{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:05Z","timestamp":1750309445270,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF (National Science Foundation)","award":["CCF-2120955"],"award-info":[{"award-number":["CCF-2120955"]}]},{"name":"Defense Advanced Research Projects Agency","award":["NN66001-22-C-4027"],"award-info":[{"award-number":["NN66001-22-C-4027"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,13]]},"DOI":"10.1145\/3678722.3685529","type":"proceedings-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T07:04:43Z","timestamp":1726211083000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The Havoc Paradox in Generator-Based Fuzzing (Registered Report)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3189-7079","authenticated-orcid":false,"given":"Ao","family":"Li","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2533-139X","authenticated-orcid":false,"given":"Madonna","family":"Huang","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9610-8520","authenticated-orcid":false,"given":"Caroline","family":"Lemieux","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4939-033X","authenticated-orcid":false,"given":"Rohan","family":"Padhye","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"unstructured":"[n. d.]. American Fuzzy Lop. https:\/\/github.com\/google\/AFL Accessed: 2021-08-31","key":"e_1_3_2_1_1_1"},{"unstructured":"[n. d.]. Apache Ant is a Java-based build tool. https:\/\/github.com\/apache\/ant","key":"e_1_3_2_1_2_1"},{"unstructured":"[n. d.]. cargo-fuzz. https:\/\/github.com\/rust-fuzz\/cargo-fuzz Accessed: 2023-05-01","key":"e_1_3_2_1_3_1"},{"unstructured":"[n. d.]. Closure Compiler. https:\/\/developers.google.com\/closure\/compiler Accessed: 2021-08-31","key":"e_1_3_2_1_4_1"},{"unstructured":"[n. d.]. GSON: A Java serialization\/deserialization library to convert Java Objects into JSON and back. https:\/\/github.com\/google\/gson","key":"e_1_3_2_1_5_1"},{"unstructured":"[n. d.]. Jackson Project Home @github. https:\/\/github.com\/FasterXML\/jackson","key":"e_1_3_2_1_6_1"},{"unstructured":"[n. d.]. libFuzzer \u2013 a library for coverage-guided fuzz testing.. https:\/\/llvm.org\/docs\/LibFuzzer.html Accessed: 2021-08-31","key":"e_1_3_2_1_7_1"},{"unstructured":"[n. d.]. libFuzzer \u2013 How To Split A Fuzzer-Generated Input Into Several Parts. https:\/\/github.com\/google\/fuzzing\/blob\/41d7725\/docs\/split-inputs.md Accessed: 2021-08-31","key":"e_1_3_2_1_8_1"},{"unstructured":"[n. d.]. libprotobuf-mutator. https:\/\/github.com\/google\/libprotobuf-mutator Accessed: 2021-08-31","key":"e_1_3_2_1_9_1"},{"unstructured":"[n. d.]. Rhino: JavaScript in Java. https:\/\/github.com\/mozilla\/rhino","key":"e_1_3_2_1_10_1"},{"unstructured":"[n. d.]. Structure-Aware Fuzzing with libFuzzer. https:\/\/github.com\/google\/fuzzing\/blob\/master\/docs\/structure-aware-fuzzing.md Accessed: 2022-06-02","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","volume-title":"NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS.","author":"Aschermann Cornelius","year":"2019","unstructured":"Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, and Daniel Teuchert. 2019. NAUTILUS: Fishing for Deep Bugs with Grammars.. In NDSS."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1315245.1315286"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/SP.2018.00046"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/351240.351266"},{"key":"e_1_3_2_1_16_1","volume-title":"14th USENIX Workshop on Offensive Technologies (WOOT 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00df feldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In 14th USENIX Workshop on Offensive Technologies (WOOT 20). USENIX Association."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/3548606.3560602"},{"key":"e_1_3_2_1_18_1","volume-title":"GREYONE: Data Flow Sensitive Fuzzing. In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 2577\u20132594.","author":"Gan Shuitao","year":"2020","unstructured":"Shuitao Gan, Chao Zhang, Peng Chen, Bodong Zhao, Xiaojun Qin, Dong Wu, and Zuoning Chen. 2020. GREYONE: Data Flow Sensitive Fuzzing. In 29th $USENIX$ Security Symposium ($USENIX$ Security 20). 2577\u20132594."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/3510003.3510228"},{"key":"e_1_3_2_1_20_1","volume-title":"Fuzzing with Code Fragments. In 21st USENIX Security Symposium (USENIX Security 12)","author":"Holler Christian","year":"2012","unstructured":"Christian Holler, Kim Herzig, and Andreas Zeller. 2012. Fuzzing with Code Fragments. In 21st USENIX Security Symposium (USENIX Security 12). USENIX Association, Bellevue, WA. 445\u2013458. isbn:978-931971-95-9 https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/holler"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. 1\u201312","author":"Hough Katherine","year":"2024","unstructured":"Katherine Hough and Jonathan Bell. 2024. Crossover in Parametric Fuzzing. In Proceedings of the IEEE\/ACM 46th International Conference on Software Engineering. 1\u201312."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1542476.1542489"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/3510003.3510628"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/3238147.3238176"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/3527317"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_2_1_27_1","volume-title":"Tech. Rep, 4","author":"Miller Charlie","year":"2007","unstructured":"Charlie Miller and Zachary NJ Peterson. 2007. Analysis of mutation and generation-based fuzzing. Independent Security Evaluators, Tech. Rep, 4 (2007)."},{"unstructured":"Frederic P Miller Agnes F Vandome and John McBrewster. 2010. Apache Maven. Alpha Press.","key":"e_1_3_2_1_28_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/3510003.3510182"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1145\/3293882.3339002"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/3293882.3330576"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/ICSE.2017.50"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_33_1","DOI":"10.1145\/3358711.3361627"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/SP40000.2020.00067"},{"key":"e_1_3_2_1_35_1","article-title":"Smart greybox fuzzing","author":"Pham Van-Thuan","year":"2019","unstructured":"Van-Thuan Pham, Marcel B\u00f6hme, Andrew Edward Santosa, Alexandru Razvan Caciulescu, and Abhik Roychoudhury. 2019. Smart greybox fuzzing. IEEE Transactions on Software Engineering.","journal-title":"IEEE Transactions on Software Engineering."},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering. 1410\u20131421","author":"Reddy Sameer","year":"2020","unstructured":"Sameer Reddy, Caroline Lemieux, Rohan Padhye, and Koushik Sen. 2020. Quickly generating diverse valid test inputs with reinforcement learning. In Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering. 1410\u20131421."},{"key":"e_1_3_2_1_37_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Schumilo Sergej","year":"2021","unstructured":"Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon W\u00f6r-ner, and Thorsten Holz. 2021. Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2597\u20132614. isbn:978-1-939133-24-3 https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/schumilo"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1145\/3460319.3464814"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/3597926.3598107"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/ICSE.2019.00081"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1145\/3510003.3510174"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_42_1","DOI":"10.1145\/1375581.1375611"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_43_1","DOI":"10.1145\/3372297.3417260"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"],"acronym":"FUZZING '24","name":"FUZZING '24: 3rd ACM International Fuzzing Workshop","location":"Vienna Austria"},"container-title":["Proceedings of the 3rd ACM International Fuzzing Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678722.3685529","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678722.3685529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:56Z","timestamp":1750295396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678722.3685529"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":43,"alternative-id":["10.1145\/3678722.3685529","10.1145\/3678722"],"URL":"https:\/\/doi.org\/10.1145\/3678722.3685529","relation":{},"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"2024-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}