{"id":"https://openalex.org/W4383221433","doi":"https://doi.org/10.1145/3579856.3582813","title":"Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis","display_name":"Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221433","doi":"https://doi.org/10.1145/3579856.3582813"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3582813","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3579856.3582813","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3582813","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3582813","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5092404304","display_name":"Sirus Shahini","orcid":null},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sirus Shahini","raw_affiliation_strings":["University of Utah, United States of America"],"raw_orcid":"https://orcid.org/0000-0002-9248-1627","affiliations":[{"raw_affiliation_string":"University of Utah, United States of America","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100695047","display_name":"Mu Zhang","orcid":"https://orcid.org/0000-0001-5905-9515"},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mu Zhang","raw_affiliation_strings":["University of Utah, United States of America"],"raw_orcid":"https://orcid.org/0000-0001-5905-9515","affiliations":[{"raw_affiliation_string":"University of Utah, United States of America","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065116578","display_name":"Mathias Payer","orcid":"https://orcid.org/0000-0001-5054-7547"},"institutions":[{"id":"https://openalex.org/I5124864","display_name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne","ror":"https://ror.org/02s376052","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I5124864"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Mathias Payer","raw_affiliation_strings":["EPFL, Switzerland"],"raw_orcid":"https://orcid.org/0000-0001-5054-7547","affiliations":[{"raw_affiliation_string":"EPFL, Switzerland","institution_ids":["https://openalex.org/I5124864"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002834603","display_name":"Robert Ricci","orcid":"https://orcid.org/0000-0001-6904-5192"},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert Ricci","raw_affiliation_strings":["University of Utah, USA"],"raw_orcid":"https://orcid.org/0000-0001-6904-5192","affiliations":[{"raw_affiliation_string":"University of Utah, USA","institution_ids":["https://openalex.org/I223532165"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5092404304"],"corresponding_institution_ids":["https://openalex.org/I223532165"],"apc_list":null,"apc_paid":null,"fwci":0.2125,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57291382,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"232","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.9613201022148132},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8548775911331177},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.7327402830123901},{"id":"https://openalex.org/keywords/trace","display_name":"TRACE (psycholinguistics)","score":0.6774172782897949},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5648376941680908},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.5628918409347534},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5196815133094788},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.4955958127975464},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.491671621799469},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.47065654397010803},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.4510018229484558},{"id":"https://openalex.org/keywords/program-analysis","display_name":"Program analysis","score":0.44260287284851074},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4057101607322693},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15906593203544617},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.15776890516281128}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.9613201022148132},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8548775911331177},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.7327402830123901},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.6774172782897949},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5648376941680908},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.5628918409347534},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5196815133094788},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.4955958127975464},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.491671621799469},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.47065654397010803},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.4510018229484558},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.44260287284851074},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4057101607322693},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15906593203544617},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.15776890516281128},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3579856.3582813","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3579856.3582813","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3582813","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:infoscience.epfl.ch:305341","is_oa":true,"landing_page_url":"https://infoscience.epfl.ch/handle/20.500.14299/200972","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"WoS","raw_type":"conference proceedings"}],"best_oa_location":{"id":"doi:10.1145/3579856.3582813","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3579856.3582813","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3579856.3582813","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8366282761","display_name":null,"funder_award_id":"1743363,2027208","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4383221433.pdf","grobid_xml":"https://content.openalex.org/works/W4383221433.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W116656696","https://openalex.org/W2076253536","https://openalex.org/W2128128820","https://openalex.org/W2506155917","https://openalex.org/W2514974017","https://openalex.org/W2535617737","https://openalex.org/W2613534458","https://openalex.org/W2741068848","https://openalex.org/W2902381500","https://openalex.org/W2963846926","https://openalex.org/W2964097210","https://openalex.org/W3008477014","https://openalex.org/W3163844163","https://openalex.org/W4240738830","https://openalex.org/W4284694822"],"related_works":["https://openalex.org/W614438062","https://openalex.org/W4313066017","https://openalex.org/W4205454537","https://openalex.org/W3173990398","https://openalex.org/W4283736421","https://openalex.org/W2297949281","https://openalex.org/W3089408602","https://openalex.org/W4381785649","https://openalex.org/W4226494072","https://openalex.org/W2914996832"],"abstract_inverted_index":{"Fuzzing":[0],"has":[1],"emerged":[2],"as":[3],"the":[4,30,36,72],"most":[5,37],"broadly":[6],"used":[7,39],"testing":[8],"technique":[9],"to":[10,18,45,75],"discover":[11],"bugs.":[12],"Effective":[13],"fuzzers":[14],"rely":[15],"on":[16],"coverage":[17,28,40,56],"prioritize":[19],"inputs":[20],"that":[21],"exercise":[22],"new":[23],"program":[24],"areas.":[25],"Edge-based":[26],"code":[27],"of":[29,79],"Program":[31],"Under":[32],"Test":[33],"(PUT)":[34],"is":[35,43],"commonly":[38],"today.":[41],"It":[42],"cheap":[44],"collect\u2014a":[46],"simple":[47],"counter":[48],"per":[49],"basic":[50],"block":[51],"edge":[52,55,67],"suffices.":[53],"Unfortunately,":[54],"lacks":[57,71],"context":[58],"information:":[59],"it":[60],"exclusively":[61],"records":[62],"how":[63],"many":[64],"times":[65],"each":[66],"was":[68],"executed":[69],"but":[70],"information":[73],"necessary":[74],"trace":[76],"actual":[77],"paths":[78],"execution.":[80]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
