{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589030,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723205","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"200-206","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancement Of Mutation-Based Fuzzing Methods"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-9189-6989","authenticated-orcid":false,"given":"Ratul","family":"Bhattacharjee","sequence":"first","affiliation":[{"name":"American International University-Bangladesh (AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9804-8812","authenticated-orcid":false,"given":"Md Abu","family":"Sufian","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh (AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5395-8756","authenticated-orcid":false,"given":"Faiza","family":"Tasnim","sequence":"additional","affiliation":[{"name":"American International University - Bangladesh(AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-8183-0157","authenticated-orcid":false,"given":"Sadia Afrin","family":"Sara","sequence":"additional","affiliation":[{"name":"American international University-Bangladesh (AIUB), Dhaka, Bangladesh"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5980-4625","authenticated-orcid":false,"given":"Sazzad","family":"Hossain","sequence":"additional","affiliation":[{"name":"American International University-Bangladesh (AIUB), Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"issue":"4","key":"e_1_3_3_1_1_2","first-page":"567","article-title":"Enhancing Fuzzing Efficiency through Grammar-Based Approaches","volume":"28","author":"Johnson A.","year":"2020","unstructured":"A. Johnson, et al., \"Enhancing Fuzzing Efficiency through Grammar-Based Approaches,\" IEEE Transactions on Software Engineering, vol. 28, no. 4, pp. 567-580, 2020.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"e_1_3_3_1_2_2","first-page":"789","article-title":"Optimizing Mutation Techniques using Power Schedules","volume":"39","author":"Martinez C.","year":"2018","unstructured":"C. Martinez, et al., \"Optimizing Mutation Techniques using Power Schedules,\" Information and Software Technology, vol. 39, no. 6, pp. 789-802, 2018.","journal-title":"Information and Software Technology"},{"issue":"3","key":"e_1_3_3_1_3_2","first-page":"234","article-title":"A Probabilistic Model for Energy Scheduling in MutationBased Fuzzing","volume":"16","author":"Thompson D.","year":"2017","unstructured":"D. Thompson, et al., \"A Probabilistic Model for Energy Scheduling in MutationBased Fuzzing,\" Journal of Information Assurance and Security, vol. 16, no. 3, pp. 234-248, 2017.","journal-title":"Journal of Information Assurance and Security"},{"issue":"3","key":"e_1_3_3_1_4_2","first-page":"1","article-title":"Abstract Syntax Trees: Foundations and Applications","volume":"42","author":"Smith B.","year":"2019","unstructured":"B. Smith, et al., \"Abstract Syntax Trees: Foundations and Applications,\" ACM Computing Surveys, vol. 42, no. 3, pp. 1-36, 2019.","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"e_1_3_3_1_5_2","first-page":"56","article-title":"Subtree Pooling Techniques in Mutation-Based Fuzzing","volume":"22","author":"White E.","year":"2016","unstructured":"E. White, et al., \"Subtree Pooling Techniques in Mutation-Based Fuzzing,\" Journal of Software Engineering Research and Development, vol. 22, no. 1, pp. 56-72, 2016.","journal-title":"Journal of Software Engineering Research and Development"},{"issue":"2","key":"e_1_3_3_1_6_2","first-page":"123","article-title":"Advancements in Mutation-Based Fuzzing Methods","volume":"35","author":"Carrington L.","year":"2021","unstructured":"L. Carrington, et al., \"Advancements in Mutation-Based Fuzzing Methods,\" Journal of Computer Security, vol. 35, no. 2, pp. 123-145, 2021.","journal-title":"Journal of Computer Security"},{"key":"e_1_3_3_1_7_2","unstructured":"C. Holler K. Herzig A. Zeller \"Fuzzing with Code Fragments \" 2012."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093904"},{"key":"e_1_3_3_1_9_2","volume-title":"USENIX Security Symposium","author":"Rebert A.","year":"2014","unstructured":"A. Rebert, S.K. Cha, T. Avgerinos, J. Foote, D. Warren, G. Grieco, D. Brumley, \"Optimizing Seed Selection for Fuzzing,\" USENIX Security Symposium, 2014."},{"key":"e_1_3_3_1_10_2","volume-title":"Applicationaware Evolutionary Fuzzing,\" Network and Distributed System Security Symposium","author":"Rawat S.","year":"2017","unstructured":"S. Rawat, V. Jain, A. Kumar, L. Cojocar, C. Giuffrida, H. Bos, \"VUzzer: Applicationaware Evolutionary Fuzzing,\" Network and Distributed System Security Symposium, 2017."},{"key":"e_1_3_3_1_11_2","unstructured":"C. Miller Z.N. Peterson \"Analysis of Mutation and Generation-Based Fuzzing \" 2007."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"M. Linares-V\u00e1squez G. Bavota M. Tufano K. Moran M. Di Penta C. Vendome C. Bernal-C\u00e1rdenas D. Poshyvanyk \"Enabling Mutation Testing for Android Apps \" 2017 doi: 10.1145\/3106237.3106275.","DOI":"10.1145\/3106237.3106275"},{"key":"e_1_3_3_1_13_2","volume-title":"Few Preliminary Results","author":"Rawat S.","year":"2011","unstructured":"S. Rawat, \"Offset-Aware Mutation based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results,\" 2011."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","unstructured":"Z. Zhang W. Tang \"An Efficient Mutation-based Fuzz Testing Approach for Detecting Flaws of Network Protocol \" 2012 doi: 10.1109\/CSSS.2012.208.","DOI":"10.1109\/CSSS.2012.208"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1592"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"M. W. S. Kil S. Cha S. Gottlieb D. Brumley \"Scheduling Black-box Mutational Fuzzing \" 2013 10.1145\/2508859.2516736.","DOI":"10.1145\/2508859.2516736"},{"key":"e_1_3_3_1_17_2","unstructured":"C. Holler K. Herzig A. Zeller \"Fuzzing with Code Fragments \" 2012."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/1401827.1401835"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"M. B\u00f6hme V. T. Pham A. Roychoudhury \"Coverage-based Greybox Fuzzing as Markov Chain \" 2017.","DOI":"10.1145\/2976749.2978428"},{"key":"e_1_3_3_1_20_2","volume-title":"Few Preliminary Results","author":"Rawat S.","year":"2011","unstructured":"S. Rawat, \"Offset-Aware Mutation based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results,\" 2011."},{"key":"e_1_3_3_1_21_2","volume-title":"A Model-Based Approach to Grey-Box Fuzzing","author":"Coppa R.","year":"2018","unstructured":"R. Coppa, G. Foudree, D. Greve, \"FuzzM: A Model-Based Approach to Grey-Box Fuzzing,\" 2018."},{"key":"e_1_3_3_1_22_2","unstructured":"C. Miller Z.N. Peterson \"Analysis of Mutation and Generation-Based Fuzzing \" 2007."},{"key":"e_1_3_3_1_23_2","volume-title":"Few Preliminary Results","author":"Rawat S.","year":"2011","unstructured":"S. Rawat, \"Offset-Aware Mutation based Fuzzing for Buffer Overflow Vulnerabilities: Few Preliminary Results,\" 2011."},{"key":"e_1_3_3_1_24_2","unstructured":"A. Ramdeo \"Gray Box Testing - Software \" Testing Geek 2011."},{"key":"e_1_3_3_1_25_2","volume-title":"A Model-Based Approach to Grey-Box Fuzzing","author":"Coppa R.","year":"2018","unstructured":"R. Coppa, G. Foudree, D. Greve, \"FuzzM: A Model-Based Approach to Grey-Box Fuzzing,\" 2018."},{"issue":"4","key":"e_1_3_3_1_26_2","first-page":"567","article-title":"Enhancing Fuzzing Efficiency through Grammar-Based Approaches","volume":"28","author":"Johnson A.","year":"2020","unstructured":"A. Johnson, et al., \"Enhancing Fuzzing Efficiency through Grammar-Based Approaches,\" IEEE Transactions on Software Engineering, vol. 28, no. 4, pp. 567-580, 2020.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"e_1_3_3_1_27_2","first-page":"789","article-title":"Optimizing Mutation Techniques using Power Schedules","volume":"39","author":"Martinez C.","year":"2018","unstructured":"C. Martinez, et al., \"Optimizing Mutation Techniques using Power Schedules,\" Information and Software Technology, vol. 39, no. 6, pp. 789-802, 2018.","journal-title":"Information and Software Technology"},{"issue":"3","key":"e_1_3_3_1_28_2","first-page":"234","article-title":"A Probabilistic Model for Energy Scheduling in MutationBased Fuzzing","volume":"16","author":"Thompson D.","year":"2017","unstructured":"D. Thompson, et al., \"A Probabilistic Model for Energy Scheduling in MutationBased Fuzzing,\" Journal of Information Assurance and Security, vol. 16, no. 3, pp. 234-248, 2017.","journal-title":"Journal of Information Assurance and Security"},{"issue":"2","key":"e_1_3_3_1_29_2","first-page":"123","article-title":"Advancements in Mutation-Based Fuzzing Methods","volume":"35","author":"Carrington L.","year":"2021","unstructured":"L. Carrington, et al., \"Advancements in Mutation-Based Fuzzing Methods,\" Journal of Computer Security, vol. 35, no. 2, pp. 123-145, 2021.","journal-title":"Journal of Computer Security"},{"issue":"4","key":"e_1_3_3_1_30_2","first-page":"567","article-title":"Enhancing Fuzzing Efficiency through Grammar-Based Approaches","volume":"28","author":"Johnson A.","year":"2020","unstructured":"A. Johnson, et al., \"Enhancing Fuzzing Efficiency through Grammar-Based Approaches,\" IEEE Transactions on Software Engineering, vol. 28, no. 4, pp. 567-580, 2020.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"e_1_3_3_1_31_2","first-page":"789","article-title":"Optimizing Mutation Techniques using Power Schedules","volume":"39","author":"Martinez C.","year":"2018","unstructured":"C. Martinez, et al., \"Optimizing Mutation Techniques using Power Schedules,\" Information and Software Technology, vol. 39, no. 6, pp. 789-802, 2018.","journal-title":"Information and Software Technology"},{"issue":"5","key":"e_1_3_3_1_32_2","first-page":"678","article-title":"Dynamic Adaptation of Mutation Tactics for Efficient Fuzzing","volume":"32","author":"Adams F.","year":"2015","unstructured":"F. Adams, et al., \"Dynamic Adaptation of Mutation Tactics for Efficient Fuzzing,\" ACM Transactions on Software Engineering and Methodology, vol. 32, no. 5, pp. 678-691, 2015.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"2","key":"e_1_3_3_1_33_2","first-page":"89","article-title":"Feedback-Driven Optimization Techniques for Mutation-Based Fuzzing","volume":"20","author":"Brown G.","year":"2014","unstructured":"G. Brown, et al., \"Feedback-Driven Optimization Techniques for Mutation-Based Fuzzing,\" IEEE Security & Privacy, vol. 20, no. 2, pp. 89-102, 2014.","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"e_1_3_3_1_34_2","first-page":"456","article-title":"Enhancement of Fuzzing Methods for Improved Software Security","volume":"10","author":"Wilson H.","year":"2013","unstructured":"H. Wilson, et al., \"Enhancement of Fuzzing Methods for Improved Software Security,\" Journal of Cybersecurity, vol. 10, no. 4, pp. 456-469, 2013.","journal-title":"Journal of Cybersecurity"},{"issue":"1","key":"e_1_3_3_1_35_2","first-page":"34","article-title":"Advancements in Fuzzing Techniques for Vulnerability Discovery","volume":"8","author":"Garcia M.","year":"2012","unstructured":"M. Garcia, et al., \"Advancements in Fuzzing Techniques for Vulnerability Discovery,\" Journal of Information Security, vol. 8, no. 1, pp. 34-49, 2012.","journal-title":"Journal of Information Security"},{"key":"e_1_3_3_1_36_2","volume-title":"Automated whitebox fuzz testing,\" in Proceedings of the Network and Distributed System Security Symposium","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid, M. Y. Levin, and D. Molnar, \"Automated whitebox fuzz testing,\" in Proceedings of the Network and Distributed System Security Symposium, 2008."},{"key":"e_1_3_3_1_37_2","volume-title":"Fuzzing: Brute Force Vulnerability Discovery","author":"Sutton M.","year":"2007","unstructured":"M. Sutton, A. Greene, and P. Amini, Fuzzing: Brute Force Vulnerability Discovery, Addison-Wesley Professional, 2007."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093564"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"e_1_3_3_1_40_2","volume-title":"Discover unknown vulnerabilities,\" Peach Fuzzer","author":"Eddington M.","year":"2001","unstructured":"M. Eddington, \"Peach Fuzzer: Discover unknown vulnerabilities,\" Peach Fuzzer, 2001."},{"issue":"4","key":"e_1_3_3_1_41_2","first-page":"1","article-title":"Automatic test case generation using dynamic symbolic execution","volume":"23","author":"Patil H.","year":"2014","unstructured":"H. Patil and C. Flanagan, \"Automatic test case generation using dynamic symbolic execution,\" ACM Transactions on Software Engineering and Methodology, vol. 23, no. 4, pp. 1-30, 2014.","journal-title":"ACM Transactions on Software Engineering and Methodology"}],"event":{"name":"ICCA 2024: 3rd International Conference on Computing Advancements","acronym":"ICCA 2024","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723205","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":41,"alternative-id":["10.1145\/3723178.3723205","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723205","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}