{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:00:00Z","timestamp":1776304800154,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"German Federal Ministry of Education and Research (BMBF)","award":["16KIS1564K,16KIS1565"],"award-info":[{"award-number":["16KIS1564K,16KIS1565"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616308","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T18:14:38Z","timestamp":1701368078000},"page":"133-145","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Revisiting Neural Program Smoothing for Fuzzing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2758-7481","authenticated-orcid":false,"given":"Maria-Irina","family":"Nicolae","sequence":"first","affiliation":[{"name":"Robert Bosch GmbH, Stuttgart, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6249-2077","authenticated-orcid":false,"given":"Max","family":"Eisele","sequence":"additional","affiliation":[{"name":"Robert Bosch GmbH, Stuttgart, Germany \/ Saarland University, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4719-8803","authenticated-orcid":false,"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_3_1_1","unstructured":"Mart\u00edn Abadi Ashish Agarwal Paul Barham Eugene Brevdo Zhifeng Chen Craig Citro Greg S. Corrado Andy Davis Jeffrey Dean Matthieu Devin Sanjay Ghemawat Ian Goodfellow Andrew Harp Geoffrey Irving Michael Isard Yangqing Jia Rafal Jozefowicz Lukasz Kaiser Manjunath Kudlur Josh Levenberg Dandelion Man\u00e9 Rajat Monga Sherry Moore Derek Murray Chris Olah Mike Schuster Jonathon Shlens Benoit Steiner Ilya Sutskever Kunal Talwar Paul Tucker Vincent Vanhoucke Vijay Vasudevan Fernanda Vi\u00e9gas Oriol Vinyals Pete Warden Martin Wattenberg Martin Wicke Yuan Yu and Xiaoqiang Zheng. 2015. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. https:\/\/www.tensorflow.org. Software available from tensorflow.org"},{"key":"e_1_3_2_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.17"},{"key":"e_1_3_2_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00039"},{"key":"e_1_3_2_3_4_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013689704352"},{"key":"e_1_3_2_3_5_1","unstructured":"Jana Aydinbas. 2022. AFLplusplus Persistence Mode README. https:\/\/github.com\/AFLplusplus\/AFLplusplus\/blob\/stable\/instrumentation\/README.persistent_mode.md Accessed: 2023-05-10"},{"key":"e_1_3_2_3_6_1","volume-title":"On the Reliability of Coverage-Based Fuzzer Benchmarking. In International Conference on Software Engineering (ICSE). http:\/\/seclab.cs.sunysb.edu\/lszekeres\/Papers\/ICSE22","author":"B\u00f6hme Marcel","year":"2022","unstructured":"Marcel B\u00f6hme, Laszlo Szekeres, and Jonathan Metzman. 2022. On the Reliability of Coverage-Based Fuzzer Benchmarking. In International Conference on Software Engineering (ICSE). http:\/\/seclab.cs.sunysb.edu\/lszekeres\/Papers\/ICSE22.pdf"},{"key":"e_1_3_2_3_7_1","volume-title":"Deep Reinforcement Fuzzing. In IEEE Security and Privacy Workshops (SPW). 116\u2013122","author":"B\u00f6ttinger Konstantin","year":"2018","unstructured":"Konstantin B\u00f6ttinger, Patrice Godefroid, and Rishabh Singh. 2018. Deep Reinforcement Fuzzing. In IEEE Security and Privacy Workshops (SPW). 116\u2013122. arxiv:1801.04589"},{"key":"e_1_3_2_3_8_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007379606734"},{"key":"e_1_3_2_3_9_1","volume-title":"International journal of information and management sciences, 17","author":"Chang Horng-Jinh","year":"2006","unstructured":"Horng-Jinh Chang, Kuo-Chung Huang, and Chao-Hsien Wu. 2006. Determination of sample size in using central limit theorem for Weibull distribution. International journal of information and management sciences, 17 (2006), 31\u201346."},{"key":"e_1_3_2_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706308"},{"key":"e_1_3_2_3_11_1","doi-asserted-by":"crossref","unstructured":"Swarat Chaudhuri and Armando Solar-Lezama. 2011. Smoothing a Program Soundly and Robustly. In Computer Aided Verification (CAV). https:\/\/www.cs.utexas.edu\/~swarat\/pubs\/cav11.pdf","DOI":"10.1007\/978-3-642-22110-1_22"},{"key":"e_1_3_2_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_3_13_1","volume-title":"USENIX Security Symposium (USENIX Security). https:\/\/www.usenix.org\/system\/files\/sec19-chen-yuanliang.pdf","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. 2019. EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers. In USENIX Security Symposium (USENIX Security). https:\/\/www.usenix.org\/system\/files\/sec19-chen-yuanliang.pdf"},{"key":"e_1_3_2_3_14_1","doi-asserted-by":"publisher","unstructured":"Albert Danial. 2021. cloc: v1.92. https:\/\/doi.org\/10.5281\/zenodo.5760077 10.5281\/zenodo.5760077","DOI":"10.5281\/zenodo.5760077"},{"key":"e_1_3_2_3_15_1","unstructured":"Poetry developers. 2018. Python Poetry. https:\/\/python-poetry.org Accessed: 2022-10-20"},{"key":"e_1_3_2_3_16_1","volume-title":"Wagner","author":"Drozd William","year":"2018","unstructured":"William Drozd and Michael D. Wagner. 2018. FuzzerGym: A Competitive Framework for Fuzzing and Learning. CoRR, arxiv:1807.07490. arxiv:1807.07490"},{"key":"e_1_3_2_3_17_1","unstructured":"Andrea Fioraldi Dominik Maier Heiko Ei\u00df feldt and Marc Heuse. [n. d.]. AFL++ best practices. https:\/\/aflplus.plus\/docs\/fuzzing_in_depth Accessed: 2022-10-20"},{"key":"e_1_3_2_3_18_1","volume-title":"USENIX Workshop on Offensive Technologies (WOOT). USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/fioraldi","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00df feldt, and Marc Heuse. 2020. AFL++ : combining incremental steps of fuzzing research. In USENIX Workshop on Offensive Technologies (WOOT). USENIX Association. https:\/\/www.usenix.org\/conference\/woot20\/presentation\/fioraldi"},{"key":"e_1_3_2_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_3_20_1","volume-title":"Advances in Neural Information Processing Systems (NIPS). 27, Curran Associates","author":"Goodfellow Ian","year":"2014","unstructured":"Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative Adversarial Nets. In Advances in Neural Information Processing Systems (NIPS). 27, Curran Associates, Inc.. https:\/\/proceedings.neurips.cc\/paper\/2014\/file\/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf"},{"key":"e_1_3_2_3_21_1","volume-title":"Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR). arxiv:1412","author":"Goodfellow Ian J.","year":"2015","unstructured":"Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In International Conference on Learning Representations (ICLR). arxiv:1412.6572"},{"key":"e_1_3_2_3_22_1","unstructured":"Google. 2017. Fuzzer test suite. https:\/\/github.com\/google\/fuzzer-test-suite Accessed: 2022-10-20"},{"key":"e_1_3_2_3_23_1","unstructured":"Google. 2022. OSS-Fuzz. https:\/\/google.github.io\/oss-fuzz\/ Accessed: 2022-10-20"},{"key":"e_1_3_2_3_24_1","volume-title":"The elements of statistical learning: data mining, inference and prediction (2 ed.)","author":"Hastie Trevor","unstructured":"Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2009. The elements of statistical learning: data mining, inference and prediction (2 ed.). Springer. http:\/\/www-stat.stanford.edu\/~tibs\/ElemStatLearn\/"},{"key":"e_1_3_2_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203241"},{"key":"e_1_3_2_3_26_1","volume-title":"Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR). arxiv:1412","author":"Diederik","unstructured":"Diederik P. Kingma and Jimmy Ba. 2015. Adam: A Method for Stochastic Optimization. In International Conference on Learning Representations (ICLR). arxiv:1412.6980"},{"key":"e_1_3_2_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_3_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"e_1_3_2_3_29_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011044"},{"key":"e_1_3_2_3_30_1","unstructured":"LLVM. 2022. libFuzzer - a library for coverage-guided fuzz testing. https:\/\/llvm.org\/docs\/LibFuzzer.html Accessed: 2022-10-20"},{"key":"e_1_3_2_3_31_1","volume-title":"Coplien","author":"Martin Robert C.","year":"2009","unstructured":"Robert C. Martin and James O. Coplien. 2009. Clean code: a handbook of agile software craftsmanship. Prentice Hall. isbn:9780132350884 0132350882 https:\/\/archive.org\/details\/cleancodehandboo00mart_843"},{"key":"e_1_3_2_3_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2600239.2600241"},{"key":"e_1_3_2_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_2_3_34_1","volume-title":"PyTorch: An Imperative Style","author":"Paszke Adam","unstructured":"Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In Advances in Neural Information Processing Systems (NeurIPS), H. Wallach, H. Larochelle, A. Beygelzimer, F. d' Alch\u00e9-Buc, E. Fox, and R. Garnett (Eds.). Curran Associates, Inc., 8024\u20138035. http:\/\/papers.neurips.cc\/paper\/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf"},{"key":"e_1_3_2_3_35_1","unstructured":"Mohit Rajpal William Blum and Rishabh Singh. 2017. Not all bytes are equal: Neural byte sieve for fuzzing. CoRR arxiv:1711.04596"},{"key":"e_1_3_2_3_36_1","volume-title":"Kegelmeyer","author":"Saavedra Gary J.","year":"2019","unstructured":"Gary J. Saavedra, Kathryn N. Rodhouse, Daniel M. Dunlavy, and Philip W. Kegelmeyer. 2019. A Review of Machine Learning Applications in Fuzzing. CoRR, arxiv:1906.11133"},{"key":"e_1_3_2_3_37_1","volume-title":"AddressSanitizer: A Fast Address Sanity Checker. In USENIX Conference on Annual Technical Conference (USENIX ATC). https:\/\/dl.acm.org\/doi\/10","author":"Serebryany Konstantin","year":"2012","unstructured":"Konstantin Serebryany, Derek Bruening, Alexander Potapenko, and Dmitry Vyukov. 2012. AddressSanitizer: A Fast Address Sanity Checker. In USENIX Conference on Annual Technical Conference (USENIX ATC). https:\/\/dl.acm.org\/doi\/10.5555\/2342821.2342849"},{"key":"e_1_3_2_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409723"},{"key":"e_1_3_2_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_3_40_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2017\/09\/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kr\u00fcgel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution. In NDSS. https:\/\/www.ndss-symposium.org\/wp-content\/uploads\/2017\/09\/driller-augmenting-fuzzing-through-selective-symbolic-execution.pdf"},{"key":"e_1_3_2_3_41_1","volume-title":"Advances in Neural Information Processing Systems (NIPS). 27, Curran Associates","author":"Sutskever Ilya","year":"2014","unstructured":"Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to Sequence Learning with Neural Networks. In Advances in Neural Information Processing Systems (NIPS). 27, Curran Associates, Inc.. https:\/\/proceedings.neurips.cc\/paper\/2014\/file\/a14ac55a4f27472c5d894ec1c3c743d2-Paper.pdf"},{"key":"e_1_3_2_3_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.23"},{"key":"e_1_3_2_3_43_1","volume-title":"Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Wang Jinghan","year":"2019","unstructured":"Jinghan Wang, Yue Duan, Wei Song, Heng Yin, and Chengyu Song. 2019. Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, 1\u201315."},{"key":"e_1_3_2_3_44_1","unstructured":"Yan Wanga Peng Jiaa Luping Liub and Jiayong Liu. 2019. A systematic review of fuzzing based on machine learning techniques. CoRR arxiv:1908.01262"},{"key":"e_1_3_2_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510174"},{"key":"e_1_3_2_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510089"},{"key":"e_1_3_2_3_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380388"},{"key":"e_1_3_2_3_48_1","volume-title":"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium (USENIX Security). USENIX Association, 745\u2013761","author":"Yun Insu","year":"2018","unstructured":"Insu Yun, Sangho Lee, Meng Xu, Yeongjin Jang, and Taesoo Kim. 2018. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing. In USENIX Security Symposium (USENIX Security). USENIX Association, 745\u2013761. isbn:978-1-939133-04-5 https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/yun"},{"key":"e_1_3_2_3_49_1","unstructured":"Michal Zalewski. 2017. American fuzzy lop. https:\/\/github.com\/google\/AFL"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616308","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T05:00:05Z","timestamp":1759986005000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":49,"alternative-id":["10.1145\/3611643.3616308","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616308","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}