{"id":"https://openalex.org/W3091773350","doi":"https://doi.org/10.1145/3320269.3384736","title":"PathAFL: Path-Coverage Assisted Fuzzing","display_name":"PathAFL: Path-Coverage Assisted Fuzzing","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3091773350","doi":"https://doi.org/10.1145/3320269.3384736","mag":"3091773350"},"language":"en","primary_location":{"id":"doi:10.1145/3320269.3384736","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384736","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061210370","display_name":"Shengbo Yan","orcid":"https://orcid.org/0009-0008-4297-7852"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shengbo Yan","raw_affiliation_strings":["Nankai University, TianJin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University, TianJin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006298800","display_name":"Chenlu Wu","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenlu Wu","raw_affiliation_strings":["Nankai University, TianJin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University, TianJin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100455139","display_name":"Hang Li","orcid":"https://orcid.org/0000-0002-6221-6195"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hang Li","raw_affiliation_strings":["Nankai University, TianJin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University, TianJin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101936174","display_name":"Wei Shao","orcid":"https://orcid.org/0000-0001-5689-5817"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Shao","raw_affiliation_strings":["Nankai University, TianJin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University, TianJin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005646333","display_name":"Chunfu Jia","orcid":"https://orcid.org/0000-0002-5588-9690"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunfu Jia","raw_affiliation_strings":["Nankai University, TianJin, China"],"affiliations":[{"raw_affiliation_string":"Nankai University, TianJin, China","institution_ids":["https://openalex.org/I205237279"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5061210370"],"corresponding_institution_ids":["https://openalex.org/I205237279"],"apc_list":null,"apc_paid":null,"fwci":2.5367,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.89747191,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"598","last_page":"609"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.898383378982544},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8156881332397461},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.5849300622940063},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.5327175855636597},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.522266685962677},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.4378587305545807},{"id":"https://openalex.org/keywords/schedule","display_name":"Schedule","score":0.423126757144928},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4039371907711029},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3301509618759155},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.30650538206100464},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2079733908176422},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.129628986120224},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12300282716751099}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.898383378982544},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8156881332397461},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.5849300622940063},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.5327175855636597},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.522266685962677},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.4378587305545807},{"id":"https://openalex.org/C68387754","wikidata":"https://www.wikidata.org/wiki/Q7271585","display_name":"Schedule","level":2,"score":0.423126757144928},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4039371907711029},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3301509618759155},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.30650538206100464},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2079733908176422},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.129628986120224},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12300282716751099},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.0},{"id":"https://openalex.org/C13280743","wikidata":"https://www.wikidata.org/wiki/Q131089","display_name":"Geodesy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3320269.3384736","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384736","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1710734607","https://openalex.org/W2002934700","https://openalex.org/W2101512909","https://openalex.org/W2153185479","https://openalex.org/W2511770387","https://openalex.org/W2514974017","https://openalex.org/W2515236103","https://openalex.org/W2574017551","https://openalex.org/W2613534458","https://openalex.org/W2701225458","https://openalex.org/W2757104921","https://openalex.org/W2766540688","https://openalex.org/W2766647240","https://openalex.org/W2777430404","https://openalex.org/W2794670092","https://openalex.org/W2798388185","https://openalex.org/W2806377938","https://openalex.org/W2891235722","https://openalex.org/W2947182139","https://openalex.org/W2954292831","https://openalex.org/W2960121311","https://openalex.org/W2963846926","https://openalex.org/W2964097210","https://openalex.org/W2964241064","https://openalex.org/W3104664063","https://openalex.org/W6737694244","https://openalex.org/W7029982221"],"related_works":["https://openalex.org/W4232884709","https://openalex.org/W4385625698","https://openalex.org/W3017338730","https://openalex.org/W2517087431","https://openalex.org/W3006477812","https://openalex.org/W4315836263","https://openalex.org/W4284704973","https://openalex.org/W2042995518","https://openalex.org/W2043379294","https://openalex.org/W2160450964"],"abstract_inverted_index":{"Fuzzing":[0],"is":[1,17,24,76,115,237],"an":[2,155],"effective":[3],"method":[4],"to":[5,44,79,134,138,149,165,179],"find":[6],"software":[7],"bugs":[8,247,282],"and":[9,58,109,143,176,189,210,226,239,271],"vulnerabilities.":[10],"One":[11],"of":[12,38,64,71,84,154,174,267],"the":[13,18,25,35,36,62,69,82,111,140,151,180,185,190,197,206,235,245,249,262],"most":[14],"useful":[15],"techniques":[16],"coverage-guided":[19,31],"fuzzing,":[20],"whose":[21,120],"key":[22],"element":[23],"tracing":[26,152],"code":[27,46,137,269],"coverage":[28,53,270],"information.":[29],"Existing":[30],"fuzzers":[32,264],"generally":[33],"use":[34],"number":[37,63,173,236],"basic":[39,56],"blocks":[40],"or":[41],"edges":[42,121,229],"explored":[43,222],"measure":[45],"coverage.":[47,60],"Path-coverage":[48],"can":[49,106],"provide":[50],"more":[51,224,228,246],"accurate":[52],"information":[54],"than":[55,230],"block":[57],"edge":[59],"However,":[61],"paths":[65,83,169,225],"grows":[66],"exponentially":[67],"as":[68],"size":[70],"a":[72,85,93,100,116,145,161,171],"program":[73],"increases.":[74],"It":[75,105],"almost":[77],"impossible":[78],"trace":[80],"all":[81,123],"real-world":[86],"application.":[87],"In":[88,218,274],"this":[89],"paper,":[90],"we":[91,159,201],"propose":[92],"fuzzing":[94],"solution":[95],"named":[96],"PathAFL,":[97],"which":[98,114],"assists":[99],"fuzzer":[101,208],"by":[102],"path":[103,118,141,198],"identification.":[104],"effectively":[107],"identify":[108],"utilize":[110],"important":[112],"h-path,":[113],"new":[117,280],"but":[119],"have":[122],"been":[124],"touched":[125],"previously.":[126],"First,":[127],"PathAFL":[128,203,221,243,260,277],"only":[129],"inserts":[130],"one":[131],"assembly":[132],"instruction":[133],"AFL's":[135],"original":[136],"calculate":[139],"hash,":[142],"uses":[144],"selective":[146],"instrumentation":[147],"strategy":[148],"reduce":[150],"granularity":[153],"execution":[156],"path.":[157],"Second,":[158],"design":[160],"fast":[162],"filtering":[163],"algorithm":[164,188],"choose":[166],"higher":[167],"weight":[168],"from":[170],"large":[172],"h-paths":[175],"add":[177],"them":[178],"seed":[181,186],"queue.":[182],"Third,":[183],"both":[184,268],"selection":[187],"power":[191],"schedule":[192],"are":[193],"implemented":[194,202],"based":[195,204],"on":[196,205,213,248],"weight.":[199],"Finally":[200],"popular":[207],"AFL":[209],"evaluated":[211],"it":[212],"10":[214],"well-fuzzed":[215],"benchmark":[216],"programs.":[217],"24":[219],"hours,":[220],"38%":[223],"9.3%":[227],"AFL.":[231],"Compared":[232],"with":[233,283],"CollAFL-x,":[234],"25%":[238],"5.9%":[240],"correspondingly.":[241],"Moreover,":[242],"found":[244,278],"LAVA-M":[250],"dataset,":[251],"even":[252],"four":[253],"unlisted":[254],"bugs.":[255],"The":[256],"results":[257],"show":[258],"that":[259],"outperforms":[261],"previous":[263],"in":[265],"terms":[266],"bug":[272],"discovery.":[273],"well-tested":[275],"programs,":[276],"8":[279],"security":[281],"6":[284],"CVEs":[285],"assigned.":[286]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
