{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T07:48:53Z","timestamp":1726213733275},"reference-count":194,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,19]],"date-time":"2024-05-19T00:00:00Z","timestamp":1716076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002701","name":"Ministry of Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002701","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,19]]},"DOI":"10.1109\/sp54263.2024.00137","type":"proceedings-article","created":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:32Z","timestamp":1725558992000},"page":"1974-1993","source":"Crossref","is-referenced-by-count":1,"title":["SoK: Prudent Evaluation Practices for Fuzzing"],"prefix":"10.1109","author":[{"given":"Moritz","family":"Schloegel","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Nils","family":"Bars","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Nico","family":"Schiller","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Lukas","family":"Bernhard","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Tobias","family":"Scharnowski","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Addison","family":"Crump","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Arash","family":"Ale-Ebrahim","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]},{"given":"Nicolai","family":"Bissantz","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum"}]},{"given":"Marius","family":"Muench","sequence":"additional","affiliation":[{"name":"University of Birmingham"}]},{"given":"Thorsten","family":"Holz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/32.481513"},{"key":"ref2","article-title":"FirmSolo: Enabling Dynamic Analysis of Binary Linux-based IoT Kernel Modules","author":"Angelakopoulos","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985795"},{"article-title":"Dos and don\u2019ts of machine learning in computer security","volume-title":"USENIX Security Symposium","author":"Arp","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23412"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00117"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23371"},{"year":"2020","key":"ref8","article-title":"Artifact Review and Badging Version 1.1"},{"key":"ref9","article-title":"Stateful Greybox Fuzzing","author":"Ba","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref10","article-title":"Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge","author":"Bars","year":"2023","journal-title":"USENIX Security Symposium"},{"article-title":"QEMU, a Fast and Portable Dynamic Translator","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Bellard","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560624"},{"key":"ref13","article-title":"GRIMOIRE: Synthesizing Structure while Fuzzing","author":"Blazytko","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.3016773"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2785841"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00071"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24688"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453096"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179302"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409729"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468570"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409748"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510230"},{"key":"ref24","article-title":"MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs","author":"Chen","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243849"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23159"},{"key":"ref27","article-title":"SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow Analysis","author":"Chen","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833796"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559367"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00046"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363225"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616610"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484564"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00002"},{"key":"ref35","article-title":"EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers","author":"Chen","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00127"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559338"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354249"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00082"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00114"},{"key":"ref41","article-title":"IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks","author":"Christou","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref42","article-title":"HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation","author":"Clements","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref43","article-title":"SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing","author":"Cloosters","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"year":"2018","key":"ref45","article-title":"DARPA Cyber Grand Challenge"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512214"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623103"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00009"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24224"},{"year":"2015","key":"ref50","article-title":"Syzkaller \u2013 Kernel Fuzzer"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.15"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510197"},{"key":"ref53","article-title":"P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling","author":"Feng","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484543"},{"key":"ref55","article-title":"The Use of Likely Invariants as Feedback for Fuzzers","author":"Fioraldi","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref56","article-title":"AFL++ : Combining Incremental Steps of Fuzzing Research","author":"Fioraldi","year":"2020","journal-title":"USENIX Workshop on Offensive Technologies (WOOT)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560602"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560431"},{"key":"ref59","article-title":"GREYONE: Data Flow Sensitive Fuzzing","author":"Gan","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00040"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484748"},{"volume-title":"OSS-Fuzz: Continuous Fuzzing for Open Source Software","key":"ref62"},{"year":"2016","key":"ref63","article-title":"Fuzzer-Test-Suite"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510228"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24290"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3560885"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00020"},{"key":"ref68","article-title":"AntiFuzz: Impeding Fuzzing Audits of Binary Executables","author":"G\u00fcler","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23263"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3428334"},{"article-title":"SoFi Artifact","year":"2021","author":"He","key":"ref71"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484823"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464795"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833751"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00063"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00034"},{"key":"ref77","article-title":"FuzzGen: Automatic Fuzzer Generation","author":"Ispoglou","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.23159"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00017"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00016"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678813"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00045"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560575"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24296"},{"key":"ref85","article-title":"Fuzzification: Anti-Fuzzing Techniques","author":"Jung","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24334"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24018"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243804"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510628"},{"key":"ref90","article-title":"laf-intel - Circumventing Fuzzing Roadblocks with Compiler Transformations"},{"key":"ref91","article-title":"Constraint-guided Directed Greybox Fuzzing","author":"Lee","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00043"},{"key":"ref93","article-title":"Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer","author":"Lee","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238176"},{"key":"ref96","article-title":"PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems","author":"Li","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref97","article-title":"\u00b5AFL: Non-intrusive Feedback-driven Fuzzing for Microcontroller Firmware","author":"Li","year":"2022","journal-title":"IEEE\/ACM International Conference on Automated Software Engineering (ASE)"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338975"},{"key":"ref99","article-title":"UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers","author":"Li","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833594"},{"key":"ref101","article-title":"LibFuzzer - A Library for Coverage-guided Wuzz Testing"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833683"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3510454.3516847"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179354"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00051"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678671"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00042"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179296"},{"key":"ref109","article-title":"Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations","author":"Luo","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref110","article-title":"MOPT: Optimized Mutation Scheduling for Fuzzers","author":"Lyu","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref111","article-title":"MINER: A Hybrid Data-Driven Approach for REST API Fuzzing","author":"Lyu","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2946563"},{"key":"ref113","article-title":"Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference","author":"Man\u00e8s","year":"2020","journal-title":"IEEE\/ACM International Conference on Automated Software Engineering (ASE)"},{"article-title":"Comment 1","year":"2018","author":"Matz","key":"ref114"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510082"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623097"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00018"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3473932"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23166"},{"key":"ref120","article-title":"MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference","author":"Myung","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00069"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484787"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3469077"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510182"},{"key":"ref125","article-title":"MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools","author":"Nguyen","year":"2020","journal-title":"IEEE\/ACM International Conference on Automated Software Engineering (ASE)"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00034"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88418-5_9"},{"author":"Padgham","key":"ref128","article-title":"CORE Rankings"},{"key":"ref129","article-title":"MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation","author":"Pailoor","year":"2018","journal-title":"USENIX Security Symposium"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484811"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00015"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00067"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00056"},{"key":"ref134","article-title":"GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation","author":"Peng","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref135","article-title":"Symbolic execution with SymCC: Don\u2019t interpret, compile!","author":"Poeplau","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24118"},{"key":"ref137","article-title":"Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets","author":"Ruge","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5246-7"},{"key":"ref139","article-title":"Token-Level Fuzzing","author":"Salls","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref140","article-title":"Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing","author":"Scharnowski","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23096"},{"key":"ref142","article-title":"Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types","author":"Schumilo","year":"2021","journal-title":"USENIX Security Symposium"},{"key":"ref143","article-title":"Forming Faster Firmware Fuzzers","author":"Seidel","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560648"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409723"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00052"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833761"},{"key":"ref148","article-title":"Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds","author":"Shen","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref149","article-title":"AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering","author":"Shi","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref150","article-title":"Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints","author":"Song","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510044"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409769"},{"key":"ref153","article-title":"No Linux, No Problem: Fast and Correct Windows Binary Fuzzing via Target-embedded Snapshotting","author":"Stone","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref154","article-title":"Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems","author":"Talebi","year":"2018","journal-title":"USENIX Security Symposium"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00031"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.2307\/1165329"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00072"},{"key":"ref158","doi-asserted-by":"crossref","DOI":"10.1145\/3377811.3380386","article-title":"Typestate-guided Fuzzer for Discovering Use-after-free Vulnerabilities","volume-title":"IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"Wang"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ASE56229.2023.00120"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00081"},{"key":"ref161","article-title":"FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler","author":"Wang","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24422"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510041"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380396"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00017"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616277"},{"key":"ref167","doi-asserted-by":"crossref","DOI":"10.1145\/3377811.3380388","article-title":"Targeted Greybox Fuzzing with Static Lookahead Analysis","volume-title":"IEEE\/ACM International Conference on Automated Software Engineering (ASE)","author":"W\u00fcstholz"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00078"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24353"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00035"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423340"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00080"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00057"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3560415"},{"key":"ref175","article-title":"EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit","author":"Yue","year":"2020","journal-title":"USENIX Security Symposium"},{"key":"ref176","article-title":"QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing","author":"Yun","year":"2018","journal-title":"USENIX Security Symposium"},{"volume-title":"American Fuzzy Lop","author":"Zalewski","key":"ref177"},{"article-title":"The Fuzzing Book","year":"2019","author":"Zeller","key":"ref178"},{"article-title":"When Results Are All That Matters: Consequences","year":"2019","author":"Zeller","key":"ref179"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24314"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468610"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616636"},{"key":"ref183","article-title":"FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing","author":"Zhang","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00109"},{"key":"ref185","article-title":"StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing","author":"Zhao","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref186","article-title":"FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets","author":"Zheng","year":"2023","journal-title":"USENIX Security Symposium"},{"key":"ref187","article-title":"FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation","author":"Zheng","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref188","article-title":"Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling","author":"Zhou","year":"2020","journal-title":"IEEE\/ACM International Conference on Automated Software Engineering (ASE)"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549107"},{"key":"ref190","article-title":"Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths","author":"Zhou","year":"2022","journal-title":"USENIX Security Symposium"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559386"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484596"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1145\/3512345"},{"key":"ref194","article-title":"ParmeSan: Sanitizer-guided Greybox Fuzzing","author":"\u00d6sterlund","year":"2020","journal-title":"USENIX Security Symposium"}],"event":{"name":"2024 IEEE Symposium on Security and Privacy (SP)","start":{"date-parts":[[2024,5,19]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2024,5,23]]}},"container-title":["2024 IEEE Symposium on Security and Privacy (SP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10646615\/10646598\/10646824.pdf?arnumber=10646824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:01:08Z","timestamp":1725768068000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646824\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,19]]},"references-count":194,"URL":"https:\/\/doi.org\/10.1109\/sp54263.2024.00137","relation":{},"subject":[],"published":{"date-parts":[[2024,5,19]]}}}