{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:06:16Z","timestamp":1752984376801,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T00:00:00Z","timestamp":1726185600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Fraunhofer-Gesellschaft","award":["PREPARE 840 231"],"award-info":[{"award-number":["PREPARE 840 231"]}]},{"name":"NSF (National Science Foundation)","award":["CCF-2008905,CCF-2047682"],"award-info":[{"award-number":["CCF-2008905,CCF-2047682"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,13]]},"DOI":"10.1145\/3678722.3685530","type":"proceedings-article","created":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T07:04:43Z","timestamp":1726211083000},"page":"13-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Visualization Task Taxonomy to Understand the Fuzzing Internals (Registered Report)"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-1963-4265","authenticated-orcid":false,"given":"Sriteja","family":"Kummita","sequence":"first","affiliation":[{"name":"Fraunhofer IEM, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-6650-6239","authenticated-orcid":false,"given":"Miao","family":"Miao","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3470-3647","authenticated-orcid":false,"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[{"name":"Heinz Nixdorf Institute, Paderborn University, Paderborn, Germany \/ Fraunhofer IEM, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2826-1857","authenticated-orcid":false,"given":"Shiyi","family":"Wei","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,9,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.238"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3561161"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3016773"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.124"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/3488877.3488887"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560602"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580596"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","unstructured":"Andrea Fioraldi and Luigi Paolo Pileggi. 2021. FuzzSplore: Visualizing Feedback-Driven Fuzzing Techniques. https:\/\/doi.org\/10.48550\/arXiv.2102.02527 arxiv:2102.02527. 10.48550\/arXiv.2102.02527","DOI":"10.48550\/arXiv.2102.02527"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363824"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRICS.2005.24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833751"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Aftab Hussain and Mohammad Amin Alipour. 2021. FMViz: Visualizing Tests Generated by AFL at the Byte-level. https:\/\/doi.org\/10.48550\/arXiv.2112.13207 arxiv:2112.13207. 10.48550\/arXiv.2112.13207","DOI":"10.48550\/arXiv.2112.13207"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_2_1_18_1","unstructured":"Sriteja Kummita Miao Miao Eric Bodden and Shiyi Wei. 2024. Pilot Study Artifact. https:\/\/github.com\/sritejakv\/visualization_taxonomy_pilot_study"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168149.1168168"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-018-0002-y"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2018.2834476"},{"key":"e_1_3_2_1_23_1","unstructured":"Stephan Lipp Severin Kacianka Alexander Pretschner and Marcel B\u00f6hme. 2024. SAST-Guided Grey-Box Fuzzing."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380421"},{"key":"e_1_3_2_1_26_1","volume-title":"Muhammad Ijaz Ul Haq, and Ashley Barkworth","author":"McDonald Lucas","year":"2021","unstructured":"Lucas McDonald, Muhammad Ijaz Ul Haq, and Ashley Barkworth. 2021. Survey of Software Fuzzing Techniques. Dec.."},{"key":"e_1_3_2_1_27_1","unstructured":"Matthew B Miles and A Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. sage."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2009.111"},{"volume-title":"Visualization analysis and design","author":"Munzner Tamara","key":"e_1_3_2_1_29_1","unstructured":"Tamara Munzner. 2014. Visualization analysis and design. CRC press."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-016-1443-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2018.2889892"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914)","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing seed selection for fuzzing. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914). USENIX Association, USA. 861\u2013875. isbn:9781931971157"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/tvcg.2016.2599030"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00137"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.120"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.799955"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.213"},{"key":"e_1_3_2_1_38_1","first-page":"1","article-title":"Driller: Augmenting fuzzing through selective symbolic execution","volume":"16","author":"Stephens Nick","year":"2016","unstructured":"Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, and Giovanni Vigna. 2016. Driller: Augmenting fuzzing through selective symbolic execution.. In NDSS. 16, 1\u201316.","journal-title":"NDSS."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/2167696815587648"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08147-7_20"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183494"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3587158"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3605157.3605847"},{"key":"e_1_3_2_1_44_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Yue Tai","year":"2020","unstructured":"Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou. 2020. EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 2307\u20132324. isbn:978-1-939133-17-5"},{"key":"e_1_3_2_1_45_1","unstructured":"Michal Zalewski. 2013. American fuzzy lop. https:\/\/github.com\/mirrorer\/afl"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-09306-2"},{"key":"e_1_3_2_1_47_1","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Zheng Han","year":"2023","unstructured":"Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, and Mathias Payer. 2023. FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA. 1343\u20131360. isbn:978-1-939133-37-3"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00106"}],"event":{"name":"FUZZING '24: 3rd ACM International Fuzzing Workshop","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","AITO"],"location":"Vienna Austria","acronym":"FUZZING '24"},"container-title":["Proceedings of the 3rd ACM International Fuzzing Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678722.3685530","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678722.3685530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:56Z","timestamp":1750295396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678722.3685530"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,13]]},"references-count":48,"alternative-id":["10.1145\/3678722.3685530","10.1145\/3678722"],"URL":"https:\/\/doi.org\/10.1145\/3678722.3685530","relation":{},"subject":[],"published":{"date-parts":[[2024,9,13]]},"assertion":[{"value":"2024-09-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}