{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:12:06Z","timestamp":1775873526928,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62141215, 62272220"],"award-info":[{"award-number":["62141215, 62272220"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science, Technology and Innovation Commission of Shenzhen Municipality","award":["CJGJZD20200617103001003"],"award-info":[{"award-number":["CJGJZD20200617103001003"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,17]]},"DOI":"10.1145\/3605157.3605172","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:22:08Z","timestamp":1689279728000},"page":"21-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["DiPri: Distance-Based Seed Prioritization for Greybox Fuzzing (Registered Report)"],"prefix":"10.1145","author":[{"given":"Ruixiang","family":"Qian","sequence":"first","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Quanjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Chunrong","family":"Fang","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AFL. Accessed 2023-04-30. American Fuzzy Lop Github Repository. https:\/\/github.com\/google\/AFL \t\t\t\t  AFL. Accessed 2023-04-30. American Fuzzy Lop Github Repository. https:\/\/github.com\/google\/AFL"},{"key":"e_1_3_2_1_2_1","unstructured":"AFL++Team. Accessed 2023-04-30. American Fuzzy Lop Plus Plus (afl++). https:\/\/github.com\/AFLplusplus\/AFLplusplus \t\t\t\t  AFL++Team. Accessed 2023-04-30. American Fuzzy Lop Plus Plus (afl++). https:\/\/github.com\/AFLplusplus\/AFLplusplus"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_1_4_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Balzarotti Davide","year":"2021","unstructured":"Davide Balzarotti . 2021 . The Use of Likely Invariants as Feedback for Fuzzers . In 30th USENIX Security Symposium (USENIX Security 21) . https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/fioraldi Davide Balzarotti. 2021. The Use of Likely Invariants as Feedback for Fuzzers. In 30th USENIX Security Symposium (USENIX Security 21). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/fioraldi"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510230"},{"key":"e_1_3_2_1_9_1","volume-title":"MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. In 29th USENIX Security Symposium (Security\u201920)","author":"Chen Hongxu","year":"2020","unstructured":"Hongxu Chen , Shengjian Guo , Yinxing Xue , Yulei Sui , Cen Zhang , Yuekang Li , Haijun Wang , and Yang Liu . 2020 . MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. In 29th USENIX Security Symposium (Security\u201920) . 2325\u20132342. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/chen-hongxu Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, and Yang Liu. 2020. MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. In 29th USENIX Security Symposium (Security\u201920). 2325\u20132342. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/chen-hongxu"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/qrs54544.2021.00036"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.02.022"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0164-1212(01)00028-0"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/qsic.2013.19"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3478520"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2532443.2532460"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833751"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942921"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2018.12.007"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510628"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-008-9047-6"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3586027"},{"key":"e_1_3_2_1_24_1","volume-title":"Mopt: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium (Security\u201919)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu , Shouling Ji , Chao Zhang , Yuwei Li , Wei-Han Lee , Yu Song , and Raheem Beyah . 2019 . Mopt: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium (Security\u201919) . 1949\u20131966. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lyu Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. Mopt: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium (Security\u201919). 1949\u20131966. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lyu"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2019.2946563"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/tr.2019.2892230"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588045"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510182"},{"key":"e_1_3_2_1_30_1","volume-title":"Advances in Neural Information Processing Systems. 25, Curran Associates","author":"Norouzi Mohammad","unstructured":"Mohammad Norouzi , David J Fleet , and Russ R Salakhutdinov . 2012. Hamming Distance Metric Learning . In Advances in Neural Information Processing Systems. 25, Curran Associates , Inc .. Mohammad Norouzi, David J Fleet, and Russ R Salakhutdinov. 2012. Hamming Distance Metric Learning. In Advances in Neural Information Processing Systems. 25, Curran Associates, Inc.."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3339002"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3339069"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404370"},{"key":"e_1_3_2_1_34_1","volume-title":"Optimizing Seed Selection for Fuzzing. In 23rd USENIX Security Symposium (Security\u201914)","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert , Sang Kil Cha , Thanassis Avgerinos , Jonathan Foote , David Warren , Gustavo Grieco , and David Brumley . 2014 . Optimizing Seed Selection for Fuzzing. In 23rd USENIX Security Symposium (Security\u201914) . 861\u2013875. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/rebert Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing Seed Selection for Fuzzing. In 23rd USENIX Security Symposium (Security\u201914). 861\u2013875. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/rebert"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1295074.1295091"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833761"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464814"},{"key":"e_1_3_2_1_38_1","volume-title":"The automatic generation of software test data using genetic algorithms","author":"Sthamer Harmen-Hinrich","unstructured":"Harmen-Hinrich Sthamer . 1995. The automatic generation of software test data using genetic algorithms . University of South Wales (United Kingdom) . Harmen-Hinrich Sthamer. 1995. The automatic generation of software test data using genetic algorithms. University of South Wales (United Kingdom)."},{"key":"e_1_3_2_1_39_1","volume-title":"2023 IEEE Symposium on Security and Privacy (SP). 116\u2013133","author":"Trickel Erik","year":"2022","unstructured":"Erik Trickel , Fabio Pagani , Chang Zhu , Lukas Dresel , Giovanni Vigna , Christopher Kruegel , Ruoyu Wang , Tiffany Bao , Yan Shoshitaishvili , and Adam Doup\u00e9 . 2022 . Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities . In 2023 IEEE Symposium on Security and Privacy (SP). 116\u2013133 . https:\/\/doi.org\/10.1109\/SP46215.2023.00007 10.1109\/SP46215.2023.00007 Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, and Adam Doup\u00e9. 2022. Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities. In 2023 IEEE Symposium on Security and Privacy (SP). 116\u2013133. https:\/\/doi.org\/10.1109\/SP46215.2023.00007"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510174"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3587158"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2019.00080"},{"key":"e_1_3_2_1_44_1","volume-title":"29th USENIX Security Symposium (Security\u201920)","author":"Yue Tai","year":"2020","unstructured":"Tai Yue , Pengfei Wang , Yong Tang , Enze Wang , Bo Yu , Kai Lu , and Xu Zhou . 2020 . EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit . In 29th USENIX Security Symposium (Security\u201920) . 2307\u20132324. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/yue Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou. 2020. EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. In 29th USENIX Security Symposium (Security\u201920). 2307\u20132324. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/yue"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484596"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"}],"event":{"name":"FUZZING '23: 2nd International Fuzzing Workshop","location":"Seattle WA USA","acronym":"FUZZING '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 2nd International Fuzzing Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605157.3605172","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:54Z","timestamp":1750291434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605157.3605172"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":46,"alternative-id":["10.1145\/3605157.3605172","10.1145\/3605157"],"URL":"https:\/\/doi.org\/10.1145\/3605157.3605172","relation":{},"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"2023-07-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}