{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:05:59Z","timestamp":1775815559210,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T00:00:00Z","timestamp":1670198400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,5]]},"DOI":"10.1145\/3564625.3564660","type":"proceedings-article","created":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T01:01:29Z","timestamp":1670029289000},"page":"534-547","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1896-2131","authenticated-orcid":false,"given":"Yiru","family":"Zhao","sequence":"first","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1066-791X","authenticated-orcid":false,"given":"Xiaoke","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2412-7279","authenticated-orcid":false,"given":"Lei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6277-340X","authenticated-orcid":false,"given":"Yueqiang","family":"Cheng","sequence":"additional","affiliation":[{"name":"NIO Security Research, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8942-7742","authenticated-orcid":false,"given":"Heng","family":"Yin","sequence":"additional","affiliation":[{"name":"Department of Computer Science &amp; Engineering, UC Riverside, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2017.8206230"},{"key":"e_1_3_2_1_2_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS, Vol.\u00a019. 1\u201315.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann , Sergej Schumilo , Tim Blazytko , Robert Gawlik , and Thorsten Holz . 2019 . REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS, Vol.\u00a019. 1\u201315. Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS, Vol.\u00a019. 1\u201315."},{"key":"e_1_3_2_1_3_1","volume-title":"Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3","author":"Auer Peter","year":"2002","unstructured":"Peter Auer , Nicolo Cesa-Bianchi , and Paul Fischer . 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3 ( 2002 ), 235\u2013256. Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning 47, 2-3 (2002), 235\u2013256."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CoG47356.2020.9231603"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2012.2186810"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_9_1","volume-title":"MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. CoRR abs\/2002.08568(2020).","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen , Mansour Ahmadi , Reza\u00a0Mirzazade Farkhani , Boyu Wang , and Long Lu . 2020 . MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. CoRR abs\/2002.08568(2020). Yaohui Chen, Mansour Ahmadi, Reza\u00a0Mirzazade Farkhani, Boyu Wang, and Long Lu. 2020. MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. CoRR abs\/2002.08568(2020)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950396"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Micah Corah and Nathan Michael. 2017. Efficient Online Multi-robot Exploration via Distributed Sequential Greedy Assignment.. In Robotics: Science and Systems Vol.\u00a013.  Micah Corah and Nathan Michael. 2017. Efficient Online Multi-robot Exploration via Distributed Sequential Greedy Assignment.. In Robotics: Science and Systems Vol.\u00a013.","DOI":"10.15607\/RSS.2017.XIII.070"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Aleksander Czechowski and Frans\u00a0A. Oliehoek. 2020. Decentralized MCTS via Learned Teammate Models. CoRR abs\/2003.08727(2020).  Aleksander Czechowski and Frans\u00a0A. Oliehoek. 2020. Decentralized MCTS via Learned Teammate Models. CoRR abs\/2003.08727(2020).","DOI":"10.24963\/ijcai.2020\/12"},{"key":"e_1_3_2_1_13_1","unstructured":"DARPA. 2017. Cyber Grand Challenge Challenge Repository. http:\/\/www.lungetech.com\/cgc-corpus\/.  DARPA. 2017. Cyber Grand Challenge Challenge Repository. http:\/\/www.lungetech.com\/cgc-corpus\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290688.3290748"},{"key":"e_1_3_2_1_15_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi , Dominik Maier , Heiko Ei\u00dffeldt , and Marc Heuse . 2020 . AFL++: Combining Incremental Steps of Fuzzing Research . In 14th USENIX Workshop on Offensive Technologies (WOOT 20) . USENIX Association. Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association."},{"key":"e_1_3_2_1_16_1","unstructured":"Jonathan Foote. 2018. The exploitable GDB plugin. https:\/\/github.com\/jfoote\/exploitable.  Jonathan Foote. 2018. The exploitable GDB plugin. https:\/\/github.com\/jfoote\/exploitable."},{"key":"e_1_3_2_1_17_1","volume-title":"GREYONE: Data Flow Sensitive Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan , Chao Zhang , Peng Chen , Bodong Zhao , Xiaojun Qin , Dong Wu , and Zuoning Chen . 2020 . GREYONE: Data Flow Sensitive Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, Boston, MA. Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. 2020. GREYONE: Data Flow Sensitive Fuzzing. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA."},{"key":"e_1_3_2_1_18_1","volume-title":"CollAFL: Path Sensitive Fuzzing. In 2018 IEEE Symposium on Security and Privacy, SP 2018","author":"Gan Shuitao","year":"2018","unstructured":"Shuitao Gan , Chao Zhang , Xiaojun Qin , Xuwen Tu , Kang Li , Zhongyu Pei , and Zuoning Chen . 2018 . CollAFL: Path Sensitive Fuzzing. In 2018 IEEE Symposium on Security and Privacy, SP 2018 , Proceedings, 21-23 May 2018, San Francisco, California, USA. 679\u2013696. Shuitao Gan, Chao Zhang, Xiaojun Qin, Xuwen Tu, Kang Li, Zhongyu Pei, and Zuoning Chen. 2018. CollAFL: Path Sensitive Fuzzing. In 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, 21-23 May 2018, San Francisco, California, USA. 679\u2013696."},{"key":"e_1_3_2_1_19_1","volume-title":"GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/.","author":"GDB.","year":"2019","unstructured":"GDB. 2019 . GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/. GDB. 2019. GDB: The GNU Project Debugger. https:\/\/www.gnu.org\/software\/gdb\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the ARAA Australasian Conference on Robotics and Automation (ARAA","author":"Hefferan Benjamin","year":"2016","unstructured":"Benjamin Hefferan , Oliver\u00a0 M Cliff , and Robert Fitch . 2016 . Adversarial patrolling with reactive point processes . In Proceedings of the ARAA Australasian Conference on Robotics and Automation (ARAA , 2016). 39\u201346. Benjamin Hefferan, Oliver\u00a0M Cliff, and Robert Fitch. 2016. Adversarial patrolling with reactive point processes. In Proceedings of the ARAA Australasian Conference on Robotics and Automation (ARAA, 2016). 39\u201346."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2016.06.008"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_25_1","volume-title":"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs\/2010.01785(2020).","author":"Li Yuwei","year":"2020","unstructured":"Yuwei Li , Shouling Ji , Yuan Chen , Sizhuang Liang , Wei-Han Lee , Yueyao Chen , Chenyang Lyu , Chunming Wu , Raheem Beyah , Peng Cheng , Kangjie Lu , and Ting Wang . 2020 . UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs\/2010.01785(2020). Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, and Ting Wang. 2020. UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs\/2010.01785(2020)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2020.2998315"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering. Association for Computing Machinery","author":"Liu Dongge","unstructured":"Dongge Liu , Gidon Ernst , Toby Murray , and Benjamin I . \u00a0P. Rubinstein. 2020. Legion: Best-First Concolic Testing . In Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering. Association for Computing Machinery , New York, NY, USA, 54\u201365. Dongge Liu, Gidon Ernst, Toby Murray, and Benjamin I.\u00a0P. Rubinstein. 2020. Legion: Best-First Concolic Testing. In Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering. Association for Computing Machinery, New York, NY, USA, 54\u201365."},{"key":"e_1_3_2_1_28_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu , Shouling Ji , Chao Zhang , Yuwei Li , Wei-Han Lee , Yu Song , and Raheem Beyah . 2019 . MOPT: Optimized mutation scheduling for fuzzers . In 28th USENIX Security Symposium (USENIX Security 19) . 1949\u20131966. Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. MOPT: Optimized mutation scheduling for fuzzers. In 28th USENIX Security Symposium (USENIX Security 19). 1949\u20131966."},{"key":"e_1_3_2_1_29_1","volume-title":"Menendez and David Clark","author":"D.","year":"2021","unstructured":"Hector\u00a0 D. Menendez and David Clark . 2021 . Hashing Fuzzing : Introducing Input Diversity to Improve Crash Detection. IEEE Transactions on Software Engineering( 2021), 1\u20131. Hector\u00a0D. Menendez and David Clark. 2021. Hashing Fuzzing: Introducing Input Diversity to Improve Crash Detection. IEEE Transactions on Software Engineering(2021), 1\u20131."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_1_31_1","volume-title":"DARPA Challenges Sets for Linux, Windows, and macOS. Accessed on September 10th","author":"Bits Trail","year":"2020","unstructured":"Trail of Bits . 2016. DARPA Challenges Sets for Linux, Windows, and macOS. Accessed on September 10th 2020 . https:\/\/github.com\/trailofbits\/cb-multios. Trail of Bits. 2016. DARPA Challenges Sets for Linux, Windows, and macOS. Accessed on September 10th 2020. https:\/\/github.com\/trailofbits\/cb-multios."},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the VI Congreso de la Sociedad Espa\u00f1ola para las Ciencias del Videojuego","author":"Ouessai Abdessamed","year":"2020","unstructured":"Abdessamed Ouessai , Mohammed Salem , and Antonio\u00a0Miguel Mora . 2020 . Parametric action pre-selection for MCTS in real-time strategy games . In Proceedings of the VI Congreso de la Sociedad Espa\u00f1ola para las Ciencias del Videojuego , On-line , October 7-8, 2020. 104\u2013115. Abdessamed Ouessai, Mohammed Salem, and Antonio\u00a0Miguel Mora. 2020. Parametric action pre-selection for MCTS in real-time strategy games. In Proceedings of the VI Congreso de la Sociedad Espa\u00f1ola para las Ciencias del Videojuego, On-line, October 7-8, 2020. 104\u2013115."},{"key":"e_1_3_2_1_33_1","unstructured":"p value. 2022. p value. https:\/\/en.wikipedia.org\/wiki\/P-value.  p value. 2022. p value. https:\/\/en.wikipedia.org\/wiki\/P-value."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10514-017-9626-0"},{"key":"e_1_3_2_1_35_1","unstructured":"Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR abs\/1711.04596(2017).  Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR abs\/1711.04596(2017)."},{"key":"e_1_3_2_1_36_1","volume-title":"libFuzzer\u2013a library for coverage-guided fuzz testing. LLVM project","author":"Serebryany Kostya","year":"2015","unstructured":"Kostya Serebryany . 2015. libFuzzer\u2013a library for coverage-guided fuzz testing. LLVM project ( 2015 ). Kostya Serebryany. 2015. libFuzzer\u2013a library for coverage-guided fuzz testing. LLVM project (2015)."},{"key":"e_1_3_2_1_37_1","unstructured":"Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2017. Addresssanitizer. https:\/\/github.com\/google\/sanitizers\/wiki.  Konstantin Serebryany Derek Bruening Alexander Potapenko and Dmitriy Vyukov. 2017. Addresssanitizer. https:\/\/github.com\/google\/sanitizers\/wiki."},{"key":"e_1_3_2_1_38_1","unstructured":"Eren Sezener and Peter Dayan. 2020. Static and Dynamic Values of Computation in MCTS. CoRR abs\/2002.04335(2020). https:\/\/arxiv.org\/abs\/2002.04335  Eren Sezener and Peter Dayan. 2020. Static and Dynamic Values of Computation in MCTS. CoRR abs\/2002.04335(2020). https:\/\/arxiv.org\/abs\/2002.04335"},{"key":"e_1_3_2_1_39_1","volume-title":"NEUZZ: Efficient Fuzzing with Neural Program Smoothing. In 2019 IEEE Symposium on Security and Privacy, SP 2019","author":"She Dongdong","year":"2019","unstructured":"Dongdong She , Kexin Pei , Dave Epstein , Junfeng Yang , Baishakhi Ray , and Suman Jana . 2019 . NEUZZ: Efficient Fuzzing with Neural Program Smoothing. In 2019 IEEE Symposium on Security and Privacy, SP 2019 , San Francisco, CA, USA , May 19-23, 2019. 803\u2013817. Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, and Suman Jana. 2019. NEUZZ: Efficient Fuzzing with Neural Program Smoothing. In 2019 IEEE Symposium on Security and Privacy, SP 2019, San Francisco, CA, USA, May 19-23, 2019. 803\u2013817."},{"key":"e_1_3_2_1_40_1","volume-title":"Honggfuzz: A general-purpose, easy-to-use fuzzer with interesting analysis options. URl: https:\/\/github. com\/google\/honggfuzz (visited on 06\/21\/2017)","author":"Swiecki Robert","year":"2017","unstructured":"Robert Swiecki . 2017 . Honggfuzz: A general-purpose, easy-to-use fuzzer with interesting analysis options. URl: https:\/\/github. com\/google\/honggfuzz (visited on 06\/21\/2017) (2017). Robert Swiecki. 2017. Honggfuzz: A general-purpose, easy-to-use fuzzer with interesting analysis options. URl: https:\/\/github. com\/google\/honggfuzz (visited on 06\/21\/2017) (2017)."},{"key":"e_1_3_2_1_41_1","unstructured":"The\u00a0Clang Team. 2017. Addresssanitizer. http:\/\/clang.llvm.org\/docs\/AddressSanitizer.html.  The\u00a0Clang Team. 2017. Addresssanitizer. http:\/\/clang.llvm.org\/docs\/AddressSanitizer.html."},{"key":"e_1_3_2_1_42_1","volume-title":"Skyfire: Data-Driven Seed Generation for Fuzzing. In 2017 IEEE Symposium on Security and Privacy, SP 2017","author":"Wang Junjie","year":"2017","unstructured":"Junjie Wang , Bihuan Chen , Lei Wei , and Yang Liu . 2017 . Skyfire: Data-Driven Seed Generation for Fuzzing. In 2017 IEEE Symposium on Security and Privacy, SP 2017 , San Jose, CA, USA , May 22-26, 2017. 579\u2013594. Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. 2017. Skyfire: Data-Driven Seed Generation for Fuzzing. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22-26, 2017. 579\u2013594."},{"key":"e_1_3_2_1_43_1","volume-title":"Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019","author":"Wang Jinghan","year":"2019","unstructured":"Jinghan Wang , Yue Duan , Wei Song , Heng Yin , and Chengyu Song . 2019 . Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019 , Chaoyang District, Beijing, China , September 23-25, 2019. Jinghan Wang, Yue Duan, Wei Song, Heng Yin, and Chengyu Song. 2019. Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2019, Chaoyang District, Beijing, China, September 23-25, 2019."},{"key":"e_1_3_2_1_44_1","volume-title":"Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021","author":"Wang Jinghan","year":"2021","unstructured":"Jinghan Wang , Chengyu Song , and Heng Yin . 2021 . Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021 , virtually, February 21-25, 2021. The Internet Society. Jinghan Wang, Chengyu Song, and Heng Yin. 2021. Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_1_46_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yue Tai","year":"2020","unstructured":"Tai Yue , Pengfei Wang , Yong Tang , Enze Wang , Bo Yu , Kai Lu , and Xu Zhou . 2020 . EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit . In 29th USENIX Security Symposium (USENIX Security 20) . Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou. 2020. EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. In 29th USENIX Security Symposium (USENIX Security 20)."},{"key":"e_1_3_2_1_47_1","unstructured":"M. Zalewski. 2017. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/.  M. Zalewski. 2017. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851237"},{"key":"e_1_3_2_1_49_1","volume-title":"Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019","author":"Zhao Lei","year":"2019","unstructured":"Lei Zhao , Yue Duan , Heng Yin , and Jifeng Xuan . 2019 . Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019 , San Diego, California, USA , February 24-27, 2019. The Internet Society. Lei Zhao, Yue Duan, Heng Yin, and Jifeng Xuan. 2019. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing. In 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019. The Internet Society."}],"event":{"name":"ACSAC: Annual Computer Security Applications Conference","location":"Austin TX USA","acronym":"ACSAC"},"container-title":["Proceedings of the 38th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3564625.3564660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:12Z","timestamp":1750183752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3564625.3564660"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,5]]},"references-count":48,"alternative-id":["10.1145\/3564625.3564660","10.1145\/3564625"],"URL":"https:\/\/doi.org\/10.1145\/3564625.3564660","relation":{},"subject":[],"published":{"date-parts":[[2022,12,5]]},"assertion":[{"value":"2022-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}