Wojciech Zaremba. 2021. Evaluating Large Language Models Trained on Code. https:\/\/arxiv.org\/abs\/2107.03374.  Mark Chen Jerry Tworek Heewoo Jun Qiming Yuan Henrique\u00a0Ponde de Oliveira\u00a0Pinto Jared Kaplan Harrison Edwards Yuri Burda Nicholas Joseph Greg Brockman Alex Ray Raul Puri Gretchen Krueger Michael Petrov Heidy Khlaaf Girish Sastry Pamela Mishkin Brooke Chan Scott Gray Nick Ryder Mikhail Pavlov Alethea Power Lukasz Kaiser Mohammad Bavarian Clemens Winter Philippe Tillet Felipe\u00a0Petroski Such Dave Cummings Matthias Plappert Fotios Chantzis Elizabeth Barnes Ariel Herbert-Voss William\u00a0Hebgen Guss Alex Nichol Alex Paino Nikolas Tezak Jie Tang Igor Babuschkin Suchir Balaji Shantanu Jain William Saunders Christopher Hesse Andrew\u00a0N. Carr Jan Leike Joshua Achiam Vedant Misra Evan Morikawa Alec Radford Matthew Knight Miles Brundage Mira Murati Katie Mayer Peter Welinder Bob McGrew Dario Amodei Sam McCandlish Ilya Sutskever and Wojciech Zaremba. 2021. Evaluating Large Language Models Trained on Code. https:\/\/arxiv.org\/abs\/2107.03374."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268962"},{"key":"e_1_3_2_1_10_1","unstructured":"DARPA. 2016. Cyber Grand Challenge (CGC). https:\/\/www.darpa.mil\/program\/cyber-grand-challenge.  DARPA. 2016. Cyber Grand Challenge (CGC). https:\/\/www.darpa.mil\/program\/cyber-grand-challenge."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_12_1","volume-title":"RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In 2020 IEEE Symposium on Security and Privacy (SP).","author":"Dinesh Sushant","year":"2020","unstructured":"Sushant Dinesh , Nathan Burow , Dongyan Xu , and Mathias Payer . 2020 . RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In 2020 IEEE Symposium on Security and Privacy (SP). Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. 2020. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In 2020 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2843859.2843867"},{"key":"e_1_3_2_1_14_1","volume-title":"LAVA: Large-Scale Automated Vulnerability Addition. In IEEE Symposium on Security and Privacy. 110\u2013121","author":"Dolan-Gavitt B.","year":"2016","unstructured":"B. Dolan-Gavitt , P. Hulin , E. Kirda , T. Leek , A. Mambretti , W. Robertson , F. Ulrich , and R. Whelan . 2016 . LAVA: Large-Scale Automated Vulnerability Addition. In IEEE Symposium on Security and Privacy. 110\u2013121 . https:\/\/doi.org\/10.1109\/SP. 2016 .15 10.1109\/SP.2016.15 B. Dolan-Gavitt, P. Hulin, E. Kirda, T. Leek, A. Mambretti, W. Robertson, F. Ulrich, and R. Whelan. 2016. LAVA: Large-Scale Automated Vulnerability Addition. In IEEE Symposium on Security and Privacy. 110\u2013121. https:\/\/doi.org\/10.1109\/SP.2016.15"},{"key":"e_1_3_2_1_15_1","unstructured":"N. Dragoni S. Giallorenzo A. Lluch Lafuente M. Mazzara F. Montesi R. Mustafin and L. Safina. 2016. Microservices: yesterday today and tomorrow. ArXiv e-prints (June 2016). arxiv:1606.04036\u00a0[cs.SE]  N. Dragoni S. Giallorenzo A. Lluch Lafuente M. Mazzara F. Montesi R. Mustafin and L. Safina. 2016. Microservices: yesterday today and tomorrow. ArXiv e-prints (June 2016). arxiv:1606.04036\u00a0[cs.SE]"},{"key":"e_1_3_2_1_16_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Eckert Moritz","year":"2018","unstructured":"Moritz Eckert , Antonio Bianchi , Ruoyu Wang , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2018 . HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security . In 27th USENIX Security Symposium (USENIX Security 18) . Moritz Eckert, Antonio Bianchi, Ruoyu Wang, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2018. HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security. In 27th USENIX Security Symposium (USENIX Security 18)."},{"key":"e_1_3_2_1_17_1","unstructured":"Emil Edholm and David G\u00f6ransson. 2016. Escaping the Fuzz - Evaluating Fuzzing Techniques and Fooling them with Anti-Fuzzing. Master\u2019s thesis. 64.  Emil Edholm and David G\u00f6ransson. 2016. Escaping the Fuzz - Evaluating Fuzzing Techniques and Fooling them with Anti-Fuzzing. Master\u2019s thesis. 64."},{"key":"e_1_3_2_1_18_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Ferguson-Walter J","year":"2021","unstructured":"Kimberly\u00a0 J Ferguson-Walter , Maxine\u00a0 M Major , Chelsea\u00a0 K Johnson , and Daniel\u00a0 H Muhleman . 2021 . Examining the efficacy of decoy-based and psychological cyber deception . In 30th USENIX Security Symposium (USENIX Security 21) . 1127\u20131144. Kimberly\u00a0J Ferguson-Walter, Maxine\u00a0M Major, Chelsea\u00a0K Johnson, and Daniel\u00a0H Muhleman. 2021. Examining the efficacy of decoy-based and psychological cyber deception. In 30th USENIX Security Symposium (USENIX Security 21). 1127\u20131144."},{"key":"e_1_3_2_1_19_1","unstructured":"Jonathan Foote. 2012. gdb exploitable. https:\/\/github.com\/jfoote\/exploitable.  Jonathan Foote. 2012. gdb exploitable. https:\/\/github.com\/jfoote\/exploitable."},{"key":"e_1_3_2_1_20_1","unstructured":"Google Inc.2008. Multi-process Architecture. https:\/\/blog.chromium.org\/2008\/09\/multi-process-architecture.html.  Google Inc.2008. Multi-process Architecture. https:\/\/blog.chromium.org\/2008\/09\/multi-process-architecture.html."},{"key":"e_1_3_2_1_21_1","volume-title":"Project Zero: A Look at iMessage in iOS 14. https:\/\/googleprojectzero.blogspot.com\/2021\/01\/a-look-at-imessage-in-ios-14.html.","author":"Gro\u00df Samuel","year":"2021","unstructured":"Samuel Gro\u00df . 2021 . Project Zero: A Look at iMessage in iOS 14. https:\/\/googleprojectzero.blogspot.com\/2021\/01\/a-look-at-imessage-in-ios-14.html. Samuel Gro\u00df. 2021. Project Zero: A Look at iMessage in iOS 14. https:\/\/googleprojectzero.blogspot.com\/2021\/01\/a-look-at-imessage-in-ios-14.html."},{"key":"e_1_3_2_1_22_1","volume-title":"AntiFuzz: Impeding Fuzzing Audits of Binary Executables. In 28th USENIX Security Symposium (USENIX Security 19)","author":"G\u00fcler Emre","year":"2019","unstructured":"Emre G\u00fcler , Cornelius Aschermann , Ali Abbasi , and Thorsten Holz . 2019 . AntiFuzz: Impeding Fuzzing Audits of Binary Executables. In 28th USENIX Security Symposium (USENIX Security 19) . Emre G\u00fcler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz. 2019. AntiFuzz: Impeding Fuzzing Audits of Binary Executables. In 28th USENIX Security Symposium (USENIX Security 19)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214305"},{"key":"e_1_3_2_1_24_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Hulin Patrick","year":"2017","unstructured":"Patrick Hulin , Andy Davis , Rahul Sridhar , Andrew Fasano , Cody Gallagher , Aaron Sedlacek , Tim Leek , and Brendan Dolan-Gavitt . 2017 . AutoCTF: Creating Diverse Pwnables via Automated Bug Injection . In 11th USENIX Workshop on Offensive Technologies (WOOT 17) . USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/hulin Patrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, and Brendan Dolan-Gavitt. 2017. AutoCTF: Creating Diverse Pwnables via Automated Bug Injection. In 11th USENIX Workshop on Offensive Technologies (WOOT 17). USENIX Association, Vancouver, BC. https:\/\/www.usenix.org\/conference\/woot17\/workshop-program\/presentation\/hulin"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516671"},{"key":"e_1_3_2_1_26_1","volume-title":"Fuzzification: Anti-Fuzzing Techniques. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Jung Jinho","year":"2019","unstructured":"Jinho Jung , Hong Hu , David Solodukhin , Daniel Pagan , Kyu\u00a0Hyung Lee , and Taesoo Kim . 2019 . Fuzzification: Anti-Fuzzing Techniques. In 28th USENIX Security Symposium (USENIX Security 19) . Jinho Jung, Hong Hu, David Solodukhin, Daniel Pagan, Kyu\u00a0Hyung Lee, and Taesoo Kim. 2019. Fuzzification: Anti-Fuzzing Techniques. In 28th USENIX Security Symposium (USENIX Security 19)."},{"key":"e_1_3_2_1_27_1","volume-title":"Automated Customized Bug-Benchmark Generation. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM).","author":"Kashyap Vineeth","year":"2019","unstructured":"Vineeth Kashyap , Jason Ruchti , Lucja Kot , Emma Turetsky , Rebecca Swords , Shih\u00a0An Pan , Julien Henry , David Melski , and Eric Schulte . 2019 . Automated Customized Bug-Benchmark Generation. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM). Vineeth Kashyap, Jason Ruchti, Lucja Kot, Emma Turetsky, Rebecca Swords, Shih\u00a0An Pan, Julien Henry, David Melski, and Eric Schulte. 2019. Automated Customized Bug-Benchmark Generation. In 2019 19th International Working Conference on Source Code Analysis and Manipulation (SCAM)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_29_1","volume-title":"Code-Pointer Integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14)","author":"Kuznetsov Volodymyr","year":"2014","unstructured":"Volodymyr Kuznetsov , Laszlo Szekeres , Mathias Payer , George Candea , R. Sekar , and Dawn Song . 2014 . Code-Pointer Integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14) . USENIX Association, Broomfield, CO, 147\u2013163. https:\/\/www.usenix.org\/conference\/osdi14\/technical-sessions\/presentation\/kuznetsov Volodymyr Kuznetsov, Laszlo Szekeres, Mathias Payer, George Candea, R. Sekar, and Dawn Song. 2014. Code-Pointer Integrity. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). USENIX Association, Broomfield, CO, 147\u2013163. https:\/\/www.usenix.org\/conference\/osdi14\/technical-sessions\/presentation\/kuznetsov"},{"key":"e_1_3_2_1_30_1","volume-title":"LLVM: An Infrastructure for Multi-Stage Optimization. Master\u2019s thesis. Computer Science Dept.","author":"Lattner Chris","year":"2002","unstructured":"Chris Lattner . 2002 . LLVM: An Infrastructure for Multi-Stage Optimization. Master\u2019s thesis. Computer Science Dept. , University of Illinois at Urbana-Champaign , Urbana, IL . Chris Lattner. 2002. LLVM: An Infrastructure for Multi-Stage Optimization. Master\u2019s thesis. Computer Science Dept., University of Illinois at Urbana-Champaign, Urbana, IL."},{"key":"e_1_3_2_1_31_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Li Yiwen","year":"2017","unstructured":"Yiwen Li , Brendan Dolan-Gavitt , Sam Weber , and Justin Cappos . 2017 . Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path . In 2017 USENIX Annual Technical Conference (USENIX ATC 17) . Yiwen Li, Brendan Dolan-Gavitt, Sam Weber, and Justin Cappos. 2017. Lock-in-Pop: Securing Privileged Operating System Kernels by Keeping on the Beaten Path. In 2017 USENIX Annual Technical Conference (USENIX ATC 17)."},{"key":"e_1_3_2_1_32_1","unstructured":"Tom Liston. 2003. LaBrea. http:\/\/labrea.sourceforge.net\/labrea-info.html.  Tom Liston. 2003. LaBrea. http:\/\/labrea.sourceforge.net\/labrea-info.html."},{"key":"e_1_3_2_1_33_1","unstructured":"Zhuo Lu Cliff Wang and Shangqing Zhao. 2020. Cyber deception for computer and network security: Survey and challenges. arXiv preprint arXiv:2007.14497(2020).  Zhuo Lu Cliff Wang and Shangqing Zhao. 2020. Cyber deception for computer and network security: Survey and challenges. arXiv preprint arXiv:2007.14497(2020)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_36_1","volume-title":"Network and Distributed Systems Symposium (NDSS).","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Song . 2005 . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In Network and Distributed Systems Symposium (NDSS). James Newsome and Dawn Song. 2005. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Network and Distributed Systems Symposium (NDSS)."},{"key":"e_1_3_2_1_37_1","volume-title":"Maarten\u00a0Paul Bosma, Maxwell Nye, Michael Terry, and Quoc\u00a0V. Le.","author":"Odena Augustus","year":"2021","unstructured":"Augustus Odena , Charles Sutton , David\u00a0Martin Dohan , Ellen Jiang , Henryk Michalewski , Jacob Austin , Maarten\u00a0Paul Bosma, Maxwell Nye, Michael Terry, and Quoc\u00a0V. Le. 2021 . Program Synthesis with Large Language Models . https:\/\/arxiv.org\/abs\/2108.07732. Augustus Odena, Charles Sutton, David\u00a0Martin Dohan, Ellen Jiang, Henryk Michalewski, Jacob Austin, Maarten\u00a0Paul Bosma, Maxwell Nye, Michael Terry, and Quoc\u00a0V. Le. 2021. Program Synthesis with Large Language Models. https:\/\/arxiv.org\/abs\/2108.07732."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414511"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468623"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991103"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133377"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236084"},{"key":"e_1_3_2_1_43_1","unstructured":"Naveen Sharma and Sanjiv\u00a0Kumar Gupta. 2003. Optimal Stack Slot Assignment in GCC. In GCC Developers Summit. 223.  Naveen Sharma and Sanjiv\u00a0Kumar Gupta. 2003. Optimal Stack Slot Assignment in GCC. In GCC Developers Summit. 223."},{"key":"e_1_3_2_1_44_1","unstructured":"Eugene Spafford. 2011. More than a Passive Defense. https:\/\/www.cerias.purdue.edu\/site\/blog\/post\/more_than_passive_defense\/.  Eugene Spafford. 2011. More than a Passive Defense. https:\/\/www.cerias.purdue.edu\/site\/blog\/post\/more_than_passive_defense\/."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_47_1","volume-title":"Exploitability assessment with TEASER. Master\u2019s thesis","author":"Ulrich Frederick","unstructured":"Frederick Ulrich . 2017. Exploitability assessment with TEASER. Master\u2019s thesis . Northeastern University . Frederick Ulrich. 2017. Exploitability assessment with TEASER. Master\u2019s thesis. Northeastern University."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751326"},{"key":"e_1_3_2_1_49_1","volume-title":"Cyber Infrastructure Protection Conference.","author":"Voris Jonathan","year":"2013","unstructured":"Jonathan Voris , Jill Jermyn , Angelos\u00a0 D Keromytis , and Salvatore\u00a0 J Stolfo . 2013 . Bait and snitch: Defending computer systems with decoys . In Cyber Infrastructure Protection Conference. Jonathan Voris, Jill Jermyn, Angelos\u00a0D Keromytis, and Salvatore\u00a0J Stolfo. 2013. Bait and snitch: Defending computer systems with decoys. In Cyber Infrastructure Protection Conference."},{"key":"e_1_3_2_1_50_1","unstructured":"Ollie Whitehouse. 2014. Introduction to Anti-Fuzzing: A Defence in Depth Aid. https:\/\/www.nccgroup.trust\/uk\/about-us\/newsroom-and-events\/blogs\/2014\/january\/introduction-to-anti-fuzzing-a-defence-in-depth-aid.  Ollie Whitehouse. 2014. Introduction to Anti-Fuzzing: A Defence in Depth Aid. https:\/\/www.nccgroup.trust\/uk\/about-us\/newsroom-and-events\/blogs\/2014\/january\/introduction-to-anti-fuzzing-a-defence-in-depth-aid."},{"key":"e_1_3_2_1_51_1","unstructured":"Michal Zalewski. 2014. American Fuzzy Lop (AFL). http:\/\/lcamtuf.coredump.cx\/afl\/.  Michal Zalewski. 2014. American Fuzzy Lop (AFL). http:\/\/lcamtuf.coredump.cx\/afl\/."}],"event":{"name":"RAID 2022: 25th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Limassol Cyprus","acronym":"RAID 2022"},"container-title":["Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545981","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3545948.3545981","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3545948.3545981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:17Z","timestamp":1750188617000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3545948.3545981"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,26]]},"references-count":49,"alternative-id":["10.1145\/3545948.3545981","10.1145\/3545948"],"URL":"https:\/\/doi.org\/10.1145\/3545948.3545981","relation":{},"subject":[],"published":{"date-parts":[[2022,10,26]]},"assertion":[{"value":"2022-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}