{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:12:05Z","timestamp":1775873525154,"version":"3.50.1"},"reference-count":85,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T00:00:00Z","timestamp":1745798400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61932012, 62372228"],"award-info":[{"award-number":["61932012, 62372228"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"CCF-Huawei Populus Grove Fund","award":["CCF-HuaweiSE202304, CCF-HuaweiSY202306"],"award-info":[{"award-number":["CCF-HuaweiSE202304, CCF-HuaweiSY202306"]}]},{"name":"Science, Technology and Innovation Commission of Shenzhen Municipality","award":["CJGJZD20200617103001003"],"award-info":[{"award-number":["CJGJZD20200617103001003"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["14380029"],"award-info":[{"award-number":["14380029"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2025,5,31]]},"abstract":"<jats:p>\n            Greybox fuzzing is dedicated to revealing software bugs by maximizing code coverage. Concentrating on code coverage, greybox fuzzing effectively exposes bugs in real-world programs by continuously executing the program under test (PUT) with the test inputs generated from initial seeds, making it a popular software testing technique. Although powerful, the effectiveness of greybox fuzzing can be restricted in some cases. Ignoring the significant degrees of executed functions, traditional greybox fuzzing usually fails to identify\n            <jats:italic>significant seeds<\/jats:italic>\n            that execute more significant functions, and thus may assign similar energy to significant and trivial seeds when conducting power scheduling. As a result, the effectiveness of greybox fuzzing can be degraded due to wasting too much energy on trivial seeds. In this paper, we introduce\n            <jats:italic>function significance<\/jats:italic>\n            (FS) to measure the significant degrees of functions. Our key insight is that the influential functions that connect to many other functions are significant to greybox fuzzing as they provide more probabilities to reach previously unexplored code regions. To quantify FS, we conduct influence analysis upon the call graphs extracted from the PUTs to obtain the centrality values of function nodes. With FS as the significance measurement, we further propose\n            <jats:sc>FunFuzz<\/jats:sc>\n            , an FS-aware greybox fuzzing technique, to optimize significant seeds and tackle the aforementioned restriction. To this end,\n            <jats:sc>FunFuzz<\/jats:sc>\n            dynamically tracks the functions executed by a seed during fuzzing, and computes the significance score for the seed by accumulating the FS values of the functions executed by it. Based on the computed FS values,\n            <jats:sc>FunFuzz<\/jats:sc>\n            then takes an estimation-based power scheduling to assign more (or less) energy to seeds that achieve over-estimated (or under-estimated) significance scores. Specifically, the seed energy is adjusted by multiplying with a scale factor computed regarding the ratio of the\n            <jats:italic>actual significance score<\/jats:italic>\n            achieved by executing the seed and the\n            <jats:italic>estimated significance score<\/jats:italic>\n            predicted by a linear model constructed on-the-fly. To evaluate\n            <jats:sc>FunFuzz<\/jats:sc>\n            , we prototype it on top of AFL++ and conduct experiments with 15 programs, of which 10 are from common real-world projects and five are from Magma, and compare it to seven popular fuzzers. The experimental results obtained through fuzzing exceeding 40,800 CPU hours show that: (1) In terms of covering code,\n            <jats:sc>FunFuzz<\/jats:sc>\n            outperforms AFL++ by achieving 0.1%\u201318.4% more region coverage on 13 out of 15 targets. (2) In terms of finding bugs,\n            <jats:sc>FunFuzz<\/jats:sc>\n            unveils 114 unique crashes and 25 Magma bugs (which are derived from CVEs) in 20 trials of 24-hour fuzzing, which are the most compared to the competitor fuzzers and include 32 crashes and 1 Magma bug that the other fuzzers fail to discover. Besides the experiments focusing on code coverage and bug finding, we evaluate the key components of\n            <jats:sc>FunFuzz<\/jats:sc>\n            , namely the FS-centered estimation-based power scheduling and the lazy FS computation mechanism. The extensive evaluation not only suggests\n            <jats:sc>FunFuzz<\/jats:sc>\n            \u2019s superiority in code coverage and bug finding, but also demonstrates the effectiveness of the two components.\n          <\/jats:p>","DOI":"10.1145\/3702974","type":"journal-article","created":{"date-parts":[[2024,11,2]],"date-time":"2024-11-02T15:26:49Z","timestamp":1730561209000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["FunFuzz: Greybox Fuzzing with Function Significance"],"prefix":"10.1145","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-5040-3123","authenticated-orcid":false,"given":"Ruixiang","family":"Qian","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2495-3805","authenticated-orcid":false,"given":"Quanjun","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9930-7111","authenticated-orcid":false,"given":"Chunrong","family":"Fang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4336-7190","authenticated-orcid":false,"given":"Lihua","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Software, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9592-7022","authenticated-orcid":false,"given":"Zhenyu","family":"CHEN","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,4,28]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"AFL++-team. 2023. Test Cases Provided by AFL & AFL++. Retrieved March 2023 from https:\/\/github.com\/AFLplusplus\/AFLplusplus\/tree\/stable\/testcases"},{"key":"e_1_3_1_3_2","unstructured":"AFL++-Team. 2024. AFL++ Power Schedules. Retrieved May 20 2024 from https:\/\/aflplus.plus\/docs\/power_schedules\/"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.5555\/1971972"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tjem.2018.08.001"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.10.006"},{"key":"e_1_3_1_8_2","first-page":"3255","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security 22)","author":"Ba Jinsheng","year":"2022","unstructured":"Jinsheng Ba, Marcel B\u00f6hme, Zahra Mirzamomen, and Abhik Roychoudhury. 2022. Stateful greybox fuzzing. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), 3255\u20133272."},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-969-5"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134020"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510230"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/174675.177973"},{"key":"e_1_3_1_15_2","first-page":"2325","volume-title":"Proceedings of the 29th USENIX Security Symposium (Security \u201920)","author":"Chen Hongxu","year":"2020","unstructured":"Hongxu Chen, Shengjian Guo, Yinxing Xue, Yulei Sui, Cen Zhang, Yuekang Li, Haijun Wang, and Yang Liu. 2020. MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs. In Proceedings of the 29th USENIX Security Symposium (Security \u201920), 2325\u20132342."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970366"},{"key":"e_1_3_1_17_2","unstructured":"Clang-team. 2023. Clang AddressSanitizer. Retrieved March 2023 from https:\/\/clang.llvm.org\/docs\/AddressSanitizer.html"},{"key":"e_1_3_1_18_2","unstructured":"Clang-team. 2024. LLVM Source Code Coverage. Retrieved May 2024 from https:\/\/clang.llvm.org\/docs\/SourceBasedCodeCoverage.html"},{"key":"e_1_3_1_19_2","first-page":"1","article-title":"Pearson correlation coefficient","author":"Cohen Israel","year":"2009","unstructured":"Israel Cohen, Yiteng Huang, Jingdong Chen, Jacob Benesty, Jacob Benesty, Jingdong Chen, Yiteng Huang, and Israel Cohen. 2009. Pearson correlation coefficient. In Noise Reduction in Speech Processing. Springer, 1\u20134.","journal-title":"Noise Reduction in Speech Processing"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510197"},{"key":"e_1_3_1_21_2","unstructured":"Dynamorio-team. 2024. Dynamorio: Dynamic Instrumentation Tool Platform. Retrieved August 2024 from https:\/\/dynamorio.org\/"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397362"},{"key":"e_1_3_1_23_2","volume-title":"Linear Models with R","author":"Faraway Julian J.","year":"2014","unstructured":"Julian J. Faraway. 2014. Linear Models with R. CRC Press."},{"key":"e_1_3_1_24_2","volume-title":"Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT\u2019 20)","author":"Fioraldi Andrea","year":"2020","unstructured":"Andrea Fioraldi, Dominik Maier, Heiko Ei\u00dffeldt, and Marc Heuse. 2020. AFL++: Combining incremental steps of fuzzing research. In Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT\u2019 20)."},{"key":"e_1_3_1_25_2","unstructured":"FunFuzz-team. 2024. Artifacts of FuzzFuzz. Retrieved August 2024 from https:\/\/github.com\/funfuzz-tosem2023\/funfuzz-artifacts"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2022.3140510"},{"key":"e_1_3_1_27_2","volume-title":"Proceedings of the International Conference on USENIX Security Symposium","author":"G\u00fcler Emre","year":"2024","unstructured":"Emre G\u00fcler, Sergej Schumilo, Moritz Schloegel, Nils Bars, Philipp G\u00f6rz, Xinyi Xu, Cemal Kaygusuz, and Thorsten Holz. 2024. Atropos: Effective fuzzing of web applications for server-side vulnerabilities. In Proceedings of the International Conference on USENIX Security Symposium."},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"issue":"5","key":"e_1_3_1_30_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3587159","article-title":"DatAFLow: Toward a data-flow-guided fuzzer","volume":"32","author":"Herrera Adrian","year":"2023","unstructured":"Adrian Herrera, Mathias Payer, and Antony L. Hosking. 2023. DatAFLow: Toward a data-flow-guided fuzzer. ACM Transactions on Software Engineering and Methodology 32, 5 (2023), 1\u201331.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_1_31_2","unstructured":"HexHive. 2024. Magma Bug List. Retrieved January 2024 from https:\/\/hexhive.epfl.ch\/magma\/docs\/bugs.html"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833751"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289026"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"e_1_3_1_35_2","volume-title":"Data Science: Concepts and Practice","author":"Kotu Vijay","year":"2018","unstructured":"Vijay Kotu and Bala Deshpande. 2018. Data Science: Concepts and Practice. Morgan Kaufmann."},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510628"},{"key":"e_1_3_1_37_2","first-page":"3559","volume-title":"Proceedings of the 30th USENIX Security Symposium (Security \u201921)","author":"Lee Gwangmu","year":"2021","unstructured":"Gwangmu Lee, Woochul Shim, and Byoungyoung Lee. 2021. Constraint-guided Directed Greybox Fuzzing. In Proceedings of the 30th USENIX Security Symposium (Security \u201921), 3559\u20133576."},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155684"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586027"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2807843"},{"issue":"1","key":"e_1_3_1_42_2","first-page":"3251","article-title":"Multiple targets directed greybox fuzzing","volume":"21","author":"Liang Hongliang","year":"2023","unstructured":"Hongliang Liang, Xinglin Yu, Xianglin Cheng, Jie Liu, and Jin Li. 2023. Multiple targets directed greybox fuzzing. IEEE Transactions on Dependable and Secure Computing 21, 1 (2023), 3251\u201315.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2961339"},{"key":"e_1_3_1_44_2","unstructured":"LibFuzzer. 2023. Libfuzzer: Coverage Guided Fuzz Testing. Retrieved June 6 2022 from https:\/\/llvm.org\/docs\/LibFuzzer.html"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2014.24012"},{"key":"e_1_3_1_46_2","unstructured":"LLVM-team. 2023. Introduction LLVM pass. Retrieved August 12 2022 from https:\/\/llvm.org\/docs\/WritingAnLLVMPass.html"},{"key":"e_1_3_1_47_2","first-page":"1867","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Lu Kangjie","year":"2019","unstructured":"Kangjie Lu and Hong Hu. 2019. Where does it go? Refining indirect-call targets with multi-layer type analysis. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 1867\u20131881."},{"key":"e_1_3_1_48_2","first-page":"1949","volume-title":"Proceedings of the 28th USENIX Security Symposium (Security \u201919)","author":"Lyu Chenyang","year":"2019","unstructured":"Chenyang Lyu, Shouling Ji, Chao Zhang, Yuwei Li, Wei-Han Lee, Yu Song, and Raheem Beyah. 2019. Mopt: Optimized mutation scheduling for fuzzers. In Proceedings of the 28th USENIX Security Symposium (Security \u201919), 1949\u20131966."},{"key":"e_1_3_1_49_2","unstructured":"Hexhive Magma. 2023. List of the Fuzz Targets from Magma. Retrieved December 21 2023 from https:\/\/hexhive.epfl.ch\/magma\/"},{"key":"e_1_3_1_50_2","unstructured":"Magma-Community. 2024. Usage of Magma llvm_cov. Retrieved April 2024 from https:\/\/github.com\/HexHive\/magma\/issues\/144"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.38094\/jastt1457"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1002\/9780470479216.corpsy0524"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_1_56_2","unstructured":"MJS-team. 2022. Embedded Javascript Engine for C\/c++. Retrieved from https:\/\/github.com\/cesanta\/mjs"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3110025.3110034"},{"key":"e_1_3_1_58_2","unstructured":"Networkit. 2023. Python Library for Large-Scale Network Analysis. Retrieved from https:\/\/networkit.github.io\/"},{"key":"e_1_3_1_59_2","unstructured":"M. E. J. Newman. 2016. Mathematics of Networks."},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510182"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3360600"},{"key":"e_1_3_1_62_2","volume-title":"The Pagerank Citation Ranking: Bringing Order to the Web","author":"Page Lawrence","year":"1999","unstructured":"Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The Pagerank Citation Ranking: Bringing Order to the Web. Technical Report. Stanford InfoLab."},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.005"},{"key":"e_1_3_1_64_2","article-title":"DiPri: Distance-based seed prioritization for greybox fuzzing","author":"Qian Ruixiang","year":"2024","unstructured":"Ruixiang Qian, Quanjun Zhang, Chunrong Fang, Ding Yang, Shun Li, Binyu Li, and Zhenyu Chen. 2024. DiPri: Distance-based seed prioritization for greybox fuzzing. ACM Transactions on Software Engineering and Methodology (Mar. 2024). DOI: https:\/\/doi.org\/10.1145\/3654440","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"e_1_3_1_65_2","volume-title":"Goodness-of-Fit Statistics for Discrete Multivariate Data","author":"Read Timothy R. C.","year":"2012","unstructured":"Timothy R. C. Read and Noel A. C. Cressie. 2012. Goodness-of-Fit Statistics for Discrete Multivariate Data. Springer Science & Business Media."},{"key":"e_1_3_1_66_2","first-page":"861","volume-title":"Proceedings of the 23rd USENIX Security Symposium (Security \u201914)","author":"Rebert Alexandre","year":"2014","unstructured":"Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, and David Brumley. 2014. Optimizing seed selection for fuzzing. In Proceedings of the 23rd USENIX Security Symposium (Security \u201914), 861\u2013875."},{"key":"e_1_3_1_67_2","volume-title":"Linear Models in Statistics","author":"Rencher Alvin C.","year":"2008","unstructured":"Alvin C. Rencher and G. Bruce Schaalje. 2008. Linear Models in Statistics. John Wiley & Sons."},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124358"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519591"},{"key":"e_1_3_1_70_2","unstructured":"Kostya Serebryany. 2017. Oss-fuzz: Google\u2019s Continuous Fuzzing Service for Open Source Software."},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409723"},{"key":"e_1_3_1_72_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833761"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25935-0_3"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.5555\/3275309"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485524"},{"key":"e_1_3_1_77_2","volume-title":"A guide to modern econometrics","author":"Verbeek Marno","year":"2008","unstructured":"Marno Verbeek. 2008. A guide to modern econometrics. John Wiley & Sons."},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24422"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00046"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"e_1_3_1_81_2","first-page":"2307","volume-title":"Proceedings of the 29th USENIX Security Symposium (Security \u201920)","author":"Yue Tai","year":"2020","unstructured":"Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou. 2020. EcoFuzz: Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit. In Proceedings of the 29th USENIX Security Symposium (Security \u201920), 2307\u20132324."},{"key":"e_1_3_1_82_2","unstructured":"Michal Zalewski. 2023. AFL Vulnerability Trophy Case. Retrieved March 2023 from https:\/\/lcamtuf.coredump.cx\/afl\/#bugs"},{"key":"e_1_3_1_83_2","unstructured":"Michal Zalewski. 2023. American Fuzzy Lop GitHub Repository. Retrieved March 2023 from https:\/\/github.com\/google\/AFL"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510063"},{"key":"e_1_3_1_85_2","first-page":"1343","volume-title":"Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23)","author":"Zheng Han","year":"2023","unstructured":"Han Zheng, Jiayuan Zhang, Yuhang Huang, Zezhong Ren, He Wang, Chunjie Cao, Yuqing Zhang, Flavio Toffalini, and Mathias Payer. 2023. FISHFUZZ: Catch deeper bugs by throwing larger nets. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, 1343\u20131360. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/zheng"},{"key":"e_1_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702974","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3702974","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:04Z","timestamp":1750295884000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702974"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,28]]},"references-count":85,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,5,31]]}},"alternative-id":["10.1145\/3702974"],"URL":"https:\/\/doi.org\/10.1145\/3702974","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,28]]},"assertion":[{"value":"2023-09-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}