{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:12Z","timestamp":1750309512934,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"SNSF","award":["PCEGP2_186974"],"award-info":[{"award-number":["PCEGP2_186974"]}]},{"name":"European Union's Horizon 2020 research and innovation program","award":["850868"],"award-info":[{"award-number":["850868"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678908","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"403-418","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Tango: Extracting Higher-Order Feedback through State Inference"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-4191-7395","authenticated-orcid":false,"given":"Ahmad","family":"Hazimeh","sequence":"first","affiliation":[{"name":"EPFL, Switzerland and BugScale, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8082-154X","authenticated-orcid":false,"given":"Duo","family":"Xu","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5865-6227","authenticated-orcid":false,"given":"Qiang","family":"Liu","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0484-5576","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"additional","affiliation":[{"name":"Huawei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5054-7547","authenticated-orcid":false,"given":"Mathias","family":"Payer","sequence":"additional","affiliation":[{"name":"EPFL, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"unstructured":"2022. libfaketime modifies the system time for a single application. https:\/\/github.com\/wolfcw\/libfaketime Accessed: 2024-03-15.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"Learning Regular Sets from Queries and Counterexamples. Information and Computation 75, 2","author":"Angluin Dana","year":"1987","unstructured":"Dana Angluin. 1987. Learning Regular Sets from Queries and Counterexamples. Information and Computation 75, 2 (1987)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/SP40000.2020.00117"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1137\/S0097539701398375"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 31st USENIX Security Symposium(USENIX Security '22)","author":"Ba Jinsheng","year":"2022","unstructured":"Jinsheng Ba, Marcel B\u00f6hme, Zahra Mirzamomen, and Abhik Roychoudhury. 2022. Stateful Greybox Fuzzing. In Proceedings of the 31st USENIX Security Symposium(USENIX Security '22). USENIX Association."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/3368089.3409729"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 20th USENIX Security Symposium(USENIX Security '11)","author":"Cho Chia\u00a0Yuan","year":"2011","unstructured":"Chia\u00a0Yuan Cho, Domagoj Babi\u0107, Pongsin Poosankam, Kevin\u00a0Zhijie Chen, Edward\u00a0XueJun Wu, and Dawn Song. 2011. { MACE} :{ Model-inference-Assisted} concolic exploration for protocol and vulnerability discovery. In Proceedings of the 20th USENIX Security Symposium(USENIX Security '11). USENIX Association."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 30th USENIX Security Symposium(USENIX Security '21)","author":"Fioraldi Andrea","year":"2021","unstructured":"Andrea Fioraldi, Daniele\u00a0Cono D\u2019Elia, and Davide Balzarotti. 2021. The Use of Likely Invariants as Feedback for Fuzzers. In Proceedings of the 30th USENIX Security Symposium(USENIX Security '21). USENIX Association."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 14th USENIX Workshop on Offensive Technologies(WOOT '20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining Incremental Steps of Fuzzing Research. In Proceedings of the 14th USENIX Workshop on Offensive Technologies(WOOT '20). USENIX Association."},{"key":"e_1_3_2_1_11_1","volume-title":"Dissecting American Fuzzy Lop: A FuzzBench Evaluation. ACM Transactions on Software Engineering and Methodology","author":"Fioraldi Andrea","year":"2023","unstructured":"Andrea Fioraldi, Alessandro Mantovani, Dominik Maier, and Davide Balzarotti. 2023. Dissecting American Fuzzy Lop: A FuzzBench Evaluation. ACM Transactions on Software Engineering and Methodology (2023)."},{"key":"e_1_3_2_1_12_1","volume-title":"Seed Selection for Successful Fuzzing. In 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA","author":"Herrera Adrian","year":"2021","unstructured":"Adrian Herrera, Hendra Gunadi, Shane Magrath, Michael Norrish, Mathias Payer, and Antony\u00a0L. Hosking. 2021. Seed Selection for Successful Fuzzing. In 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2021. ACM."},{"volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft E.","unstructured":"John\u00a0E. Hopcroft, Rajeev Motwani, and Jeffrey\u00a0D. Ullman. 1979. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, Chapter Section\u00a04.4.3, Minimization of DFA\u2019s, 159\u2013164.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","volume-title":"On Information and Sufficiency. The Annals of Mathematical Statistics 22","author":"Kullback S.","year":"1951","unstructured":"S. Kullback and R.\u00a0A. Leibler. 1951. On Information and Sufficiency. The Annals of Mathematical Statistics 22 (1951)."},{"key":"e_1_3_2_1_15_1","volume-title":"SNPSFuzzer: A Fast Greybox Fuzzer for Stateful Network Protocols Using Snapshots","author":"Li Junqiang","year":"2022","unstructured":"Junqiang Li, Senyi Li, Gang Sun, Ting Chen, and Hongfang Yu. 2022. SNPSFuzzer: A Fast Greybox Fuzzer for Stateful Network Protocols Using Snapshots. IEEE Transactions on Information Forensics and Security (2022)."},{"key":"e_1_3_2_1_16_1","volume-title":"Boosting Fuzzing Performance with Differential Seed Scheduling. In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS).","author":"Lin Chung-Yi","year":"2019","unstructured":"Chung-Yi Lin, Chun-Ying Huang, and Chia-Wei Tien. 2019. Boosting Fuzzing Performance with Differential Seed Scheduling. In 2019 14th Asia Joint Conference on Information Security (AsiaJCIS)."},{"key":"e_1_3_2_1_17_1","volume-title":"BLEEM: Packet Sequence Oriented Fuzzing for Protocol Implementations. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Luo Zhengxiong","year":"2023","unstructured":"Zhengxiong Luo, Junze Yu, Feilong Zuo, Jianzhong Liu, Yu Jiang, Ting Chen, Abhik Roychoudhury, and Jiaguang Sun. 2023. BLEEM: Packet Sequence Oriented Fuzzing for Protocol Implementations. In 32nd USENIX Security Symposium (USENIX Security 23)."},{"key":"e_1_3_2_1_18_1","article-title":"Differential Testing for Software","volume":"10","author":"McKeeman M.","year":"1998","unstructured":"William\u00a0M. McKeeman. 1998. Differential Testing for Software. Digital Technical Journal 10, 1 (1998).","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_19_1","volume-title":"Large Language Model-guided Protocol Fuzzing. In Network and Distributed System Security Symposium (NDSS","author":"Meng Ruijie","year":"2024","unstructured":"Ruijie Meng, Martin Mirchev, Marcel B\u00f6hme, and Abhik Roychoudhury. 2024. Large Language Model-guided Protocol Fuzzing. In Network and Distributed System Security Symposium (NDSS 2024). The Internet Society."},{"key":"e_1_3_2_1_20_1","volume-title":"StateAFL: Greybox Fuzzing for Stateful Network Servers. Empirical Software Engineering 27, 7","author":"Natella Roberto","year":"2022","unstructured":"Roberto Natella. 2022. StateAFL: Greybox Fuzzing for Stateful Network Servers. Empirical Software Engineering 27, 7 (2022)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/3460319.3469077"},{"doi-asserted-by":"crossref","unstructured":"J. Oncina and P. Garc\u00eda. 1992. Pattern Recognition and Image Analysis. Series in Machine Perception and Artificial Intelligence Vol.\u00a01. World Scientific Chapter Inferring Regular Languages in Polynomial Updated Time 49\u201361.","key":"e_1_3_2_1_22_1","DOI":"10.1142\/9789812797902_0004"},{"issue":"1","key":"e_1_3_2_1_23_1","first-page":"1","article-title":"Computational Discrete Mathematics: Combinatorics and Graph Theory with Mathematica. Cambridge University Press, Cambridge, England. 231\u2013234 pages","volume":"6","author":"Pemmaraju V.","year":"2003","unstructured":"Sriram\u00a0V. Pemmaraju and Steven\u00a0S. Skiena. 2003. Computational Discrete Mathematics: Combinatorics and Graph Theory with Mathematica. Cambridge University Press, Cambridge, England. 231\u2013234 pages. Contracting Vertices, Section 6.1.1.","journal-title":"Contracting Vertices, Section"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/ICST46399.2020.00062"},{"key":"e_1_3_2_1_25_1","volume-title":"NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing. International Fuzzing Workshop (FUZZING) 2022","author":"Qin Shisong","year":"2022","unstructured":"Shisong Qin, Fan Hu, Bodong Zhao, Tingting Yin, and Chao Zhang. 2022. NSFuzz: Towards Efficient and State-Aware Network Service Fuzzing. International Fuzzing Workshop (FUZZING) 2022 (2022)."},{"key":"e_1_3_2_1_26_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Schumilo Sergej","year":"2021","unstructured":"Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon W\u00f6rner, and Thorsten Holz. 2021. Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types. In 30th USENIX Security Symposium (USENIX Security 21)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/3492321.3519591"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_1_29_1","volume-title":"Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. In 2022 IEEE Symposium on Security and Privacy (SP).","author":"She Dongdong","year":"2022","unstructured":"Dongdong She, Abhishek Shah, and Suman Jana. 2022. Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis. In 2022 IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_1_30_1","volume-title":"Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. In 28th Annual Network and Distributed System Security Symposium (NDSS","author":"Wang Jinghan","year":"2021","unstructured":"Jinghan Wang, Chengyu Song, and Heng Yin. 2021. Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing. In 28th Annual Network and Distributed System Security Symposium (NDSS 2021). The Internet Society."}],"event":{"acronym":"RAID '24","name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678908","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678908"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":30,"alternative-id":["10.1145\/3678890.3678908","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678908","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}