{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:07Z","timestamp":1750309507096,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,23]],"date-time":"2024-06-23T00:00:00Z","timestamp":1719100800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["No.62372218"],"award-info":[{"award-number":["No.62372218"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,23]]},"DOI":"10.1145\/3649329.3655946","type":"proceedings-article","created":{"date-parts":[[2024,11,7]],"date-time":"2024-11-07T19:27:22Z","timestamp":1731007642000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["TATOO: A Flexible Hardware Platform for Binary-Only Fuzzing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6871-5174","authenticated-orcid":false,"given":"Jinting","family":"Wu","sequence":"first","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-0461-1572","authenticated-orcid":false,"given":"Haodong","family":"Zheng","sequence":"additional","affiliation":[{"name":"Southern University of Sciencec and Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7082-0459","authenticated-orcid":false,"given":"Yu","family":"Wang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7276-8735","authenticated-orcid":false,"given":"Tai","family":"Yue","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3365-2526","authenticated-orcid":false,"given":"Fengwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, Guangdong, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Arm 2016. Arm coresight soc-400 technical reference manual. Arm. https:\/\/developer.arm.com\/documentation\/100536\/latest\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. NDSS' 19","volume":"19","author":"Cornelius A.","year":"2019","unstructured":"A. Cornelius et al. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence.. In Proc. NDSS' 19, Vol. 19. 1--15."},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. USENIX WOOT' 20","author":"Fioraldi A.","year":"2020","unstructured":"A. Fioraldi et al. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In Proc. USENIX WOOT' 20."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/bar.2018.23014"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2851237"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"H. Kannan et al. 2009. Decoupling dynamic information flow tracking with a dedicated coprocessor. In IEEE\/IFIP DSN' 09. IEEE 105--114.","DOI":"10.1109\/DSN.2009.5270347"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"e_1_3_2_1_8_1","first-page":"545","article-title":"CHERIvoke: Characterising Pointer Revocation Using CHERI Capabilities for Temporal Memory Safety","volume":"52","author":"Xia H.","year":"2019","unstructured":"H. Xia et al. 2019. CHERIvoke: Characterising Pointer Revocation Using CHERI Capabilities for Temporal Memory Safety. In Proc. MICRO' 52. 545--557.","journal-title":"Proc. MICRO'"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. USENIX Security' 19)","author":"Jung J.","year":"2019","unstructured":"J. Jung et al. 2019. Fuzzification:{Anti-Fuzzing} Techniques. In Proc. USENIX Security' 19). 1913--1930."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNIDC.2014.7000307"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2966986.2966991"},{"key":"e_1_3_2_1_12_1","first-page":"807","article-title":"PHMon","volume":"20","author":"Delshadtehrani L.","year":"2020","unstructured":"L. Delshadtehrani et al. 2020. PHMon: A Programmable Hardware Monitor and Its Security Use Cases. In Proc. USENIX Security' 20. 807--824.","journal-title":"In Proc. USENIX Security'"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23368"},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. ACM CCS' 21","author":"Ding R.","year":"2021","unstructured":"R. Ding et al. 2021. Hardware Support to Improve Fuzzing Performance and Precision (to appear). In Proc. ACM CCS' 21. Seoul, South Korea."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586289"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. USENIX Security' 20","author":"Gan S.","year":"2020","unstructured":"S. Gan et al. 2020. GREYONE: Data Flow Sensitive Fuzzing. In Proc. USENIX Security' 20. USENIX Association, 2577--2594."},{"key":"e_1_3_2_1_18_1","first-page":"1683","article-title":"Breaking Through Binaries","volume":"21","author":"Nagy S.","year":"2021","unstructured":"S. Nagy et al. 2021. Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing. In Proc. USENIX Security' 21. 1683--1700.","journal-title":"Compiler-quality Instrumentation for Better Binary-only Fuzzing. In Proc. USENIX Security'"},{"key":"e_1_3_2_1_19_1","first-page":"167","article-title":"kAFL","volume":"17","author":"Schumilo S.","year":"2017","unstructured":"S. Schumilo et al. 2017. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. In Proc. USENIX Security' 17. 167--182.","journal-title":"Hardware-Assisted Feedback Fuzzing for OS Kernels. In Proc. USENIX Security'"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23068"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. ICSE'22","author":"Li W.","year":"2022","unstructured":"W. Li et al. 2022. \u03bcAFL: Non-Intrusive Feedback-Driven Fuzzing for Microcontroller Firmware. In Proc. ICSE'22. 1--12."},{"key":"e_1_3_2_1_22_1","unstructured":"Y. Bradbury et al. 2014. Tagged memory and minion cores in the lowRISC SoC. Memo University of Cambridge (2014)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329828"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. NDSS' 19","author":"Chua Z.","year":"2019","unstructured":"Z. Chua et al. 2019. One Engine To Serve'em All: Inferring Taint Rules Without Architectural Semantics.. In Proc. NDSS' 19."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00109"},{"key":"e_1_3_2_1_26_1","unstructured":"Z. Zheng et al. 2022. Detecting Process Hijacking and Software Supply Chain Attacks Using Intel\u00ae Threat Detection Technology. (2022)."},{"volume-title":"Intel processor trace on linux. Tracing Summit 2015","year":"2015","key":"e_1_3_2_1_27_1","unstructured":"Andi Kleen and Beeman Strong. 2015. Intel processor trace on linux. Tracing Summit 2015 (2015)."}],"event":{"name":"DAC '24: 61st ACM\/IEEE Design Automation Conference","sponsor":["SIGDA ACM Special Interest Group on Design Automation","IEEE-CEDA","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"San Francisco CA USA","acronym":"DAC '24"},"container-title":["Proceedings of the 61st ACM\/IEEE Design Automation Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3655946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649329.3655946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:54Z","timestamp":1750295874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649329.3655946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,23]]},"references-count":27,"alternative-id":["10.1145\/3649329.3655946","10.1145\/3649329"],"URL":"https:\/\/doi.org\/10.1145\/3649329.3655946","relation":{},"subject":[],"published":{"date-parts":[[2024,6,23]]},"assertion":[{"value":"2024-11-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}