{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:13:15Z","timestamp":1775873595228,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670362","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"765-779","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["FOX: Coverage-guided Fuzzing as Online Stochastic Control"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6655-0468","authenticated-orcid":false,"given":"Dongdong","family":"She","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-2844-768X","authenticated-orcid":false,"given":"Adam","family":"Storek","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0436-8183","authenticated-orcid":false,"given":"Yuchong","family":"Xie","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2120-3570","authenticated-orcid":false,"given":"Seoyoung","family":"Kweon","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1868-4204","authenticated-orcid":false,"given":"Prashast","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3518-4877","authenticated-orcid":false,"given":"Suman","family":"Jana","sequence":"additional","affiliation":[{"name":"Columbia University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. AFL Seed Bank. https:\/\/github.com\/AFLplusplus\/AFLplusplus\/tree\/stable\/testcases."},{"key":"e_1_3_2_1_2_1","volume-title":"Evaluation report of aflpp on the Fuzzbench dataset. (Dec 1","year":"2023","unstructured":"2023. Evaluation report of aflpp on the Fuzzbench dataset. (Dec 1 2023). https:\/\/www.fuzzbench.com\/reports\/experimental\/2023--12-01-aflpp\/index.html."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Fuzz introspector. https:\/\/github.com\/ossf\/fuzz-introspector."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. FuzzBench AFL setup. https:\/\/github.com\/google\/fuzzbench\/blob\/master\/fuzzers\/aflplusplus\/description.md."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Havoc mode mutation. https:\/\/github.com\/AFLplusplus\/AFLplusplus\/blob\/stable\/docs\/afl-fuzz_approach.md."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Magma lua bugs. https:\/\/github.com\/HexHive\/magma\/tree\/v1.2\/targets\/lua\/patches\/bugs."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Magma openssl bugs. https:\/\/github.com\/HexHive\/magma\/issues\/68."},{"key":"e_1_3_2_1_8_1","unstructured":"2023. SBST'23 Fuzzing Competition (C\/C Programs). https:\/\/sbft23.github.io\/tools\/fuzzing."},{"key":"e_1_3_2_1_9_1","unstructured":"2023. SBST'23 Fuzzing Competition (C\/C Programs) Report. https:\/\/storage.googleapis.com\/www.fuzzbench.com\/reports\/experimental\/SBFT23\/Final-Coverage\/index.html."},{"key":"e_1_3_2_1_10_1","unstructured":"2023. Syzbot kernel bug tracker. https:\/\/syzkaller.appspot.com\/upstream."},{"key":"e_1_3_2_1_11_1","unstructured":"2023. Syzbot kernel bug tracker. https:\/\/github.com\/google\/oss-fuzz."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"key":"e_1_3_2_1_13_1","volume-title":"REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, and Thorsten Holz. 2019. REDQUEEN: Fuzzing with Input-to-State Correspondence.. In NDSS."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST53961.2022.00039"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510230"},{"key":"e_1_3_2_1_18_1","volume-title":"Convex Optimization","author":"Boyd Stephen","unstructured":"Stephen Boyd and Lieven Vandenberghe. 2004. Convex Optimization. Cambridge University Press."},{"key":"e_1_3_2_1_19_1","first-page":"209","article-title":"Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, Dawson R Engler, et al . 2008. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs.. In OSDI, Vol. 8. 209--224.","journal-title":"OSDI"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00082"},{"key":"e_1_3_2_1_23_1","volume-title":"Domencich and Daniel McFadden","author":"Thomas","year":"1975","unstructured":"Thomas A. Domencich and Daniel McFadden. 1975. Urban Travel Demand: A Behavioral Analysis : a Charles River Associates Research Study. North-Holland Publishing Company. Google-Books-ID: KwK3AAAAIAAJ."},{"key":"e_1_3_2_1_24_1","volume-title":"AFL: Combining Incremental Steps of Fuzzing Research. In USENIX Workshop on Offensive Technologies (WOOT).","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL: Combining Incremental Steps of Fuzzing Research. In USENIX Workshop on Offensive Technologies (WOOT)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_3_2_1_26_1","volume-title":"29th USENIX security symposium (USENIX Security 20). 2577--2594.","author":"Gan Shuitao","unstructured":"Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. 2020. {GREYONE}: Data flow sensitive fuzzing. In 29th USENIX security symposium (USENIX Security 20). 2577--2594."},{"key":"e_1_3_2_1_27_1","first-page":"151","article-title":"Automated whitebox fuzz testing","volume":"8","author":"Godefroid Patrice","year":"2008","unstructured":"Patrice Godefroid, Michael Y Levin, David A Molnar, et al. 2008. Automated whitebox fuzz testing.. In NDSS, Vol. 8. 151--166.","journal-title":"NDSS"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Elad Hazan et al . 2016. Introduction to online convex optimization. Foundations and Trends\u00ae in Optimization (2016).","DOI":"10.1561\/9781680831719"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"D.A. Hensher and P.R. Stopher. 2021. Behavioural Travel Modelling. Taylor & Francis. https:\/\/books.google.com\/books?id=Z_UlEAAAQBAJ","DOI":"10.4324\/9781003156055"},{"key":"e_1_3_2_1_31_1","volume-title":"DatAFLow: Toward a Data-Flow-Guided Fuzzer. ACM Transactions on Software Engineering and Methodology","author":"Herrera Adrian","year":"2022","unstructured":"Adrian Herrera, Mathias Payer, and Antony L Hosking. 2022. DatAFLow: Toward a Data-Flow-Guided Fuzzer. ACM Transactions on Software Engineering and Methodology (2022)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23159"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSBSE.2010.21"},{"key":"e_1_3_2_1_35_1","volume-title":"Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE.","author":"Lee Myungho","year":"2023","unstructured":"Myungho Lee, Sooyoung Cha, and Hakjoo Oh. 2023. Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing. In 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). IEEE."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833594"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833594"},{"key":"e_1_3_2_1_39_1","volume-title":"SBFT Tool Competition 2023--Fuzzing Track. arXiv preprint arXiv:2304.10070","author":"Liu Dongge","year":"2023","unstructured":"Dongge Liu, Jonathan Metzman, Marcel B\u00f6hme, Oliver Chang, and Abhishek Arya. 2023. SBFT Tool Competition 2023--Fuzzing Track. arXiv preprint arXiv:2304.10070 (2023)."},{"key":"e_1_3_2_1_40_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. {MOPT}: Optimized mutation scheduling for fuzzers. In 28th USENIX Security Symposium (USENIX Security 19)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP53844.2022.00026"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_2_1_44_1","volume-title":"Illuminating search spaces by mapping elites. ArXiv abs\/1504.04909","author":"Mouret Jean-Baptiste","year":"2015","unstructured":"Jean-Baptiste Mouret and Jeff Clune. 2015. Illuminating search spaces by mapping elites. ArXiv abs\/1504.04909 (2015)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616308"},{"key":"e_1_3_2_1_47_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"\u00d6sterlund Sebastian","year":"2020","unstructured":"Sebastian \u00d6sterlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida. 2020. {ParmeSan}: Sanitizer-guided greybox fuzzing. In 29th USENIX Security Symposium (USENIX Security 20). 2289--2306."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_2_1_49_1","volume-title":"Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. 2022 IEEE Symposium on Security and Privacy (SP)","author":"She Dongdong","year":"2022","unstructured":"Dongdong She, Abhishek Shah, and Suman Jana. 2022. Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. 2022 IEEE Symposium on Security and Privacy (SP) (2022), 2194--2211."},{"key":"e_1_3_2_1_50_1","volume-title":"FOX: Coverage-guided Fuzzing as Online Stochastic Control. arXiv","author":"She Dongdong","year":"2024","unstructured":"Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, and Suman Jana. 2024. FOX: Coverage-guided Fuzzing as Online Stochastic Control. arXiv (2024). https:\/\/arxiv.org\/abs\/2406.04517"},{"key":"e_1_3_2_1_51_1","volume-title":"AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Shi Ji","year":"2023","unstructured":"Ji Shi, Zhun Wang, Zhiyao Feng, Yang Lan, Shisong Qin, Wei You, Wei Zou, Mathias Payer, and Chao Zhang. 2023. AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 4967--4984. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/shi-ji"},{"key":"e_1_3_2_1_52_1","first-page":"1","article-title":"Driller: Augmenting fuzzing through selective symbolic execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting fuzzing through selective symbolic execution.. In NDSS, Vol. 16. 1--16.","journal-title":"NDSS"},{"key":"e_1_3_2_1_53_1","unstructured":"L\u00e1szl\u00f3 Szekeres and R Sekar. [n. d.]. Search-based Fuzzing. ([n. d.]). http:\/\/seclab.cs.stonybrook.edu\/lszekeres\/Papers\/Szekeres-2017-SBF.pdf"},{"key":"e_1_3_2_1_54_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID","author":"Wang Jinghan","year":"2019","unstructured":"Jinghan Wang, Yue Duan, Wei Song, Heng Yin, and Chengyu Song. 2019. Be sensitive and collaborative: Analyzing impact of coverage metrics in greybox fuzzing. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019)."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.37"},{"key":"e_1_3_2_1_56_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yue Tai","year":"2020","unstructured":"Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou. 2020. {EcoFuzz}: Adaptive {Energy-Saving} greybox fuzzing as a variant of the adversarial {Multi-Armed} bandit. In 29th USENIX Security Symposium (USENIX Security 20). 2307--2324."},{"key":"e_1_3_2_1_57_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zheng Han","year":"2023","unstructured":"Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, and Mathias Payer. 2023. FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 1343--1360. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/zheng"}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670362","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670362","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:54:31Z","timestamp":1755842071000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670362"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":57,"alternative-id":["10.1145\/3658644.3670362","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670362","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}