{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T18:26:43Z","timestamp":1770229603208,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,12]]},"DOI":"10.1145\/3597503.3639172","type":"proceedings-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T16:43:26Z","timestamp":1712940206000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["FuzzInMem: Fuzzing Programs via In-memory Structures"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5319-1160","authenticated-orcid":false,"given":"Xuwei","family":"Liu","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1009-6627","authenticated-orcid":false,"given":"Wei","family":"You","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7232-0650","authenticated-orcid":false,"given":"Yapeng","family":"Ye","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6515-0021","authenticated-orcid":false,"given":"Zhuo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4403-0060","authenticated-orcid":false,"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9544-2500","authenticated-orcid":false,"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2010. SPIKE Fuzzer. http:\/\/resources.infosecinstitute.com\/intro-to-fuzzing."},{"key":"e_1_3_2_1_2_1","unstructured":"2020. GramFuzz. https:\/\/github.com\/d0c-s4vage\/gramfuzz."},{"key":"e_1_3_2_1_3_1","unstructured":"2021. American Fuzzy Lop (AFL). http:\/\/lcamtuf.coredump.cx\/afl."},{"key":"e_1_3_2_1_4_1","unstructured":"2021. Google Fuzzer Test Suite. https:\/\/github.com\/google\/fuzzer-test-suite."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. libfuzzer. https:\/\/llvm.org\/docs\/LibFuzzer.html."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Peach Fuzzer. https:\/\/www.peach.tech\/products\/peach-fuzzer."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Poppler. https:\/\/poppler.freedesktop.org."},{"key":"e_1_3_2_1_8_1","volume-title":"32st USENIX Security Symposium (USENIX Security 23)","author":"Bars Nils","year":"2023","unstructured":"Nils Bars, Moritz Schloegel, Tobias Scharnowski, Nico Schiller, and Thorsten Holz. 2023. Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge. In 32st USENIX Security Symposium (USENIX Security 23). USENIX Association."},{"key":"e_1_3_2_1_9_1","volume-title":"28th USENIX Security Symposium, USENIX Security 2019","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko, Cornelius Aschermann, Moritz Schl\u00f6gel, Ali Abbasi, Sergej Schumilo, Simon W\u00f6rner, and Thorsten Holz. 2019. GRIMOIRE: Synthesizing Structure while Fuzzing. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019. 1985--2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the Network and Distributed System Security Symposium, NDSS 2010","author":"Caballero Juan","year":"2010","unstructured":"Juan Caballero, Noah M. Johnson, Stephen McCamant, and Dawn Song. 2010. Binary Code Extraction and Interface Identification for Security Applications. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010. The Internet Society. https:\/\/www.ndss-symposium.org\/ndss2010\/binary-code-extraction-and-interface-identification-security-applications"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_14_1","volume-title":"MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. In International Symposium on Recent Advances in Intrusion Detection.","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen, Mansour Ahmadi, Reza Mirzazade Farkhani, Boyu Wang, and Long Lu. 2020. MEUZZ: Smart Seed Scheduling for Hybrid Fuzzing. In International Symposium on Recent Advances in Intrusion Detection."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.11"},{"key":"e_1_3_2_1_16_1","volume-title":"FormatFuzzer: Effective Fuzzing of Binary File Formats. CoRR abs\/2109.11277","author":"Dutra Rafael","year":"2021","unstructured":"Rafael Dutra, Rahul Gopinath, and Andreas Zeller. 2021. FormatFuzzer: Effective Fuzzing of Binary File Formats. CoRR abs\/2109.11277 (2021). arXiv:2109.11277 https:\/\/arxiv.org\/abs\/2109.11277"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397372"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 14th USENIX Conference on Offensive Technologies (WOOT'20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In Proceedings of the 14th USENIX Conference on Offensive Technologies (WOOT'20). USENIX Association, USA, Article 10, 1 pages."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.40"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786844"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.10"},{"key":"e_1_3_2_1_25_1","volume-title":"Constraint-guided Directed Greybox Fuzzing. In USENIX Security Symposium.","author":"Lee Gwangmu","year":"2021","unstructured":"Gwangmu Lee, Woo-Jae Shim, and Byoungyoung Lee. 2021. Constraint-guided Directed Greybox Fuzzing. In USENIX Security Symposium."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"e_1_3_2_1_27_1","volume-title":"FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage. CoRR abs\/1709.07101","author":"Lemieux Caroline","year":"2017","unstructured":"Caroline Lemieux and Koushik Sen. 2017. FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage. CoRR abs\/1709.07101 (2017)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534403"},{"key":"e_1_3_2_1_31_1","volume-title":"MOPT: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium, USENIX Security 2019","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. MOPT: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14--16, 2019, Nadia Heninger and Patrick Traynor (Eds.). USENIX Association, 1949--1966. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lyu"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534385"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3339002"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00107"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360600"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00067"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","unstructured":"V. Pham M. B\u00f6hme A. E. Santosa A. R. Caciulescu and A. Roychoudhury. 2019. Smart Greybox Fuzzing. IEEE Transactions on Software Engineering (2019). 10.1109\/TSE.2019.2941681","DOI":"10.1109\/TSE.2019.2941681"},{"key":"e_1_3_2_1_40_1","volume-title":"Not all bytes are equal: Neural byte sieve for fuzzing. CoRR abs\/1711.04596","author":"Rajpal Mohit","year":"2017","unstructured":"Mohit Rajpal, William Blum, and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR abs\/1711.04596 (2017)."},{"key":"e_1_3_2_1_41_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish KumVuzzerar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671280"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380399"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23226"},{"key":"e_1_3_2_1_45_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Saltaformaggio Brendan","year":"2016","unstructured":"Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, and Golden G. Richard III. 2016. Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016, Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 1137--1151. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/saltaformaggio"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Saltaformaggio Brendan","year":"2014","unstructured":"Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, and Dongyan Xu. 2014. DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014, Kevin Fu and Jaeyeon Jung (Eds.). USENIX Association, 255--269. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/saltaformaggio"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24486"},{"key":"e_1_3_2_1_52_1","unstructured":"Wikipedia. 2021. PDF. https:\/\/en.wikipedia.org\/wiki\/PDF."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00057"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium (SEC'20)","author":"Yue Tai","year":"2020","unstructured":"Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou. 2020. EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. In Proceedings of the 29th USENIX Conference on Security Symposium (SEC'20). USENIX Association, USA, Article 130, 18 pages."},{"key":"e_1_3_2_1_56_1","volume-title":"27th USENIX Security Symposium, USENIX Security","author":"Yun Insu","year":"2018","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In 27th USENIX Security Symposium, USENIX Security 2018. 745--761."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00109"}],"event":{"name":"ICSE '24: IEEE\/ACM 46th International Conference on Software Engineering","location":"Lisbon Portugal","acronym":"ICSE '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"]},"container-title":["Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639172","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597503.3639172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:12Z","timestamp":1750286952000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597503.3639172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":57,"alternative-id":["10.1145\/3597503.3639172","10.1145\/3597503"],"URL":"https:\/\/doi.org\/10.1145\/3597503.3639172","relation":{},"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"2024-04-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}