{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:25:52Z","timestamp":1776954352955,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T00:00:00Z","timestamp":1689552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,7,17]]},"DOI":"10.1145\/3605157.3605177","type":"proceedings-article","created":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:22:08Z","timestamp":1689279728000},"page":"47-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Beyond the Coverage Plateau: A Comprehensive Study of Fuzz Blockers (Registered Report)"],"prefix":"10.1145","author":[{"given":"Wentao","family":"Gao","sequence":"first","affiliation":[{"name":"University of Melbourne, Australia"}]},{"given":"Van-Thuan","family":"Pham","sequence":"additional","affiliation":[{"name":"University of Melbourne, Australia"}]},{"given":"Dongge","family":"Liu","sequence":"additional","affiliation":[{"name":"Google, Australia"}]},{"given":"Oliver","family":"Chang","sequence":"additional","affiliation":[{"name":"Google, Australia"}]},{"given":"Toby","family":"Murray","sequence":"additional","affiliation":[{"name":"University of Melbourne, Australia"}]},{"given":"Benjamin I.P.","family":"Rubinstein","sequence":"additional","affiliation":[{"name":"University of Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,7,17]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. American Fuzzy Lop. https:\/\/lcamtuf.coredump.cx\/afl\/ [n. d.]. American Fuzzy Lop. https:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. Black Duck Open Hub. https:\/\/www.openhub.net\/ [n. d.]. Black Duck Open Hub. https:\/\/www.openhub.net\/"},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. ClusterFuzz. https:\/\/google.github.io\/clusterfuzz\/ [n. d.]. ClusterFuzz. https:\/\/google.github.io\/clusterfuzz\/"},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. Data Flow Sanitizer. https:\/\/clang.llvm.org\/docs\/DataFlowSanitizer.html [n. d.]. Data Flow Sanitizer. https:\/\/clang.llvm.org\/docs\/DataFlowSanitizer.html"},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. Fuzz Introspector. https:\/\/github.com\/ossf\/fuzz-introspector [n. d.]. Fuzz Introspector. https:\/\/github.com\/ossf\/fuzz-introspector"},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. Honggfuzz. https:\/\/github.com\/google\/honggfuzz [n. d.]. Honggfuzz. https:\/\/github.com\/google\/honggfuzz"},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. Igraph The Network Analysis Package. https:\/\/igraph.org\/ [n. d.]. Igraph The Network Analysis Package. https:\/\/igraph.org\/"},{"key":"e_1_3_2_1_8_1","unstructured":"[n. d.]. libFuzzer-a library for coverage-guided fuzz testing. https:\/\/github. com\/llvm-mirror\/llvm\/blob\/master\/docs\/LibFuzzer.rst [n. d.]. libFuzzer-a library for coverage-guided fuzz testing. https:\/\/github. com\/llvm-mirror\/llvm\/blob\/master\/docs\/LibFuzzer.rst"},{"key":"e_1_3_2_1_9_1","unstructured":"[n. d.]. libpng home page. http:\/\/www.libpng.org\/pub\/png\/libpng.html [n. d.]. libpng home page. http:\/\/www.libpng.org\/pub\/png\/libpng.html"},{"key":"e_1_3_2_1_10_1","unstructured":"[n. d.]. libpng manual. http:\/\/www.libpng.org\/pub\/png\/libpng-manual.txt [n. d.]. libpng manual. http:\/\/www.libpng.org\/pub\/png\/libpng-manual.txt"},{"key":"e_1_3_2_1_11_1","unstructured":"[n. d.]. libprotobuf-mutator. https:\/\/github.com\/google\/libprotobuf-mutator\/ [n. d.]. libprotobuf-mutator. https:\/\/github.com\/google\/libprotobuf-mutator\/"},{"key":"e_1_3_2_1_12_1","unstructured":"[n. d.]. OpenSSL crytography and SSL\/TLS toolket. https:\/\/www.openssl.org\/ [n. d.]. OpenSSL crytography and SSL\/TLS toolket. https:\/\/www.openssl.org\/"},{"key":"e_1_3_2_1_13_1","unstructured":"[n. d.]. OSS-Fuzz: Continuous Fuzzing for Open Source Software. https:\/\/github. com\/google\/oss-fuzz [n. d.]. OSS-Fuzz: Continuous Fuzzing for Open Source Software. https:\/\/github. com\/google\/oss-fuzz"},{"key":"e_1_3_2_1_14_1","unstructured":"[n. d.]. Successful case studies of FuzzIntrospector. https:\/\/github.com\/ossf\/fuzzintrospector\/blob\/main\/doc\/CaseStudies.md [n. d.]. Successful case studies of FuzzIntrospector. https:\/\/github.com\/ossf\/fuzzintrospector\/blob\/main\/doc\/CaseStudies.md"},{"key":"e_1_3_2_1_15_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann , Tommaso Frassetto , Thorsten Holz , Patrick Jauernig , Ahmad-Reza Sadeghi , and Daniel Teuchert . 2019 . NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS. Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00117"},{"key":"e_1_3_2_1_17_1","first-page":"1","volume-title":"NDSS","volume":"19","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann , Sergej Schumilo , Tim Blazytko , Robert Gawlik , and Thorsten Holz . 2019 . REDQUEEN: Fuzzing with Input-to-State Correspondence .. In NDSS , Vol. 19 . 1 - 15 . Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS, Vol. 19. 1-15."},{"key":"e_1_3_2_1_18_1","first-page":"3255","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Ba Jinsheng","year":"2022","unstructured":"Jinsheng Ba , Marcel B\u00f6hme , Zahra Mirzamomen , and Abhik Roychoudhury . 2022 . Stateful greybox fuzzing . In 31st USENIX Security Symposium (USENIX Security 22) . 3255 - 3272 . Jinsheng Ba, Marcel B\u00f6hme, Zahra Mirzamomen, and Abhik Roychoudhury. 2022. Stateful greybox fuzzing. In 31st USENIX Security Symposium (USENIX Security 22). 3255-3272."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340456"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium","volume":"19","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko , Cornelius Aschermann , Moritz Schl\u00f6gel , Ali Abbasi , Sergej Schumilo , Simon W\u00f6rner , and Thorsten Holz . 2019 . GRIMOIRE: Synthesizing Structure while Fuzzing .. In USENIX Security Symposium , Vol. 19 . Tim Blazytko, Cornelius Aschermann, Moritz Schl\u00f6gel, Ali Abbasi, Sergej Schumilo, Simon W\u00f6rner, and Thorsten Holz. 2019. GRIMOIRE: Synthesizing Structure while Fuzzing.. In USENIX Security Symposium, Vol. 19."},{"key":"e_1_3_2_1_21_1","volume-title":"Fuzzing: Challenges and Reflections","author":"B\u00f6hme Marcel","year":"2021","unstructured":"Marcel B\u00f6hme , Cristian Cadar , and Abhik Roychoudhury . 2021 . Fuzzing: Challenges and Reflections . IEEE Softw . 38, 3 ( 2021 ), 79-86. Marcel B\u00f6hme, Cristian Cadar, and Abhik Roychoudhury. 2021. Fuzzing: Challenges and Reflections. IEEE Softw. 38, 3 ( 2021 ), 79-86."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_1_23_1","volume-title":"CoverageBased Greybox Fuzzing as Markov Chain","author":"B\u00f6hme Marcel","year":"2016","unstructured":"Marcel B\u00f6hme , Van-Thuan Pham , and Abhik Roychoudhury . 2016. CoverageBased Greybox Fuzzing as Markov Chain . IEEE Transactions on Software Engineering 45 ( 2016 ), 489-506. Marcel B\u00f6hme, Van-Thuan Pham, and Abhik Roychoudhury. 2016. CoverageBased Greybox Fuzzing as Markov Chain. IEEE Transactions on Software Engineering 45 ( 2016 ), 489-506."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Gemma Catolino Fabio Palomba Andy Zaidman and Filomena Ferrucci. 2019. Not all bugs are the same: Understanding characterizing and classifying bug types. Journal of Systems and Software 152 ( 2019 ) 165-181. Gemma Catolino Fabio Palomba Andy Zaidman and Filomena Ferrucci. 2019. Not all bugs are the same: Understanding characterizing and classifying bug types. Journal of Systems and Software 152 ( 2019 ) 165-181.","DOI":"10.1016\/j.jss.2019.03.002"},{"key":"e_1_3_2_1_25_1","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 736-747","author":"Choi Jaeseung","year":"2019","unstructured":"Jaeseung Choi , Joonun Jang , Choongwoo Han , and Sang Kil Cha . 2019 . Grey-box concolic testing on binary code . In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 736-747 . Jaeseung Choi, Joonun Jang, Choongwoo Han, and Sang Kil Cha. 2019. Grey-box concolic testing on binary code. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 736-747."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Karine Even-Mendoza Cristian Cadar and Alastair F Donaldson. 2022. CsmithEdge: more efective compiler testing by handling undefined behaviour less conservatively. Empirical Software Engineering 27 6 ( 2022 ) 129. Karine Even-Mendoza Cristian Cadar and Alastair F Donaldson. 2022. CsmithEdge: more efective compiler testing by handling undefined behaviour less conservatively. Empirical Software Engineering 27 6 ( 2022 ) 129.","DOI":"10.1007\/s10664-022-10146-1"},{"key":"e_1_3_2_1_27_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2829-2846. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/fioraldi","author":"Fioraldi Andrea","year":"2021","unstructured":"Andrea Fioraldi , Daniele Cono D'Elia , and Davide Balzarotti . 2021 . The Use of Likely Invariants as Feedback for Fuzzers . In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2829-2846. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/fioraldi Andrea Fioraldi, Daniele Cono D'Elia, and Davide Balzarotti. 2021. The Use of Likely Invariants as Feedback for Fuzzers. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2829-2846. https:\/\/www.usenix.org\/ conference\/usenixsecurity21\/presentation\/fioraldi"},{"key":"e_1_3_2_1_28_1","volume-title":"14th USENIX Workshop on Ofensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi , Dominik Maier , Heiko Ei\u00dffeldt , and Marc Heuse . 2020 . AFL++: Combining Incremental Steps of Fuzzing Research . In 14th USENIX Workshop on Ofensive Technologies (WOOT 20) . USENIX Association. Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Ofensive Technologies (WOOT 20). USENIX Association."},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Security Symposium. 2577-2594","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan , Chao Zhang , Peng Chen , Bodong Zhao , Xiaojun Qin , Dong Wu , and Zuoning Chen . 2020 . GREYONE: Data Flow Sensitive Fuzzing .. In USENIX Security Symposium. 2577-2594 . Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. 2020. GREYONE: Data Flow Sensitive Fuzzing.. In USENIX Security Symposium. 2577-2594."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278186.3278193"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 2271-2287","author":"Ispoglou Kyriakos K","year":"2020","unstructured":"Kyriakos K Ispoglou , Daniel Austin , Vishwath Mohan , and Mathias Payer . 2020 . Fuzzgen: Automatic fuzzer generation . In Proceedings of the 29th USENIX Conference on Security Symposium. 2271-2287 . Kyriakos K Ispoglou, Daniel Austin, Vishwath Mohan, and Mathias Payer. 2020. Fuzzgen: Automatic fuzzer generation. In Proceedings of the 29th USENIX Conference on Security Symposium. 2271-2287."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3275525"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330260"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Dongge Liu Jonathan Metzman Marcel B\u00f6hme Oliver Chang and Abhishek Arya. 2023. SBFT Tool Competition 2023-Fuzzing Track. arXiv preprint arXiv:2304.10070 ( 2023 ). Dongge Liu Jonathan Metzman Marcel B\u00f6hme Oliver Chang and Abhishek Arya. 2023. SBFT Tool Competition 2023-Fuzzing Track. arXiv preprint arXiv:2304.10070 ( 2023 ).","DOI":"10.1109\/SBFT59156.2023.00016"},{"key":"e_1_3_2_1_36_1","article-title":"The art, science, and engineering of fuzzing: A survey","volume":"47","author":"Man\u00e8s Valentin JM","year":"2019","unstructured":"Valentin JM Man\u00e8s , HyungSeok Han , Choongwoo Han , Sang Kil Cha , Manuel Egele , Edward J Schwartz , and Maverick Woo . 2019 . The art, science, and engineering of fuzzing: A survey . IEEE Transactions on Software Engineering 47 , 11 ( 2019 ), 2312-2331. Valentin JM Man\u00e8s, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J Schwartz, and Maverick Woo. 2019. The art, science, and engineering of fuzzing: A survey. IEEE Transactions on Software Engineering 47, 11 ( 2019 ), 2312-2331.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458720"},{"key":"e_1_3_2_1_39_1","unstructured":"Lianglu Pan Shaanan Cohney Toby Murray and Van-Thuan Pham. 2023. Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing. arXiv preprint arXiv:2301.09258 ( 2023 ). Lianglu Pan Shaanan Cohney Toby Murray and Van-Thuan Pham. 2023. Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing. arXiv preprint arXiv:2301.09258 ( 2023 )."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the ACM on Programming Languages 5, OOPSLA ( 2021 ), 1-19","author":"Park Jiwon","year":"2021","unstructured":"Jiwon Park , Dominik Winterer , Chengyu Zhang , and Zhendong Su . 2021 . Generative type-aware mutation for testing SMT solvers . Proceedings of the ACM on Programming Languages 5, OOPSLA ( 2021 ), 1-19 . Jiwon Park, Dominik Winterer, Chengyu Zhang, and Zhendong Su. 2021. Generative type-aware mutation for testing SMT solvers. Proceedings of the ACM on Programming Languages 5, OOPSLA ( 2021 ), 1-19."},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 2559-2575","author":"Peng Hui","year":"2020","unstructured":"Hui Peng and Mathias Payer . 2020 . Usbfuzz: A framework for fuzzing USB drivers by device emulation . In Proceedings of the 29th USENIX Conference on Security Symposium. 2559-2575 . Hui Peng and Mathias Payer. 2020. Usbfuzz: A framework for fuzzing USB drivers by device emulation. In Proceedings of the 29th USENIX Conference on Security Symposium. 2559-2575."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering : NIER Track.","author":"Pham Van-Thuan","unstructured":"Van-Thuan Pham , Manh-Dung Nguyen , Quang-Trung Ta , Toby Murray , and Benjamin I.P. Rubinstein . 2021. Towards Systematic and Dynamic Task Allocation for Collaborative Parallel Fuzzing . In Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering : NIER Track. Van-Thuan Pham, Manh-Dung Nguyen, Quang-Trung Ta, Toby Murray, and Benjamin I.P. Rubinstein. 2021. Towards Systematic and Dynamic Task Allocation for Collaborative Parallel Fuzzing. In Proceedings of the 36th IEEE\/ACM International Conference on Automated Software Engineering : NIER Track."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_1_44_1","article-title":"Smart greybox fuzzing","volume":"47","author":"Pham Van-Thuan","year":"2019","unstructured":"Van-Thuan Pham , Marcel B\u00f6hme , Andrew E Santosa , Alexandru R\u0103zvan C\u0103ciulescu , and Abhik Roychoudhury . 2019 . Smart greybox fuzzing . IEEE Transactions on Software Engineering 47 , 9 ( 2019 ), 1980-1997. Van-Thuan Pham, Marcel B\u00f6hme, Andrew E Santosa, Alexandru R\u0103zvan C\u0103ciulescu, and Abhik Roychoudhury. 2019. Smart greybox fuzzing. IEEE Transactions on Software Engineering 47, 9 ( 2019 ), 1980-1997.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_45_1","first-page":"667","volume-title":"OSDI","volume":"20","author":"Rigger Manuel","year":"2020","unstructured":"Manuel Rigger and Zhendong Su . 2020 . Testing Database Engines via Pivoted Query Synthesis .. In OSDI , Vol. 20 . 667 - 682 . Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis.. In OSDI, Vol. 20. 667-682."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417928"},{"key":"e_1_3_2_1_47_1","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 724-735","author":"Wang Junjie","year":"2019","unstructured":"Junjie Wang , Bihuan Chen , Lei Wei , and Yang Liu . 2019 . Superion: Grammaraware greybox fuzzing . In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 724-735 . Junjie Wang, Bihuan Chen, Lei Wei, and Yang Liu. 2019. Superion: Grammaraware greybox fuzzing. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 724-735."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468610"},{"key":"e_1_3_2_1_49_1","article-title":"Fuzzing Configurations of Program Options","volume":"32","author":"Zhang Zenong","year":"2023","unstructured":"Zenong Zhang , George Klees , Eric Wang , Michael Hicks , and Shiyi Wei . 2023 . Fuzzing Configurations of Program Options . ACM Transactions on Software Engineering and Methodology 32 , 2 ( 2023 ), 1-21. Zenong Zhang, George Klees, Eric Wang, Michael Hicks, and Shiyi Wei. 2023. Fuzzing Configurations of Program Options. ACM Transactions on Software Engineering and Methodology 32, 2 ( 2023 ), 1-21.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417260"}],"event":{"name":"FUZZING '23: 2nd International Fuzzing Workshop","location":"Seattle WA USA","acronym":"FUZZING '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 2nd International Fuzzing Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605157.3605177","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:54Z","timestamp":1750291434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3605157.3605177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,17]]},"references-count":50,"alternative-id":["10.1145\/3605157.3605177","10.1145\/3605157"],"URL":"https:\/\/doi.org\/10.1145\/3605157.3605177","relation":{},"subject":[],"published":{"date-parts":[[2023,7,17]]},"assertion":[{"value":"2023-07-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}