{"id":"https://openalex.org/W2984976544","doi":"https://doi.org/10.1145/3319535.3354249","title":"Intriguer","display_name":"Intriguer","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2984976544","doi":"https://doi.org/10.1145/3319535.3354249","mag":"2984976544"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3354249","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3354249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071860651","display_name":"Mingi Cho","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Mingi Cho","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025718169","display_name":"Seoyoung Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seoyoung Kim","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090551692","display_name":"Taekyoung Kwon","orcid":"https://orcid.org/0000-0002-5513-0836"},"institutions":[{"id":"https://openalex.org/I193775966","display_name":"Yonsei University","ror":"https://ror.org/01wjejq96","country_code":"KR","type":"education","lineage":["https://openalex.org/I193775966"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taekyoung Kwon","raw_affiliation_strings":["Yonsei University, Seoul, South Korea"],"affiliations":[{"raw_affiliation_string":"Yonsei University, Seoul, South Korea","institution_ids":["https://openalex.org/I193775966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071860651"],"corresponding_institution_ids":["https://openalex.org/I193775966"],"apc_list":null,"apc_paid":null,"fwci":7.036,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.97169811,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"515","last_page":"530"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9572753310203552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8909064531326294},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.7838075160980225},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.6557798385620117},{"id":"https://openalex.org/keywords/concolic-testing","display_name":"Concolic testing","score":0.6370770931243896},{"id":"https://openalex.org/keywords/emulation","display_name":"Emulation","score":0.6309261322021484},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5373097658157349},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.5060681700706482},{"id":"https://openalex.org/keywords/taint-checking","display_name":"Taint checking","score":0.4372977614402771},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.43176764249801636},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4236012399196625},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.16472157835960388}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9572753310203552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8909064531326294},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.7838075160980225},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.6557798385620117},{"id":"https://openalex.org/C11219265","wikidata":"https://www.wikidata.org/wiki/Q5158734","display_name":"Concolic testing","level":4,"score":0.6370770931243896},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.6309261322021484},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5373097658157349},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.5060681700706482},{"id":"https://openalex.org/C63116202","wikidata":"https://www.wikidata.org/wiki/Q7676227","display_name":"Taint checking","level":3,"score":0.4372977614402771},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.43176764249801636},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4236012399196625},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.16472157835960388},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C50522688","wikidata":"https://www.wikidata.org/wiki/Q189833","display_name":"Economic growth","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3354249","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3354249","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6800000071525574,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3112412200","display_name":null,"funder_award_id":"2018-0-00513","funder_id":"https://openalex.org/F4320335489","funder_display_name":"Institute for Information and Communications Technology Promotion"}],"funders":[{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W127238549","https://openalex.org/W157156687","https://openalex.org/W1506510492","https://openalex.org/W1507845365","https://openalex.org/W1553308705","https://openalex.org/W1610688982","https://openalex.org/W1976878954","https://openalex.org/W2002934700","https://openalex.org/W2049867480","https://openalex.org/W2104993088","https://openalex.org/W2108747667","https://openalex.org/W2113864883","https://openalex.org/W2115675703","https://openalex.org/W2128985333","https://openalex.org/W2140839850","https://openalex.org/W2186070848","https://openalex.org/W2515236103","https://openalex.org/W2574017551","https://openalex.org/W2613534458","https://openalex.org/W2741068848","https://openalex.org/W2766540688","https://openalex.org/W2794670092","https://openalex.org/W2795192879","https://openalex.org/W2888875512","https://openalex.org/W2891235722","https://openalex.org/W2902381500","https://openalex.org/W2963846926","https://openalex.org/W2964097210","https://openalex.org/W2964241064"],"related_works":["https://openalex.org/W2777046235","https://openalex.org/W3172606155","https://openalex.org/W3019261932","https://openalex.org/W2004278744","https://openalex.org/W2186070848","https://openalex.org/W2785720764","https://openalex.org/W2058510542","https://openalex.org/W3104446232","https://openalex.org/W2984839971","https://openalex.org/W3161338937"],"abstract_inverted_index":{"Hybrid":[0],"fuzzing,":[1],"which":[2,70],"combines":[3],"fuzzing":[4],"and":[5,44,82,109,131,163,178],"concolic":[6,18],"execution,":[7],"is":[8,25,32,66],"promising":[9],"in":[10,17,154,170],"light":[11],"of":[12,64,106],"the":[13,95,146,152,155,176],"recent":[14],"performance":[15],"improvements":[16],"engines.":[19],"We":[20,174],"have":[21],"observed":[22],"that":[23,101,143],"there":[24],"room":[26],"for":[27,98,127,135,159],"further":[28],"improvement:":[29],"symbolic":[30,72,125],"emulation":[31,126],"still":[33],"slow,":[34],"unnecessary":[35],"constraints":[36,137],"dominate":[37],"solving":[38],"time,":[39],"resources":[40],"are":[41,47],"overly":[42],"allocated,":[43],"hard-to-trigger":[45],"bugs":[46,153,169,177],"missed.":[48],"To":[49],"address":[50],"these":[51,119],"problems,":[52],"we":[53],"present":[54],"a":[55,103,133],"new":[56,167,181],"hybrid":[57],"fuzzer":[58],"named":[59],"Intriguer.":[60],"The":[61],"key":[62],"idea":[63],"Intriguer":[65,77,92,121,144,149],"field-level":[67,75],"constraint":[68],"solving,":[69],"optimizes":[71],"execution":[73,84,96],"with":[74],"knowledge.":[76],"performs":[78],"instruction-level":[79],"taint":[80],"analysis":[81],"records":[83],"traces":[85,97],"without":[86],"data":[87],"transfer":[88],"instructions":[89,100,130],"like":[90],"mov.":[91],"then":[93],"reduces":[94],"tainted":[99],"accessed":[102],"wide":[104],"range":[105],"input":[107,111],"bytes,":[108],"infers":[110],"fields":[112],"to":[113],"build":[114],"field":[115],"transition":[116],"trees.":[117],"With":[118],"optimizations,":[120],"can":[122],"efficiently":[123],"perform":[124],"more":[128],"relevant":[129],"invoke":[132],"solver":[134],"complicated":[136],"only.":[138],"Our":[139],"evaluation":[140],"results":[141],"indicate":[142],"outperforms":[145],"state-of-the-art":[147],"fuzzers:":[148],"found":[150],"all":[151],"LAVA-M(5h)":[156],"benchmark":[157],"dataset":[158],"ground":[160],"truth":[161],"performance,":[162],"also":[164],"discovered":[165],"43":[166],"security":[168],"seven":[171],"real-world":[172],"programs.":[173],"reported":[175],"received":[179],"23":[180],"CVEs.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-11-22T00:00:00"}
