{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:34:19Z","timestamp":1752669259668,"version":"3.41.0"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,4,4]],"date-time":"2023-04-04T00:00:00Z","timestamp":1680566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,4,30]]},"abstract":"<jats:p>This artifact contains the source code and instructions to reproduce the evaluation results of the article \u201cFuzzing Configurations of Program Options.\u201d The source code includes the configuration grammars for six target programs, the scripts to generate configuration stubs, and the scripts to post-process fuzzing results. The README of the artifact includes the steps to prepare the experimental environment on a clean Ubuntu machine and step-by-step commands to reproduce the evaluation experiments. A VirtualBox image with ConfigFuzz properly set up is also included.<\/jats:p>","DOI":"10.1145\/3580601","type":"journal-article","created":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T12:10:35Z","timestamp":1675167035000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Fuzzing Configurations of Program Options - RCR Report"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3811-675X","authenticated-orcid":false,"given":"Zenong","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5070-0107","authenticated-orcid":false,"given":"George","family":"Klees","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7037-7888","authenticated-orcid":false,"given":"Eric","family":"Wang","sequence":"additional","affiliation":[{"name":"Poolesville High School, Poolesville, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2759-9223","authenticated-orcid":false,"given":"Michael","family":"Hicks","sequence":"additional","affiliation":[{"name":"University of Maryland and Amazon, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2826-1857","authenticated-orcid":false,"given":"Shiyi","family":"Wei","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,4]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"(n. d.). American Fuzzy Lop (AFL). https:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_3_1_3_2","unstructured":"(n. d.). Clang: A C language family frontend for LLVM. https:\/\/clang.llvm.org\/."},{"key":"e_1_3_1_4_2","unstructured":"(n. d.). cxxfilt. https:\/\/sourceware.org\/binutils\/docs\/binutils\/c_002b_002bfilt.html."},{"key":"e_1_3_1_5_2","unstructured":"(n. d.). FFmpeg. https:\/\/ffmpeg.org."},{"key":"e_1_3_1_6_2","unstructured":"(n. d.). FuzzBench: Fuzzer Benchmarking as a Service. https:\/\/github.com\/google\/fuzzbench\/."},{"key":"e_1_3_1_7_2","unstructured":"(n. d.). gif2png. http:\/\/www.catb.org\/esr\/gif2png\/."},{"key":"e_1_3_1_8_2","unstructured":"(n. d.). nm. https:\/\/sourceware.org\/binutils\/docs\/binutils\/nm.html."},{"key":"e_1_3_1_9_2","unstructured":"(n. d.). objdump. https:\/\/sourceware.org\/binutils\/docs\/binutils\/objdump.html."},{"key":"e_1_3_1_10_2","unstructured":"(n. d.). xmllint. http:\/\/xmlsoft.org\/xmllint.html."},{"key":"e_1_3_1_11_2","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT\u201920)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining incremental steps of fuzzing research. In 14th USENIX Workshop on Offensive Technologies (WOOT\u201920). USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/fioraldi."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.5555\/2600239.2600241"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580601","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580601","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:36Z","timestamp":1750178796000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580601"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,4]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4,30]]}},"alternative-id":["10.1145\/3580601"],"URL":"https:\/\/doi.org\/10.1145\/3580601","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"type":"print","value":"1049-331X"},{"type":"electronic","value":"1557-7392"}],"subject":[],"published":{"date-parts":[[2023,4,4]]},"assertion":[{"value":"2022-11-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-12-05","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}