{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T06:08:28Z","timestamp":1773382108692,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":93,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China (NSFC)","award":["62102315,61972314"],"award-info":[{"award-number":["62102315,61972314"]}]},{"name":"China Postdoctoral Science Foundation Fellowship","award":["2022M712575"],"award-info":[{"award-number":["2022M712575"]}]},{"name":"Shaanxi International Science and Technology Cooperation Program","award":["2023-GHZD-04"],"award-info":[{"award-number":["2023-GHZD-04"]}]},{"name":"Shaanxi Province Engineers + Scientists' Team Building Program","award":["2023KXJ-055"],"award-info":[{"award-number":["2023KXJ-055"]}]},{"name":"CCF-Tencent Open Fund","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616332","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1127-1139","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2074-4253","authenticated-orcid":false,"given":"Guixin","family":"Ye","sequence":"first","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0647-9103","authenticated-orcid":false,"given":"Tianmin","family":"Hu","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4333-2334","authenticated-orcid":false,"given":"Zhanyong","family":"Tang","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5312-1150","authenticated-orcid":false,"given":"Zhenye","family":"Fan","sequence":"additional","affiliation":[{"name":"Northwest University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8633-3372","authenticated-orcid":false,"given":"Shin Hwei","family":"Tan","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-9967-1802","authenticated-orcid":false,"given":"Bo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Tencent Security Platform Department, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6635-3517","authenticated-orcid":false,"given":"Wenxiang","family":"Qian","sequence":"additional","affiliation":[{"name":"Tencent Security Platform Department, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6157-0662","authenticated-orcid":false,"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Leeds, Leeds, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n. d.]. https:\/\/jshint.com\/"},{"key":"e_1_3_2_2_2_1","unstructured":"[n. d.]. Esprima: ECMAScript parsing infrastructure for multipurpose analysis.. https:\/\/esprima.org\/"},{"key":"e_1_3_2_2_3_1","unstructured":"[n. d.]. Gcov. https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html"},{"key":"e_1_3_2_2_4_1","unstructured":"[n. d.]. JavaCompiler. https:\/\/docs.oracle.com\/javase\/8\/docs\/api\/javax\/tools\/JavaCompiler.html"},{"key":"e_1_3_2_2_5_1","unstructured":"[n. d.]. Lcov. https:\/\/github.com\/linux-test-project\/lcov"},{"key":"e_1_3_2_2_6_1","unstructured":"[n. d.]. llvm-cov. https:\/\/www.llvm.org\/docs\/CommandGuide\/llvm-cov.html"},{"key":"e_1_3_2_2_7_1","unstructured":"[n. d.]. Mutators of COMFUZZ. https:\/\/github.com\/NWU-NISL-Fuzzing\/COMFUZZ\/blob\/main\/docs\/ComFuzz-mutators.md"},{"key":"e_1_3_2_2_8_1","volume-title":"d.]. OpenJDK Test7052494.  https:\/\/github.com\/openjdk\/jdk7u\/blob\/master\/hotspot\/test\/compiler\/7052494\/Test7052494.java#L56","unstructured":"[n. d.]. OpenJDK Test7052494. https:\/\/github.com\/openjdk\/jdk7u\/blob\/master\/hotspot\/test\/compiler\/7052494\/Test7052494.java#L56"},{"key":"e_1_3_2_2_9_1","unstructured":"[n. d.]. The sort function. https:\/\/github.com\/oowuyue\/notebook\/blob\/9efd633366c4d2721d76bb9ce7f95b89cc1260cb\/js\/js-gist\/fortune500.js#L166"},{"key":"e_1_3_2_2_10_1","unstructured":"[n. d.]. Test262: ECMAScript Test Suite (ECMA TR\/104). https:\/\/github.com\/tc39\/test262"},{"key":"e_1_3_2_2_11_1","volume-title":"International Conference on Learning Representations.","author":"Allamanis Miltiadis","year":"2018","unstructured":"Miltiadis Allamanis, Marc Brockschmidt, and Mahmoud Khademi. 2018. Learning to Represent Programs with Graphs. In International Conference on Learning Representations."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2827384"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534376"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062349"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the International Conference on Machine Learning (ICML). 2933\u20132942","author":"Bielik Pavol","year":"2016","unstructured":"Pavol Bielik, Veselin Raychev, and Martin Vechev. 2016. PHOG: probabilistic model for code. In Proceedings of the International Conference on Machine Learning (ICML). 2933\u20132942."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3016773"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_2_2_18_1","volume-title":"CONFUZZION: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities. In 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS). 586\u2013597","author":"Bonnaventure William","year":"2021","unstructured":"William Bonnaventure, Ahmed Khanfir, Alexandre Bartel, Mike Papadakis, and Yves Le Traon. 2021. CONFUZZION: A Java Virtual Machine Fuzzer for Type Confusion Vulnerabilities. In 2021 IEEE 21st International Conference on Software Quality, Reliability and Security (QRS). 586\u2013597."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377555.3377894"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2014.33"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISIS.2013.99"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.50"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523427"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363562"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00127"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908095"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00071"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380381"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213848"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2017.24"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2006.51"},{"key":"e_1_3_2_2_32_1","volume-title":"Markov chain Monte Carlo in practice","author":"Gilks Walter R","unstructured":"Walter R Gilks, Sylvia Richardson, and David Spiegelhalter. 1995. Markov chain Monte Carlo in practice. CRC press."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115618"},{"key":"e_1_3_2_2_35_1","unstructured":"Rahul Gopinath Bj\u00f6rn Mathis Mathias H\u00f6schele Alexander Kampmann and Andreas Zeller. 2018. Sample-free learning of input grammars for comprehensive software fuzzing. arXiv preprint arXiv:1810.08289 https:\/\/doi.org\/arXiv:1810.08289"},{"key":"e_1_3_2_2_36_1","unstructured":"Samuel Gro\u00df. 2018. FuzzIL: Coverage guided fuzzing for JavaScript engines. Ph. D. Dissertation. Master\u2019s thesis Karlsruhe Institute of Technology.."},{"key":"e_1_3_2_2_37_1","volume-title":"Henri E Bal, Ceriel JH Jacobs, and Koen Langendoen.","author":"Grune Dick","year":"2012","unstructured":"Dick Grune, Kees Van Reeuwijk, Henri E Bal, Ceriel JH Jacobs, and Koen Langendoen. 2012. Modern compiler design. Springer Science & Business Media."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIA.2013.6650258"},{"key":"e_1_3_2_2_39_1","volume-title":"2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). 1211\u20131215","author":"Gupta Varuna","year":"2015","unstructured":"Varuna Gupta, N Ganeshan, and Tarun Kumar Singhal. 2015. Determining the root causes of various software bugs through software metrics. In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom). 1211\u20131215."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.14722\/NDSS.2019.23263"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363230"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1162\/NECO.1997.9.8.1735"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362831"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092282.3092285"},{"key":"e_1_3_2_2_46_1","volume-title":"Proceedings of the International Conference on Learning Representations (ICLR). https:\/\/doi.org\/arXiv:1412","author":"Diederik","unstructured":"Diederik P. Kingma and Jimmy Lei Ba. 2015. Adam: A Method for Stochastic Optimization. In Proceedings of the International Conference on Learning Representations (ICLR). https:\/\/doi.org\/arXiv:1412.6980"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3383458"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594334"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3364452.3364455"},{"key":"e_1_3_2_2_50_1","first-page":"17","volume-title":"Proceedings of the 29th USENIX Security Symposium (USENIX Security). 2613\u20132630","author":"Lee Suyoung","year":"2020","unstructured":"Suyoung Lee, HyungSeok Han, Sang Kil Cha, and Sooel Son. 2020. Montage: A Neural Network Language Model-Guided JavaScript Fuzzer. In Proceedings of the 29th USENIX Security Symposium (USENIX Security). 2613\u20132630. isbn:978-1-939133-17-5"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23158"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737986"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737986"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380923"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3527317"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33011044"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321653"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314651"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397348"},{"key":"e_1_3_2_2_61_1","first-page":"100","article-title":"Differential Testing for Software","volume":"10","author":"Mckeeman W. M.","year":"1998","unstructured":"W. M. Mckeeman. 1998. Differential Testing for Software. Digital Technical Journal, 10, 1 (1998), 100\u2013107.","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","unstructured":"Facundo Molina Marcelo d\u2019Amorim and Nazareno Aguirre. 2022. Fuzzing Class Specifications. https:\/\/doi.org\/10.48550\/ARXIV.2201.10874 10.48550\/ARXIV.2201.10874","DOI":"10.48550\/ARXIV.2201.10874"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330576"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259042"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00067"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366428.3380768"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523457"},{"key":"e_1_3_2_2_68_1","first-page":"9","article-title":"Language models are unsupervised multitask learners","volume":"1","author":"Radford Alec","year":"2019","unstructured":"Alec Radford, Jeffrey Wu, Rewon Child, David Luan, Dario Amodei, and Ilya Sutskever. 2019. Language models are unsupervised multitask learners. OpenAI Blog, 1, 8 (2019), 9.","journal-title":"OpenAI Blog"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2671225.2671280"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678776"},{"key":"e_1_3_2_2_71_1","unstructured":"Victor Sanh Lysandre Debut Julien Chaumond and Thomas Wolf. 2019. DistilBERT a distilled version of BERT: smaller faster cheaper and lighter. In NeurIPS EMC2 Workshop."},{"key":"e_1_3_2_2_72_1","unstructured":"Mozilla Security. 2007. funfuzz. https:\/\/github.com\/MozillaSecurity\/funfuzz"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884829"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_2_75_1","volume-title":"Danny Van Bruggen, and Federico Tomassetti","author":"Smith Nicholas","year":"2017","unstructured":"Nicholas Smith, Danny Van Bruggen, and Federico Tomassetti. 2017. Javaparser: visited. Leanpub, oct. de."},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464814"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884879"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931074"},{"key":"e_1_3_2_2_79_1","volume-title":"Sequence to sequence learning with neural networks. Advances in neural information processing systems, 27","author":"Sutskever Ilya","year":"2014","unstructured":"Ilya Sutskever, Oriol Vinyals, and Quoc V Le. 2014. Sequence to sequence learning with neural networks. Advances in neural information processing systems, 27 (2014)."},{"key":"e_1_3_2_2_80_1","unstructured":"Michael Sutton Adam Greene and Pedram Amini. 2007. Fuzzing: brute force vulnerability discovery. Pearson Education."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_29"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.3044773"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454054"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3410463.3414670"},{"key":"e_1_3_2_2_88_1","unstructured":"Michal Zalewski. 2014. American Fuzzy Lop. https:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556958"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062379"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510059"},{"key":"e_1_3_2_2_92_1","volume-title":"USENIX Security Symposium. 1099\u20131114","author":"Zheng Yaowen","year":"2019","unstructured":"Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, and Limin Sun. 2019. FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation.. In USENIX Security Symposium. 1099\u20131114."},{"key":"e_1_3_2_2_93_1","volume-title":"Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Advances in neural information processing systems, 32","author":"Zhou Yaqin","year":"2019","unstructured":"Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, and Yang Liu. 2019. Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks. Advances in neural information processing systems, 32 (2019)."}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616332","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:11Z","timestamp":1750178171000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":93,"alternative-id":["10.1145\/3611643.3616332","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616332","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}