{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:48:15Z","timestamp":1776782895343,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":88,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"vor","delay-in-days":6,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2213727"],"award-info":[{"award-number":["2213727"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616636","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"1257-1271","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Profile-guided System Optimizations for Accelerated Greybox Fuzzing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-9868-558X","authenticated-orcid":false,"given":"Yunhang","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7439-2364","authenticated-orcid":false,"given":"Chengbin","family":"Pang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0220-1706","authenticated-orcid":false,"given":"Stefan","family":"Nagy","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5208-7775","authenticated-orcid":false,"given":"Xun","family":"Chen","sequence":"additional","affiliation":[{"name":"Samsung Research America, Mountain View, CA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-8128-5062","authenticated-orcid":false,"given":"Jun","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, UT, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"https:\/\/github.com\/AFLplusplus\/AFLplusplus\/tree\/stable\/utils\/socket_fuzzing. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_2_1","unstructured":"github.com\/zardus\/preeny. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_3_1","unstructured":"github.com\/AFLplusplus\/AFL-Snapshot-LKM. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_4_1","unstructured":"github.com\/HexHive\/magma\/blob\/v1.2\/tools\/report_df\/main.py. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_5_1","unstructured":"en.wikipedia.org\/wiki\/Profile-guided_optimization. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_6_1","unstructured":"github.com\/klee\/klee\/tree\/master\/runtime\/POSIX. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_7_1","unstructured":"Afl. afl-1.readthedocs.io\/en\/latest\/user_guide.html. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_8_1","unstructured":"Afl persistent mode. https:\/\/github.com\/AFLplusplus\/AFLplusplus\/blob\/stable\/ instrumentation\/README.persistent_mode.md. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_9_1","unstructured":"Bash. tinyurl.com\/bashtestcase. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_10_1","unstructured":"C and c++ error checking. tinyurl.com\/asanmsan. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_11_1","unstructured":"Cloud9 posix. github.com\/dslab-epfl\/cloud9\/tree\/master\/runtime\/POSIX. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_12_1","unstructured":"Elf. https:\/\/tinyurl.com\/elftestcase. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_13_1","unstructured":"Exif. https:\/\/github.com\/ianare\/exif-samples. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_14_1","unstructured":"Flvmeta. https:\/\/tinyurl.com\/flxmetatest. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_15_1","unstructured":"Funchook. https:\/\/github.com\/kubo\/funchook. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_16_1","unstructured":"Honggfuzz. http:\/\/honggfuzz.com. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_17_1","unstructured":"Html. https:\/\/tinyurl.com\/htmltestcase. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_18_1","unstructured":"Http. github.com\/curl\/curl-fuzzer\/tree\/master\/corpora\/curl_fuzzer_http. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel pt. https:\/\/tinyurl.com\/intelptdoc. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_20_1","unstructured":"Jq. https:\/\/tinyurl.com\/jqtestcase. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_21_1","unstructured":"Js. github.com\/cesanta\/mjs\/raw\/master\/tests\/test_1.js. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_22_1","unstructured":"libfuzzer. https:\/\/llvm.org\/docs\/LibFuzzer.html. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_23_1","unstructured":"libpcap fuzzing driver on pcap_next_ex. https:\/\/github.com\/the-tcpdump-group\/ libpcap\/blob\/master\/testprogs\/fuzz\/fuzz_pcap.c. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_24_1","unstructured":"libpcap fuzzing driver on pcap_setfilter. https:\/\/github.com\/the-tcpdump-group\/ libpcap\/blob\/master\/testprogs\/fuzz\/fuzz_filter.c#L22. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_25_1","unstructured":"Linux system call table. https:\/\/thevivekpandey.github.io\/posts\/2017-09-25-linux-system-calls.html. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_26_1","unstructured":"llvm_mode persistent mode. https:\/\/github.com\/AFLplusplus\/AFLplusplus\/blob\/ stable\/instrumentation\/README.persistent_mode.md. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_27_1","unstructured":"New in afl: persistent mode. https:\/\/lcamtuf.blogspot.com\/2015\/06\/new-in-afl-persistent-mode.html. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_28_1","unstructured":"New os primitives specialized for fuzzing. https:\/\/github.com\/sslab-gatech\/perf-fuzz. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_29_1","unstructured":"Optipng. https:\/\/tinyurl.com\/pngtestcase. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_30_1","unstructured":"Pcap. https:\/\/tinyurl.com\/pcaptest. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_31_1","unstructured":"Posix apis. https:\/\/tinyurl.com\/posixapi. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_32_1","unstructured":"Quickjs. https:\/\/github.com\/bellard\/quickjs\/raw\/master\/examples\/hello.js. (Ac-cessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_33_1","unstructured":"Setting up a new project. https:\/\/google.github.io\/oss-fuzz\/getting-started\/new-project-guide\/#sanitizers. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_34_1","unstructured":"Survival report. https:\/\/hexhive.epfl.ch\/magma\/reports\/sample_2\/. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_35_1","unstructured":"Tiff. lcamtuf.coredump.cx\/afl\/demo\/afl_testcases.tgz. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_36_1","unstructured":"Ubsan. https:\/\/tinyurl.com\/undefsan. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_37_1","unstructured":"Unrtf. https:\/\/tinyurl.com\/unrtftest. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_38_1","unstructured":"Woff2. https:\/\/tinyurl.com\/woff2test. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814285"},{"key":"e_1_3_2_1_40_1","volume-title":"Thorsten Holz. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Network and Distributed System Security Symposium, NDSS","author":"Aschermann Cornelius","year":"2018","unstructured":"Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Network and Distributed System Security Symposium, NDSS, 2018."},{"key":"e_1_3_2_1_41_1","volume-title":"Abhik Roychoudhury. Directed Greybox Fuzzing. In ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"B\u00f6hme Marcel","year":"2017","unstructured":"Marcel B\u00f6hme, Van-Thuan Pham, Manh-Dung Nguyen, and Abhik Roychoudhury. Directed Greybox Fuzzing. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2017."},{"key":"e_1_3_2_1_42_1","volume-title":"Abhik Roychoudhury. Coverage-based Greybox Fuzzing As Markov Chain. In ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"B\u00f6hme Marcel","year":"2016","unstructured":"Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. Coverage-based Greybox Fuzzing As Markov Chain. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2016."},{"key":"e_1_3_2_1_43_1","first-page":"209","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, and Dawson Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, pages 209--224. USENIX Association, 2008."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854044"},{"key":"e_1_3_2_1_45_1","volume-title":"ACM SIGSAC Conference on Computer and Communications Security, CCS","author":"Chen Hongxu","year":"2018","unstructured":"Hongxu Chen, Yinxing Xue, Yuekang Li, Bihuan Chen, Xiaofei Xie, Xiuheng Wu, and Yang Liu. Hawkeye: Towards a Desired Directed Grey-box Fuzzer. In ACM SIGSAC Conference on Computer and Communications Security, CCS, 2018."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_47_1","volume-title":"ACM SIGSAC CCS","author":"Chen Peng","year":"2019","unstructured":"Peng Chen, Jianzhong Liu, and Hao Chen. Matryoshka: Fuzzing Deeply Nested Branches. In ACM SIGSAC CCS, 2019."},{"key":"e_1_3_2_1_48_1","volume-title":"Long Lu. SAVIOR: Towards Bug-Driven Hybrid Testing. In IEEE Symposium on Security and Privacy","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Taowei, and Long Lu. SAVIOR: Towards Bug-Driven Hybrid Testing. In IEEE Symposium on Security and Privacy, Oakland, 2020. arXiv: 1906.07327."},{"key":"e_1_3_2_1_49_1","volume-title":"Bing Mao. PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. In ACM ASIA Conference on Computer and Communications Security, ASIACCS, 2019","author":"Chen Yaohui","year":"1905","unstructured":"Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, and Bing Mao. PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. In ACM ASIA Conference on Computer and Communications Security, ASIACCS, 2019. arXiv: 1905.10499."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1713254.1713257"},{"key":"e_1_3_2_1_51_1","volume-title":"Mathias Payer. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE Symposium on Security and Privacy","author":"Dinesh Sushant","year":"2020","unstructured":"Sushant Dinesh, Nathan Burow, Dongyan Xu, and Mathias Payer. RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization. In IEEE Symposium on Security and Privacy, Oakland, 2020."},{"key":"e_1_3_2_1_52_1","unstructured":"Dor1s. Testcase of pdf. https:\/\/github.com\/google\/AFL\/blob\/master\/testcases\/ others\/pdf\/small.pdf. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_53_1","unstructured":"Dor1s. Testcase of xml. https:\/\/github.com\/google\/AFL\/tree\/master\/testcases\/ others\/xml. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX WOOT","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. AFL: Combining Incremental Steps of Fuzzing Research. In USENIX WOOT, 2020."},{"key":"e_1_3_2_1_55_1","unstructured":"fixheaptiffcp. Libtiff fix. https:\/\/gitlab.com\/libtiff\/libtiff\/-\/commit\/ 88d79a45a31c74cba98c697892fed5f7db8b963a. (Accessed on 01\/19\/2023)."},{"key":"e_1_3_2_1_56_1","volume-title":"CollAFL: Path Sensitive Fuzzing. In IEEE Symposium on Security and Privacy","author":"Gan S.","year":"2018","unstructured":"S. Gan, C. Zhang, X. Qin, X. Tu, K. Li, Z. Pei, and Z. Chen. CollAFL: Path Sensitive Fuzzing. In IEEE Symposium on Security and Privacy, Oakland, 2018."},{"key":"e_1_3_2_1_57_1","first-page":"2577","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. {GREYONE}: Data flow sensitive fuzzing. In 29th USENIX Security Symposium (USENIX Security 20), pages 2577--2594, 2020."},{"key":"e_1_3_2_1_58_1","volume-title":"NDSS","author":"Garfinkel Tal","year":"2003","unstructured":"Tal Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In NDSS, 2003."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_1_60_1","first-page":"163","volume-title":"15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21)","author":"Khan Tanvir Ahmed","year":"2021","unstructured":"Tanvir Ahmed Khan, Ian Neal, Gilles Pokam, Barzan Mozafari, and Baris Kasikci. Dmon: Efficient detection and correction of data locality problems using selective profiling. In 15th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21), pages 163--181, 2021."},{"key":"e_1_3_2_1_61_1","first-page":"36","volume-title":"The linux ram disk. LiNUX magzine","author":"Koutoupis Petros","year":"2009","unstructured":"Petros Koutoupis. The linux ram disk. LiNUX magzine, pages 36--39, 2009."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"e_1_3_2_1_63_1","volume-title":"Lemieux and Koushik Sen. FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage. In ACM\/IEEE International Conference on Automated Software Engineering, ASE","author":"Caroline","year":"2018","unstructured":"Caroline Lemieux and Koushik Sen. FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage. In ACM\/IEEE International Conference on Automated Software Engineering, ASE, 2018."},{"key":"e_1_3_2_1_64_1","volume-title":"Cybersecurity","author":"Li Jun","year":"2018","unstructured":"Jun Li, Bodong Zhao, and Chao Zhang. Fuzzing: a survey. Cybersecurity, 2018."},{"key":"e_1_3_2_1_65_1","volume-title":"Alwen Tiu. Steelix: Program-state Based Binary Fuzzing. In ACM Joint Meeting on Foundations of Software Engineering, ESEC\/FSE","author":"Li Yuekang","year":"2017","unstructured":"Yuekang Li, Bihuan Chen, Mahinthan Chandramohan, Shang-Wei Lin, Yang Liu, and Alwen Tiu. Steelix: Program-state Based Binary Fuzzing. In ACM Joint Meeting on Foundations of Software Engineering, ESEC\/FSE, 2017."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"e_1_3_2_1_67_1","volume-title":"Raheem Beyah. MOPT: Optimize Mutation Scheduling for Fuzzers. In USENIX Security Symposium, USENIX","author":"Lv Chenyang","year":"2019","unstructured":"Chenyang Lv, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. MOPT: Optimize Mutation Scheduling for Fuzzers. In USENIX Security Symposium, USENIX, 2019."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.23162"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_70_1","volume-title":"Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing","author":"Nagy Stefan","year":"2019","unstructured":"Stefan Nagy and Matthew Hicks. Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing. In IEEE S&P, 2019."},{"key":"e_1_3_2_1_71_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Peng Hui","year":"2018","unstructured":"Hui Peng, Yan Shoshitaishvili, and Mathias Payer. T-Fuzz: fuzzing by program transformation. In IEEE Symposium on Security and Privacy, Oakland, 2018."},{"key":"e_1_3_2_1_72_1","volume-title":"Herbert Bos. VUzzer: Application-aware Evolutionary Fuzzing. In Network and Distributed System Security Symposium, NDSS","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. VUzzer: Application-aware Evolutionary Fuzzing. In Network and Distributed System Security Symposium, NDSS, 2017."},{"key":"e_1_3_2_1_73_1","volume-title":"Introducing cloudlab: Scientific infrastructure for advancing cloud architectures and applications. the magazine of USENIX & SAGE, 39(6):36--38","author":"Ricci Robert","year":"2014","unstructured":"Robert Ricci, Eric Eide, and CloudLab Team. Introducing cloudlab: Scientific infrastructure for advancing cloud architectures and applications. the magazine of USENIX & SAGE, 39(6):36--38, 2014."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368826.3377914"},{"key":"e_1_3_2_1_75_1","volume-title":"30th USENIX Security Symposium","author":"Schumilo Sergej","year":"2021","unstructured":"Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon W\u00f6rner, and Thorsten Holz. Nyx: Greybox hypervisor fuzzing using fast snapshots and affine types. In 30th USENIX Security Symposium, 2021."},{"key":"e_1_3_2_1_76_1","volume-title":"USENIX Security Symposium, USENIX","author":"Schumilo Sergej","year":"2017","unstructured":"Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, and Thorsten Holz. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. In USENIX Security Symposium, USENIX, 2017."},{"key":"e_1_3_2_1_77_1","first-page":"309","volume-title":"Addresssanitizer: A fast address sanity checker. In 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12)","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitriy Vyukov. Addresssanitizer: A fast address sanity checker. In 2012 {USENIX} Annual Technical Conference ({USENIX} {ATC} 12), pages 309--318, 2012."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2016.043"},{"key":"e_1_3_2_1_79_1","volume-title":"USENIX Security Symposium, USENIX","author":"Serebryany Kostya","year":"2017","unstructured":"Kostya Serebryany. OSS-Fuzz - Google's continuous fuzzing service for open source software. In USENIX Security Symposium, USENIX, 2017."},{"key":"e_1_3_2_1_80_1","volume-title":"Suman Jana. NEUZZ: Efficient Fuzzing with Neural Program Smoothing. In IEEE Symposium on Security and Privacy","author":"She Dongdong","year":"2019","unstructured":"Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, and Suman Jana. NEUZZ: Efficient Fuzzing with Neural Program Smoothing. In IEEE Symposium on Security and Privacy, Oakland, 2019."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2015.7054186"},{"key":"e_1_3_2_1_82_1","volume-title":"TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. In IEEE Symposium on Security and Privacy","author":"Wang T.","year":"2010","unstructured":"T. Wang, T. Wei, G. Gu, and W. Zou. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. In IEEE Symposium on Security and Privacy, Oakland, 2010."},{"key":"e_1_3_2_1_83_1","volume-title":"Pgo and llvm status and current work. https:\/\/llvm.org\/devmtg\/2013-11\/slides\/Carruth-PGO.pdf","author":"Wilson Bob","year":"2013","unstructured":"Bob Wilson, Diego Novillo, and Chandler Carruth. Pgo and llvm status and current work. https:\/\/llvm.org\/devmtg\/2013-11\/slides\/Carruth-PGO.pdf, 2013."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134046"},{"key":"e_1_3_2_1_85_1","volume-title":"ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery","author":"You Wei","year":"2019","unstructured":"Wei You, Xueqiang Wang, Shiqing Ma, Jianjun Huang, Xiangyu Zhang, XiaoFeng Wang, and Bin Liang. ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery. In IEEE S&P, 2019."},{"key":"e_1_3_2_1_86_1","unstructured":"Michal Zalewski. American fuzzy lop. http:\/\/lcamtuf.coredump.cx\/afl 2014."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510063"},{"key":"e_1_3_2_1_88_1","volume-title":"ACM Computing Surveys (CSUR)","author":"Zhu Xiaogang","year":"2022","unstructured":"Xiaogang Zhu, Sheng Wen, Seyit Camtepe, and Yang Xiang. Fuzzing: a survey for roadmap. ACM Computing Surveys (CSUR), 2022."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616636","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:48:06Z","timestamp":1755740886000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616636"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":88,"alternative-id":["10.1145\/3576915.3616636","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616636","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}