{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:58:54Z","timestamp":1750309134974,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62002361,62272465, U1836209 and 62272464"],"award-info":[{"award-number":["62002361,62272465, U1836209 and 62272464"]}]},{"name":"Fundamental Research Funds for the Central Universities and the Research Funds of Renmin University of China","award":["2XNKJ29"],"award-info":[{"award-number":["2XNKJ29"]}]},{"name":"Office of Naval Research","award":["N000142012733, N000142312081"],"award-info":[{"award-number":["N000142012733, N000142312081"]}]},{"name":"National Science Foundation","award":["CCF1910300, CCF1901242"],"award-info":[{"award-number":["CCF1910300, CCF1901242"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3652128","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"287-299","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Define-Use Guided Path Exploration for Better Forced Execution"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-3370-8627","authenticated-orcid":false,"given":"Dongnan","family":"He","sequence":"first","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-9000-168X","authenticated-orcid":false,"given":"Dongchen","family":"Xie","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3345-5861","authenticated-orcid":false,"given":"Yujie","family":"Wang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1009-6627","authenticated-orcid":false,"given":"Wei","family":"You","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4818-7164","authenticated-orcid":false,"given":"Bin","family":"Liang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4403-0060","authenticated-orcid":false,"given":"Jianjun","family":"Huang","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5160-1223","authenticated-orcid":false,"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[{"name":"Renmin University of China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6515-0021","authenticated-orcid":false,"given":"Zhuo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9544-2500","authenticated-orcid":false,"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. API hooks of Cuckoo. https:\/\/github.com\/cuckoosandbox\/monitor\/tree\/master\/sigs"},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Evil Clone Attack. https:\/\/gbhackers.com\/evil-clone-attack-legitimate-pdf-software"},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Padawan. https:\/\/padawan.s3.eurecom.fr\/about"},{"key":"e_1_3_2_1_4_1","unstructured":"2019. Fileless Malware. https:\/\/www.cybereason.com\/blog\/fileless-malware"},{"key":"e_1_3_2_1_5_1","unstructured":"2020. Cuckoo. https:\/\/cuckoosandbox.org\/"},{"volume-title":"Cybercrime To Cost The World $10.5 Trillion Annually By","year":"2025","key":"e_1_3_2_1_6_1","unstructured":"2020. Cybercrime To Cost The World $10.5 Trillion Annually By 2025. https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/"},{"key":"e_1_3_2_1_7_1","unstructured":"2023. VirusShare. https:\/\/virusshare.com\/"},{"key":"e_1_3_2_1_8_1","unstructured":"2024. Clickless PowerPoint Malware Installs When Users Hover Over a Link. https:\/\/blog.barkly.com\/powerpoint-malware-installs-when-users-hover-over-a-link"},{"key":"e_1_3_2_1_9_1","unstructured":"2024. Details of Malware Analysis Result. https:\/\/www.virustotal.com\/gui\/file\/3110f00c1c48bbba24931042657a21c55e9a07d2ef315c2eae0a422234623194"},{"key":"e_1_3_2_1_10_1","unstructured":"2024. Malware Anafor Case Study. https:\/\/github.com\/DueForce\/DueForce\/blob\/main\/MalwareAnalysis.pdf"},{"key":"e_1_3_2_1_11_1","unstructured":"2024. Pin - A Dynamic Binary Instrumentation Tool. https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/tool\/pin-a-dynamic-binary-instrumentation-tool.html"},{"key":"e_1_3_2_1_12_1","unstructured":"2024. Qemu User Emulation. https:\/\/wiki.debian.org\/QemuUserEmulation"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2015.7413692"},{"key":"e_1_3_2_1_14_1","volume-title":"Security Report","author":"Australian Digital Health Agency","year":"2022","unstructured":"Australian Digital Health Agency. 2022. Cyber Security Report 2022. https:\/\/www.digitalhealth.gov.au\/sites\/default\/files\/documents\/cyber-security-report-2022.pdf"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451128"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644865.2541973"},{"key":"e_1_3_2_1_17_1","volume-title":"SPEC2000","author":"ATA.","year":"2023","unstructured":"ATA. 2023. SPEC2000. http:\/\/www.spec2000.com\/"},{"key":"e_1_3_2_1_18_1","volume-title":"International conference on compiler construction. 5\u201323","author":"Balakrishnan Gogul","year":"2004","unstructured":"Gogul Balakrishnan and Thomas Reps. 2004. Analyzing memory accesses in x86 executables. In International conference on compiler construction. 5\u201323."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420969"},{"key":"e_1_3_2_1_22_1","volume-title":"International Symposium on Research in Attacks, Intrusions, and Defenses.","author":"Buyukkayhan Ahmet Salih","year":"2017","unstructured":"Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li, and William Robertson. 2017. Lens on the endpoint: Hunting for malicious software through endpoint data analysis. In International Symposium on Research in Attacks, Intrusions, and Defenses."},{"key":"e_1_3_2_1_23_1","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, and Dawson R Engler. 2008. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs.. In OSDI. 8, 209\u2013224.","journal-title":"OSDI."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2248487.1950396"},{"key":"e_1_3_2_1_25_1","volume-title":"1997 Proceedings International Conference on Software Maintenance. 188\u2013195","author":"Cifuentes Cristina","year":"1997","unstructured":"Cristina Cifuentes and Antoine Fraboulet. 1997. Intraprocedural static slicing of binary executables. In 1997 Proceedings International Conference on Software Maintenance. 188\u2013195."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268948"},{"key":"e_1_3_2_1_27_1","unstructured":"M. Eddington. 2014. \"Peach fuzzing platform\". http:\/\/community.peachfuzzer.com\/WhatIsPeach.html"},{"key":"e_1_3_2_1_28_1","unstructured":"ESET. 2024. ESET Anti-Virus Software. https:\/\/www.eset.com\/"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2005.27"},{"key":"e_1_3_2_1_31_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Guo Wenbo","year":"2019","unstructured":"Wenbo Guo, Dongliang Mu, Xinyu Xing, Min Du, and Dawn Song. 2019. $DEEPVSA$: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis. In 28th USENIX Security Symposium (USENIX Security 19). 1787\u20131804."},{"key":"e_1_3_2_1_32_1","volume-title":"Security and Privacy in Communication Networks: 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22\u201325, 2017, Proceedings 13","author":"Hu Xunchao","year":"2018","unstructured":"Xunchao Hu, Yao Cheng, Yue Duan, Andrew Henderson, and Heng Yin. 2018. Jsforce: A forced execution engine for malicious javascript detection. In Security and Privacy in Communication Networks: 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22\u201325, 2017, Proceedings 13. 704\u2013720."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052674"},{"key":"e_1_3_2_1_34_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Kim Tae Eun","year":"2023","unstructured":"Tae Eun Kim, Jaeseung Choi, Kihong Heo, and Sang Kil Cha. 2023. $DAFL$: Directed Grey-box Fuzzing guided by Data Dependency. In 32nd USENIX Security Symposium (USENIX Security 23). 4931\u20134948."},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX 2009, 18th Usenix Security Symposium. http:\/\/www.eurecom.fr\/publication\/2774","author":"Kolbitsch Clemens","year":"2009","unstructured":"Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiaoyong Zhou, and Xiaofeng Wang. 2009. Effective and efficient malware detection at the end host. In USENIX 2009, 18th Usenix Security Symposium. http:\/\/www.eurecom.fr\/publication\/2774"},{"key":"e_1_3_2_1_36_1","volume-title":"2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P). 286\u2013302","author":"Mantovani Alessandro","year":"2022","unstructured":"Alessandro Mantovani, Andrea Fioraldi, and Davide Balzarotti. 2022. Fuzzing with data dependency information. In 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P). 286\u2013302."},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 2006 Workshop on Binary Instrumentation and Applications (WBIA).","author":"Moseley Tipp","year":"2006","unstructured":"Tipp Moseley, Dirk Grunwald, Daniel A Connors, Ram Ramanujam, Vasanth Tovinkere, and Ramesh Peri. 2006. Loopprof: Dynamic techniques for loop detection and profiling. In Proceedings of the 2006 Workshop on Binary Instrumentation and Applications (WBIA)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549147"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 23rd USENIX Security Symposium.","author":"Peng Fei","year":"2014","unstructured":"Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, and Zhendong Su. 2014. X-Force: Force-Executing Binary Programs for Security Applications. In Proceedings of the 23rd USENIX Security Symposium."},{"key":"e_1_3_2_1_41_1","volume-title":"VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing. In 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. https:\/\/www.ndss-symposium.org\/ndss2017\/ndss-2017-programme\/vuzzer-application-aware-evolutionary-fuzzing\/"},{"key":"e_1_3_2_1_42_1","volume-title":"International Conference on Compiler Construction. 16\u201335","author":"Reps Thomas","year":"2008","unstructured":"Thomas Reps and Gogul Balakrishnan. 2008. Improved memory-access analysis for x86 executables. In International Conference on Compiler Construction. 16\u201335."},{"key":"e_1_3_2_1_43_1","unstructured":"R.Swiecki and F.Grobert. 2010. \"honggfuzz\". https:\/\/github.com\/google\/honggfuzz"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89862-7_1"},{"key":"e_1_3_2_1_46_1","volume-title":"Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS. 16.","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting Fuzzing Through Selective Symbolic Execution.. In NDSS. 16."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238221"},{"key":"e_1_3_2_1_48_1","unstructured":"VirusTotal. 2024. Malware Report for Case Study. https:\/\/www.virustotal.com\/gui\/file\/0bd4ab6ed21edca2195159026913ec617adb69b63c3ee2adb37e1932700809be"},{"key":"e_1_3_2_1_49_1","unstructured":"Liang Xu Fangqi Sun and Zhendong Su. 2010. Constructing Precise Control Flow Graphs from Binaries. https:\/\/api.semanticscholar.org\/CorpusID:15538708"},{"key":"e_1_3_2_1_50_1","volume-title":"Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Xue Lei","year":"2017","unstructured":"Lei Xue, Yajin Zhou, Ting Chen, Xiapu Luo, and Guofei Gu. 2017. Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC. 289\u2013306. isbn:978-1-931971-40-9 https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/xue"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315261"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00035"},{"key":"e_1_3_2_1_53_1","unstructured":"M. Zalewski. 2014. \"American Fuzzy Lop\". http:\/\/lcamtuf.coredump.cx\/afl\/"},{"key":"e_1_3_2_1_54_1","volume-title":"Proc. ACM Program. Lang., 3, OOPSLA","author":"Zhang Zhuo","year":"2019","unstructured":"Zhuo Zhang, Wei You, Guanhong Tao, Guannan Wei, Yonghwi Kwon, and Xiangyu Zhang. 2019. BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation. Proc. ACM Program. Lang., 3, OOPSLA (2019), 137:1\u2013137:31."}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"],"location":"Vienna Austria","acronym":"ISSTA '24"},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652128","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3652128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:06Z","timestamp":1750287006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":53,"alternative-id":["10.1145\/3650212.3652128","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3652128","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}