{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:12:06Z","timestamp":1775873526920,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Guangdong Provincial Key Laboratory","award":["2020B121201001"],"award-info":[{"award-number":["2020B121201001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002256,62232001"],"award-info":[{"award-number":["62002256,62232001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616294","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1037-1049","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Enhancing Coverage-Guided Fuzzing via Phantom Program"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-6146-2923","authenticated-orcid":false,"given":"Mingyuan","family":"Wu","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China \/ University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-3820-4785","authenticated-orcid":false,"given":"Kunqiu","family":"Chen","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0931-8314","authenticated-orcid":false,"given":"Qi","family":"Luo","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5239-2540","authenticated-orcid":false,"given":"Jiahong","family":"Xiang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8548-116X","authenticated-orcid":false,"given":"Ji","family":"Qi","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3056-9962","authenticated-orcid":false,"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7746-440X","authenticated-orcid":false,"given":"Heming","family":"Cui","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1499-5729","authenticated-orcid":false,"given":"Yuqun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2022. All experiments detail in the paper. https:\/\/github.com\/WorldExecute\/exprs"},{"key":"e_1_3_2_2_2_1","unstructured":"2022. Control-flow graph generating pass of LLVM. https:\/\/llvm.org\/docs\/Passes.html##dot-cfg-print-cfg-of-function-to-dot-file"},{"key":"e_1_3_2_2_3_1","unstructured":"2022. Dominator and Immediate dominator WiKipedia. https:\/\/en.wikipedia.org\/wiki\/Dominator_(graph_theory)"},{"key":"e_1_3_2_2_4_1","unstructured":"2022. Github Repository. 2022. MirageFuzz. https:\/\/github.com\/WorldExecute\/fuzzer"},{"key":"e_1_3_2_2_5_1","unstructured":"2022. jhead: a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras.. https:\/\/github.com\/Matthias-Wandel\/jhead"},{"key":"e_1_3_2_2_6_1","unstructured":"2022. jhead bug issue. https:\/\/github.com\/Matthias-Wandel\/jhead\/issues\/53"},{"key":"e_1_3_2_2_7_1","unstructured":"2022. laf-intel instrumentation. https:\/\/github.com\/AFLplusplus\/AFLplusplus\/blob\/stable\/instrumentation\/README.laf-intel.md"},{"key":"e_1_3_2_2_8_1","unstructured":"2022. libpng - library for use in applications that read create and manipulate PNG. https:\/\/github.com\/glennrp\/libpng"},{"key":"e_1_3_2_2_9_1","unstructured":"2022. Memory SSA in LLVM. https:\/\/llvm.org\/docs\/MemorySSA.html"},{"key":"e_1_3_2_2_10_1","unstructured":"2022. PCRE2 - Perl-Compatible Regular Expressions. https:\/\/github.com\/PCRE2Project\/pcre2"},{"key":"e_1_3_2_2_11_1","unstructured":"2022. pcre2 bug issue. https:\/\/github.com\/PCRE2Project\/pcre2\/issues\/141"},{"key":"e_1_3_2_2_12_1","unstructured":"2022. Perl - a highly capable feature-rich programming language. https:\/\/www.perl.org\/"},{"key":"e_1_3_2_2_13_1","unstructured":"2022. pngfix bug issue. https:\/\/github.com\/glennrp\/libpng\/issues\/424"},{"key":"e_1_3_2_2_14_1","unstructured":"2022. strip bug issue. https:\/\/sourceware.org\/bugzilla\/show_bug.cgi?id=29495"},{"key":"e_1_3_2_2_15_1","unstructured":"2023. LibFuzzer \u2013 a library for coverage-guided fuzz testing. https:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/197405.197406"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855741.1855756"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.61"},{"key":"e_1_3_2_2_21_1","volume-title":"32nd European Conference on Object-Oriented Programming (ECOOP","author":"Chen Junjie","year":"2018","unstructured":"Junjie Chen, Wenxiang Hu, Lingming Zhang, Dan Hao, Sarfraz Khurshid, and Lu Zhang. 2018. Learning to accelerate symbolic execution via code transformation. In 32nd European Conference on Object-Oriented Programming (ECOOP 2018)."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833796"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363225"},{"key":"e_1_3_2_2_25_1","volume-title":"23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Chen Yaohui","year":"2020","unstructured":"Yaohui Chen, Mansour Ahmadi, Boyu Wang, and Long Lu. 2020. $MEUZZ$: Smart Seed Scheduling for Hybrid Fuzzing. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). 77\u201392."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510197"},{"key":"e_1_3_2_2_28_1","volume-title":"Heiko Ei\u00df feldt, and Marc Heuse","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00df feldt, and Marc Heuse. 2020. AFL++: Combining incremental steps of fuzzing research. In 14th $USENIX$ Workshop on Offensive Technologies ($WOOT$ 20)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598075"},{"key":"e_1_3_2_2_30_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Garbelini Matheus E","year":"2022","unstructured":"Matheus E Garbelini, Vaibhav Bedi, Sudipta Chattopadhyay, Sumei Sun, and Ernest Kurniawan. 2022. $BrakTooth$: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing. In 31st USENIX Security Symposium (USENIX Security 22). 1025\u20131042. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/garbelini"},{"key":"e_1_3_2_2_31_1","volume-title":"International Fuzzing Workshop, ser. FUZZING. 22","author":"Groce Alex","year":"2022","unstructured":"Alex Groce, Goutamkumar Tulajappa Kalburgi, Claire Le Goues, Kush Jain, and Rahul Gopinath. 2022. Registered report: First, fuzz the mutants. In International Fuzzing Workshop, ser. FUZZING. 22."},{"key":"e_1_3_2_2_32_1","volume-title":"Formal methods and testing","author":"Harman Mark","unstructured":"Mark Harman, Andr\u00e9 Baresel, David Binkley, Robert Hierons, Lin Hu, Bogdan Korel, Phil McMinn, and Marc Roper. 2008. Testability transformation\u2013program transformation to improve testability. In Formal methods and testing. Springer, 320\u2013344."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23014"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00045"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151042"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.16"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510628"},{"key":"e_1_3_2_2_40_1","volume-title":"The BSD conference. 5, 1\u201320","author":"Lattner Chris","year":"2008","unstructured":"Chris Lattner. 2008. LLVM and Clang: Next generation compiler technology. In The BSD conference. 5, 1\u201320."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106295"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833594"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678671"},{"key":"e_1_3_2_2_47_1","volume-title":"28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1949\u20131966. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lyu","author":"Lyu Chenyang","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. $MOPT$: Optimized mutation scheduling for fuzzers. In 28th $USENIX$ Security Symposium ($USENIX$ Security 19). 1949\u20131966. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/lyu"},{"key":"e_1_3_2_2_48_1","volume-title":"Introduction to nonparametric statistics for the biological sciences using","author":"MacFarland Thomas W","unstructured":"Thomas W MacFarland and Jan M Yates. 2016. Mann\u2013whitney u test. In Introduction to nonparametric statistics for the biological sciences using R. Springer, 103\u2013132."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3100858"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_2_53_1","volume-title":"Proceedings of the GCC Developers\u2019 Summit. 97\u2013110","author":"Novillo Diego","year":"2007","unstructured":"Diego Novillo. 2007. Memory SSA-a unified approach for sparsely representing memory operations. In Proceedings of the GCC Developers\u2019 Summit. 97\u2013110."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180183"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545258.3545285"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23404"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/73560.73562"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.26"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409723"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833761"},{"key":"e_1_3_2_2_64_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Shen Zekun","year":"2022","unstructured":"Zekun Shen, Ritik Roongta, and Brendan Dolan-Gavitt. 2022. Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, 1275\u20131290. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/shen-zekun"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678636"},{"key":"e_1_3_2_2_66_1","volume-title":"Operating System Concepts, 10e Abridged Print Companion","author":"Silberschatz Abraham","unstructured":"Abraham Silberschatz, Peter B Galvin, and Greg Gagne. 2018. Operating System Concepts, 10e Abridged Print Companion. John Wiley & Sons."},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2015.7054186"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556949"},{"key":"e_1_3_2_2_69_1","volume-title":"RIFF: Reduced Instruction Footprint for Coverage-Guided Fuzzing. In 2021 USENIX Annual Technical Conference (USENIX ATC 21)","author":"Wang Mingzhe","year":"2021","unstructured":"Mingzhe Wang, Jie Liang, Chijin Zhou, Yu Jiang, Rui Wang, Chengnian Sun, and Jiaguang Sun. 2021. RIFF: Reduced Instruction Footprint for Coverage-Guided Fuzzing. In 2021 USENIX Annual Technical Conference (USENIX ATC 21). USENIX Association, 147\u2013159. https:\/\/www.usenix.org\/conference\/atc21\/presentation\/wang-mingzhe"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","unstructured":"Yanhao Wang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao Dinghao Wu and Purui Su. 2020. Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.. In NDSS. https:\/\/doi.org\/10.14722\/ndss.2020.24422 10.14722\/ndss.2020.24422","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510174"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510089"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00017"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","unstructured":"Mingyuan Wu Yicheng Ouyang Minghai Lu Junjie Chen Yingquan Zhao Heming Cui Yangwei Guo and Yuqun Zhang. 2023. SJFuzz: Seed & Mutator Scheduling for JVM Fuzzing. In 2023 The ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE). https:\/\/doi.org\/10.1145\/3611643.3616277 10.1145\/3611643.3616277","DOI":"10.1145\/3611643.3616277"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00075"},{"key":"e_1_3_2_2_77_1","volume-title":"27th $USENIX$ Security Symposium ($USENIX$ Security 18)","author":"Yun Insu","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. $QSYM$: A practical concolic execution engine tailored for hybrid fuzzing. In 27th $USENIX$ Security Symposium ($USENIX$ Security 18). USENIX Association, 745\u2013761. https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yun"},{"key":"e_1_3_2_2_78_1","unstructured":"Micha\u0142 Zalewski. 2020. American Fuzz Lop. https:\/\/github.com\/google\/AFL"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24314"},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510063"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510059"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380422"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:04Z","timestamp":1750178164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":83,"alternative-id":["10.1145\/3611643.3616294","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616294","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}