{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T22:02:45Z","timestamp":1769119365582,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangdong Provincial Key Laboratory","award":["2020B121201001"],"award-info":[{"award-number":["2020B121201001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002256, 62232001"],"award-info":[{"award-number":["62002256, 62232001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616277","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1062-1074","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["SJFuzz: Seed and Mutator Scheduling for JVM Fuzzing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6146-2923","authenticated-orcid":false,"given":"Mingyuan","family":"Wu","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China \/ University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2391-3617","authenticated-orcid":false,"given":"Yicheng","family":"Ouyang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-0136-3204","authenticated-orcid":false,"given":"Minghai","family":"Lu","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3056-9962","authenticated-orcid":false,"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2998-1052","authenticated-orcid":false,"given":"Yingquan","family":"Zhao","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7746-440X","authenticated-orcid":false,"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1404-4560","authenticated-orcid":false,"given":"Guowei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Queensland, Queensland, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1499-5729","authenticated-orcid":false,"given":"Yuqun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. JIt Bug. https:\/\/github.com\/eclipse\/openj9\/issues\/9381"},{"key":"e_1_3_2_2_2_1","unstructured":"2020. Spring Verify Error. https:\/\/github.com\/eclipse\/openj9\/issues\/5676"},{"key":"e_1_3_2_2_3_1","unstructured":"2020. Structured Locking Issue. https:\/\/github.com\/eclipse\/openj9\/issues\/9276"},{"key":"e_1_3_2_2_4_1","unstructured":"2020. Verify Bug. https:\/\/github.com\/eclipse\/openj9\/issues\/9385"},{"key":"e_1_3_2_2_5_1","unstructured":"2021. Motivate Examples. https:\/\/github.com\/eclipse\/openj9\/issues\/11683"},{"key":"e_1_3_2_2_6_1","unstructured":"2021. Motivate Examples. https:\/\/github.com\/eclipse\/openj9\/issues\/11684"},{"key":"e_1_3_2_2_7_1","unstructured":"2022. AFL. https:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_2_8_1","unstructured":"2022. Apache Project. https:\/\/projects.apache.org\/projects.html?language"},{"key":"e_1_3_2_2_9_1","unstructured":"2022. Coevolutionary Algorithm. https:\/\/wiki.ece.cmu.edu\/ddl\/index.php\/Coevolutionary_algorithms"},{"key":"e_1_3_2_2_10_1","unstructured":"2022. Definition of Distinct Discrepancy. https:\/\/github.com\/fuzzy000\/SJFuzz\/blob\/main\/src\/com\/djfuzz\/solver\/JVMOutputParser.java"},{"key":"e_1_3_2_2_11_1","unstructured":"2022. DragonWell11. https:\/\/github.com\/alibaba\/dragonwell11"},{"key":"e_1_3_2_2_12_1","unstructured":"2022. DragonWell8. https:\/\/github.com\/alibaba\/dragonwell8"},{"key":"e_1_3_2_2_13_1","unstructured":"2022. Gestalt Pattern Matching Distance. https:\/\/en.wikipedia.org\/wiki\/Gestalt_pattern_matching"},{"key":"e_1_3_2_2_14_1","unstructured":"2022. GIJ. https:\/\/gcc.gnu.org\/onlinedocs\/gcc-6.5.0\/gcj\/"},{"key":"e_1_3_2_2_15_1","unstructured":"2022. HotSpot. http:\/\/openjdk.java.net"},{"key":"e_1_3_2_2_16_1","unstructured":"2022. J9. http:\/\/www.ibm.com\/developerworks\/java\/ jdk"},{"key":"e_1_3_2_2_17_1","unstructured":"2022. Jaro Distance. https:\/\/en.wikipedia.org\/wiki\/Jaro%E2%80%93Winkler_distance"},{"key":"e_1_3_2_2_18_1","unstructured":"2022. The Java Virtual Machine Specification. https:\/\/docs.oracle.com\/javase\/specs\/index.html"},{"key":"e_1_3_2_2_19_1","unstructured":"2022. JUnit Official Website. https:\/\/junit.org\/"},{"key":"e_1_3_2_2_20_1","unstructured":"2022. JVM. https:\/\/en.wikipedia.org\/wiki\/Java_virtual_machine"},{"key":"e_1_3_2_2_21_1","unstructured":"2022. Main Repo for SJFuzz. https:\/\/github.com\/fuzzy000\/SJFuzz"},{"key":"e_1_3_2_2_22_1","unstructured":"2022. Monte Carlo Method. https:\/\/en.wikipedia.org\/wiki\/Monte_Carlo_method"},{"key":"e_1_3_2_2_23_1","unstructured":"2022. Zulu. http:\/\/www.azulsystems.com\/products\/zulu"},{"key":"e_1_3_2_2_24_1","unstructured":"2023. Complement (set theory). https:\/\/en.wikipedia.org\/wiki\/Complement_(set_theory)"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_2_26_1","volume-title":"Finite-time analysis of the multiarmed bandit problem. Machine learning, 47, 2","author":"Auer Peter","year":"2002","unstructured":"Peter Auer, Nicolo Cesa-Bianchi, and Paul Fischer. 2002. Finite-time analysis of the multiarmed bandit problem. Machine learning, 47, 2 (2002), 235\u2013256."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45735-6_24"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2013.99"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416570"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363562"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00172"},{"key":"e_1_3_2_2_34_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen, Mansour Ahmadi, Boyu Wang, and Long Lu. 2020. $MEUZZ$: Smart Seed Scheduling for Hybrid Fuzzing. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 77\u201392."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462173"},{"key":"e_1_3_2_2_36_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. 2019. $EnFuzz$: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. In 28th USENIX Security Symposium (USENIX Security 19). 1967\u20131983. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/chen-yuanliang"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00127"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908095"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133917"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MHS.1995.494215"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287707"},{"key":"e_1_3_2_2_44_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00df feldt, and Marc Heuse. 2020. AFL++ : Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/fioraldi"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025011624925"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598075"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363824"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00045"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858965.2814319"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_2_52_1","unstructured":"Vladimir I Levenshtein. 1966. Binary codes capable of correcting deletions insertions and reversals. In Soviet physics doklady. 10 707\u2013710."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011044"},{"key":"e_1_3_2_2_56_1","volume-title":"28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1949\u20131966.","author":"Lyu Chenyang","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. $MOPT$: Optimized mutation scheduling for fuzzers. In 28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1949\u20131966."},{"key":"e_1_3_2_2_57_1","volume-title":"Introduction to nonparametric statistics for the biological sciences using","author":"MacFarland Thomas W","unstructured":"Thomas W MacFarland and Jan M Yates. 2016. Mann\u2013whitney u test. In Introduction to nonparametric statistics for the biological sciences using R. Springer, 103\u2013132."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_2_59_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Poeplau Sebastian","year":"2020","unstructured":"Sebastian Poeplau and Aur\u00e9lien Francillon. 2020. Symbolic execution with SymCC: Don\u2019 t interpret, compile!. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 181\u2013198. isbn:978-1-939133-17-5 https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/poeplau"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAR-SSI.2011.5931379"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409723"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833761"},{"key":"e_1_3_2_2_64_1","volume-title":"Proc. Int. Conf. on Software Testing And Review.","author":"Sirer E. G.","unstructured":"E. G. Sirer and B. N. Bershad. 1999. Testing Java Virtual Machines, An Experience Report on Automatically Testing Java Virtual Machines. Proc. Int. Conf. on Software Testing And Review."},{"key":"e_1_3_2_2_65_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS.","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kr\u00fcgel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/781995.782008"},{"key":"e_1_3_2_2_67_1","volume-title":"Hendren","author":"Vallee-Rai Raja","year":"1998","unstructured":"Raja Vallee-Rai and Laurie J. Hendren. 1998. Jimple: Simplifying Java Bytecode for Analyses and Transformations."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616294"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510174"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510089"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00017"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00017"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330579"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2003.1319081"},{"key":"e_1_3_2_2_76_1","volume-title":"27th $USENIX$ Security Symposium ($USENIX$ Security 18). 745\u2013761. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yun","author":"Yun Insu","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. $QSYM$: A practical concolic execution engine tailored for hybrid fuzzing. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). 745\u2013761. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yun"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510063"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510063"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"crossref","unstructured":"Lei Zhao Yue Duan Heng Yin and Jifeng Xuan. 2019. Send hardest problems my way: Probabilistic path prioritization for hybrid fuzzing. In NDSS.","DOI":"10.14722\/ndss.2019.23504"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598077"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510059"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616277","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616277","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:03Z","timestamp":1750178163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":83,"alternative-id":["10.1145\/3611643.3616277","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616277","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}