{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T08:09:37Z","timestamp":1770883777236,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670348","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3973-3987","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["On Understanding and Forecasting Fuzzers Performance with Static Analysis"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7468-743X","authenticated-orcid":false,"given":"Dongjia","family":"Zhang","sequence":"first","affiliation":[{"name":"EURECOM, Biot, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0976-4395","authenticated-orcid":false,"given":"Andrea","family":"Fioraldi","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5957-6213","authenticated-orcid":false,"given":"Davide","family":"Balzarotti","sequence":"additional","affiliation":[{"name":"EURECOM, Biot, France"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"LLVM Link Time Optimization: Design and Implementation. https:\/\/llvm.org\/docs\/LinkTimeOptimization.html. [Online","year":"2024","unstructured":"2020. LLVM Link Time Optimization: Design and Implementation. https:\/\/llvm.org\/docs\/LinkTimeOptimization.html. [Online; accessed July 15, 2024]."},{"key":"e_1_3_2_1_2_1","unstructured":"Accessed July 15 2024. Binutils - GNU Project - Free Software Foundation. https:\/\/www.gnu.org\/software\/binutils\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Accessed July 15 2024. Definition of DDG in the LLVM framework. https:\/\/llvm.org\/docs\/DependenceGraphs\/index.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Accessed July 15 2024. llvm-cov - emit coverage information. https:\/\/llvm.org\/docs\/CommandGuide\/llvm-cov.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Accessed July 15 2024. LLVM Language Reference Manual. https:\/\/llvm.org\/docs\/LangRef.html."},{"key":"e_1_3_2_1_6_1","volume-title":"Pooled Standard Deviation |Wolfram Formula Repository. https:\/\/online.stat.psu.edu\/stat500\/lesson\/7\/7.3\/7.3.1\/7.3.1.1. [Online","author":"Accessed July","year":"2024","unstructured":"Accessed July 15, 2024. Pooled Standard Deviation |Wolfram Formula Repository. https:\/\/online.stat.psu.edu\/stat500\/lesson\/7\/7.3\/7.3.1\/7.3.1.1. [Online; accessed July 15, 2024]."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/390013.808479"},{"key":"e_1_3_2_1_8_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars. In NDSS.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Tommaso Frassetto, T. Holz, Patrick Jauernig, A. Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars. In NDSS."},{"key":"e_1_3_2_1_9_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence. In 26th Annual Network and Distributed System Security Symposium, NDSS.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence. In 26th Annual Network and Distributed System Security Symposium, NDSS."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11749-016-0481-7"},{"key":"e_1_3_2_1_11_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Blazytko Tim","year":"2019","unstructured":"Tim Blazytko, Cornelius Aschermann, Moritz Schl\u00f6gel, Ali Abbasi, Sergej Schumilo, Simon W\u00f6rner, and Thorsten Holz. 2019. GRIMOIRE: Synthesizing Structure while Fuzzing. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1985--2002."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510230"},{"key":"e_1_3_2_1_15_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Chen Yuanliang","year":"2019","unstructured":"Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou, Xun Jiao, and Zhuo Su. 2019. {EnFuzz}: Ensemble fuzzing with seed synchronization among diverse fuzzers. In 28th USENIX Security Symposium (USENIX Security 19). 1967--1983."},{"key":"e_1_3_2_1_16_1","volume-title":"Statistical power analysis. Current directions in psychological science 1, 3","author":"Cohen Jacob","year":"1992","unstructured":"Jacob Cohen. 1992. Statistical power analysis. Current directions in psychological science 1, 3 (1992), 98--101."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--1--4419--9326--7_5"},{"key":"e_1_3_2_1_18_1","series-title":"Journal of Physics: Conference Series","volume-title":"Multicollinearity and regression analysis","author":"Daoud Jamal I","year":"2009","unstructured":"Jamal I Daoud. 2017. Multicollinearity and regression analysis. In Journal of Physics: Conference Series, Vol. 949. IOP Publishing, 012009."},{"key":"e_1_3_2_1_19_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Andrea Fioraldi Dominik Maier Dongjia Zhang and Davide Balzarotti. 2022. LibAFL: A Framework to Build Modular and Reusable Fuzzers. (2022).","DOI":"10.1145\/3548606.3560602"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580596"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 32st USENIX Security Symposium (Security)","author":"Fu Yu-Fu","year":"2023","unstructured":"Yu-Fu Fu, Jaehyuk Lee, and Taesoo Kim. 2023. autofz: Automated Fuzzer Composition at Runtime. In Proceedings of the 32st USENIX Security Symposium (Security). Anaheim, CA."},{"key":"e_1_3_2_1_23_1","volume-title":"Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. Annual Computer Security Applications Conference","author":"G\u00fcler Emre","year":"2020","unstructured":"Emre G\u00fcler, Philipp G\u00f6rz, Elia Geretto, Andrea Jemmett, Sebastian \u00d6sterlund, Herbert Bos, Cristiano Giuffrida, and Thorsten Holz. 2020. Cupid: Automatic Fuzzer Selection for Collaborative Fuzzing. Annual Computer Security Applications Conference (2020)."},{"key":"e_1_3_2_1_24_1","volume-title":"Comparison of values of Pearson's and Spearman's correlation coefficients on the same sets of data. Quaestiones geographicae 30, 2","author":"Hauke Jan","year":"2011","unstructured":"Jan Hauke and Tomasz Kossowski. 2011. Comparison of values of Pearson's and Spearman's correlation coefficients on the same sets of data. Quaestiones geographicae 30, 2 (2011), 87--93."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_26_1","volume-title":"Cohen's Kappa, Scott's \u03c0, and Aickin's \u03b1. Understanding Statistics","author":"Hsu Louis M","year":"2003","unstructured":"Louis M Hsu and Ronald Field. 2003. Interrater agreement measures: Comments on Kappan, Cohen's Kappa, Scott's \u03c0, and Aickin's \u03b1. Understanding Statistics (2003)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBFT59156.2023.00016"},{"key":"e_1_3_2_1_29_1","volume-title":"d.]. LibFuzzer - Value Profile. https:\/\/llvm.org\/docs\/LibFuzzer.html#value-profile. [Online","author":"Project LLVM","year":"2024","unstructured":"LLVM Project. [n. d.]. LibFuzzer - Value Profile. https:\/\/llvm.org\/docs\/LibFuzzer.html#value-profile. [Online; accessed July 15, 2024]."},{"key":"e_1_3_2_1_30_1","volume-title":"libFuzzer -- a library for coverage-guided fuzz testing. https:\/\/llvm.org\/docs\/LibFuzzer.html. [Online","author":"Project LLVM","year":"2024","unstructured":"LLVM Project. 2018. libFuzzer -- a library for coverage-guided fuzz testing. https:\/\/llvm.org\/docs\/LibFuzzer.html. [Online; accessed July 15, 2024]."},{"key":"e_1_3_2_1_31_1","volume-title":"MOPT: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium (USENIX Security 19)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. MOPT: Optimized Mutation Scheduling for Fuzzers. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1949--1966."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_33_1","volume-title":"7th IEEE European Symposium on Security and Privacy, 6--10","author":"Mantovani Alessandro","year":"2022","unstructured":"Alessandro Mantovani, Andrea Fioraldi, and Davide Balzarotti. 2022. Fuzzing with data dependency information. In EuroS&P 2022, 7th IEEE European Symposium on Security and Privacy, 6--10 June 2022, Genoa, Italy, IEEE (Ed.). Genoa."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447852.3458720"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_37_1","volume-title":"SoK: Prudent Evaluation Practices for Fuzzing. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 137--137","author":"Schloegel Moritz","year":"2024","unstructured":"Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale-Ebrahim, Nicolai Bissantz, Marius Muench, and Thorsten Holz. 2024. SoK: Prudent Evaluation Practices for Fuzzing. In 2024 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 137--137."},{"key":"e_1_3_2_1_38_1","volume-title":"Correlation coefficients: appropriate use and interpretation. Anesthesia & analgesia 126, 5","author":"Schober Patrick","year":"2018","unstructured":"Patrick Schober, Christa Boer, and Lothar A Schwarte. 2018. Correlation coefficients: appropriate use and interpretation. Anesthesia & analgesia 126, 5 (2018), 1763--1768."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1968.10480934"},{"key":"e_1_3_2_1_40_1","unstructured":"Kostya Serebryany. 2017. {OSS-Fuzz}-Google's continuous fuzzing service for open source software. (2017)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.17"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464814"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.4300\/JGME-D-12-00156.1"},{"key":"e_1_3_2_1_44_1","volume-title":"d.]. Honggfuzz. https:\/\/github.com\/google\/honggfuzz. [Online","author":"Swiecki Robert","year":"2024","unstructured":"Robert Swiecki. [n. d.]. Honggfuzz. https:\/\/github.com\/google\/honggfuzz. [Online; accessed July 15, 2024]."},{"key":"e_1_3_2_1_45_1","volume-title":"Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Wang Jinghan","year":"2019","unstructured":"Jinghan Wang, Yue Duan, Wei Song, Heng Yin, and Chengyu Song. 2019. Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, Chaoyang District, Beijing, 1--15."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Yanhao Wang Xiangkun Jia Yuwei Liu Kyle Zeng Tiffany Bao Dinghao Wu and Purui Su. 2020. Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization. In NDSS.","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_2_1_47_1","volume-title":"Explainable fuzzer evaluation. arXiv preprint arXiv:2212.09519","author":"Wolff Dylan","year":"2022","unstructured":"Dylan Wolff, Marcel B\u00f6hme, and Abhik Roychoudhury. 2022. Explainable fuzzer evaluation. arXiv preprint arXiv:2212.09519 (2022)."},{"key":"e_1_3_2_1_48_1","volume-title":"American Fuzzy Lop - Whitepaper. https:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt. [Online","author":"Zalewski Michal","year":"2024","unstructured":"Michal Zalewski. 2016. American Fuzzy Lop - Whitepaper. https:\/\/lcamtuf.coredump.cx\/afl\/technical_details.txt. [Online; accessed July 15, 2024]."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670348","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670348","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:58:25Z","timestamp":1755842305000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670348"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":48,"alternative-id":["10.1145\/3658644.3670348","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670348","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}