{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T23:40:55Z","timestamp":1769125255746,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3556946","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["So Many Fuzzers, So Little Time\u2731"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3165-634X","authenticated-orcid":false,"given":"Clement","family":"Poncelet","sequence":"first","affiliation":[{"name":"Department of Information Technology, Uppsala University, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9657-0179","authenticated-orcid":false,"given":"Konstantinos","family":"Sagonas","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Uppsala University, Sweden and School of Electrical and Computer Engineering, National Technical University of Athens, Greece"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3139-2564","authenticated-orcid":false,"given":"Nicolas","family":"Tsiftes","sequence":"additional","affiliation":[{"name":"RISE Research Institutes of Sweden, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AFL-clang-fast 2019. Fast LLVM-based instrumentation for afl-fuzz. https:\/\/github.com\/google\/AFL\/tree\/master\/llvm_mode."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00039"},{"key":"e_1_3_2_1_3_1","unstructured":"Brian Caswell. 2016. Cyber Grand Challenge Corpus. http:\/\/www.lungetech.com\/cgc-corpus\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354249"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192388"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1066118"},{"key":"e_1_3_2_1_9_1","unstructured":"FTS 2018. Fuzzer Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite."},{"key":"e_1_3_2_1_10_1","unstructured":"FuzzBench 2020. FuzzBench: Fuzzer Benchmarking As a Service. https:\/\/github.com\/google\/fuzzbench."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_13_1","volume-title":"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Li Yuwei","year":"2021","unstructured":"Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, and Ting Wang. 2021. UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2777\u20132794. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/li-yuwei"},{"key":"e_1_3_2_1_14_1","volume-title":"MOpt: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, and Raheem Beyah. 2019. MOpt: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium (USENIX Security 19) (Santa Clara, CA, USA). USENIX Association, 1949\u20131966. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lyu"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.softx.2022.101089"},{"key":"e_1_3_2_1_18_1","volume-title":"Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution. Master\u2019s thesis. School of Computer Science","author":"Pak S.","year":"2012","unstructured":"Brian\u00a0S. Pak. 2012. Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution. Master\u2019s thesis. School of Computer Science, Carnegie Mellon University. http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/2012\/CMU-CS-12-116.pdf CMU-CS-12-116."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2889892"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359796"},{"key":"e_1_3_2_1_21_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Poeplau Sebastian","year":"2020","unstructured":"Sebastian Poeplau and Aur\u00e9lien Francillon. 2020. Symbolic execution with SymCC: Don\u2019t interpret, compile!. In 29th USENIX Security Symposium (USENIX Security 20) (Boston, MA, USA). USENIX Association, 181\u2013198. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/poeplau"},{"key":"e_1_3_2_1_22_1","unstructured":"RFC 2007. Transmission of IPv6 Packets over IEEE 802.15.4 Networks. https:\/\/tools.ietf.org\/html\/rfc4944."},{"key":"e_1_3_2_1_23_1","unstructured":"Kostya Serebryany. 2016. Sanitize Fuzz and Harden Your C++ Code. Talk at USENIX Enigma. https:\/\/www.usenix.org\/conference\/enigma2016\/conference-program\/presentation\/serebryany"},{"key":"e_1_3_2_1_24_1","volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In 2012 USENIX Annual Technical Conference (USENIX ATC 12) (Boston, MA, USA). USENIX Association, 309\u2013318. https:\/\/www.usenix.org\/conference\/atc12\/technical-sessions\/presentation\/serebryany"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00010"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_27_1","unstructured":"Robert Swiecki. 2010. Honggfuzz. https:\/\/honggfuzz.dev\/."},{"key":"e_1_3_2_1_28_1","unstructured":"The\u00a0Clang Team. 2014. UndefinedBehaviorSanitizer. https:\/\/clang.llvm.org\/docs\/UndefinedBehaviorSanitizer.html."},{"key":"e_1_3_2_1_29_1","volume-title":"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Yun Insu","year":"2018","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium (USENIX Security 18) (Baltimore, MD, USA). USENIX Association, 745\u2013761. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yun"},{"key":"e_1_3_2_1_30_1","unstructured":"Micha\u0142 Zalewski. 2013. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/."}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3556946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T08:29:48Z","timestamp":1755851388000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556946"}},"subtitle":["Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)Stack"],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":30,"alternative-id":["10.1145\/3551349.3556946","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3556946","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}