{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T10:05:26Z","timestamp":1770285926831,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,12]],"date-time":"2023-07-12T00:00:00Z","timestamp":1689120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,12]]},"DOI":"10.1145\/3597926.3598136","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:12:53Z","timestamp":1689279173000},"page":"1295-1306","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Rare Path Guided Fuzzing"],"prefix":"10.1145","author":[{"given":"Seemanta","family":"Saha","sequence":"first","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Laboni","family":"Sarker","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Md","family":"Shafiuzzaman","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Chaofan","family":"Shou","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Albert","family":"Li","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Ganesh","family":"Sankaran","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]},{"given":"Tevfik","family":"Bultan","sequence":"additional","affiliation":[{"name":"University of California at Santa Barbara, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2006. laf-intel. https:\/\/lafintel.wordpress.com\/ \t\t\t\t  2006. laf-intel. https:\/\/lafintel.wordpress.com\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2022. Calculator. https:\/\/github.com\/btmills\/calculator \t\t\t\t  2022. Calculator. https:\/\/github.com\/btmills\/calculator"},{"key":"e_1_3_2_1_3_1","unstructured":"2022. CodeQL. https:\/\/codeql.github.com \t\t\t\t  2022. CodeQL. https:\/\/codeql.github.com"},{"key":"e_1_3_2_1_4_1","unstructured":"2022. Docker for AFL++. https:\/\/hub.docker.com\/r\/aflplusplus\/aflplusplus \t\t\t\t  2022. Docker for AFL++. https:\/\/hub.docker.com\/r\/aflplusplus\/aflplusplus"},{"key":"e_1_3_2_1_5_1","unstructured":"2022. Docker for FairFuzz. https:\/\/hub.docker.com\/r\/zjuchenyuan\/fairfuzz \t\t\t\t  2022. Docker for FairFuzz. https:\/\/hub.docker.com\/r\/zjuchenyuan\/fairfuzz"},{"key":"e_1_3_2_1_6_1","unstructured":"2023. SV-Benchmark:seq-mthreded. https:\/\/gitlab.com\/sosy-lab\/benchmarking\/sv-benchmarks\/-\/tree\/main\/c\/seq-mthreaded \t\t\t\t  2023. SV-Benchmark:seq-mthreded. https:\/\/gitlab.com\/sosy-lab\/benchmarking\/sv-benchmarks\/-\/tree\/main\/c\/seq-mthreaded"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/390013.808479"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21690-4_15"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2017.44"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.182"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-72013-1_24"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99429-7_18"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_1_15_1","unstructured":"Sergey Bratus Axel Hansen and Anna Shubina. 2008. LZfuzz: a fast compression-based fuzzer for poorly documented protocols. \t\t\t\t  Sergey Bratus Axel Hansen and Anna Shubina. 2008. LZfuzz: a fast compression-based fuzzer for poorly documented protocols."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_17_1","first-page":"209","article-title":"Klee: unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson R Engler . 2008 . Klee: unassisted and automatic generation of high-coverage tests for complex systems programs .. In OSDI. 8 , 209 \u2013 224 . Cristian Cadar, Daniel Dunbar, and Dawson R Engler. 2008. Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.. In OSDI. 8, 209\u2013224.","journal-title":"OSDI."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635899"},{"key":"e_1_3_2_1_19_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi , Dominik Maier , Heiko Ei\u00df feldt, and Marc Heuse . 2020 . $AFL++$: Combining Incremental Steps of Fuzzing Research . In 14th USENIX Workshop on Offensive Technologies (WOOT 20) . Andrea Fioraldi, Dominik Maier, Heiko Ei\u00df feldt, and Marc Heuse. 2020. $AFL++$: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20)."},{"key":"e_1_3_2_1_20_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan , Chao Zhang , Peng Chen , Bodong Zhao , Xiaojun Qin , Dong Wu , and Zuoning Chen . 2020 . $GREYONE$: Data flow sensitive fuzzing . In 29th USENIX Security Symposium (USENIX Security 20) . 2577\u20132594. Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. 2020. $GREYONE$: Data flow sensitive fuzzing. In 29th USENIX Security Symposium (USENIX Security 20). 2577\u20132594."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336773"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375607"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_24_1","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Holler Christian","year":"2012","unstructured":"Christian Holler , Kim Herzig , and Andreas Zeller . 2012 . Fuzzing with code fragments . In 21st USENIX Security Symposium (USENIX Security 12) . 445\u2013458. Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with code fragments. In 21st USENIX Security Symposium (USENIX Security 12). 445\u2013458."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-020-00569-w"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-020-00569-w"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2961339"},{"key":"e_1_3_2_1_31_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu , Shouling Ji , Chao Zhang , Yuwei Li , Wei-Han Lee , Yu Song , and Raheem Beyah . 2019 . $MOPT$: Optimized mutation scheduling for fuzzers . In 28th USENIX Security Symposium (USENIX Security 19) . 1949\u20131966. Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. $MOPT$: Optimized mutation scheduling for fuzzers. In 28th USENIX Security Symposium (USENIX Security 19). 1949\u20131966."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314651"},{"key":"e_1_3_2_1_33_1","unstructured":"Micha\u0142 Zalewski. 2014. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/ \t\t\t\t  Micha\u0142 Zalewski. 2014. American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_34_1","volume-title":"CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs","author":"Necula George C.","year":"2002","unstructured":"George C. Necula , Scott McPeak , Shree P. Rahul , and Westley Weimer . 2002 . CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs . In Compiler Construction, R. Nigel Horspool (Ed.). Springer Berlin Heidelberg , Berlin, Heidelberg . 213\u2013228. isbn:978-3-540-45937-8 George C. Necula, Scott McPeak, Shree P. Rahul, and Westley Weimer. 2002. CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs. In Compiler Construction, R. Nigel Horspool (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg. 213\u2013228. isbn:978-3-540-45937-8"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10243142"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510227"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev.2017.14"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510089"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.714"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2016.7778820"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"e_1_3_2_1_46_1","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Yun Insu","year":"2018","unstructured":"Insu Yun , Sangho Lee , Meng Xu , Yeongjin Jang , and Taesoo Kim . 2018 . $QSYM$: A practical concolic execution engine tailored for hybrid fuzzing . In 27th USENIX Security Symposium (USENIX Security 18) . 745\u2013761. Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. $QSYM$: A practical concolic execution engine tailored for hybrid fuzzing. In 27th USENIX Security Symposium (USENIX Security 18). 745\u2013761."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23504"}],"event":{"name":"ISSTA '23: 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Seattle WA USA","acronym":"ISSTA '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598136","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597926.3598136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:43Z","timestamp":1750182523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597926.3598136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,12]]},"references-count":47,"alternative-id":["10.1145\/3597926.3598136","10.1145\/3597926"],"URL":"https:\/\/doi.org\/10.1145\/3597926.3598136","relation":{},"subject":[],"published":{"date-parts":[[2023,7,12]]},"assertion":[{"value":"2023-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}