{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:25:50Z","timestamp":1776954350610,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":167,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T00:00:00Z","timestamp":1726012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Key RD Program of Zhejiang Province","award":["No.2022C01165"],"award-info":[{"award-number":["No.2022C01165"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,11]]},"DOI":"10.1145\/3650212.3652133","type":"proceedings-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:44:25Z","timestamp":1726055065000},"page":"350-362","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0808-4102","authenticated-orcid":false,"given":"Hao","family":"Xiong","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China \/ ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-5549-0826","authenticated-orcid":false,"given":"Qinming","family":"Dai","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China \/ ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0178-0171","authenticated-orcid":false,"given":"Rui","family":"Chang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China \/ ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5857-1510","authenticated-orcid":false,"given":"Mingran","family":"Qiu","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China \/ ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1960-6213","authenticated-orcid":false,"given":"Renxiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China \/ ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2899-6121","authenticated-orcid":false,"given":"Wenbo","family":"Shen","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China \/ ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7610-4736","authenticated-orcid":false,"given":"Yajin","family":"Zhou","sequence":"additional","affiliation":[{"name":"Zhejiang University, Hangzhou, China \/ ZJU-Hangzhou Global Scientific and Technological Innovation Center, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,9,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"5","volume":"13","year":"1984","unstructured":"1984. SIGCOMM Comput. Commun. Rev., 13-14, 5-1 (1984), issn:0146-4833","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"e_1_3_2_1_2_1","volume-title":"CHI \u201908: CHI \u201908 extended abstracts on Human factors in computing systems. ACM","unstructured":"2008. CHI \u201908: CHI \u201908 extended abstracts on Human factors in computing systems. ACM, New York, NY, USA. isbn:978-1-60558-012-X General Chair-Czerwinski, Mary and General Chair-Lund, Arnie and Program Chair-Tan, Desney"},{"key":"e_1_3_2_1_3_1","unstructured":"2010. dex2jar. https:\/\/github.com\/pxb1988\/dex2jar"},{"key":"e_1_3_2_1_4_1","unstructured":"2013. jadx. https:\/\/github.com\/skylot\/jadx"},{"key":"e_1_3_2_1_5_1","unstructured":"2015. IDAPython. https:\/\/github.com\/idapython\/src"},{"key":"e_1_3_2_1_6_1","unstructured":"2016. oss-fuzz. https:\/\/github.com\/google\/oss-fuzz"},{"key":"e_1_3_2_1_7_1","unstructured":"2017. Androguard. https:\/\/github.com\/androguard\/androguard"},{"key":"e_1_3_2_1_8_1","unstructured":"2019. fuzzing-corpus. https:\/\/github.com\/strongcourage\/fuzzing-corpus"},{"key":"e_1_3_2_1_9_1","unstructured":"2020. MMS Exploit. https:\/\/googleprojectzero.blogspot.com\/2020\/07\/mms-exploit-part-1-introduction-to-qmage.html"},{"key":"e_1_3_2_1_10_1","unstructured":"2020. qasan. https:\/\/github.com\/andreafioraldi\/qasan"},{"key":"e_1_3_2_1_11_1","unstructured":"2021. OpenJDK. https:\/\/github.com\/PojavLauncherTeam\/android-openjdk-build-multiarch"},{"key":"e_1_3_2_1_12_1","unstructured":"2022. The Hidden RCE Surfaces That Control the Droids. https:\/\/www.blackhat.com\/asia-22\/briefings\/schedule\/index.html#the-hidden-rce-surfaces-that-control-the-droids-26083"},{"key":"e_1_3_2_1_13_1","volume-title":"USENIX Security Symposium. 2759\u20132776","author":"Aafer Yousra","year":"2021","unstructured":"Yousra Aafer, Wei You, Yi Sun, Yu Shi, Xiangyu Zhang, and Heng Yin. 2021. Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.. In USENIX Security Symposium. 2759\u20132776."},{"key":"e_1_3_2_1_14_1","unstructured":"Rafal Ablamowicz and Bertfried Fauser. 2007. CLIFFORD: a Maple 11 Package for Clifford Algebra Computations version 11. http:\/\/math.tntech.edu\/rafal\/cliff11\/index.html"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188913.1188915"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the IEEE 1st International Conference on Broadnets Networks (BroadNets\u201904)","author":"Adya A.","unstructured":"A. Adya, P. Bahl, J. Padhye, A.Wolman, and L. Zhou. 2004. A multi-radio unification protocol for IEEE 802.11 wireless networks. In Proceedings of the IEEE 1st International Conference on Broadnets Networks (BroadNets\u201904). IEEE, Los Alamitos, CA. 210\u2013217."},{"key":"e_1_3_2_1_17_1","volume-title":"The Network and Distributed System Security Symposium","author":"Afonso Vitor","year":"2016","unstructured":"Vitor Afonso, Antonio Bianchi, Yanick Fratantonio, Adam Doup\u00e9, Mario Polino, Paulo de Geus, Christopher Kruegel, and Giovanni Vigna. 2016. Going native: Using a large-scale analysis of android apps to create a practical native-code sandboxing policy. In The Network and Distributed System Security Symposium 2016. 1\u201315."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.10.002"},{"key":"e_1_3_2_1_19_1","first-page":"393","article-title":"Wireless Sensor Networks: A Survey","volume":"38","author":"Akyildiz I. F.","year":"2002","unstructured":"I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. 2002. Wireless Sensor Networks: A Survey. Comm. ACM, 38, 4 (2002), 393\u2013422.","journal-title":"Comm. ACM"},{"key":"e_1_3_2_1_20_1","unstructured":"2015. Using the amsthm Package. http:\/\/www.ctan.org\/pkg\/amsthm"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/567752.567774"},{"key":"e_1_3_2_1_22_1","volume-title":"Optimal Motion Control of a Ground Vehicle. Master\u2019s thesis","author":"Anisi David A.","unstructured":"David A. Anisi. 2003. Optimal Motion Control of a Ground Vehicle. Master\u2019s thesis. Royal Institute of Technology (KTH), Stockholm, Sweden."},{"key":"e_1_3_2_1_23_1","unstructured":"Sam Anzaroot and Andrew McCallum. 2013. UMass Citation Field Extraction Dataset. http:\/\/www.iesl.cs.umass.edu\/data\/data-umasscitationfield"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Sam Anzaroot Alexandre Passos David Belanger and Andrew McCallum. 2014. Learning Soft Linear Constraints with Application to Citation Field Extraction. arxiv:1403.1349.","DOI":"10.3115\/v1\/P14-1056"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/357233.357234"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382222"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3340456"},{"key":"e_1_3_2_1_28_1","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 223\u2013233","author":"Bae Sora","year":"2019","unstructured":"Sora Bae, Sungho Lee, and Sukyoung Ryu. 2019. Towards understanding and reasoning about android interoperations. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). 223\u2013233."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceeding of the 10th International Conference on Mobile Computing and Networking (MobiCom\u201904)","author":"Bahl P.","unstructured":"P. Bahl, R. Chancre, and J. Dungeon. 2004. SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE 802.11 Ad-Hoc Wireless Networks. In Proceeding of the 10th International Conference on Mobile Computing and Networking (MobiCom\u201904). ACM, New York, NY. 112\u2013117."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Lutz Bornmann K. Brad Wray and Robin Haunschild. 2019. Citation concept analysis (CCA)\u2014A new form of citation analysis revealing the usefulness of concepts for other researchers illustrated by two exemplary case studies including classic books by Thomas S. Kuhn and Karl R. Popper. arxiv:1905.12410.","DOI":"10.1007\/s11192-019-03326-2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/161468.161471"},{"key":"e_1_3_2_1_33_1","first-page":"291","article-title":"Babel, a Multilingual Style-Option System for Use with LaTeX\u2019s Standard Document Styles","volume":"12","author":"Braams Johannes","year":"1991","unstructured":"Johannes Braams. 1991. Babel, a Multilingual Style-Option System for Use with LaTeX\u2019s Standard Document Styles. TUGboat, 12, 2 (1991), June, 291\u2013301.","journal-title":"TUGboat"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.68"},{"key":"e_1_3_2_1_35_1","volume-title":"Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6\u20138, 2016. Proceedings 8. 72\u201388","author":"Brucker Achim D","year":"2016","unstructured":"Achim D Brucker and Michael Herzberg. 2016. On the static analysis of hybrid mobile apps: A report on the state of apache cordova nation. In Engineering Secure Software and Systems: 8th International Symposium, ESSoS 2016, London, UK, April 6\u20138, 2016. Proceedings 8. 72\u201388."},{"key":"e_1_3_2_1_36_1","volume-title":"TEEzz: Fuzzing Trusted Applications on COTS Android Devices. In 2023 IEEE Symposium on Security and Privacy (SP). 220\u2013235","author":"Busch Marcel","year":"2022","unstructured":"Marcel Busch, Aravind Machiry, Chad Spensky, Giovanni Vigna, Christopher Kruegel, and Mathias Payer. 2022. TEEzz: Fuzzing Trusted Applications on COTS Android Devices. In 2023 IEEE Symposium on Security and Privacy (SP). 220\u2013235."},{"key":"e_1_3_2_1_37_1","volume-title":"Knott","author":"Buss Jonathan F.","year":"1987","unstructured":"Jonathan F. Buss, Arnold L. Rosenberg, and Judson D. Knott. 1987. Vertex Types in Book-Embeddings. Amherst, MA, USA."},{"key":"e_1_3_2_1_38_1","volume-title":"Knott","author":"Buss Jonathan F.","year":"1987","unstructured":"Jonathan F. Buss, Arnold L. Rosenberg, and Judson D. Knott. 1987. Vertex Types in Book-Embeddings. Amherst, MA, USA."},{"key":"e_1_3_2_1_39_1","volume-title":"Menghan Sun, Ronghai Yang, and Kehuan Zhang.","author":"Chen Jiongyi","year":"2018","unstructured":"Jiongyi Chen, Wenrui Diao, Qingchuan Zhao, Chaoshun Zuo, Zhiqiang Lin, XiaoFeng Wang, Wing Cheong Lau, Menghan Sun, Ronghai Yang, and Kehuan Zhang. 2018. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.. In NDSS."},{"key":"e_1_3_2_1_40_1","volume-title":"Post Congress Tristesse. In TeX90 Conference Proceedings. 84\u201389","author":"Clark Malcolm","year":"1991","unstructured":"Malcolm Clark. 1991. Post Congress Tristesse. In TeX90 Conference Proceedings. 84\u201389."},{"key":"e_1_3_2_1_41_1","volume-title":"Algorithms for Closest-Point Problems (Computational Geometry). Ph. D. Dissertation","author":"Clarkson Kenneth L.","unstructured":"Kenneth L. Clarkson. 1985. Algorithms for Closest-Point Problems (Computational Geometry). Ph. D. Dissertation. Stanford University. Palo Alto, CA. UMI Order Number: AAT 8506171"},{"key":"e_1_3_2_1_42_1","volume-title":"Algorithms for Closest-Point Problems (Computational Geometry). Ph. D. Dissertation","author":"Clarkson Kenneth Lee","unstructured":"Kenneth Lee Clarkson. 1985. Algorithms for Closest-Point Problems (Computational Geometry). Ph. D. Dissertation. Stanford University. Stanford, CA, USA. AAT 8506171"},{"key":"e_1_3_2_1_43_1","volume-title":"Special issue: Digital Libraries. Commun. ACM, 39, 11","year":"1996","unstructured":"1996. Special issue: Digital Libraries. Commun. ACM, 39, 11 (1996), Nov.."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1219092.1219093"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.01.002"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.01.002"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134069"},{"key":"e_1_3_2_1_48_1","unstructured":"2008. XBOW Sensor Motes Specifications. http:\/\/www.xbow.com"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.93"},{"key":"e_1_3_2_1_50_1","volume-title":"Classics in software engineering (incoll)","author":"Dijkstra E.","unstructured":"E. Dijkstra. 1979. Go to statement considered harmful. In Classics in software engineering (incoll). Yourdon Press, Upper Saddle River, NJ, USA. 27\u201333. isbn:0-917072-14-6 http:\/\/portal.acm.org\/citation.cfm?id=1241515.1241518"},{"key":"e_1_3_2_1_51_1","volume-title":"Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.. In NDSS.","author":"Dinh Sung Ta","year":"2021","unstructured":"Sung Ta Dinh, Haehyun Cho, Kyle Martin, Adam Oest, Kyle Zeng, Alexandros Kapravelos, Gail-Joon Ahn, Tiffany Bao, Ruoyu Wang, and Adam Doup\u00e9. 2021. Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.. In NDSS."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-65193-4_29"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2363.2708"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09237-4"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09237-4"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181806"},{"key":"e_1_3_2_1_57_1","unstructured":"Simon Fear. 2005. Publication quality tables in LaTeX. http:\/\/www.ctan.org\/pkg\/booktabs"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SecDev45635.2020.00019"},{"key":"e_1_3_2_1_59_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00df feldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of Tenth International Workshop on Artificial Intelligence and Statistics, The Barbados. The Society for Artificial Intelligence and Statistics.","author":"Geiger Dan","year":"2005","unstructured":"Dan Geiger and Christopher Meek. 2005. Structured Variational Inference Procedures and their Realizations (as incol). In Proceedings of Tenth International Workshop on Artificial Intelligence and Statistics, The Barbados. The Society for Artificial Intelligence and Statistics."},{"key":"e_1_3_2_1_62_1","volume-title":"Automatic Parallelization for Distributed-Memory Multiprocessing Systems. Ph. D. Dissertation","author":"Gerndt Michael","unstructured":"Michael Gerndt. 1989. Automatic Parallelization for Distributed-Memory Multiprocessing Systems. Ph. D. Dissertation. University of Bonn. Bonn, Germany."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568273"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_65_1","first-page":"151","article-title":"Automated whitebox fuzz testing","volume":"8","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid, Michael Y Levin, and David A Molnar. 2008. Automated whitebox fuzz testing.. In NDSS. 8, 151\u2013166.","journal-title":"NDSS."},{"key":"e_1_3_2_1_66_1","volume-title":"Sutor","author":"Goossens Michel","year":"1999","unstructured":"Michel Goossens, S. P. Rahtz, Ross Moore, and Robert S. Sutor. 1999. The Latex Web Companion: Integrating TEX, HTML, and XML (1st ed.). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA. isbn:0201433117"},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201907)","author":"Gundy Matthew Van","year":"2007","unstructured":"Matthew Van Gundy, Davide Balzarotti, and Giovanni Vigna. 2007. Catch me, if you can: Evading network signatures with web-based polymorphic worms. In Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201907). USENIX Association, Berkley, CA. Article 7, 9 pages."},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201908)","author":"Gundy Matthew Van","year":"2008","unstructured":"Matthew Van Gundy, Davide Balzarotti, and Giovanni Vigna. 2008. Catch me, if you can: Evading network signatures with web-based polymorphic worms. In Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201908). USENIX Association, Berkley, CA. Article 7, 2 pages."},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201909)","author":"Gundy Matthew Van","year":"2009","unstructured":"Matthew Van Gundy, Davide Balzarotti, and Giovanni Vigna. 2009. Catch me, if you can: Evading network signatures with web-based polymorphic worms. In Proceedings of the first USENIX workshop on Offensive Technologies (WOOT \u201909). USENIX Association, Berkley, CA. 90\u2013100."},{"key":"e_1_3_2_1_70_1","volume-title":"Proceedings of the 20th International Colloquium on Automata, Languages and Programming (Lecture Notes in Computer Science","volume":"264","author":"Hagerup Torben","unstructured":"Torben Hagerup, Kurt Mehlhorn, and J. Ian Munro. 1993. Maintaining Discrete Probability Distributions Optimally. In Proceedings of the 20th International Colloquium on Automata, Languages and Programming (Lecture Notes in Computer Science, Vol. 700). Springer-Verlag, Berlin. 253\u2013264."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23312"},{"key":"e_1_3_2_1_72_1","volume-title":"LOGICS of Programs: AXIOMATICS and DESCRIPTIVE POWER","author":"Harel David","unstructured":"David Harel. 1978. LOGICS of Programs: AXIOMATICS and DESCRIPTIVE POWER. Massachusetts Institute of Technology, Cambridge, MA."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09237-4"},{"key":"e_1_3_2_1_74_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Harrison Lee","year":"2020","unstructured":"Lee Harrison, Hayawardh Vijayakumar, Rohan Padhye, Koushik Sen, and Michael Grace. 2020. $PARTEMU$: Enabling Dynamic Analysis of $Real-World$$TrustZone$ Software Using Emulation. In 29th USENIX Security Symposium (USENIX Security 20). 789\u2013806."},{"key":"e_1_3_2_1_75_1","unstructured":"2008. CodeBlue: Sensor Networks for Medical Care. http:\/\/www.eecs.harvard.edu\/mdw\/ proj\/codeblue\/"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318.3321"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/161468.161469"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_79_1","volume-title":"Chapter II: Notes on data structuring. In Structured programming (incoll)","author":"Hoare C. A. R.","year":"1972","unstructured":"C. A. R. Hoare. 1972. Chapter II: Notes on data structuring. In Structured programming (incoll), O. J. Dahl, E. W. Dijkstra, and C. A. R. Hoare (Eds.). Academic Press Ltd., London, UK, UK. 83\u2013174. isbn:0-12-200550-3 http:\/\/portal.acm.org\/citation.cfm?id=1243380.1243382"},{"key":"e_1_3_2_1_80_1","volume-title":"Visual Basic 6: Design, Specification, and Objects with Other","author":"Hollis Billy S.","unstructured":"Billy S. Hollis. 1999. Visual Basic 6: Design, Specification, and Objects with Other (1st ed.). Prentice Hall PTR, Upper Saddle River, NJ, USA. isbn:0130850845","edition":"1"},{"key":"e_1_3_2_1_81_1","volume-title":"III (Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]","volume":"5","author":"H\u00f6rmander Lars","year":"1985","unstructured":"Lars H\u00f6rmander. 1985. The analysis of linear partial differential operators. III (Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], Vol. 275). Springer-Verlag, Berlin, Germany. isbn:3-540-13828-5 Pseudodifferential operators"},{"key":"e_1_3_2_1_82_1","volume-title":"IV (Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]","volume":"3","author":"H\u00f6rmander Lars","year":"1985","unstructured":"Lars H\u00f6rmander. 1985. The analysis of linear partial differential operators. IV (Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], Vol. 275). Springer-Verlag, Berlin, Germany. isbn:3-540-13829-3 Fourier integral operators"},{"key":"e_1_3_2_1_83_1","volume-title":"2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE). 1\u201311","author":"Iannillo Antonio Ken","year":"2017","unstructured":"Antonio Ken Iannillo, Roberto Natella, Domenico Cotroneo, and Cristina Nita-Rotaru. 2017. Chizpurfle: A gray-box android fuzzer for vendor service customizations. In 2017 IEEE 28th International Symposium on Software Reliability Engineering (ISSRE). 1\u201311."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2004.64"},{"key":"e_1_3_2_1_85_1","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium. 2271\u20132287","author":"Ispoglou Kyriakos K","year":"2020","unstructured":"Kyriakos K Ispoglou, Daniel Austin, Vishwath Mohan, and Mathias Payer. 2020. Fuzzgen: Automatic fuzzer generation. In Proceedings of the 29th USENIX Conference on Security Symposium. 2271\u20132287."},{"key":"e_1_3_2_1_86_1","volume-title":"2023 IEEE Symposium on Security and Privacy (SP). 2676\u20132692","author":"Jeong Bokdeuk","year":"2023","unstructured":"Bokdeuk Jeong, Joonun Jang, Hayoon Yi, Jiin Moon, Junsik Kim, Intae Jeon, Taesoo Kim, WooChul Shim, and Yong Ho Hwang. 2023. UTopia: Automatic Generation of Fuzz Driver using Unit Tests. In 2023 IEEE Symposium on Security and Privacy (SP). 2676\u20132692."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24334"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3407052"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00098"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1137\/080734467"},{"key":"e_1_3_2_1_91_1","volume-title":"Seminumerical Algorithms","author":"Knuth Donald E.","unstructured":"Donald E. Knuth. 1981. Seminumerical Algorithms. Addison-Wesley."},{"key":"e_1_3_2_1_92_1","volume-title":"Seminumerical Algorithms","author":"Knuth Donald E.","unstructured":"Donald E. Knuth. 1981. Seminumerical Algorithms (2nd ed.) (The Art of Computer Programming, Vol. 2). Addison-Wesley, Reading, MA.","edition":"2"},{"key":"e_1_3_2_1_93_1","volume-title":"The TeX book","author":"Knuth Donald E.","unstructured":"Donald E. Knuth. 1984. The TeX book. Addison-Wesley, Reading, MA.."},{"key":"e_1_3_2_1_94_1","volume-title":"Fundamental Algorithms (3rd. ed.)","author":"Knuth Donald E.","unstructured":"Donald E. Knuth. 1997. The Art of Computer Programming, Vol. 1: Fundamental Algorithms (3rd. ed.). Addison Wesley Longman Publishing Co., Inc.."},{"key":"e_1_3_2_1_95_1","volume-title":"The Art of Computer Programming","author":"Knuth Donald E.","unstructured":"Donald E. Knuth. 1998. The Art of Computer Programming (3rd ed.) (Fundamental Algorithms, Vol. 1). Addison Wesley Longman Publishing Co., Inc.. (book)","edition":"3"},{"key":"e_1_3_2_1_96_1","volume-title":"E-commerce and cultural values","author":"Kong Wei-Chang","unstructured":"Wei-Chang Kong. 2001. E-commerce and cultural values. IGI Publishing, Hershey, PA, USA. 51\u201374. isbn:1-59140-056-2 http:\/\/portal.acm.org\/citation.cfm?id=887006.887010"},{"key":"e_1_3_2_1_97_1","volume-title":"E-commerce and cultural values","author":"Kong Wei-Chang","unstructured":"Wei-Chang Kong. 2001. The implementation of electronic commerce in SMEs in Singapore (as Incoll). In E-commerce and cultural values. IGI Publishing, Hershey, PA, USA. 51\u201374. isbn:1-59140-056-2 http:\/\/portal.acm.org\/citation.cfm?id=887006.887010"},{"key":"e_1_3_2_1_98_1","unstructured":"Wei-Chang Kong. 2002. Chapter 9. In E-commerce and cultural values (Incoll-w-text (chap 9) \u2019title\u2019) Theerasak Thanasankit (Ed.). IGI Publishing Hershey PA USA. 51\u201374. isbn:1-59140-056-2 http:\/\/portal.acm.org\/citation.cfm?id=887006.887010"},{"key":"e_1_3_2_1_99_1","volume-title":"E-commerce and cultural values","author":"Kong Wei-Chang","unstructured":"Wei-Chang Kong. 2003. The implementation of electronic commerce in SMEs in Singapore (Incoll). In E-commerce and cultural values, Theerasak Thanasankit (Ed.). IGI Publishing, Hershey, PA, USA. 51\u201374. isbn:1-59140-056-2 http:\/\/portal.acm.org\/citation.cfm?id=887006.887010"},{"key":"e_1_3_2_1_100_1","volume-title":"E-commerce and cultural values - (InBook-num-in-chap)","author":"Kong Wei-Chang","unstructured":"Wei-Chang Kong. 2004. E-commerce and cultural values - (InBook-num-in-chap). IGI Publishing, Hershey, PA, USA. 51\u201374. isbn:1-59140-056-2 http:\/\/portal.acm.org\/citation.cfm?id=887006.887010"},{"key":"e_1_3_2_1_101_1","volume-title":"E-commerce and cultural values (Inbook-text-in-chap)","author":"Kong Wei-Chang","unstructured":"Wei-Chang Kong. 2005. E-commerce and cultural values (Inbook-text-in-chap). IGI Publishing, Hershey, PA, USA. 51\u201374. isbn:1-59140-056-2 http:\/\/portal.acm.org\/citation.cfm?id=887006.887010"},{"key":"e_1_3_2_1_102_1","volume-title":"E-commerce and cultural values (Inbook-num chap)","author":"Kong Wei-Chang","unstructured":"Wei-Chang Kong. 2006. E-commerce and cultural values (Inbook-num chap). IGI Publishing, Hershey, PA, USA. 51\u201374. isbn:1-59140-056-2 http:\/\/portal.acm.org\/citation.cfm?id=887006.887010"},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/579.585"},{"key":"e_1_3_2_1_104_1","volume-title":"Mapping Powerlists onto Hypercubes. Master\u2019s thesis","author":"Kornerup Jacob","unstructured":"Jacob Kornerup. 1994. Mapping Powerlists onto Hypercubes. Master\u2019s thesis. The University of Texas at Austin. (In preparation)"},{"key":"e_1_3_2_1_105_1","volume-title":"Understanding Policy-Based Networking (2nd. ed.)","author":"Kosiur David","unstructured":"David Kosiur. 2001. Understanding Policy-Based Networking (2nd. ed.). Wiley, New York, NY."},{"key":"e_1_3_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/2817817.2731198"},{"key":"e_1_3_2_1_107_1","volume-title":"A Document Preparation System","author":"Lamport Leslie","unstructured":"Leslie Lamport. 1986. LaTeX : A Document Preparation System. Addison-Wesley, Reading, MA.."},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/800025.1198348"},{"key":"e_1_3_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057270.1057278"},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970368"},{"key":"e_1_3_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358946"},{"key":"e_1_3_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653716"},{"key":"e_1_3_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417923"},{"key":"e_1_3_2_1_114_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Li Wen","year":"2022","unstructured":"Wen Li, Jiang Ming, Xiapu Luo, and Haipeng Cai. 2022. $PolyCruise$: A $Cross-Language$ Dynamic Information Flow Analysis. In 31st USENIX Security Symposium (USENIX Security 22). 2513\u20132530."},{"key":"e_1_3_2_1_115_1","unstructured":"Wen Li Jinyang Ruan Guangbei Yi Long Cheng Xiapu Luo and Haipeng Cai. [n. d.]. POLYFUZZ: Holistic Greybox Fuzzing of Multi-Language Systems."},{"key":"e_1_3_2_1_116_1","volume-title":"USENIX Security Symposium. 307\u2013323","author":"Liu Baozheng","year":"2020","unstructured":"Baozheng Liu, Chao Zhang, Guang Gong, Yishun Zeng, Haifeng Ruan, and Jianwei Zhuge. 2020. FANS: Fuzzing Android Native System Services via Automated Interface Analysis.. In USENIX Security Symposium. 307\u2013323."},{"key":"e_1_3_2_1_117_1","volume-title":"VIDEZZO: Dependency-aware Virtual Device Fuzzing. In 2023 IEEE Symposium on Security and Privacy (SP). 3228\u20133245","author":"Liu Qiang","year":"2023","unstructured":"Qiang Liu, Flavio Toffalini, Yajin Zhou, and Mathias Payer. 2023. VIDEZZO: Dependency-aware Virtual Device Fuzzing. In 2023 IEEE Symposium on Security and Privacy (SP). 3228\u20133245."},{"key":"e_1_3_2_1_118_1","volume-title":"2012 7th International Workshop on Automation of Software Test (AST). 22\u201328","author":"Mahmood Riyadh","year":"2012","unstructured":"Riyadh Mahmood, Naeem Esfahani, Thabet Kacem, Nariman Mirzaei, Sam Malek, and Angelos Stavrou. 2012. A whitebox approach for automated security testing of Android applications on the cloud. In 2012 7th International Workshop on Automation of Software Test (AST). 22\u201328."},{"key":"e_1_3_2_1_119_1","volume-title":"Golden","author":"McCracken Daniel D.","year":"1990","unstructured":"Daniel D. McCracken and Donald G. Golden. 1990. Simplified Structured COBOL with Microsoft\/MicroFocus COBOL. John Wiley & Sons, Inc., New York, NY, USA. isbn:0471514071"},{"key":"e_1_3_2_1_120_1","volume-title":"Distributed systems","unstructured":"1993. Distributed systems (2nd Ed.), Sape Mullender (Ed.). ACM Press\/Addison-Wesley Publishing Co., New York, NY, USA. isbn:0-201-62427-3","edition":"2"},{"key":"e_1_3_2_1_121_1","volume-title":"Critical issues in information systems research (incoll)","author":"Mumford E.","unstructured":"E. Mumford. 1987. Managerial expert systems and organizational change: some critical research issues. In Critical issues in information systems research (incoll). John Wiley & Sons, Inc., New York, NY, USA. 135\u2013155. isbn:0-471-91281-6 http:\/\/portal.acm.org\/citation.cfm?id=54905.54911"},{"key":"e_1_3_2_1_122_1","volume-title":"The Mann-Whitney U: A test for assessing whether two independent samples come from the same distribution. Tutorials in quantitative Methods for Psychology, 4, 1","author":"Nachar Nadim","year":"2008","unstructured":"Nadim Nachar. 2008. The Mann-Whitney U: A test for assessing whether two independent samples come from the same distribution. Tutorials in quantitative Methods for Psychology, 4, 1 (2008), 13\u201320."},{"key":"e_1_3_2_1_123_1","doi-asserted-by":"crossref","unstructured":"A. Natarajan M. Motani B. de Silva K. Yap and K. C. Chua. 2007. Investigating Network Architectures for Body Sensor Networks. In Network Architectures G. Whitcomb and P. Neece (Eds.). Keleuven Press Dayton OH. 322\u2013328. arxiv:960935712.","DOI":"10.1145\/1248054.1248061"},{"key":"e_1_3_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/3916.3917"},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/1006091.1006096"},{"key":"e_1_3_2_1_126_1","unstructured":"Barack Obama. 2008. A more perfect union. Video. http:\/\/video.google.com\/videoplay?docid=6528042696351994555"},{"key":"e_1_3_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"e_1_3_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484811"},{"key":"e_1_3_2_1_129_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Peng Hui","year":"2020","unstructured":"Hui Peng and Mathias Payer. 2020. $USBFuzz$: A Framework for Fuzzing $USB$ Drivers by Device Emulation. In 29th USENIX Security Symposium (USENIX Security 20). 2559\u20132575."},{"key":"e_1_3_2_1_130_1","volume-title":"New Algorithms for Dependency-Directed Backtracking (Master\u2019s thesis)","author":"Petrie Charles J.","unstructured":"Charles J. Petrie. 1986. New Algorithms for Dependency-Directed Backtracking (Master\u2019s thesis). Austin, TX, USA."},{"key":"e_1_3_2_1_131_1","volume-title":"New Algorithms for Dependency-Directed Backtracking (Master\u2019s thesis). Master\u2019s thesis","author":"Petrie Charles J.","unstructured":"Charles J. Petrie. 1986. New Algorithms for Dependency-Directed Backtracking (Master\u2019s thesis). Master\u2019s thesis. University of Texas at Austin. Austin, TX, USA."},{"key":"e_1_3_2_1_132_1","unstructured":"Poker-Edge.Com. 2006. Stats and Analysis. http:\/\/www.poker-edge.com\/stats.php"},{"key":"e_1_3_2_1_133_1","volume-title":"R: A Language and Environment for Statistical Computing. https:\/\/www.R-project.org\/","author":"Team R Core","year":"2019","unstructured":"R Core Team. 2019. R: A Language and Environment for Statistical Computing. https:\/\/www.R-project.org\/"},{"key":"e_1_3_2_1_134_1","first-page":"1","article-title":"VUzzer: Application-aware Evolutionary Fuzzing","volume":"17","author":"Rawat Sanjay","year":"2017","unstructured":"Sanjay Rawat, Vivek Jain, Ashish Kumar, Lucian Cojocar, Cristiano Giuffrida, and Herbert Bos. 2017. VUzzer: Application-aware Evolutionary Fuzzing.. In NDSS. 17, 1\u201314.","journal-title":"NDSS."},{"key":"e_1_3_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/567446.567449"},{"key":"e_1_3_2_1_136_1","volume-title":"The Enabling of Digital Libraries. Digital Libraries, 12, 3","author":"Rous Bernard","year":"2008","unstructured":"Bernard Rous. 2008. The Enabling of Digital Libraries. Digital Libraries, 12, 3 (2008), Article 5, July, To appear"},{"key":"e_1_3_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2010.02.002"},{"key":"e_1_3_2_1_138_1","article-title":"Synthesis of Reversible Circuit Using Cycle-Based Approach","volume":"6","author":"Saeedi Mehdi","year":"2010","unstructured":"Mehdi Saeedi, Morteza Saheb Zamani, Mehdi Sedighi, and Zahra Sasanian. 2010. Synthesis of Reversible Circuit Using Cycle-Based Approach. J. Emerg. Technol. Comput. Syst., 6, 4 (2010), Dec..","journal-title":"J. Emerg. Technol. Comput. Syst."},{"key":"e_1_3_2_1_139_1","volume-title":"Calculus: One and Several Variable","author":"Salas S.L.","year":"1978","unstructured":"S.L. Salas and Einar Hille. 1978. Calculus: One and Several Variable. John Wiley and Sons, New York."},{"key":"e_1_3_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632168.2632169"},{"key":"e_1_3_2_1_141_1","unstructured":"Robin Schneider. 2022. The doclicense package. http:\/\/www.ctan.org\/pkg\/doclicense"},{"key":"e_1_3_2_1_142_1","volume-title":"26th USENIX security symposium (USENIX Security 17). 167\u2013182.","author":"Schumilo Sergej","unstructured":"Sergej Schumilo, Cornelius Aschermann, Robert Gawlik, Sebastian Schinzel, and Thorsten Holz. 2017. $kAFL$:$Hardware-Assisted$ feedback fuzzing for $OS$ kernels. In 26th USENIX security symposium (USENIX Security 17). 167\u2013182."},{"key":"e_1_3_2_1_143_1","volume-title":"Filed July 1st.","author":"Scientist Joseph","year":"2008","unstructured":"Joseph Scientist. 2009. The fountain of youth. Patent No. 12345, Filed July 1st., 2008, Issued Aug. 9th., 2009"},{"key":"e_1_3_2_1_144_1","volume-title":"2014 IEEE 15th International Symposium on High-Assurance Systems Engineering. 176\u2013183","author":"Shahriar Hossain","year":"2014","unstructured":"Hossain Shahriar, Sarah North, and Edward Mawangi. 2014. Testing of memory leak in android applications. In 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering. 176\u2013183."},{"key":"e_1_3_2_1_145_1","volume-title":"Proceedings of the 3rd. annual workshop on Librarians and Computers, Reginald N. Smythe and Alexander Noble (Eds.) (LAC \u201910","volume":"431","author":"Smith Stan W.","year":"2010","unstructured":"Stan W. Smith. 2010. An experiment in bibliographic mark-up: Parsing metadata for XML export. In Proceedings of the 3rd. annual workshop on Librarians and Computers, Reginald N. Smythe and Alexander Noble (Eds.) (LAC \u201910, Vol. 3). Paparazzi Press, Milan Italy. 422\u2013431. https:\/\/doi.org\/99.9999\/woot07-S422"},{"key":"e_1_3_2_1_146_1","volume-title":"2019 Network and Distributed Systems Security Symposium (NDSS). 1\u201315","author":"Song Dokyung","year":"2019","unstructured":"Dokyung Song, Felicitas Hetzelt, Dipanjan Das, Chad Spensky, Yeoul Na, Stijn Volckaert, Giovanni Vigna, Christopher Kruegel, Jean-Pierre Seifert, and Michael Franz. 2019. Periscope: An effective probing and fuzzing framework for the hardware-os boundary. In 2019 Network and Distributed Systems Security Symposium (NDSS). 1\u201315."},{"key":"e_1_3_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/90417.90738"},{"key":"e_1_3_2_1_148_1","unstructured":"Harry Thornburg. 2001. Introduction to Bayesian Statistics. http:\/\/ccrma.stanford.edu\/~jos\/bayes\/bayes.html"},{"key":"e_1_3_2_1_149_1","unstructured":"2017. Institutional members of the TeX Users Group. http:\/\/wwtug.org\/instmem.html"},{"key":"e_1_3_2_1_150_1","volume-title":"Channel-Hopping Multiple Access. Department of Computer Science","author":"Tzamaloukas A.","unstructured":"A. Tzamaloukas and J. J. Garcia-Luna-Aceves. 2000. Channel-Hopping Multiple Access. Department of Computer Science, University of California, Berkeley, CA."},{"key":"e_1_3_2_1_151_1","unstructured":"Boris Veytsman. 2017. acmart\u2014Class for typesetting publications of ACM. http:\/\/www.ctan.org\/pkg\/acmart"},{"key":"e_1_3_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2886881"},{"key":"e_1_3_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243835"},{"key":"e_1_3_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1145\/146022.146089"},{"key":"e_1_3_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.1145\/351827.384253"},{"key":"e_1_3_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/351827.384253"},{"key":"e_1_3_2_1_157_1","unstructured":"Jinyan Xu Yiyuan Liu Sirui He Haoran Lin Yajin Zhou and Cong Wang. [n. d.]. MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation."},{"key":"e_1_3_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2866347"},{"key":"e_1_3_2_1_159_1","volume-title":"Proceedings of the 9th ACM symposium on Information, computer and communications security. 531\u2013536","author":"Yang Kun","year":"2014","unstructured":"Kun Yang, Jianwei Zhuge, Yongke Wang, Lujue Zhou, and Haixin Duan. 2014. IntentFuzzer: detecting capability leaks of android applications. In Proceedings of the 9th ACM symposium on Information, computer and communications security. 531\u2013536."},{"key":"e_1_3_2_1_160_1","volume-title":"USENIX Security Symposium. 2811\u20132828","author":"Zhang Cen","year":"2021","unstructured":"Cen Zhang, Xingwei Lin, Yuekang Li, Yinxing Xue, Jundong Xie, Hongxu Chen, Xinlei Ying, Jiashui Wang, and Yang Liu. 2021. APICraft: Fuzz Driver Generation for Closed-source SDK Libraries.. In USENIX Security Symposium. 2811\u20132828."},{"key":"e_1_3_2_1_161_1","volume-title":"2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 318\u2013327","author":"Zhang Mingrui","year":"2021","unstructured":"Mingrui Zhang, Jianzhong Liu, Fuchen Ma, Huafeng Zhang, and Yu Jiang. 2021. IntelliGen: Automatic driver synthesis for fuzz testing. In 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 318\u2013327."},{"key":"e_1_3_2_1_162_1","volume-title":"Daisy: Effective Fuzz Driver Synthesis with Object Usage Sequence Analysis. In 2023 IEEE\/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 87\u201398","author":"Zhang Mingrui","year":"2023","unstructured":"Mingrui Zhang, Chijin Zhou, Jianzhong Liu, Mingzhe Wang, Jie Liang, Juan Zhu, and Yu Jiang. 2023. Daisy: Effective Fuzz Driver Synthesis with Object Usage Sequence Analysis. In 2023 IEEE\/ACM 45th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 87\u201398."},{"key":"e_1_3_2_1_163_1","volume-title":"Proceedings of the 2011 international symposium on software testing and analysis. 353\u2013363","author":"Zhang Sai","year":"2011","unstructured":"Sai Zhang, David Saff, Yingyi Bu, and Michael D Ernst. 2011. Combined static and dynamic automated test generation. In Proceedings of the 2011 international symposium on software testing and analysis. 353\u2013363."},{"key":"e_1_3_2_1_164_1","volume-title":"Proceedings of the IEEE\/ACM international conference on Automated software engineering. 293\u2013296","author":"Zheng Wujie","year":"2010","unstructured":"Wujie Zheng, Qirun Zhang, Michael Lyu, and Tao Xie. 2010. Random unit-test generation with MUT-aware sequence recommendation. In Proceedings of the IEEE\/ACM international conference on Automated software engineering. 293\u2013296."},{"key":"e_1_3_2_1_165_1","unstructured":"G. Zhou J. Lu C.-Y. Wan M. D. Yarvis and J. A. Stankovic. 2008. Body Sensor Networks. MIT Press Cambridge MA."},{"key":"e_1_3_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1145\/1721695.1721705"},{"key":"e_1_3_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"}],"event":{"name":"ISSTA '24: 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Vienna Austria","acronym":"ISSTA '24","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"]},"container-title":["Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652133","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3650212.3652133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:50:06Z","timestamp":1750287006000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3650212.3652133"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,11]]},"references-count":167,"alternative-id":["10.1145\/3650212.3652133","10.1145\/3650212"],"URL":"https:\/\/doi.org\/10.1145\/3650212.3652133","relation":{},"subject":[],"published":{"date-parts":[[2024,9,11]]},"assertion":[{"value":"2024-09-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}