{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:25:39Z","timestamp":1730298339172,"version":"3.28.0"},"reference-count":59,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/sp.2015.50","type":"proceedings-article","created":{"date-parts":[[2015,7,22]],"date-time":"2015-07-22T20:07:58Z","timestamp":1437595678000},"page":"725-741","source":"Crossref","is-referenced-by-count":135,"title":["Program-Adaptive Mutational Fuzzing"],"prefix":"10.1109","author":[{"given":"Sang Kil","family":"Cha","sequence":"first","affiliation":[]},{"given":"Maverick","family":"Woo","sequence":"additional","affiliation":[]},{"given":"David","family":"Brumley","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Babysitting an Army of Monkeys","author":"miller","year":"2010","journal-title":"CanSecWest"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/96267.96279"},{"key":"ref33","first-page":"247","article-title":"Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach","author":"lin","year":"2008","journal-title":"Proc International Conference on Dependable Systems and Networks"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453114"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.29"},{"journal-title":"Zzuf - Multi-purpose Fuzzer","year":"0","author":"labs","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18637\/jss.v008.i14","article-title":"Xorshift RNGs","volume":"8","author":"marsaglia","year":"2003","journal-title":"Journal of Statistical Software"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"ref28","article-title":"DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation","author":"kang","year":"2011","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/T-C.1975.224259"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"journal-title":"Modern Compiler Implementation in ML","year":"1998","author":"appel","key":"ref2"},{"journal-title":"Sulley","year":"0","author":"amini","key":"ref1"},{"journal-title":"CERT Linux Triage Tools","year":"0","author":"foote","key":"ref20"},{"key":"ref22","first-page":"151","article-title":"Automated Whitebox Fuzz Testing","author":"godefroid","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"ref24","first-page":"445","article-title":"Fuzzing with Code Fragments","author":"holler","year":"2012","journal-title":"Proceedings of the USENIX Security Symposium"},{"journal-title":"notSPIKEfile","year":"0","author":"greene","key":"ref23"},{"key":"ref26","article-title":"Probability-Based Parameter Selection for Black-Box Fuzz Testing","author":"householder","year":"2012","journal-title":"CERT Tech Rep CMU\/SEI-2012-TN-018"},{"key":"ref25","article-title":"Well There's Your Problem: Isolating the Crash-Inducing Bits in a Fuzzed File","author":"householder","year":"2012","journal-title":"CERT Tech Rep CMU\/SEI-2012-TN-018"},{"journal-title":"Adaptive Sampling","year":"1996","author":"thompson","key":"ref50"},{"article-title":"A Basic Distributed Fuzzing Framework for FOE","year":"0","author":"uhley","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/587052.587053"},{"journal-title":"American Fuzzy Lop","year":"0","author":"zalewski","key":"ref58"},{"key":"ref57","first-page":"116","article-title":"Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis","author":"yin","year":"2007","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.389"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273489"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516736"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3147.3165"},{"key":"ref10","first-page":"317","article-title":"Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis","author":"caballero","year":"2007","journal-title":"Proceedings of the ACM Conference on Computer and Communications Security"},{"key":"ref11","first-page":"209","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","author":"cadar","year":"2008","journal-title":"Proceedings of the second USENIX symposium on Operating systems design and implementation"},{"key":"ref40","article-title":"Analysis of Mutation and Generation-Based Fuzzing","author":"miller","year":"2007","journal-title":"Independent Security Evaluators Tech Rep"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.31"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/32.368132"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"ref15","first-page":"342","article-title":"Locating Causes of Program Failures","author":"cleve","year":"2005","journal-title":"Proceedings of the International Conference on Software Engineering"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455820"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"journal-title":"Peach Fuzzing Platform","year":"0","author":"eddington","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/30401.315746"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2560217.2560219"},{"journal-title":"Nonlinear Programming","year":"1999","author":"bertsekas","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3711-7"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/390016.808445","article-title":"SELECT-A Formal System for Testing and Debugging Programs by Symbolic Execution","volume":"10","author":"boyer","year":"1975","journal-title":"ACM SIGPLAN Notices"},{"journal-title":"Discrete Multivariate Analysis Theory and Practice","year":"1975","author":"bishop","key":"ref7"},{"journal-title":"ClusterFuzz","year":"0","author":"team","key":"ref49"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1007\/978-3-642-22110-1_37","article-title":"BAP: A Binary Analysis Platform","author":"brumley","year":"2011","journal-title":"Proceedings of the International Conference on Computer Aided Verification"},{"article-title":"FileFuzz","year":"0","author":"sutton","key":"ref46"},{"article-title":"jsfunfuzz","year":"2007","author":"ruderman","key":"ref45"},{"journal-title":"Fuzzing for Software Security Testing and Quality Assurance","year":"2008","author":"takanen","key":"ref48"},{"journal-title":"Fuzzing Brute Force Vulnerability Discovery","year":"2007","author":"sutton","key":"ref47"},{"key":"ref42","article-title":"Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software","author":"newsome","year":"2005","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref41","first-page":"67","article-title":"Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs","author":"molnar","year":"2009","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref44","first-page":"861","article-title":"Optimizing Seed Selection for Fuzzing","author":"rebert","year":"2014","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref43","article-title":"Combinatorial Algorithms for Computers and Calculators","author":"nijenhuis","year":"1978","journal-title":"ser Computer Science and Applied Mathematics Academic Press"}],"event":{"name":"2015 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2015,5,17]]},"location":"San Jose, CA, USA","end":{"date-parts":[[2015,5,21]]}},"container-title":["2015 IEEE Symposium on Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7160813\/7163005\/07163057.pdf?arnumber=7163057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T20:29:37Z","timestamp":1624048177000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7163057\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":59,"URL":"https:\/\/doi.org\/10.1109\/sp.2015.50","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}