{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:18:40Z","timestamp":1769728720769,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,10]],"date-time":"2023-07-10T00:00:00Z","timestamp":1688947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1743363,2027208"],"award-info":[{"award-number":["1743363,2027208"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,10]]},"DOI":"10.1145\/3579856.3582813","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:52:13Z","timestamp":1688568733000},"page":"232-246","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9248-1627","authenticated-orcid":false,"given":"Sirus","family":"Shahini","sequence":"first","affiliation":[{"name":"University of Utah, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5905-9515","authenticated-orcid":false,"given":"Mu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Utah, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5054-7547","authenticated-orcid":false,"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6904-5192","authenticated-orcid":false,"given":"Robert","family":"Ricci","sequence":"additional","affiliation":[{"name":"University of Utah, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. Replacing ptrace(). https:\/\/lwn.net\/Articles\/371501.  2010. Replacing ptrace(). https:\/\/lwn.net\/Articles\/371501."},{"key":"e_1_3_2_1_2_1","unstructured":"2016. The Cyber Grand Challenge. https:\/\/blogs.grammatech.com\/the-cyber-grand-challenge.  2016. The Cyber Grand Challenge. https:\/\/blogs.grammatech.com\/the-cyber-grand-challenge."},{"key":"e_1_3_2_1_3_1","unstructured":"2022. American Fuzzy Lop. https:\/\/lcamtuf.coredump.cx\/afl\/.  2022. American Fuzzy Lop. https:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Pin. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/pin-a-dynamic-binary-instrumentation-tool.html.  2022. Pin. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/pin-a-dynamic-binary-instrumentation-tool.html."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Arvin. https:\/\/github.com\/0xsirus\/arvin.  2023. Arvin. https:\/\/github.com\/0xsirus\/arvin."},{"key":"e_1_3_2_1_6_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence. In Symposium on Network and Distributed System Security (NDSS).","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann , Sergej Schumilo , Tim Blazytko , Robert Gawlik , and Thorsten Holz . 2019 . REDQUEEN: Fuzzing with Input-to-State Correspondence. In Symposium on Network and Distributed System Security (NDSS). Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence. In Symposium on Network and Distributed System Security (NDSS)."},{"key":"e_1_3_2_1_7_1","volume-title":"Black-Box Testing: Techniques for Functional Testing of Software and Systems","author":"Beizer Boris","unstructured":"Boris Beizer . 1995. Black-Box Testing: Techniques for Functional Testing of Software and Systems . Wiley . Boris Beizer. 1995. Black-Box Testing: Techniques for Functional Testing of Software and Systems. Wiley."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Ella Bounimova Patrice Godefroid and David Molnar. 2012. Billions and Billions of Constraints: Whitebox Fuzz Testing in Production. https:\/\/www.microsoft.com\/en-us\/research\/publication\/billions-and-billions-of-constraints-whitebox-fuzz-testing-in-production\/.  Ella Bounimova Patrice Godefroid and David Molnar. 2012. Billions and Billions of Constraints: Whitebox Fuzz Testing in Production. https:\/\/www.microsoft.com\/en-us\/research\/publication\/billions-and-billions-of-constraints-whitebox-fuzz-testing-in-production\/.","DOI":"10.1109\/ICSE.2013.6606558"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_11_1","volume-title":"Savior: Towards bug-driven hybrid testing. In 2020 IEEE SP","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen , Peng Li , Jun Xu , Shengjian Guo , Rundong Zhou , Yulong Zhang , Tao Wei , and Long Lu . 2020 . Savior: Towards bug-driven hybrid testing. In 2020 IEEE SP . IEEE. Yaohui Chen, Peng Li, Jun Xu, Shengjian Guo, Rundong Zhou, Yulong Zhang, Tao Wei, and Long Lu. 2020. Savior: Towards bug-driven hybrid testing. In 2020 IEEE SP. IEEE."},{"key":"e_1_3_2_1_12_1","unstructured":"Jared\u00a0D. DeMott Richard\u00a0J. Enbody and William\u00a0F. Punch. 2007. Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing. In Black hat USA.  Jared\u00a0D. DeMott Richard\u00a0J. Enbody and William\u00a0F. Punch. 2007. Revolutionizing the field of grey-box attack surface testing with evolutionary fuzzing. In Black hat USA."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the USENIX ATC.","author":"Duplyakin Dmitry","year":"2019","unstructured":"Dmitry Duplyakin , Robert Ricci , Aleksander Maricq , Gary Wong , Jonathon Duerig , Eric Eide , Leigh Stoller , Mike Hibler , David Johnson , Kirk Webb , Aditya Akella , Kuangching Wang , Glenn Ricart , Larry Landweber , Chip Elliott , Michael Zink , Emmanuel Cecchet , Snigdhaswin Kar , and Prabodh Mishra . 2019 . The Design and Operation of CloudLab . In Proceedings of the USENIX ATC. Dmitry Duplyakin, Robert Ricci, Aleksander Maricq, Gary Wong, Jonathon Duerig, Eric Eide, Leigh Stoller, Mike Hibler, David Johnson, Kirk Webb, Aditya Akella, Kuangching Wang, Glenn Ricart, Larry Landweber, Chip Elliott, Michael Zink, Emmanuel Cecchet, Snigdhaswin Kar, and Prabodh Mishra. 2019. The Design and Operation of CloudLab. In Proceedings of the USENIX ATC."},{"key":"e_1_3_2_1_14_1","unstructured":"S. Embleton S. Sparks and R. Cunningham. 2006. \"Sidewinder\": An Evolutionary Guidance System for Malicious Input Crafting. In Black hat USA.  S. Embleton S. Sparks and R. Cunningham. 2006. \"Sidewinder\": An Evolutionary Guidance System for Malicious Input Crafting. In Black hat USA."},{"key":"e_1_3_2_1_15_1","unstructured":"Google Inc.2022. HonggFuzz. https:\/\/github.com\/google\/honggfuzz.  Google Inc.2022. HonggFuzz. https:\/\/github.com\/google\/honggfuzz."},{"key":"e_1_3_2_1_16_1","unstructured":"Google Inc.2022. HonggFuzz Trophies. https:\/\/honggfuzz.dev\/#trophies.  Google Inc.2022. HonggFuzz Trophies. https:\/\/honggfuzz.dev\/#trophies."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_19_1","unstructured":"Valentin\u00a0J.M. Manes HyungSeok Han Choongwoo Han Sang\u00a0Kil Cha Manuel Egele Edward\u00a0J. Schwartz and Maverick Woo. 2019. The Art Science and Engineering of Fuzzing: A Survey. In ACM Computing Surveys.  Valentin\u00a0J.M. Manes HyungSeok Han Choongwoo Han Sang\u00a0Kil Cha Manuel Egele Edward\u00a0J. Schwartz and Maverick Woo. 2019. The Art Science and Engineering of Fuzzing: A Survey. In ACM Computing Surveys."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"G.\u00a0J. Myers C. Sandler and T. Badgett. 2011. The Art of Software Testing. Wiley.  G.\u00a0J. Myers C. Sandler and T. Badgett. 2011. The Art of Software Testing. Wiley.","DOI":"10.1002\/9781119202486"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Stefan Nagy and Matthew Hicks. 2019. Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing. In 2019 IEEE SP.  Stefan Nagy and Matthew Hicks. 2019. Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing. In 2019 IEEE SP.","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_1_22_1","unstructured":"Sebastian \u00d6sterlund Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In USENIX Security.  Sebastian \u00d6sterlund Kaveh Razavi Herbert Bos and Cristiano Giuffrida. 2020. ParmeSan: Sanitizer-guided Greybox Fuzzing. In USENIX Security."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS.  Sanjay Rawat Vivek Jain Ashish Kumar Lucian Cojocar Cristiano Giuffrida and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In NDSS.","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings USENIX ATC.","author":"Rebert Alexander","year":"2014","unstructured":"Alexander Rebert , Cha\u00a0Sang Li , Thanassis Avgerinos , Jonathan Foote , David Warren , Gustavo Grieco , and David Brumley . 2014 . Optimizing Seed Selection for Fuzzing . In Proceedings USENIX ATC. Alexander Rebert, Cha\u00a0Sang Li, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing Seed Selection for Fuzzing. In Proceedings USENIX ATC."},{"key":"e_1_3_2_1_25_1","volume-title":"OSS-Fuzz - Google\u2019s continuous fuzzing service for open source software","author":"Serebryany Kostya","unstructured":"Kostya Serebryany . 2017. OSS-Fuzz - Google\u2019s continuous fuzzing service for open source software . USENIX Association . Kostya Serebryany. 2017. OSS-Fuzz - Google\u2019s continuous fuzzing service for open source software. USENIX Association."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Y. Shoshitaishvili R. Wang C. Salls N. Stephens M. Polino A. Dutcher J. Grosen S. Feng C. Hauser C. Kruegel and G. Vigna. 2016. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In 2016 SP.  Y. Shoshitaishvili R. Wang C. Salls N. Stephens M. Polino A. Dutcher J. Grosen S. Feng C. Hauser C. Kruegel and G. Vigna. 2016. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. In 2016 SP.","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_27_1","volume-title":"Driller: AugmentingFuzzing Through Selective Symbolic Execution. In NDSS.","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens , John Grosen , Christopher Salls , Audrey Dutcher , Ruoyu Wang , Jacopo Corbetta , Yan Shoshitaishvili , Christopher Kruegel , and Giovanni Vigna . 2016 . Driller: AugmentingFuzzing Through Selective Symbolic Execution. In NDSS. Nick Stephens, John Grosen, Christopher Salls, Audrey Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: AugmentingFuzzing Through Selective Symbolic Execution. In NDSS."},{"key":"e_1_3_2_1_28_1","volume-title":"Fuzzing for Software Security Testing and Quality Assurance","author":"Takanen Ari","unstructured":"Ari Takanen and Charlie Miller . 2008. Fuzzing for Software Security Testing and Quality Assurance . Artech House . Ari Takanen and Charlie Miller. 2008. Fuzzing for Software Security Testing and Quality Assurance. Artech House."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Yanhao Wang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao Dinghao Wu and Purui Su. 2020. Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. In NDSS.  Yanhao Wang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao Dinghao Wu and Purui Su. 2020. Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. In NDSS.","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510174"}],"event":{"name":"ASIA CCS '23: ACM ASIA Conference on Computer and Communications Security","location":"Melbourne VIC Australia","acronym":"ASIA CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3579856.3582813","content-type":"text\/html","content-version":"vor","intended-application":"syndication"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:27Z","timestamp":1750182687000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579856.3582813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,10]]},"references-count":31,"alternative-id":["10.1145\/3579856.3582813","10.1145\/3579856"],"URL":"https:\/\/doi.org\/10.1145\/3579856.3582813","relation":{},"subject":[],"published":{"date-parts":[[2023,7,10]]},"assertion":[{"value":"2023-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}